Re: [Mipshop] AD review of draft-ietf-mipshop-pfmipv6

"Ahmad Muhanna" <amuhanna@nortel.com> Thu, 24 September 2009 16:10 UTC

Return-Path: <AMUHANNA@nortel.com>
X-Original-To: mipshop@core3.amsl.com
Delivered-To: mipshop@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 4E0B23A691C for <mipshop@core3.amsl.com>; Thu, 24 Sep 2009 09:10:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.621
X-Spam-Level:
X-Spam-Status: No, score=-6.621 tagged_above=-999 required=5 tests=[AWL=-0.022, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 72QeCWCGaVBw for <mipshop@core3.amsl.com>; Thu, 24 Sep 2009 09:10:39 -0700 (PDT)
Received: from zrtps0kp.nortel.com (zrtps0kp.nortel.com [47.140.192.56]) by core3.amsl.com (Postfix) with ESMTP id 295D73A67EF for <mipshop@ietf.org>; Thu, 24 Sep 2009 09:10:39 -0700 (PDT)
Received: from zrc2hxm0.corp.nortel.com (zrc2hxm0.corp.nortel.com [47.103.123.71]) by zrtps0kp.nortel.com (Switch-2.2.6/Switch-2.2.0) with ESMTP id n8OGBeS01517; Thu, 24 Sep 2009 16:11:40 GMT
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
Date: Thu, 24 Sep 2009 11:10:58 -0500
Message-ID: <C5A96676FCD00745B64AE42D5FCC9B6E205D8FBB@zrc2hxm0.corp.nortel.com>
In-Reply-To: <00b701ca3d30$442ced40$3e0c7c0a@china.huawei.com>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: [Mipshop] AD review of draft-ietf-mipshop-pfmipv6
Thread-Index: Aco9MEdik1RdaW55TOWLQzV2Wo0tdgAACVJQ
References: <4A93F739.5050006@piuha.net> <4A97EEAB.9070606@kddilabs.jp> <4A9F4222.8070107@kddilabs.jp> <C5A96676FCD00745B64AE42D5FCC9B6E2025022D@zrc2hxm0.corp.nortel.com> <4AAE38F6.2010600@kddilabs.jp> <C5A96676FCD00745B64AE42D5FCC9B6E2038AF1D@zrc2hxm0.corp.nortel.com> <4AB2AE87.6030801@kddilabs.jp> <C5A96676FCD00745B64AE42D5FCC9B6E204B8C6F@zrc2hxm0.corp.nortel.com> <C5A96676FCD00745B64AE42D5FCC9B6E2050008C@zrc2hxm0.corp.nortel.com> <4AB8CF19.70905@kddilabs.jp> <C5A96676FCD00745B64AE42D5FCC9B6E20597C0A@zrc2hxm0.corp.nortel.com> <4D35478224365146822AE9E3AD4A26660C18B2AC$0001@exchtewks3.starentnetworks.com> <4ABB2DC8.4050906@kddilabs.jp> <001f01ca3d21$da22f6a0$3e0c7c0a@china.huawei.com> <C5A96676FCD00745B64AE42D5FCC9B6E205D8D28@zrc2hxm0.corp.nortel.com> <009001ca3d2e$d9d0a500$3e0c7c0a@china.huawei.com> <C5A96676FCD00745B64AE42D5FCC9B6E205D8F4F@zrc2hxm0.corp.nortel.com> <00b701ca3d30$442ced40$3e0c7c0a@china.huawei.com>
From: Ahmad Muhanna <amuhanna@nortel.com>
To: Frank Xia <xiayangsong@huawei.com>, Hidetoshi Yokota <yokota@kddilabs.jp>
Cc: Mipshop <mipshop@ietf.org>, draft-ietf-mipshop-pfmipv6@tools.ietf.org
Subject: Re: [Mipshop] AD review of draft-ietf-mipshop-pfmipv6
X-BeenThere: mipshop@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: <mipshop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/mipshop>, <mailto:mipshop-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/mipshop>
List-Post: <mailto:mipshop@ietf.org>
List-Help: <mailto:mipshop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mipshop>, <mailto:mipshop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 24 Sep 2009 16:10:43 -0000

> -----Original Message-----
> From: Frank Xia [mailto:xiayangsong@huawei.com] 
> Subject: Re: [Mipshop] AD review of draft-ietf-mipshop-pfmipv6
> 
> Hi Ahmad
> 
> Sorry not studying every words from you, even though I have 
> followed the thread.
> 
> If  I can bother you give me some different brief information 
> other than Hidetoshi's summary, you are appreciated.
> 
> Let's try to be more constructive.
[Ahmad]
That's fine, but it is not healthy to repeat the whole thing over again.
Sorry, if you are interested you should go back and read the whole
thing.

Regards,
Ahmad
> 
> BR
> Frank
> 
> ----- Original Message -----
> From: "Ahmad Muhanna" <amuhanna@nortel.com>
> To: "Frank Xia" <xiayangsong@huawei.com>; "Hidetoshi Yokota" 
> <yokota@kddilabs.jp>
> Cc: "Mipshop" <mipshop@ietf.org>;
> <draft-ietf-mipshop-pfmipv6@tools.ietf.org>
> Sent: Thursday, September 24, 2009 10:53 AM
> Subject: RE: [Mipshop] AD review of draft-ietf-mipshop-pfmipv6
> 
> 
> Hi Frank,
> It is confusing..
> You just said in your earlier email that you have been 
> following the discussion! :) Probably the best way for you is 
> to go and look it over.
> 
> Regards,
> Ahmad
> 
> 
> > -----Original Message-----
> > From: Frank Xia [mailto:xiayangsong@huawei.com]
> > Sent: Thursday, September 24, 2009 8:51 AM
> > To: Muhanna, Ahmad (RICH1:2H10); Hidetoshi Yokota
> > Cc: Mipshop; draft-ietf-mipshop-pfmipv6@tools.ietf.org
> > Subject: Re: [Mipshop] AD review of draft-ietf-mipshop-pfmipv6
> >
> > Hi Ahmad
> >
> > I thought Hidetoshi had a good summary of you comments.
> > Could you give me a brief information of your concerns?
> > because I have similar understanding as Hidetoshi.
> >
> > BR
> > Frank
> >
> > ----- Original Message -----
> > From: "Ahmad Muhanna" <amuhanna@nortel.com>
> > To: "Frank Xia" <xiayangsong@huawei.com>; "Hidetoshi Yokota"
> > <yokota@kddilabs.jp>
> > Cc: "Mipshop" <mipshop@ietf.org>;
> > <draft-ietf-mipshop-pfmipv6@tools.ietf.org>
> > Sent: Thursday, September 24, 2009 9:31 AM
> > Subject: RE: [Mipshop] AD review of draft-ietf-mipshop-pfmipv6
> >
> >
> > Hi Frank,
> > Please see my latest response to Hidetoshi.
> >
> > Regards,
> > Ahmad
> >
> >
> > > -----Original Message-----
> > > From: Frank Xia [mailto:xiayangsong@huawei.com]
> > > Sent: Thursday, September 24, 2009 7:18 AM
> > > To: Hidetoshi Yokota; Koodli, Rajeev; Muhanna, Ahmad (RICH1:2H10)
> > > Cc: Mipshop; draft-ietf-mipshop-pfmipv6@tools.ietf.org
> > > Subject: Re: [Mipshop] AD review of draft-ietf-mipshop-pfmipv6
> > >
> > > Hi  Ahmad, Hidetoshi, and Rajeev
> > >
> > > I have followed the discussion, and agreed with Rajeev's proposal.
> > >
> > > BR
> > > Frank
> > >
> > > ----- Original Message -----
> > > From: "Hidetoshi Yokota" <yokota@kddilabs.jp>
> > > To: "Koodli, Rajeev" <rkoodli@starentnetworks.com>
> > > Cc: "Mipshop" <mipshop@ietf.org>;
> > > <draft-ietf-mipshop-pfmipv6@tools.ietf.org>
> > > Sent: Thursday, September 24, 2009 3:28 AM
> > > Subject: Re: [Mipshop] AD review of draft-ietf-mipshop-pfmipv6
> > >
> > >
> > > > Hi Rajeev and Ahmad,
> > > >
> > > > Thanks Rajeev for your input. It seems that all of the
> > > questions and
> > > > ambiguity pointed out by Ahmad lead to one issue: 
> PMIPv6 defines 
> > > > multiple encapsulation methods; therefore the inter-MAG
> > tunnel must
> > > > specify which method should be used. If Rajeev's input is
> > > acceptable.
> > > > I'll come up with some text along that line.
> > > >
> > > > Regards,
> > > > --
> > > > Hidetoshi
> > > >
> > > > Koodli, Rajeev wrote:
> > > >>
> > > >> Hi Ahmad,
> > > >>
> > > >> Let me see if I could understand your concern.
> > > >>
> > > >> RFC 5568 assumes that tunneling is IPv6-in-IPv6 based on
> > RFC 3775.
> > > >> So, it does not need to specify how/which encapsulation
> > > mode is used.
> > > >>
> > > >> PFMIP6, on the other hand, is for PMIP6 which does support
> > > multiple
> > > >> encapsulation modes. Hence, PFMIP6 needs to specify how/which 
> > > >> encapsulation mode is used. Is this right?
> > > >>
> > > >> If so, here is my input. PFMIP6 must state what
> > > encapsulation modes
> > > >> MUST be supported. The encapsulation modes should be
> > configurable.
> > > >> Which particular mode is used is dependent on the particular 
> > > >> deployment. There must be text stating that deployments MUST 
> > > >> configure the encapsulation modes on MAGs to be the same,
> > > and it is
> > > >> recommended to use the same encapsulation modes as in MAG-LMA 
> > > >> communication whenever feasible for operational
> > uniformity. If the
> > > >> deployments fail to configure the encapsulation modes to
> > > be the same
> > > >> across all MAGs, then the protocol will not work correctly.
> > > >>
> > > >> How does this sound?
> > > >>
> > > >> Regards,
> > > >>
> > > >> -Rajeev
> > > >>
> > > >>
> > > >>> -----Original Message-----
> > > >>> From: Ahmad Muhanna [mailto:amuhanna@nortel.com]
> > > >>> Sent: Tuesday, September 22, 2009 10:58 PM
> > > >>> To: Hidetoshi Yokota
> > > >>> Cc: Mipshop; draft-ietf-mipshop-pfmipv6@tools.ietf.org
> > > >>> Subject: RE: [Mipshop] AD review of draft-ietf-mipshop-pfmipv6
> > > >>>
> > > >>> Hi Hidetoshi,
> > > >>>
> > > >>> Thanks for your thoughts on this.
> > > >>> I expected a little more serious ones:), but please see
> > > some more of
> > > >>> the same thoughts inline! :)
> > > >>>
> > > >>> Regards,
> > > >>> Ahmad
> > > >>>> -----Original Message-----
> > > >>>> From: Hidetoshi Yokota [mailto:yokota@kddilabs.jp]
> > > >>>> Sent: Tuesday, September 22, 2009 6:20 AM
> > > >>>> To: Muhanna, Ahmad (RICH1:2H10)
> > > >>>> Cc: Mipshop; draft-ietf-mipshop-pfmipv6@tools.ietf.org
> > > >>>> Subject: Re: [Mipshop] AD review of 
> draft-ietf-mipshop-pfmipv6
> > > >>>>
> > > >>>> Hi Ahmad,
> > > >>>>
> > > >>>> Thanks for your detailed thoughts. Below, we try to
> > answer your
> > > >>>> questions as best we can.
> > > >>>>
> > > >>>> Ahmad Muhanna wrote:
> > > >>>>> Hi Hidetoshi,
> > > >>>>>
> > > >>>>> Looking one more time into the draft I found the
> > > following under
> > > >>>>> section
> > > >>>>> 4.1:
> > > >>>>>
> > > >>>>> "
> > > >>>>>    The encapsulation type for these user packets SHOULD
> > > >>>> follow that used
> > > >>>>>    in the tunnel between the LMA and MAG (IPv6-in-IPv6 as
> > > >>>> specified in
> > > >>>>>    [RFC2473], IPv6-in-IPv4, IPv6-in-IPv4-UDP as specified in
> > > >>>>>    [IPv4PMIPv6], TLV-header UDP tunneling as specified in
> > > >>>> [GREKEY] or
> > > >>>>>    any new method defined in the future).
> > > >>>>> "
> > > >>>> The intention here is that the inter-MAG tunnel should
> > > >>> support all the
> > > >>>> encapsulation types that are mentioned in RFC5213.
> > > >>> [Ahmad]
> > > >>> Well, whatever it is this document supports, it needs
> > to make it
> > > >>> clear and ensure that it works. My question is the
> > > >>> following: Does this document support ONLY IPv6-in-IPv6
> > tunneling
> > > >>> between the MAG and the LMA? or it also supports the 
> different 
> > > >>> tunneling that the document claims to support as quoted above?
> > > >>>
> > > >>> If it only supports IPv6-in-IPv6, this document MUST
> > > document that
> > > >>> clearly. On the other hand, if it supports the above listed 
> > > >>> tunneling protocols, it MUST document how forwarding
> > > these packets
> > > >>> over the inter-MAG tunnel works.
> > > >>>
> > > >>>>> IMO, this is a very broad statement that underestimates its
> > > >>>> content.
> > > >>>>> It is way underspecified how these tunneling protocols will
> > > >>>> be used to
> > > >>>>> successfully map the traffic from the MAG-LMA tunnel to
> > > >>> the MAG-MAG
> > > >>>>> tunnel. In this regard, I have the following questions:
> > > >>>>>
> > > >>>>> 1. Is it documented any where how this mapping would work
> > > >>>> for all of
> > > >>>>> these tunneling/encapsulation mechanisms?
> > > >>>> It seems that the mapping of these flows is rather
> > > implementation
> > > >>>> specific. Is there anything that should be considered in
> > > >>> addition to
> > > >>>> RFC5568?
> > > >>> [Ahmad]
> > > >>> Of course. I guess you need to get out of the mode that this 
> > > >>> document is nothing but few tweaks to make FMIP6 works
> > > for PMIPv6.
> > > >>> In RFC5568, it clearly assumes that protocol is used for fast 
> > > >>> handover when IP Mobility based on MIP6 as described in
> > > RFC3775. In
> > > >>> that sense, only IPv6-in-IPv6 is assumed.
> > > >>>
> > > >>> Again, the above claim of supporting all these tunneling
> > > mechanisms
> > > >>> should either be removed and clearly document that this
> > protocol
> > > >>> works ONLY when the tunneling between the MAG and LMA is
> > > >>> IPv6-in-IPv6 or explain how they will work.....
> > > >>>
> > > >>>>> 2. Is the tunneling mode (between the PMAG and the LMA) 
> > > >>>>> negotiated/communicated between the PMAG-MAGs?
> > > >>>> If the tunneling mode is determined between the LMA and
> > > >>> PMAG, which is
> > > >>>> in the scope of RFC5213, that of the inter-MAG tunnel
> > > should follow
> > > >>>> it.
> > > >>>> It is also assumed that the same type of tunneling
> > will be used
> > > >>>> between the LMA and NMAG.
> > > >>> [Ahmad]
> > > >>> Sure, but your document claim that it supports all of these 
> > > >>> tunneling mechanisms (as per the quoted text from section
> > > >>> 4.1) and at the same time documents nothing about how
> > > these should
> > > >>> work across the inter-MAG tunnel.
> > > >>>
> > > >>>>> 3. If the tunneling between the PMAG-LMA is
> > > >>>> IPv6-in-IPv4-UDP, Does it
> > > >>>>> mean the tunneling between the PMAG-NMAG is also going to
> > > >>>> use the same
> > > >>>>> encapsulation?
> > > >>>> Yes, that is the basic idea.
> > > >>> [Ahmad]
> > > >>> Good. Then How that should work?
> > > >>> Is there anything in your document which specify 
> that? I am all 
> > > >>> ears, just point me to the text.
> > > >>>
> > > >>>>> 4. If the UDP tunneling between the two MAGs is not needed,
> > > >>>> what kind
> > > >>>>> of tunneling will be used between the two MAGs to correctly
> > > >>>> map the MN
> > > >>>>> traffic and successfully deliver it to the MN?
> > > >>>> That mode has not been considered. It will be possible, but
> > > >>> is there
> > > >>>> any reason that a different type of tunneling should be used?
> > > >>> [Ahmad]
> > > >>> I am not suggesting to use a different tunneling
> > > mechanism between
> > > >>> the PMAG and the NMAG; However, You are saying that, e.g., 
> > > >>> IPv6-in-IPv4-UDP is naturally extended over the
> > PMAG-NMAG tunnel
> > > >>> without saying how it should work. That what I was
> > > speculating that
> > > >>> you probably use a specific tunneling, of course, other than
> > > >>> IPv6-in-IPv6 to make it work.
> > > >>>
> > > >>> So, again, if PMAG-NMAG interface does support all these
> > > tunneling
> > > >>> mechanisms, then we need to know how it works? That is all.
> > > >>>
> > > >>>>> 5. Do these tunneling mechanisms include plain GRE
> > > >>>> Encapsulation with
> > > >>>>> GRE keys or only GRE with TLV-header UDP tunneling?
> > > >>>> <draft-ietf-netlmm-grekey-option> supports both modes, so
> > > >>>> PFMIPv6 should also support them.
> > > >>> [Ahmad]
> > > >>> That is a clear answer. Thanks.
> > > >>> Could you please make sure that your document clarify
> > and clearly
> > > >>> document it.
> > > >>>
> > > >>>>> 5.1. If plain GRE encapsulation with keys is used, then the
> > > >>>> document
> > > >>>>> needs to clearly specify if there are two sets of GRE
> > > >>> keys for the
> > > >>>>> same mobility session or only one set? i.e., GRE Keys
> > > between the
> > > >>>>> PMAG-LMA, GRE Keys for PMAG-NMAG or one set is used. It is
> > > >>>> not clear
> > > >>>>> in the current document.
> > > >>>> PFMIPv6 describes only GRE keys for the inter-MAG tunnel
> > > >>> (PMAG-NMAG),
> > > >>>> which I think is clarified in Section 4.2. As far as GRE
> > > >>> Key Option is
> > > >>>> used, it is difficult to transport multiple sets of keys at
> > > >>> one time.
> > > >>> [Ahmad]
> > > >>> Well,
> > > >>> 1. It is not clarified nor clear under section 4.2. but,
> > > could you
> > > >>> please point me to the text you are talking about?
> > > >>> 2. As far as of multiple GRE keys exchange, currently 
> that is a 
> > > >>> limitation of the PMIPv6 protocol. Right? Then, when you need 
> > > >>> multiple GRE keys, how these GRE keys are communicated?
> > > >>> Is that explained in the document?
> > > >>>
> > > >>>>> 5.2. same question as in 4, if there is GRE with
> > TLV-header UDP
> > > >>>>> tunneling between the PMAG and the LMA, Is that needed
> > > >>> between the
> > > >>>>> PMAG-NMAG? If NOT, what encapsulation mechanism is being
> > > >>>> used and how
> > > >>>>> is the mapping works?
> > > >>>> The working assumption is "yes".
> > > >>> [Ahmad]
> > > >>> That is a huge CLAIM that is NOT backed by any technical
> > > data! How
> > > >>> that should work? Can you document that some where in the 
> > > >>> specification? If it is already document, please point
> > me to the
> > > >>> text.
> > > >>>
> > > >>>>> 6. Is the assumption here that the NMAG and the PMAG have
> > > >>> the same
> > > >>>>> transport with the LMA?
> > > >>>> For the sake of simplicity, the answer should be "yes".
> > > >>>> If not, the network between MAGs should provide the
> > transparent
> > > >>>> environment (e.g., by another tunneling).
> > > >>>>
> > > >>>>> 7. with respect to "any new method defined in the future"
> > > >>>> what is the
> > > >>>>> constraints on this statement? It seems to me an
> > > >>>> overstatement of the
> > > >>>>> capabilities of this protocol and an underestimate of
> > > the future
> > > >>>>> tunneling mechanism. May be you need to make sure that the
> > > >>>> wording is
> > > >>>>> correct by having some conditional restrictions.
> > > >>>> The intention here is that if a new tunneling mechanism is
> > > >>> specified
> > > >>>> for  PMIPv6, PFMIPv6 should also support it. If this is too
> > > >>> vague, it
> > > >>>> could be removed.
> > > >>> [Ahmad]
> > > >>> Sure, please remove it. Unless, you propose a dynamic 
> tunneling 
> > > >>> mechanism that is forward compatible and capable to
> > > address future
> > > >>> tunneling between the PMAG and LMA.
> > > >>>
> > > >>>>> In addition,
> > > >>>>> ============
> > > >>>>> IMO and based on a quick review of this draft, I find it
> > > >>> very vague
> > > >>>>> and does not have the details for an Interoperable
> > > >>>> protocol. I believe
> > > >>>>> the draft SHOULD CLEARLY address the following points:
> > > >>>>>
> > > >>>>> Decide whether it needs to specify/support a single 
> tunneling 
> > > >>>>> encapsulation mechanism between the PMAG-NMAG or more
> > than one.
> > > >>>>>
> > > >>>>>
> > > >>>>> SINGLE tunneling and encapsulation mechanism between
> > PMAG-NMAG:
> > > >>>>>
> > ===============================================================
> > > >>>>> 1. This *protocol* needs to specify the exact details
> > > of how this
> > > >>>>> tunneling mechanism is dynamically established to address
> > > >>>> the nature
> > > >>>>> of the problem being address in this *handover optimization
> > > >>>> protocol*.
> > > >>>>
> > > >>>> The nature of the specification and its performance is
> > based on
> > > >>>> RFC5568.
> > > >>> [Ahmad]
> > > >>> That is part of the problem not to be sited here as a
> > supporting
> > > >>> argument!
> > > >>> As I said earlier, RFC5568 assumes that there is always
> > > >>> IPv6-in-IPv6 tunneling between the mobile node and the
> > > home agent.
> > > >>> In the case of
> > > >>> PMIPv6 that assumption is INVALID.
> > > >>>
> > > >>>> Whether the establishment of the tunneling mechanism is
> > > dynamic or
> > > >>>> static is operation-specific.
> > > >>> [Ahmad]
> > > >>> That is NOT true. This document is supposedly offering a fast 
> > > >>> handover mechanism for PMIPv6 which dynamically does
> > > (implicitly or
> > > >>> explicitly) negotiates tunneling between the MAG and
> > the LMA. So,
> > > >>> how a statically configured tunnel between the PMAG and
> > the NMAG
> > > >>> tunnels a mobile node traffics when the mobile node
> > > traffic between
> > > >>> the PMAG and LMA for the same mobile node was dynamically 
> > > >>> negotiated?
> > > >>>
> > > >>>
> > > >>>>> 1.1. for example, if GRE with Keys is being used, then
> > > it MUST be
> > > >>>>> clear how the GRE keys are exchanged between the PMAG-NMGA,
> > > >>>> similar to PMIPv6.
> > > >>>>
> > > >>>> The current text proposal for Section 4.2 tries to 
> clarify it 
> > > >>>> regarding who selects the key and how it is transferred.
> > > >>> [Ahmad]
> > > >>> Hmmm.. Tries to clarify ... I guess we need a clear
> > specification
> > > >>> that documents an Interoperable solution. We can not just
> > > propose a
> > > >>> standard track document that is some what clear in the
> > > mind of some.
> > > >>> Right?
> > > >>>
> > > >>>>> 2. How the chosen PMAG-NMAG tunneling protocol is able to
> > > >>> interwork
> > > >>>>> with all tunneling mechanisms that are currently supported
> > > >>>> by PMIPv6,
> > > >>>>> e.g., IPv6-in-IPv6, IPv6-in-IPv4, IPv6-in-IPv4 UDP, etc.
> > > >>>> between the
> > > >>>>> PMAG-LMA as is being claimed under section 4.2 of 
> this draft.
> > > >>>> Basically, it is supposed that the same tunneling
> > > protocol as that
> > > >>>> between the LMA and MAG is used. The tunneling type
> > > between the LMA
> > > >>>> and MAG should be determined in advance.
> > > >>> [Ahmad]
> > > >>> I guess this answer is more confusing .... One time you
> > said that
> > > >>> the tunnel can be static and can be dynamic. Now, you
> > > just said that
> > > >>> the tunnel should be STATIC? I mean what is it? It needs 
> > > >>> clarification......
> > > >>>
> > > >>>
> > > >>>>> 3. This *protocol* needs to clearly specify how the
> > > >>>> different mobility
> > > >>>>> sessions are being mapped between the PMAG-LMA
> > tunneling to the
> > > >>>>> PMAG-NMAG tunneling? Somewhat similar to 2 above.
> > > >>>> The basic mechanism is the same as in RFC5568.
> > > >>> [Ahmad]
> > > >>> Again, in the case of RFC5568 it is straight forward. Only
> > > >>> IPv6-in-IPv6 is supported as per RFC3775. Not the case
> > for PMIPv6.
> > > >>>
> > > >>>> If a GRE
> > > >>>> tunnel further differentiates the session, the GRE key
> > > will be used.
> > > >>> [Ahmad]
> > > >>> Good. Which GRE Key then?
> > > >>> 1. Is that a statically configured GRE key?
> > > >>> 2. Is it the same set of GRE keys between the PMAG and LMA?
> > > >>> 3. If none of the above, how these GRE keys are generated and 
> > > >>> exchanged between the PMAG and the NMAG?
> > > >>>
> > > >>>>> Multiple Tunneling and encapsulation mechanisms between the
> > > >>>> PMAG-NMAG:
> > > >>>
> > > 
> ====================================================================
> > > >>> ==
> > > >>>>> If the choice as being claimed under section 4.1, is to
> > > >>>> support all of
> > > >>>>> the current tunneling mechanisms between PMAG-LMA on the
> > > >>> PMAG-NMAG
> > > >>>>> interface, then the protocol needs to address the following:
> > > >>>>>
> > > >>>>> 1. Provide a good analysis why that option is the best
> > > >>> option? What
> > > >>>>> are the advantages and the disadvantages?
> > > >>>> I think that is the most workable solution.
> > > >>> {Ahmad]
> > > >>> What do you have to technically back up this statement.
> > > >>> Otherwise, it is just another statement.
> > > >>>
> > > >>>> Since the
> > > >>>> tunneling mechanism selected for the PMIPv6 tunnel is
> > > supported by
> > > >>>> both the PMAG and NMAG, no extra capability is
> > required for the
> > > >>>> inter-MAG tunnel.
> > > >>> [Ahmad]
> > > >>> OK. I am not disputing that the PMAG and the NMAG
> > > supports the same
> > > >>> sets of tunneling mechanisms or not. It is more of which
> > > tunnel to
> > > >>> use for which mobile node session and what parameter is
> > > needed for
> > > >>> this inter-MAG tunnel to correctly tunnel the mobile
> > node traffic
> > > >>> and deliver it to the end of the tunnel in a non 
> ambiguous way.
> > > >>>
> > > >>> For example:
> > > >>> Tunneling Case 1:
> > > >>> =================
> > > >>> 1. PMAG and the LMA negotiates the GRE encapsulation
> > and the GRE
> > > >>> keys using the PBU and PBA for each applicable 
> mobility session.
> > > >>> 2. It is very well understood that both the PMAG and the NMAG 
> > > >>> support GRE tunneling with GRE keys + GRE keys exchange using
> > > >>> PMIPv6 signaling with the LMA.
> > > >>> 3. Now: for the inter-MAG tunnel and for the same
> > > mobility session,
> > > >>> how GRE tunneling and GRE keys are negotiated between the
> > > PMAG and
> > > >>> NMAG? Of course, using HI and HAck, right?
> > > >>> 4. Okay, we need the exact details for this specific case.
> > > >>>
> > > >>> Tunneling Case 2:
> > > >>> =================
> > > >>> 1. Let us assume IPv6-in-IPv4 UDP is used for MN1. Okay 2.
> > > >>> That tunneling is implicitly negotiated between the
> > PMAG and LMA
> > > >>> during the PBU/PBA exchange, right?
> > > >>> 3. How that is negotiated between the PMAG and the NMAG?
> > > We need the
> > > >>> details..
> > > >>>
> > > >>> And so on....
> > > >>>
> > > >>>> Also, I don't see any specific reason to use a special
> > tunneling
> > > >>>> mechanism for the inter-MAG tunnel.
> > > >>> [Ahmad]
> > > >>> Good. This means you would use the same tunneling between
> > > the PMAG
> > > >>> and LMA over inter-MAG tunneling. In this case, we need
> > > the details
> > > >>> for negotiating that tunneling mechanism between the
> > PMAG and the
> > > >>> NMAG.
> > > >>>
> > > >>>>> 2. How this *protocol* dynamically negotiates the tunneling
> > > >>>> mechanism
> > > >>>>> type?
> > > >>>> If the tunneling mechanism between the LMA and MAG is
> > > determined in
> > > >>>> advance, the same mechanism is used for the inter-MAG
> > > >>> tunnel. So, it
> > > >>>> is not on-demand and no negotiation is assumed. If the
> > tunneling
> > > >>>> mechanism between the LMA and MAG is determined on demand,
> > > >>> then that
> > > >>>> is a different story...
> > > >>> [Ahmad]
> > > >>> Well, what do you mean? The tunneling between the PMAG
> > > and the LMA
> > > >>> is NOT on demand?
> > > >>> I believe IPv4 support for PMIPv6 and GRE key for PMIPv6
> > > drafts will
> > > >>> be helpful in answering this question.
> > > >>>
> > > >>>>> 3. How that should work, for example if the tunneling
> > mechanism
> > > >>>>> between the PMAG-LMA is IPv6 in IPv4 UDP, how that
> > > >>>> tunneling will be
> > > >>>>> extended to go over the PMAG-NMAG interface and how it is
> > > >>>> supposed to work.
> > > >>>>
> > > >>>> In this case, both the PMAG and NMAG should be dual-stack
> > > >>> and the IP
> > > >>>> addresses in the IPv4 outer header are those of the PMAG
> > > and NMAG.
> > > >>>> IPv6 inner header should be kept intact.
> > > >>>>
> > > >>> Okay..... Then if the NMAG sends the first packet over
> > > the NMAG-PMAG
> > > >>> tunnel! Which encapsulation mechanism is going to use to
> > > encapsulate
> > > >>> that packet?
> > > >>>
> > > >>> Also, Do you agree that there is a specific reason for
> > > the traffic
> > > >>> between the PMAG and the LMA to be IPv6-in-IPv4-UDP.
> > > >>> Right? That reason may NOT be VALID between the PMAG and
> > > the NMAG.
> > > >>> Right?
> > > >>> Then why to use the same tunneling here? Just out of 
> curiosity!
> > > >>>
> > > >>>>> Finally, the draft could have some restrictions and
> > define the
> > > >>>>> PMAG-NMAG tunneling/encapsulation mechanism and could
> > > >>>> define a set of
> > > >>>>> PMAG-LMA tunneling mechanism that are being
> > > >>>> supported/interwork over
> > > >>>>> the PMAG-NMAG tunneling/encapsulation.
> > > >>>> What kind of restrictions do you foresee? Do you 
> also have any 
> > > >>>> specific mechanism for the inter-MAG tunnel in mind?
> > > >>> [Ahmad]
> > > >>> I guess, you need to answer many of the above comments
> > before we
> > > >>> talk about this. A clear understanding of this tunneling
> > > is needed
> > > >>> and I do not see it documented in this draft.
> > > >>>
> > > >>> BTW: Under section 4, this specification says:
> > > >>>
> > > >>> "
> > > >>>    In order to further improve the performance during the
> > > handover,
> > > >>> the
> > > >>>    PFMIPv6 protocol in this document specifies a
> > > bi-directional tunnel
> > > >>>    between the Previous MAG (PMAG) and the New MAG (NMAG)
> > > to tunnel
> > > >>>    packets meant for the mobile node.
> > > >>> "
> > > >>>
> > > >>> Which bi-directional tunnel? Where? What are the details?
> > > >>>
> > > >>>>> One more note: I found defining and describing a protocol
> > > >>>> based on a
> > > >>>>> call flow, is not the most easy to follow. But, that could
> > > >>>> just be me.
> > > >>>>
> > > >>>> What do you think could improve the readability of the
> > document?
> > > >>> [Ahmad]
> > > >>> Quite some of them... But I gave up after a while....
> > > >>>
> > > >>>> Regards,
> > > >>>> --
> > > >>>> Hidetoshi
> > > >>>>
> > > >>>>> Regards,
> > > >>>>> Ahmad
> > > >>>>>
> > > >>>>>
> > > >>>>>> -----Original Message-----
> > > >>>>>> From: mipshop-bounces@ietf.org 
> > > >>>>>> [mailto:mipshop-bounces@ietf.org] On Behalf Of 
> Muhanna, Ahmad
> > > >>>>>> (RICH1:2H10)
> > > >>>>>> Sent: Thursday, September 17, 2009 9:23 PM
> > > >>>>>> To: Hidetoshi Yokota
> > > >>>>>> Cc: Mipshop; draft-ietf-mipshop-pfmipv6@tools.ietf.org
> > > >>>>>> Subject: Re: [Mipshop] AD review of
> > draft-ietf-mipshop-pfmipv6
> > > >>>>>>
> > > >>>>>> Hi Hidetoshi,
> > > >>>>>> Please see inline.
> > > >>>>>>
> > > >>>>>> Regards,
> > > >>>>>> Ahmad
> > > >>>>>>
> > > >>>>>>> -----Original Message-----
> > > >>>>>>> From: Hidetoshi Yokota [mailto:yokota@kddilabs.jp]
> > > >>>>>>> Sent: Thursday, September 17, 2009 4:48 PM
> > > >>>>>>> To: Muhanna, Ahmad (RICH1:2H10)
> > > >>>>>>> Cc: Mipshop; draft-ietf-mipshop-pfmipv6@tools.ietf.org;
> > > >>> Jari Arkko
> > > >>>>>>> Subject: Re: [Mipshop] AD review of
> > draft-ietf-mipshop-pfmipv6
> > > >>>>>>>
> > > >>>>>>> Hi Ahmad,
> > > >>>>>>>
> > > >>>>>>> Here is the proposed revision:
> > > >>>>>>>
> > > >>>>>>> In Section 4.2:
> > > >>>>>>>       [... message with the same sequence number.]
> > > The necessary
> > > >>>>>>>    information MUST be transferred in the HI/HAck
> > messages to
> > > >>>>>>>    distinguish MN's packets for forwarding in 
> advance or at
> > > >>>>>> this time.
> > > >>>>>>>    Such information includes the MN ID and/or GRE key(s).
> > > >>>>>> Typically,
> > > >>>>>>>    the NMAG selects the GRE key for the downlink packets
> > > >>>>>> and the PMAG
> > > >>>>>>>    selects that for the uplink packets.  Each key is
> > > >>> conveyed in
> > > >>>>>>> either
> > > >>>>>>>    the HI or HAck message separately when GRE Key Option
> > > >>>> [GREKEY] is
> > > >>>>>>>    used. [For the downlink ...]
> > > >>>>>>>
> > > >>>>>> [Ahmad]
> > > >>>>>> In addition to what Vijay mentioned with respect to
> > > >>>> Typically (which
> > > >>>>>> should be removed), I believe the draft needs to be
> > > clear on the
> > > >>>>>> mechanism that is used for exchanging the GRE keys.
> > > When you say
> > > >>>>>> "...when the GRE Key Option [GREKEY] is used." What
> > > >>> happens if the
> > > >>>>>> GRE key option is NOT used. Is there another mechanism?
> > > >>>>>>
> > > >>>>>> Since the GRE keys are necessary to establish the lateral
> > > >>>> tunnel and
> > > >>>>>> identify the MN traffic, the draft must specify a default
> > > >>>> mechanism.
> > > >>>>>> Other mechanisms can be used or specified some where else
> > > >>>> if needed,
> > > >>>>>> but we need a default one here. Right?
> > > >>>>>>
> > > >>>>>> Also, you replaced the **HoA of the MN** with the 
> **MN ID**.
> > > >>>>>> What is the reason for this change?
> > > >>>>>> And how this should work NOW while you have ".. and/or
> > > GRE Keys"?
> > > >>>>>>
> > > >>>>>>> If the above description is acceptable, I will submit
> > > >>> the revised
> > > >>>>>>> version by the end of the week.
> > > >>>>>>>
> > > >>>>>>> Regards,
> > > >>>>>>> --
> > > >>>>>>> Hidetoshi
> > > >>>>>>>
> > > >>>>>>> Ahmad Muhanna wrote:
> > > >>>>>>>> Hi Hidetoshi,
> > > >>>>>>>>
> > > >>>>>>>>> -----Original Message-----
> > > >>>>>>>>> From: Hidetoshi Yokota [mailto:yokota@kddilabs.jp]
> > > >>>>>>>>> Sent: Monday, September 14, 2009 7:37 AM
> > > >>>>>>>>> To: Muhanna, Ahmad (RICH1:2H10)
> > > >>>>>>>>> Cc: Mipshop; draft-ietf-mipshop-pfmipv6@tools.ietf.org;
> > > >>>>>> Jari Arkko
> > > >>>>>>>>> Subject: Re: [Mipshop] AD review of
> > > draft-ietf-mipshop-pfmipv6
> > > >>>>>>>>>
> > > >>>>>>>>> Hi Ahmad,
> > > >>>>>>>>>
> > > >>>>>>>>> Thanks for your comment. I'm glad to hear an 
> opinion from
> > > >>>>>>> a GRE key
> > > >>>>>>>>> expert. Please see inline:
> > > >>>>>>>>>
> > > >>>>>>>>> Ahmad Muhanna wrote:
> > > >>>>>>>>>> Hi Hidetoshi,
> > > >>>>>>>>>>
> > > >>>>>>>>>> I just have one quick comment and question.
> > > >>>>>>>>>>
> > > >>>>>>>>>> Reading the draft, it seems to me that the GRE keys are
> > > >>>>>>>>> somehow sent
> > > >>>>>>>>>> from the NAR to PAR in the HI (section 4.2). 
> Is that the
> > > >>>>>>> case? This
> > > >>>>>>>>>> means both the DL and UP GRE keys for the bilateral
> > > >>>>>>> tunnels between
> > > >>>>>>>>>> the two AR(s). Is my understanding correct? It also
> > > >>>>>>>>> mentions that the
> > > >>>>>>>>>> format
> > > >>>>>>>>> In terms of the GRE keys for the bilateral tunnel,
> > > >>> the working
> > > >>>>>>>>> assumption is that the DL key is selected by the NAR and
> > > >>>>>>> the UL key
> > > >>>>>>>>> is selected by the PAR. Depending on the fast handover
> > > >>>>>> mode, those
> > > >>>>>>>>> keys are transferred to the other MAG via either the
> > > >>> HI or Hack.
> > > >>>>>>>>>> of these keys are based on the GRE keys for PMIPv6
> > > >>>>>> draft (section
> > > >>>>>>>>>> 6.2.6).
> > > >>>>>>>>> Correct.
> > > >>>>>>>>>
> > > >>>>>>>>>> It seems to me that there should be more text to define
> > > >>>>>>> which keys
> > > >>>>>>>>>> exchange in the HI and which in the HaCK
> > > >>>>>>>>> If the above assumption works, I would like to add more
> > > >>>>>> text along
> > > >>>>>>>>> that line.
> > > >>>>>>>> [Ahmad]
> > > >>>>>>>> That is great. Please add some clarification text to
> > > >>>>>>> clearly indicate
> > > >>>>>>>> that only one key in the HI and the other in the HACK.
> > > >>>>>>>> Since some specification in 3GPP2 depends on 
> this draft, I
> > > >>>>>>> appreciate
> > > >>>>>>>> if you can publish an updated version before the end of
> > > >>>> the week.
> > > >>>>>>>> Thanks in advance!
> > > >>>>>>>>
> > > >>>>>>>>>> If both keys are exchanged in the same HI, How these
> > > >>> keys are
> > > >>>>>>>>>> identified at the pAR?
> > > >>>>>>>>>> In GRE keys for PMIPv6 draft, downlink GRE key
> > is included
> > > >>>>>>>>> in the PBU
> > > >>>>>>>>>> and the uplink GRE key in included in the PBA. 
> They never
> > > >>>>>>>>> exist in the
> > > >>>>>>>>>> same message and that way there is no confusing.
> > > >>>>>>>>> So far, each key is conveyed by either the HI or HAck.
> > > >>>>>>>>> However, I haven't explored all of the possibilities.
> > > >>>> If you can
> > > >>>>>>>>> think of any case that two keys must be conveyed in one
> > > >>>> message,
> > > >>>>>>>>> please let me know.
> > > >>>>>>>> [Ahmad]
> > > >>>>>>>> I do not see any reason for this case (one key per
> > > >>>>>> message) not to
> > > >>>>>>>> work for all implementation.
> > > >>>>>>>>
> > > >>>>>>>>>> In addition, DL and UP GRE keys are generated 
> by NAR and
> > > >>>>>>>>> sent inside
> > > >>>>>>>>>> the HI, my question: Is there any specific reason for
> > > >>>>>> the NAR to
> > > >>>>>>>>>> specify both GRE keys for the bilateral tunnels?
> > > >>>>>>>>> It would be more problematic that the NAR determines the
> > > >>>>>> both keys
> > > >>>>>>>>> and I would rather like to avoid it.
> > > >>>>>>>>>
> > > >>>>>>>>>> Sorry for this comment to be so late but hope
> > that you have
> > > >>>>>>>>> the chance
> > > >>>>>>>>>> to take a look at it.
> > > >>>>>>>>> That's ok. The draft is under the review process. Your
> > > >>>>>> comment is
> > > >>>>>>>>> highly appreciated.
> > > >>>>>>>>>
> > > >>>>>>>>> Regards,
> > > >>>>>>>>> --
> > > >>>>>>>>> Hidetoshi
> > > >>>>>>>>>
> > > >>>>>>>>>
> > > >>>>>>>>>> Thanks!
> > > >>>>>>>>>>
> > > >>>>>>>>>> Regards,
> > > >>>>>>>>>> Ahmad
> > > >>>>>>>>>>
> > > >>>>>>>>>>
> > > >>>>>>>>>>> -----Original Message-----
> > > >>>>>>>>>>> From: mipshop-bounces@ietf.org 
> > > >>>>>>>>>>> [mailto:mipshop-bounces@ietf.org] On Behalf Of
> > > >>>> Hidetoshi Yokota
> > > >>>>>>>>>>> Sent: Wednesday, September 02, 2009 11:12 PM
> > > >>>>>>>>>>> To: Jari Arkko
> > > >>>>>>>>>>> Cc: Mipshop; draft-ietf-mipshop-pfmipv6@tools.ietf.org
> > > >>>>>>>>>>> Subject: Re: [Mipshop] AD review of
> > > >>> draft-ietf-mipshop-pfmipv6
> > > >>>>>>>>>>> Hi Jari,
> > > >>>>>>>>>>>
> > > >>>>>>>>>>> Thanks for your patience. The attached revised
> > document is
> > > >>>>>>>>> supposed to
> > > >>>>>>>>>>> reflect the rest of your comments. Please also
> > see inline,
> > > >>>>>>>>> where the
> > > >>>>>>>>>>> revised part is explained item by item. If there is no
> > > >>>>>>> outstanding
> > > >>>>>>>>>>> issue there, we will upload it shortly.
> > > >>>>>>>>>>>
> > > >>>>>>>>>>> [Apologize if you received it twice. Since 
> the size just
> > > >>>>>>>>> exceeded the
> > > >>>>>>>>>>> limit of this ML, this mail is reposted without the
> > > >>>>>> attachment.]
> > > >>>>>>>>>>> Hidetoshi Yokota wrote:
> > > >>>>>>>>>>>> Hi Jari,
> > > >>>>>>>>>>>>
> > > >>>>>>>>>>>> Appreciate your detailed review. The editorial
> > > corrections
> > > >>>>>>>>>>> are mostly
> > > >>>>>>>>>>>> done and the revised version is attached to 
> this mail.
> > > >>>>>>>>> Regarding the
> > > >>>>>>>>>>>> technical comments, only the policies for the
> > correction
> > > >>>>>>>>>>> are listed for
> > > >>>>>>>>>>>> now. The complete correction will be posted 
> as soon as
> > > >>>>>>>>>>> possible. Please
> > > >>>>>>>>>>>> see inline for the responses to your questions and
> > > >>> comments:
> > > >>>>>>>>>>>> Jari Arkko wrote:
> > > >>>>>>>>>>>>> I have reviewed this document. It was
> > generally in good
> > > >>>>>>>>>>> shape and easy
> > > >>>>>>>>>>>>> to read. I did find a number of issues 
> though. Please
> > > >>>>>>>>>>> discuss them with
> > > >>>>>>>>>>>>> me on this thread and/or revise the draft 
> accordingly.
> > > >>>>>>>>>>>>>
> > > >>>>>>>>>>>>> Technical:
> > > >>>>>>>>>>>>>
> > > >>>>>>>>>>>>> I do not understand the IP host aspects of the
> > > >>>>>>> handover. For an
> > > >>>>>>>>>>>>> unmodified host, what kind of interfaces 
> exist on the
> > > >>>>>>> host, what
> > > >>>>>>>>>>>>> addresses they have, and at what time are interfaces
> > > >>>>>>>>>>> removed or added?
> > > >>>>>>>>>>>>> Is this exactly the same as in RFC 5213, or
> > does PFMIPv6
> > > >>>>>>>>>>> introduce some
> > > >>>>>>>>>>>>> change here?
> > > >>>>>>>>>>>> The basic principle would be that this
> > specification does
> > > >>>>>>>>>>> not require
> > > >>>>>>>>>>>> any additional IP-level function to the MN
> > running in the
> > > >>>>>>>>>>> PMIPv6 domain.
> > > >>>>>>>>>>>> This MN should therefore be the same as defined
> > > in RFC5213.
> > > >>>>>>>>>>>>
> > > >>>>>>>>>>>> A typical network interface would be one with the
> > > >>>>>>>>> cellular network,
> > > >>>>>>>>>>>> where the network basically controls the
> > movement of the
> > > >>>>>>>>>>> MN. Different
> > > >>>>>>>>>>>> types of interfaces could be involved such 
> as different
> > > >>>>>>>>>>> generations (3G
> > > >>>>>>>>>>>> and 3.9G) or different radio access systems.
> > Any type of
> > > >>>>>>>>> IP address
> > > >>>>>>>>>>>> could be assigned (IPv4/v6 or 
> global/private), but the
> > > >>>>>>>>>>> assigned address
> > > >>>>>>>>>>>> must be preserved before and after the
> > handover. PFMIPv6
> > > >>>>>>>>>>> should be able
> > > >>>>>>>>>>>> to handle the single radio situation, where only one
> > > >>>>>>>>>>> interface is active
> > > >>>>>>>>>>>> at any given time. This is a tougher situation
> > > in terms of
> > > >>>>>>>>>>> packet loss
> > > >>>>>>>>>>>> and delay.
> > > >>>>>>>>>>>>
> > > >>>>>>>>>>>>> I would like to see a new section on manageability
> > > >>>>>>>>>>> considerations. For
> > > >>>>>>>>>>>>> instance, Section 5 talks about some
> > > >>> configuration issues.
> > > >>>>>>>>>>> These should
> > > >>>>>>>>>>>>> be mentioned, and there should be a
> > description of what
> > > >>>>>>>>>>> the operator
> > > >>>>>>>>>>>>> needs to configure in order to set up a
> > PFMIPv6 network.
> > > >>>>>>>>>>>> We will add a new section for manageability
> > > considerations
> > > >>>>>>>>>>> to clarify
> > > >>>>>>>>>>>> the above and to reflect your suggestion.
> > > >>>>>>>>>>> A new subsection is added in Section 5 describing the
> > > >>>>>>>>> above aspects:
> > > >>>>>>>>>>> -------------------
> > > >>>>>>>>>>> 5.  PMIPv6-related Fast Handover Issues
> > > >>>>>>>>>>>
> > > >>>>>>>>>>> 5.1.  Manageability Considerations
> > > >>>>>>>>>>>
> > > >>>>>>>>>>>    This specification does not require any
> > > >>> additional IP-level
> > > >>>>>>>>>>>    functionality on the LMA and the MN running in
> > > >>> the PMIPv6
> > > >>>>>>>>>>> domain.  A
> > > >>>>>>>>>>>    typical network interface that the MN could be
> > > >>>>>>> assumed to have
> > > >>>>>>>>>>> is one
> > > >>>>>>>>>>>    with the cellular network, where the network
> > > >>> controls the
> > > >>>>>>>>>>> movement of
> > > >>>>>>>>>>>    the MN.  Different types of interfaces could be
> > > >>>>>>> involved such as
> > > >>>>>>>>>>>    different generations (3G and 3.9G) or different
> > > >>>>>> radio access
> > > >>>>>>>>>>>    systems.  This specification supports a MN with the
> > > >>>>>>> single radio
> > > >>>>>>>>>>>    mode, where only one interface is active 
> at any given
> > > >>>>>>> time.  The
> > > >>>>>>>>>>>    assigned IP address is preserved whether 
> the physical
> > > >>>>>>> interface
> > > >>>>>>>>>>>    changes or not and the MN can identify which
> > > >>>>>>> interface should be
> > > >>>>>>>>>>> used
> > > >>>>>>>>>>>    if there are multiple ones.
> > > >>>>>>>>>>> --------------------
> > > >>>>>>>>>>>
> > > >>>>>>>>>>>
> > > >>>>>>>>>>>>>> If the new router's interface is configured to
> > > >>> respond to
> > > >>>>>>>>>>>>>> queries sent to link-layer addresses than its
> > > >>>>>>>>>>> own (e.g.,
> > > >>>>>>>>>>>>>> set to promiscuous mode), then it can 
> respond to the
> > > >>>>>>> NUD probe,
> > > >>>>>>>>>>>>>> providing its link-layer address in the
> > > >>> solicited Neighbor
> > > >>>>>>>>>>>>>> Advertisement.
> > > >>>>>>>>>>>>> Is this according to RFC 5213? I seem to
> > recall that RFC
> > > >>>>>>>>>>> 5213 operated
> > > >>>>>>>>>>>>> on the same link layer addresses.
> > > >>>>>>>>>>>> I think your observation is correct... I'll
> > > check with the
> > > >>>>>>>>>>> other authors
> > > >>>>>>>>>>>> to see if it is ok to rewrite it.
> > > >>>>>>>>>>> The new text doesn't mention the promiscuous mode and
> > > >>>>>>>>> emphasizes the
> > > >>>>>>>>>>> common link-layer address among all MAGs in the
> > > >>> PMIPv6 domain:
> > > >>>>>>>>>>> ---------------
> > > >>>>>>>>>>> 5.2.  Expedited Packet Transmission
> > > >>>>>>>>>>>
> > > >>>>>>>>>>>    [...]
> > > >>>>>>>>>>>
> > > >>>>>>>>>>>    The protocol specified in this document is 
> applicable
> > > >>>>>>>>> regardless of
> > > >>>>>>>>>>>    whether link-layer addresses are used
> > between a MN and
> > > >>>>>>>>> its access
> > > >>>>>>>>>>>    router.  A MN should be able to continue sending
> > > >>>>>>> packets on the
> > > >>>>>>>>>>>    uplink even when it changes link.  When link-layer
> > > >>>>>>> addresses are
> > > >>>>>>>>>>>    used, the MN performs Neighbor Unreachability
> > > >>>>>> Detection (NUD)
> > > >>>>>>>>>>>    [RFC4861], after attaching to a new link,
> > probing the
> > > >>>>>>>>>>> reachability of
> > > >>>>>>>>>>>    its default router.  The new router should respond
> > > >>>>>> to the NUD
> > > >>>>>>>>>>> probe,
> > > >>>>>>>>>>>    providing its link-layer address in the
> > > >>> solicited Neighbor
> > > >>>>>>>>>>>    Advertisement, which is common in the 
> PMIPv6 domain.
> > > >>>>>>>>>>> Implementations
> > > >>>>>>>>>>>    should allow the MN to continue to send
> > uplink packets
> > > >>>>>>>>> while it is
> > > >>>>>>>>>>>    performing NUD.
> > > >>>>>>>>>>> ----------------
> > > >>>>>>>>>>>
> > > >>>>>>>>>>>>>> At least one mobility option MUST uniquely identify
> > > >>>>>>> the target
> > > >>>>>>>>>>>>>> MN (e.g., the Mobile Node
> > > >>>>>>>>> Identifier
> > > >>>>>>>>>>>>>> Option defined in RFC4283
> > > >>>>>>>>>>> <http://tools.ietf.org/html/rfc4283>) and
> > > >>>>>>>>>>>>>> the transferred context MUST be for one MN
> > per message.
> > > >>>>>>>>>>>>>>
> > > >>>>>>>>>>>>> I would like the required options to be
> > > specified in more
> > > >>>>>>>>>>> detail. Which
> > > >>>>>>>>>>>>> identity options are sufficient to satisfy the MUST?
> > > >>>>>>>>>>>> The required option should be the MN 
> Identifier in the
> > > >>>>>>> Mobile Node
> > > >>>>>>>>>>>> Identifier Option.
> > > >>>>>>>>>>> The above description is added in Section 6.1.1:
> > > >>>>>>>>>>>
> > > >>>>>>>>>>> ---------
> > > >>>>>>>>>>>    Requested option
> > > >>>>>>>>>>>              In order to uniquely identify the target
> > > >>>>>> MN, the MN
> > > >>>>>>>>>>>              Identifier MUST be contained in the
> > > >>> Mobile Node
> > > >>>>>>>>>>> Identifier
> > > >>>>>>>>>>>              Option.
> > > >>>>>>>>>>> ---------
> > > >>>>>>>>>>>
> > > >>>>>>>>>>>>>> If a default set of context information is defined
> > > >>>>>> and always
> > > >>>>>>>>>>>>>> sufficient, this option is not mandatory.  This
> > > >>>>>>>>>>> option is more
> > > >>>>>>>>>>>>>> useful to retrieve additional or dynamically
> > > >>>>>> selected context
> > > >>>>>>>>>>>>>> information.
> > > >>>>>>>>>>>>>>
> > > >>>>>>>>>>>>>> Context Request Option is typically used for the
> > > >>>>>>> reactive (NAR-
> > > >>>>>>>>>>>>>> initiated) fast handover mode to retrieve 
> the context
> > > >>>>>>>>> information
> > > >>>>>>>>>>>>>> from the PAR.  When this option is 
> included in the HI
> > > >>>>>>>>> message, all
> > > >>>>>>>>>>>>>> the requested context information SHOULD 
> be included
> > > >>>>>>> in the HAck
> > > >>>>>>>>>>>>>> message in the corresponding mobility
> > option(s) (e.g.,
> > > >>>>>>>>>>> HNP, LMAA or
> > > >>>>>>>>>>>>>> MN-IID mobility options).
> > > >>>>>>>>>>>>>>
> > > >>>>>>>>>>>>> Please specify what the default set of context
> > > >>>>>>>>> information is, by
> > > >>>>>>>>>>>>> listing the required options when the CRO is
> > > not present.
> > > >>>>>>>>>>>> The default context information to request 
> is the Home
> > > >>>>>>>>>>> Network Prefix
> > > >>>>>>>>>>>> Option. If the Mobile Node link-layer is 
> available and
> > > >>>>>>>>>>> used, the Mobile
> > > >>>>>>>>>>>> Node Link-layer Identifier Option MUST also be
> > requested.
> > > >>>>>>>>>>> With these two
> > > >>>>>>>>>>>> options and the MN identifier, the NMAG can
> > > >>>> construct the PBU.
> > > >>>>>>>>>>> The above description is added in Section 6.2.1:
> > > >>>>>>>>>>>
> > > >>>>>>>>>>> ----------
> > > >>>>>>>>>>>    The default context information to request is the
> > > >>>>>>> Home Network
> > > >>>>>>>>>>> Prefix
> > > >>>>>>>>>>>    Option.  If the Mobile Node link-layer is
> > available and
> > > >>>>>>>>> used, the
> > > >>>>>>>>>>>    Mobile Node Link-layer Identifier Option 
> MUST also be
> > > >>>>>>> requested.
> > > >>>>>>>>>>> ----------
> > > >>>>>>>>>>>
> > > >>>>>>>>>>>>> Editorial:
> > > >>>>>>>>>>>>>
> > > >>>>>>>>>>>>>>    HO-Initiate:
> > > >>>>>>>>>>>>>>         A generic signaling message, sent
> > from the P-AN
> > > >>>>>>>>>>> to the PMAG that
> > > >>>>>>>>>>>>>>         indicates a MN handover.  While this
> > > signaling is
> > > >>>>>>>>>>> dependent on
> > > >>>>>>>>>>>>>>         the access technology, it is assumed that
> > > >>>>>>>>>>> HO-Initiate can carry
> > > >>>>>>>>>>>>>>         the information to identify the MN and to
> > > >>>>>>>>> assist the PMAG
> > > >>>>>>>>>>>>>>         resolve the NMAG and the new access
> > > point or the
> > > >>>>>>>>>>> base station to
> > > >>>>>>>>>>>>>>         which the MN is moving to.  The
> > details of this
> > > >>>>>>>>>>> message are
> > > >>>>>>>>>>>>>>         outside the scope of this document.
> > > >>>>>>>>>>>>>>
> > > >>>>>>>>>>>>>> 4. Proxy-based FMIPv6 Protocol Overview
> > > >>>>>>>>>>>>> Section 4 would probably benefit from an additional
> > > >>>>>>>>>>> paragraph at the
> > > >>>>>>>>>>>>> beginning to explain what assumptions there
> > exist about
> > > >>>>>>>>>>> lower layer
> > > >>>>>>>>>>>>> functionality.
> > > >>>>>>>>>>>> Yes, the predictive fast handover relies on the
> > > >>> lower layer
> > > >>>>>>>>>>>> functionality to trigger to send the HI. A new
> > paragraph
> > > >>>>>>>>>>> will be added
> > > >>>>>>>>>>>> to clarify it.
> > > >>>>>>>>>>> -------------
> > > >>>>>>>>>>> 4.  Proxy-based FMIPv6 Protocol Overview
> > > >>>>>>>>>>>
> > > >>>>>>>>>>>    If the MAGs can be informed of the 
> detachment and/or
> > > >>>>>>>>> attachment of
> > > >>>>>>>>>>>    the MN in a timely manner via e.g. the lower layer
> > > >>>>>>> signaling, it
> > > >>>>>>>>>>> will
> > > >>>>>>>>>>>    become possible to optimize the handover procedure,
> > > >>>>>>>>> which involves
> > > >>>>>>>>>>>    establishing a connection on the new link and
> > > >>>>>>> signaling between
> > > >>>>>>>>>>>    mobility agents, compared to the baseline
> > specification
> > > >>>>>>>>> of PMIPv6.
> > > >>>>>>>>>>>   [...]
> > > >>>>>>>>>>> -------------
> > > >>>>>>>>>>>
> > > >>>>>>>>>>> All the other corrections pointed out below have
> > > also been
> > > >>>>>>>>>>> reflected in the revised document.
> > > >>>>>>>>>>>
> > > >>>>>>>>>>> Regards,
> > > >>>>>>>>>>> --
> > > >>>>>>>>>>> Hidetoshi
> > > >>>>>>>>>>>
> > > >>>>>>>>>>>>>> A new flag 'P' is defined for the HI and HAck
> > > >>> messages to
> > > >>>>>>>>>>>>>> distinguish from those in [RFC5268bis
> > > >>>>>>>>>>>>>>
> > > >>> <http://tools.ietf.org/html/draft-ietf-mipshop-pfmipv6-08#ref-
> > > >>>>>>>>>>> RFC5268bis>]
> > > >>>>>>>>>>>>>> and thus MUST
> > > >>>>>>>>>>>>>> be set in the entire document.
> > > >>>>>>>>>>>>>>
> > > >>>>>>>>>>>>> This would be more readable as " ... those in
> > > >>>>>>>>>>> [RFC5268bis]. This flag
> > > >>>>>>>>>>>>> MUST be ..."
> > > >>>>>>>>>>>> Revised.
> > > >>>>>>>>>>>>
> > > >>>>>>>>>>>>>>    and the NAR creates a proxy NCE to receive those
> > > >>>>>>>>>>> packets for the NCoA
> > > >>>>>>>>>>>>> The term NCE has not been introduced at this
> > stage yet.
> > > >>>>>>>>>>>> Spelled out as "Neighbor Cache Entry".
> > > >>>>>>>>>>>>
> > > >>>>>>>>>>>>>>    address that is used by the MN is MN-HoA.
> >  Hence the
> > > >>>>>>>>>>> PAR forwards
> > > >>>>>>>>>>>>> The term MN-HOA has not been introduced before.
> > > >>>>>>>>>>>> Added the unabbreviated form "Mobile Node's
> > Home Address"
> > > >>>>>>>>> before it.
> > > >>>>>>>>>>>>>>         The access network to which the MN
> > is attached
> > > >>>>>>>>>>> after handover.
> > > >>>>>>>>>>>>> New term MN, not introduced before.
> > > >>>>>>>>>>>>>
> > > >>>>>>>>>>>> Added "Mobile Node" before it.
> > > >>>>>>>>>>>>
> > > >>>>>>>>>>>>>> specifies forwarding when the MN uses HoA as its
> > > >>>>>>> on-link address
> > > >>>>>>>>>>>>> New term HoA...
> > > >>>>>>>>>>>> Changed to "Home Address".
> > > >>>>>>>>>>>>
> > > >>>>>>>>>>>>>>    as MN's NAI, Home Network Prefix (HNP), 
> IPv4 Home
> > > >>>>>>>>> Address, are
> > > >>>>>>>>>>>>> New term NAI...
> > > >>>>>>>>>>>> Added "Network Access Identifier" before it.
> > > >>>>>>>>>>>>
> > > >>>>>>>>>>>>>>         flag set and include the MN ID, the
> > MN-HNP, the
> > > >>>>>>>>>>> MN-IID and the
> > > >>>>>>>>>>>>> New terms MN-HNP and MN-IID (or at least they do not
> > > >>>>>>>>>>> appear in their
> > > >>>>>>>>>>>>> MN-XXX form before this point).
> > > >>>>>>>>>>>> Modified "MN-HNP" to "HNP" for consistency.
> > > >>>>>>>>>>>>
> > > >>>>>>>>>>>>>>         Inner destination address: HNP or 
> IPv4-MN-HoA
> > > >>>>>>>>>>>>> IPv4-MN-HoA not defined earlier...
> > > >>>>>>>>>>>> Added "Mobile Node's IPv4 Home" before it.
> > > >>>>>>>>>>>>
> > > >>>>>>>>>>>>>>    between the PCoA and NCoA to forward
> > packets for the
> > > >>>>>>>>>>> MN to the NAR,
> > > >>>>>>>>>>>>> New terms PCoA and NCoA... there's probably
> > > more undefined
> > > >>>>>>>>>>> terms in the
> > > >>>>>>>>>>>>> document, please check!
> > > >>>>>>>>>>>> Added "Previous Care-of Address" and "New Care-of
> > > >>> Address".
> > > >>>>>>>>>>> Will read
> > > >>>>>>>>>>>> through it to see if there is any other
> > > undefined acronym.
> > > >>>>>>>>>>>>
> > > >>>>>>>>>>>>>>    In (i),
> > > >>>>>>>>>>>>> In Step (i),
> > > >>>>>>>>>>>> Revised including other parts.
> > > >>>>>>>>>>>>
> > > >>>>>>>>>>>>>>           |(MN ID, Old AP ID) |     (MN ID, Old
> > > >>> AP ID)
> > > >>>>>>>>>>>  |        |
> > > >>>>>>>>>>>>> Old AP ID? AN ID? AR ID?
> > > >>>>>>>>>>>> AP ID stands for "Access Point Identifier", which is
> > > >>>>>>>>>>> defined in RFC5568.
> > > >>>>>>>>>>>> Added the unabbreviated form and citation.
> > > >>>>>>>>>>>>
> > > >>>>>>>>>>>> The rest of the part will be revised soon.
> > > >>>>>>>>>>>>
> > > >>>>>>>>>>>> Regards,
> > > >>>>>>>>>>>>
> > > >>>>>>>>>>>>
> > > >>>>>>>>>>>>
> > > >>> --------------------------------------------------------------
> > > >>>>>>>>>>> ----------
> > > >>>>>>>>>>>> _______________________________________________
> > > >>>>>>>>>>>> Mipshop mailing list
> > > >>>>>>>>>>>> Mipshop@ietf.org
> > > >>>>>>>>>>>> https://www.ietf.org/mailman/listinfo/mipshop
> > > >>>>>>>>>>> _______________________________________________
> > > >>>>>>>>>>> Mipshop mailing list
> > > >>>>>>>>>>> Mipshop@ietf.org
> > > >>>>>>>>>>> https://www.ietf.org/mailman/listinfo/mipshop
> > > >>>>>>>>>>>
> > > >>>>>>>>
> > > >>>>>>> --
> > > >>>>>>> Hidetoshi Yokota
> > > >>>>>>>
> > > >>>>>>> Mobile Network Lab
> > > >>>>>>> KDDI R&D Laboratories, Inc.
> > > >>>>>>> e-mail:yokota@kddilabs.jp
> > > >>>>>>>
> > > >>>>>>>
> > > >>>>>> _______________________________________________
> > > >>>>>> Mipshop mailing list
> > > >>>>>> Mipshop@ietf.org
> > > >>>>>> https://www.ietf.org/mailman/listinfo/mipshop
> > > >>>>>>
> > > >>>>>
> > > >>>>>
> > > >>>>
> > > >>
> > > >>
> > > >> This email and any attachments may contain legally
> > > privileged and/or
> > > >> confidential information of Starent Networks, Corp. and is
> > > intended
> > > >> only for the individual or entity named in the message.  The 
> > > >> information transmitted may not be used to create or 
> change any 
> > > >> contractual obligations of Starent Networks, Corp.  
> Any review, 
> > > >> retransmission, dissemination or other use of, or 
> taking of any 
> > > >> action in reliance upon this e-mail and its attachments by
> > > persons or
> > > >> entities other than the intended recipient is prohibited.
> > > If you are
> > > >> not the intended recipient, please notify the sender
> > > immediately --
> > > >> by replying to this message or by sending an email to 
> > > >> postmaster@starentnetworks.com -- and destroy all 
> copies of this 
> > > >> message and any attachments without reading or disclosing
> > > their contents. Thank you.
> > > >>
> > > >>
> > > >>
> > > >
> > >
> > >
> >
> > 
> 
>