rfc5268.txt | draft-ietf-mipshop-rfc5268bis-01.txt | |||
---|---|---|---|---|
Network Working Group R. Koodli, Ed. | Network Working Group R. Koodli, Ed. | |||
Request for Comments: 5268 Starent Networks | Internet-Draft Starent Networks | |||
Obsoletes: 5268 (if approved) March 4, 2009 | ||||
Category: Standards Track | Intended status: Standards Track | |||
Expires: September 5, 2009 | ||||
Mobile IPv6 Fast Handovers | Mobile IPv6 Fast Handovers | |||
draft-ietf-mipshop-rfc5268bis-01.txt | ||||
Status of This Memo | Status of This Memo | |||
This document specifies an Internet standards track protocol for the | This Internet-Draft is submitted to IETF in full conformance with the | |||
Internet community, and requests discussion and suggestions for | provisions of BCP 78 and BCP 79. | |||
improvements. Please refer to the current edition of the "Internet | ||||
Official Protocol Standards" (STD 1) for the standardization state | Internet-Drafts are working documents of the Internet Engineering | |||
and status of this protocol. Distribution of this memo is unlimited. | Task Force (IETF), its areas, and its working groups. Note that | |||
other groups may also distribute working documents as Internet- | ||||
Drafts. | ||||
Internet-Drafts are draft documents valid for a maximum of six months | ||||
and may be updated, replaced, or obsoleted by other documents at any | ||||
time. It is inappropriate to use Internet-Drafts as reference | ||||
material or to cite them other than as "work in progress." | ||||
The list of current Internet-Drafts can be accessed at | ||||
http://www.ietf.org/ietf/1id-abstracts.txt. | ||||
The list of Internet-Draft Shadow Directories can be accessed at | ||||
http://www.ietf.org/shadow.html. | ||||
This Internet-Draft will expire on September 5, 2009. | ||||
Copyright Notice | ||||
Copyright (c) 2009 IETF Trust and the persons identified as the | ||||
document authors. All rights reserved. | ||||
This document is subject to BCP 78 and the IETF Trust's Legal | ||||
Provisions Relating to IETF Documents in effect on the date of | ||||
publication of this document (http://trustee.ietf.org/license-info). | ||||
Please review these documents carefully, as they describe your rights | ||||
and restrictions with respect to this document. | ||||
Abstract | Abstract | |||
Mobile IPv6 enables a Mobile Node (MN) to maintain its connectivity | Mobile IPv6 enables a Mobile Node (MN) to maintain its connectivity | |||
to the Internet when moving from one Access Router to another, a | to the Internet when moving from one Access Router to another, a | |||
process referred to as handover. During handover, there is a period | process referred to as handover. During handover, there is a period | |||
during which the Mobile Node is unable to send or receive packets | during which the Mobile Node is unable to send or receive packets | |||
because of link switching delay and IP protocol operations. This | because of link switching delay and IP protocol operations. This | |||
"handover latency" resulting from standard Mobile IPv6 procedures, | "handover latency" resulting from standard Mobile IPv6 procedures, | |||
namely movement detection, new Care-of Address configuration, and | namely movement detection, new Care-of Address configuration, and | |||
Binding Update, is often unacceptable to real-time traffic such as | Binding Update, is often unacceptable to real-time traffic such as | |||
Voice over IP (VoIP). Reducing the handover latency could be | Voice over IP (VoIP). Reducing the handover latency could be | |||
beneficial to non-real-time, throughput-sensitive applications as | beneficial to non-real-time, throughput-sensitive applications as | |||
well. This document specifies a protocol to improve handover latency | well. This document specifies a protocol to improve handover latency | |||
due to Mobile IPv6 procedures. This document does not address | due to Mobile IPv6 procedures. This document does not address | |||
improving the link switching latency. | improving the link switching latency. | |||
This documents updates the packet formats for the Handover Initiate | ||||
(HI) and Handover Acknowledgement (HAck) messages to Mobility Header | ||||
Type. | ||||
Table of Contents | Table of Contents | |||
1. Introduction ....................................................3 | 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 4 | |||
2. Terminology .....................................................3 | 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 5 | |||
3. Protocol Overview ...............................................6 | 3. Protocol Overview . . . . . . . . . . . . . . . . . . . . . . 7 | |||
3.1. Addressing the Handover Latency ............................6 | 3.1. Addressing the Handover Latency . . . . . . . . . . . . . 7 | |||
3.2. Protocol Operation .........................................8 | 3.2. Protocol Operation . . . . . . . . . . . . . . . . . . . . 9 | |||
3.3. Protocol Operation during Network-Initiated Handover ......11 | 3.3. Protocol Operation during Network-Initiated Handover . . . 12 | |||
4. Protocol Details ...............................................11 | 4. Protocol Details . . . . . . . . . . . . . . . . . . . . . . . 13 | |||
5. Other Considerations ...........................................15 | 5. Other Considerations . . . . . . . . . . . . . . . . . . . . . 17 | |||
5.1. Handover Capability Exchange ..............................15 | 5.1. Handover Capability Exchange . . . . . . . . . . . . . . . 17 | |||
5.2. Determining New Care-of Address ...........................16 | 5.2. Determining New Care-of Address . . . . . . . . . . . . . 17 | |||
5.3. Prefix Management .........................................16 | 5.3. Prefix Management . . . . . . . . . . . . . . . . . . . . 17 | |||
5.4. Packet Loss ...............................................17 | 5.4. Packet Loss . . . . . . . . . . . . . . . . . . . . . . . 18 | |||
5.5. DAD Handling ..............................................18 | 5.5. DAD Handling . . . . . . . . . . . . . . . . . . . . . . . 19 | |||
5.6. Fast or Erroneous Movement ................................19 | 5.6. Fast or Erroneous Movement . . . . . . . . . . . . . . . . 20 | |||
6. Message Formats ................................................20 | 6. Message Formats . . . . . . . . . . . . . . . . . . . . . . . 21 | |||
6.1. New Neighborhood Discovery Messages .......................20 | 6.1. New Neighborhood Discovery Messages . . . . . . . . . . . 21 | |||
6.1.1. Router Solicitation for Proxy Advertisement | 6.1.1. Router Solicitation for Proxy Advertisement | |||
(RtSolPr) ..........................................20 | (RtSolPr) . . . . . . . . . . . . . . . . . . . . . . 21 | |||
6.1.2. Proxy Router Advertisement (PrRtAdv) ...............22 | 6.1.2. Proxy Router Advertisement (PrRtAdv) . . . . . . . . . 23 | |||
6.2. Inter - Access Router Messages ............................25 | 6.2. New Mobility Header Messages . . . . . . . . . . . . . . . 26 | |||
6.2.1. Handover Initiate (HI) .............................25 | 6.2.1. Inter - Access Router Messages . . . . . . . . . . . . 26 | |||
6.2.2. Handover Acknowledge (HAck) ........................27 | 6.2.2. Fast Binding Update (FBU) . . . . . . . . . . . . . . 30 | |||
6.3. New Mobility Header Messages ..............................28 | 6.2.3. Fast Binding Acknowledgment (FBack) . . . . . . . . . 32 | |||
6.3.1. Fast Binding Update (FBU) ..........................28 | 6.3. Unsolicited Neighbor Advertisement (UNA) . . . . . . . . . 33 | |||
6.3.2. Fast Binding Acknowledgment (FBack) ................30 | 6.4. New Options . . . . . . . . . . . . . . . . . . . . . . . 34 | |||
6.4. Unsolicited Neighbor Advertisement (UNA) ..................31 | 6.4.1. IP Address/Prefix Option . . . . . . . . . . . . . . . 35 | |||
6.5. New Options ...............................................32 | 6.4.2. Mobility Header IP Address/Prefix Option . . . . . . . 36 | |||
6.5.1. IP Address/Prefix Option ...........................33 | 6.4.3. Link-Layer Address (LLA) Option . . . . . . . . . . . 37 | |||
6.5.2. Link-Layer Address (LLA) Option ....................34 | 6.4.4. Mobility Header Link-Layer Address (MH-LLA) Option . . 38 | |||
6.5.3. Mobility Header Link-Layer Address (MH-LLA) | 6.4.5. Binding Authorization Data for FMIPv6 (BADF) . . . . . 39 | |||
Option .............................................35 | 6.4.6. Neighbor Advertisement Acknowledgment (NAACK) . . . . 40 | |||
6.5.4. Binding Authorization Data for FMIPv6 (BADF) .......35 | 7. Related Protocol and Device Considerations . . . . . . . . . . 41 | |||
6.5.5. Neighbor Advertisement Acknowledgment (NAACK) ......36 | 8. Evolution from and Compatibility with RFC 4068 . . . . . . . . 41 | |||
7. Related Protocol and Device Considerations .....................37 | 9. Configurable Parameters . . . . . . . . . . . . . . . . . . . 42 | |||
8. Evolution from and Compatibility with RFC 4068 .................38 | 10. Security Considerations . . . . . . . . . . . . . . . . . . . 42 | |||
9. Configurable Parameters ........................................39 | 10.1. Peer Authorization Database Entries when Using IKEv2 . . . 44 | |||
10. Security Considerations .......................................39 | 10.2. Security Policy Database Entries . . . . . . . . . . . . . 45 | |||
10.1. Peer Authorization Database Entries when Using IKEv2 .....41 | 11. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 45 | |||
10.2. Security Policy Database Entries .........................42 | 12. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 47 | |||
11. IANA Considerations ...........................................42 | 13. References . . . . . . . . . . . . . . . . . . . . . . . . . . 47 | |||
12. Acknowledgments ...............................................43 | 13.1. Normative References . . . . . . . . . . . . . . . . . . . 47 | |||
13. References ....................................................44 | 13.2. Informative References . . . . . . . . . . . . . . . . . . 48 | |||
13.1. Normative References .....................................44 | Appendix A. Contributors . . . . . . . . . . . . . . . . . . . . 49 | |||
13.2. Informative References ...................................45 | Appendix B. Changes since RFC 5268 . . . . . . . . . . . . . . . 49 | |||
Appendix A. Contributors ..........................................46 | Appendix C. Changes since RFC 4068 . . . . . . . . . . . . . . . 50 | |||
Appendix B. Changes since RFC 4068 ................................46 | ||||
1. Introduction | 1. Introduction | |||
Mobile IPv6 [RFC3775] describes the protocol operations for a mobile | Mobile IPv6 [RFC3775] describes the protocol operations for a mobile | |||
node to maintain connectivity to the Internet during its handover | node to maintain connectivity to the Internet during its handover | |||
from one access router to another. These operations involve | from one access router to another. These operations involve link- | |||
link-layer procedures, movement detection, IP address configuration, | layer procedures, movement detection, IP address configuration, and | |||
and location update. The combined handover latency is often | location update. The combined handover latency is often sufficient | |||
sufficient to affect real-time applications. Throughput-sensitive | to affect real-time applications. Throughput-sensitive applications | |||
applications can also benefit from reducing this latency. This | can also benefit from reducing this latency. This document describes | |||
document describes a protocol to reduce the handover latency. | a protocol to reduce the handover latency. | |||
This specification addresses the following problems: how to allow a | This specification addresses the following problems: how to allow a | |||
mobile node to send packets as soon as it detects a new subnet link | mobile node to send packets as soon as it detects a new subnet link | |||
and how to deliver packets to a mobile node as soon as its attachment | and how to deliver packets to a mobile node as soon as its attachment | |||
is detected by the new access router. The protocol defines IP | is detected by the new access router. The protocol defines IP | |||
protocol messages necessary for its operation regardless of link | protocol messages necessary for its operation regardless of link | |||
technology. It does this without depending on specific link-layer | technology. It does this without depending on specific link-layer | |||
features while allowing link-specific customizations. By definition, | features while allowing link-specific customizations. By definition, | |||
this specification considers handovers that interwork with Mobile IP. | this specification considers handovers that interwork with Mobile IP. | |||
Once attached to its new access router, an MN engages in Mobile IP | Once attached to its new access router, an MN engages in Mobile IP | |||
skipping to change at page 3, line 38 | skipping to change at page 4, line 38 | |||
This specification is applicable when a mobile node has to perform IP | This specification is applicable when a mobile node has to perform IP | |||
layer operations as a result of handovers. This specification does | layer operations as a result of handovers. This specification does | |||
not address improving the link switching latency. It does not modify | not address improving the link switching latency. It does not modify | |||
or optimize procedures related to signaling with the home agent of a | or optimize procedures related to signaling with the home agent of a | |||
mobile node. Indeed, while targeted for Mobile IPv6, it could be | mobile node. Indeed, while targeted for Mobile IPv6, it could be | |||
used with any mechanism that allows communication to continue despite | used with any mechanism that allows communication to continue despite | |||
movements. Finally, this specification does not address bulk | movements. Finally, this specification does not address bulk | |||
movement of nodes using aggregate prefixes. | movement of nodes using aggregate prefixes. | |||
This document updates the protocol header format for the Handover | ||||
Initiate (HI) and Handover Acknowledge (HAck) messages defined in | ||||
[rfc5268]. Both the Proxy Mobile IPv6 protocol [RFC5213] and the | ||||
Mobile IPv6 protocol use Mobility Header (MH) as the type for | ||||
carrying signaling related to route updates. Even though the Fast | ||||
Handover protocol uses Mobility Header for Mobile Node signaling | ||||
purposes, it has used ICMP for inter-access router communication. | ||||
Specifying Mobility Header for the HI and HAck messages enables | ||||
deployment of the protocol along-side PMIP6 and MIP6 protocols; the | ||||
reasons that led to this change are captured in Appendix B. Hence, | ||||
this document specifies the Mobility Header formats for HI and HAck | ||||
messages (Section 6.2.1) and the Mobility Header option format for | ||||
the IPv6 Address/Prefix option (Section 6.4.2), and deprecates the | ||||
use of ICMP for HI and HAck messages. | ||||
2. Terminology | 2. Terminology | |||
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | |||
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | |||
document are to be interpreted as described in RFC 2119 [RFC2119]. | document are to be interpreted as described in RFC 2119 [RFC2119]. | |||
The use of the term, "silently ignore" is not defined in RFC 2119. | The use of the term, "silently ignore" is not defined in RFC 2119. | |||
However, the term is used in this document and can be similarly | However, the term is used in this document and can be similarly | |||
construed. | construed. | |||
The following terminology and abbreviations are used in this document | The following terminology and abbreviations are used in this document | |||
skipping to change at page 4, line 39 | skipping to change at page 6, line 5 | |||
referred to as a Basic Service Set IDentifier (BSSID). | referred to as a Basic Service Set IDentifier (BSSID). | |||
Access Router (AR): The MN's default router. | Access Router (AR): The MN's default router. | |||
Previous Access Router (PAR): The MN's default router prior to its | Previous Access Router (PAR): The MN's default router prior to its | |||
handover. | handover. | |||
New Access Router (NAR): The MN's anticipated default router | New Access Router (NAR): The MN's anticipated default router | |||
subsequent to its handover. | subsequent to its handover. | |||
Previous CoA (PCoA): The MN's Care-of Address valid on PAR's subnet. | Previous CoA (PCoA): The MN's Care-of Address valid on PAR's | |||
subnet. | ||||
New CoA (NCoA): The MN's Care-of Address valid on NAR's subnet. | New CoA (NCoA): The MN's Care-of Address valid on NAR's subnet. | |||
Handover: A process of terminating existing connectivity and | Handover: A process of terminating existing connectivity and | |||
obtaining new IP connectivity. | obtaining new IP connectivity. | |||
Router Solicitation for Proxy Advertisement (RtSolPr): A message from | Router Solicitation for Proxy Advertisement (RtSolPr): A message | |||
the MN to the PAR requesting information for a potential handover. | from the MN to the PAR requesting information for a potential | |||
handover. | ||||
Proxy Router Advertisement (PrRtAdv): A message from the PAR to the | Proxy Router Advertisement (PrRtAdv): A message from the PAR to | |||
MN that provides information about neighboring links facilitating | the MN that provides information about neighboring links | |||
expedited movement detection. The message can also act as a trigger | facilitating expedited movement detection. The message can also | |||
for network-initiated handover. | act as a trigger for network-initiated handover. | |||
(AP-ID, AR-Info) tuple: Contains an access router's L2 and IP | (AP-ID, AR-Info) tuple: Contains an access router's L2 and IP | |||
addresses, and prefix valid on the interface to which the Access | addresses, and prefix valid on the interface to which the Access | |||
Point (identified by AP-ID) is attached. The triplet [Router's L2 | Point (identified by AP-ID) is attached. The triplet [Router's L2 | |||
address, Router's IP address, and Prefix] is called "AR-Info". See | address, Router's IP address, and Prefix] is called "AR-Info". | |||
Section 5.3. | See also Section 5.3. | |||
Neighborhood Discovery: The process of resolving neighborhood AP-IDs | Neighborhood Discovery: The process of resolving neighborhood AP- | |||
to AR-Info. | IDs to AR-Info. | |||
Assigned Addressing: A particular type of NCoA configuration in which | Assigned Addressing: A particular type of NCoA configuration in | |||
the NAR assigns an IPv6 address for the MN. The method by which NAR | which the NAR assigns an IPv6 address for the MN. The method by | |||
manages its address pool is not specified in this document. | which NAR manages its address pool is not specified in this | |||
document. | ||||
Fast Binding Update (FBU): A message from the MN instructing its PAR | Fast Binding Update (FBU): A message from the MN instructing its | |||
to redirect its traffic (toward NAR). | PAR to redirect its traffic (toward NAR). | |||
Fast Binding Acknowledgment (FBack): A message from the PAR in | Fast Binding Acknowledgment (FBack): A message from the PAR in | |||
response to an FBU. | response to an FBU. | |||
Predictive Fast Handover: The fast handover in which an MN is able to | Predictive Fast Handover: The fast handover in which an MN is able | |||
send an FBU when it is attached to the PAR, which then establishes | to send an FBU when it is attached to the PAR, which then | |||
forwarding for its traffic (even before the MN attaches to the NAR). | establishes forwarding for its traffic (even before the MN | |||
attaches to the NAR). | ||||
Reactive Fast Handover: The fast handover in which an MN is able to | Reactive Fast Handover: The fast handover in which an MN is able | |||
send the FBU only after attaching to the NAR. | to send the FBU only after attaching to the NAR. | |||
Unsolicited Neighbor Advertisement (UNA): The message in [RFC4861] | Unsolicited Neighbor Advertisement (UNA): The message in [RFC4861] | |||
with 'O' bit cleared. | with 'O' bit cleared. | |||
Fast Neighbor Advertisement (FNA): This message from RFC 4068 | Fast Neighbor Advertisement (FNA): This message from RFC 4068 | |||
[RFC4068] is deprecated. The UNA message above is the preferred | [RFC4068] is deprecated. The UNA message above is the preferred | |||
message in this specification. | message in this specification. | |||
Handover Initiate (HI): A message from the PAR to the NAR regarding | Handover Initiate (HI): A message from the PAR to the NAR | |||
an MN's handover. | regarding an MN's handover. | |||
Handover Acknowledge (HAck): A message from the NAR to the PAR as a | Handover Acknowledge (HAck): A message from the NAR to the PAR as | |||
response to HI. | a response to HI. | |||
3. Protocol Overview | 3. Protocol Overview | |||
3.1. Addressing the Handover Latency | 3.1. Addressing the Handover Latency | |||
The ability to immediately send packets from a new subnet link | The ability to immediately send packets from a new subnet link | |||
depends on the "IP connectivity" latency, which in turn depends on | depends on the "IP connectivity" latency, which in turn depends on | |||
the movement detection latency and the new CoA configuration latency. | the movement detection latency and the new CoA configuration latency. | |||
Once an MN is IP-capable on the new subnet link, it can send a | Once an MN is IP-capable on the new subnet link, it can send a | |||
Binding Update to its Home Agent and one or more correspondents. | Binding Update to its Home Agent and one or more correspondents. | |||
skipping to change at page 6, line 44 | skipping to change at page 8, line 5 | |||
Proxy Advertisement (RtSolPr)" and "Proxy Router Advertisement | Proxy Advertisement (RtSolPr)" and "Proxy Router Advertisement | |||
(PrRtAdv)" messages in Section 6.1 are used for aiding movement | (PrRtAdv)" messages in Section 6.1 are used for aiding movement | |||
detection. | detection. | |||
Through the RtSolPr and PrRtAdv messages, the MN also formulates a | Through the RtSolPr and PrRtAdv messages, the MN also formulates a | |||
prospective new CoA (NCoA) when it is still present on the PAR's | prospective new CoA (NCoA) when it is still present on the PAR's | |||
link. Hence, the latency due to new prefix discovery subsequent to | link. Hence, the latency due to new prefix discovery subsequent to | |||
handover is eliminated. Furthermore, this prospective address can be | handover is eliminated. Furthermore, this prospective address can be | |||
used immediately after attaching to the new subnet link (i.e., NAR's | used immediately after attaching to the new subnet link (i.e., NAR's | |||
link) when the MN has received a "Fast Binding Acknowledgment | link) when the MN has received a "Fast Binding Acknowledgment | |||
(FBack)" (see Section 6.3.2) message prior to its movement. In the | (FBack)" (see Section 6.2.3) message prior to its movement. In the | |||
event it moves without receiving an FBack, the MN can still start | event it moves without receiving an FBack, the MN can still start | |||
using NCoA after announcing its attachment through an unsolicited | using NCoA after announcing its attachment through an unsolicited | |||
Neighbor Advertisement message (with the 'O' bit set to zero) | Neighbor Advertisement message (with the 'O' bit set to zero) | |||
[RFC4861]; NAR responds to this UNA message in case it wishes to | [RFC4861]; NAR responds to this UNA message in case it wishes to | |||
provide a different IP address to use. In this way, NCoA | provide a different IP address to use. In this way, NCoA | |||
configuration latency is reduced. | configuration latency is reduced. | |||
The information provided in the PrRtAdv message can be used even when | The information provided in the PrRtAdv message can be used even when | |||
DHCP [RFC3315] is used to configure an NCoA on the NAR's link. In | DHCP [RFC3315] is used to configure an NCoA on the NAR's link. In | |||
this case, the protocol supports forwarding using PCoA, and the MN | this case, the protocol supports forwarding using PCoA, and the MN | |||
performs DHCP once it attaches to the NAR's link. The MN still | performs DHCP once it attaches to the NAR's link. The MN still | |||
formulates an NCoA for FBU processing; however, it MUST NOT send data | formulates an NCoA for FBU processing; however, it MUST NOT send data | |||
packets using the NCoA in the FBU. | packets using the NCoA in the FBU. | |||
In order to reduce the Binding Update latency, the protocol specifies | In order to reduce the Binding Update latency, the protocol specifies | |||
a binding between the Previous CoA (PCoA) and NCoA. An MN sends a | a binding between the Previous CoA (PCoA) and NCoA. An MN sends a | |||
"Fast Binding Update" (see Section 6.3.1) message to its Previous | "Fast Binding Update" (see Section 6.2.2) message to its Previous | |||
Access Router to establish this tunnel. When feasible, the MN SHOULD | Access Router to establish this tunnel. When feasible, the MN SHOULD | |||
send an FBU from the PAR's link. Otherwise, the MN should send the | send an FBU from the PAR's link. Otherwise, the MN should send the | |||
FBU immediately after detecting attachment to the NAR. An FBU | FBU immediately after detecting attachment to the NAR. An FBU | |||
message MUST contain the Binding Authorization Data for FMIPv6 (BADF) | message MUST contain the Binding Authorization Data for FMIPv6 (BADF) | |||
option (see Section 6.5.4) in order to ensure that only a legitimate | option (see Section 6.4.5) in order to ensure that only a legitimate | |||
MN that owns the PCoA is able to establish a binding. Subsequent | MN that owns the PCoA is able to establish a binding. Subsequent | |||
sections describe the protocol mechanics. In any case, the result is | sections describe the protocol mechanics. In any case, the result is | |||
that the PAR begins tunneling packets arriving for PCoA to NCoA. | that the PAR begins tunneling packets arriving for PCoA to NCoA. | |||
Such a tunnel remains active until the MN completes the Binding | Such a tunnel remains active until the MN completes the Binding | |||
Update with its correspondents. In the opposite direction, the MN | Update with its correspondents. In the opposite direction, the MN | |||
SHOULD reverse tunnel packets to the PAR, again until it completes | SHOULD reverse tunnel packets to the PAR, again until it completes | |||
Binding Update. And, PAR MUST forward the inner packet in the tunnel | Binding Update. And, PAR MUST forward the inner packet in the tunnel | |||
to its destination (i.e., to the MN's correspondent). Such a reverse | to its destination (i.e., to the MN's correspondent). Such a reverse | |||
tunnel ensures that packets containing a PCoA as a source IP address | tunnel ensures that packets containing a PCoA as a source IP address | |||
are not dropped due to ingress filtering. Even though the MN is | are not dropped due to ingress filtering. Even though the MN is IP- | |||
IP-capable on the new link, it cannot use the NCoA directly with its | capable on the new link, it cannot use the NCoA directly with its | |||
correspondents without the correspondents first establishing a | correspondents without the correspondents first establishing a | |||
binding cache entry (for the NCoA). Forwarding support for the PCoA | binding cache entry (for the NCoA). Forwarding support for the PCoA | |||
is provided through a reverse tunnel between the MN and the PAR. | is provided through a reverse tunnel between the MN and the PAR. | |||
Setting up a tunnel alone does not ensure that the MN receives | Setting up a tunnel alone does not ensure that the MN receives | |||
packets as soon as it is attached to a new subnet link, unless the | packets as soon as it is attached to a new subnet link, unless the | |||
NAR can detect the MN's presence. A neighbor discovery operation | NAR can detect the MN's presence. A neighbor discovery operation | |||
involving a neighbor's address resolution (i.e., Neighbor | involving a neighbor's address resolution (i.e., Neighbor | |||
Solicitation and Neighbor Advertisement) typically results in | Solicitation and Neighbor Advertisement) typically results in | |||
considerable delay, sometimes lasting multiple seconds. For | considerable delay, sometimes lasting multiple seconds. For | |||
skipping to change at page 8, line 21 | skipping to change at page 9, line 30 | |||
Neighbor Discovery protocol provides a small buffer (typically one or | Neighbor Discovery protocol provides a small buffer (typically one or | |||
two packets) for packets awaiting address resolution, this buffer may | two packets) for packets awaiting address resolution, this buffer may | |||
be inadequate for traffic, such as VoIP, already in progress. The | be inadequate for traffic, such as VoIP, already in progress. The | |||
routers may also wish to maintain a separate buffer for servicing the | routers may also wish to maintain a separate buffer for servicing the | |||
handover traffic. Finally, the access routers could transfer | handover traffic. Finally, the access routers could transfer | |||
network-resident contexts, such as access control, Quality of Service | network-resident contexts, such as access control, Quality of Service | |||
(QoS), and header compression, in conjunction with handover (although | (QoS), and header compression, in conjunction with handover (although | |||
the context transfer process itself is not specified in this | the context transfer process itself is not specified in this | |||
document). For all these operations, the protocol provides "Handover | document). For all these operations, the protocol provides "Handover | |||
Initiate (HI)" and "Handover Acknowledge (HAck)" messages (see | Initiate (HI)" and "Handover Acknowledge (HAck)" messages (see | |||
Section 6.2). Both of these messages SHOULD be used. The access | Section 6.2.1). Both of these messages SHOULD be used. The access | |||
routers MUST have the necessary security association established by | routers MUST have the necessary security association established by | |||
means outside the scope of this document. | means outside the scope of this document. | |||
3.2. Protocol Operation | 3.2. Protocol Operation | |||
The protocol begins when an MN sends an RtSolPr message to its access | The protocol begins when an MN sends an RtSolPr message to its access | |||
router to resolve one or more Access Point Identifiers to | router to resolve one or more Access Point Identifiers to subnet- | |||
subnet-specific information. In response, the access router (e.g., | specific information. In response, the access router (e.g., PAR in | |||
PAR in Figure 1) sends a PrRtAdv message containing one or more | Figure 1) sends a PrRtAdv message containing one or more [AP-ID, AR- | |||
[AP-ID, AR-Info] tuples. The MN may send an RtSolPr at any | Info] tuples. The MN may send an RtSolPr at any convenient time, for | |||
convenient time, for instance as a response to some link-specific | instance as a response to some link-specific event (a "trigger") or | |||
event (a "trigger") or simply after performing router discovery. | simply after performing router discovery. However, the expectation | |||
However, the expectation is that prior to sending an RtSolPr, the MN | is that prior to sending an RtSolPr, the MN will have discovered the | |||
will have discovered the available APs by link-specific methods. The | available APs by link-specific methods. The RtSolPr and PrRtAdv | |||
RtSolPr and PrRtAdv messages do not establish any state at the access | messages do not establish any state at the access router; their | |||
router; their packet formats are defined in Section 6.1. | packet formats are defined in Section 6.1. | |||
With the information provided in the PrRtAdv message, the MN | With the information provided in the PrRtAdv message, the MN | |||
formulates a prospective NCoA and sends an FBU message to the PAR. | formulates a prospective NCoA and sends an FBU message to the PAR. | |||
The purpose of the FBU is to authorize the PAR to bind the PCoA to | The purpose of the FBU is to authorize the PAR to bind the PCoA to | |||
the NCoA, so that arriving packets can be tunneled to the new | the NCoA, so that arriving packets can be tunneled to the new | |||
location of the MN. The FBU should be sent from the PAR's link | location of the MN. The FBU should be sent from the PAR's link | |||
whenever feasible. For instance, an internal link-specific trigger | whenever feasible. For instance, an internal link-specific trigger | |||
could enable FBU transmission from the previous link. | could enable FBU transmission from the previous link. | |||
When it is not feasible, the FBU is sent from the new link. | When it is not feasible, the FBU is sent from the new link. | |||
The format and semantics of FBU processing are specified in Section | The format and semantics of FBU processing are specified in | |||
6.3.1. The FBU message MUST contain the BADF option (see Section | Section 6.2.2. The FBU message MUST contain the BADF option (see | |||
6.5.4) to secure the message. | Section 6.4.5) to secure the message. | |||
Depending on whether an FBack is received on the previous link (which | Depending on whether an FBack is received on the previous link (which | |||
clearly depends on whether the FBU was sent in the first place), | clearly depends on whether the FBU was sent in the first place), | |||
there are two modes of operation. | there are two modes of operation. | |||
1. The MN receives FBack on the previous link. This means that | 1. The MN receives FBack on the previous link. This means that | |||
packet tunneling is already in progress by the time the MN | packet tunneling is already in progress by the time the MN | |||
handovers to the NAR. The MN SHOULD send the UNA immediately | handovers to the NAR. The MN SHOULD send the UNA immediately | |||
after attaching to the NAR, so that arriving as well as | after attaching to the NAR, so that arriving as well as buffered | |||
buffered packets can be forwarded to the MN right away. | packets can be forwarded to the MN right away. Before sending | |||
Before sending FBack to the MN, the PAR can determine whether | FBack to the MN, the PAR can determine whether the NCoA is | |||
the NCoA is acceptable to the NAR through the exchange of HI | acceptable to the NAR through the exchange of HI and HAck | |||
and HAck messages. When assigned addressing (i.e., addresses | messages. When assigned addressing (i.e., addresses are assigned | |||
are assigned by the router) is used, the proposed NCoA in the | by the router) is used, the proposed NCoA in the FBU is carried | |||
FBU is carried in an HI message (from PAR to NAR), and NAR MAY | in an HI message (from PAR to NAR), and NAR MAY assign the | |||
assign the proposed NCoA. Such an assigned NCoA MUST be | proposed NCoA. Such an assigned NCoA MUST be returned in HAck | |||
returned in HAck (from NAR to PAR), and PAR MUST in turn | (from NAR to PAR), and PAR MUST in turn provide the assigned NCoA | |||
provide the assigned NCoA in FBack. If there is an assigned | in FBack. If there is an assigned NCoA returned in FBack, the MN | |||
NCoA returned in FBack, the MN MUST use the assigned address | MUST use the assigned address (and not the proposed address in | |||
(and not the proposed address in FBU) upon attaching to NAR. | FBU) upon attaching to NAR. | |||
2. The MN does not receive the FBack on the previous link because | 2. The MN does not receive the FBack on the previous link because | |||
the MN has not sent the FBU or the MN has left the link after | the MN has not sent the FBU or the MN has left the link after | |||
sending the FBU (which itself may be lost), but before | sending the FBU (which itself may be lost), but before receiving | |||
receiving an FBack. Without receiving an FBack in the latter | an FBack. Without receiving an FBack in the latter case, the MN | |||
case, the MN cannot ascertain whether the PAR has processed | cannot ascertain whether the PAR has processed the FBU | |||
the FBU successfully. Hence, the MN (re)sends the FBU message | successfully. Hence, the MN (re)sends the FBU message to the PAR | |||
to the PAR immediately after sending the UNA message. If the | immediately after sending the UNA message. If the NAR chooses to | |||
NAR chooses to supply a different IP address to use than the | supply a different IP address to use than the NCoA, it MAY send a | |||
NCoA, it MAY send a Router Advertisement with "Neighbor | Router Advertisement with "Neighbor Advertisement Acknowledge | |||
Advertisement Acknowledge (NAACK)" option in which it includes | (NAACK)" option in which it includes an alternate IP address for | |||
an alternate IP address for the MN to use. Detailed UNA | the MN to use. Detailed UNA processing rules are specified in | |||
processing rules are specified in Section 6.4. | Section 6.3. | |||
The scenario in which an MN sends an FBU and receives an FBack on | The scenario in which an MN sends an FBU and receives an FBack on | |||
PAR's link is illustrated in Figure 2. For convenience, this | PAR's link is illustrated in Figure 2. For convenience, this | |||
scenario is characterized as the "predictive" mode of operation. The | scenario is characterized as the "predictive" mode of operation. The | |||
scenario in which the MN sends an FBU from the NAR's link is | scenario in which the MN sends an FBU from the NAR's link is | |||
illustrated in Figure 3. For convenience, this scenario is | illustrated in Figure 3. For convenience, this scenario is | |||
characterized as the "reactive" mode of operation. Note that the | characterized as the "reactive" mode of operation. Note that the | |||
reactive mode also includes the case in which an FBU has been sent | reactive mode also includes the case in which an FBU has been sent | |||
from the PAR's link but an FBack has not yet been received. The | from the PAR's link but an FBack has not yet been received. The | |||
figure is intended to illustrate that the FBU is forwarded through | figure is intended to illustrate that the FBU is forwarded through | |||
skipping to change at page 11, line 4 | skipping to change at page 12, line 26 | |||
| |----------HI--------->| | | |----------HI--------->| | |||
| |<-------HAck----------| | | |<-------HAck----------| | |||
| |(HI/HAck if necessary)| | | |(HI/HAck if necessary)| | |||
| forward | | | forward | | |||
| packets(including FBAck)=====>| | | packets(including FBAck)=====>| | |||
| | | | | | | | |||
|<=================================== deliver packets | |<=================================== deliver packets | |||
| | | | | | |||
Figure 3: Reactive Fast Handover | Figure 3: Reactive Fast Handover | |||
Finally, the PrRtAdv message may be sent unsolicited, i.e., without | Finally, the PrRtAdv message may be sent unsolicited, i.e., without | |||
the MN first sending an RtSolPr. This mode is described in Section | the MN first sending an RtSolPr. This mode is described in | |||
3.3. | Section 3.3. | |||
3.3. Protocol Operation during Network-Initiated Handover | 3.3. Protocol Operation during Network-Initiated Handover | |||
In some wireless technologies, the handover control may reside in the | In some wireless technologies, the handover control may reside in the | |||
network even though the decision to undergo handover may be mutually | network even though the decision to undergo handover may be mutually | |||
arrived at between the MN and the network. In such networks, the PAR | arrived at between the MN and the network. In such networks, the PAR | |||
can send an unsolicited PrRtAdv containing the link-layer address, IP | can send an unsolicited PrRtAdv containing the link-layer address, IP | |||
address, and subnet prefix of the NAR when the network decides that a | address, and subnet prefix of the NAR when the network decides that a | |||
handover is imminent. The MN MUST process this PrRtAdv to configure | handover is imminent. The MN MUST process this PrRtAdv to configure | |||
a new Care-of Address on the new subnet, and MUST send an FBU to the | a new Care-of Address on the new subnet, and MUST send an FBU to PAR | |||
PAR prior to switching to the new link. After transmitting PrRtAdv, | prior to switching to the new link. After transmitting PrRtAdv, the | |||
the PAR MUST continue to forward packets to the MN on its current | PAR MUST continue to forward packets to the MN on its current link | |||
link until the FBU is received. The rest of the operation is the | until the FBU is received. The rest of the operation is the same as | |||
same as that described in Section 3.2. | that described in Section 3.2. | |||
The unsolicited PrRtAdv also allows the network to inform the MN | The unsolicited PrRtAdv also allows the network to inform the MN | |||
about geographically adjacent subnets without the MN having to | about geographically adjacent subnets without the MN having to | |||
explicitly request that information. This can reduce the amount of | explicitly request that information. This can reduce the amount of | |||
wireless traffic required for the MN to obtain a neighborhood | wireless traffic required for the MN to obtain a neighborhood | |||
topology map of links and subnets. Such usage of PrRtAdv is | topology map of links and subnets. Such usage of PrRtAdv is | |||
decoupled from the actual handover; see Section 6.1.2. | decoupled from the actual handover; see Section 6.1.2. | |||
4. Protocol Details | 4. Protocol Details | |||
skipping to change at page 12, line 8 | skipping to change at page 13, line 31 | |||
"link up" indication is obtained on the new link, protocol messages | "link up" indication is obtained on the new link, protocol messages | |||
(e.g., UNA) can be transmitted immediately. Implementations SHOULD | (e.g., UNA) can be transmitted immediately. Implementations SHOULD | |||
make use of such triggers whenever available. | make use of such triggers whenever available. | |||
The RtSolPr message contains one or more AP-IDs. A wildcard requests | The RtSolPr message contains one or more AP-IDs. A wildcard requests | |||
all available tuples. | all available tuples. | |||
As a response to RtSolPr, the PAR sends a PrRtAdv message that | As a response to RtSolPr, the PAR sends a PrRtAdv message that | |||
indicates one of the following possible conditions. | indicates one of the following possible conditions. | |||
1. If the PAR does not have an entry corresponding to the new | 1. If the PAR does not have an entry corresponding to the new access | |||
access point, it MUST respond indicating that the new access | point, it MUST respond indicating that the new access point is | |||
point is unknown. The MN MUST stop fast handover protocol | unknown. The MN MUST stop fast handover protocol operations on | |||
operations on the current link. The MN MAY send an FBU from | the current link. The MN MAY send an FBU from its new link. | |||
its new link. | ||||
2. If the new access point is connected to the PAR's current | 2. If the new access point is connected to the PAR's current | |||
interface (to which MN is attached), the PAR MUST respond with | interface (to which MN is attached), the PAR MUST respond with a | |||
a Code value indicating that the new access point is connected | Code value indicating that the new access point is connected to | |||
to the current interface, but not send any prefix information. | the current interface, but not send any prefix information. This | |||
This scenario could arise, for example, when several wireless | scenario could arise, for example, when several wireless access | |||
access points are bridged into a wired network. No further | points are bridged into a wired network. No further protocol | |||
protocol action is necessary. | action is necessary. | |||
3. If the new access point is known and the PAR has information | 3. If the new access point is known and the PAR has information | |||
about it, then the PAR MUST respond indicating that the new | about it, then the PAR MUST respond indicating that the new | |||
access point is known and supply the [AP-ID, AR-Info] tuple. | access point is known and supply the [AP-ID, AR-Info] tuple. If | |||
If the new access point is known, but does not support fast | the new access point is known, but does not support fast | |||
handover, the PAR MUST indicate this with Code 3 (see Section | handover, the PAR MUST indicate this with Code 3 (see | |||
6.1.2). | Section 6.1.2). | |||
4. If a wildcard is supplied as an identifier for the new access | 4. If a wildcard is supplied as an identifier for the new access | |||
point, the PAR SHOULD supply neighborhood [AP-ID, AR-Info] | point, the PAR SHOULD supply neighborhood [AP-ID, AR-Info] tuples | |||
tuples that are subject to path MTU restrictions (i.e., | that are subject to path MTU restrictions (i.e., provide any 'n' | |||
provide any 'n' tuples without exceeding the link MTU). | tuples without exceeding the link MTU). | |||
When further protocol action is necessary, some implementations MAY | When further protocol action is necessary, some implementations MAY | |||
choose to begin buffering copies of incoming packets at the PAR. If | choose to begin buffering copies of incoming packets at the PAR. If | |||
such First in First Out (FIFO) buffering is used, the PAR MUST | such First In First Out (FIFO) buffering is used, the PAR MUST | |||
continue forwarding the packets to the PCoA (i.e., buffer and | continue forwarding the packets to the PCoA (i.e., buffer and | |||
forward). While the protocol does not forbid such an implementation | forward). While the protocol does not forbid such an implementation | |||
support, care must be taken to ensure that the PAR continues | support, care must be taken to ensure that the PAR continues | |||
forwarding packets to the PCoA (i.e., uses a buffer and forward | forwarding packets to the PCoA (i.e., uses a buffer and forward | |||
approach). The PAR SHOULD stop buffering once it begins forwarding | approach). The PAR SHOULD stop buffering once it begins forwarding | |||
packets to the NCoA. | packets to the NCoA. | |||
The method by which access routers exchange information about their | The method by which access routers exchange information about their | |||
neighbors and thereby allow construction of Proxy Router | neighbors and thereby allow construction of Proxy Router | |||
Advertisements with information about neighboring subnets is outside | Advertisements with information about neighboring subnets is outside | |||
skipping to change at page 13, line 26 | skipping to change at page 14, line 43 | |||
feasible or when it has not received an FBack, the MN sends an FBU | feasible or when it has not received an FBack, the MN sends an FBU | |||
immediately after attaching to NAR's link. In response to the FBU, | immediately after attaching to NAR's link. In response to the FBU, | |||
the PAR establishes a binding between the PCoA ("Home Address") and | the PAR establishes a binding between the PCoA ("Home Address") and | |||
the NCoA, and sends the FBack to the MN. Prior to establishing this | the NCoA, and sends the FBack to the MN. Prior to establishing this | |||
binding, the PAR SHOULD send an HI message to the NAR, and receive | binding, the PAR SHOULD send an HI message to the NAR, and receive | |||
HAck in response. In order to determine the NAR's address for the HI | HAck in response. In order to determine the NAR's address for the HI | |||
message, the PAR can perform the longest prefix match of NCoA (in | message, the PAR can perform the longest prefix match of NCoA (in | |||
FBU) with the prefix list of neighboring access routers. When the | FBU) with the prefix list of neighboring access routers. When the | |||
source IP address of the FBU is the PCoA, i.e., the FBU is sent from | source IP address of the FBU is the PCoA, i.e., the FBU is sent from | |||
the PAR's link, the HI message MUST have a Code value set to 0; see | the PAR's link, the HI message MUST have a Code value set to 0; see | |||
Section 6.2.1. When the source IP address of the FBU is not PCoA, | Section 6.2.1.1. When the source IP address of the FBU is not PCoA, | |||
i.e., the FBU is sent from the NAR's link, the HI message MUST have a | i.e., the FBU is sent from the NAR's link, the HI message MUST have a | |||
Code value of 1; see Section 6.2.1. | Code value of 1; see Section 6.2.1.1. | |||
The HI message contains the PCoA, link-layer address, and the NCoA of | The HI message contains the PCoA, link-layer address and the NCoA of | |||
the MN. In response to processing an HI message with Code 0, the | the MN. In response to processing an HI message with Code 0, the | |||
NAR: | NAR: | |||
1. determines whether the NCoA supplied in the HI message is | 1. determines whether the NCoA supplied in the HI message is unique | |||
unique before beginning to defend it. It sends a Duplicate | before beginning to defend it. It sends a Duplicate Address | |||
Address Detection (DAD) probe [RFC4862] for NCoA to verify | Detection (DAD) probe [RFC4862] for NCoA to verify uniqueness. | |||
uniqueness. However, in deployments where the probability of | However, in deployments where the probability of address | |||
address collisions is considered extremely low (and hence not | collisions is considered extremely low (and hence not an issue), | |||
an issue), the parameter DupAddrDetectTransmits (see | the parameter DupAddrDetectTransmits (see [RFC4862]) is set to | |||
[RFC4862]) is set to zero on the NAR, allowing it to avoid | zero on the NAR, allowing it to avoid performing DAD on the NCoA. | |||
performing DAD on the NCoA. The NAR similarly sets | The NAR similarly sets DupAddrDetectTransmits to zero in other | |||
DupAddrDetectTransmits to zero in other deployments where DAD | deployments where DAD is not a concern. Once the NCoA is | |||
is not a concern. Once the NCoA is determined to be unique, | determined to be unique, the NAR starts proxying [RFC4861] the | |||
the NAR starts proxying [RFC4861] the address for | address for PROXY_ND_LIFETIME during which the MN is expected to | |||
PROXY_ND_LIFETIME during which the MN is expected to connect | connect to the NAR. In case there is already an NCoA present in | |||
to the NAR. In case there is already an NCoA present in its | its data structure (for instance, it has already processed an HI | |||
data structure (for instance, it has already processed an HI | ||||
message earlier), the NAR MAY verify if the LLA is the same as | message earlier), the NAR MAY verify if the LLA is the same as | |||
its own or that of the MN itself. If so, the NAR MAY allow | its own or that of the MN itself. If so, the NAR MAY allow the | |||
the use of the NCoA. | use of the NCoA. | |||
2. allocates the NCoA for the MN when assigned addressing is | 2. allocates the NCoA for the MN when assigned addressing is used, | |||
used, creates a proxy neighbor cache entry and begins | creates a proxy neighbor cache entry and begins defending it. | |||
defending it. The NAR MAY allocate the NCoA proposed in HI. | The NAR MAY allocate the NCoA proposed in HI. | |||
3. MAY create a host route entry for the PCoA (on the interface | 3. MAY create a host route entry for the PCoA (on the interface to | |||
to which the MN is attaching to) in case the NCoA cannot be | which the MN is attaching to) in case the NCoA cannot be accepted | |||
accepted or assigned. This host route entry SHOULD be | or assigned. This host route entry SHOULD be implemented such | |||
implemented such that until the MN's presence is detected, | that until the MN's presence is detected, either through explicit | |||
either through explicit announcement by the MN or by other | announcement by the MN or by other means, arriving packets do not | |||
means, arriving packets do not invoke neighbor discovery. The | invoke neighbor discovery. The NAR SHOULD also set up a reverse | |||
NAR SHOULD also set up a reverse tunnel to the PAR in this | tunnel to the PAR in this case. | |||
case. | ||||
4. provides the status of the handover request in the Handover | 4. provides the status of the handover request in the Handover | |||
Acknowledge (HAck) message to the PAR. | Acknowledge (HAck) message to the PAR. | |||
When the Code value in HI is 1, the NAR MUST skip the above | When the Code value in HI is 1, the NAR MUST skip the above | |||
operations. Sending an HI message with Code 1 allows the NAR to | operations. Sending an HI message with Code 1 allows the NAR to | |||
validate the neighbor cache entry it creates for the MN during UNA | validate the neighbor cache entry it creates for the MN during UNA | |||
processing. That is, the NAR can make use of the knowledge that its | processing. That is, the NAR can make use of the knowledge that its | |||
trusted peer (i.e., the PAR) has a trust relationship with the MN. | trusted peer (i.e., the PAR) has a trust relationship with the MN. | |||
skipping to change at page 14, line 38 | skipping to change at page 16, line 5 | |||
MN MUST use the address provided in the FBack. The PAR MAY send the | MN MUST use the address provided in the FBack. The PAR MAY send the | |||
FBack to the previous link as well to facilitate faster reception in | FBack to the previous link as well to facilitate faster reception in | |||
the event that the MN is still present. The result of the FBU and | the event that the MN is still present. The result of the FBU and | |||
FBack processing is that PAR begins tunneling the MN's packets to the | FBack processing is that PAR begins tunneling the MN's packets to the | |||
NCoA. If the MN does not receive an FBack message even after | NCoA. If the MN does not receive an FBack message even after | |||
retransmitting the FBU for FBU_RETRIES, it must assume that fast | retransmitting the FBU for FBU_RETRIES, it must assume that fast | |||
handover support is not available and stop the protocol operation. | handover support is not available and stop the protocol operation. | |||
As soon as the MN establishes link connectivity with the NAR, it: | As soon as the MN establishes link connectivity with the NAR, it: | |||
1. sends an UNA message (see Section 6.4). If the MN has not | 1. sends an UNA message (see Section 6.3). If the MN has not | |||
received an FBack by the time UNA is being sent, it SHOULD | received an FBack by the time UNA is being sent, it SHOULD send | |||
send an FBU message following the UNA message. | an FBU message following the UNA message. | |||
2. joins the all-nodes multicast group and the solicited-node | 2. joins the all-nodes multicast group and the solicited-node | |||
multicast group corresponding to the NCoA. | multicast group corresponding to the NCoA. | |||
3. starts a DAD probe for NCoA, see [RFC4862]. | 3. starts a DAD probe for NCoA, see [RFC4862]. | |||
When a NAR receives an UNA message, it: | When a NAR receives an UNA message, it: | |||
1. deletes its proxy neighbor cache entry, if it exists, updates | 1. deletes its proxy neighbor cache entry, if it exists, updates the | |||
the state to STALE [RFC4861], and forwards arriving and | state to STALE [RFC4861], and forwards arriving and buffered | |||
buffered packets. | packets. | |||
2. updates an entry in INCOMPLETE state [RFC4861], if it exists, | 2. updates an entry in INCOMPLETE state [RFC4861], if it exists, to | |||
to STALE and forwards arriving and buffered packets. This | STALE and forwards arriving and buffered packets. This would be | |||
would be the case if NAR had previously sent a Neighbor | the case if NAR had previously sent a Neighbor Solicitation that | |||
Solicitation that went unanswered perhaps because the MN had | went unanswered perhaps because the MN had not yet attached to | |||
not yet attached to the link. | the link. | |||
The buffer for handover traffic should be linked to this UNA | The buffer for handover traffic should be linked to this UNA | |||
processing. The exact mechanism is implementation dependent. | processing. The exact mechanism is implementation dependent. | |||
The NAR may choose to provide a different IP address other than the | The NAR may choose to provide a different IP address other than the | |||
NCoA. This is possible if it is proxying the NCoA. In such a case, | NCoA. This is possible if it is proxying the NCoA. In such a case, | |||
it: | it: | |||
1. MAY send a Router Advertisement with the NAACK option in which | 1. MAY send a Router Advertisement with the NAACK option in which it | |||
it includes an alternate IP address for use. This message | includes an alternate IP address for use. This message MUST be | |||
MUST be sent to the source IP address present in UNA using the | sent to the source IP address present in UNA using the same Layer | |||
same Layer 2 address present in UNA. | 2 address present in UNA. | |||
If the MN receives an IP address in the NAACK option, it MUST use it | If the MN receives an IP address in the NAACK option, it MUST use it | |||
and send an FBU using the new CoA. As a special case, the address | and send an FBU using the new CoA. As a special case, the address | |||
supplied in NAACK could be the PCoA itself, in which case the MN MUST | supplied in NAACK could be the PCoA itself, in which case the MN MUST | |||
NOT send any more FBUs. The Status codes for the NAACK option are | NOT send any more FBUs. The Status codes for the NAACK option are | |||
specified in Section 6.5.5. | specified in Section 6.4.6. | |||
Once the MN has confirmed its NCoA (either through DAD or when | Once the MN has confirmed its NCoA (either through DAD or when | |||
provided for by the NAR), it SHOULD send a Neighbor Advertisement | provided for by the NAR), it SHOULD send a Neighbor Advertisement | |||
message with the 'O' bit set, to the all-nodes multicast address. | message with the 'O' bit set, to the all-nodes multicast address. | |||
This message allows MN's neighbors to update their neighbor cache | This message allows MN's neighbors to update their neighbor cache | |||
entries. | entries. | |||
For data forwarding, the PAR tunnels packets using its global IP | For data forwarding, the PAR tunnels packets using its global IP | |||
address valid on the interface to which the MN was attached. The MN | address valid on the interface to which the MN was attached. The MN | |||
reverse tunnels its packets to the same global address of PAR. The | reverse tunnels its packets to the same global address of PAR. The | |||
skipping to change at page 17, line 5 | skipping to change at page 18, line 16 | |||
necessarily always, this Prefix may be the aggregate prefix (such as | necessarily always, this Prefix may be the aggregate prefix (such as | |||
/48) valid on the interface. In some deployments, each MN may have | /48) valid on the interface. In some deployments, each MN may have | |||
its own per-mobile prefix (such as a /64) used for generating the | its own per-mobile prefix (such as a /64) used for generating the | |||
NCoA. Some point-to-point links may use such a deployment. | NCoA. Some point-to-point links may use such a deployment. | |||
When per-mobile prefix assignment is used, the "AR-Info" advertised | When per-mobile prefix assignment is used, the "AR-Info" advertised | |||
in PrRtAdv still includes the (aggregate) prefix valid on the | in PrRtAdv still includes the (aggregate) prefix valid on the | |||
interface to which the target AP is attached, unless the access | interface to which the target AP is attached, unless the access | |||
routers communicate with each other (using HI and HAck messages) to | routers communicate with each other (using HI and HAck messages) to | |||
manage the per-mobile prefix. The MN still formulates an NCoA using | manage the per-mobile prefix. The MN still formulates an NCoA using | |||
the aggregate prefix. However, an alternate NCoA based on the | the aggregate prefix. However, an alternate NCoA based on the per- | |||
per-mobile prefix is returned by NAR in the HAck message. This | mobile prefix is returned by NAR in the HAck message. This alternate | |||
alternate NCoA is provided to the MN in either the FBack message or | NCoA is provided to the MN in either the FBack message or in the | |||
in the NAACK option. | NAACK option. | |||
5.4. Packet Loss | 5.4. Packet Loss | |||
Handover involves link switching, which may not be exactly | Handover involves link switching, which may not be exactly | |||
coordinated with fast handover signaling. Furthermore, the arrival | coordinated with fast handover signaling. Furthermore, the arrival | |||
pattern of packets is dependent on many factors, including | pattern of packets is dependent on many factors, including | |||
application characteristics, network queuing behaviors, etc. Hence, | application characteristics, network queuing behaviors, etc. Hence, | |||
packets may arrive at the NAR before the MN is able to establish its | packets may arrive at the NAR before the MN is able to establish its | |||
link there. These packets will be lost unless they are buffered by | link there. These packets will be lost unless they are buffered by | |||
the NAR. Similarly, if the MN attaches to the NAR and then sends an | the NAR. Similarly, if the MN attaches to the NAR and then sends an | |||
skipping to change at page 18, line 38 | skipping to change at page 19, line 49 | |||
It should be noted, however, that this default algorithm is crude and | It should be noted, however, that this default algorithm is crude and | |||
may not be suitable for all situations. Future revisions of this | may not be suitable for all situations. Future revisions of this | |||
specification may provide additional algorithms, once enough | specification may provide additional algorithms, once enough | |||
experience of the various conditions in deployed networks is | experience of the various conditions in deployed networks is | |||
attained. | attained. | |||
5.5. DAD Handling | 5.5. DAD Handling | |||
Duplicate Address Detection (DAD) was defined in [RFC4862] to avoid | Duplicate Address Detection (DAD) was defined in [RFC4862] to avoid | |||
address duplication on links when stateless address | address duplication on links when stateless address auto- | |||
auto-configuration is used. The use of DAD to verify the uniqueness | configuration is used. The use of DAD to verify the uniqueness of an | |||
of an IPv6 address configured through stateless auto-configuration | IPv6 address configured through stateless auto-configuration adds | |||
adds delays to a handover. The probability of an interface | delays to a handover. The probability of an interface identifier | |||
identifier duplication on the same subnet is very low; however, it | duplication on the same subnet is very low; however, it cannot be | |||
cannot be ignored. Hence, the protocol specified in this document | ignored. Hence, the protocol specified in this document SHOULD only | |||
SHOULD only be used in deployments where the probability of such | be used in deployments where the probability of such address | |||
address collisions is extremely low or it is not a concern (because | collisions is extremely low or it is not a concern (because of the | |||
of the address management procedure deployed). The protocol requires | address management procedure deployed). The protocol requires the | |||
the NAR to send a DAD probe before it starts defending the NCoA. | NAR to send a DAD probe before it starts defending the NCoA. | |||
However, this DAD delay can be turned off by setting | However, this DAD delay can be turned off by setting | |||
DupAddrDetectTransmits to zero on the NAR [RFC4862]. | DupAddrDetectTransmits to zero on the NAR ([RFC4862]). | |||
This document specifies messages that can be used to provide | This document specifies messages that can be used to provide | |||
duplicate-free addresses, but the document does not specify how to | duplicate-free addresses, but the document does not specify how to | |||
create or manage such duplicate-free addresses. In some cases, the | create or manage such duplicate-free addresses. In some cases, the | |||
NAR may already have the knowledge required to assess whether or not | NAR may already have the knowledge required to assess whether or not | |||
the MN's address is a duplicate before the MN moves to the new | the MN's address is a duplicate before the MN moves to the new | |||
subnet. For example, in some deployments, the NAR may maintain a | subnet. For example, in some deployments, the NAR may maintain a | |||
pool of duplicate-free addresses in a list for handover purposes. In | pool of duplicate-free addresses in a list for handover purposes. In | |||
such cases, the NAR can provide this disposition in the HAck message | such cases, the NAR can provide this disposition in the HAck message | |||
(see Section 6.2.2) or in the NAACK option (see Section 6.5.5). | (see Section 6.2.1.2) or in the NAACK option (see Section 6.4.6). | |||
5.6. Fast or Erroneous Movement | 5.6. Fast or Erroneous Movement | |||
Although this specification is for fast handover, the protocol is | Although this specification is for fast handover, the protocol is | |||
limited in terms of how fast an MN can move. A special case of fast | limited in terms of how fast an MN can move. A special case of fast | |||
movement is ping-pong, where an MN moves between the same two access | movement is ping-pong, where an MN moves between the same two access | |||
points rapidly. Another instance of the same problem is erroneous | points rapidly. Another instance of the same problem is erroneous | |||
movement, i.e., the MN receives information prior to a handover that | movement, i.e., the MN receives information prior to a handover that | |||
it is moving to a new access point but it either moves to a different | it is moving to a new access point but it either moves to a different | |||
one or it aborts movement altogether. All of the above behaviors are | one or it aborts movement altogether. All of the above behaviors are | |||
skipping to change at page 20, line 32 | skipping to change at page 21, line 36 | |||
The messages are distinguished based on the Subtype field (see | The messages are distinguished based on the Subtype field (see | |||
below). For all the ICMPv6 messages, the checksum is defined in | below). For all the ICMPv6 messages, the checksum is defined in | |||
[RFC4443]. | [RFC4443]. | |||
6.1. New Neighborhood Discovery Messages | 6.1. New Neighborhood Discovery Messages | |||
6.1.1. Router Solicitation for Proxy Advertisement (RtSolPr) | 6.1.1. Router Solicitation for Proxy Advertisement (RtSolPr) | |||
Mobile Nodes send Router Solicitation for Proxy Advertisement in | Mobile Nodes send Router Solicitation for Proxy Advertisement in | |||
order to prompt routers for Proxy Router Advertisements. All the | order to prompt routers for Proxy Router Advertisements. All the | |||
Link-Layer Address options have the format defined in Section 6.5.2. | Link-Layer Address options have the format defined in Section 6.4.3. | |||
0 1 2 3 | 0 1 2 3 | |||
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | |||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| Type | Code | Checksum | | | Type | Code | Checksum | | |||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| Subtype | Reserved | Identifier | | | Subtype | Reserved | Identifier | | |||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| Options ... | | Options ... | |||
+-+-+-+-+-+-+-+-+-+-+-+- | +-+-+-+-+-+-+-+-+-+-+-+- | |||
Figure 4: Router Solicitation for Proxy Advertisement (RtSolPr) | Figure 4: Router Solicitation for Proxy Advertisement (RtSolPr) | |||
Message | Message | |||
IP Fields: | IP Fields: | |||
Source Address: An IP address assigned to the sending interface. | Source Address: An IP address assigned to the sending | |||
interface. | ||||
Destination Address: The address of the access router or the all | Destination Address: The address of the access router or the | |||
routers multicast address. | all routers multicast address. | |||
Hop Limit: 255. See RFC 2461. | Hop Limit: 255. See RFC 2461. | |||
ICMP Fields: | ICMP Fields: | |||
Type: 154 | Type: 154 | |||
Code: 0 | Code: 0 | |||
Checksum: The ICMPv6 checksum. | Checksum: The ICMPv6 checksum. | |||
skipping to change at page 21, line 25 | skipping to change at page 22, line 34 | |||
Subtype: 2 | Subtype: 2 | |||
Reserved: MUST be set to zero by the sender and ignored by the | Reserved: MUST be set to zero by the sender and ignored by the | |||
receiver. | receiver. | |||
Identifier: MUST be set by the sender so that replies can be | Identifier: MUST be set by the sender so that replies can be | |||
matched to this Solicitation. | matched to this Solicitation. | |||
Valid Options: | Valid Options: | |||
Source Link-Layer Address: When known, the link-layer address of | Source Link-Layer Address: When known, the link-layer address | |||
the sender SHOULD be included using the Link-Layer Address (LLA) | of the sender SHOULD be included using the Link-Layer Address | |||
option. See the LLA option format below. | (LLA) option. See the LLA option format below. | |||
New Access Point Link-Layer Address: The link-layer address or | New Access Point Link-Layer Address: The link-layer address or | |||
identification of the access point for which the MN requests | identification of the access point for which the MN requests | |||
routing advertisement information. It MUST be included in all | routing advertisement information. It MUST be included in all | |||
RtSolPr messages. More than one such address or identifier can be | RtSolPr messages. More than one such address or identifier can | |||
present. This field can also be a wildcard address. See the LLA | be present. This field can also be a wildcard address. See | |||
option below. | the LLA option below. | |||
Future versions of this protocol may define new option types. | Future versions of this protocol may define new option types. | |||
Receivers MUST silently ignore any options that they do not recognize | Receivers MUST silently ignore any options that they do not recognize | |||
and continue processing the rest of the message. | and continue processing the rest of the message. | |||
Including the source LLA option allows the receiver to record the | Including the source LLA option allows the receiver to record the | |||
sender's L2 address so that neighbor discovery can be avoided when | sender's L2 address so that neighbor discovery can be avoided when | |||
the receiver needs to send packets back to the sender (of the RtSolPr | the receiver needs to send packets back to the sender (of the RtSolPr | |||
message). | message). | |||
skipping to change at page 23, line 23 | skipping to change at page 24, line 29 | |||
Subtype: 3 | Subtype: 3 | |||
Reserved: MUST be set to zero by the sender and ignored by the | Reserved: MUST be set to zero by the sender and ignored by the | |||
receiver. | receiver. | |||
Identifier: Copied from Router Solicitation for Proxy | Identifier: Copied from Router Solicitation for Proxy | |||
Advertisement or set to zero if unsolicited. | Advertisement or set to zero if unsolicited. | |||
Valid Options in the following order: | Valid Options in the following order: | |||
Source Link-Layer Address: When known, the link-layer address of | Source Link-Layer Address: When known, the link-layer address | |||
the sender SHOULD be included using the Link-Layer Address option. | of the sender SHOULD be included using the Link-Layer Address | |||
See the LLA option format below. | option. See the LLA option format below. | |||
New Access Point Link-Layer Address: The link-layer address or | New Access Point Link-Layer Address: The link-layer address or | |||
identification of the access point is copied from RtSolPr message. | identification of the access point is copied from RtSolPr | |||
This option MUST be present. | message. This option MUST be present. | |||
New Router's Link-Layer Address: The link-layer address of the | New Router's Link-Layer Address: The link-layer address of the | |||
access router for which this message is proxied for. This option | access router for which this message is proxied for. This | |||
MUST be included when the Code is 0 or 1. | option MUST be included when the Code is 0 or 1. | |||
New Router's IP Address: The IP address of the NAR. This option | New Router's IP Address: The IP address of the NAR. This | |||
MUST be included when the Code is 0 or 1. | option MUST be included when the Code is 0 or 1. | |||
New Router Prefix Information Option: Specifies the prefix of the | New Router Prefix Information Option: Specifies the prefix of | |||
access router the message is proxied for and is used for address | the access router the message is proxied for and is used for | |||
auto-configuration. This option MUST be included when the Code is | address auto-configuration. This option MUST be included when | |||
0 or 1. However, when this prefix is the same as what is used in | Code is 0 or 1. However, when this prefix is the same as what | |||
the New Router's IP Address option (above), the Prefix Information | is used in the New Router's IP Address option (above), the | |||
option need not be present. | Prefix Information option need not be present. | |||
New CoA Option: MAY be present when PrRtAdv is sent unsolicited. | New CoA Option: MAY be present when PrRtAdv is sent | |||
The PAR MAY compute a new CoA using the NAR's prefix information | unsolicited. The PAR MAY compute a new CoA using the NAR's | |||
and the MN's L2 address or by any other means. | prefix information and the MN's L2 address or by any other | |||
means. | ||||
Future versions of this protocol may define new option types. | Future versions of this protocol may define new option types. | |||
Receivers MUST silently ignore any options they do not recognize and | Receivers MUST silently ignore any options they do not recognize and | |||
continue processing the message. | continue processing the message. | |||
Currently, Code values 0, 1, 2, 3, 4, and 5 are defined. | Currently, Code values 0, 1, 2, 3, 4, and 5 are defined. | |||
A Proxy Router Advertisement with Code 0 means that the MN should use | A Proxy Router Advertisement with Code 0 means that the MN should use | |||
the [AP-ID, AR-Info] tuple (present in the options above) for | the [AP-ID, AR-Info] tuple (present in the options above) for | |||
movement detection and NCoA formulation. The Option-Code field in | movement detection and NCoA formulation. The Option-Code field in | |||
the New Access Point LLA option in this case is 1 reflecting the LLA | the New Access Point LLA option in this case is 1 reflecting the LLA | |||
of the access point for which the rest of the options are related. | of the access point for which the rest of the options are related. | |||
Multiple tuples may be present. | Multiple tuples may be present. | |||
A Proxy Router Advertisement with Code 1 means that the message has | A Proxy Router Advertisement with Code 1 means that the message has | |||
been sent unsolicited. If a New CoA option is present following the | been sent unsolicited. If a New CoA option is present following the | |||
New Router Prefix Information option, the MN MUST use the supplied | New Router Prefix Information option, the MN MUST use the supplied | |||
NCoA and send an FBU immediately or else stand to lose service. This | NCoA and send an FBU immediately or else stand to lose service. This | |||
message acts as a network-initiated handover trigger; see Section | message acts as a network-initiated handover trigger; see | |||
3.3. The Option-Code field in the New Access Point LLA option (see | Section 3.3. The Option-Code field in the New Access Point LLA | |||
below) in this case is 1 reflecting the LLA of the access point for | option (see below) in this case is 1 reflecting the LLA of the access | |||
which the rest of the options are related. | point for which the rest of the options are related. | |||
A Proxy Router Advertisement with Code 2 means that no new router | A Proxy Router Advertisement with Code 2 means that no new router | |||
information is present. Each New Access Point LLA option contains an | information is present. Each New Access Point LLA option contains an | |||
Option-Code value (described below) that indicates a specific | Option-Code value (described below) that indicates a specific | |||
outcome. | outcome. | |||
When the Option-Code field in the New Access Point LLA option is | When the Option-Code field in the New Access Point LLA option is | |||
5, handover to that access point does not require a change of CoA. | 5, handover to that access point does not require a change of CoA. | |||
This would be the case, for instance, when a number of access | This would be the case, for instance, when a number of access | |||
points are connected to the same router interface, or when network | points are connected to the same router interface, or when network | |||
skipping to change at page 25, line 23 | skipping to change at page 26, line 30 | |||
NAR's link. The PAR and NAR will forward packets to the PCoA of the | NAR's link. The PAR and NAR will forward packets to the PCoA of the | |||
MN. The MN must still formulate an NCoA for transmitting FBU (using | MN. The MN must still formulate an NCoA for transmitting FBU (using | |||
the information sent in this message), but that NCoA will not be used | the information sent in this message), but that NCoA will not be used | |||
for forwarding packets. | for forwarding packets. | |||
When a wildcard AP identifier is supplied in the RtSolPr message, the | When a wildcard AP identifier is supplied in the RtSolPr message, the | |||
PrRtAdv message should include any 'n' [Access Point Identifier, | PrRtAdv message should include any 'n' [Access Point Identifier, | |||
Link-Layer Address option, Prefix Information Option] tuples | Link-Layer Address option, Prefix Information Option] tuples | |||
corresponding to the PAR's neighborhood. | corresponding to the PAR's neighborhood. | |||
6.2. Inter - Access Router Messages | 6.2. New Mobility Header Messages | |||
6.2.1. Handover Initiate (HI) | Mobile IPv6 uses a new IPv6 header type called Mobility Header | |||
[RFC3775]. The Handover Initiate, Handover Acknowledge, Fast Binding | ||||
Update, Fast Binding Acknowledgment, and the (deprecated) Fast | ||||
Neighbor Advertisement messages use the Mobility Header. | ||||
The Handover Initiate (HI) is an ICMPv6 message sent by an Access | 6.2.1. Inter - Access Router Messages | |||
Router (typically PAR) to another access router (typically NAR) to | ||||
initiate the process of an MN's handover. | 6.2.1.1. Handover Initiate (HI) | |||
The Handover Initiate (HI) is a Mobility Header message sent by an | ||||
Access Router (typically PAR) to another access router (typically | ||||
NAR) to initiate the process of an MN's handover. | ||||
0 1 2 3 | 0 1 2 3 | |||
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | |||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | ||||
| Sequence # | | ||||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| Type | Code | Checksum | | |S|U| Reserved | Code | | | |||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ . | |||
| Subtype |S|U| Reserved | Identifier | | | | | |||
. . | ||||
. Mobility options . | ||||
. . | ||||
| | | ||||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| Options ... | ||||
+-+-+-+-+-+-+-+-+-+-+-+- | ||||
Figure 6: Handover Initiate (HI) Message | Figure 6: Handover Initiate (HI) Message | |||
IP Fields: | IP Fields: | |||
Source Address: The IP address of the PAR | Source Address: The IP address of the PAR | |||
Destination Address: The IP address of the NAR | Destination Address: The IP address of the NAR | |||
ICMP Fields: | Sequence #: MUST be set by the sender so replies can be matched | |||
to this message. | ||||
Type: 154 | ||||
Code: 0 or 1. See below | ||||
Checksum: The ICMPv6 checksum. | ||||
Subtype: 4 | ||||
'S' flag: Assigned address configuration flag. When set, this | 'S' flag: Assigned address configuration flag. When set, this | |||
message requests a new CoA to be returned by the destination. May | message requests a new CoA to be returned by the destination. | |||
be set when Code = 0. MUST be 0 when Code = 1. | MAY be set when Code = 0. MUST be 0 when Code = 1. | |||
'U' flag: Buffer flag. When set, the destination SHOULD buffer | 'U' flag: Buffer flag. When set, the destination SHOULD buffer | |||
any packets toward the node indicated in the options of this | any packets toward the node indicated in the options of this | |||
message. Used when Code = 0, SHOULD be set to 0 when Code = 1. | message. Used when Code = 0, SHOULD be set to 0 when Code = 1. | |||
Code: 0 or 1. See below | ||||
Reserved: MUST be set to zero by the sender and ignored by the | Reserved: MUST be set to zero by the sender and ignored by the | |||
receiver. | receiver. | |||
Identifier: MUST be set by the sender so replies can be matched to | ||||
this message. | ||||
Valid Options: | Valid Options: | |||
Link-Layer Address of MN: The link-layer address of the MN that is | Link-Layer Address of MN: The link-layer address of the MN that | |||
undergoing handover to the destination (i.e., NAR). This option | is undergoing handover to the destination (i.e., NAR). This | |||
MUST be included so that the destination can recognize the MN. | option MUST be included so that the destination can recognize | |||
the MN. | ||||
Previous Care-of Address: The IP address used by the MN while | Previous Care-of Address: The IP address used by the MN while | |||
attached to the originating router. This option SHOULD be | attached to the originating router. This option SHOULD be | |||
included so that a host route can be established if necessary. | included so that a host route can be established if necessary. | |||
New Care-of Address: The IP address the MN wishes to use when | New Care-of Address: The IP address the MN wishes to use when | |||
connected to the destination. When the 'S' bit is set, the NAR | connected to the destination. When the 'S' bit is set, the NAR | |||
MAY assign this address. | MAY assign this address. | |||
The PAR uses a Code value of 0 when it processes an FBU with PCoA as | The PAR uses a Code value of 0 when it processes an FBU with PCoA as | |||
skipping to change at page 27, line 5 | skipping to change at page 28, line 25 | |||
an FBU whose source IP address is not PCoA. | an FBU whose source IP address is not PCoA. | |||
If a Handover Acknowledge (HAck) message is not received as a | If a Handover Acknowledge (HAck) message is not received as a | |||
response in a short time period (no less than twice the typical round | response in a short time period (no less than twice the typical round | |||
trip time (RTT) between source and destination, or 100 milliseconds | trip time (RTT) between source and destination, or 100 milliseconds | |||
if RTT is not known), the Handover Initiate SHOULD be resent. | if RTT is not known), the Handover Initiate SHOULD be resent. | |||
Subsequent retransmissions can be up to HI_RETRIES, but MUST use | Subsequent retransmissions can be up to HI_RETRIES, but MUST use | |||
exponential backoff in which the timeout period (i.e., 2xRTT or 100 | exponential backoff in which the timeout period (i.e., 2xRTT or 100 | |||
milliseconds) is doubled during each instance of retransmission. | milliseconds) is doubled during each instance of retransmission. | |||
6.2.2. Handover Acknowledge (HAck) | 6.2.1.2. Handover Acknowledge (HAck) | |||
The Handover Acknowledgment message is a new ICMPv6 message that MUST | The Handover Acknowledge message is a new Mobility Header message | |||
be sent (typically by the NAR to the PAR) as a reply to the Handover | that MUST be sent (typically by the NAR to the PAR) as a reply to the | |||
Initiate message. | Handover Initiate message. | |||
0 1 2 3 | 0 1 2 3 | |||
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | |||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | ||||
| Sequence # | | ||||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| Type | Code | Checksum | | | Reserved | Code | | | |||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ . | |||
| Subtype | Reserved | Identifier | | | | | |||
. . | ||||
. Mobility options . | ||||
. . | ||||
| | | ||||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| Options ... | ||||
+-+-+-+-+-+-+-+-+-+-+-+- | ||||
Figure 7: Handover Acknowledge (HAck) Message | Figure 7: Handover Acknowledge (HAck) Message | |||
IP Fields: | IP Fields: | |||
Source Address: Copied from the destination address of the | Source Address: Copied from the destination address of the | |||
Handover Initiate Message to which this message is a response. | Handover Initiate Message to which this message is a response. | |||
Destination Address: Copied from the source address of the | Destination Address: Copied from the source address of the | |||
Handover Initiate Message to which this message is a response. | Handover Initiate Message to which this message is a response. | |||
ICMP Fields: | Sequence #: Copied from the corresponding field in the HI | |||
message to which this message is a response, to enable the | ||||
Type: 154 | receiver to match this HAck message with an oustanding HI | |||
message. | ||||
Code: | Code: | |||
0: Handover Accepted, NCoA valid | 0: Handover Accepted, NCoA valid | |||
1: Handover Accepted, NCoA not valid or in use | 1: Handover Accepted, NCoA not valid or in use | |||
2: Handover Accepted, NCoA assigned (used in Assigned | 2: Handover Accepted, NCoA assigned (used in Assigned | |||
addressing) | addressing) | |||
3: Handover Accepted, use PCoA | 3: Handover Accepted, use PCoA | |||
4: Message sent unsolicited, usually to trigger an HI message | ||||
4: Message sent unsolicited, usually to trigger an HI | ||||
message | ||||
128: Handover Not Accepted, reason unspecified | 128: Handover Not Accepted, reason unspecified | |||
129: Administratively prohibited | ||||
130: Insufficient resources | ||||
Checksum: The ICMPv6 checksum. | 129: Administratively prohibited | |||
Subtype: 5 | 130: Insufficient resources | |||
Reserved: MUST be set to zero by the sender and ignored by the | Reserved: MUST be set to zero by the sender and ignored by the | |||
receiver. | receiver. | |||
Identifier: Copied from the corresponding field in the Handover | ||||
Initiate message to which this message is a response. | ||||
Valid Options: | Valid Options: | |||
New Care-of Address: If the S flag in the Handover Initiate | New Care-of Address: If the S flag in the Handover Initiate | |||
message is set, this option MUST be used to provide NCoA the MN | message is set, this option MUST be used to provide NCoA the MN | |||
should use when connected to this router. This option MAY be | should use when connected to this router. This option MAY be | |||
included, even when the 'S' bit is not set, e.g., Code 2 above. | included, even when the 'S' bit is not set, e.g., Code 2 above. | |||
Upon receiving an HI message, the NAR MUST respond with a Handover | Upon receiving an HI message, the NAR MUST respond with a Handover | |||
Acknowledge message. If the 'S' flag is set in the HI message, | Acknowledge message. If the 'S' flag is set in the HI message, the | |||
the NAR SHOULD include the New Care-of Address option and a Code | NAR SHOULD include the New Care-of Address option and a Code 3. | |||
3. | ||||
The NAR MAY provide support for the PCoA (instead of accepting or | The NAR MAY provide support for the PCoA (instead of accepting or | |||
assigning an NCoA), establish a host route entry for the PCoA, and | assigning an NCoA), establish a host route entry for the PCoA, and | |||
set up a tunnel to the PAR to forward the MN's packets sent with | set up a tunnel to the PAR to forward the MN's packets sent with the | |||
the PCoA as a source IP address. This host route entry SHOULD be | PCoA as a source IP address. This host route entry SHOULD be used to | |||
used to forward packets once the NAR detects that the particular | forward packets once the NAR detects that the particular MN is | |||
MN is attached to its link. The NAR indicates forwarding support | attached to its link. The NAR indicates forwarding support for PCoA | |||
for PCoA using Code value 3 in the HAck message. Subsequently, | using Code value 3 in the HAck message. Subsequently, the PAR | |||
the PAR establishes a tunnel to the NAR in order to forward | establishes a tunnel to the NAR in order to forward packets arriving | |||
packets arriving for the PCoA. | for the PCoA. | |||
When responding to an HI message containing a Code value 1, the | ||||
Code values 1, 2, and 4 in the HAck message are not relevant. | ||||
Finally, the New Access Router can always refuse handover, in | ||||
which case it should indicate the reason in one of the available | ||||
Code values. | ||||
6.3. New Mobility Header Messages | When responding to an HI message containing a Code value 1, the Code | |||
values 1, 2, and 4 in the HAck message are not relevant. | ||||
Mobile IPv6 uses a new IPv6 header type called Mobility Header | Finally, the New Access Router can always refuse handover, in which | |||
[RFC3775]. The Fast Binding Update, Fast Binding Acknowledgment, and | case it should indicate the reason in one of the available Code | |||
the (deprecated) Fast Neighbor Advertisement messages use the | values. | |||
Mobility Header. | ||||
6.3.1. Fast Binding Update (FBU) | 6.2.2. Fast Binding Update (FBU) | |||
The Fast Binding Update message has a Mobility Header Type value of | The Fast Binding Update message has a Mobility Header Type value of | |||
8. The FBU is identical to the Mobile IPv6 Binding Update (BU) | 8. The FBU is identical to the Mobile IPv6 Binding Update (BU) | |||
message. However, the processing rules are slightly different. | message. However, the processing rules are slightly different. | |||
Furthermore, additional flags (as part of the Reserved field below) | ||||
defined by other related protocols are not relevant in this message, | ||||
and MUST be set to zero. | ||||
0 1 2 3 | ||||
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | ||||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| Sequence # | | | Sequence # | | |||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
|A|H|L|K| Reserved | Lifetime | | |A|H|L|K| Reserved | Lifetime | | |||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| | | | | | |||
. . | . . | |||
. Mobility options . | . Mobility options . | |||
. . | . . | |||
| | | | | | |||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
Figure 8: Fast Binding Update (FBU) Message | Figure 8: Fast Binding Update (FBU) Message | |||
IP Fields: | IP Fields: | |||
Source Address: The PCoA or NCoA | Source Address: The PCoA or NCoA | |||
Destination Address: The IP address of the Previous Access | Destination Address: The IP address of the Previous Access | |||
Router | Router | |||
'A' flag: MUST be set to one to request that PAR send a Fast | 'A' flag: MUST be set to one to request that PAR send a Fast | |||
Binding Acknowledgment message. | Binding Acknowledgment message. | |||
'H' flag: MUST be set to one. See [RFC3775]. | 'H' flag: MUST be set to one. See [RFC3775]. | |||
'L' flag: See [RFC3775]. | 'L' flag: See [RFC3775]. | |||
skipping to change at page 29, line 45 | skipping to change at page 31, line 26 | |||
Reserved: This field is unused. MUST be set to zero. | Reserved: This field is unused. MUST be set to zero. | |||
Sequence Number: See [RFC3775]. | Sequence Number: See [RFC3775]. | |||
Lifetime: The requested time in seconds for which the sender | Lifetime: The requested time in seconds for which the sender | |||
wishes to have a binding. | wishes to have a binding. | |||
Mobility Options: MUST contain an alternate CoA option set to the | Mobility Options: MUST contain an alternate CoA option set to the | |||
NCoA when an FBU is sent from the PAR's link. MUST contain the | NCoA when an FBU is sent from the PAR's link. MUST contain the | |||
Binding Authorization Data for the FMIP (BADF) option. See | Binding Authorization Data for the FMIP (BADF) option. See | |||
Section 6.5.4. MAY contain the Mobility Header LLA option (see | Section 6.4.5. MAY contain the Mobility Header LLA option (see | |||
Section 6.5.3). | Section 6.4.4). | |||
The MN sends an FBU message any time after receiving a PrRtAdv | The MN sends an FBU message any time after receiving a PrRtAdv | |||
message. If the MN moves prior to receiving a PrRtAdv message, it | message. If the MN moves prior to receiving a PrRtAdv message, it | |||
SHOULD send an FBU to the PAR after configuring the NCoA on the NAR | SHOULD send an FBU to the PAR after configuring the NCoA on the NAR | |||
according to Neighbor Discovery and IPv6 Address Configuration | according to Neighbor Discovery and IPv6 Address Configuration | |||
protocols. When the MN moves without having received a PrRtAdv | protocols. When the MN moves without having received a PrRtAdv | |||
message, it cannot transmit an UNA message upon attaching to the | message, it cannot transmit an UNA message upon attaching to the | |||
NAR's link. | NAR's link. | |||
The source IP address is the PCoA when the FBU is sent from the PAR's | The source IP address is the PCoA when the FBU is sent from the PAR's | |||
skipping to change at page 30, line 27 | skipping to change at page 32, line 5 | |||
the FBU even though the address in the alternate CoA option is | the FBU even though the address in the alternate CoA option is | |||
different from that in the source IP address, and ensure that the | different from that in the source IP address, and ensure that the | |||
address in the alternate CoA option is used in the New CoA option in | address in the alternate CoA option is used in the New CoA option in | |||
the HI message to the NAR. | the HI message to the NAR. | |||
The FBU MUST also include the Home Address Option set to PCoA. An | The FBU MUST also include the Home Address Option set to PCoA. An | |||
FBU message MUST be protected so that the PAR is able to determine | FBU message MUST be protected so that the PAR is able to determine | |||
that the FBU message is sent by an MN that legitimately owns the | that the FBU message is sent by an MN that legitimately owns the | |||
PCoA. | PCoA. | |||
6.3.2. Fast Binding Acknowledgment (FBack) | 6.2.3. Fast Binding Acknowledgment (FBack) | |||
The FBack message format is identical to the Mobile IPv6 Binding | ||||
Acknowledgement (BAck) message. However, the processing rules are | ||||
slightly different. Furthermore, additional flags (as part of the | ||||
Reserved field below) defined by other related protocols are not | ||||
relevant in this message, and MUST be set to zero. | ||||
The Fast Binding Acknowledgment message has a Mobility Header Type | The Fast Binding Acknowledgment message has a Mobility Header Type | |||
value of 9. The FBack message is sent by the PAR to acknowledge | value of 9. The FBack message is sent by the PAR to acknowledge | |||
receipt of a Fast Binding Update message in which the 'A' bit is set. | receipt of a Fast Binding Update message in which the 'A' bit is set. | |||
If PAR sends an HI message to the NAR after processing an FBU, the | If PAR sends an HI message to the NAR after processing an FBU, the | |||
FBack message SHOULD NOT be sent to the MN before the PAR receives a | FBack message SHOULD NOT be sent to the MN before the PAR receives a | |||
HAck message from the NAR. The PAR MAY send the FBack immediately in | HAck message from the NAR. The PAR MAY send the FBack immediately in | |||
the reactive mode however. The Fast Binding Acknowledgment MAY also | the reactive mode however. The Fast Binding Acknowledgment MAY also | |||
be sent to the MN on the old link. | be sent to the MN on the old link. | |||
0 1 2 3 | ||||
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | ||||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| Status |K| Reserved | | | Status |K| Reserved | | |||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| Sequence # | Lifetime | | | Sequence # | Lifetime | | |||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| | | | | | |||
. . | . . | |||
. Mobility options . | . Mobility options . | |||
. . | . . | |||
| | | | | | |||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
Figure 9: Fast Binding Acknowledgment (FBack) Message | Figure 9: Fast Binding Acknowledgment (FBack) Message | |||
IP Fields: | IP Fields: | |||
Source address: The IP address of the Previous Access Router | Source address: The IP address of the Previous Access Router | |||
Destination Address: The NCoA, and optionally the PCoA | Destination Address: The NCoA, and optionally the PCoA | |||
Status: 8-bit unsigned integer indicating the disposition of the | Status: 8-bit unsigned integer indicating the disposition of the | |||
Fast Binding Update. Values of the Status field that are less | Fast Binding Update. Values of the Status field that are less | |||
than 128 indicate that the Binding Update was accepted by the | than 128 indicate that the Binding Update was accepted by the | |||
receiving node. The following such Status values are currently | receiving node. The following such Status values are currently | |||
skipping to change at page 31, line 43 | skipping to change at page 33, line 36 | |||
Sequence Number: Copied from the FBU message for use by the MN in | Sequence Number: Copied from the FBU message for use by the MN in | |||
matching this acknowledgment with an outstanding FBU. | matching this acknowledgment with an outstanding FBU. | |||
Lifetime: The granted lifetime in seconds for which the sender of | Lifetime: The granted lifetime in seconds for which the sender of | |||
this message will retain a binding for traffic redirection. | this message will retain a binding for traffic redirection. | |||
Mobility Options: MUST contain an "alternate" CoA if Status is 1. | Mobility Options: MUST contain an "alternate" CoA if Status is 1. | |||
MUST contain the Binding Authorization Data for FMIP (BADF) | MUST contain the Binding Authorization Data for FMIP (BADF) | |||
option. See 6.4.5. | option. See 6.4.5. | |||
6.4. Unsolicited Neighbor Advertisement (UNA) | 6.3. Unsolicited Neighbor Advertisement (UNA) | |||
This is the same message as in [RFC4861] with the requirement that | This is the same message as in [RFC4861] with the requirement that | |||
the 'O' bit is always set to zero. Since this is an unsolicited | the 'O' bit is always set to zero. Since this is an unsolicited | |||
message, the 'S' bit is zero, and since this is sent by an MN, the | message, the 'S' bit is zero, and since this is sent by an MN, the | |||
'R' bit is also zero. | 'R' bit is also zero. | |||
If the NAR is proxying the NCoA (as a result of HI and HAck | If the NAR is proxying the NCoA (as a result of HI and HAck | |||
exchange), then UNA processing has additional steps (see below). If | exchange), then UNA processing has additional steps (see below). If | |||
the NAR is not proxying the NCoA (for instance, HI and HAck exchange | the NAR is not proxying the NCoA (for instance, HI and HAck exchange | |||
has not taken place), then UNA processing follows the same procedure | has not taken place), then UNA processing follows the same procedure | |||
skipping to change at page 32, line 33 | skipping to change at page 34, line 22 | |||
connectivity on the new link. Arriving or buffered packets can be | connectivity on the new link. Arriving or buffered packets can be | |||
immediately forwarded. If the NAR is proxying the NCoA, it creates a | immediately forwarded. If the NAR is proxying the NCoA, it creates a | |||
neighbor cache entry in STALE state but forwards packets as it | neighbor cache entry in STALE state but forwards packets as it | |||
determines bidirectional reachability according to the standard | determines bidirectional reachability according to the standard | |||
Neighbor Discovery procedure. If there is an entry in INCOMPLETE | Neighbor Discovery procedure. If there is an entry in INCOMPLETE | |||
state without a link-layer address, it sets it to STALE, again | state without a link-layer address, it sets it to STALE, again | |||
according to the procedure in [RFC4861]. | according to the procedure in [RFC4861]. | |||
The NAR MAY wish to provide a different IP address to the MN than the | The NAR MAY wish to provide a different IP address to the MN than the | |||
one in the UNA message. In such a case, the NAR MUST delete the | one in the UNA message. In such a case, the NAR MUST delete the | |||
proxy entry for the NCoA and send a Router Advertisement with the | proxy entry for the NCoA and send a Router Advertisement with NAACK | |||
NAACK option containing the new IP address. | option containing the new IP address. | |||
The combination of the NCoA (present in source IP address) and the | The combination of the NCoA (present in source IP address) and the | |||
Link-Layer Address (present as a Target LLA) SHOULD be used to | Link-Layer Address (present as a Target LLA) SHOULD be used to | |||
distinguish the MN from other nodes. | distinguish the MN from other nodes. | |||
6.5. New Options | 6.4. New Options | |||
All the options, with the exception of Binding Data Authorization for | All the options, with the exception of Binding Data Authorization for | |||
FMIPv6 (BADF) discussed in Section 6.5.4, use Type, Length, and | FMIPv6 (BADF) discussed in Section 6.4.5, use Type, Length, and | |||
Option-Code format shown in Figure 10. | Option-Code format shown in Figure 10. | |||
The Type values are defined from the Neighbor Discovery options | The Type values are defined from the Neighbor Discovery options space | |||
space. The Length field is in units of 8 octets, except for the | and Mobility Header options space. The Length field is in units of 8 | |||
Mobility Header Link-Layer Address option, whose Length field is in | octets for Neighbor Discovery options, and is in units of octets for | |||
units of octets in accordance with Section 6.2 in [RFC3775]. And, | Mobility Header options. And, Option-Code provides additional | |||
Option-Code provides additional information for each of the options | information for each of the options (see individual options below). | |||
(see individual options below). | ||||
0 1 2 3 | 0 1 2 3 | |||
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | |||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| Type | Length | Option-Code | | | | Type | Length | Option-Code | | | |||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
~ ... ~ | ~ ... ~ | |||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
Figure 10: Option Format | Figure 10: Option Format | |||
6.5.1. IP Address/Prefix Option | 6.4.1. IP Address/Prefix Option | |||
This option is sent in the Proxy Router Advertisement, the Handover | This option is sent in the Proxy Router Advertisement message. | |||
Initiate, and Handover Acknowledge messages. | ||||
0 1 2 3 | 0 1 2 3 | |||
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | |||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| Type | Length | Option-Code | Prefix Length | | | Type | Length | Option-Code | Prefix Length | | |||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| Reserved | | | Reserved | | |||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| | | | | | |||
+ + | + + | |||
skipping to change at page 34, line 13 | skipping to change at page 36, line 7 | |||
receiver. | receiver. | |||
Prefix Length: 8-bit unsigned integer that indicates the length of | Prefix Length: 8-bit unsigned integer that indicates the length of | |||
the IPv6 Address Prefix. The value ranges from 0 to 128. | the IPv6 Address Prefix. The value ranges from 0 to 128. | |||
Reserved: MUST be set to zero by the sender and MUST be ignored by | Reserved: MUST be set to zero by the sender and MUST be ignored by | |||
the receiver. | the receiver. | |||
IPv6 address: The IP address defined by the Option-Code field. | IPv6 address: The IP address defined by the Option-Code field. | |||
6.5.2. Link-Layer Address (LLA) Option | 6.4.2. Mobility Header IP Address/Prefix Option | |||
This option is sent in the Handover Initiate, and Handover | ||||
Acknowledge messages. This option has an alignment requirement of | ||||
8n+4. | ||||
0 1 2 3 | ||||
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | ||||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | ||||
| Type | Length | Option-Code | Prefix Length | | ||||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | ||||
| | | ||||
+ + | ||||
| | | ||||
+ IPv6 Address/Prefix + | ||||
| | | ||||
+ + | ||||
| | | ||||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | ||||
Figure 12: Mobility Header IPv6 Address/Prefix Option | ||||
Type: 17 | ||||
Length: The size of this option in octets excluding the Type, and | ||||
Length fields. | ||||
Option-Code: | ||||
1: Old Care-of Address | ||||
2: New Care-of Address | ||||
3: NAR's IP address | ||||
4: NAR's Prefix, sent in PrRtAdv. The Prefix Length field | ||||
contains the number of valid leading bits in the prefix. The | ||||
bits in the prefix after the prefix length are reserved and | ||||
MUST be initialized to zero by the sender and ignored by the | ||||
receiver. | ||||
Prefix Length: 8-bit unsigned integer that indicates the length of | ||||
the IPv6 Address Prefix. The value ranges from 0 to 128. | ||||
IPv6 address/prefix: The IP address/prefix defined by the Option- | ||||
Code field. | ||||
6.4.3. Link-Layer Address (LLA) Option | ||||
0 1 2 3 | 0 1 2 3 | |||
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | |||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| Type | Length | Option-Code | LLA... | | Type | Length | Option-Code | LLA... | |||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
Figure 12: Link-Layer Address Option | Figure 13: Link-Layer Address Option | |||
Type: 19 | Type: 19 | |||
Length: The size of this option in 8 octets including the Type, | Length: The size of this option in 8 octets including the Type, | |||
Option-Code, and Length fields. | Option-Code, and Length fields. | |||
Option-Code: | Option-Code: | |||
0: wildcard requesting resolution for all nearby access points | 0: wildcard requesting resolution for all nearby access points | |||
1: Link-Layer Address of the New Access Point | 1: Link-Layer Address of the New Access Point | |||
2: Link-Layer Address of the MN | 2: Link-Layer Address of the MN | |||
3: Link-Layer Address of the NAR (i.e., Proxied Originator) | 3: Link-Layer Address of the NAR (i.e., Proxied Originator) | |||
4: Link-Layer Address of the source of RtSolPr or PrRtAdv | 4: Link-Layer Address of the source of RtSolPr or PrRtAdv | |||
message | message | |||
5: The access point identified by the LLA belongs to the | 5: The access point identified by the LLA belongs to the | |||
current interface of the router | current interface of the router | |||
6: No prefix information available for the access point | 6: No prefix information available for the access point | |||
identified by the LLA | identified by the LLA | |||
7: No fast handovers support available for the access point | 7: No fast handovers support available for the access point | |||
identified by the LLA | identified by the LLA | |||
LLA: The variable length link-layer address. | LLA: The variable length link-layer address. | |||
The LLA option does not have a length field for the LLA itself. The | The LLA option does not have a length field for the LLA itself. The | |||
implementations must consult the specific link layer over which the | implementations must consult the specific link layer over which the | |||
protocol is run in order to determine the content and length of the | protocol is run in order to determine the content and length of the | |||
LLA. | LLA. | |||
skipping to change at page 35, line 17 | skipping to change at page 38, line 22 | |||
attempted. This is used in the Router Solicitation for Proxy | attempted. This is used in the Router Solicitation for Proxy | |||
Advertisement message. | Advertisement message. | |||
The MN Link-Layer Address option contains the link-layer address of | The MN Link-Layer Address option contains the link-layer address of | |||
an MN. It is used in the Handover Initiate message. | an MN. It is used in the Handover Initiate message. | |||
The NAR (i.e., Proxied Originator) Link-Layer Address option contains | The NAR (i.e., Proxied Originator) Link-Layer Address option contains | |||
the link-layer address of the access router to which the Proxy Router | the link-layer address of the access router to which the Proxy Router | |||
Solicitation message refers. | Solicitation message refers. | |||
6.5.3. Mobility Header Link-Layer Address (MH-LLA) Option | 6.4.4. Mobility Header Link-Layer Address (MH-LLA) Option | |||
This option is identical to the LLA option, but is carried in the | This option is identical to the LLA option, but is carried in the | |||
Mobility Header messages, e.g., FBU. In the future, other Mobility | Mobility Header messages, e.g., FBU. In the future, other Mobility | |||
Header messages may also make use of this option. The format of the | Header messages may also make use of this option. The format of the | |||
option is shown in Figure 13. There are no alignment requirements | option is shown in Figure 14. There are no alignment requirements | |||
for this option. | for this option. | |||
0 1 2 3 | 0 1 2 3 | |||
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | |||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| Type | Length | | | Type | Length | | |||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| Option-Code | LLA .... | | Option-Code | LLA .... | |||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
Figure 13: Mobility Header Link-Layer Address Option | Figure 14: Mobility Header Link-Layer Address Option | |||
Type: 7 | Type: 7 | |||
Length: The size of this option in octets not including the Type and | Length: The size of this option in octets not including the Type | |||
Length fields. | and Length fields. | |||
Option-Code: 2 Link-Layer Address of the MN. | Option-Code: 2 Link-Layer Address of the MN. | |||
LLA: The variable length link-layer address. | LLA: The variable length link-layer address. | |||
6.5.4. Binding Authorization Data for FMIPv6 (BADF) | 6.4.5. Binding Authorization Data for FMIPv6 (BADF) | |||
This option MUST be present in FBU and FBack messages. The security | This option MUST be present in FBU and FBack messages. The security | |||
association between the MN and the PAR is established by companion | association between the MN and the PAR is established by companion | |||
protocols [RFC5269]. This option specifies how to compute and verify | protocols [RFC5269]. This option specifies how to compute and verify | |||
a Message Authentication Code (MAC) using the established security | a Message Authentication Code (MAC) using the established security | |||
association. | association. | |||
The format of this option is shown in Figure 14. | The format of this option is shown in Figure 15. | |||
0 1 2 3 | 0 1 2 3 | |||
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | |||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| Type | Option Length | | | Type | Option Length | | |||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| SPI | | | SPI | | |||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| | | | | | |||
+ + | + + | |||
| Authenticator | | | Authenticator | | |||
+ + | + + | |||
| | | | | | |||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
Figure 14: Binding Authorization Data for FMIPv6 (BADF) Option | Figure 15: Binding Authorization Data for FMIPv6 (BADF) Option | |||
Type: 21 | Type: 21 | |||
Option Length: The length of the Authenticator in bytes | Option Length: The length of the Authenticator in bytes | |||
SPI: Security Parameter Index. SPI = 0 is reserved for the | SPI: Security Parameter Index. SPI = 0 is reserved for the | |||
Authenticator computed using SEND-based handover keys. | Authenticator computed using SEND-based handover keys. | |||
Authenticator: Same as in RFC 3775, with "correspondent" replaced by | Authenticator: Same as in RFC 3775, with "correspondent" replaced | |||
the PAR's IP address, and Kbm replaced by the shared key between the | by the PAR's IP address, and Kbm replaced by the shared key | |||
MN and the PAR. | between the MN and the PAR. | |||
The default MAC calculation is done using HMAC_SHA1 with the first 96 | The default MAC calculation is done using HMAC_SHA1 with the first 96 | |||
bits used for the MAC. Since there is an Option Length field, | bits used for the MAC. Since there is an Option Length field, | |||
implementations can use other algorithms such as HMAC_SHA256. | implementations can use other algorithms such as HMAC_SHA256. | |||
This option MUST be the last Mobility Option present. | This option MUST be the last Mobility Option present. | |||
6.5.5. Neighbor Advertisement Acknowledgment (NAACK) | 6.4.6. Neighbor Advertisement Acknowledgment (NAACK) | |||
0 1 2 3 | 0 1 2 3 | |||
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | |||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| Type | Length | Option-Code | Status | | | Type | Length | Option-Code | Status | | |||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| Reserved | | | Reserved | | |||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
Figure 15: Neighbor Advertisement Acknowledgment Option | Figure 16: Neighbor Advertisement Acknowledgment Option | |||
Type: 20 | Type: 20 | |||
Length: 8-bit unsigned integer. Length of the option, in 8 octets. | Length: 8-bit unsigned integer. Length of the option, in 8 | |||
octets. The length is 1 when a new CoA is not supplied. The | ||||
The length is 1 when a new CoA is not supplied. The length is 3 when | length is 3 when a new CoA is present (immediately following the | |||
a new CoA is present (immediately following the Reserved field) | Reserved field) | |||
Option-Code: 0 | Option-Code: 0 | |||
Status: 8-bit unsigned integer indicating the disposition of the | Status: 8-bit unsigned integer indicating the disposition of the | |||
Unsolicited Neighbor Advertisement message. The following Status | Unsolicited Neighbor Advertisement message. The following Status | |||
values are currently defined: | values are currently defined: | |||
1: NCoA is invalid, perform address configuration | 1: NCoA is invalid, perform address configuration | |||
2: NCoA is invalid, use the supplied NCoA. The supplied NCoA | 2: NCoA is invalid, use the supplied NCoA. The supplied NCoA | |||
(in the form of an IP Address Option) MUST be present following | (in the form of an IP Address Option) MUST be present following | |||
the Reserved field. | the Reserved field. | |||
3: NCoA is invalid, use NAR's IP address as NCoA in FBU | 3: NCoA is invalid, use NAR's IP address as NCoA in FBU | |||
4: PCoA supplied, do not send FBU | 4: PCoA supplied, do not send FBU | |||
128: Link-Layer Address unrecognized | 128: Link-Layer Address unrecognized | |||
Reserved: MUST be set to zero by the sender and MUST be ignored by | Reserved: MUST be set to zero by the sender and MUST be ignored by | |||
the receiver. | the receiver. | |||
The NAR responds to UNA with the NAACK option to notify the MN to use | The NAR responds to UNA with the NAACK option to notify the MN to use | |||
a different NCoA than the one that the MN has used. If the NAR | a different NCoA than the one that the MN has used. If the NAR | |||
proposes a different NCoA, the Router Advertisement MUST use the | proposes a different NCoA, the Router Advertisement MUST use the | |||
source IP address in the UNA message as the destination address, and | source IP address in the UNA message as the destination address, and | |||
use the L2 address present in UNA. The MN MUST use the NCoA if it is | use the L2 address present in UNA. The MN MUST use the NCoA if it is | |||
skipping to change at page 37, line 48 | skipping to change at page 41, line 21 | |||
7. Related Protocol and Device Considerations | 7. Related Protocol and Device Considerations | |||
The protocol specified here, as a design principle, introduces no or | The protocol specified here, as a design principle, introduces no or | |||
minimal changes to related protocols. For example, no changes to the | minimal changes to related protocols. For example, no changes to the | |||
base Mobile IPv6 protocol are needed in order to implement this | base Mobile IPv6 protocol are needed in order to implement this | |||
protocol. Similarly, no changes to the IPv6 stateless address auto- | protocol. Similarly, no changes to the IPv6 stateless address auto- | |||
configuration protocol [RFC4862] and DHCP [RFC3315] are introduced. | configuration protocol [RFC4862] and DHCP [RFC3315] are introduced. | |||
The protocol specifies an optional extension to Neighbor Discovery | The protocol specifies an optional extension to Neighbor Discovery | |||
[RFC4861] in which an access router may send a router advertisement | [RFC4861] in which an access router may send a router advertisement | |||
as a response to the UNA message (see Section 6.4). Other than this | as a response to the UNA message (see Section Section 6.3). Other | |||
extension, the specification does not modify Neighbor Discovery | than this extension, the specification does not modify Neighbor | |||
behavior (including the procedures performed when attached to the PAR | Discovery behavior (including the procedures performed when attached | |||
and when attaching to the NAR). | to the PAR and when attaching to the NAR). | |||
The protocol does not require changes to any intermediate Layer 2 | The protocol does not require changes to any intermediate Layer 2 | |||
device between an MN and its access router that supports this | device between an MN and its access router that supports this | |||
specification. This includes the wireless access points, switches, | specification. This includes the wireless access points, switches, | |||
snooping devices, and so on. | snooping devices, and so on. | |||
8. Evolution from and Compatibility with RFC 4068 | 8. Evolution from and Compatibility with RFC 4068 | |||
This document has evolved from [RFC4068]. Specifically, a new | This document has evolved from [RFC4068]. Specifically, a new | |||
handover key establishment protocol (see [RFC5269]) has been defined | handover key establishment protocol (see [RFC5269]) has been defined | |||
skipping to change at page 38, line 28 | skipping to change at page 41, line 49 | |||
deployment scenario. | deployment scenario. | |||
The protocol has improved from the experiences in implementing | The protocol has improved from the experiences in implementing | |||
[RFC4068], and from experimental usage. The input has improved the | [RFC4068], and from experimental usage. The input has improved the | |||
specification of parameter fields (such as lifetime, codepoints, | specification of parameter fields (such as lifetime, codepoints, | |||
etc.) as well as inclusion of new parameter fields in the existing | etc.) as well as inclusion of new parameter fields in the existing | |||
messages. As of this writing, there are two publicly available | messages. As of this writing, there are two publicly available | |||
implementations, [fmipv6] and [tarzan], and multiple proprietary | implementations, [fmipv6] and [tarzan], and multiple proprietary | |||
implementations. Some experience suggests that the protocol meets | implementations. Some experience suggests that the protocol meets | |||
the delay and packet loss requirements when used appropriately with | the delay and packet loss requirements when used appropriately with | |||
particular radio access protocols. For instance, see [RFC5184] and | particular radio access protocols. For instance, see [RFC5184], and | |||
[mip6-book]. Nevertheless, it is important to recognize that | [mip6-book]. Nevertheless, it is important to recognize that | |||
handover performance is a function of both IP layer operations, which | handover performance is a function of both IP layer operations, which | |||
this protocol specifies, and the particular radio access technology | this protocol specifies, and the particular radio access technology | |||
itself, which this protocol relies upon but does not modify. | itself, which this protocol relies upon but does not modify. | |||
An existing implementation of [RFC4068] needs to be updated in order | An existing implementation of [RFC4068] needs to be updated in order | |||
to support this specification. The primary addition is the | to support this specification. The primary addition is the | |||
establishment of a security association between an MN and its access | establishment of a security association between an MN and its access | |||
router (i.e., MN and PAR). One way to establish such a security | router (i.e., MN and PAR). One way to establish such a security | |||
association is specified in [RFC5269]. An implementation that | association is specified in [RFC5269]. An implementation that | |||
complies with the specification in this document is likely to also | complies with the specification in this document is likely to also | |||
work with [RFC4068], except for the Binding Authorization Data for | work with [RFC4068], except for the Binding Authorization Data for | |||
FMIPv6 option (see Section 6.5.4) that can only be processed when | FMIPv6 option (see Section 6.4.5) that can only be processed when | |||
security association is in place between a mobile node and its access | security association is in place between a mobile node and its access | |||
router. This specification deprecates the Fast Neighbor | router. This specification deprecates the Fast Neighbor | |||
Advertisement (FNA) message. However, it is acceptable for a NAR to | Advertisement (FNA) message. However, it is acceptable for a NAR to | |||
process this message from a mobile node as specified in [RFC4068]. | process this message from a mobile node as specified in [RFC4068]. | |||
9. Configurable Parameters | 9. Configurable Parameters | |||
Mobile nodes rely on configuration parameters shown in the table | Mobile nodes rely on configuration parameters shown in the table | |||
below. Each mobile node MUST have a configuration mechanism to | below. Each mobile node MUST have a configuration mechanism to | |||
adjust the parameters. Such a configuration mechanism may be either | adjust the parameters. Such a configuration mechanism may be either | |||
local (such as a command line interface) or based on central | local (such as a command line interface) or based on central | |||
management of a number of mobile nodes. | management of a number of mobile nodes. | |||
+-------------------+---------------+---------------+ | +-------------------+---------------+-----------------+ | |||
| Parameter Name | Default Value | Definition | | | Parameter Name | Default Value | Definition | | |||
+-------------------+---------------+---------------+ | +-------------------+---------------+-----------------+ | |||
| RTSOLPR_RETRIES | 3 | Section 6.1.1 | | | RTSOLPR_RETRIES | 3 | Section 6.1.1 | | |||
| MAX_RTSOLPR_RATE | 3 | Section 6.1.1 | | | MAX_RTSOLPR_RATE | 3 | Section 6.1.1 | | |||
| FBU_RETRIES | 3 | Section 6.3.1 | | | FBU_RETRIES | 3 | Section 6.2.2 | | |||
| PROXY_ND_LIFETIME | 1.5 seconds | Section 6.2.2 | | | PROXY_ND_LIFETIME | 1.5 seconds | Section 6.2.1.2 | | |||
| HI_RETRIES | 3 | Section 6.2.1 | | | HI_RETRIES | 3 | Section 6.2.1.1 | | |||
+-------------------+---------------+---------------+ | +-------------------+---------------+-----------------+ | |||
10. Security Considerations | 10. Security Considerations | |||
The following security vulnerabilities are identified and suggested | The following security vulnerabilities are identified and suggested | |||
solutions are mentioned. | solutions are mentioned. | |||
Insecure FBU: in this case, packets meant for one address could be | Insecure FBU: in this case, packets meant for one address could be | |||
stolen or redirected to some unsuspecting node. This concern is | stolen or redirected to some unsuspecting node. This concern is | |||
the same as that in an MN and Home Agent relationship. Hence, the | the same as that in an MN and Home Agent relationship. | |||
PAR MUST ensure that the FBU packet arrived from a node that | ||||
legitimately owns the PCoA. The access router and its hosts may | Hence, the PAR MUST ensure that the FBU packet arrived from a node | |||
use any available mechanism to establish a security association | that legitimately owns the PCoA. The access router and its hosts | |||
that MUST be used to secure FBU. The current version of this | may use any available mechanism to establish a security | |||
protocol relies on a companion protocol [RFC5269] to establish | association that MUST be used to secure FBU. The current version | |||
such a security association. Using the shared handover key from | of this protocol relies on a companion protocol [RFC5269] to | |||
[RFC5269], the Authenticator in BADF option (see Section 6.5.4) | establish such a security association. Using the shared handover | |||
MUST be computed, and the BADF option included in FBU and FBack | key from [RFC5269], the Authenticator in BADF option (see | |||
messages. | Section 6.4.5) MUST be computed, and the BADF option included in | |||
FBU and FBack messages. | ||||
Secure FBU, malicious or inadvertent redirection: in this case, | Secure FBU, malicious or inadvertent redirection: in this case, | |||
the FBU is secured, but the target of binding happens to be an | the FBU is secured, but the target of binding happens to be an | |||
unsuspecting node either due to inadvertent operation or due to | unsuspecting node either due to inadvertent operation or due to | |||
malicious intent. This vulnerability can lead to an MN with a | malicious intent. This vulnerability can lead to an MN with a | |||
genuine security association with its access router redirecting | genuine security association with its access router redirecting | |||
traffic to an incorrect address. | traffic to an incorrect address. | |||
However, the target of malicious traffic redirection is limited to | However, the target of malicious traffic redirection is limited to | |||
an interface on an access router with which the PAR has a security | an interface on an access router with which the PAR has a security | |||
skipping to change at page 42, line 20 | skipping to change at page 45, line 36 | |||
implementation could configure different SPD entries as long as they | implementation could configure different SPD entries as long as they | |||
provide the required security. | provide the required security. | |||
In the examples shown below, the identity of the PAR is assumed to be | In the examples shown below, the identity of the PAR is assumed to be | |||
par_1, the address of the PAR is assumed to be par_address_1, and the | par_1, the address of the PAR is assumed to be par_address_1, and the | |||
address of the NAR is assumed to be nar_address_1. | address of the NAR is assumed to be nar_address_1. | |||
PAR SPD-S: | PAR SPD-S: | |||
- IF local_address = par_address_1 & remote_address = | - IF local_address = par_address_1 & remote_address = | |||
nar_address_1 & proto = ICMPv6 & local_icmpv6_type = HI & | nar_address_1 & proto = MH & local_mh_type = HI & | |||
remote_icmpv6_type = HAck | remote_mh_type = HAck | |||
THEN use SA ESP transport mode Initiate using IDi = par_1 to | THEN use SA ESP transport mode Initiate using IDi = par_1 to | |||
address nar_address_1 | address nar_address_1 | |||
NAR SPD-S: | NAR SPD-S: | |||
- IF local_address = nar_address_1 & remote_address = | - IF local_address = nar_address_1 & remote_address = | |||
par_address_1 & proto = ICMPv6 & local_icmpv6_type = HAck & | par_address_1 & proto = MH & local_mh_type = HAck & | |||
remote_icmpv6_type = HI | remote_mh_type = HI | |||
THEN use SA ESP transport mode | THEN use SA ESP transport mode | |||
11. IANA Considerations | 11. IANA Considerations | |||
This document defines two new Mobility Header messages which need | ||||
allocation from the Mobility Header Type registry at | ||||
http://www.iana.org/assignments/mobility-parameters | ||||
TBD Handover Initiate Message (Section 6.2.1.1) | ||||
TBD Handover Acknowledge Message (Section 6.2.1.2) | ||||
This document defines a new Mobility Option that needs Type | ||||
assignment from the Mobility Options Type registry at | ||||
http://www.iana.org/assignments/mobility-parameters | ||||
1. Mobility Header IPv6 Address/Prefix option, described in | ||||
Section 6.4.2 | ||||
This document defines a new ICMPv6 message, which has been allocated | This document defines a new ICMPv6 message, which has been allocated | |||
from the ICMPv6 Type registry. | from the ICMPv6 Type registry. | |||
154 FMIPv6 Messages | 154 FMIPv6 Messages | |||
This document creates a new registry for the 'Subtype' field in the | This document creates a new registry for the 'Subtype' field in the | |||
above ICMPv6 message, called the "FMIPv6 Message Types". IANA has | above ICMPv6 message, called the "FMIPv6 Message Types". IANA has | |||
assigned the following values. | assigned the following values. | |||
+---------+-------------+---------------+ | +---------+-------------------+-----------------+ | |||
| Subtype | Description | Reference | | | Subtype | Description | Reference | | |||
+---------+-------------+---------------+ | +---------+-------------------+-----------------+ | |||
| 2 | RtSolPr | Section 6.1.1 | | | 2 | RtSolPr | Section 6.1.1 | | |||
| 3 | PrRtAdv | Section 6.1.2 | | | 3 | PrRtAdv | Section 6.1.2 | | |||
| 4 | HI | Section 6.2.1 | | | 4 | HI - Deprecated | Section 6.2.1.1 | | |||
| 5 | HAck | Section 6.2.2 | | | 5 | HAck - Deprecated | Section 6.2.1.2 | | |||
+---------+-------------+---------------+ | +---------+-------------------+-----------------+ | |||
The values '0' and '1' are reserved. The upper limit is 255. An RFC | The values '0' and '1' are reserved. The upper limit is 255. An RFC | |||
is required for new message assignment. | is required for new message assignment. The Subtype values 4 and 5 | |||
are deprecated and are marked as unassigned for future allocations. | ||||
The document defines a new Mobility Option that has received Type | The document defines a new Mobility Option that has received Type | |||
assignment from the Mobility Options Type registry. | assignment from the Mobility Options Type registry. | |||
1. Binding Authorization Data for FMIPv6 (BADF) option, described | 1. Binding Authorization Data for FMIPv6 (BADF) option, described in | |||
in Section 6.5.4 | Section 6.4.5 | |||
The document has received Type assignments for the following (see | The document has already received Type assignments for the following | |||
[RFC4068]): | (see [RFC4068]): | |||
The document defines the following Neighbor Discovery [RFC4861] | The document defines the following Neighbor Discovery [RFC4861] | |||
options that have received Type assignment from IANA. | options that have received Type assignment from IANA. | |||
+---------+-----------------------------------------+---------------+ | +------+--------------------------------------------+---------------+ | |||
| Type | Description | Reference | | | Type | Description | Reference | | |||
+---------+-----------------------------------------+---------------+ | +------+--------------------------------------------+---------------+ | |||
| 17 | IP Address/Prefix Option | Section 6.5.1 | | | 17 | IP Address/Prefix Option | Section 6.4.1 | | |||
| 19 | Link-layer Address Option | Section 6.5.2 | | | 19 | Link-layer Address Option | Section 6.4.3 | | |||
| 20 | Neighbor Advertisement Acknowledgment | Section 6.5.5 | | | 20 | Neighbor Advertisement Acknowledgment | Section 6.4.6 | | |||
| | Option | | | | | Option | | | |||
+---------+-----------------------------------------+---------------+ | +------+--------------------------------------------+---------------+ | |||
The document defines the following Mobility Header messages that have | The document defines the following Mobility Header messages that have | |||
received Type allocation from the Mobility Header Types registry. | received Type allocation from the Mobility Header Types registry. | |||
1. Fast Binding Update, described in Section 6.3.1 | 1. Fast Binding Update, described in Section 6.2.2 | |||
2. Fast Binding Acknowledgment, described in Section 6.3.2 | 2. Fast Binding Acknowledgment, described in Section 6.2.3 | |||
The document defines the following Mobility Option that has received | The document defines the following Mobility Option that has received | |||
Type assignment from the Mobility Options Type registry. | Type assignment from the Mobility Options Type registry. | |||
1. Mobility Header Link-Layer Address option, described in | 1. Mobility Header Link-Layer Address option, described in | |||
Section 6.5.3 | Section 6.4.4 | |||
12. Acknowledgments | 12. Acknowledgments | |||
The editor would like to thank all those who have provided feedback | The editor would like to thank all those who have provided feedback | |||
on this specification, but can only mention a few here: Vijay | on this specification, but can only mention a few here: Vijay | |||
Devarapalli, Youn-Hee Han, Emil Ivov, Syam Madanapalli, Suvidh | Devarapalli, Youn-Hee Han, Emil Ivov, Syam Madanapalli, Suvidh | |||
Mathur, Andre Martin, Javier Martin, Koshiro Mitsuya, Gabriel | Mathur, Andre Martin, Javier Martin, Koshiro Mitsuya, Gabriel | |||
Montenegro, Takeshi Ogawa, Sun Peng, YC Peng, Alex Petrescu, Domagoj | Montenegro, Takeshi Ogawa, Sun Peng, YC Peng, Alex Petrescu, Domagoj | |||
Premec, Subba Reddy, K. Raghav, Ranjit Wable, and Jonathan Wood. | Premec, Subba Reddy, K. Raghav, Ranjit Wable, and Jonathan Wood. | |||
Behcet Sarikaya and Frank Xia are acknowledged for the feedback on | Behcet Sarikaya and Frank Xia are acknowledged for the feedback on | |||
skipping to change at page 44, line 19 | skipping to change at page 48, line 5 | |||
Basavaraj Patil and Phil Roberts for providing much support for this | Basavaraj Patil and Phil Roberts for providing much support for this | |||
work. | work. | |||
13. References | 13. References | |||
13.1. Normative References | 13.1. Normative References | |||
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | |||
Requirement Levels", BCP 14, RFC 2119, March 1997. | Requirement Levels", BCP 14, RFC 2119, March 1997. | |||
[RFC5269] Kempf, J. and R. Koodli, "Distributing a Symmetric Fast | [RFC3315] Droms, R., Bound, J., Volz, B., Lemon, T., Perkins, C., | |||
Mobile IPv6 (FMIPv6) Handover Key Using SEcure Neighbor | and M. Carney, "Dynamic Host Configuration Protocol for | |||
Discovery (SEND)", RFC 5269, June 2008. | IPv6 (DHCPv6)", RFC 3315, July 2003. | |||
[RFC4443] Conta, A., Deering, S., and M. Gupta, Ed., "Internet | ||||
Control Message Protocol (ICMPv6) for the Internet | ||||
Protocol Version 6 (IPv6) Specification", RFC 4443, | ||||
March 2006. | ||||
[RFC3315] Droms, R., Ed., Bound, J., Volz, B., Lemon, T., | ||||
Perkins, C., and M. Carney, "Dynamic Host Configuration | ||||
Protocol for IPv6 (DHCPv6)", RFC 3315, July 2003. | ||||
[RFC3775] Johnson, D., Perkins, C., and J. Arkko, "Mobility | [RFC3775] Johnson, D., Perkins, C., and J. Arkko, "Mobility | |||
Support in IPv6", RFC 3775, June 2004. | Support in IPv6", RFC 3775, June 2004. | |||
[RFC4301] Kent, S. and K. Seo, "Security Architecture for the | [RFC4301] Kent, S. and K. Seo, "Security Architecture for the | |||
Internet Protocol", RFC 4301, December 2005. | Internet Protocol", RFC 4301, December 2005. | |||
[RFC4303] Kent, S., "IP Encapsulating Security Payload (ESP)", | [RFC4303] Kent, S., "IP Encapsulating Security Payload (ESP)", | |||
RFC 4303, December 2005. | RFC 4303, December 2005. | |||
[RFC4306] Kaufman, C., Ed., "Internet Key Exchange (IKEv2) | [RFC4306] Kaufman, C., "Internet Key Exchange (IKEv2) Protocol", | |||
Protocol", RFC 4306, December 2005. | RFC 4306, December 2005. | |||
[RFC4443] Conta, A., Deering, S., and M. Gupta, "Internet Control | ||||
Message Protocol (ICMPv6) for the Internet Protocol | ||||
Version 6 (IPv6) Specification", RFC 4443, March 2006. | ||||
[RFC4861] Narten, T., Nordmark, E., Simpson, W., and H. Soliman, | [RFC4861] Narten, T., Nordmark, E., Simpson, W., and H. Soliman, | |||
"Neighbor Discovery for IP version 6 (IPv6)", RFC 4861, | "Neighbor Discovery for IP version 6 (IPv6)", RFC 4861, | |||
September 2007. | September 2007. | |||
[RFC4862] Thomson, S., Narten, T., and T. Jinmei, "IPv6 Stateless | [RFC4862] Thomson, S., Narten, T., and T. Jinmei, "IPv6 Stateless | |||
Address Autoconfiguration", RFC 4862, September 2007. | Address Autoconfiguration", RFC 4862, September 2007. | |||
13.2. Informative References | [RFC5269] Kempf, J. and R. Koodli, "Distributing a Symmetric Fast | |||
Mobile IPv6 (FMIPv6) Handover Key Using SEcure Neighbor | ||||
Discovery (SEND)", RFC 5269, June 2008. | ||||
[fmipv6] "fmipv6.org : Home Page", <http://fmipv6.org>. | [rfc5268] Koodli(Editor), R., "Mobile IPv6 Fast Handovers", | |||
RFC 5268, June 2008, | ||||
<ftp://ftp.isi.edu/in-notes/rfc5268>. | ||||
[mip6-book] Koodli, R. and C. Perkins, "Mobile Internetworking with | 13.2. Informative References | |||
IPv6, Chapter 22, John Wiley & Sons.", July 2007. | ||||
[RFC3290] Bernet, Y., Blake, S., Grossman, D., and A. Smith, "An | [RFC3290] Bernet, Y., Blake, S., Grossman, D., and A. Smith, "An | |||
Informal Management Model for Diffserv Routers", RFC | Informal Management Model for Diffserv Routers", | |||
3290, May 2002. | RFC 3290, May 2002. | |||
[RFC3971] Arkko, J., Ed., Kempf, J., Zill, B., and P. Nikander, | [RFC3971] Arkko, J., Kempf, J., Zill, B., and P. Nikander, "SEcure | |||
"SEcure Neighbor Discovery (SEND)", RFC 3971, March | Neighbor Discovery (SEND)", RFC 3971, March 2005. | |||
2005. | ||||
[RFC4068] Koodli, R., Ed., "Fast Handovers for Mobile IPv6", RFC | [RFC4068] Koodli, R., "Fast Handovers for Mobile IPv6", RFC 4068, | |||
4068, July 2005. | July 2005. | |||
[RFC5184] Teraoka, F., Gogo, K., Mitsuya, K., Shibui, R., and K. | [RFC5184] Teraoka, F., Gogo, K., Mitsuya, K., Shibui, R., and K. | |||
Mitani, "Unified Layer 2 (L2) Abstractions for Layer 3 | Mitani, "Unified Layer 2 (L2) Abstractions for Layer 3 | |||
(L3)-Driven Fast Handover", RFC 5184, May 2008. | (L3)-Driven Fast Handover", RFC 5184, May 2008. | |||
[RFC5213] Gundavelli, S., Leung, K., Devarapalli, V., Chowdhury, | ||||
K., and B. Patil, "Proxy Mobile IPv6", RFC 5213, | ||||
August 2008. | ||||
[dsmipv6] Soliman (Editor), H., "Mobile IPv6 Support for Dual | ||||
Stack Hosts and Routers", | ||||
draft-ietf-mext-nemo-v4traversal-09.txt, Feb 2009. | ||||
[fmipv6] "fmipv6.org : Home Page", http://fmipv6.org . | ||||
[mip6-book] Koodli, R. and C. Perkins, "Mobile Internetworking with | ||||
IPv6, Chapter 22, John Wiley & Sons.", , July 2007. | ||||
[pfmipv6] Yokota, H. and et. al, "Fast Handovers for Proxy Mobile | ||||
IPv6", draft-ietf-mipshop-pfmipv6-01.txt, Feb 2009. | ||||
[tarzan] "Nautilus6 - Tarzan", | [tarzan] "Nautilus6 - Tarzan", | |||
<http://software.nautilus6.org/TARZAN/>. | http://software.nautilus6.org/TARZAN/ . | |||
[x.p0057] "E-UTRAN - eHRPD Connectivity and Interworking: Core | ||||
Network Aspects", http://www.3gpp2.org/Public_html/ | ||||
Misc/ | ||||
X.P0057-0_v0.13_E-UTRAN- | ||||
eHRPD_Interworking_VV_Due_5_December-2008.pdf. | ||||
Appendix A. Contributors | Appendix A. Contributors | |||
This document has its origins in the fast handover design team in the | This document has its origins in the fast handover design team in the | |||
erstwhile [mobile ip] working group. The members of this design team | erstwhile [mobile ip] working group. The members of this design team | |||
in alphabetical order were; Gopal Dommety, Karim El-Malki, Mohammed | in alphabetical order were; Gopal Dommety, Karim El-Malki, Mohammed | |||
Khalil, Charles Perkins, Hesham Soliman, George Tsirtsis, and Alper | Khalil, Charles Perkins, Hesham Soliman, George Tsirtsis, and Alper | |||
Yegin. | Yegin. | |||
Appendix B. Changes since RFC 4068 | Appendix B. Changes since RFC 5268 | |||
Defined the Mobility Header format for HI and HAck messages, and | ||||
Mobility Header Option format for IPv6 Address/Prefix option. The | ||||
use of ICMP for HI and HAck messages is deprecated. The following | ||||
developments led the WG to adopt this change: | ||||
o The Proxy Mobile IPv6 protocol [RFC5213] has been adopted for | ||||
the deployment of fourth-generation mobile networks. This has | ||||
established Mobility Header as the default type for critical IP | ||||
mobility signaling. | ||||
o The Mobile IPv6 protocol [RFC3775] (particularly, the Dual-stack | ||||
MIP6 or DSMIP6 [dsmipv6]) protocol, which is also expected to be | ||||
deployed in the fourth-generation mobile networks, similarly | ||||
relies on Mobility Header for critical IP mobility signaling. | ||||
o The Fast Handover protocol specified in this document is used as | ||||
the basis for the Fast Handover for Proxy MIP6 [pfmipv6], which is | ||||
adopted by the "enhanced HRPD" (CDMA) networks [x.p0057]. Hence, | ||||
the Fast Handover protocol, when used in deployments using either | ||||
PMIP6 or MIP6, needs to support the Mobility Header for all its | ||||
critical mobility signaling messages. At the same time, use of | ||||
ICMP, primarily due to legacy, is unlikely to facilitate critical | ||||
IP mobility signaling without a non-trivial departure from | ||||
deploying the new Mobility Header signaling protocols. | ||||
Therefore, it follows that specifying Mobility Header for the HI and | ||||
HAck messages is necessary for the deployment of the protocol along- | ||||
side PMIP6 and MIP6 protocols. | ||||
Appendix C. Changes since RFC 4068 | ||||
Following are the major changes and clarifications: | Following are the major changes and clarifications: | |||
o Specified security association between the MN and its Access | o Specified security association between the MN and its Access | |||
Router in the companion document [RFC5269]. | Router in the companion document [RFC5269]. | |||
o Specified Binding Authorization Data for Fast Handovers (BADF) | o Specified Binding Authorization Data for Fast Handovers (BADF) | |||
option to carry the security parameters used for verifying the | option to carry the security parameters used for verifying the | |||
authenticity of FBU and FBack messages. The handover key used for | authenticity of FBU and FBack messages. The handover key used for | |||
computing the Authenticator is specified in companion documents. | computing the Authenticator is specified in companion documents. | |||
skipping to change at page 46, line 50 | skipping to change at page 51, line 12 | |||
o Added a new code value for gratuitous HAck message to trigger a HI | o Added a new code value for gratuitous HAck message to trigger a HI | |||
message. | message. | |||
o Added Option-Code 5 in PrRtAdv message to indicate NETLMM usage. | o Added Option-Code 5 in PrRtAdv message to indicate NETLMM usage. | |||
o Clarified protocol usage when DHCP is used for NCoA formulation | o Clarified protocol usage when DHCP is used for NCoA formulation | |||
(Sections 6.1.2, 3.1, and 5.2). Added a new Code value (5) in | (Sections 6.1.2, 3.1, and 5.2). Added a new Code value (5) in | |||
PrRtAdv (Section 6.1.2). | PrRtAdv (Section 6.1.2). | |||
o Clarified that IPv6 Neighbor Discovery operations are a must in | o Clarified that IPv6 Neighbor Discovery operations are a must in | |||
Section 7, "Related Protocol and Device Considerations". | Section 7, "Related Proto Considerations". | |||
o Clarified "PAR = temporary HA" for FBUs sent by a genuine MN to an | o Clarified "PAR = temporary HA" for FBUs sent by a genuine MN to an | |||
unsuspecting CoA. | unsuspecting CoA. | |||
Editor's Address | Author's Address | |||
Rajeev Koodli | Rajeev Koodli (editor) | |||
Starent Networks | Starent Networks | |||
USA | USA | |||
EMail: rkoodli@starentnetworks.com | EMail: rkoodli@starentnetworks.com | |||
Full Copyright Statement | ||||
Copyright (C) The IETF Trust (2008). | ||||
This document is subject to the rights, licenses and restrictions | ||||
contained in BCP 78, and except as set forth therein, the authors | ||||
retain all their rights. | ||||
This document and the information contained herein are provided on an | ||||
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS | ||||
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND | ||||
THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS | ||||
OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF | ||||
THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED | ||||
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. | ||||
Intellectual Property | ||||
The IETF takes no position regarding the validity or scope of any | ||||
Intellectual Property Rights or other rights that might be claimed to | ||||
pertain to the implementation or use of the technology described in | ||||
this document or the extent to which any license under such rights | ||||
might or might not be available; nor does it represent that it has | ||||
made any independent effort to identify any such rights. Information | ||||
on the procedures with respect to rights in RFC documents can be | ||||
found in BCP 78 and BCP 79. | ||||
Copies of IPR disclosures made to the IETF Secretariat and any | ||||
assurances of licenses to be made available, or the result of an | ||||
attempt made to obtain a general license or permission for the use of | ||||
such proprietary rights by implementers or users of this | ||||
specification can be obtained from the IETF on-line IPR repository at | ||||
http://www.ietf.org/ipr. | ||||
The IETF invites any interested party to bring to its attention any | ||||
copyrights, patents or patent applications, or other proprietary | ||||
rights that may cover technology that may be required to implement | ||||
this standard. Please address the information to the IETF at | ||||
ietf-ipr@ietf.org. | ||||
End of changes. 176 change blocks. | ||||
433 lines changed or deleted | 626 lines changed or added | |||
This html diff was produced by rfcdiff 1.32. The latest version is available from http://www.levkowetz.com/ietf/tools/rfcdiff/ |