1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789 790 791 792 793 794 795 796 797 798 799 800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 853 854 855 856 857 858 859 860 861 862 863 864 865 866 867 868 869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 884 885 886 887 888 889 890 891 892 893 894 895 896 897 898 899 900 901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925 926 927 928 929 930 931 932 933 934 935 936 937 938 939 940 941 942 943 944 945 946 947 948 949 950 951 952 953 954 955 956 957 958 959 960 961 962 963 964 965 966 967 968 969 970 971 972 973 974 975 976 977 978 979 980 981 982 983 984 985 986 987 988 989 990 991 992 993 994 995 996 997 998 999 1000 1001 1002 1003 1004 1005 1006 1007 1008 1009 1010 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022 1023 1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036 1037 1038 1039 1040 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 1051 1052 1053 1054 1055 1056 1057 1058 1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073 1074 1075 1076 1077 1078 1079 1080 1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094 1095 1096 1097 1098 1099 1100 1101 1102 1103 1104 1105 1106 1107 1108 1109 1110 1111 1112 1113 1114 1115 1116 1117 1118 1119 1120 1121 1122 1123 1124 1125 1126 1127 1128 1129 1130 1131 1132 1133 1134 1135 1136 1137 1138 1139 1140 1141 1142 1143 1144 1145 1146 1147 1148 1149 1150 1151 1152 1153 1154 1155 1156 1157 1158 1159 1160 1161 1162 1163 1164 1165 1166 1167 1168 1169 1170 1171 1172 1173 1174 1175 1176 1177 1178 1179 1180 1181 1182 1183 1184 1185 1186 1187 1188 1189 1190 1191 1192 1193 1194 1195 1196 1197 1198 1199 1200 1201 1202 1203 1204 1205 1206 1207 1208 1209 1210 1211 1212 1213 1214 1215 1216 1217 1218 1219 1220 1221 1222 1223 1224 1225 1226 1227 1228 1229 1230 1231 1232 1233 1234 1235 1236 1237 1238 1239 1240 1241 1242 1243 1244 1245 1246 1247 1248 1249 1250 1251 1252 1253 1254 1255 1256 1257 1258 1259 1260 1261 1262 1263 1264 1265 1266 1267 1268 1269 1270 1271 1272 1273 1274 1275 1276 1277 1278 1279 1280 1281 1282 1283 1284 1285 1286 1287 1288 1289 1290 1291 1292 1293 1294 1295 1296 1297 1298 1299 1300 1301 1302 1303 1304 1305 1306 1307 1308 1309 1310 1311 1312 1313 1314 1315 1316 1317 1318 1319 1320 1321 1322 1323 1324 1325 1326 1327 1328 1329 1330 1331 1332 1333 1334 1335 1336 1337 1338 1339 1340 1341 1342 1343 1344 1345 1346 1347 1348 1349 1350 1351 1352 1353 1354 1355 1356 1357 1358 1359 1360 1361 1362 1363 1364 1365 1366 1367 1368 1369 1370 1371 1372 1373 1374 1375 1376 1377 1378 1379 1380 1381 1382 1383 1384 1385 1386 1387 1388 1389 1390 1391 1392 1393 1394 1395 1396 1397 1398 1399 1400 1401 1402 1403 1404 1405 1406 1407 1408 1409 1410 1411 1412 1413 1414 1415 1416 1417 1418 1419 1420 1421 1422 1423 1424 1425 1426 1427 1428 1429 1430 1431 1432 1433 1434 1435 1436 1437 1438 1439 1440 1441 1442 1443 1444 1445 1446 1447 1448 1449 1450 1451 1452 1453 1454 1455 1456 1457 1458 1459 1460 1461 1462 1463 1464 1465 1466 1467 1468 1469 1470 1471 1472 1473 1474 1475 1476 1477 1478 1479 1480 1481 1482 1483 1484 1485 1486 1487 1488 1489 1490 1491 1492 1493 1494 1495 1496 1497 1498 1499 1500 1501 1502 1503 1504 1505 1506 1507 1508 1509 1510 1511 1512 1513 1514 1515 1516 1517 1518 1519 1520 1521 1522 1523 1524 1525 1526 1527 1528 1529 1530 1531 1532 1533 1534 1535 1536 1537 1538 1539 1540 1541 1542 1543 1544 1545 1546 1547 1548 1549 1550 1551 1552 1553 1554 1555 1556 1557 1558 1559 1560 1561 1562 1563 1564 1565 1566 1567 1568 1569 1570 1571 1572 1573 1574 1575 1576 1577 1578 1579 1580 1581 1582 1583 1584 1585 1586 1587 1588 1589 1590 1591 1592 1593 1594 1595 1596 1597 1598 1599 1600 1601 1602 1603 1604 1605 1606 1607 1608 1609 1610 1611 1612 1613 1614 1615 1616 1617 1618 1619 1620 1621 1622 1623 1624 1625 1626 1627 1628 1629 1630 1631 1632 1633 1634 1635 1636 1637 1638 1639 1640 1641 1642 1643 1644 1645 1646 1647 1648 1649 1650 1651 1652 1653 1654 1655 1656 1657 1658 1659 1660 1661 1662 1663 1664 1665 1666 1667 1668 1669 1670 1671 1672 1673 1674 1675 1676 1677 1678 1679 1680 1681 1682 1683 1684 1685 1686 1687 1688 1689 1690 1691 1692 1693 1694 1695 1696 1697 1698 1699 1700 1701 1702 1703 1704 1705 1706 1707 1708 1709 1710 1711 1712 1713 1714 1715 1716 1717 1718 1719 1720 1721 1722 1723 1724 1725 1726 1727 1728 1729 1730 1731 1732 1733 1734 1735 1736 1737 1738 1739 1740 1741 1742 1743 1744 1745 1746 1747 1748 1749 1750 1751 1752 1753 1754 1755 1756 1757 1758 1759 1760 1761 1762 1763 1764 1765 1766 1767 1768 1769 1770 1771 1772 1773 1774 1775 1776 1777 1778 1779 1780 1781 1782 1783 1784 1785 1786 1787 1788 1789 1790 1791 1792 1793 1794 1795 1796 1797 1798 1799 1800 1801 1802 1803 1804 1805 1806 1807 1808 1809 1810 1811 1812 1813 1814 1815 1816 1817 1818 1819 1820 1821 1822 1823 1824 1825 1826 1827 1828 1829 1830 1831 1832 1833 1834 1835 1836 1837 1838 1839 1840 1841 1842 1843 1844 1845 1846 1847 1848 1849 1850 1851 1852 1853 1854 1855 1856 1857 1858 1859 1860 1861 1862 1863 1864 1865 1866 1867 1868 1869 1870 1871 1872 1873 1874 1875 1876 1877 1878 1879 1880 1881 1882 1883 1884 1885 1886 1887 1888 1889 1890 1891 1892 1893 1894 1895 1896 1897 1898 1899 1900 1901 1902 1903 1904 1905 1906 1907 1908 1909 1910 1911 1912 1913 1914 1915 1916 1917 1918 1919 1920 1921 1922 1923 1924 1925 1926 1927 1928 1929 1930 1931 1932 1933 1934 1935 1936 1937 1938 1939 1940 1941 1942 1943 1944 1945 1946 1947 1948 1949 1950 1951 1952 1953 1954 1955 1956 1957 1958 1959 1960 1961 1962 1963 1964 1965 1966 1967 1968 1969 1970 1971 1972 1973 1974 1975 1976 1977 1978 1979 1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 2021 2022 2023 2024 2025 2026 2027 2028 2029 2030 2031 2032 2033 2034 2035 2036 2037 2038 2039 2040 2041 2042 2043 2044 2045 2046 2047 2048 2049 2050 2051 2052 2053 2054 2055 2056 2057 2058 2059 2060 2061 2062 2063 2064 2065 2066 2067 2068 2069 2070 2071 2072 2073 2074 2075 2076 2077 2078 2079 2080 2081 2082 2083 2084 2085 2086 2087 2088 2089 2090 2091 2092 2093 2094 2095 2096 2097 2098 2099 2100 2101 2102 2103 2104 2105 2106 2107 2108 2109 2110 2111 2112 2113 2114 2115 2116 2117 2118 2119 2120 2121 2122 2123 2124 2125 2126 2127 2128 2129 2130 2131 2132 2133 2134 2135 2136 2137 2138 2139 2140 2141 2142 2143 2144 2145 2146 2147 2148 2149 2150 2151 2152 2153 2154 2155 2156 2157 2158 2159 2160 2161 2162 2163 2164 2165 2166 2167 2168 2169 2170 2171 2172 2173 2174 2175 2176 2177 2178 2179 2180 2181 2182 2183 2184 2185 2186 2187 2188 2189 2190 2191 2192 2193 2194 2195 2196 2197 2198 2199 2200 2201 2202 2203 2204 2205 2206 2207 2208 2209 2210 2211 2212 2213 2214 2215 2216 2217 2218 2219 2220 2221 2222 2223 2224 2225 2226 2227 2228 2229 2230 2231 2232 2233 2234 2235 2236 2237 2238 2239 2240 2241 2242 2243 2244 2245 2246 2247 2248 2249 2250 2251 2252 2253 2254 2255 2256 2257 2258 2259 2260 2261 2262 2263 2264 2265 2266 2267 2268 2269 2270 2271 2272 2273 2274 2275 2276 2277 2278 2279 2280 2281 2282 2283 2284 2285 2286 2287 2288 2289 2290 2291 2292 2293 2294 2295 2296 2297 2298 2299 2300 2301 2302 2303 2304 2305 2306 2307 2308 2309 2310 2311 2312 2313 2314 2315 2316 2317 2318 2319 2320 2321 2322 2323 2324 2325 2326 2327 2328 2329 2330 2331 2332 2333 2334 2335 2336 2337 2338 2339 2340 2341 2342 2343 2344 2345 2346 2347 2348 2349 2350 2351 2352 2353 2354 2355 2356 2357 2358 2359 2360 2361 2362 2363 2364 2365 2366 2367 2368 2369 2370 2371 2372 2373 2374 2375 2376 2377 2378 2379 2380 2381 2382 2383 2384 2385 2386 2387 2388 2389 2390 2391 2392 2393 2394 2395 2396 2397 2398 2399 2400 2401 2402 2403 2404 2405 2406 2407 2408 2409 2410 2411 2412 2413 2414 2415 2416 2417 2418 2419 2420 2421 2422 2423 2424 2425 2426 2427 2428 2429 2430 2431 2432 2433 2434 2435 2436 2437 2438 2439 2440 2441 2442 2443 2444 2445 2446 2447 2448 2449 2450 2451 2452 2453 2454 2455 2456 2457 2458 2459 2460 2461 2462 2463 2464 2465 2466 2467 2468 2469 2470 2471 2472 2473 2474 2475 2476 2477 2478 2479 2480 2481 2482 2483 2484 2485 2486 2487 2488 2489 2490 2491 2492 2493 2494 2495 2496 2497 2498 2499 2500 2501 2502 2503 2504 2505 2506 2507 2508 2509 2510 2511 2512 2513 2514 2515 2516 2517 2518 2519 2520 2521 2522 2523 2524 2525 2526 2527 2528 2529 2530 2531 2532 2533 2534 2535 2536 2537 2538 2539 2540 2541 2542 2543 2544 2545 2546 2547 2548 2549 2550 2551 2552 2553 2554 2555 2556 2557 2558 2559 2560 2561 2562 2563 2564 2565 2566 2567 2568 2569 2570 2571 2572 2573 2574 2575 2576 2577 2578 2579 2580 2581 2582 2583 2584 2585 2586 2587 2588 2589 2590 2591 2592 2593 2594 2595 2596 2597 2598 2599 2600 2601 2602 2603 2604 2605 2606 2607 2608 2609 2610 2611 2612 2613 2614 2615 2616 2617 2618 2619 2620 2621 2622 2623 2624 2625 2626 2627 2628 2629 2630 2631 2632 2633 2634 2635 2636 2637 2638 2639 2640 2641 2642 2643 2644 2645 2646 2647 2648 2649 2650 2651 2652 2653 2654 2655 2656 2657 2658 2659 2660 2661 2662 2663 2664 2665 2666 2667 2668 2669 2670 2671 2672 2673 2674 2675 2676 2677 2678 2679 2680 2681 2682 2683 2684 2685 2686 2687 2688 2689 2690 2691 2692 2693 2694 2695 2696 2697 2698 2699 2700 2701 2702 2703 2704 2705 2706 2707 2708 2709 2710 2711 2712 2713 2714 2715 2716 2717 2718 2719 2720 2721 2722 2723 2724 2725 2726 2727 2728 2729 2730 2731 2732 2733 2734 2735 2736 2737 2738 2739 2740 2741 2742 2743 2744 2745 2746 2747 2748 2749 2750 2751 2752 2753 2754 2755 2756 2757 2758 2759 2760 2761 2762 2763 2764 2765 2766 2767 2768 2769 2770 2771 2772 2773 2774 2775 2776 2777 2778 2779 2780 2781 2782 2783 2784 2785 2786 2787 2788 2789 2790 2791 2792 2793 2794 2795 2796 2797 2798 2799 2800 2801 2802 2803 2804 2805 2806 2807 2808 2809 2810 2811 2812 2813 2814 2815 2816 2817 2818 2819 2820 2821 2822 2823 2824 2825 2826 2827 2828 2829 2830 2831 2832 2833 2834 2835 2836 2837 2838 2839 2840 2841 2842 2843 2844 2845 2846 2847 2848 2849 2850 2851 2852 2853
|
<pre>Network Working Group R. Koodli, Ed.
Request for Comments: 5568 Starent Networks
Obsoletes: <a href="./rfc5268">5268</a> July 2009
Category: Standards Track
<span class="h1">Mobile IPv6 Fast Handovers</span>
Abstract
Mobile IPv6 enables a mobile node (MN) to maintain its connectivity
to the Internet when moving from one Access Router to another, a
process referred to as handover. During handover, there is a period
during which the mobile node is unable to send or receive packets
because of link-switching delay and IP protocol operations. This
"handover latency" resulting from standard Mobile IPv6 procedures
(namely, movement detection, new Care-of Address configuration, and
Binding Update) is often unacceptable to real-time traffic such as
Voice over IP (VoIP). Reducing the handover latency could be
beneficial to non-real-time, throughput-sensitive applications as
well. This document specifies a protocol to improve handover latency
due to Mobile IPv6 procedures. This document does not address
improving the link-switching latency.
This document updates the packet formats for the Handover Initiate
(HI) and Handover Acknowledge (HAck) messages to the Mobility Header
Type.
Status of This Memo
This document specifies an Internet standards track protocol for the
Internet community, and requests discussion and suggestions for
improvements. Please refer to the current edition of the "Internet
Official Protocol Standards" (STD 1) for the standardization state
and status of this protocol. Distribution of this memo is unlimited.
Copyright Notice
Copyright (c) 2009 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to <a href="https://www.rfc-editor.org/bcp/bcp78">BCP 78</a> and the IETF Trust's Legal
Provisions Relating to IETF Documents in effect on the date of
publication of this document (<a href="http://trustee.ietf.org/license-info">http://trustee.ietf.org/license-info</a>).
Please review these documents carefully, as they describe your rights
and restrictions with respect to this document.
<span class="grey">Koodli Standards Track [Page 1]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-2" ></span>
<span class="grey"><a href="./rfc5568">RFC 5568</a> MIP6 Fast Handovers July 2009</span>
Table of Contents
<a href="#section-1">1</a>. Introduction ....................................................<a href="#page-3">3</a>
<a href="#section-2">2</a>. Terminology .....................................................<a href="#page-4">4</a>
<a href="#section-3">3</a>. Protocol Overview ...............................................<a href="#page-6">6</a>
<a href="#section-3.1">3.1</a>. Addressing the Handover Latency ............................<a href="#page-6">6</a>
<a href="#section-3.2">3.2</a>. Protocol Operation .........................................<a href="#page-8">8</a>
<a href="#section-3.3">3.3</a>. Protocol Operation during Network-Initiated Handover ......<a href="#page-11">11</a>
<a href="#section-4">4</a>. Protocol Details ...............................................<a href="#page-12">12</a>
<a href="#section-5">5</a>. Other Considerations ...........................................<a href="#page-16">16</a>
<a href="#section-5.1">5.1</a>. Handover Capability Exchange ..............................<a href="#page-16">16</a>
<a href="#section-5.2">5.2</a>. Determining New Care-of Address ...........................<a href="#page-16">16</a>
<a href="#section-5.3">5.3</a>. Prefix Management .........................................<a href="#page-17">17</a>
<a href="#section-5.4">5.4</a>. Packet Loss ...............................................<a href="#page-17">17</a>
<a href="#section-5.5">5.5</a>. DAD Handling ..............................................<a href="#page-19">19</a>
<a href="#section-5.6">5.6</a>. Fast or Erroneous Movement ................................<a href="#page-19">19</a>
<a href="#section-6">6</a>. Message Formats ................................................<a href="#page-20">20</a>
<a href="#section-6.1">6.1</a>. New Neighborhood Discovery Messages .......................<a href="#page-20">20</a>
6.1.1. Router Solicitation for Proxy Advertisement
(RtSolPr) ..........................................<a href="#page-20">20</a>
<a href="#section-6.1.2">6.1.2</a>. Proxy Router Advertisement (PrRtAdv) ...............<a href="#page-22">22</a>
<a href="#section-6.2">6.2</a>. New Mobility Header Messages ..............................<a href="#page-26">26</a>
<a href="#section-6.2.1">6.2.1</a>. Inter - Access Router Messages .....................<a href="#page-26">26</a>
<a href="#section-6.2.2">6.2.2</a>. Fast Binding Update (FBU) ..........................<a href="#page-29">29</a>
<a href="#section-6.2.3">6.2.3</a>. Fast Binding Acknowledgment (FBack) ................<a href="#page-31">31</a>
<a href="#section-6.3">6.3</a>. Unsolicited Neighbor Advertisement (UNA) ..................<a href="#page-33">33</a>
<a href="#section-6.4">6.4</a>. New Options ...............................................<a href="#page-34">34</a>
<a href="#section-6.4.1">6.4.1</a>. IP Address/Prefix Option ...........................<a href="#page-34">34</a>
<a href="#section-6.4.2">6.4.2</a>. Mobility Header IP Address/Prefix Option ...........<a href="#page-35">35</a>
<a href="#section-6.4.3">6.4.3</a>. Link-Layer Address (LLA) Option ....................<a href="#page-36">36</a>
6.4.4. Mobility Header Link-Layer Address (MH-LLA)
Option .............................................<a href="#page-37">37</a>
<a href="#section-6.4.5">6.4.5</a>. Binding Authorization Data for FMIPv6 (BADF) .......<a href="#page-38">38</a>
<a href="#section-6.4.6">6.4.6</a>. Neighbor Advertisement Acknowledgment (NAACK) ......<a href="#page-39">39</a>
<a href="#section-7">7</a>. Related Protocol and Device Considerations .....................<a href="#page-40">40</a>
<a href="#section-8">8</a>. Evolution from and Compatibility with <a href="./rfc4068">RFC 4068</a> .................<a href="#page-40">40</a>
<a href="#section-9">9</a>. Configurable Parameters ........................................<a href="#page-41">41</a>
<a href="#section-10">10</a>. Security Considerations .......................................<a href="#page-42">42</a>
<a href="#section-10.1">10.1</a>. Peer Authorization Database Entries When Using IKEv2 .....<a href="#page-44">44</a>
<a href="#section-10.2">10.2</a>. Security Policy Database Entries .........................<a href="#page-44">44</a>
<a href="#section-11">11</a>. IANA Considerations ...........................................<a href="#page-45">45</a>
<a href="#section-12">12</a>. Acknowledgments ...............................................<a href="#page-47">47</a>
<a href="#section-13">13</a>. References ....................................................<a href="#page-47">47</a>
<a href="#section-13.1">13.1</a>. Normative References .....................................<a href="#page-47">47</a>
<a href="#section-13.2">13.2</a>. Informative References ...................................<a href="#page-48">48</a>
<a href="#appendix-A">Appendix A</a>. Contributors ..........................................<a href="#page-50">50</a>
<a href="#appendix-B">Appendix B</a>. Changes since <a href="./rfc5268">RFC 5268</a> ................................<a href="#page-50">50</a>
<a href="#appendix-C">Appendix C</a>. Changes since <a href="./rfc4068">RFC 4068</a> ................................<a href="#page-50">50</a>
<span class="grey">Koodli Standards Track [Page 2]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-3" ></span>
<span class="grey"><a href="./rfc5568">RFC 5568</a> MIP6 Fast Handovers July 2009</span>
<span class="h2"><a class="selflink" id="section-1" href="#section-1">1</a>. Introduction</span>
Mobile IPv6 [<a href="./rfc3775" title=""Mobility Support in IPv6"">RFC3775</a>] describes the protocol operations for a mobile
node to maintain connectivity to the Internet during its handover
from one access router to another. These operations involve link-
layer procedures, movement detection, IP address configuration, and
location update. The combined handover latency is often sufficient
to affect real-time applications. Throughput-sensitive applications
can also benefit from reducing this latency. This document describes
a protocol to reduce the handover latency.
This specification addresses the following problems: how to allow a
mobile node to send packets as soon as it detects a new subnet link
and how to deliver packets to a mobile node as soon as its attachment
is detected by the new access router. The protocol defines IP
protocol messages necessary for its operation regardless of link
technology. It does this without depending on specific link-layer
features while allowing link-specific customizations. By definition,
this specification considers handovers that interwork with Mobile IP.
Once attached to its new access router, an MN engages in Mobile IP
operations including Return Routability [<a href="./rfc3775" title=""Mobility Support in IPv6"">RFC3775</a>]. There are no
special requirements for a mobile node to behave differently with
respect to its standard Mobile IP operations.
This specification is applicable when a mobile node has to perform
IP-layer operations as a result of handovers. This specification
does not address improving the link-switching latency. It does not
modify or optimize procedures related to signaling with the home
agent of a mobile node. Indeed, while targeted for Mobile IPv6, it
could be used with any mechanism that allows communication to
continue despite movements. Finally, this specification does not
address bulk movement of nodes using aggregate prefixes.
This document updates the protocol header format for the Handover
Initiate (HI) and Handover Acknowledge (HAck) messages defined in
[<a href="./rfc5268" title=""Mobile IPv6 Fast Handovers"">RFC5268</a>]. Both the Proxy Mobile IPv6 (PMIPv6) protocol [<a href="./rfc5213" title=""Proxy Mobile IPv6"">RFC5213</a>]
and the Mobile IPv6 protocol use Mobility Header (MH) as the type for
carrying signaling related to route updates. Even though the Fast
Handover protocol uses the Mobility Header for mobile node signaling
purposes, it has used ICMP for inter - access router communication.
Specifying Mobility Header for the HI and HAck messages enables
deployment of the protocol alongside PMIP6 and MIP6 protocols; the
reasons that led to this change are captured in <a href="#appendix-B">Appendix B</a>. Hence,
this document specifies the Mobility Header formats for HI and HAck
messages (<a href="#section-6.2.1">Section 6.2.1</a>) and the Mobility Header option format for
the IPv6 Address/Prefix option (<a href="#section-6.4.2">Section 6.4.2</a>), and deprecates the
use of ICMP for HI and HAck messages. Implementations of this
specification MUST NOT send ICMPv6 HI and HAck messages as defined in
<span class="grey">Koodli Standards Track [Page 3]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-4" ></span>
<span class="grey"><a href="./rfc5568">RFC 5568</a> MIP6 Fast Handovers July 2009</span>
[<a href="./rfc5268" title=""Mobile IPv6 Fast Handovers"">RFC5268</a>]. If implementations of this specification receive ICMPv6
HI and HAck messages as defined in [<a href="./rfc5268" title=""Mobile IPv6 Fast Handovers"">RFC5268</a>], they MAY interpret the
messages as defined in [<a href="./rfc5268" title=""Mobile IPv6 Fast Handovers"">RFC5268</a>].
<span class="h2"><a class="selflink" id="section-2" href="#section-2">2</a>. Terminology</span>
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in <a href="./rfc2119">RFC 2119</a> [<a href="./rfc2119" title=""Key words for use in RFCs to Indicate Requirement Levels"">RFC2119</a>].
The use of the term, "silently ignore" is not defined in <a href="./rfc2119">RFC 2119</a>.
However, the term is used in this document and can be similarly
construed.
The following terminology and abbreviations are used in this document
in addition to those defined in [<a href="./rfc3775" title=""Mobility Support in IPv6"">RFC3775</a>]. The reference handover
scenario is illustrated in Figure 1.
v +--------------+
+-+ | Previous | <
| | ------------ | Access | ------- >-----\
+-+ | Router | < \
MN | (PAR) | \
| +--------------+ +---------------+
| ^ IP | Correspondent |
| | Network | Node |
V | +---------------+
v /
v +--------------+ /
+-+ | New | < /
| | ------------ | Access | ------- >-----/
+-+ | Router | <
MN | (NAR) |
+--------------+
Figure 1: Reference Scenario for Handover
Mobile Node (MN): A Mobile IPv6 host.
Access Point (AP): A Layer 2 device connected to an IP subnet that
offers wireless connectivity to an MN. An Access Point Identifier
(AP-ID) refers the AP's L2 address. Sometimes, AP-ID is also
referred to as a Basic Service Set IDentifier (BSSID).
Access Router (AR): The MN's default router.
Previous Access Router (PAR): The MN's default router prior to its
handover.
<span class="grey">Koodli Standards Track [Page 4]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-5" ></span>
<span class="grey"><a href="./rfc5568">RFC 5568</a> MIP6 Fast Handovers July 2009</span>
New Access Router (NAR): The MN's anticipated default router
subsequent to its handover.
Previous CoA (PCoA): The MN's Care-of Address valid on PAR's
subnet.
New CoA (NCoA): The MN's Care-of Address valid on NAR's subnet.
Handover: A process of terminating existing connectivity and
obtaining new IP connectivity.
Router Solicitation for Proxy Advertisement (RtSolPr): A message
from the MN to the PAR requesting information for a potential
handover.
Proxy Router Advertisement (PrRtAdv): A message from the PAR to
the MN that provides information about neighboring links
facilitating expedited movement detection. The message can also
act as a trigger for network-initiated handover.
[AP-ID, AR-Info] tuple: Contains an access router's L2 and IP
addresses, and prefix valid on the interface to which the Access
Point (identified by AP-ID) is attached. The triplet [Router's L2
address, Router's IP address, and Prefix] is called "AR-Info".
See also <a href="#section-5.3">Section 5.3</a>.
Neighborhood Discovery: The process of resolving neighborhood AP-
IDs to AR-Info.
Assigned Addressing: A particular type of NCoA configuration in
which the NAR assigns an IPv6 address for the MN. The method by
which the NAR manages its address pool is not specified in this
document.
Fast Binding Update (FBU): A message from the MN instructing its
PAR to redirect its traffic (toward NAR).
Fast Binding Acknowledgment (FBack): A message from the PAR in
response to an FBU.
Predictive Fast Handover: The fast handover in which an MN is able
to send an FBU when it is attached to the PAR, which then
establishes forwarding for its traffic (even before the MN
attaches to the NAR).
Reactive Fast Handover: The fast handover in which an MN is able
to send the FBU only after attaching to the NAR.
<span class="grey">Koodli Standards Track [Page 5]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-6" ></span>
<span class="grey"><a href="./rfc5568">RFC 5568</a> MIP6 Fast Handovers July 2009</span>
Unsolicited Neighbor Advertisement (UNA): The message in [<a href="./rfc4861" title=""Neighbor Discovery for IP version 6 (IPv6)"">RFC4861</a>]
with 'O' bit cleared.
Fast Neighbor Advertisement (FNA): This message from <a href="./rfc4068">RFC 4068</a>
[<a href="./rfc4068" title=""Fast Handovers for Mobile IPv6"">RFC4068</a>] is deprecated. The UNA message above is the preferred
message in this specification.
Handover Initiate (HI): A message from the PAR to the NAR
regarding an MN's handover.
Handover Acknowledge (HAck): A message from the NAR to the PAR as
a response to HI.
<span class="h2"><a class="selflink" id="section-3" href="#section-3">3</a>. Protocol Overview</span>
<span class="h3"><a class="selflink" id="section-3.1" href="#section-3.1">3.1</a>. Addressing the Handover Latency</span>
The ability to immediately send packets from a new subnet link
depends on the "IP connectivity" latency, which in turn depends on
the movement detection latency and the new CoA configuration latency.
Once an MN is IP-capable on the new subnet link, it can send a
Binding Update to its Home Agent and one or more correspondents.
Once its correspondents process the Binding Update successfully,
which typically involves the Return Routability procedure, the MN can
receive packets at the new CoA. So, the ability to receive packets
from correspondents directly at its new CoA depends on the Binding
Update latency as well as the IP connectivity latency.
The protocol enables an MN to quickly detect that it has moved to a
new subnet by providing the new access point and the associated
subnet prefix information when the MN is still connected to its
current subnet (i.e., PAR in Figure 1). For instance, an MN may
discover available access points using link-layer-specific mechanisms
(e.g., a "scan" in a Wireless Local Area Network (WLAN)) and then
request subnet information corresponding to one or more of those
discovered access points. The MN may do this after performing router
discovery or at any time while connected to its current router. The
result of resolving an identifier associated with an access point is
an [AP-ID, AR-Info] tuple, which an MN can use in readily detecting
movement. When attachment to an access point with AP-ID takes place,
the MN knows the corresponding new router's coordinates including its
prefix, IP address, and L2 address. The "Router Solicitation for
Proxy Advertisement (RtSolPr)" and "Proxy Router Advertisement
(PrRtAdv)" messages in <a href="#section-6.1">Section 6.1</a> are used for aiding movement
detection.
<span class="grey">Koodli Standards Track [Page 6]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-7" ></span>
<span class="grey"><a href="./rfc5568">RFC 5568</a> MIP6 Fast Handovers July 2009</span>
Through the RtSolPr and PrRtAdv messages, the MN also formulates a
prospective new CoA (NCoA) when it is still present on the PAR's
link. Hence, the latency due to new prefix discovery subsequent to
handover is eliminated. Furthermore, this prospective address can be
used immediately after attaching to the new subnet link (i.e., NAR's
link) when the MN has received a "Fast Binding Acknowledgment
(FBack)" (see <a href="#section-6.2.3">Section 6.2.3</a>) message prior to its movement. In the
event it moves without receiving an FBack, the MN can still start
using NCoA after announcing its attachment through an unsolicited
Neighbor Advertisement message (with the 'O' bit set to zero)
[<a href="./rfc4861" title=""Neighbor Discovery for IP version 6 (IPv6)"">RFC4861</a>]; NAR responds to this UNA message in case it wishes to
provide a different IP address to use. In this way, NCoA
configuration latency is reduced.
The information provided in the PrRtAdv message can be used even when
DHCP [<a href="./rfc3315" title=""Dynamic Host Configuration Protocol for IPv6 (DHCPv6)"">RFC3315</a>] is used to configure an NCoA on the NAR's link. In
this case, the protocol supports forwarding using PCoA, and the MN
performs DHCP once it attaches to the NAR's link. The MN still
formulates an NCoA for FBU processing; however, it MUST NOT send data
packets using the NCoA in the FBU.
In order to reduce the Binding Update latency, the protocol specifies
a binding between the Previous CoA (PCoA) and NCoA. An MN sends a
"Fast Binding Update" (see <a href="#section-6.2.2">Section 6.2.2</a>) message to its Previous
Access Router to establish this tunnel. When feasible, the MN SHOULD
send an FBU from the PAR's link. Otherwise, the MN should send the
FBU immediately after detecting attachment to the NAR. An FBU
message MUST contain the Binding Authorization Data for FMIPv6 (BADF)
option (see <a href="#section-6.4.5">Section 6.4.5</a>) in order to ensure that only a legitimate
MN that owns the PCoA is able to establish a binding. Subsequent
sections describe the protocol mechanics. In any case, the result is
that the PAR begins tunneling packets arriving for PCoA to NCoA.
Such a tunnel remains active until the MN completes the Binding
Update with its correspondents. In the opposite direction, the MN
SHOULD reverse tunnel packets to the PAR, again until it completes
the Binding Update. And, PAR MUST forward the inner packet in the
tunnel to its destination (i.e., to the MN's correspondent). Such a
reverse tunnel ensures that packets containing a PCoA as a source IP
address are not dropped due to ingress filtering. Even though the MN
is IP-capable on the new link, it cannot use the NCoA directly with
its correspondents without the correspondents first establishing a
binding cache entry (for the NCoA). Forwarding support for the PCoA
is provided through a reverse tunnel between the MN and the PAR.
Setting up a tunnel alone does not ensure that the MN receives
packets as soon as it is attached to a new subnet link, unless the
NAR can detect the MN's presence. A neighbor discovery operation
involving a neighbor's address resolution (i.e., Neighbor
<span class="grey">Koodli Standards Track [Page 7]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-8" ></span>
<span class="grey"><a href="./rfc5568">RFC 5568</a> MIP6 Fast Handovers July 2009</span>
Solicitation and Neighbor Advertisement) typically results in
considerable delay, sometimes lasting multiple seconds. For
instance, when arriving packets trigger the NAR to send Neighbor
Solicitation before the MN attaches, subsequent retransmissions of
address resolution are separated by a default period of one second
each. In order to circumvent this delay, an MN announces its
attachment immediately with an UNA message that allows the NAR to
forward packets to the MN right away. Through tunnel establishment
for PCoA and fast advertisement, the protocol provides expedited
forwarding of packets to the MN.
The protocol also provides the following important functionalities.
The access routers can exchange messages to confirm that a proposed
NCoA is acceptable. For instance, when an MN sends an FBU from the
PAR's link, FBack can be delivered after the NAR considers the NCoA
acceptable for use. This is especially useful when addresses are
assigned by the access router. The NAR can also rely on its trust
relationship with the PAR before providing forwarding support for the
MN. That is, it may create a forwarding entry for the NCoA, subject
to "approval" from the PAR, which it trusts. In addition, buffering
for handover traffic at the NAR may be desirable. Even though the
Neighbor Discovery protocol provides a small buffer (typically one or
two packets) for packets awaiting address resolution, this buffer may
be inadequate for traffic, such as VoIP, already in progress. The
routers may also wish to maintain a separate buffer for servicing the
handover traffic. Finally, the access routers could transfer
network-resident contexts, such as access control, Quality of Service
(QoS), and header compression, in conjunction with handover (although
the context transfer process itself is not specified in this
document). For all these operations, the protocol provides "Handover
Initiate (HI)" and "Handover Acknowledge (HAck)" messages (see
<a href="#section-6.2.1">Section 6.2.1</a>). Both of these messages SHOULD be used. The access
routers MUST have the necessary security association established by
means outside the scope of this document.
<span class="h3"><a class="selflink" id="section-3.2" href="#section-3.2">3.2</a>. Protocol Operation</span>
The protocol begins when an MN sends an RtSolPr message to its access
router to resolve one or more Access Point Identifiers to subnet-
specific information. In response, the access router (e.g., PAR in
Figure 1) sends a PrRtAdv message containing one or more [AP-ID,
AR-Info] tuples. The MN may send an RtSolPr at any convenient time,
for instance as a response to some link-specific event (a "trigger")
or simply after performing router discovery. However, the
expectation is that prior to sending an RtSolPr, the MN will have
discovered the available APs by link-specific methods. The RtSolPr
and PrRtAdv messages do not establish any state at the access router;
their packet formats are defined in <a href="#section-6.1">Section 6.1</a>.
<span class="grey">Koodli Standards Track [Page 8]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-9" ></span>
<span class="grey"><a href="./rfc5568">RFC 5568</a> MIP6 Fast Handovers July 2009</span>
With the information provided in the PrRtAdv message, the MN
formulates a prospective NCoA and sends an FBU message to the PAR.
The purpose of the FBU is to authorize the PAR to bind the PCoA to
the NCoA, so that arriving packets can be tunneled to the new
location of the MN. The FBU should be sent from the PAR's link
whenever feasible. For instance, an internal link-specific trigger
could enable FBU transmission from the previous link.
When it is not feasible, the FBU is sent from the new link.
The format and semantics of FBU processing are specified in
<a href="#section-6.2.2">Section 6.2.2</a>. The FBU message MUST contain the BADF option (see
<a href="#section-6.4.5">Section 6.4.5</a>) to secure the message.
Depending on whether an FBack is received on the previous link (which
clearly depends on whether the FBU was sent in the first place),
there are two modes of operation.
1. The MN receives FBack on the previous link. This means that
packet tunneling is already in progress by the time the MN
handovers to the NAR. The MN SHOULD send the UNA immediately
after attaching to the NAR, so that arriving as well as buffered
packets can be forwarded to the MN right away. Before sending
FBack to the MN, the PAR can determine whether the NCoA is
acceptable to the NAR through the exchange of HI and HAck
messages. When Assigned Addressing (i.e., addresses are assigned
by the router) is used, the proposed NCoA in the FBU is carried
in an HI message (from PAR to NAR), and NAR MAY assign the
proposed NCoA. Such an assigned NCoA MUST be returned in HAck
(from NAR to PAR), and PAR MUST in turn provide the assigned NCoA
in FBack. If there is an assigned NCoA returned in FBack, the MN
MUST use the assigned address (and not the proposed address in
FBU) upon attaching to NAR.
2. The MN does not receive the FBack on the previous link because
the MN has not sent the FBU or the MN has left the link after
sending the FBU (which itself may be lost), but before receiving
an FBack. Without receiving an FBack in the latter case, the MN
cannot ascertain whether the PAR has processed the FBU
successfully. Hence, the MN (re)sends the FBU message to the PAR
immediately after sending the UNA message. If the NAR chooses to
supply a different IP address to use than the NCoA, it MAY send a
Router Advertisement with the "Neighbor Advertisement Acknowledge
(NAACK)" option in which it includes an alternate IP address for
the MN to use. Detailed UNA processing rules are specified in
<a href="#section-6.3">Section 6.3</a>.
<span class="grey">Koodli Standards Track [Page 9]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-10" ></span>
<span class="grey"><a href="./rfc5568">RFC 5568</a> MIP6 Fast Handovers July 2009</span>
The scenario in which an MN sends an FBU and receives an FBack on
PAR's link is illustrated in Figure 2. For convenience, this
scenario is characterized as the "predictive" mode of operation. The
scenario in which the MN sends an FBU from the NAR's link is
illustrated in Figure 3. For convenience, this scenario is
characterized as the "reactive" mode of operation. Note that the
reactive mode also includes the case in which an FBU has been sent
from the PAR's link, but an FBack has not yet been received. The
figure is intended to illustrate that the FBU is forwarded through
the NAR, but it is processed only by the PAR.
MN PAR NAR
| | |
|------RtSolPr------->| |
|<-----PrRtAdv--------| |
| | |
|------FBU----------->|----------HI--------->|
| |<--------HAck---------|
| <--FBack---|--FBack---> |
| | |
disconnect forward |
| packets ===============>|
| | |
| | |
connect | |
| | |
|------------UNA --------------------------->|
|<=================================== deliver packets
| |
Figure 2: Predictive Fast Handover
<span class="grey">Koodli Standards Track [Page 10]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-11" ></span>
<span class="grey"><a href="./rfc5568">RFC 5568</a> MIP6 Fast Handovers July 2009</span>
MN PAR NAR
| | |
|------RtSolPr------->| |
|<-----PrRtAdv--------| |
| | |
disconnect | |
| | |
| | |
connect | |
|-------UNA-----------|--------------------->|
|-------FBU-----------|---------------------)|
| |<-------FBU----------)|
| |----------HI--------->|
| |<-------HAck----------|
| |(HI/HAck if necessary)|
| forward |
| packets(including FBAck)=====>|
| | |
|<=================================== deliver packets
| |
Figure 3: Reactive Fast Handover
Finally, the PrRtAdv message may be sent unsolicited, i.e., without
the MN first sending an RtSolPr. This mode is described in
<a href="#section-3.3">Section 3.3</a>.
<span class="h3"><a class="selflink" id="section-3.3" href="#section-3.3">3.3</a>. Protocol Operation during Network-Initiated Handover</span>
In some wireless technologies, the handover control may reside in the
network even though the decision to undergo handover may be mutually
arrived at between the MN and the network. In such networks, the PAR
can send an unsolicited PrRtAdv containing the link-layer address, IP
address, and subnet prefix of the NAR when the network decides that a
handover is imminent. The MN MUST process this PrRtAdv to configure
a new Care-of Address on the new subnet, and MUST send an FBU to the
PAR prior to switching to the new link. After transmitting PrRtAdv,
the PAR MUST continue to forward packets to the MN on its current
link until the FBU is received. The rest of the operation is the
same as that described in <a href="#section-3.2">Section 3.2</a>.
The unsolicited PrRtAdv also allows the network to inform the MN
about geographically adjacent subnets without the MN having to
explicitly request that information. This can reduce the amount of
wireless traffic required for the MN to obtain a neighborhood
topology map of links and subnets. Such usage of PrRtAdv is
decoupled from the actual handover; see <a href="#section-6.1.2">Section 6.1.2</a>.
<span class="grey">Koodli Standards Track [Page 11]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-12" ></span>
<span class="grey"><a href="./rfc5568">RFC 5568</a> MIP6 Fast Handovers July 2009</span>
<span class="h2"><a class="selflink" id="section-4" href="#section-4">4</a>. Protocol Details</span>
All descriptions refer to Figure 1.
After discovering one or more nearby access points, the MN sends
RtSolPr to the PAR in order to resolve access point identifiers to
subnet router information. A convenient time to do this is after
performing router discovery. However, the MN can send RtSolPr at any
time, e.g., when one or more new access points are discovered. The
MN can also send RtSolPr more than once during its attachment to PAR.
The trigger for sending RtSolPr can originate from a link-specific
event, such as the promise of a better signal strength from another
access point coupled with fading signal quality with the current
access point. Such events, often broadly referred to as "L2
triggers", are outside the scope of this document. Nevertheless,
they serve as events that invoke this protocol. For instance, when a
"link up" indication is obtained on the new link, protocol messages
(e.g., UNA) can be transmitted immediately. Implementations SHOULD
make use of such triggers whenever available.
The RtSolPr message contains one or more AP-IDs. A wildcard requests
all available tuples.
As a response to RtSolPr, the PAR sends a PrRtAdv message that
indicates one of the following possible conditions.
1. If the PAR does not have an entry corresponding to the new access
point, it MUST respond indicating that the new access point is
unknown. The MN MUST stop fast handover protocol operations on
the current link. The MN MAY send an FBU from its new link.
2. If the new access point is connected to the PAR's current
interface (to which the MN is attached), the PAR MUST respond
with a Code value indicating that the new access point is
connected to the current interface, but not send any prefix
information. This scenario could arise, for example, when
several wireless access points are bridged into a wired network.
No further protocol action is necessary.
3. If the new access point is known and the PAR has information
about it, then the PAR MUST respond indicating that the new
access point is known and supply the [AP-ID, AR-Info] tuple. If
the new access point is known, but does not support fast
handover, the PAR MUST indicate this with Code 3 (see
<a href="#section-6.1.2">Section 6.1.2</a>).
<span class="grey">Koodli Standards Track [Page 12]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-13" ></span>
<span class="grey"><a href="./rfc5568">RFC 5568</a> MIP6 Fast Handovers July 2009</span>
4. If a wildcard is supplied as an identifier for the new access
point, the PAR SHOULD supply neighborhood [AP-ID, AR-Info] tuples
that are subject to path MTU restrictions (i.e., provide any 'n'
tuples without exceeding the link MTU).
When further protocol action is necessary, some implementations MAY
choose to begin buffering copies of incoming packets at the PAR. If
such First In First Out (FIFO) buffering is used, the PAR MUST
continue forwarding the packets to the PCoA (i.e., buffer and
forward). While the protocol does not forbid such an implementation
support, care must be taken to ensure that the PAR continues
forwarding packets to the PCoA (i.e., uses a buffer and forward
approach). The PAR SHOULD stop buffering once it begins forwarding
packets to the NCoA.
The method by which access routers exchange information about their
neighbors and thereby allow construction of Proxy Router
Advertisements with information about neighboring subnets is outside
the scope of this document.
The RtSolPr and PrRtAdv messages MUST be implemented by an MN and an
access router that supports fast handovers. However, when the
parameters necessary for the MN to send packets immediately upon
attaching to the NAR are supplied by the link-layer handover
mechanism itself, use of the above messages is optional on such
links.
After a PrRtAdv message is processed, the MN sends an FBU at a time
determined by link-specific events, and includes the proposed NCoA.
The MN SHOULD send the FBU from the PAR's link whenever
"anticipation" of handover is feasible. When anticipation is not
feasible or when it has not received an FBack, the MN sends an FBU
immediately after attaching to NAR's link. In response to the FBU,
the PAR establishes a binding between the PCoA ("Home Address") and
the NCoA, and sends the FBack to the MN. Prior to establishing this
binding, the PAR SHOULD send an HI message to the NAR, and receive a
HAck in response. In order to determine the NAR's address for the HI
message, the PAR can perform the longest prefix match of NCoA (in
FBU) with the prefix list of neighboring access routers. When the
source IP address of the FBU is the PCoA, i.e., the FBU is sent from
the PAR's link, the HI message MUST have a Code value set to 0; see
<a href="#section-6.2.1.1">Section 6.2.1.1</a>. When the source IP address of the FBU is not PCoA,
i.e., the FBU is sent from the NAR's link, the HI message MUST have a
Code value of 1; see <a href="#section-6.2.1.1">Section 6.2.1.1</a>.
The HI message contains the PCoA, link-layer address and the NCoA of
the MN. In response to processing an HI message with Code 0, the
NAR:
<span class="grey">Koodli Standards Track [Page 13]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-14" ></span>
<span class="grey"><a href="./rfc5568">RFC 5568</a> MIP6 Fast Handovers July 2009</span>
1. determines whether the NCoA supplied in the HI message is unique
before beginning to defend it. It sends a Duplicate Address
Detection (DAD) probe [<a href="./rfc4862" title=""IPv6 Stateless Address Autoconfiguration"">RFC4862</a>] for NCoA to verify uniqueness.
However, in deployments where the probability of address
collisions is considered extremely low (and hence not an issue),
the parameter DupAddrDetectTransmits (see [<a href="./rfc4862" title=""IPv6 Stateless Address Autoconfiguration"">RFC4862</a>]) is set to
zero on the NAR, allowing it to avoid performing DAD on the NCoA.
The NAR similarly sets DupAddrDetectTransmits to zero in other
deployments where DAD is not a concern. Once the NCoA is
determined to be unique, the NAR starts proxying [<a href="./rfc4861" title=""Neighbor Discovery for IP version 6 (IPv6)"">RFC4861</a>] the
address for PROXY_ND_LIFETIME during which the MN is expected to
connect to the NAR. In case there is already an NCoA present in
its data structure (for instance, it has already processed an HI
message earlier), the NAR MAY verify if the LLA is the same as
its own or that of the MN itself. If so, the NAR MAY allow the
use of the NCoA.
2. allocates the NCoA for the MN when Assigned Addressing is used,
creates a proxy neighbor cache entry, and begins defending it.
The NAR MAY allocate the NCoA proposed in HI.
3. MAY create a host route entry for the PCoA (on the interface to
which the MN is attaching) in case the NCoA cannot be accepted or
assigned. This host route entry SHOULD be implemented such that
until the MN's presence is detected, either through explicit
announcement by the MN or by other means, arriving packets do not
invoke neighbor discovery. The NAR SHOULD also set up a reverse
tunnel to the PAR in this case.
4. provides the status of the handover request in the Handover
Acknowledge (HAck) message to the PAR.
When the Code value in HI is 1, the NAR MUST skip the above
operations. Sending an HI message with Code 1 allows the NAR to
validate the neighbor cache entry it creates for the MN during UNA
processing. That is, the NAR can make use of the knowledge that its
trusted peer (i.e., the PAR) has a trust relationship with the MN.
If HAck contains an assigned NCoA, the FBack MUST include it, and the
MN MUST use the address provided in the FBack. The PAR MAY send the
FBack to the previous link as well to facilitate faster reception in
the event that the MN is still present. The result of the FBU and
FBack processing is that the PAR begins tunneling the MN's packets to
the NCoA. If the MN does not receive an FBack message even after
retransmitting the FBU for FBU_RETRIES, it must assume that fast
handover support is not available and stop the protocol operation.
<span class="grey">Koodli Standards Track [Page 14]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-15" ></span>
<span class="grey"><a href="./rfc5568">RFC 5568</a> MIP6 Fast Handovers July 2009</span>
As soon as the MN establishes link connectivity with the NAR, it:
1. sends an UNA message (see <a href="#section-6.3">Section 6.3</a>). If the MN has not
received an FBack by the time UNA is being sent, it SHOULD send
an FBU message following the UNA message.
2. joins the all-nodes multicast group and the solicited-node
multicast group corresponding to the NCoA.
3. starts a DAD probe for NCoA; see [<a href="./rfc4862" title=""IPv6 Stateless Address Autoconfiguration"">RFC4862</a>].
When a NAR receives an UNA message, it:
1. deletes its proxy neighbor cache entry, if it exists, updates the
state to STALE [<a href="./rfc4861" title=""Neighbor Discovery for IP version 6 (IPv6)"">RFC4861</a>], and forwards arriving and buffered
packets.
2. updates an entry in INCOMPLETE state [<a href="./rfc4861" title=""Neighbor Discovery for IP version 6 (IPv6)"">RFC4861</a>], if it exists, to
STALE and forwards arriving and buffered packets. This would be
the case if NAR had previously sent a Neighbor Solicitation that
went unanswered perhaps because the MN had not yet attached to
the link.
The buffer for handover traffic should be linked to this UNA
processing. The exact mechanism is implementation dependent.
The NAR may choose to provide a different IP address other than the
NCoA. This is possible if it is proxying the NCoA. In such a case,
it:
1. MAY send a Router Advertisement with the NAACK option in which it
includes an alternate IP address for use. This message MUST be
sent to the source IP address present in UNA using the same Layer
2 address present in UNA.
If the MN receives an IP address in the NAACK option, it MUST use it
and send an FBU using the new CoA. As a special case, the address
supplied in NAACK could be the PCoA itself, in which case the MN MUST
NOT send any more FBUs. The Status codes for the NAACK option are
specified in <a href="#section-6.4.6">Section 6.4.6</a>.
Once the MN has confirmed its NCoA (either through DAD or when
provided for by the NAR), it SHOULD send a Neighbor Advertisement
message with the 'O' bit set, to the all-nodes multicast address.
This message allows the MN's neighbors to update their neighbor cache
entries.
<span class="grey">Koodli Standards Track [Page 15]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-16" ></span>
<span class="grey"><a href="./rfc5568">RFC 5568</a> MIP6 Fast Handovers July 2009</span>
For data forwarding, the PAR tunnels packets using its global IP
address valid on the interface to which the MN was attached. The MN
reverse tunnels its packets to the same global address of PAR. The
tunnel end-point addresses must be configured accordingly. When the
PAR receives a reverse-tunneled packet, it must verify if a secure
binding exists for the MN identified by the PCoA in the tunneled
packet, before forwarding the packet.
<span class="h2"><a class="selflink" id="section-5" href="#section-5">5</a>. Other Considerations</span>
<span class="h3"><a class="selflink" id="section-5.1" href="#section-5.1">5.1</a>. Handover Capability Exchange</span>
The MN expects a PrRtAdv in response to its RtSolPr message. If the
MN does not receive a PrRtAdv message even after RTSOLPR_RETRIES, it
must assume that the PAR does not support the fast handover protocol
and stop sending any more RtSolPr messages.
Even if an MN's current access router is capable of providing fast
handover support, the new access router to which the MN attaches may
be incapable of fast handover. This is indicated to the MN during
"runtime", through the PrRtAdv message with Code 3 (see
<a href="#section-6.1.2">Section 6.1.2</a>).
<span class="h3"><a class="selflink" id="section-5.2" href="#section-5.2">5.2</a>. Determining New Care-of Address</span>
Typically, the MN formulates its prospective NCoA using the
information provided in a PrRtAdv message and sends the FBU. The PAR
MUST use the NCoA present in the FBU in its HI message. The NAR MUST
verify if the NCoA present in HI is already in use. In any case, the
NAR MUST respond to HI using a HAck, in which it may include another
NCoA to use, especially when assigned address configuration is used.
If there is a CoA present in the HAck, the PAR MUST include it in the
FBack message. However, the MN itself does not have to wait on the
PAR's link for this exchange to take place. It can handover any time
after sending the FBU message; sometimes it may be forced to handover
without sending the FBU. In any case, it can still confirm using the
NCoA from the NAR's link by sending the UNA message.
If a PrRtAdv message carries an NCoA, the MN MUST use it as its
prospective NCoA.
When DHCP is used, the protocol supports forwarding for the PCoA
only. In this case, the MN MUST perform DHCP operations once it
attaches to the NAR even though it formulates an NCoA for
transmitting the FBU. This is indicated in the PrRtAdv message with
Code 5.
<span class="grey">Koodli Standards Track [Page 16]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-17" ></span>
<span class="grey"><a href="./rfc5568">RFC 5568</a> MIP6 Fast Handovers July 2009</span>
<span class="h3"><a class="selflink" id="section-5.3" href="#section-5.3">5.3</a>. Prefix Management</span>
As defined in <a href="#section-2">Section 2</a>, the Prefix part of "AR-Info" is the prefix
valid on the interface to which the AP is attached. This document
does not specify how this Prefix is managed, its length, or its
assignment policies. The protocol operation specified in this
document works regardless of these considerations. Often, but not
necessarily always, this Prefix may be the aggregate prefix (such as
/48) valid on the interface. In some deployments, each MN may have
its own per-mobile prefix (such as a /64) used for generating the
NCoA. Some point-to-point links may use such a deployment.
When per-mobile prefix assignment is used, the "AR-Info" advertised
in PrRtAdv still includes the (aggregate) prefix valid on the
interface to which the target AP is attached, unless the access
routers communicate with each other (using HI and HAck messages) to
manage the per-mobile prefix. The MN still formulates an NCoA using
the aggregate prefix. However, an alternate NCoA based on the per-
mobile prefix is returned by NAR in the HAck message. This alternate
NCoA is provided to the MN in either the FBack message or in the
NAACK option.
<span class="h3"><a class="selflink" id="section-5.4" href="#section-5.4">5.4</a>. Packet Loss</span>
Handover involves link switching, which may not be exactly
coordinated with fast handover signaling. Furthermore, the arrival
pattern of packets is dependent on many factors, including
application characteristics, network queuing behaviors, etc. Hence,
packets may arrive at the NAR before the MN is able to establish its
link there. These packets will be lost unless they are buffered by
the NAR. Similarly, if the MN attaches to the NAR and then sends an
FBU message, packets arriving at the PAR until the FBU is processed
will be lost unless they are buffered. This protocol provides an
option to indicate a request for buffering at the NAR in the HI
message. When the PAR requests this feature (for the MN), it SHOULD
also provide its own support for buffering.
Whereas buffering can enable a smooth handover, the buffer size and
the rate at which buffered packets are eventually forwarded are
important considerations when providing buffering support. There are
a number of aspects to consider:
o Some applications transmit less data over a given period of data
than others, and this implies different buffering requirements.
For instance, Voice over IP typically needs smaller buffers
compared to high-resolution streaming video, as the latter has
larger packet sizes and higher arrival rates.
<span class="grey">Koodli Standards Track [Page 17]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-18" ></span>
<span class="grey"><a href="./rfc5568">RFC 5568</a> MIP6 Fast Handovers July 2009</span>
o When the mobile node appears on the new link, having the buffering
router send a large number of packets in quick succession may
overtax the resources of the router, the mobile node itself, or
the path between these two.
In particular, transmitting a large amount of buffered packets in
succession can congest the path between the buffering router and
the mobile node. Furthermore, nodes (such as a base station) on
the path between the buffering router and the mobile node may drop
such packets. If a base station buffers too many such packets,
they may contribute to additional jitter for packets arriving
behind them, which is undesirable for real-time communication.
o Since routers are not involved in end-to-end communication, they
have no knowledge of transport conditions.
o The wireless connectivity of the mobile node may vary over time.
It may achieve a smaller or higher bandwidth on the new link,
signal strength may be weak at the time it just enters the area of
this access point, and so on.
As a result, it is difficult to design an algorithm that would
transmit buffered packets at appropriate spacing under all scenarios.
The purpose of fast handovers is to avoid packet loss. Yet, draining
buffered packets too fast can, by itself, cause loss of the packets,
as well as blocking or loss of following packets meant for the mobile
node.
This specification does not restrict implementations from providing
specialized buffering support for any specific situation. However,
attention must be paid to the rate at which buffered packets are
forwarded to the MN once attachment is complete. Routers
implementing this specification MUST implement at least the default
algorithm, which is based on the original arrival rates of the
buffered packets. A maximum of 5 packets MAY be sent one after
another, but all subsequent packets SHOULD use a sending rate that is
determined by metering the rate at which packets have entered the
buffer, potentially using smoothing techniques such as recent
activity over a sliding time window and weighted averages [<a href="./rfc3290" title=""An Informal Management Model for Diffserv Routers"">RFC3290</a>].
It should be noted, however, that this default algorithm is crude and
may not be suitable for all situations. Future revisions of this
specification may provide additional algorithms, once enough
experience of the various conditions in deployed networks is
attained.
<span class="grey">Koodli Standards Track [Page 18]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-19" ></span>
<span class="grey"><a href="./rfc5568">RFC 5568</a> MIP6 Fast Handovers July 2009</span>
<span class="h3"><a class="selflink" id="section-5.5" href="#section-5.5">5.5</a>. DAD Handling</span>
Duplicate Address Detection (DAD) was defined in [<a href="./rfc4862" title=""IPv6 Stateless Address Autoconfiguration"">RFC4862</a>] to avoid
address duplication on links when stateless address auto-
configuration is used. The use of DAD to verify the uniqueness of an
IPv6 address configured through stateless auto-configuration adds
delays to a handover. The probability of an interface identifier
duplication on the same subnet is very low; however, it cannot be
ignored. Hence, the protocol specified in this document SHOULD only
be used in deployments where the probability of such address
collisions is extremely low or it is not a concern (because of the
address management procedure deployed). The protocol requires the
NAR to send a DAD probe before it starts defending the NCoA.
However, this DAD delay can be turned off by setting
DupAddrDetectTransmits to zero on the NAR ([<a href="./rfc4862" title=""IPv6 Stateless Address Autoconfiguration"">RFC4862</a>]).
This document specifies messages that can be used to provide
duplicate-free addresses, but the document does not specify how to
create or manage such duplicate-free addresses. In some cases, the
NAR may already have the knowledge required to assess whether or not
the MN's address is a duplicate before the MN moves to the new
subnet. For example, in some deployments, the NAR may maintain a
pool of duplicate-free addresses in a list for handover purposes. In
such cases, the NAR can provide this disposition in the HAck message
(see <a href="#section-6.2.1.2">Section 6.2.1.2</a>) or in the NAACK option (see <a href="#section-6.4.6">Section 6.4.6</a>).
<span class="h3"><a class="selflink" id="section-5.6" href="#section-5.6">5.6</a>. Fast or Erroneous Movement</span>
Although this specification is for fast handover, the protocol is
limited in terms of how fast an MN can move. A special case of fast
movement is ping-pong, where an MN moves between the same two access
points rapidly. Another instance of the same problem is erroneous
movement, i.e., the MN receives information prior to a handover that
it is moving to a new access point, but it either moves to a
different one or it aborts movement altogether. All of the above
behaviors are usually the result of link-layer idiosyncrasies and
thus are often resolved at the link layer itself.
IP layer mobility, however, introduces its own limits. IP-layer
handovers should occur at a rate suitable for the MN to update the
binding of, at least, its Home Agent and preferably that of every
correspondent node (CN) with which it is in communication. An MN
that moves faster than necessary for this signaling to complete
(which may be of the order of a few seconds) may start losing
packets. The signaling cost over the air interface and in the
network may increase significantly, especially in the case of rapid
movement between several access routers. To avoid the signaling
overhead, the following measures are suggested.
<span class="grey">Koodli Standards Track [Page 19]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-20" ></span>
<span class="grey"><a href="./rfc5568">RFC 5568</a> MIP6 Fast Handovers July 2009</span>
An MN returning to the PAR before updating the necessary bindings
when present on the NAR MUST send a Fast Binding Update with the Home
Address equal to the MN's PCoA and a lifetime of zero to the PAR.
The MN should have a security association with the PAR since it
performed a fast handover to the NAR. The PAR, upon receiving this
Fast Binding Update, will check its set of outgoing (temporary fast
handover) tunnels. If it finds a match, it SHOULD terminate that
tunnel; i.e., start delivering packets directly to the node instead.
In order for the PAR to process such an FBU, the lifetime of the
security association has to be at least that of the tunnel itself.
Temporary tunnels for the purposes of fast handovers should use short
lifetimes (of the order of tens of seconds). The lifetime of such
tunnels should be enough to allow an MN to update all its active
bindings. The default lifetime of the tunnel should be the same as
the lifetime value in the FBU message.
The effect of erroneous movement is typically limited to the loss of
packets since routing can change and the PAR may forward packets
toward another router before the MN actually connects to that router.
If the MN discovers itself on an unanticipated access router, it
SHOULD send a new Fast Binding Update to the PAR. This FBU
supersedes the existing binding at the PAR, and the packets will be
redirected to the newly confirmed location of the MN.
<span class="h2"><a class="selflink" id="section-6" href="#section-6">6</a>. Message Formats</span>
All the ICMPv6 messages have a common Type specified in [<a href="./rfc4443" title=""Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification"">RFC4443</a>].
The messages are distinguished based on the Subtype field (see
below). For all the ICMPv6 messages, the checksum is defined in
[<a href="./rfc4443" title=""Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification"">RFC4443</a>].
<span class="h3"><a class="selflink" id="section-6.1" href="#section-6.1">6.1</a>. New Neighborhood Discovery Messages</span>
<span class="h4"><a class="selflink" id="section-6.1.1" href="#section-6.1.1">6.1.1</a>. Router Solicitation for Proxy Advertisement (RtSolPr)</span>
Mobile nodes send Router Solicitation for Proxy Advertisement
messages in order to prompt routers for Proxy Router Advertisements.
All the Link-Layer Address options have the format defined in
<a href="#section-6.4.3">Section 6.4.3</a>.
<span class="grey">Koodli Standards Track [Page 20]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-21" ></span>
<span class="grey"><a href="./rfc5568">RFC 5568</a> MIP6 Fast Handovers July 2009</span>
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type | Code | Checksum |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Subtype | Reserved | Identifier |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Options ...
+-+-+-+-+-+-+-+-+-+-+-+-
Figure 4: Router Solicitation for Proxy Advertisement (RtSolPr)
Message
IP Fields:
Source Address: An IP address assigned to the sending
interface.
Destination Address: The address of the access router or the
all routers multicast address.
Hop Limit: 255. See <a href="./rfc2461">RFC 2461</a>.
ICMP Fields:
Type: 154
Code: 0
Checksum: The ICMPv6 checksum.
Subtype: 2
Reserved: MUST be set to zero by the sender and ignored by the
receiver.
Identifier: MUST be set by the sender so that replies can be
matched to this Solicitation.
Valid Options:
Source Link-Layer Address: When known, the link-layer address
of the sender SHOULD be included using the Link-Layer Address
(LLA) option. See the LLA option format below.
New Access Point Link-Layer Address: The link-layer address or
identification of the access point for which the MN requests
routing advertisement information. It MUST be included in all
<span class="grey">Koodli Standards Track [Page 21]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-22" ></span>
<span class="grey"><a href="./rfc5568">RFC 5568</a> MIP6 Fast Handovers July 2009</span>
RtSolPr messages. More than one such address or identifier can
be present. This field can also be a wildcard address. See
the LLA option below.
Future versions of this protocol may define new option types.
Receivers MUST silently ignore any options that they do not recognize
and continue processing the rest of the message.
Including the source LLA option allows the receiver to record the
sender's L2 address so that neighbor discovery can be avoided when
the receiver needs to send packets back to the sender (of the RtSolPr
message).
When a wildcard is used for the New Access Point LLA, no other New
Access Point LLA options must be present.
A Proxy Router Advertisement (PrRtAdv) message should be received by
the MN in response to an RtSolPr. If such a message is not received
in a timely manner (no less than twice the typical round trip time
(RTT) over the access link, or 100 milliseconds if RTT is not known),
it SHOULD resend the RtSolPr message. Subsequent retransmissions can
be up to RTSOLPR_RETRIES, but MUST use an exponential backoff in
which the timeout period (i.e., 2xRTT or 100 milliseconds) is doubled
prior to each instance of retransmission. If Proxy Router
Advertisement is not received by the time the MN disconnects from the
PAR, the MN SHOULD send an FBU immediately after configuring a new
CoA.
When RtSolPr messages are sent more than once, they MUST be rate-
limited with MAX_RTSOLPR_RATE per second. During each use of an
RtSolPr, exponential backoff is used for retransmissions.
<span class="h4"><a class="selflink" id="section-6.1.2" href="#section-6.1.2">6.1.2</a>. Proxy Router Advertisement (PrRtAdv)</span>
Access routers send Proxy Router Advertisement messages gratuitously
if the handover is network-initiated or as a response to an RtSolPr
message from an MN, providing the link-layer address, IP address, and
subnet prefixes of neighboring routers. All the Link-Layer Address
options have the format defined in 6.4.3.
<span class="grey">Koodli Standards Track [Page 22]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-23" ></span>
<span class="grey"><a href="./rfc5568">RFC 5568</a> MIP6 Fast Handovers July 2009</span>
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type | Code | Checksum |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Subtype | Reserved | Identifier |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Options ...
+-+-+-+-+-+-+-+-+-+-+-+-
Figure 5: Proxy Router Advertisement (PrRtAdv) Message
IP Fields:
Source Address: MUST be the link-local address assigned to the
interface from which this message is sent.
Destination Address: The Source Address of an invoking Router
Solicitation for Proxy Advertisement or the address of the node
the access router is instructing to handover.
Hop Limit: 255. See <a href="./rfc2461">RFC 2461</a>.
ICMP Fields:
Type: 154
Code: 0, 1, 2, 3, 4, or 5. See below.
Checksum: The ICMPv6 checksum.
Subtype: 3
Reserved: MUST be set to zero by the sender and ignored by the
receiver.
Identifier: Copied from the Router Solicitation for Proxy
Advertisement or set to zero if unsolicited.
Valid Options in the following order:
Source Link-Layer Address: When known, the link-layer address
of the sender SHOULD be included using the Link-Layer Address
option. See the LLA option format below.
New Access Point Link-Layer Address: The link-layer address or
identification of the access point is copied from RtSolPr
message. This option MUST be present.
<span class="grey">Koodli Standards Track [Page 23]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-24" ></span>
<span class="grey"><a href="./rfc5568">RFC 5568</a> MIP6 Fast Handovers July 2009</span>
New Router's Link-Layer Address: The link-layer address of the
access router for which this message is proxied. This option
MUST be included when the Code is 0 or 1.
New Router's IP Address: The IP address of the NAR. This
option MUST be included when the Code is 0 or 1.
New Router Prefix Information Option: Specifies the prefix of
the access router the message is proxied for and is used for
address auto-configuration. This option MUST be included when
Code is 0 or 1. However, when this prefix is the same as what
is used in the New Router's IP Address option (above), the
Prefix Information option need not be present.
New CoA Option: MAY be present when PrRtAdv is sent
unsolicited. The PAR MAY compute a new CoA using the NAR's
prefix information and the MN's L2 address or by any other
means.
Future versions of this protocol may define new option types.
Receivers MUST silently ignore any options they do not recognize and
continue processing the message.
Currently, Code values 0, 1, 2, 3, 4, and 5 are defined.
A Proxy Router Advertisement with Code 0 means that the MN should use
the [AP-ID, AR-Info] tuple (present in the options above) for
movement detection and NCoA formulation. In this case, the Option-
Code field in the New Access Point LLA option is 1 to reflect the LLA
of the access point for which the rest of the options are related.
Multiple tuples may be present.
A Proxy Router Advertisement with Code 1 means that the message has
been sent unsolicited. If a New CoA option is present following the
New Router Prefix Information option, the MN MUST use the supplied
NCoA and send an FBU immediately or else stand to lose service. This
message acts as a network-initiated handover trigger; see
<a href="#section-3.3">Section 3.3</a>. In this case, the Option-Code field in the New Access
Point LLA option (see below) is 1 to reflect the LLA of the access
point for which the rest of the options are related.
A Proxy Router Advertisement with Code 2 means that no new router
information is present. Each New Access Point LLA option contains an
Option-Code value (described below) that indicates a specific
outcome.
<span class="grey">Koodli Standards Track [Page 24]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-25" ></span>
<span class="grey"><a href="./rfc5568">RFC 5568</a> MIP6 Fast Handovers July 2009</span>
When the Option-Code field in the New Access Point LLA option is
5, handover to that access point does not require a change of CoA.
This would be the case, for instance, when a number of access
points are connected to the same router interface, or when
network-based mobility management mechanisms ensure that the
specific mobile node always observes the same prefix regardless of
whether there is a separate router attached to the target access
point.
No other options are required in this case.
When the Option-Code field in the New Access Point LLA option is
6, the PAR is not aware of the Prefix Information requested. The
MN SHOULD attempt to send an FBU as soon as it regains
connectivity with the NAR. No other options are required in this
case.
When the Option-Code field in the New Access Point LLA option is
7, it means that the NAR does not support fast handover. The MN
MUST stop fast handover protocol operations. No other options are
required in this case.
A Proxy Router Advertisement with Code 3 means that new router
information is only present for a subset of access points requested.
The Option-Code field values (those defined above, as well as the
value of 1) distinguish different outcomes for individual access
points.
A Proxy Router Advertisement with Code 4 means that the subnet
information regarding neighboring access points is sent unsolicited,
but the message is not a handover trigger, unlike when the message is
sent with Code 1. Multiple tuples may be present.
A Proxy Router Advertisement with Code 5 means that the MN may use
the new router information present for detecting movement to a new
subnet, but the MN must perform DHCP [<a href="./rfc3315" title=""Dynamic Host Configuration Protocol for IPv6 (DHCPv6)"">RFC3315</a>] upon attaching to the
NAR's link. The PAR and NAR will forward packets to the PCoA of the
MN. The MN must still formulate an NCoA for transmitting FBU (using
the information sent in this message), but that NCoA will not be used
for forwarding packets.
When a wildcard AP identifier is supplied in the RtSolPr message, the
PrRtAdv message should include any 'n' [Access Point Identifier,
Link-Layer Address option, Prefix Information Option] tuples
corresponding to the PAR's neighborhood.
<span class="grey">Koodli Standards Track [Page 25]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-26" ></span>
<span class="grey"><a href="./rfc5568">RFC 5568</a> MIP6 Fast Handovers July 2009</span>
<span class="h3"><a class="selflink" id="section-6.2" href="#section-6.2">6.2</a>. New Mobility Header Messages</span>
Mobile IPv6 uses a new IPv6 header type called Mobility Header
[<a href="./rfc3775" title=""Mobility Support in IPv6"">RFC3775</a>]. The Handover Initiate, Handover Acknowledge, Fast Binding
Update, Fast Binding Acknowledgment, and the (deprecated) Fast
Neighbor Advertisement messages use the Mobility Header.
<span class="h4"><a class="selflink" id="section-6.2.1" href="#section-6.2.1">6.2.1</a>. Inter - Access Router Messages</span>
<span class="h5"><a class="selflink" id="section-6.2.1.1" href="#section-6.2.1.1">6.2.1.1</a>. Handover Initiate (HI)</span>
The Handover Initiate (HI) is a Mobility Header message sent by an
Access Router (typically a PAR) to another access router (typically a
NAR) to initiate the process of an MN's handover.
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Sequence # |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|S|U| Reserved | Code | |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ .
| |
. .
. Mobility options .
. .
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 6: Handover Initiate (HI) Message
IP Fields:
Source Address: The IP address of the PAR
Destination Address: The IP address of the NAR
Sequence #: MUST be set by the sender so replies can be matched
to this message.
'S' flag: Assigned address configuration flag. When set, this
message requests a new CoA to be returned by the destination.
MAY be set when Code = 0. MUST be 0 when Code = 1.
'U' flag: Buffer flag. When set, the destination SHOULD buffer
any packets toward the node indicated in the options of this
message. Used when Code = 0, SHOULD be set to 0 when Code = 1.
<span class="grey">Koodli Standards Track [Page 26]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-27" ></span>
<span class="grey"><a href="./rfc5568">RFC 5568</a> MIP6 Fast Handovers July 2009</span>
Code: 0 or 1. See below
Reserved: MUST be set to zero by the sender and ignored by the
receiver.
Valid Options:
Link-Layer Address of MN: The link-layer address of the MN that
is undergoing handover to the destination (i.e., NAR). This
option MUST be included so that the destination can recognize
the MN.
Previous Care-of Address: The IP address used by the MN while
attached to the originating router. This option SHOULD be
included so that a host route can be established if necessary.
New Care-of Address: The IP address the MN wishes to use when
connected to the destination. When the 'S' bit is set, the NAR
MAY assign this address.
The PAR uses a Code value of 0 when it processes an FBU with the PCoA
as source IP address. The PAR uses a Code value of 1 when it
processes an FBU whose source IP address is not the PCoA.
If a Handover Acknowledge (HAck) message is not received as a
response in a short time period (no less than twice the typical round
trip time (RTT) between source and destination, or 100 milliseconds
if RTT is not known), the Handover Initiate SHOULD be resent.
Subsequent retransmissions can be up to HI_RETRIES, but MUST use
exponential backoff in which the timeout period (i.e., 2xRTT or 100
milliseconds) is doubled during each instance of retransmission.
<span class="h5"><a class="selflink" id="section-6.2.1.2" href="#section-6.2.1.2">6.2.1.2</a>. Handover Acknowledge (HAck)</span>
The Handover Acknowledge message is a new Mobility Header message
that MUST be sent (typically by the NAR to the PAR) as a reply to the
Handover Initiate message.
<span class="grey">Koodli Standards Track [Page 27]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-28" ></span>
<span class="grey"><a href="./rfc5568">RFC 5568</a> MIP6 Fast Handovers July 2009</span>
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Sequence # |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Reserved | Code | |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ .
| |
. .
. Mobility options .
. .
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 7: Handover Acknowledge (HAck) Message
IP Fields:
Source Address: Copied from the destination address of the
Handover Initiate Message to which this message is a response.
Destination Address: Copied from the source address of the
Handover Initiate Message to which this message is a response.
Sequence #: Copied from the corresponding field in the HI
message to which this message is a response, to enable the
receiver to match this HAck message with an outstanding HI
message.
Code:
0: Handover Accepted, NCoA valid
1: Handover Accepted, NCoA not valid or in use
2: Handover Accepted, NCoA assigned (used in Assigned
Addressing)
3: Handover Accepted, use PCoA
4: Message sent unsolicited, usually to trigger an HI
message
128: Handover Not Accepted, reason unspecified
129: Administratively prohibited
130: Insufficient resources
<span class="grey">Koodli Standards Track [Page 28]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-29" ></span>
<span class="grey"><a href="./rfc5568">RFC 5568</a> MIP6 Fast Handovers July 2009</span>
Reserved: MUST be set to zero by the sender and ignored by the
receiver.
Valid Options:
New Care-of Address: If the 'S' flag in the Handover Initiate
message is set, this option MUST be used to provide the NCoA
that the MN should use when connected to this router. This
option MAY be included, even when the 'S' bit is not set, e.g.,
Code 2 above.
Upon receiving an HI message, the NAR MUST respond with a Handover
Acknowledge message. If the 'S' flag is set in the HI message, the
NAR SHOULD include the New Care-of Address option and a Code 3.
The NAR MAY provide support for the PCoA (instead of accepting or
assigning an NCoA), establish a host route entry for the PCoA, and
set up a tunnel to the PAR to forward the MN's packets sent with the
PCoA as a source IP address. This host route entry SHOULD be used to
forward packets once the NAR detects that the particular MN is
attached to its link. The NAR indicates forwarding support for the
PCoA using Code value 3 in the HAck message. Subsequently, the PAR
establishes a tunnel to the NAR in order to forward packets arriving
for the PCoA.
When responding to an HI message containing a Code value 1, the Code
values 1, 2, and 4 in the HAck message are not relevant.
Finally, the New Access Router can always refuse handover, in which
case it MUST indicate the reason in one of the available Code values.
<span class="h4"><a class="selflink" id="section-6.2.2" href="#section-6.2.2">6.2.2</a>. Fast Binding Update (FBU)</span>
The Fast Binding Update message has a Mobility Header Type value of
8. The FBU is identical to the Mobile IPv6 Binding Update (BU)
message. However, the processing rules are slightly different.
Furthermore, additional flags (as part of the Reserved field below)
defined by other related protocols are not relevant in this message,
and MUST be set to zero.
<span class="grey">Koodli Standards Track [Page 29]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-30" ></span>
<span class="grey"><a href="./rfc5568">RFC 5568</a> MIP6 Fast Handovers July 2009</span>
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Sequence # |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|A|H|L|K| Reserved | Lifetime |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
. .
. Mobility options .
. .
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 8: Fast Binding Update (FBU) Message
IP Fields:
Source Address: The PCoA or NCoA
Destination Address: The IP address of the Previous Access
Router
'A' flag: MUST be set to one to request that PAR send a Fast
Binding Acknowledgment message.
'H' flag: MUST be set to one. See [<a href="./rfc3775" title=""Mobility Support in IPv6"">RFC3775</a>].
'L' flag: See [<a href="./rfc3775" title=""Mobility Support in IPv6"">RFC3775</a>].
'K' flag: See [<a href="./rfc3775" title=""Mobility Support in IPv6"">RFC3775</a>].
Reserved: This field is unused. MUST be set to zero.
Sequence Number: See [<a href="./rfc3775" title=""Mobility Support in IPv6"">RFC3775</a>].
Lifetime: The requested time in seconds for which the sender
wishes to have a binding.
Mobility Options: MUST contain an alternate CoA option set to the
NCoA when an FBU is sent from the PAR's link. MUST contain the
Binding Authorization Data for the FMIP (BADF) option. See
<a href="#section-6.4.5">Section 6.4.5</a>. MAY contain the Mobility Header LLA option (see
<a href="#section-6.4.4">Section 6.4.4</a>).
The MN sends an FBU message any time after receiving a PrRtAdv
message. If the MN moves prior to receiving a PrRtAdv message, it
SHOULD send an FBU to the PAR after configuring the NCoA on the NAR
<span class="grey">Koodli Standards Track [Page 30]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-31" ></span>
<span class="grey"><a href="./rfc5568">RFC 5568</a> MIP6 Fast Handovers July 2009</span>
according to Neighbor Discovery and IPv6 Address Configuration
protocols. When the MN moves without having received a PrRtAdv
message, it cannot transmit an UNA message upon attaching to the
NAR's link.
The source IP address is the PCoA when the FBU is sent from the PAR's
link, and the source IP address is the NCoA when the FBU sent from
the NAR's link. When the source IP address is the PCoA, the MN MUST
include the alternate CoA option set to NCoA. The PAR MUST process
the FBU even though the address in the alternate CoA option is
different from that in the source IP address, and ensure that the
address in the alternate CoA option is used in the New CoA option in
the HI message to the NAR.
The FBU MUST also include the Home Address Option set to PCoA. An
FBU message MUST be protected so that the PAR is able to determine
that the FBU message is sent by an MN that legitimately owns the
PCoA.
<span class="h4"><a class="selflink" id="section-6.2.3" href="#section-6.2.3">6.2.3</a>. Fast Binding Acknowledgment (FBack)</span>
The FBack message format is identical to the Mobile IPv6 Binding
Acknowledgment (BAck) message. However, the processing rules are
slightly different. Furthermore, additional flags (as part of the
Reserved field below) defined by other related protocols are not
relevant in this message, and MUST be set to zero.
The Fast Binding Acknowledgment message has a Mobility Header Type
value of 9. The FBack message is sent by the PAR to acknowledge
receipt of a Fast Binding Update message in which the 'A' bit is set.
If PAR sends an HI message to the NAR after processing an FBU, the
FBack message SHOULD NOT be sent to the MN before the PAR receives a
HAck message from the NAR. The PAR MAY send the FBack immediately in
the reactive mode, however. The Fast Binding Acknowledgment MAY also
be sent to the MN on the old link.
<span class="grey">Koodli Standards Track [Page 31]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-32" ></span>
<span class="grey"><a href="./rfc5568">RFC 5568</a> MIP6 Fast Handovers July 2009</span>
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Status |K| Reserved |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Sequence # | Lifetime |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
. .
. Mobility options .
. .
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 9: Fast Binding Acknowledgment (FBack) Message
IP Fields:
Source address: The IP address of the Previous Access Router
Destination Address: The NCoA, and optionally the PCoA
Status: 8-bit unsigned integer indicating the disposition of the
Fast Binding Update. Values of the Status field that are less
than 128 indicate that the Binding Update was accepted by the
receiving node. The following such Status values are currently
defined:
0: Fast Binding Update accepted
1: Fast Binding Update accepted but NCoA is invalid. Use NCoA
supplied in "alternate" CoA
Values of the Status field greater than or equal to 128 indicate
that the Binding Update was rejected by the receiving node. The
following such Status values are currently defined:
128: Reason unspecified
129: Administratively prohibited
130: Insufficient resources
131: Incorrect interface identifier length
'K' flag: See [<a href="./rfc3775" title=""Mobility Support in IPv6"">RFC3775</a>].
Reserved: An unused field. MUST be set to zero.
<span class="grey">Koodli Standards Track [Page 32]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-33" ></span>
<span class="grey"><a href="./rfc5568">RFC 5568</a> MIP6 Fast Handovers July 2009</span>
Sequence Number: Copied from the FBU message for use by the MN in
matching this acknowledgment with an outstanding FBU.
Lifetime: The granted lifetime in seconds for which the sender of
this message will retain a binding for traffic redirection.
Mobility Options: MUST contain an "alternate" CoA if Status is 1.
MUST contain the Binding Authorization Data for FMIP (BADF)
option. See <a href="#section-6.4.5">Section 6.4.5</a>.
<span class="h3"><a class="selflink" id="section-6.3" href="#section-6.3">6.3</a>. Unsolicited Neighbor Advertisement (UNA)</span>
This is the same message as in [<a href="./rfc4861" title=""Neighbor Discovery for IP version 6 (IPv6)"">RFC4861</a>] with the requirement that
the 'O' bit is always set to zero. Since this is an unsolicited
message, the 'S' bit is zero, and since this is sent by an MN, the
'R' bit is also zero.
If the NAR is proxying the NCoA (as a result of HI and HAck
exchange), then UNA processing has additional steps (see below). If
the NAR is not proxying the NCoA (for instance, HI and HAck exchange
has not taken place), then UNA processing follows the same procedure
as specified in [<a href="./rfc4861" title=""Neighbor Discovery for IP version 6 (IPv6)"">RFC4861</a>]. Implementations MAY retransmit UNAs
subject to the specification in <a href="./rfc4861#section-7.2.6">Section 7.2.6 of [RFC4861]</a> while
noting that the default RetransTimer value is large for handover
purposes.
The Source Address in UNA MUST be the NCoA. The destination address
is typically the all-nodes multicast address; however, some
deployments may not prefer transmission to a multicast address. In
such cases, the destination address SHOULD be the NAR's IP address.
The Target Address MUST include the NCoA, and the Target link-layer
address MUST include the MN's LLA.
The MN sends an UNA message to the NAR, as soon as it regains
connectivity on the new link. Arriving or buffered packets can be
immediately forwarded. If the NAR is proxying the NCoA, it creates a
neighbor cache entry in STALE state but forwards packets as it
determines bidirectional reachability according to the standard
Neighbor Discovery procedure. If there is an entry in INCOMPLETE
state without a link-layer address, the NAR sets it to STALE, again
according to the procedure in [<a href="./rfc4861" title=""Neighbor Discovery for IP version 6 (IPv6)"">RFC4861</a>].
The NAR MAY wish to provide a different IP address to the MN than the
one in the UNA message. In such a case, the NAR MUST delete the
proxy entry for the NCoA and send a Router Advertisement with a NAACK
option containing the new IP address.
<span class="grey">Koodli Standards Track [Page 33]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-34" ></span>
<span class="grey"><a href="./rfc5568">RFC 5568</a> MIP6 Fast Handovers July 2009</span>
The combination of the NCoA (present in the source IP address) and
the Link-Layer Address (present as a Target LLA) SHOULD be used to
distinguish the MN from other nodes.
<span class="h3"><a class="selflink" id="section-6.4" href="#section-6.4">6.4</a>. New Options</span>
All the options, with the exception of Binding Data Authorization for
FMIPv6 (BADF) discussed in <a href="#section-6.4.5">Section 6.4.5</a>, use the Type, Length, and
Option-Code format shown in Figure 10.
The Type values are defined from the Neighbor Discovery options space
and Mobility Header options space. The Length field is in units of 8
octets for Neighbor Discovery options, and is in units of octets for
Mobility Header options. And, Option-Code provides additional
information for each of the options (see individual options below).
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type | Length | Option-Code | |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
~ ... ~
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 10: Option Format
<span class="h4"><a class="selflink" id="section-6.4.1" href="#section-6.4.1">6.4.1</a>. IP Address/Prefix Option</span>
This option is sent in the Proxy Router Advertisement message.
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type | Length | Option-Code | Prefix Length |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Reserved |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
+ +
| |
+ IPv6 Address +
| |
+ +
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 11: IPv6 Address/Prefix Option
<span class="grey">Koodli Standards Track [Page 34]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-35" ></span>
<span class="grey"><a href="./rfc5568">RFC 5568</a> MIP6 Fast Handovers July 2009</span>
Type: 17
Length: The size of this option in 8 octets including the Type,
Option-Code, and Length fields.
Option-Code:
1: Old Care-of Address
2: New Care-of Address
3: NAR's IP address
4: NAR's Prefix, sent in PrRtAdv. The Prefix Length field
contains the number of valid leading bits in the prefix. The
bits in the prefix after the prefix length are reserved and
MUST be initialized to zero by the sender and ignored by the
receiver.
Prefix Length: 8-bit unsigned integer that indicates the length of
the IPv6 Address Prefix. The value ranges from 0 to 128.
Reserved: MUST be set to zero by the sender and MUST be ignored by
the receiver.
IPv6 address: The IP address defined by the Option-Code field.
<span class="h4"><a class="selflink" id="section-6.4.2" href="#section-6.4.2">6.4.2</a>. Mobility Header IP Address/Prefix Option</span>
This option is sent in the Handover Initiate and Handover Acknowledge
messages. This option has an alignment requirement of 8n+4.
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type | Length | Option-Code | Prefix Length |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
+ +
| |
+ IPv6 Address/Prefix +
| |
+ +
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 12: Mobility Header IPv6 Address/Prefix Option
<span class="grey">Koodli Standards Track [Page 35]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-36" ></span>
<span class="grey"><a href="./rfc5568">RFC 5568</a> MIP6 Fast Handovers July 2009</span>
Type: 17
Length: The size of this option in octets excluding the Type and
Length fields.
Option-Code:
1: Old Care-of Address
2: New Care-of Address
3: NAR's IP address
4: NAR's Prefix, sent in PrRtAdv. The Prefix Length field
contains the number of valid leading bits in the prefix. The
bits in the prefix after the prefix length are reserved and
MUST be initialized to zero by the sender and ignored by the
receiver.
Prefix Length: 8-bit unsigned integer that indicates the length of
the IPv6 Address Prefix. The value ranges from 0 to 128.
IPv6 address/prefix: The IP address/prefix defined by the Option-
Code field.
<span class="h4"><a class="selflink" id="section-6.4.3" href="#section-6.4.3">6.4.3</a>. Link-Layer Address (LLA) Option</span>
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type | Length | Option-Code | LLA...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 13: Link-Layer Address Option
Type: 19
Length: The size of this option in 8 octets including the Type,
Option-Code, and Length fields.
Option-Code:
0: Wildcard requesting resolution for all nearby access points
1: Link-Layer Address of the New Access Point
2: Link-Layer Address of the MN
<span class="grey">Koodli Standards Track [Page 36]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-37" ></span>
<span class="grey"><a href="./rfc5568">RFC 5568</a> MIP6 Fast Handovers July 2009</span>
3: Link-Layer Address of the NAR (i.e., Proxied Originator)
4: Link-Layer Address of the source of RtSolPr or PrRtAdv
message
5: The access point identified by the LLA belongs to the
current interface of the router
6: No prefix information available for the access point
identified by the LLA
7: No fast handover support available for the access point
identified by the LLA
LLA: The variable-length link-layer address.
The LLA option does not have a length field for the LLA itself. The
implementations must consult the specific link layer over which the
protocol is run in order to determine the content and length of the
LLA.
Depending on the size of individual LLA option, appropriate padding
MUST be used to ensure that the entire option size is a multiple of 8
octets.
The New Access Point Link-Layer Address contains the link-layer
address of the access point for which handover is about to be
attempted. This is used in the Router Solicitation for Proxy
Advertisement message.
The MN Link-Layer Address option contains the link-layer address of
an MN. It is used in the Handover Initiate message.
The NAR (i.e., Proxied Originator) Link-Layer Address option contains
the link-layer address of the access router to which the Proxy Router
Solicitation message refers.
<span class="h4"><a class="selflink" id="section-6.4.4" href="#section-6.4.4">6.4.4</a>. Mobility Header Link-Layer Address (MH-LLA) Option</span>
This option is identical to the LLA option, but is carried in the
Mobility Header messages, e.g., FBU. In the future, other Mobility
Header messages may also make use of this option. The format of the
option is shown in Figure 14. There are no alignment requirements
for this option.
<span class="grey">Koodli Standards Track [Page 37]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-38" ></span>
<span class="grey"><a href="./rfc5568">RFC 5568</a> MIP6 Fast Handovers July 2009</span>
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type | Length |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Option-Code | LLA ....
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 14: Mobility Header Link-Layer Address Option
Type: 7
Length: The size of this option in octets not including the Type
and Length fields.
Option-Code: 2 Link-Layer Address of the MN.
LLA: The variable-length link-layer address.
<span class="h4"><a class="selflink" id="section-6.4.5" href="#section-6.4.5">6.4.5</a>. Binding Authorization Data for FMIPv6 (BADF)</span>
This option MUST be present in FBU and FBack messages. The security
association between the MN and the PAR is established by companion
protocols [<a href="./rfc5269" title=""Distributing a Symmetric Fast Mobile IPv6 (FMIPv6) Handover Key Using SEcure Neighbor Discovery (SEND)"">RFC5269</a>]. This option specifies how to compute and verify
a Message Authentication Code (MAC) using the established security
association.
The format of this option is shown in Figure 15.
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type | Option Length |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| SPI |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
+ +
| Authenticator |
+ +
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 15: Binding Authorization Data for FMIPv6 (BADF) Option
Type: 21
Option Length: The length of the Authenticator in bytes
<span class="grey">Koodli Standards Track [Page 38]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-39" ></span>
<span class="grey"><a href="./rfc5568">RFC 5568</a> MIP6 Fast Handovers July 2009</span>
SPI: Security Parameter Index. SPI = 0 is reserved for the
Authenticator computed using SEND-based handover keys.
Authenticator: Same as in <a href="./rfc3775">RFC 3775</a>, with "correspondent" replaced
by the PAR's IP address, and Kbm (binding management key) replaced
by the shared key between the MN and the PAR.
The default MAC calculation is done using HMAC_SHA1 with the first 96
bits used for the MAC. Since there is an Option Length field,
implementations can use other algorithms such as HMAC_SHA256.
This option MUST be the last Mobility Option present.
<span class="h4"><a class="selflink" id="section-6.4.6" href="#section-6.4.6">6.4.6</a>. Neighbor Advertisement Acknowledgment (NAACK)</span>
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type | Length | Option-Code | Status |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Reserved |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 16: Neighbor Advertisement Acknowledgment Option
Type: 20
Length: 8-bit unsigned integer. Length of the option, in 8
octets. The length is 1 when a new CoA is not supplied. The
length is 3 when a new CoA is present (immediately following the
Reserved field)
Option-Code: 0
Status: 8-bit unsigned integer indicating the disposition of the
Unsolicited Neighbor Advertisement message. The following Status
values are currently defined:
1: NCoA is invalid, perform address configuration
2: NCoA is invalid, use the supplied NCoA. The supplied NCoA
(in the form of an IP Address Option) MUST be present following
the Reserved field.
3: NCoA is invalid, use NAR's IP address as NCoA in FBU
4: PCoA supplied, do not send FBU
<span class="grey">Koodli Standards Track [Page 39]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-40" ></span>
<span class="grey"><a href="./rfc5568">RFC 5568</a> MIP6 Fast Handovers July 2009</span>
128: Link-Layer Address unrecognized
Reserved: MUST be set to zero by the sender and MUST be ignored by
the receiver.
The NAR responds to an UNA with the NAACK option to notify the MN to
use a different NCoA than the one that the MN has used. If the NAR
proposes a different NCoA, the Router Advertisement MUST use the
source IP address in the UNA message as the destination address, and
use the L2 address present in UNA. The MN MUST use the NCoA if it is
supplied with the NAACK option. If the NAACK indicates that the
Link-Layer Address is unrecognized (for instance, if the MN uses an
LLA valid on PAR's link but the same LLA is not valid on NAR's link
due to a different access technology), the MN MUST NOT use the NCoA
or the PCoA and SHOULD start immediately the process of acquiring a
different NCoA at the NAR.
In the future, new option types may be defined.
<span class="h2"><a class="selflink" id="section-7" href="#section-7">7</a>. Related Protocol and Device Considerations</span>
The protocol specified here, as a design principle, introduces no or
minimal changes to related protocols. For example, no changes to the
base Mobile IPv6 protocol are needed in order to implement this
protocol. Similarly, no changes to the IPv6 stateless address auto-
configuration protocol [<a href="./rfc4862" title=""IPv6 Stateless Address Autoconfiguration"">RFC4862</a>] and DHCP [<a href="./rfc3315" title=""Dynamic Host Configuration Protocol for IPv6 (DHCPv6)"">RFC3315</a>] are introduced.
The protocol specifies an optional extension to Neighbor Discovery
[<a href="./rfc4861" title=""Neighbor Discovery for IP version 6 (IPv6)"">RFC4861</a>] in which an access router may send a router advertisement
as a response to the UNA message (see <a href="#section-6.3">Section 6.3</a>). Other than this
extension, the specification does not modify Neighbor Discovery
behavior (including the procedures performed when attached to the PAR
and when attaching to the NAR).
The protocol does not require changes to any intermediate Layer 2
device between an MN and its access router that supports this
specification. This includes the wireless access points, switches,
snooping devices, and so on.
<span class="h2"><a class="selflink" id="section-8" href="#section-8">8</a>. Evolution from and Compatibility with <a href="./rfc4068">RFC 4068</a></span>
This document has evolved from [<a href="./rfc4068" title=""Fast Handovers for Mobile IPv6"">RFC4068</a>]. Specifically, a new
handover key establishment protocol (see [<a href="./rfc5269" title=""Distributing a Symmetric Fast Mobile IPv6 (FMIPv6) Handover Key Using SEcure Neighbor Discovery (SEND)"">RFC5269</a>]) has been defined
to enable a security association between a mobile node and its access
router. This allows the secure update of the routing of packets
during a handover. In the future, new specifications may be defined
to establish such security associations depending on the particular
deployment scenario.
<span class="grey">Koodli Standards Track [Page 40]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-41" ></span>
<span class="grey"><a href="./rfc5568">RFC 5568</a> MIP6 Fast Handovers July 2009</span>
The protocol has improved from the experiences in implementing
[<a href="./rfc4068" title=""Fast Handovers for Mobile IPv6"">RFC4068</a>], and from experimental usage. The input has improved the
specification of parameter fields (such as lifetime, codepoints,
etc.) as well as inclusion of new parameter fields in the existing
messages. As of this writing, there are two publicly available
implementations, [<a href="#ref-fmipv6" title=""fmipv6.org : Home Page"">fmipv6</a>] and [<a href="#ref-tarzan" title=""Nautilus6 - Tarzan"">tarzan</a>], and multiple proprietary
implementations. Some experience suggests that the protocol meets
the delay and packet loss requirements when used appropriately with
particular radio access protocols. For instance, see [<a href="./rfc5184" title=""Unified Layer 2 (L2) Abstractions for Layer 3 (L3)-Driven Fast Handover"">RFC5184</a>] and
[<a href="#ref-mip6-book" title=""Mobile Inter-networking with IPv6"">mip6-book</a>]. Nevertheless, it is important to recognize that
handover performance is a function of both IP-layer operations, which
this protocol specifies, and the particular radio access technology
itself, which this protocol relies upon but does not modify.
An existing implementation of [<a href="./rfc4068" title=""Fast Handovers for Mobile IPv6"">RFC4068</a>] needs to be updated in order
to support this specification. The primary addition is the
establishment of a security association between an MN and its access
router (i.e., MN and PAR). One way to establish such a security
association is specified in [<a href="./rfc5269" title=""Distributing a Symmetric Fast Mobile IPv6 (FMIPv6) Handover Key Using SEcure Neighbor Discovery (SEND)"">RFC5269</a>]. An implementation that
complies with the specification in this document is likely to also
work with [<a href="./rfc4068" title=""Fast Handovers for Mobile IPv6"">RFC4068</a>], except for the Binding Authorization Data for
FMIPv6 option (see <a href="#section-6.4.5">Section 6.4.5</a>) that can only be processed when a
security association is in place between a mobile node and its access
router. This specification deprecates the Fast Neighbor
Advertisement (FNA) message. However, it is acceptable for a NAR to
process this message from a mobile node as specified in [<a href="./rfc4068" title=""Fast Handovers for Mobile IPv6"">RFC4068</a>].
<span class="h2"><a class="selflink" id="section-9" href="#section-9">9</a>. Configurable Parameters</span>
Mobile nodes rely on configuration parameters shown in the table
below. Each mobile node MUST have a configuration mechanism to
adjust the parameters. Such a configuration mechanism may be either
local (such as a command line interface) or based on central
management of a number of mobile nodes.
+-------------------+---------------+-----------------+
| Parameter Name | Default Value | Definition |
+-------------------+---------------+-----------------+
| RTSOLPR_RETRIES | 3 | <a href="#section-6.1.1">Section 6.1.1</a> |
| MAX_RTSOLPR_RATE | 3 | <a href="#section-6.1.1">Section 6.1.1</a> |
| FBU_RETRIES | 3 | <a href="#section-6.2.2">Section 6.2.2</a> |
| PROXY_ND_LIFETIME | 1.5 seconds | <a href="#section-6.2.1.2">Section 6.2.1.2</a> |
| HI_RETRIES | 3 | <a href="#section-6.2.1.1">Section 6.2.1.1</a> |
+-------------------+---------------+-----------------+
<span class="grey">Koodli Standards Track [Page 41]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-42" ></span>
<span class="grey"><a href="./rfc5568">RFC 5568</a> MIP6 Fast Handovers July 2009</span>
<span class="h2"><a class="selflink" id="section-10" href="#section-10">10</a>. Security Considerations</span>
The following security vulnerabilities are identified and suggested
solutions are mentioned.
Insecure FBU: in this case, packets meant for one address could be
stolen or redirected to some unsuspecting node. This concern is
the same as that in an MN and Home Agent relationship.
Hence, the PAR MUST ensure that the FBU packet arrived from a node
that legitimately owns the PCoA. The access router and its hosts
may use any available mechanism to establish a security
association that MUST be used to secure FBU. The current version
of this protocol relies on a companion protocol [<a href="./rfc5269" title=""Distributing a Symmetric Fast Mobile IPv6 (FMIPv6) Handover Key Using SEcure Neighbor Discovery (SEND)"">RFC5269</a>] to
establish such a security association. Using the shared handover
key from [<a href="./rfc5269" title=""Distributing a Symmetric Fast Mobile IPv6 (FMIPv6) Handover Key Using SEcure Neighbor Discovery (SEND)"">RFC5269</a>], the Authenticator in BADF option (see
<a href="#section-6.4.5">Section 6.4.5</a>) MUST be computed, and the BADF option included in
FBU and FBack messages.
Secure FBU, malicious or inadvertent redirection: in this case,
the FBU is secured, but the target of binding happens to be an
unsuspecting node either due to inadvertent operation or due to
malicious intent. This vulnerability can lead to an MN with a
genuine security association with its access router redirecting
traffic to an incorrect address.
However, the target of malicious traffic redirection is limited to
an interface on an access router with which the PAR has a security
association. The PAR MUST verify that the NCoA to which the PCoA
is being bound actually belongs to the NAR's prefix. In order to
do this, HI and HAck message exchanges are to be used. When the
NAR accepts the NCoA in HI (with Code = 0), it proxies the NCoA so
that any arriving packets are not sent on the link until the MN
attaches and announces itself through the UNA. Therefore, any
inadvertent or malicious redirection to a host is avoided. It is
still possible to jam a NAR's buffer with redirected traffic.
However, since a NAR's handover state corresponding to an NCoA has
a finite (and short) lifetime corresponding to a small multiple of
anticipated handover latency, the extent of this vulnerability is
arguably small.
Sending an FBU from a NAR's link: A malicious node may send an FBU
from a NAR's link providing an unsuspecting node's address as an
NCoA. This is similar to base Mobile IP where the MN can provide
some other node's IP address as its CoA to its Home Agent; here,
the PAR acts like a "temporary Home Agent" having a security
association with the mobile node and providing forwarding support
for the handover traffic. As in base Mobile IP, this misdelivery
<span class="grey">Koodli Standards Track [Page 42]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-43" ></span>
<span class="grey"><a href="./rfc5568">RFC 5568</a> MIP6 Fast Handovers July 2009</span>
is traceable to the MN that has a security association with the
router. So, it is possible to isolate such an MN if it continues
to misbehave. Similarly, an MN that has a security association
with the PAR may provide the LLA of some other node on NAR's link,
which can cause misdelivery of packets (meant for the NCoA) to an
unsuspecting node. It is possible to trace the MN in this case as
well.
Apart from the above, the RtSolPr (<a href="#section-6.1.1">Section 6.1.1</a>) and PrRtAdv
(<a href="#section-6.1.2">Section 6.1.2</a>) messages inherit the weaknesses of the Neighbor
Discovery protocol [<a href="./rfc4861" title=""Neighbor Discovery for IP version 6 (IPv6)"">RFC4861</a>]. Specifically, when its access router
is compromised, the MN's RtSolPr message may be answered by an
attacker that provides a rogue router as the resolution. Should the
MN attach to such a rogue router, its communication can be
compromised. Similarly, a network-initiated PrRtAdv message (see
<a href="#section-3.3">Section 3.3</a>) from an attacker could cause an MN to handover to a
rogue router. Where these weaknesses are a concern, a solution such
as Secure Neighbor Discovery (SEND) [<a href="./rfc3971" title=""SEcure Neighbor Discovery (SEND)"">RFC3971</a>] SHOULD be considered.
The protocol provides support for buffering packets during an MN's
handover. This is done by securely exchanging the Handover Initiate
(HI) and Handover Acknowledge (HAck) messages in response to the FBU
message from an MN. It is possible that an MN may fail, either
inadvertently or purposely, to undergo handover to the NAR, which
typically provides buffering support. This can cause the NAR to
waste its memory containing the buffered packets, and in the worst
case, could create resource exhaustion concerns. Hence,
implementations must limit the size of the buffer as a local policy
configuration that may consider parameters such as the average
handover delay, expected size of packets, and so on.
The Handover Initiate (HI) and Handover Acknowledge (HAck) messages
exchanged between the PAR and NAR MUST be protected using end-to-end
security association(s) offering integrity and data origin
authentication.
The PAR and the NAR MUST implement IPsec [<a href="./rfc4301" title=""Security Architecture for the Internet Protocol"">RFC4301</a>] for protecting the
HI and HAck messages. IPsec Encapsulating Security Payload (ESP)
[<a href="./rfc4303" title=""IP Encapsulating Security Payload (ESP)"">RFC4303</a>] in transport mode with mandatory integrity protection
SHOULD be used for protecting the signaling messages.
Confidentiality protection of these messages is not required.
The security associations can be created by using either manual IPsec
configuration or a dynamic key negotiation protocol such as Internet
Key Exchange Protocol version 2 (IKEv2) [<a href="./rfc4306" title=""Internet Key Exchange (IKEv2) Protocol"">RFC4306</a>]. If IKEv2 is used,
the PAR and the NAR can use any of the authentication mechanisms, as
specified in <a href="./rfc4306">RFC 4306</a>, for mutual authentication. However, to ensure
a baseline interoperability, the implementations MUST support shared
<span class="grey">Koodli Standards Track [Page 43]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-44" ></span>
<span class="grey"><a href="./rfc5568">RFC 5568</a> MIP6 Fast Handovers July 2009</span>
secrets for mutual authentication. The following sections describe
the Peer Authorization Database (PAD) and Security Policy Database
(SPD) entries specified in [<a href="./rfc4301" title=""Security Architecture for the Internet Protocol"">RFC4301</a>] when IKEv2 is used for setting
up the required IPsec security associations.
<span class="h3"><a class="selflink" id="section-10.1" href="#section-10.1">10.1</a>. Peer Authorization Database Entries When Using IKEv2</span>
This section describes PAD entries on the PAR and the NAR. The PAD
entries are only example configurations. Note that the PAD is a
logical concept, and a particular PAR or NAR implementation can
implement the PAD in any implementation-specific manner. The PAD
state may also be distributed across various databases in a specific
implementation.
PAR PAD:
- IF remote_identity = nar_identity_1
THEN authenticate (shared secret/certificate/EAP) and authorize
CHILD_SA for remote address nar_address_1
NAR PAD:
- IF remote_identity = par_identity_1
THEN authenticate (shared secret/certificate/EAP) and authorize
CHILD_SAs for remote address par_address_1
The list of authentication mechanisms in the above examples is not
exhaustive. There could be other credentials used for authentication
stored in the PAD.
<span class="h3"><a class="selflink" id="section-10.2" href="#section-10.2">10.2</a>. Security Policy Database Entries</span>
This section describes the security policy entries on the PAR and the
NAR required to protect the HI and HAck messages. The SPD entries
are only example configurations. A particular PAR or NAR
implementation could configure different SPD entries as long as they
provide the required security.
In the examples shown below, the identity of the PAR is assumed to be
par_1, the address of the PAR is assumed to be par_address_1, and the
address of the NAR is assumed to be nar_address_1.
<span class="grey">Koodli Standards Track [Page 44]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-45" ></span>
<span class="grey"><a href="./rfc5568">RFC 5568</a> MIP6 Fast Handovers July 2009</span>
PAR SPD-S:
- IF local_address = par_address_1 &
remote_address = nar_address_1 &
proto = MH &
local_mh_type = HI &
remote_mh_type = HAck
THEN use SA ESP transport mode Initiate using IDi = par_1 to
address nar_address_1
NAR SPD-S:
- IF local_address = nar_address_1 &
remote_address = par_address_1 &
proto = MH &
local_mh_type = HAck &
remote_mh_type = HI
THEN use SA ESP transport mode
<span class="h2"><a class="selflink" id="section-11" href="#section-11">11</a>. IANA Considerations</span>
This document defines two new Mobility Header messages that have
received Type assignment from the Mobility Header Type registry.
14 Handover Initiate Message (<a href="#section-6.2.1.1">Section 6.2.1.1</a>)
15 Handover Acknowledge Message (<a href="#section-6.2.1.2">Section 6.2.1.2</a>)
This document defines a new Mobility Option that has received Type
assignment from the Mobility Options Type registry.
1. Mobility Header IPv6 Address/Prefix option (34), described in
<a href="#section-6.4.2">Section 6.4.2</a>
This document defines a new ICMPv6 message, which has been allocated
from the ICMPv6 Type registry.
154 FMIPv6 Messages
This document creates a new registry for the 'Subtype' field in the
above ICMPv6 message, called the "FMIPv6 Message Types". IANA has
assigned the following values.
<span class="grey">Koodli Standards Track [Page 45]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-46" ></span>
<span class="grey"><a href="./rfc5568">RFC 5568</a> MIP6 Fast Handovers July 2009</span>
+---------+-------------------+-----------------+
| Subtype | Description | Reference |
+---------+-------------------+-----------------+
| 2 | RtSolPr | <a href="#section-6.1.1">Section 6.1.1</a> |
| 3 | PrRtAdv | <a href="#section-6.1.2">Section 6.1.2</a> |
| 4 | HI - Deprecated | <a href="#section-6.2.1.1">Section 6.2.1.1</a> |
| 5 | HAck - Deprecated | <a href="#section-6.2.1.2">Section 6.2.1.2</a> |
+---------+-------------------+-----------------+
The values '0' and '1' are reserved. The upper limit is 255. An RFC
is required for new message assignment. The Subtype values 4 and 5
are deprecated but marked as unavailable for future allocations.
The document defines a new Mobility Option that has received Type
assignment from the Mobility Options Type registry.
1. Binding Authorization Data for FMIPv6 (BADF) option (21),
described in <a href="#section-6.4.5">Section 6.4.5</a>
The document defines the following Neighbor Discovery [<a href="./rfc4861" title=""Neighbor Discovery for IP version 6 (IPv6)"">RFC4861</a>]
options that have received Type assignment from IANA.
+------+--------------------------------------------+---------------+
| Type | Description | Reference |
+------+--------------------------------------------+---------------+
| 17 | IP Address/Prefix Option | <a href="#section-6.4.1">Section 6.4.1</a> |
| 19 | Link-layer Address Option | <a href="#section-6.4.3">Section 6.4.3</a> |
| 20 | Neighbor Advertisement Acknowledgment | <a href="#section-6.4.6">Section 6.4.6</a> |
| | Option | |
+------+--------------------------------------------+---------------+
The document defines the following Mobility Header messages that have
received Type allocation from the Mobility Header Types registry.
1. Fast Binding Update (8), described in <a href="#section-6.2.2">Section 6.2.2</a>
2. Fast Binding Acknowledgment (9), described in <a href="#section-6.2.3">Section 6.2.3</a>
The document defines the following Mobility Option that has received
Type assignment from the Mobility Options Type registry.
1. Mobility Header Link-Layer Address option (7), described in
<a href="#section-6.4.4">Section 6.4.4</a>
<span class="grey">Koodli Standards Track [Page 46]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-47" ></span>
<span class="grey"><a href="./rfc5568">RFC 5568</a> MIP6 Fast Handovers July 2009</span>
<span class="h2"><a class="selflink" id="section-12" href="#section-12">12</a>. Acknowledgments</span>
The editor would like to thank all those who have provided feedback
on this specification, but can only mention a few here: Vijay
Devarapalli, Youn-Hee Han, Emil Ivov, Syam Madanapalli, Suvidh
Mathur, Andre Martin, Javier Martin, Koshiro Mitsuya, Gabriel
Montenegro, Takeshi Ogawa, Sun Peng, YC Peng, Alex Petrescu, Domagoj
Premec, Subba Reddy, K. Raghav, Ranjit Wable, and Jonathan Wood.
Behcet Sarikaya and Frank Xia are acknowledged for the feedback on
operation over point-to-point links. The editor would like to
acknowledge a contribution from James Kempf to improve this
specification. Vijay Devarapalli provided text for the security
configuration between access routers in <a href="#section-10">Section 10</a>. Thanks to Jari
Arkko for the detailed AD Review, which has improved this document.
The editor would also like to thank the MIPSHOP working group chair
Gabriel Montenegro and the erstwhile MOBILE IP working group chairs
Basavaraj Patil and Phil Roberts for providing much support for this
work.
<span class="h2"><a class="selflink" id="section-13" href="#section-13">13</a>. References</span>
<span class="h3"><a class="selflink" id="section-13.1" href="#section-13.1">13.1</a>. Normative References</span>
[<a id="ref-RFC2119">RFC2119</a>] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", <a href="https://www.rfc-editor.org/bcp/bcp14">BCP 14</a>, <a href="./rfc2119">RFC 2119</a>, March 1997.
[<a id="ref-RFC3315">RFC3315</a>] Droms, R., Bound, J., Volz, B., Lemon, T., Perkins, C.,
and M. Carney, "Dynamic Host Configuration Protocol for
IPv6 (DHCPv6)", <a href="./rfc3315">RFC 3315</a>, July 2003.
[<a id="ref-RFC3775">RFC3775</a>] Johnson, D., Perkins, C., and J. Arkko, "Mobility
Support in IPv6", <a href="./rfc3775">RFC 3775</a>, June 2004.
[<a id="ref-RFC4301">RFC4301</a>] Kent, S. and K. Seo, "Security Architecture for the
Internet Protocol", <a href="./rfc4301">RFC 4301</a>, December 2005.
[<a id="ref-RFC4303">RFC4303</a>] Kent, S., "IP Encapsulating Security Payload (ESP)",
<a href="./rfc4303">RFC 4303</a>, December 2005.
[<a id="ref-RFC4306">RFC4306</a>] Kaufman, C., "Internet Key Exchange (IKEv2) Protocol",
<a href="./rfc4306">RFC 4306</a>, December 2005.
[<a id="ref-RFC4443">RFC4443</a>] Conta, A., Deering, S., and M. Gupta, "Internet Control
Message Protocol (ICMPv6) for the Internet Protocol
Version 6 (IPv6) Specification", <a href="./rfc4443">RFC 4443</a>, March 2006.
<span class="grey">Koodli Standards Track [Page 47]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-48" ></span>
<span class="grey"><a href="./rfc5568">RFC 5568</a> MIP6 Fast Handovers July 2009</span>
[<a id="ref-RFC4861">RFC4861</a>] Narten, T., Nordmark, E., Simpson, W., and H. Soliman,
"Neighbor Discovery for IP version 6 (IPv6)", <a href="./rfc4861">RFC 4861</a>,
September 2007.
[<a id="ref-RFC4862">RFC4862</a>] Thomson, S., Narten, T., and T. Jinmei, "IPv6 Stateless
Address Autoconfiguration", <a href="./rfc4862">RFC 4862</a>, September 2007.
[<a id="ref-RFC5268">RFC5268</a>] Koodli, R., "Mobile IPv6 Fast Handovers", <a href="./rfc5268">RFC 5268</a>,
June 2008.
[<a id="ref-RFC5269">RFC5269</a>] Kempf, J. and R. Koodli, "Distributing a Symmetric Fast
Mobile IPv6 (FMIPv6) Handover Key Using SEcure Neighbor
Discovery (SEND)", <a href="./rfc5269">RFC 5269</a>, June 2008.
<span class="h3"><a class="selflink" id="section-13.2" href="#section-13.2">13.2</a>. Informative References</span>
[<a id="ref-RFC3290">RFC3290</a>] Bernet, Y., Blake, S., Grossman, D., and A. Smith, "An
Informal Management Model for Diffserv Routers",
<a href="./rfc3290">RFC 3290</a>, May 2002.
[<a id="ref-RFC3971">RFC3971</a>] Arkko, J., Kempf, J., Zill, B., and P. Nikander, "SEcure
Neighbor Discovery (SEND)", <a href="./rfc3971">RFC 3971</a>, March 2005.
[<a id="ref-RFC4068">RFC4068</a>] Koodli, R., "Fast Handovers for Mobile IPv6", <a href="./rfc4068">RFC 4068</a>,
July 2005.
[<a id="ref-RFC5184">RFC5184</a>] Teraoka, F., Gogo, K., Mitsuya, K., Shibui, R., and K.
Mitani, "Unified Layer 2 (L2) Abstractions for Layer 3
(L3)-Driven Fast Handover", <a href="./rfc5184">RFC 5184</a>, May 2008.
[<a id="ref-RFC5213">RFC5213</a>] Gundavelli, S., Leung, K., Devarapalli, V., Chowdhury,
K., and B. Patil, "Proxy Mobile IPv6", <a href="./rfc5213">RFC 5213</a>,
August 2008.
[<a id="ref-RFC5555">RFC5555</a>] Soliman, H., Ed., "Mobile IPv6 Support for Dual Stack
Hosts and Routers", <a href="./rfc5555">RFC 5555</a>, June 2009.
[<a id="ref-fmipv6">fmipv6</a>] "fmipv6.org : Home Page", <<a href="http://fmipv6.org">http://fmipv6.org</a>>.
[<a id="ref-mip6-book">mip6-book</a>] Koodli, R. and C. Perkins, "Mobile Inter-networking with
IPv6", Chapter 22, John Wiley & Sons, Inc., 2007.
[<a id="ref-pfmipv6">pfmipv6</a>] Yokota, H., Chowdhury, K., Koodli, R., Patil, B., and F.
Xia, "Fast Handovers for Proxy Mobile IPv6", Work
in Progress, May 2009.
[<a id="ref-tarzan">tarzan</a>] "Nautilus6 - Tarzan",
<<a href="http://software.nautilus6.org/TARZAN/">http://software.nautilus6.org/TARZAN/</a>>.
<span class="grey">Koodli Standards Track [Page 48]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-49" ></span>
<span class="grey"><a href="./rfc5568">RFC 5568</a> MIP6 Fast Handovers July 2009</span>
[<a id="ref-x.s0057">x.s0057</a>] 3GPP2, "E-UTRAN - eHRPD Connectivity and Interworking:
Core Network Aspects", 3GPP2 X.S0057-0, April 2009,
<<a href="http://www.3gpp2.org/Public_html/Specs/X.S0057-0_v1.0_090406.pdf">http://www.3gpp2.org/Public_html/Specs/</a>
<a href="http://www.3gpp2.org/Public_html/Specs/X.S0057-0_v1.0_090406.pdf">X.S0057-0_v1.0_090406.pdf</a>>.
<span class="grey">Koodli Standards Track [Page 49]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-50" ></span>
<span class="grey"><a href="./rfc5568">RFC 5568</a> MIP6 Fast Handovers July 2009</span>
<span class="h2"><a class="selflink" id="appendix-A" href="#appendix-A">Appendix A</a>. Contributors</span>
This document has its origins in the fast handover design team in the
erstwhile MOBILE IP working group. The members of this design team
in alphabetical order were: Gopal Dommety, Karim El-Malki, Mohammed
Khalil, Charles Perkins, Hesham Soliman, George Tsirtsis, and Alper
Yegin.
<span class="h2"><a class="selflink" id="appendix-B" href="#appendix-B">Appendix B</a>. Changes since <a href="./rfc5268">RFC 5268</a></span>
This document specifies the Mobility Header format for HI and HAck
messages, and the Mobility Header Option format for IPv6 Address/
Prefix option. The use of ICMP for HI and HAck messages is
deprecated. The following developments led the WG to adopt this
change:
o The Proxy Mobile IPv6 protocol [<a href="./rfc5213" title=""Proxy Mobile IPv6"">RFC5213</a>] has been adopted for the
deployment of fourth-generation mobile networks. This has
established Mobility Header as the default type for critical IP
mobility signaling.
o The Mobile IPv6 protocol [<a href="./rfc3775" title=""Mobility Support in IPv6"">RFC3775</a>] (particularly, the Dual-stack
MIP6 or DSMIP6 [<a href="./rfc5555" title=""Mobile IPv6 Support for Dual Stack Hosts and Routers"">RFC5555</a>]) protocol, which is also expected to be
deployed in the fourth-generation mobile networks, similarly
relies on Mobility Header for critical IP mobility signaling.
o The Fast Handover protocol specified in this document is used as
the basis for the Fast Handover for Proxy MIP6 [<a href="#ref-pfmipv6" title=""Fast Handovers for Proxy Mobile IPv6"">pfmipv6</a>], which is
adopted by the "enhanced HRPD" (CDMA) networks [<a href="#ref-x.s0057" title=""E-UTRAN - eHRPD Connectivity and Interworking: Core Network Aspects"">x.s0057</a>]. Hence,
the Fast Handover protocol, when used in deployments using either
PMIP6 or MIP6, needs to support the Mobility Header for all its
critical mobility signaling messages. At the same time, use of
ICMP, primarily due to legacy, is unlikely to facilitate critical
IP mobility signaling without a non-trivial departure from
deploying the new Mobility Header signaling protocols.
Therefore, it follows that specifying the Mobility Header for the HI
and HAck messages is necessary for the deployment of the protocol
along-side PMIP6 and MIP6 protocols.
<span class="h2"><a class="selflink" id="appendix-C" href="#appendix-C">Appendix C</a>. Changes since <a href="./rfc4068">RFC 4068</a></span>
The following are the major changes and clarifications:
o Specified security association between the MN and its Access
Router in the companion document [<a href="./rfc5269" title=""Distributing a Symmetric Fast Mobile IPv6 (FMIPv6) Handover Key Using SEcure Neighbor Discovery (SEND)"">RFC5269</a>].
<span class="grey">Koodli Standards Track [Page 50]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-51" ></span>
<span class="grey"><a href="./rfc5568">RFC 5568</a> MIP6 Fast Handovers July 2009</span>
o Specified Binding Authorization Data for Fast Handovers (BADF)
option to carry the security parameters used for verifying the
authenticity of FBU and FBack messages. The handover key used for
computing the Authenticator is specified in companion documents.
o Specified the security configuration for inter - access router
signaling (HI, HAck).
o Added a section on prefix management between access routers and
illustrated protocol operation over point-to-point links.
o Deprecated FNA, which is a Mobility Header message. In its place,
the Unsolicited Neighbor Advertisement (UNA) message from <a href="./rfc4861">RFC 4861</a>
is used.
o Combined the IPv6 Address Option and IPv6 Prefix Option.
o Added description of the DAD requirement on NAR when determining
NCoA uniqueness in <a href="#section-4">Section 4</a>, "Protocol Details".
o Added a new code value for a gratuitous HAck message to trigger a
HI message.
o Added Option-Code 5 in PrRtAdv message to indicate NETLMM
(Network-based Localized Mobility Management) usage.
o Clarified protocol usage when DHCP is used for NCoA formulation
(Sections <a href="#section-6.1.2">6.1.2</a>, <a href="#section-3.1">3.1</a>, and <a href="#section-5.2">5.2</a>). Added a new Code value (5) in
PrRtAdv (<a href="#section-6.1.2">Section 6.1.2</a>).
o Clarified that IPv6 Neighbor Discovery operations are a must in
<a href="#section-7">Section 7</a>, "Related Protocol and Device Considerations".
o Clarified "PAR = temporary HA" for FBUs sent by a genuine MN to an
unsuspecting CoA.
Author's Address
Rajeev Koodli (editor)
Starent Networks
USA
EMail: rkoodli@starentnetworks.com
Koodli Standards Track [Page 51]
</pre>
|