1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789 790 791 792 793 794 795 796 797 798 799 800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 853 854 855 856 857 858 859 860 861 862 863 864 865 866 867 868 869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 884 885 886 887 888 889 890 891 892 893
|
<pre>Network Working Group T. Melia, Ed.
Request for Comments: 5164 Cisco Systems
Category: Informational March 2008
<span class="h1">Mobility Services Transport: Problem Statement</span>
Status of This Memo
This memo provides information for the Internet community. It does
not specify an Internet standard of any kind. Distribution of this
memo is unlimited.
Abstract
There are ongoing activities in the networking community to develop
solutions that aid in IP handover mechanisms between heterogeneous
wired and wireless access systems including, but not limited to, IEEE
802.21. Intelligent access selection, taking into account link-layer
attributes, requires the delivery of a variety of different
information types to the terminal from different sources within the
network and vice-versa. The protocol requirements for this
signalling have both transport and security issues that must be
considered. The signalling must not be constrained to specific link
types, so there is at least a common component to the signalling
problem, which is within the scope of the IETF. This document
presents a problem statement for this core problem.
<span class="grey">Melia, et al. Informational [Page 1]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-2" ></span>
<span class="grey"><a href="./rfc5164">RFC 5164</a> Mobility Services Transport March 2008</span>
Table of Contents
<a href="#section-1">1</a>. Introduction ....................................................<a href="#page-2">2</a>
<a href="#section-2">2</a>. Terminology .....................................................<a href="#page-3">3</a>
<a href="#section-2.1">2.1</a>. Requirements Language ......................................<a href="#page-3">3</a>
<a href="#section-3">3</a>. Definition of Mobility Services .................................<a href="#page-4">4</a>
<a href="#section-4">4</a>. Deployment Scenarios for MoS ....................................<a href="#page-4">4</a>
<a href="#section-4.1">4.1</a>. End-to-End Signalling and Transport over IP ................<a href="#page-5">5</a>
<a href="#section-4.2">4.2</a>. End-to-End Signalling and Partial Transport over IP ........<a href="#page-5">5</a>
<a href="#section-4.3">4.3</a>. End-to-End Network-to-Network Signalling ...................<a href="#page-6">6</a>
<a href="#section-5">5</a>. MoS Transport Protocol Splitting ................................<a href="#page-7">7</a>
<a href="#section-5.1">5.1</a>. Payload Formats and Extensibility Considerations ...........<a href="#page-8">8</a>
<a href="#section-5.2">5.2</a>. Requirements on the Mobility Service Transport Layer .......<a href="#page-8">8</a>
<a href="#section-6">6</a>. Security Considerations ........................................<a href="#page-11">11</a>
<a href="#section-7">7</a>. Conclusions ....................................................<a href="#page-12">12</a>
<a href="#section-8">8</a>. Acknowledgements ...............................................<a href="#page-13">13</a>
<a href="#section-9">9</a>. References .....................................................<a href="#page-13">13</a>
<a href="#section-9.1">9.1</a>. Normative References ......................................<a href="#page-13">13</a>
<a href="#section-9.2">9.2</a>. Informative References ....................................<a href="#page-13">13</a>
Contributors ......................................................<a href="#page-14">14</a>
<span class="h2"><a class="selflink" id="section-1" href="#section-1">1</a>. Introduction</span>
This document provides a problem statement for the exchange of
information to support handover in heterogeneous link environments
[<a href="#ref-1" title=""Draft IEEE Standard for Local and Metropolitan Area Networks: Media Independent Handover Services"">1</a>]. This mobility support service allows more sophisticated
handover operations by making available information about network
characteristics, neighboring networks and associated characteristics,
indications that a handover should take place, and suggestions for
suitable target networks to which to handover. The mobility support
services are complementary to IP mobility mechanisms [<a href="#ref-4" title=""3GPP system architecture evolution (SAE): Report on technical options and conclusions"">4</a>], [<a href="#ref-5" title=""IP Mobility Support for IPv4"">5</a>], [<a href="#ref-6" title=""Mobility Support in IPv6"">6</a>],
[<a href="#ref-7" title=""Host Identity Protocol (HIP) Architecture"">7</a>], [<a href="#ref-8" title=""IKEv2 Mobility and Multihoming Protocol (MOBIKE)"">8</a>], [<a href="#ref-9" title=""Fast Handovers for Mobile IPv6"">9</a>] to enhance the overall performance and usability
perception.
There are two key attributes to the handover support service problem
for inter-technology handovers:
1. The Information: the information elements being exchanged. The
messages could be of a different nature, such as information,
commands to perform an action, or events informing of a change,
potentially being defined following a common structure.
<span class="grey">Melia, et al. Informational [Page 2]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-3" ></span>
<span class="grey"><a href="./rfc5164">RFC 5164</a> Mobility Services Transport March 2008</span>
2. The Underlying Transport: the transport mechanism to support
exchange of the information elements mentioned above. This
transport mechanism includes information transport, discovery of
peers, and the securing of this information over the network.
The initial requirement for this protocol comes from the need to
provide a transport for the Media Independent Handover (MIH) protocol
being defined by IEEE 802.21 [<a href="#ref-1" title=""Draft IEEE Standard for Local and Metropolitan Area Networks: Media Independent Handover Services"">1</a>], which is not bound to any specific
link layer and can operate over more that one network-layer hop. The
solution should be flexible to accommodate evolution in the MIH
standard, and should also be applicable for other new mobility
signalling protocols that have similar message patterns and discovery
and transport requirements.
The structure of this document is as follows. <a href="#section-3">Section 3</a> defines
Mobility Services. <a href="#section-4">Section 4</a> provides a simple model for the
protocol entities involved in the signalling and their possible
relationships. <a href="#section-5">Section 5</a> describes a decomposition of the signalling
problem into service-specific parts and a generic transport part.
<a href="#section-5.2">Section 5.2</a> describes more detailed requirements for the transport
component. <a href="#section-6">Section 6</a> provides security considerations. <a href="#section-7">Section 7</a>
summarizes the conclusions and open issues.
<span class="h2"><a class="selflink" id="section-2" href="#section-2">2</a>. Terminology</span>
The following abbreviations are used in the document:
MIH: Media Independent Handover
MN: Mobile Node
NN: Network Node, intended to represent some device in the network
(the location of the node, e.g., in the access network, the home
network is not specified, and for the moment it is assumed that
they can reside anywhere).
EP: Endpoint, intended to represent the terminating endpoints of
the transport protocol used to support the signalling exchanges
between nodes.
<span class="h3"><a class="selflink" id="section-2.1" href="#section-2.1">2.1</a>. Requirements Language</span>
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in <a href="./rfc2119">RFC 2119</a> [<a href="#ref-2" title=""Key words for use in RFCs to Indicate Requirement Levels"">2</a>].
<span class="grey">Melia, et al. Informational [Page 3]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-4" ></span>
<span class="grey"><a href="./rfc5164">RFC 5164</a> Mobility Services Transport March 2008</span>
<span class="h2"><a class="selflink" id="section-3" href="#section-3">3</a>. Definition of Mobility Services</span>
As mentioned in the Introduction, mobility (handover) support in
heterogeneous wireless environments requires functional components
located either in the mobile terminal or in the network to exchange
information and eventually to make decisions upon this information
exchange. For instance, traditional host-based handover solutions
could be complemented with more sophisticated network-centric
solutions. Also, neighborhood discovery, potentially a complex
operation in heterogeneous wireless scenarios, can result in a
simpler step if implemented with a unified interface towards the
access network.
In this document, the different supporting functions for Media
Independent Handover (MIH) management are generally referred to as
Mobility Services (MoS) that have different requirements for the
transport protocol. These requirements and associated
functionalities are the focus of this document. Speaking 802.21
terminology, MoS can be regarded as Information Services (IS), Event
Services (ES), and Command Service (CS).
<span class="h2"><a class="selflink" id="section-4" href="#section-4">4</a>. Deployment Scenarios for MoS</span>
The deployment scenarios are outlined in the following sections.
Note: while MN-to-MN signalling exchanges are theoretically
possible, these are not currently being considered.
The following scenarios are discussed for understanding the overall
problem of transporting MIH protocol. Although these are all
possible scenarios and MIH services can be delivered through
link-layer specific solutions and/or through a "layer 3 or above"
protocol, this problem statement focuses on the delivery of
information for Mobility Services only for the latter case.
<span class="grey">Melia, et al. Informational [Page 4]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-5" ></span>
<span class="grey"><a href="./rfc5164">RFC 5164</a> Mobility Services Transport March 2008</span>
<span class="h3"><a class="selflink" id="section-4.1" href="#section-4.1">4.1</a>. End-to-End Signalling and Transport over IP</span>
In this case, the end-to-end signalling used to exchange the handover
information elements (the Information Exchange) runs end-to-end
between MN and NN. The underlying transport is also end-to-end.
+------+ +------+
| MN | | NN |
| (EP) | | (EP) |
+------+ +------+
Information Exchange
<------------------------------------>
/------------------------------------\
< Transport over IP >
\------------------------------------/
Figure 1: End-to-End Signalling and Transport
<span class="h3"><a class="selflink" id="section-4.2" href="#section-4.2">4.2</a>. End-to-End Signalling and Partial Transport over IP</span>
As before, the Information Exchange runs end-to-end between the MN
and the second NN. However, in this scenario, some transport means
other than IP are used from the MN to the first NN, and the transport
over IP is used only between NNs. This is analogous to the use of
EAP end-to-end between Supplicant and Authentication Server, with an
upper-layer multihop protocol, such as Remote Authentication Dial-In
User Service (RADIUS), used as a backhaul transport protocol between
an Access Point and the Authentication Server.
+------+ +------+ +------+
| MN | | NN | | NN |
| | | (EP) | | (EP) |
+------+ +------+ +------+
Information Exchange
<------------------------------------>
(Transport over /------------------\
<--------------->< Transport over IP >
e.g. L2) \------------------/
Figure 2: Partial Transport
<span class="grey">Melia, et al. Informational [Page 5]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-6" ></span>
<span class="grey"><a href="./rfc5164">RFC 5164</a> Mobility Services Transport March 2008</span>
<span class="h3"><a class="selflink" id="section-4.3" href="#section-4.3">4.3</a>. End-to-End Network-to-Network Signalling</span>
In this case, NN to NN signalling is envisioned. Such a model should
allow different network components to gather information from each
other. This is useful for instance in conditions where network
components need to make decisions and instruct mobile terminals of
operations to be executed.
+------+ +------+
| NN | | NN |
| (EP) | | (EP) |
+------+ +------+
Information Exchange
------------------->
<-------------------
/----------------\
< Transport >
\----------------/
Figure 3: Information Exchange between Different NNs
Network nodes exchange information about the status of connected
terminals.
<span class="grey">Melia, et al. Informational [Page 6]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-7" ></span>
<span class="grey"><a href="./rfc5164">RFC 5164</a> Mobility Services Transport March 2008</span>
<span class="h2"><a class="selflink" id="section-5" href="#section-5">5</a>. MoS Transport Protocol Splitting</span>
Figure 4 shows a model where the Information Exchanges are
implemented by a signalling protocol specific to a particular
mobility service, and these are relayed over a generic transport
layer (the Mobility Service Transport Layer).
+----------------+ ^
|Mobility Support| |
| Service 2 | |
+----------------+ | | | Mobility Service
|Mobility Support| +----------------+ | Signaling
| Service 1 | +----------------+ | Layer
| | |Mobility Support| |
+----------------+ | Service 3 | |
| | |
+----------------+ V
================================================
+---------------------------------------+ ^ Mobility Service
| Mobility Service Transport Protocol | | Transport
+---------------------------------------+ V Layer
================================================
+---------------------------------------+
| IP |
+---------------------------------------+
Figure 4: Handover Services over IP
The Mobility Service Transport Layer provides certain functionality
(outlined in <a href="#section-5.2">Section 5.2</a>) to the higher-layer mobility support
services in order to support the exchange of information between
communicating Mobility Service functions. The transport layer
effectively provides a container capability to mobility support
services, as well as any required transport and security operations
required to provide communication, without regard to the protocol
semantics and data carried in the specific Mobility Services.
The Mobility Support Services themselves may also define certain
protocol exchanges to support the exchange of service-specific
information elements. It is likely that the responsibility for
defining the contents and significance of the information elements is
the responsibility of standards bodies other than the IETF. Example
Mobility Services include the Information Services, Event Services,
and Command Services.
<span class="grey">Melia, et al. Informational [Page 7]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-8" ></span>
<span class="grey"><a href="./rfc5164">RFC 5164</a> Mobility Services Transport March 2008</span>
<span class="h3"><a class="selflink" id="section-5.1" href="#section-5.1">5.1</a>. Payload Formats and Extensibility Considerations</span>
The format of the Mobility Service Transport Protocol (MSTP) is as
follows:
+----------------+----------------------------------------+
|Mobility Service| Opaque Payload |
|Transport Header| (Mobility Support Service) |
+----------------+----------------------------------------+
Figure 5: Protocol Structure
This figure shows the case for an MIH message that is smaller than
the MTU of the path to the destination. A larger payload may require
the transport protocol to transparently fragment and reassemble the
MIH message.
The opaque payload encompasses the Mobility Support Service (MSTP)
information that is to be transported. The definition of the
Mobility Service Transport Header is something that is best addressed
within the IETF. MSTP does not inspect the payload, and any required
information will be provided by the MSTP users.
<span class="h3"><a class="selflink" id="section-5.2" href="#section-5.2">5.2</a>. Requirements on the Mobility Service Transport Layer</span>
The following section outlines some of the general transport
requirements that should be supported by the Mobility Service
Transport Protocol. Analysis has suggested that at least the
following need to be taken into account:
Discovery: MNs need the ability to either discover nodes that
support certain services or discover services provided by a
certain node. The service discovery can be dealt with using
messages as defined in [<a href="#ref-1" title=""Draft IEEE Standard for Local and Metropolitan Area Networks: Media Independent Handover Services"">1</a>]. This section refers to node-discovery
in either scenario. There are no assumptions about the location
of these Mobility Service nodes within the network. Therefore,
the discovery mechanism needs to operate across administrative
boundaries. Issues such as speed of discovery, protection against
spoofing, when discovery needs to take place, and the length of
time over which the discovery information may remain valid; all
need to be considered. Approaches include:
* Hard coding information into the MN, indicating either the IP
address of the NN, or information about the NN that can be
resolved onto an IP address. The configuration information
could be managed dynamically, but assumes that the NN is
independent of the access network to which the MN is currently
attached.
<span class="grey">Melia, et al. Informational [Page 8]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-9" ></span>
<span class="grey"><a href="./rfc5164">RFC 5164</a> Mobility Services Transport March 2008</span>
* Pushing information to the MN, where the information is
delivered to the MN as part of other configuration operations,
for example, via DHCP or Router Discovery exchange. The
benefit of this approach is that no additional exchanges with
the network would be required, but the limitations associated
with modifying these protocols may limit applicability of the
solution.
* MN dynamically requesting information about a node, which may
require both MN and NN support for a particular service
discovery mechanism. This may require additional support by
the access network (e.g., multicast or anycast) even when it
may not be supporting the service directly itself.
Numerous directory and configuration services already exist, and
reuse of these mechanisms may be appropriate. There is an open
question about whether multiple methods of discovery would be
needed, and whether NNs would also need to discover other NNs.
The definition of a service also needs to be determined, including
the granularity of the description. For example, IEEE 802.21
specifies three different types of Mobility Services (Information
Services, Command Services, and Event Services) that can be
located in different portions of the network. An MN could
therefore run a discovery procedure of any service running in the
(home or visited) network or could run a discovery procedure for a
specific service.
Information from a trusted source: The MN uses the Mobility Service
information to make decisions about what steps to take next. It
is essential that there is some way to ensure that the information
received is from a trustworthy source. This requirement should
reuse trust relationships that have already been established in
the network, for example, on the relationships established by the
Authentication, Authorization, and Accounting (AAA) infrastructure
after a mutual authentication, or on the certificate
infrastructure required to support SEND [<a href="#ref-10" title=""SEcure Neighbor Discovery (SEND)"">10</a>]. <a href="#section-6">Section 6</a> provides
a more complete analysis.
Security association management: A common security association
negotiation method, independent of any specific MSTP user, should
be implemented between the endpoints of the MSTP. The solution
must also work in the case of MN mobility.
Secure delivery: The Mobility Service information must be delivered
securely (integrity and confidentiality) between trusted peers,
where the transport may pass though untrusted intermediate nodes
and networks. The Mobility Service information should also be
protected against replay attacks and denial-of-service attacks.
<span class="grey">Melia, et al. Informational [Page 9]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-10" ></span>
<span class="grey"><a href="./rfc5164">RFC 5164</a> Mobility Services Transport March 2008</span>
Low latency: Some of the Mobility Services generate time-sensitive
information. Therefore, there is a need to deliver the
information over quite short timescales, and the required lifetime
of a connection might be quite short-lived. As an example, the
frequency of messages defined in [<a href="#ref-1" title=""Draft IEEE Standard for Local and Metropolitan Area Networks: Media Independent Handover Services"">1</a>] varies according to the MIH
service type. It is expected that Events and Commands messages
arrive at an interval of hundreds of milliseconds in order to
capture quick changes in the environment and/or process handover
commands. On the other hand, Information Service messages are
mainly exchanged each time a new network is visited that may be in
the order of hours or days. For reliable delivery, short-lived
connections could be set up as needed, although there is a
connection setup latency associated with this approach.
Alternatively, a long-lived connection could be used, but this
requires advanced warning of being needed and some way to maintain
the state associated with the connection. It also assumes that
the relationships between devices supporting the mobility service
are fairly stable. Another alternative is connectionless
operation, but this has interactions with other requirements, such
as reliable delivery.
Reliability: Reliable delivery for some of the Mobility Services may
be essential, but it is difficult to trade this off against the
low latency requirement. It is also quite difficult to design a
robust, high-performance mechanism that can operate in
heterogeneous environments, especially one where the link
characteristics can vary quite dramatically. There are two main
approaches that could be adopted:
1. Assume the transport cannot be guaranteed to support reliable
delivery. In this case, the Mobility Support Service itself
will have to provide a reliability mechanism (at the MIH level)
to allow communicating endpoints to acknowledge receipt of
information.
2. Assume the underlying transport will provide reliable delivery.
There is no need in this case to provide reliability at the MIH
level.
Guidelines provided in [<a href="#ref-3" title=""UDP Usage Guidelines for Application Designers"">3</a>] are being considered while writing this
document.
Congestion Control: A Mobility Service may wish to transfer small or
large amounts of data, placing different requirements for
congestion control in the transport. As an example, the MIH
message [<a href="#ref-1" title=""Draft IEEE Standard for Local and Metropolitan Area Networks: Media Independent Handover Services"">1</a>] size varies widely from about 30 bytes (for a
broadcast capability discovery request) to be normally less than
64 KB, but may be greater than 64KB (for an IS MIH_Get_Information
<span class="grey">Melia, et al. Informational [Page 10]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-11" ></span>
<span class="grey"><a href="./rfc5164">RFC 5164</a> Mobility Services Transport March 2008</span>
response primitive). A typical MIH message size for the Events
and Commands Services service ranges between 50 to 100 bytes. The
solution should consider different congestion control mechanisms
depending on the amount of data generated by the application (MIH)
as suggested in [<a href="#ref-3" title=""UDP Usage Guidelines for Application Designers"">3</a>].
Fragmentation and reassembly: ES and CS messages are small in
nature, are sent frequently, and may wish trade reliability in
order to satisfy the tight latency requirements. On the other
hand, IS messages are more resilient in terms of latency
constraints, and some long IS messages could exceed the MTU of the
path to the destination. Depending on the choice of the transport
protocol, different fragmentation and reassembly strategies are
required.
Multihoming: For some Information Services exchanged with the MN,
there is a possibility that the request and response messages
could be carried over two different links. For example, a
handover command request is on the current link while the response
could be delivered on the new link. It is expected that the
transport protocol is capable of receiving information via
multiple links. It is also expected that the MSTP user combines
information belonging to the same session/transaction. When
mobility is applied, the underlying IP mobility mechanism should
provide session continuity when required.
IPv4 and IPv6 support: The MSTP must support both IPv4 and IPv6
including NAT traversal for IPv4 networks and firewall
pass-through for IPv4 and IPv6 networks.
<span class="h2"><a class="selflink" id="section-6" href="#section-6">6</a>. Security Considerations</span>
Network-supported Mobility Services aim at improving decision making
and management of dynamically connected hosts.
Information Services may not require authorization of the client, but
both Event and Command Services may authenticate message sources,
particularly if they are mobile. Network-side service entities will
typically need to provide proof of authority to serve visiting
devices. Where signalling or radio operations can result from
received messages, significant disruption may result from processing
bogus or modified messages. The effect of processing bogus messages
depends largely upon the content of the message payload, which is
handled by the handover services application. Regardless of the
variation in effect, message delivery mechanisms need to provide
protection against tampering, spoofing, and replay attacks.
<span class="grey">Melia, et al. Informational [Page 11]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-12" ></span>
<span class="grey"><a href="./rfc5164">RFC 5164</a> Mobility Services Transport March 2008</span>
Sensitive and identifying information about a mobile device may be
exchanged during handover-service message exchange. Since handover
decisions are to be made based upon message exchanges, it may be
possible to trace a user's movement between cells, or predict future
movements, by inspecting handover service messages. In order to
prevent such tracking, message confidentiality and message integrity
should be available. This is particularly important because many
mobile devices are associated with only one user, since divulging of
such information may violate the user's privacy. Additionally,
identifying information may be exchanged during security association
construction. As this information may be used to trace users across
cell boundaries, identity protection should be available, if
possible, when establishing source addresses (SAs).
In addition, the user should not have to disclose its identity to the
network (anymore than it needed to during authentication) in order to
access the Mobility Support Services. For example, if the local
network is just aware that an anonymous user with a subscription to
"example.com" is accessing the network, the user should not have to
divulge their true identity in order to access the Mobility Support
Services available locally.
Finally, the NNs themselves will potentially be subject to
denial-of-service attacks from MNs, and these problems will be
exacerbated if operation of the Mobility Service protocols imposes a
heavy computational load on the NNs. The overall design has to
consider at what stage (e.g., discovery, transport layer
establishment, and service-specific protocol exchange) denial-of-
service prevention or mitigation should be built in.
<span class="h2"><a class="selflink" id="section-7" href="#section-7">7</a>. Conclusions</span>
This document outlined a broad problem statement for the signalling
of information elements across a network to support Mobility
Services. In order to enable this type of signalling service, a need
for a generic transport solution with certain transport and security
properties was outlined. Whilst the motivation for considering this
problem has come from work within IEEE 802.21, a desirable goal is to
ensure that solutions to this problem are applicable to a wider range
of Mobility Services.
It would be valuable to establish realistic performance goals for the
solution to this common problem (i.e., transport and security
aspects) using experience from previous IETF work in this area and
knowledge about feasible deployment scenarios. This information
could then be used as an input to other standards bodies in assisting
them to design Mobility Services with feasible performance
requirements.
<span class="grey">Melia, et al. Informational [Page 12]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-13" ></span>
<span class="grey"><a href="./rfc5164">RFC 5164</a> Mobility Services Transport March 2008</span>
Much of the functionality required for this problem is available from
existing IETF protocols or combination thereof. This document takes
no position on whether an existing protocol can be adapted for the
solution or whether new protocol development is required. In either
case, we believe that the appropriate skills for development of
protocols in this area lie in the IETF.
<span class="h2"><a class="selflink" id="section-8" href="#section-8">8</a>. Acknowledgements</span>
Thanks to Subir Das, Juan Carlos Zuniga, Robert Hancock, and
Yoshihiro Ohba for their input. Thanks to the IEEE 802.21 chair,
Vivek Gupta, for coordinating the work and supporting the IETF
liaison. Thanks to all IEEE 802.21 WG folks who contributed to this
document indirectly.
<span class="h2"><a class="selflink" id="section-9" href="#section-9">9</a>. References</span>
<span class="h3"><a class="selflink" id="section-9.1" href="#section-9.1">9.1</a>. Normative References</span>
[<a id="ref-1">1</a>] "Draft IEEE Standard for Local and Metropolitan Area Networks:
Media Independent Handover Services", IEEE LAN/MAN Draft IEEE
P802.21/D07.00, July 2007.
[<a id="ref-2">2</a>] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", <a href="https://www.rfc-editor.org/bcp/bcp14">BCP 14</a>, <a href="./rfc2119">RFC 2119</a>, March 1997.
<span class="h3"><a class="selflink" id="section-9.2" href="#section-9.2">9.2</a>. Informative References</span>
[<a id="ref-3">3</a>] Eggert, L. and G. Fairhurst, "UDP Usage Guidelines for
Application Designers", Work in Progress.
[<a id="ref-4">4</a>] 3GPP, "3GPP system architecture evolution (SAE): Report on
technical options and conclusions", 3GPP TR 23.882 0.10.1,
February 2006.
[<a id="ref-5">5</a>] Perkins, C., Ed., "IP Mobility Support for IPv4", <a href="./rfc3344">RFC 3344</a>,
August 2002.
[<a id="ref-6">6</a>] Johnson, D., Perkins, C., and J. Arkko, "Mobility Support in
IPv6", <a href="./rfc3775">RFC 3775</a>, June 2004.
[<a id="ref-7">7</a>] Moskowitz, R. and P. Nikander, "Host Identity Protocol (HIP)
Architecture", <a href="./rfc4423">RFC 4423</a>, May 2006.
[<a id="ref-8">8</a>] Eronen, P., "IKEv2 Mobility and Multihoming Protocol
(MOBIKE)", <a href="./rfc4555">RFC 4555</a>, June 2006.
<span class="grey">Melia, et al. Informational [Page 13]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-14" ></span>
<span class="grey"><a href="./rfc5164">RFC 5164</a> Mobility Services Transport March 2008</span>
[<a id="ref-9">9</a>] Koodli, R., Ed., "Fast Handovers for Mobile IPv6", <a href="./rfc4068">RFC 4068</a>,
July 2005.
[<a id="ref-10">10</a>] Arkko, J., Ed., Kempf, J., Zill, B., and P. Nikander, "SEcure
Neighbor Discovery (SEND)", <a href="./rfc3971">RFC 3971</a>, March 2005.
Contributors' Addresses
Eleanor Hepworth
Siemens Roke Manor Research
Roke Manor
Romsey, SO51 5RE
UK
EMail: eleanor.hepworth@roke.co.uk
Srivinas Sreemanthula
Nokia Research Center
6000 Connection Dr.
Irving, TX 75028
USA
EMail: srinivas.sreemanthula@nokia.com
Yoshihiro Ohba
Toshiba America Research, Inc.
1 Telcordia Drive
Piscateway NJ 08854
USA
EMail: yohba@tari.toshiba.com
Vivek Gupta
Intel Corporation
2111 NE 25th Avenue
Hillsboro, OR 97124
USA
Phone: +1 503 712 1754
EMail: vivek.g.gupta@intel.com
<span class="grey">Melia, et al. Informational [Page 14]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-15" ></span>
<span class="grey"><a href="./rfc5164">RFC 5164</a> Mobility Services Transport March 2008</span>
Jouni Korhonen
TeliaSonera Corporation.
P.O.Box 970
FIN-00051 Sonera
FINLAND
Phone: +358 40 534 4455
EMail: jouni.korhonen@teliasonera.com
Rui L.A. Aguiar
Instituto de Telecomunicacoes Universidade de Aveiro
Aveiro 3810
Portugal
Phone: +351 234 377900
EMail: ruilaa@det.ua.pt
Sam(Zhongqi) Xia
Huawei Technologies Co., Ltd
HuaWei Bld., No.3 Xinxi Rd. Shang-Di Information Industry Base
100085
Hai-Dian District Beijing, P.R. China
Phone: +86-10-82836136
EMail: xiazhongqi@huawei.com
Authors' Addresses
Telemaco Melia, Editor
Cisco Systems International Sarl
Avenue des Uttins 5
1180 Rolle
Switzerland (FR)
Phone: +41 21 822718
EMail: tmelia@cisco.com
<span class="grey">Melia, et al. Informational [Page 15]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-16" ></span>
<span class="grey"><a href="./rfc5164">RFC 5164</a> Mobility Services Transport March 2008</span>
Full Copyright Statement
Copyright (C) The IETF Trust (2008).
This document is subject to the rights, licenses and restrictions
contained in <a href="https://www.rfc-editor.org/bcp/bcp78">BCP 78</a>, and except as set forth therein, the authors
retain all their rights.
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Intellectual Property
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in <a href="https://www.rfc-editor.org/bcp/bcp78">BCP 78</a> and <a href="https://www.rfc-editor.org/bcp/bcp79">BCP 79</a>.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
<a href="http://www.ietf.org/ipr">http://www.ietf.org/ipr</a>.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Melia, et al. Informational [Page 16]
</pre>
|