Re: [Mipshop] AD review of draft-ietf-mipshop-pfmipv6

"Ahmad Muhanna" <amuhanna@nortel.com> Fri, 02 October 2009 12:30 UTC

Return-Path: <AMUHANNA@nortel.com>
X-Original-To: mipshop@core3.amsl.com
Delivered-To: mipshop@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 64C0128C10E for <mipshop@core3.amsl.com>; Fri, 2 Oct 2009 05:30:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.609
X-Spam-Level:
X-Spam-Status: No, score=-6.609 tagged_above=-999 required=5 tests=[AWL=-0.010, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PMSa2KqwuORb for <mipshop@core3.amsl.com>; Fri, 2 Oct 2009 05:30:47 -0700 (PDT)
Received: from zcars04e.nortel.com (zcars04e.nortel.com [47.129.242.56]) by core3.amsl.com (Postfix) with ESMTP id 153A928C104 for <mipshop@ietf.org>; Fri, 2 Oct 2009 05:30:46 -0700 (PDT)
Received: from zrc2hxm0.corp.nortel.com (zrc2hxm0.corp.nortel.com [47.103.123.71]) by zcars04e.nortel.com (Switch-2.2.0/Switch-2.2.0) with ESMTP id n92CW5B04465; Fri, 2 Oct 2009 12:32:05 GMT
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
Date: Fri, 02 Oct 2009 07:31:54 -0500
Message-ID: <C5A96676FCD00745B64AE42D5FCC9B6E20782FA1@zrc2hxm0.corp.nortel.com>
In-Reply-To: <C5A96676FCD00745B64AE42D5FCC9B6E20665702@zrc2hxm0.corp.nortel.com>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: [Mipshop] AD review of draft-ietf-mipshop-pfmipv6
Thread-Index: Aco/PBvvrqk/yD0HQMiatfmL8aDT4wABcMQgAQYN7YA=
References: <4A93F739.5050006@piuha.net><4A97EEAB.9070606@kddilabs.jp><4A9F4222.8070107@kddilabs.jp><C5A96676FCD00745B64AE42D5FCC9B6E2025022D@zrc2hxm0.corp.nortel.com><4AAE38F6.2010600@kddilabs.jp><C5A96676FCD00745B64AE42D5FCC9B6E2038AF1D@zrc2hxm0.corp.nortel.com><4AB2AE87.6030801@kddilabs.jp><C5A96676FCD00745B64AE42D5FCC9B6E204B8C6F@zrc2hxm0.corp.nortel.com><C5A96676FCD00745B64AE42D5FCC9B6E2050008C@zrc2hxm0.corp.nortel.com><4AB8CF19.70905@kddilabs.jp><C5A96676FCD00745B64AE42D5FCC9B6E20597C0A@zrc2hxm0.corp.nortel.com><4ABF0664.1010803@kddilabs.jp> <C5A96676FCD00745B64AE42D5FCC9B6E20665702@zrc2hxm0.corp.nortel.com>
From: Ahmad Muhanna <amuhanna@nortel.com>
To: Hidetoshi Yokota <yokota@kddilabs.jp>
Cc: Mipshop <mipshop@ietf.org>, draft-ietf-mipshop-pfmipv6@tools.ietf.org
Subject: Re: [Mipshop] AD review of draft-ietf-mipshop-pfmipv6
X-BeenThere: mipshop@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: <mipshop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/mipshop>, <mailto:mipshop-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/mipshop>
List-Post: <mailto:mipshop@ietf.org>
List-Help: <mailto:mipshop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mipshop>, <mailto:mipshop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 02 Oct 2009 12:30:51 -0000

Hi Hidetoshi,

As per our phone conversation, you will be publishing a new revision to
address the technical details and the options for establishing the
inter-MAG bidirectional tunnel. As I mentioned before, looking forward
for your update.

Cheers!

Regards,
Ahmad
 

> -----Original Message-----
> From: mipshop-bounces@ietf.org 
> [mailto:mipshop-bounces@ietf.org] On Behalf Of Muhanna, Ahmad 
> (RICH1:2H10)
> Sent: Sunday, September 27, 2009 3:26 AM
> To: Hidetoshi Yokota
> Cc: Mipshop; draft-ietf-mipshop-pfmipv6@tools.ietf.org
> Subject: Re: [Mipshop] AD review of draft-ietf-mipshop-pfmipv6
> 
> Hi Hidetoshi,
> Thanks for your responses. 
> I think we have enough common ground to enable us move 
> forward, and I believe your next revision will hopefully has 
> all the needed clarifications. Looking forward to read your 
> next revision.
> 
> Thanks again!
> Just one comment inline.
> 
> Regards,
> Ahmad
> 
> > -----Original Message-----
> > From: Hidetoshi Yokota [mailto:yokota@kddilabs.jp]
> > Sent: Sunday, September 27, 2009 1:30 AM
> > To: Muhanna, Ahmad (RICH1:2H10)
> > Cc: Mipshop; draft-ietf-mipshop-pfmipv6@tools.ietf.org
> > Subject: Re: [Mipshop] AD review of draft-ietf-mipshop-pfmipv6
> > 
> > Hi Ahmad,
> > 
> > Sorry, but we should have answered your questions much earlier.
> > 
> > Ahmad Muhanna wrote:
> > > Hi Hidetoshi,
> > > 
> > > Thanks for your thoughts on this. 
> > > I expected a little more serious ones:), but please see
> > some more of
> > > the same thoughts inline! :)
> > 
> > I'm always serious ;-). Please see inline:
> [Ahmad]
> Agreed!
> 
> > 
> > > Regards,
> > > Ahmad
> > >> -----Original Message-----
> > >> From: Hidetoshi Yokota [mailto:yokota@kddilabs.jp]
> > >> Sent: Tuesday, September 22, 2009 6:20 AM
> > >> To: Muhanna, Ahmad (RICH1:2H10)
> > >> Cc: Mipshop; draft-ietf-mipshop-pfmipv6@tools.ietf.org
> > >> Subject: Re: [Mipshop] AD review of draft-ietf-mipshop-pfmipv6
> > >>
> > >> Hi Ahmad,
> > >>
> > >> Thanks for your detailed thoughts. Below, we try to answer your 
> > >> questions as best we can.
> > >>
> > >> Ahmad Muhanna wrote:
> > >>> Hi Hidetoshi,
> > >>>
> > >>> Looking one more time into the draft I found the 
> following under 
> > >>> section
> > >>> 4.1:
> > >>>
> > >>> "
> > >>>    The encapsulation type for these user packets SHOULD
> > >> follow that used
> > >>>    in the tunnel between the LMA and MAG (IPv6-in-IPv6 as
> > >> specified in
> > >>>    [RFC2473], IPv6-in-IPv4, IPv6-in-IPv4-UDP as specified in
> > >>>    [IPv4PMIPv6], TLV-header UDP tunneling as specified in
> > >> [GREKEY] or
> > >>>    any new method defined in the future).
> > >>> "
> > >> The intention here is that the inter-MAG tunnel should 
> support all 
> > >> the encapsulation types that are mentioned in RFC5213.
> > > [Ahmad]
> > > Well, whatever it is this document supports, it needs to
> > make it clear
> > > and ensure that it works. My question is the following: Does this 
> > > document support ONLY IPv6-in-IPv6 tunneling between the
> > MAG and the
> > > LMA? or it also supports the different tunneling that the 
> document 
> > > claims to support as quoted above?
> > 
> > The above tunneling types are supported.
> > 
> > > If it only supports IPv6-in-IPv6, this document MUST 
> document that 
> > > clearly. On the other hand, if it supports the above listed
> > tunneling
> > > protocols, it MUST document how forwarding these packets over the 
> > > inter-MAG tunnel works.
> > 
> > Ok. We will add the header format and mapping rules in the document.
> > 
> > >>> IMO, this is a very broad statement that underestimates its
> > >> content. 
> > >>> It is way underspecified how these tunneling protocols will
> > >> be used to
> > >>> successfully map the traffic from the MAG-LMA tunnel to
> > the MAG-MAG
> > >>> tunnel. In this regard, I have the following questions:
> > >>>
> > >>> 1. Is it documented any where how this mapping would work
> > >> for all of
> > >>> these tunneling/encapsulation mechanisms?
> > >> It seems that the mapping of these flows is rather 
> implementation 
> > >> specific. Is there anything that should be considered in
> > addition to
> > >> RFC5568?
> > > 
> > > [Ahmad]
> > > Of course. I guess you need to get out of the mode that
> > this document
> > > is nothing but few tweaks to make FMIP6 works for PMIPv6. 
> > In RFC5568,
> > > it clearly assumes that protocol is used for fast 
> handover when IP 
> > > Mobility based on MIP6 as described in RFC3775. In that 
> sense, only
> > > IPv6-in-IPv6 is assumed.
> > 
> > The motivation, basic concept and fast handover mechanisms are the 
> > same as those of RFC5568, which I believe is the major part of this 
> > document.
> > In terms of encapsulation methods, I admit that we should add more 
> > explanations.
> > 
> > > Again, the above claim of supporting all these tunneling 
> mechanisms 
> > > should either be removed and clearly document that this
> > protocol works
> > > ONLY when the tunneling between the MAG and LMA is 
> IPv6-in-IPv6 or 
> > > explain how they will work.....
> > > 
> > >>> 2. Is the tunneling mode (between the PMAG and the LMA) 
> > >>> negotiated/communicated between the PMAG-MAGs?
> > >> If the tunneling mode is determined between the LMA and
> > PMAG, which
> > >> is in the scope of RFC5213, that of the inter-MAG tunnel should 
> > >> follow it.
> > >> It is also assumed that the same type of tunneling will be used 
> > >> between the LMA and NMAG.
> > > 
> > > [Ahmad]
> > > Sure, but your document claim that it supports all of these
> > tunneling
> > > mechanisms (as per the quoted text from section 4.1) and at
> > the same
> > > time documents nothing about how these should work across the 
> > > inter-MAG tunnel.
> > 
> > I see. We will update the document adding the statement 
> that the same 
> > tunneling mechanism as that between the LMA and MAG should 
> be used for 
> > the inter-MAG tunnel.
> > 
> > >>> 3. If the tunneling between the PMAG-LMA is
> > >> IPv6-in-IPv4-UDP, Does it
> > >>> mean the tunneling between the PMAG-NMAG is also going to
> > >> use the same
> > >>> encapsulation?
> > >> Yes, that is the basic idea.
> > > [Ahmad]
> > > Good. Then How that should work?
> > > Is there anything in your document which specify that? I am
> > all ears,
> > > just point me to the text.
> > 
> > The document will be updated as stated above.
> > 
> > >>> 4. If the UDP tunneling between the two MAGs is not needed,
> > >> what kind
> > >>> of tunneling will be used between the two MAGs to correctly
> > >> map the MN
> > >>> traffic and successfully deliver it to the MN?
> > >> That mode has not been considered. It will be possible,
> > but is there
> > >> any reason that a different type of tunneling should be used?
> > > 
> > > [Ahmad]
> > > I am not suggesting to use a different tunneling mechanism
> > between the
> > > PMAG and the NMAG; However, You are saying that, e.g., 
> > > IPv6-in-IPv4-UDP is naturally extended over the PMAG-NMAG tunnel 
> > > without saying how it should work. That what I was 
> speculating that 
> > > you probably use a specific tunneling, of course, other
> > than IPv6-in-IPv6 to make it work.
> > > 
> > > So, again, if PMAG-NMAG interface does support all these 
> tunneling 
> > > mechanisms, then we need to know how it works? That is all.
> > 
> > When, for example, IPv6-in-IPv4-UDP is decided to be used 
> between the 
> > LMA and MAG, it should be configured to behave like that a 
> priori. The 
> > same principle is applied. It should be configured on both 
> MAGs that 
> > the same tunneling mechanism is used. There is no 
> sophisticated method 
> > here.
> > 
> > If there is something to be considered, that will be the UDP port 
> > number for this tunneling. As far as it is configured correctly on 
> > both MAGs, any number can be used, but it may save some operational 
> > task by assigning a specific number. In the case of 
> > <draft-ietf-netlmm-pmip6-ipv4-support>, the port number assigned for
> > RFC5555 (DSMIPv6) is used. A new number could be assigned for the 
> > inter-MAG tunnel likewise, but I'm totally open about it.
> > 
> > >>> 5. Do these tunneling mechanisms include plain GRE
> > >> Encapsulation with
> > >>> GRE keys or only GRE with TLV-header UDP tunneling?
> > >> <draft-ietf-netlmm-grekey-option> supports both modes, so
> > >> PFMIPv6 should also support them.
> > > [Ahmad]
> > > That is a clear answer. Thanks.
> > > Could you please make sure that your document clarify and clearly 
> > > document it.
> > 
> > The document will be updated clarifying the above.
> > 
> > >>> 5.1. If plain GRE encapsulation with keys is used, then the
> > >> document
> > >>> needs to clearly specify if there are two sets of GRE
> > keys for the
> > >>> same mobility session or only one set? i.e., GRE Keys 
> between the 
> > >>> PMAG-LMA, GRE Keys for PMAG-NMAG or one set is used. It is
> > >> not clear
> > >>> in the current document.
> > >> PFMIPv6 describes only GRE keys for the inter-MAG tunnel
> > (PMAG-NMAG),
> > >> which I think is clarified in Section 4.2. As far as GRE
> > Key Option
> > >> is used, it is difficult to transport multiple sets of 
> keys at one 
> > >> time.
> > > [Ahmad]
> > > Well,
> > > 1. It is not clarified nor clear under section 4.2. but, 
> could you 
> > > please point me to the text you are talking about?
> > 
> > I think the new text for that part, which we are discussing 
> in another 
> > thread, will make it clear.
> > 
> > > 2. As far as of multiple GRE keys exchange, currently that is a 
> > > limitation of the PMIPv6 protocol. Right? Then, when you
> > need multiple
> > > GRE keys, how these GRE keys are communicated? Is that 
> explained in 
> > > the document?
> > 
> > I guess you are talking about multiple bindings. According 
> to Section
> > 3.1 of <draft-ietf-netlmm-grekey-option>, GRE Key Option 
> handles only 
> > an individual flow. This capability will be inherited in PFMIPv6 as 
> > far as this option is used.
> > If
> > multiple bindings need to be handled, multiple HI/HAck 
> exchanges will 
> > occur. We will update the document by clarifying that one HI/HAck 
> > exchange handles an individual flow.
> > 
> > >>> 5.2. same question as in 4, if there is GRE with TLV-header UDP 
> > >>> tunneling between the PMAG and the LMA, Is that needed
> > between the
> > >>> PMAG-NMAG? If NOT, what encapsulation mechanism is being
> > >> used and how
> > >>> is the mapping works?
> > >> The working assumption is "yes".
> > > [Ahmad]
> > > That is a huge CLAIM that is NOT backed by any technical 
> data! How 
> > > that should work? Can you document that some where in the 
> > > specification? If it is already document, please point me
> > to the text.
> > 
> > By the same token, is there any technical data that the above 
> > assumption  could deteriorate the overall performance or something?
> > Anyway, this is not mandatory and the operator can choose whatever 
> > method they want as far as it is configured on both MAGs.
> > 
> > One potentially beneficial capability would be that if the HI/HAck 
> > messages have "T" flag as defined in 
> > <draft-ietf-netlmm-grekey-option>,
> > it will become able to follow the tunneling renegotiation 
> between the 
> > LMA and MAG. I don't know how much this happens, though...
> 
> > 
> > >>> 6. Is the assumption here that the NMAG and the PMAG have
> > the same
> > >>> transport with the LMA?
> > >> For the sake of simplicity, the answer should be "yes".
> > >> If not, the network between MAGs should provide the transparent 
> > >> environment (e.g., by another tunneling).
> > >>
> > >>> 7. with respect to "any new method defined in the future" 
> > >> what is the
> > >>> constraints on this statement? It seems to me an
> > >> overstatement of the
> > >>> capabilities of this protocol and an underestimate of 
> the future 
> > >>> tunneling mechanism. May be you need to make sure that the
> > >> wording is
> > >>> correct by having some conditional restrictions.
> > >> The intention here is that if a new tunneling mechanism is
> > specified
> > >> for  PMIPv6, PFMIPv6 should also support it. If this is
> > too vague, it
> > >> could be removed.
> > > [Ahmad]
> > > Sure, please remove it. Unless, you propose a dynamic tunneling 
> > > mechanism that is forward compatible and capable to 
> address future 
> > > tunneling between the PMAG and LMA.
> > 
> > Ok.
> > 
> > >>> In addition,
> > >>> ============
> > >>> IMO and based on a quick review of this draft, I find it
> > very vague
> > >>> and does not have the details for an Interoperable
> > >> protocol. I believe
> > >>> the draft SHOULD CLEARLY address the following points:
> > >>>
> > >>> Decide whether it needs to specify/support a single tunneling 
> > >>> encapsulation mechanism between the PMAG-NMAG or more than one.
> > >>>
> > >>>
> > >>> SINGLE tunneling and encapsulation mechanism between PMAG-NMAG:
> > >>> ===============================================================
> > >>> 1. This *protocol* needs to specify the exact details 
> of how this 
> > >>> tunneling mechanism is dynamically established to address
> > >> the nature
> > >>> of the problem being address in this *handover optimization
> > >> protocol*.
> > >>
> > >> The nature of the specification and its performance is based on 
> > >> RFC5568.
> > > [Ahmad]
> > > That is part of the problem not to be sited here as a supporting 
> > > argument!
> > > As I said earlier, RFC5568 assumes that there is always
> > IPv6-in-IPv6
> > > tunneling between the mobile node and the home agent. In 
> the case of
> > > PMIPv6 that assumption is INVALID.
> > > 
> > >> Whether the establishment of the tunneling mechanism is 
> dynamic or 
> > >> static is operation-specific.
> > > [Ahmad]
> > > That is NOT true. This document is supposedly offering a
> > fast handover
> > > mechanism for PMIPv6 which dynamically does (implicitly or
> > explicitly)
> > > negotiates tunneling between the MAG and the LMA. So, how a
> > statically
> > > configured tunnel between the PMAG and the NMAG tunnels a
> > mobile node
> > > traffics when the mobile node traffic between the PMAG and
> > LMA for the
> > > same mobile node was dynamically negotiated?
> > 
> > The tunnel between the LMA and MAG for a mobile node will be 
> > dynamically established, but the tunneling method should be 
> determined 
> > in advance.
> > The only exception is the TLV-header negotiation with the T-flag.
> > 
> > Although the operator usually knows whether the TLV-header 
> should be 
> > used or not in advance, it may be beneficial to define the 
> same flag 
> > in the HI and HAck messages as well.
> > 
> > > 
> > >>> 1.1. for example, if GRE with Keys is being used, then 
> it MUST be 
> > >>> clear how the GRE keys are exchanged between the PMAG-NMGA,
> > >> similar to PMIPv6.
> > >>
> > >> The current text proposal for Section 4.2 tries to clarify it 
> > >> regarding who selects the key and how it is transferred.
> > > [Ahmad]
> > > Hmmm.. Tries to clarify ... I guess we need a clear
> > specification that
> > > documents an Interoperable solution. We can not just propose a 
> > > standard track document that is some what clear in the mind
> > of some. Right?
> > 
> > Again, the new text, which we are discussing in another 
> thread, will 
> > make it clear enough, right?
> > 
> > >>> 2. How the chosen PMAG-NMAG tunneling protocol is able to
> > interwork
> > >>> with all tunneling mechanisms that are currently supported
> > >> by PMIPv6,
> > >>> e.g., IPv6-in-IPv6, IPv6-in-IPv4, IPv6-in-IPv4 UDP, etc. 
> > >> between the
> > >>> PMAG-LMA as is being claimed under section 4.2 of this draft.
> > >> Basically, it is supposed that the same tunneling 
> protocol as that 
> > >> between the LMA and MAG is used. The tunneling type
> > between the LMA
> > >> and MAG should be determined in advance.
> > > [Ahmad]
> > > I guess this answer is more confusing .... One time you
> > said that the
> > > tunnel can be static and can be dynamic. Now, you just said
> > that the
> > > tunnel should be STATIC? I mean what is it? It needs
> > clarification......
> > 
> > The tunnel between the LMA and MAG is dynamically 
> established, but the 
> > tunneling type should be determined in advance.
> > At this point, there is no specification that enables the tunneling 
> > type negotiation between the LMA and MAG, so from the 
> perspective of 
> > IETF standards, the tunneling type should be determined in advance 
> > (with the exception of T-flag). As a side note, Frank, Suresh and I 
> > are proposing a draft that makes this negotiation possible, 
> but it is 
> > still an individual one.
> > 
> > > 
> > >>> 3. This *protocol* needs to clearly specify how the
> > >> different mobility
> > >>> sessions are being mapped between the PMAG-LMA tunneling to the 
> > >>> PMAG-NMAG tunneling? Somewhat similar to 2 above.
> > >> The basic mechanism is the same as in RFC5568. 
> > > [Ahmad]
> > > Again, in the case of RFC5568 it is straight forward. Only
> > > IPv6-in-IPv6 is supported as per RFC3775. Not the case for PMIPv6.
> > > 
> > >> If a GRE
> > >> tunnel further differentiates the session, the GRE key
> > will be used.
> > > [Ahmad]
> > > Good. Which GRE Key then?
> > > 1. Is that a statically configured GRE key?
> > 
> > Possible, but less flexible.
> > 
> > > 2. Is it the same set of GRE keys between the PMAG and LMA?
> > 
> > Possible, but less likely. Need to investigate the risk of 
> collisions 
> > and others.
> > 
> > > 3. If none of the above, how these GRE keys are generated and 
> > > exchanged between the PMAG and the NMAG?
> > 
> > By the HI/HAck exchange, which is most assumed in the 
> document. Again, 
> > the new text in another thread will make it clear.
> > 
> > >>> Multiple Tunneling and encapsulation mechanisms between the
> > >> PMAG-NMAG:
> > >> 
> > 
> =====================================================================
> > >> =
> > >>> If the choice as being claimed under section 4.1, is to
> > >> support all of
> > >>> the current tunneling mechanisms between PMAG-LMA on the
> > PMAG-NMAG
> > >>> interface, then the protocol needs to address the following:
> > >>>
> > >>> 1. Provide a good analysis why that option is the best
> > option? What
> > >>> are the advantages and the disadvantages?
> > >> I think that is the most workable solution. 
> > > {Ahmad]
> > > What do you have to technically back up this statement. 
> > Otherwise, it
> > > is just another statement.
> > 
> > If GRE keys are used on the PMIPv6 tunnel, they are also 
> needed on the 
> > inter-MAG tunnel to distinguish each flow. If the transport network 
> > between MAGs is IPv4, IPv4 tunneling is needed. If there is a NAT 
> > between the MAGs, then UDP tunneling will be needed. In a nutshell, 
> > all the issues discussed for PMIPv6 could happen for the inter-MAG 
> > tunnel.
> > Eventually, the same types of tunneling mechanisms will be needed.
> > 
> > >> Since the
> > >> tunneling mechanism selected for the PMIPv6 tunnel is 
> supported by 
> > >> both the PMAG and NMAG, no extra capability is required for the 
> > >> inter-MAG tunnel.
> > > [Ahmad]
> > > OK. I am not disputing that the PMAG and the NMAG 
> supports the same 
> > > sets of tunneling mechanisms or not. It is more of which
> > tunnel to use
> > > for which mobile node session and what parameter is 
> needed for this 
> > > inter-MAG tunnel to correctly tunnel the mobile node traffic and 
> > > deliver it to the end of the tunnel in a non ambiguous way.
> > > 
> > > For example:
> > > Tunneling Case 1:
> > > =================
> > > 1. PMAG and the LMA negotiates the GRE encapsulation and
> > the GRE keys
> > > using the PBU and PBA for each applicable mobility session.
> > > 2. It is very well understood that both the PMAG and the
> > NMAG support
> > > GRE tunneling with GRE keys + GRE keys exchange using
> > PMIPv6 signaling
> > > with the LMA.
> > > 3. Now: for the inter-MAG tunnel and for the same 
> mobility session, 
> > > how GRE tunneling and GRE keys are negotiated between the 
> PMAG and 
> > > NMAG? Of course, using HI and HAck, right?
> > > 4. Okay, we need the exact details for this specific case.
> > 
> > The above case is mostly what the spec tries to express. Only the 
> > other thing is that the PMAG and LMA do not negotiate 
> whether the GRE 
> > encapsulation is used or not, but it's already been configured that 
> > way, right? Is there any negotiation mechanism between them in 
> > RFC5213?
> > 
> > > Tunneling Case 2:
> > > =================
> > > 1. Let us assume IPv6-in-IPv4 UDP is used for MN1. Okay 2. That 
> > > tunneling is implicitly negotiated between the PMAG and LMA
> > during the
> > > PBU/PBA exchange, right?
> > > 3. How that is negotiated between the PMAG and the NMAG? We
> > need the
> > > details..
> > 
> > I don't think there is any tunneling mode negotiation mechanism in 
> > RFC5213. I may miss something, but if there is such a 
> mechanism, we'll 
> > need to incorporate it in the PFMIPv6 spec...
> > 
> > > And so on....
> > > 
> > >> Also, I don't see any specific reason to use a special tunneling 
> > >> mechanism for the inter-MAG tunnel.
> > > [Ahmad]
> > > Good. This means you would use the same tunneling between
> > the PMAG and
> > > LMA over inter-MAG tunneling. In this case, we need the 
> details for 
> > > negotiating that tunneling mechanism between the PMAG and 
> the NMAG.
> > 
> > The assumption here is that the LMA, PMAG and NMAG know the 
> tunneling 
> > mechanism for PMIPv6 tunneling (LMA-PMAG and LMA-NMAG), and 
> the same 
> > mechanism is used for the inter-MAG tunnel.
> > 
> > >>> 2. How this *protocol* dynamically negotiates the tunneling
> > >> mechanism
> > >>> type?
> > >> If the tunneling mechanism between the LMA and MAG is
> > determined in
> > >> advance, the same mechanism is used for the inter-MAG
> > tunnel. So, it
> > >> is not on-demand and no negotiation is assumed. If the tunneling 
> > >> mechanism between the LMA and MAG is determined on demand,
> > then that
> > >> is a different story...
> > > 
> > > [Ahmad]
> > > Well, what do you mean? The tunneling between the PMAG and
> > the LMA is
> > > NOT on demand?
> > > I believe IPv4 support for PMIPv6 and GRE key for PMIPv6
> > drafts will
> > > be helpful in answering this question.
> > 
> > The tunnel establishment is done on-demand, but the encapsulation 
> > mechanism should be determined in advance.
> > Necessary parameters such as GRE keys for GRE encapsulation are 
> > exchanged between the LMA and MAG, but whether GRE encapsulation is 
> > used or IPv6-in-IPv4-UDP is used should be configured, I think. In 
> > actual operations, such things are usually configured by hand or 
> > something.
> > 
> > Anyway, what can be done by GRE Key Option should also be available 
> > for
> > PFMIPv6 (since the same option is used).
> > 
> > >>> 3. How that should work, for example if the tunneling mechanism 
> > >>> between the PMAG-LMA is IPv6 in IPv4 UDP, how that
> > >> tunneling will be
> > >>> extended to go over the PMAG-NMAG interface and how it is
> > >> supposed to work.
> > >>
> > >> In this case, both the PMAG and NMAG should be dual-stack
> > and the IP
> > >> addresses in the IPv4 outer header are those of the PMAG 
> and NMAG. 
> > >> IPv6 inner header should be kept intact.
> > >>
> > > 
> > > Okay..... Then if the NMAG sends the first packet over the
> > NMAG-PMAG
> > > tunnel! Which encapsulation mechanism is going to use to
> > encapsulate
> > > that packet?
> > 
> > If the tunneling mechanism is IPv6-in-IPv4-UDP, the same 
> mechanism is 
> > used.
> > 
> > > Also, Do you agree that there is a specific reason for 
> the traffic 
> > > between the PMAG and the LMA to be IPv6-in-IPv4-UDP. Right? That 
> > > reason may NOT be VALID between the PMAG and the NMAG. Right?
> > > Then why to use the same tunneling here? Just out of curiosity!
> > 
> > The simplest reason is that this assumption is simplest. 
> > Again, this is not mandatory and if both MAGs are configured to use 
> > the same tunneling mechanism, that will be fine.
> > However, you may need extra care. For example, suppose you 
> decide to 
> > use IPv6-in-IPv6 tunneling for the inter-MAG tunnel permanently. If 
> > the tunnel between the MAG and LMA used GRE encapsulation with GRE 
> > keys, it would not work...
> > 
> > >>> Finally, the draft could have some restrictions and define the 
> > >>> PMAG-NMAG tunneling/encapsulation mechanism and could
> > >> define a set of
> > >>> PMAG-LMA tunneling mechanism that are being
> > >> supported/interwork over
> > >>> the PMAG-NMAG tunneling/encapsulation.
> > >> What kind of restrictions do you foresee? Do you also have any 
> > >> specific mechanism for the inter-MAG tunnel in mind?
> > > [Ahmad]
> > > I guess, you need to answer many of the above comments
> > before we talk
> > > about this. A clear understanding of this tunneling is
> > needed and I do
> > > not see it documented in this draft.
> > > 
> > > BTW: Under section 4, this specification says:
> > > 
> > > "
> > >    In order to further improve the performance during the
> > handover, the
> > >    PFMIPv6 protocol in this document specifies a
> > bi-directional tunnel
> > >    between the Previous MAG (PMAG) and the New MAG (NMAG) 
> to tunnel
> > >    packets meant for the mobile node.  
> > > "
> > > 
> > > Which bi-directional tunnel? Where? What are the details?
> > 
> > Of course, that is the inter-MAG tunnel between the PMAG 
> and NMAG. The 
> > details are described in Section 4, which may not be 
> detailed enough 
> > from your viewpoint...
> > 
> > >>> One more note: I found defining and describing a protocol
> > >> based on a
> > >>> call flow, is not the most easy to follow. But, that could
> > >> just be me.
> > >>
> > >> What do you think could improve the readability of the document?
> > > [Ahmad]
> > > Quite some of them... But I gave up after a while....
> > 
> > I asked a wrong question...:-)  But please don't give up.
> > 
> > Regards,
> > --
> > Hidetoshi
> > 
> > >> Regards,
> > >> --
> > >> Hidetoshi
> > >>
> > >>> Regards,
> > >>> Ahmad
> > >>>  
> > >>>
> > >>>> -----Original Message-----
> > >>>> From: mipshop-bounces@ietf.org
> > >>>> [mailto:mipshop-bounces@ietf.org] On Behalf Of Muhanna, Ahmad
> > >>>> (RICH1:2H10)
> > >>>> Sent: Thursday, September 17, 2009 9:23 PM
> > >>>> To: Hidetoshi Yokota
> > >>>> Cc: Mipshop; draft-ietf-mipshop-pfmipv6@tools.ietf.org
> > >>>> Subject: Re: [Mipshop] AD review of draft-ietf-mipshop-pfmipv6
> > >>>>
> > >>>> Hi Hidetoshi,
> > >>>> Please see inline.
> > >>>>
> > >>>> Regards,
> > >>>> Ahmad
> > >>>>
> > >>>>> -----Original Message-----
> > >>>>> From: Hidetoshi Yokota [mailto:yokota@kddilabs.jp]
> > >>>>> Sent: Thursday, September 17, 2009 4:48 PM
> > >>>>> To: Muhanna, Ahmad (RICH1:2H10)
> > >>>>> Cc: Mipshop; draft-ietf-mipshop-pfmipv6@tools.ietf.org;
> > Jari Arkko
> > >>>>> Subject: Re: [Mipshop] AD review of draft-ietf-mipshop-pfmipv6
> > >>>>>
> > >>>>> Hi Ahmad,
> > >>>>>
> > >>>>> Here is the proposed revision:
> > >>>>>
> > >>>>> In Section 4.2:
> > >>>>>       [... message with the same sequence number.] 
> The necessary
> > >>>>>    information MUST be transferred in the HI/HAck messages to
> > >>>>>    distinguish MN's packets for forwarding in advance or at
> > >>>> this time.
> > >>>>>    Such information includes the MN ID and/or GRE key(s).  
> > >>>> Typically,
> > >>>>>    the NMAG selects the GRE key for the downlink packets
> > >>>> and the PMAG
> > >>>>>    selects that for the uplink packets.  Each key is
> > conveyed in
> > >>>>> either
> > >>>>>    the HI or HAck message separately when GRE Key Option
> > >> [GREKEY] is
> > >>>>>    used. [For the downlink ...]
> > >>>>>
> > >>>> [Ahmad]
> > >>>> In addition to what Vijay mentioned with respect to
> > >> Typically (which
> > >>>> should be removed), I believe the draft needs to be 
> clear on the 
> > >>>> mechanism that is used for exchanging the GRE keys. 
> When you say 
> > >>>> "...when the GRE Key Option [GREKEY] is used." What
> > happens if the
> > >>>> GRE key option is NOT used. Is there another mechanism?
> > >>>>
> > >>>> Since the GRE keys are necessary to establish the lateral
> > >> tunnel and
> > >>>> identify the MN traffic, the draft must specify a default
> > >> mechanism.
> > >>>> Other mechanisms can be used or specified some where else
> > >> if needed,
> > >>>> but we need a default one here. Right?
> > >>>>
> > >>>> Also, you replaced the **HoA of the MN** with the **MN ID**. 
> > >>>> What is the reason for this change?
> > >>>> And how this should work NOW while you have ".. and/or 
> GRE Keys"?
> > >>>>
> > >>>>> If the above description is acceptable, I will submit
> > the revised
> > >>>>> version by the end of the week.
> > >>>>>
> > >>>>> Regards,
> > >>>>> --
> > >>>>> Hidetoshi
> > >>>>>
> > >>>>> Ahmad Muhanna wrote:
> > >>>>>> Hi Hidetoshi,
> > >>>>>>
> > >>>>>>> -----Original Message-----
> > >>>>>>> From: Hidetoshi Yokota [mailto:yokota@kddilabs.jp]
> > >>>>>>> Sent: Monday, September 14, 2009 7:37 AM
> > >>>>>>> To: Muhanna, Ahmad (RICH1:2H10)
> > >>>>>>> Cc: Mipshop; draft-ietf-mipshop-pfmipv6@tools.ietf.org;
> > >>>> Jari Arkko
> > >>>>>>> Subject: Re: [Mipshop] AD review of 
> draft-ietf-mipshop-pfmipv6
> > >>>>>>>
> > >>>>>>> Hi Ahmad,
> > >>>>>>>
> > >>>>>>> Thanks for your comment. I'm glad to hear an opinion from
> > >>>>> a GRE key
> > >>>>>>> expert. Please see inline:
> > >>>>>>>
> > >>>>>>> Ahmad Muhanna wrote:
> > >>>>>>>> Hi Hidetoshi,
> > >>>>>>>>
> > >>>>>>>> I just have one quick comment and question.
> > >>>>>>>>
> > >>>>>>>> Reading the draft, it seems to me that the GRE keys are
> > >>>>>>> somehow sent
> > >>>>>>>> from the NAR to PAR in the HI (section 4.2). Is that the
> > >>>>> case? This
> > >>>>>>>> means both the DL and UP GRE keys for the bilateral
> > >>>>> tunnels between
> > >>>>>>>> the two AR(s). Is my understanding correct? It also
> > >>>>>>> mentions that the
> > >>>>>>>> format
> > >>>>>>> In terms of the GRE keys for the bilateral tunnel,
> > the working
> > >>>>>>> assumption is that the DL key is selected by the NAR and
> > >>>>> the UL key
> > >>>>>>> is selected by the PAR. Depending on the fast handover
> > >>>> mode, those
> > >>>>>>> keys are transferred to the other MAG via either the
> > HI or Hack.
> > >>>>>>>
> > >>>>>>>> of these keys are based on the GRE keys for PMIPv6
> > >>>> draft (section
> > >>>>>>>> 6.2.6).
> > >>>>>>> Correct.
> > >>>>>>>
> > >>>>>>>> It seems to me that there should be more text to define
> > >>>>> which keys
> > >>>>>>>> exchange in the HI and which in the HaCK
> > >>>>>>> If the above assumption works, I would like to add more
> > >>>> text along
> > >>>>>>> that line.
> > >>>>>> [Ahmad]
> > >>>>>> That is great. Please add some clarification text to
> > >>>>> clearly indicate
> > >>>>>> that only one key in the HI and the other in the HACK.
> > >>>>>> Since some specification in 3GPP2 depends on this draft, I
> > >>>>> appreciate
> > >>>>>> if you can publish an updated version before the end of
> > >> the week. 
> > >>>>>> Thanks in advance!
> > >>>>>>
> > >>>>>>>> If both keys are exchanged in the same HI, How these
> > keys are
> > >>>>>>>> identified at the pAR?
> > >>>>>>>> In GRE keys for PMIPv6 draft, downlink GRE key is included
> > >>>>>>> in the PBU
> > >>>>>>>> and the uplink GRE key in included in the PBA. They never
> > >>>>>>> exist in the
> > >>>>>>>> same message and that way there is no confusing.
> > >>>>>>> So far, each key is conveyed by either the HI or HAck. 
> > >>>>>>> However, I haven't explored all of the possibilities. 
> > >> If you can
> > >>>>>>> think of any case that two keys must be conveyed in one
> > >> message,
> > >>>>>>> please let me know.
> > >>>>>> [Ahmad]
> > >>>>>> I do not see any reason for this case (one key per
> > >>>> message) not to
> > >>>>>> work for all implementation.
> > >>>>>>  
> > >>>>>>>> In addition, DL and UP GRE keys are generated by NAR and
> > >>>>>>> sent inside
> > >>>>>>>> the HI, my question: Is there any specific reason for
> > >>>> the NAR to
> > >>>>>>>> specify both GRE keys for the bilateral tunnels?
> > >>>>>>> It would be more problematic that the NAR determines the
> > >>>> both keys
> > >>>>>>> and I would rather like to avoid it.
> > >>>>>>>
> > >>>>>>>> Sorry for this comment to be so late but hope that you have
> > >>>>>>> the chance
> > >>>>>>>> to take a look at it.
> > >>>>>>> That's ok. The draft is under the review process. Your
> > >>>> comment is
> > >>>>>>> highly appreciated.
> > >>>>>>>
> > >>>>>>> Regards,
> > >>>>>>> --
> > >>>>>>> Hidetoshi
> > >>>>>>>
> > >>>>>>>
> > >>>>>>>> Thanks!
> > >>>>>>>>
> > >>>>>>>> Regards,
> > >>>>>>>> Ahmad
> > >>>>>>>>  
> > >>>>>>>>
> > >>>>>>>>> -----Original Message-----
> > >>>>>>>>> From: mipshop-bounces@ietf.org 
> > >>>>>>>>> [mailto:mipshop-bounces@ietf.org] On Behalf Of
> > >> Hidetoshi Yokota
> > >>>>>>>>> Sent: Wednesday, September 02, 2009 11:12 PM
> > >>>>>>>>> To: Jari Arkko
> > >>>>>>>>> Cc: Mipshop; draft-ietf-mipshop-pfmipv6@tools.ietf.org
> > >>>>>>>>> Subject: Re: [Mipshop] AD review of
> > draft-ietf-mipshop-pfmipv6
> > >>>>>>>>>
> > >>>>>>>>> Hi Jari,
> > >>>>>>>>>
> > >>>>>>>>> Thanks for your patience. The attached revised document is
> > >>>>>>> supposed to
> > >>>>>>>>> reflect the rest of your comments. Please also see inline,
> > >>>>>>> where the
> > >>>>>>>>> revised part is explained item by item. If there is no
> > >>>>> outstanding
> > >>>>>>>>> issue there, we will upload it shortly.
> > >>>>>>>>>
> > >>>>>>>>> [Apologize if you received it twice. Since the size just
> > >>>>>>> exceeded the
> > >>>>>>>>> limit of this ML, this mail is reposted without the
> > >>>> attachment.]
> > >>>>>>>>> Hidetoshi Yokota wrote:
> > >>>>>>>>>> Hi Jari,
> > >>>>>>>>>>
> > >>>>>>>>>> Appreciate your detailed review. The editorial 
> corrections
> > >>>>>>>>> are mostly
> > >>>>>>>>>> done and the revised version is attached to this mail. 
> > >>>>>>> Regarding the
> > >>>>>>>>>> technical comments, only the policies for the correction
> > >>>>>>>>> are listed for
> > >>>>>>>>>> now. The complete correction will be posted as soon as
> > >>>>>>>>> possible. Please
> > >>>>>>>>>> see inline for the responses to your questions and
> > comments:
> > >>>>>>>>>>
> > >>>>>>>>>> Jari Arkko wrote:
> > >>>>>>>>>>> I have reviewed this document. It was generally in good
> > >>>>>>>>> shape and easy
> > >>>>>>>>>>> to read. I did find a number of issues though. Please
> > >>>>>>>>> discuss them with
> > >>>>>>>>>>> me on this thread and/or revise the draft accordingly.
> > >>>>>>>>>>>
> > >>>>>>>>>>> Technical:
> > >>>>>>>>>>>
> > >>>>>>>>>>> I do not understand the IP host aspects of the
> > >>>>> handover. For an
> > >>>>>>>>>>> unmodified host, what kind of interfaces exist on the
> > >>>>> host, what
> > >>>>>>>>>>> addresses they have, and at what time are interfaces
> > >>>>>>>>> removed or added? 
> > >>>>>>>>>>> Is this exactly the same as in RFC 5213, or does PFMIPv6
> > >>>>>>>>> introduce some
> > >>>>>>>>>>> change here?
> > >>>>>>>>>> The basic principle would be that this specification does
> > >>>>>>>>> not require
> > >>>>>>>>>> any additional IP-level function to the MN running in the
> > >>>>>>>>> PMIPv6 domain.
> > >>>>>>>>>> This MN should therefore be the same as defined 
> in RFC5213.
> > >>>>>>>>>>
> > >>>>>>>>>> A typical network interface would be one with the
> > >>>>>>> cellular network,
> > >>>>>>>>>> where the network basically controls the movement of the
> > >>>>>>>>> MN. Different
> > >>>>>>>>>> types of interfaces could be involved such as different
> > >>>>>>>>> generations (3G
> > >>>>>>>>>> and 3.9G) or different radio access systems. Any type of
> > >>>>>>> IP address
> > >>>>>>>>>> could be assigned (IPv4/v6 or global/private), but the
> > >>>>>>>>> assigned address
> > >>>>>>>>>> must be preserved before and after the handover. PFMIPv6
> > >>>>>>>>> should be able
> > >>>>>>>>>> to handle the single radio situation, where only one
> > >>>>>>>>> interface is active
> > >>>>>>>>>> at any given time. This is a tougher situation 
> in terms of
> > >>>>>>>>> packet loss
> > >>>>>>>>>> and delay.
> > >>>>>>>>>>
> > >>>>>>>>>>> I would like to see a new section on manageability
> > >>>>>>>>> considerations. For
> > >>>>>>>>>>> instance, Section 5 talks about some
> > configuration issues. 
> > >>>>>>>>> These should
> > >>>>>>>>>>> be mentioned, and there should be a description of what
> > >>>>>>>>> the operator
> > >>>>>>>>>>> needs to configure in order to set up a PFMIPv6 network.
> > >>>>>>>>>> We will add a new section for manageability 
> considerations
> > >>>>>>>>> to clarify
> > >>>>>>>>>> the above and to reflect your suggestion.
> > >>>>>>>>> A new subsection is added in Section 5 describing the
> > >>>>>>> above aspects:
> > >>>>>>>>> -------------------
> > >>>>>>>>> 5.  PMIPv6-related Fast Handover Issues
> > >>>>>>>>>
> > >>>>>>>>> 5.1.  Manageability Considerations
> > >>>>>>>>>
> > >>>>>>>>>    This specification does not require any
> > additional IP-level
> > >>>>>>>>>    functionality on the LMA and the MN running in
> > the PMIPv6
> > >>>>>>>>> domain.  A
> > >>>>>>>>>    typical network interface that the MN could be
> > >>>>> assumed to have
> > >>>>>>>>> is one
> > >>>>>>>>>    with the cellular network, where the network
> > controls the
> > >>>>>>>>> movement of
> > >>>>>>>>>    the MN.  Different types of interfaces could be
> > >>>>> involved such as
> > >>>>>>>>>    different generations (3G and 3.9G) or different
> > >>>> radio access
> > >>>>>>>>>    systems.  This specification supports a MN with the
> > >>>>> single radio
> > >>>>>>>>>    mode, where only one interface is active at any given
> > >>>>> time.  The
> > >>>>>>>>>    assigned IP address is preserved whether the physical
> > >>>>> interface
> > >>>>>>>>>    changes or not and the MN can identify which
> > >>>>> interface should be
> > >>>>>>>>> used
> > >>>>>>>>>    if there are multiple ones.
> > >>>>>>>>> --------------------
> > >>>>>>>>>
> > >>>>>>>>>
> > >>>>>>>>>>>> If the new router's interface is configured to
> > respond to
> > >>>>>>>>>>>> queries sent to link-layer addresses than its
> > >>>>>>>>> own (e.g.,
> > >>>>>>>>>>>> set to promiscuous mode), then it can respond to the
> > >>>>> NUD probe,
> > >>>>>>>>>>>> providing its link-layer address in the
> > solicited Neighbor
> > >>>>>>>>>>>> Advertisement.
> > >>>>>>>>>>> Is this according to RFC 5213? I seem to recall that RFC
> > >>>>>>>>> 5213 operated
> > >>>>>>>>>>> on the same link layer addresses.
> > >>>>>>>>>> I think your observation is correct... I'll 
> check with the
> > >>>>>>>>> other authors
> > >>>>>>>>>> to see if it is ok to rewrite it.
> > >>>>>>>>> The new text doesn't mention the promiscuous mode and
> > >>>>>>> emphasizes the
> > >>>>>>>>> common link-layer address among all MAGs in the
> > PMIPv6 domain:
> > >>>>>>>>>
> > >>>>>>>>> ---------------
> > >>>>>>>>> 5.2.  Expedited Packet Transmission
> > >>>>>>>>>
> > >>>>>>>>>    [...]
> > >>>>>>>>>
> > >>>>>>>>>    The protocol specified in this document is applicable
> > >>>>>>> regardless of
> > >>>>>>>>>    whether link-layer addresses are used between a MN and
> > >>>>>>> its access
> > >>>>>>>>>    router.  A MN should be able to continue sending
> > >>>>> packets on the
> > >>>>>>>>>    uplink even when it changes link.  When link-layer
> > >>>>> addresses are
> > >>>>>>>>>    used, the MN performs Neighbor Unreachability
> > >>>> Detection (NUD)
> > >>>>>>>>>    [RFC4861], after attaching to a new link, probing the 
> > >>>>>>>>> reachability of
> > >>>>>>>>>    its default router.  The new router should respond
> > >>>> to the NUD
> > >>>>>>>>> probe,
> > >>>>>>>>>    providing its link-layer address in the
> > solicited Neighbor
> > >>>>>>>>>    Advertisement, which is common in the PMIPv6 domain.  
> > >>>>>>>>> Implementations
> > >>>>>>>>>    should allow the MN to continue to send uplink packets
> > >>>>>>> while it is
> > >>>>>>>>>    performing NUD.
> > >>>>>>>>> ----------------
> > >>>>>>>>>
> > >>>>>>>>>>>> At least one mobility option MUST uniquely identify
> > >>>>> the target
> > >>>>>>>>>>>> MN (e.g., the Mobile Node
> > >>>>>>> Identifier
> > >>>>>>>>>>>> Option defined in RFC4283
> > >>>>>>>>> <http://tools.ietf.org/html/rfc4283>) and
> > >>>>>>>>>>>> the transferred context MUST be for one MN per message.
> > >>>>>>>>>>>>   
> > >>>>>>>>>>> I would like the required options to be 
> specified in more
> > >>>>>>>>> detail. Which
> > >>>>>>>>>>> identity options are sufficient to satisfy the MUST?
> > >>>>>>>>>> The required option should be the MN Identifier in the
> > >>>>> Mobile Node
> > >>>>>>>>>> Identifier Option.
> > >>>>>>>>> The above description is added in Section 6.1.1:
> > >>>>>>>>>
> > >>>>>>>>> ---------
> > >>>>>>>>>    Requested option
> > >>>>>>>>>              In order to uniquely identify the target
> > >>>> MN, the MN
> > >>>>>>>>>              Identifier MUST be contained in the
> > Mobile Node
> > >>>>>>>>> Identifier
> > >>>>>>>>>              Option.
> > >>>>>>>>> ---------
> > >>>>>>>>>
> > >>>>>>>>>>>> If a default set of context information is defined
> > >>>> and always
> > >>>>>>>>>>>> sufficient, this option is not mandatory.  This
> > >>>>>>>>> option is more
> > >>>>>>>>>>>> useful to retrieve additional or dynamically
> > >>>> selected context
> > >>>>>>>>>>>> information.
> > >>>>>>>>>>>>
> > >>>>>>>>>>>> Context Request Option is typically used for the
> > >>>>> reactive (NAR-
> > >>>>>>>>>>>> initiated) fast handover mode to retrieve the context
> > >>>>>>> information
> > >>>>>>>>>>>> from the PAR.  When this option is included in the HI
> > >>>>>>> message, all
> > >>>>>>>>>>>> the requested context information SHOULD be included
> > >>>>> in the HAck
> > >>>>>>>>>>>> message in the corresponding mobility option(s) (e.g.,
> > >>>>>>>>> HNP, LMAA or
> > >>>>>>>>>>>> MN-IID mobility options).
> > >>>>>>>>>>>>   
> > >>>>>>>>>>> Please specify what the default set of context
> > >>>>>>> information is, by
> > >>>>>>>>>>> listing the required options when the CRO is 
> not present.
> > >>>>>>>>>> The default context information to request is the Home
> > >>>>>>>>> Network Prefix
> > >>>>>>>>>> Option. If the Mobile Node link-layer is available and
> > >>>>>>>>> used, the Mobile
> > >>>>>>>>>> Node Link-layer Identifier Option MUST also be 
> requested. 
> > >>>>>>>>> With these two
> > >>>>>>>>>> options and the MN identifier, the NMAG can
> > >> construct the PBU.
> > >>>>>>>>> The above description is added in Section 6.2.1:
> > >>>>>>>>>
> > >>>>>>>>> ----------
> > >>>>>>>>>    The default context information to request is the
> > >>>>> Home Network
> > >>>>>>>>> Prefix
> > >>>>>>>>>    Option.  If the Mobile Node link-layer is available and
> > >>>>>>> used, the
> > >>>>>>>>>    Mobile Node Link-layer Identifier Option MUST also be
> > >>>>> requested.
> > >>>>>>>>> ----------
> > >>>>>>>>>
> > >>>>>>>>>>> Editorial:
> > >>>>>>>>>>>
> > >>>>>>>>>>>>    HO-Initiate:
> > >>>>>>>>>>>>         A generic signaling message, sent from the P-AN
> > >>>>>>>>> to the PMAG that
> > >>>>>>>>>>>>         indicates a MN handover.  While this 
> signaling is
> > >>>>>>>>> dependent on
> > >>>>>>>>>>>>         the access technology, it is assumed that
> > >>>>>>>>> HO-Initiate can carry
> > >>>>>>>>>>>>         the information to identify the MN and to
> > >>>>>>> assist the PMAG
> > >>>>>>>>>>>>         resolve the NMAG and the new access 
> point or the
> > >>>>>>>>> base station to
> > >>>>>>>>>>>>         which the MN is moving to.  The details of this
> > >>>>>>>>> message are
> > >>>>>>>>>>>>         outside the scope of this document.
> > >>>>>>>>>>>>
> > >>>>>>>>>>>> 4. Proxy-based FMIPv6 Protocol Overview
> > >>>>>>>>>>> Section 4 would probably benefit from an additional
> > >>>>>>>>> paragraph at the
> > >>>>>>>>>>> beginning to explain what assumptions there exist about
> > >>>>>>>>> lower layer
> > >>>>>>>>>>> functionality.
> > >>>>>>>>>> Yes, the predictive fast handover relies on the
> > lower layer
> > >>>>>>>>>> functionality to trigger to send the HI. A new paragraph
> > >>>>>>>>> will be added
> > >>>>>>>>>> to clarify it.
> > >>>>>>>>> -------------
> > >>>>>>>>> 4.  Proxy-based FMIPv6 Protocol Overview
> > >>>>>>>>>
> > >>>>>>>>>    If the MAGs can be informed of the detachment and/or
> > >>>>>>> attachment of
> > >>>>>>>>>    the MN in a timely manner via e.g. the lower layer
> > >>>>> signaling, it
> > >>>>>>>>> will
> > >>>>>>>>>    become possible to optimize the handover procedure,
> > >>>>>>> which involves
> > >>>>>>>>>    establishing a connection on the new link and
> > >>>>> signaling between
> > >>>>>>>>>    mobility agents, compared to the baseline specification
> > >>>>>>> of PMIPv6.
> > >>>>>>>>>   [...]
> > >>>>>>>>> -------------
> > >>>>>>>>>
> > >>>>>>>>> All the other corrections pointed out below have 
> also been 
> > >>>>>>>>> reflected in the revised document.
> > >>>>>>>>>
> > >>>>>>>>> Regards,
> > >>>>>>>>> --
> > >>>>>>>>> Hidetoshi
> > >>>>>>>>>
> > >>>>>>>>>>>> A new flag 'P' is defined for the HI and HAck
> > messages to
> > >>>>>>>>>>>> distinguish from those in [RFC5268bis
> > >>>>>>>>>>>>
> > >>>>>>>>> 
> > <http://tools.ietf.org/html/draft-ietf-mipshop-pfmipv6-08#ref-
> > >>>>>>>>> RFC5268bis>]
> > >>>>>>>>>>>> and thus MUST
> > >>>>>>>>>>>> be set in the entire document.
> > >>>>>>>>>>>>   
> > >>>>>>>>>>> This would be more readable as " ... those in
> > >>>>>>>>> [RFC5268bis]. This flag
> > >>>>>>>>>>> MUST be ..."
> > >>>>>>>>>> Revised.
> > >>>>>>>>>>
> > >>>>>>>>>>>>    and the NAR creates a proxy NCE to receive those
> > >>>>>>>>> packets for the NCoA
> > >>>>>>>>>>> The term NCE has not been introduced at this stage yet.
> > >>>>>>>>>> Spelled out as "Neighbor Cache Entry".
> > >>>>>>>>>>
> > >>>>>>>>>>>>    address that is used by the MN is MN-HoA.  Hence the
> > >>>>>>>>> PAR forwards
> > >>>>>>>>>>> The term MN-HOA has not been introduced before.
> > >>>>>>>>>> Added the unabbreviated form "Mobile Node's Home 
> Address" 
> > >>>>>>> before it.
> > >>>>>>>>>>>>         The access network to which the MN is attached
> > >>>>>>>>> after handover.
> > >>>>>>>>>>> New term MN, not introduced before.
> > >>>>>>>>>>>
> > >>>>>>>>>> Added "Mobile Node" before it.
> > >>>>>>>>>>
> > >>>>>>>>>>>> specifies forwarding when the MN uses HoA as its
> > >>>>> on-link address
> > >>>>>>>>>>> New term HoA...
> > >>>>>>>>>> Changed to "Home Address".
> > >>>>>>>>>>
> > >>>>>>>>>>>>    as MN's NAI, Home Network Prefix (HNP), IPv4 Home
> > >>>>>>> Address, are
> > >>>>>>>>>>> New term NAI...
> > >>>>>>>>>> Added "Network Access Identifier" before it.
> > >>>>>>>>>>
> > >>>>>>>>>>>>         flag set and include the MN ID, the MN-HNP, the
> > >>>>>>>>> MN-IID and the
> > >>>>>>>>>>> New terms MN-HNP and MN-IID (or at least they do not
> > >>>>>>>>> appear in their
> > >>>>>>>>>>> MN-XXX form before this point).
> > >>>>>>>>>> Modified "MN-HNP" to "HNP" for consistency.
> > >>>>>>>>>>
> > >>>>>>>>>>>>         Inner destination address: HNP or IPv4-MN-HoA
> > >>>>>>>>>>> IPv4-MN-HoA not defined earlier...
> > >>>>>>>>>> Added "Mobile Node's IPv4 Home" before it.
> > >>>>>>>>>>
> > >>>>>>>>>>>>    between the PCoA and NCoA to forward packets for the
> > >>>>>>>>> MN to the NAR,
> > >>>>>>>>>>> New terms PCoA and NCoA... there's probably 
> more undefined
> > >>>>>>>>> terms in the
> > >>>>>>>>>>> document, please check!
> > >>>>>>>>>> Added "Previous Care-of Address" and "New Care-of
> > Address". 
> > >>>>>>>>> Will read
> > >>>>>>>>>> through it to see if there is any other 
> undefined acronym.
> > >>>>>>>>>>
> > >>>>>>>>>>>>    In (i),
> > >>>>>>>>>>> In Step (i),
> > >>>>>>>>>> Revised including other parts.
> > >>>>>>>>>>
> > >>>>>>>>>>>>           |(MN ID, Old AP ID) |     (MN ID, Old 
> > AP ID)    
> > >>>>>>>>>  |        |
> > >>>>>>>>>>> Old AP ID? AN ID? AR ID?
> > >>>>>>>>>> AP ID stands for "Access Point Identifier", which is
> > >>>>>>>>> defined in RFC5568.
> > >>>>>>>>>> Added the unabbreviated form and citation.
> > >>>>>>>>>>
> > >>>>>>>>>> The rest of the part will be revised soon.
> > >>>>>>>>>>
> > >>>>>>>>>> Regards,
> > >>>>>>>>>>
> > >>>>>>>>>>
> > >>>>>>>>>>
> > >>>>>>>>> 
> > --------------------------------------------------------------
> > >>>>>>>>> ----------
> > >>>>>>>>>> _______________________________________________
> > >>>>>>>>>> Mipshop mailing list
> > >>>>>>>>>> Mipshop@ietf.org
> > >>>>>>>>>> https://www.ietf.org/mailman/listinfo/mipshop
> > >>>>>>>>> _______________________________________________
> > >>>>>>>>> Mipshop mailing list
> > >>>>>>>>> Mipshop@ietf.org
> > >>>>>>>>> https://www.ietf.org/mailman/listinfo/mipshop
> > >>>>>>>>>
> > >>>>>>
> > >>>>> --
> > >>>>> Hidetoshi Yokota
> > >>>>>
> > >>>>> Mobile Network Lab
> > >>>>> KDDI R&D Laboratories, Inc.
> > >>>>> e-mail:yokota@kddilabs.jp
> > >>>>>
> > >>>>>
> > >>>> _______________________________________________
> > >>>> Mipshop mailing list
> > >>>> Mipshop@ietf.org
> > >>>> https://www.ietf.org/mailman/listinfo/mipshop
> > >>>>
> > >>>
> > >>>
> > >>
> > > 
> > > 
> > > 
> > 
> > 
> _______________________________________________
> Mipshop mailing list
> Mipshop@ietf.org
> https://www.ietf.org/mailman/listinfo/mipshop
>