INTERNET-DRAFT Thomas Clausen IETF NEMO Working Group Emmanuel(MA)NEMO E. BaccelliExpiration: 15 April 2005Internet-Draft INRIA Expires: September 6, 2007 T. Clausen LIX, Ecole Polytechnique, FranceRyujiR. Wakikawa KeioUniversity/WIDE 15 October 2004University, WIDE March 5, 2007 NEMO Route Optimisation Problem Statementdraft-clausen-nemo-ro-problem-statement-00.txtdraft-clausen-nemo-ro-problem-statement-01 Status of this MemoThis document is a submission to the Network Mobility Working Group of the Internet Engineering Task Force (IETF). Comments should be submitted to the nemo@ietf.org mailing list. Distribution of this memo is unlimited.By submitting this Internet-Draft,I certifyeach author represents that any applicable patent or other IPR claims of whichI amhe or she is aware have beendisclosed,or will be disclosed, and any of whichI becomehe or she becomes aware will be disclosed, in accordance withRFC 3668. This document is an Internet-Draft and is in full conformance with all provisions ofSection106 ofRFC 2026.BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents asInternet-Drafts.Internet- Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed athttp://www.ietf.org/ietf/1id-abstracts.txthttp://www.ietf.org/ietf/1id-abstracts.txt. The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html.Abstract The NEMO working group has developed a protocol suite, extending the notion of edge-mobility on the Internet to include that of network mobility. This implies that a set of nodes, along with their mobile router, change their point of attachment and that traffic to these nodes is tunneled to be delivered through their new point of attachment.Thismechanism is transparent to applications in that existing traffic to a node is being encapsulated and tunneled, regardless of where the network containing the destination node is attached.Internet-Draft will expire on September 6, 2007. Copyright Notice Copyright (C) The IETF Trust (2007). Abstract The NEMO basic support specification is not limited to a single level of mobilenetworks,networks attaching to the stationary Internet. Rather, arbitrary levels of nested mobile networks are supported, employing for each level of nesting the same attachment, encapsulation andtunnelingtunnelling mechanisms. With arbitrarily deep nested mobile networks, paths taken by data traffic can be extremely sub-optimal both inside the nested topology through successive mobile routers, and outside the nested topology, through successive Home Agents over the Internet. Moreover, the overhead incurred throughtunnelingtunnelling and encapsulation of data trafficcan, however,can become prohibitively large.As a consequence, a number of different proposals exist, which aim at performing "route optimization" for nested mobile networks.This documentaims at describinganalyses thedifferentscenarios in whichroute-optimization is desired, as well as the different proposed solutions for achieving route-optimization in nested mobile networks.these problems are particularly acute. Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . .. 4 1.1.3 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . ..41.2. Applicability . . . . . . . . . . . . . . . . . . . . . . . . . 4 2.3. Deployment Scenarios . . . . . . . . . . . . . . . . . . . . .. . . . . . . 4 2.1. NEMO-to-NEMO . . . . . . . . . . . . . .5 3.1. Internet - Nested NEMO Communication . . . . . . . . . . . 52.2. Internet-to-NEMO . . . . . . . . . .3.2. Intra Nested NEMO Communication . . . . . . . . . . . . . 63. Solutions .3.3. RFC3963 Loops . . . . . . . . . . . . . . . . . . . . . . 7 4. Problem Statement . . . . .7 3.1. NEMO-to-NEMO. . . . . . . . . . . . . . . . . 8 4.1. Lack of Nested Topology State Information . . . . . . . . 83.1.1.4.2. Goals of Route OptimizationMechanisms Withinfor Nested NEMO. . .networks . . . 93.1.2. Ad-hoc Network of Mobile Routers .4.3. Solution Guidelines . . . . . . . . . . . . .9 3.2. Internet-to-NEMO .. . . . . . 9 5. Security Considerations . . . . . . . . . . . . . . . .11 3.2.1. Route Optimization Mechanisms Initiated by MR or MNN .. . . 113.2.2. Route Optimization Initiated by a Non-Mobile Router . . . . . 12 4. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . . 12 5. Authors' Addresses . .6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 126.7. References . . . . . . . . . . . . . . . . . . . . . . . . . ..137. Changes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 8. IANA Considerations . . . . . . . . . . . . . . . . . . . .Authors' Addresses . . .14 9. Security Considerations. . . . . . . . . . . . . . . . . . . . . 1410.Intellectual Property and Copyright Statements . . . . . . . . . .. . . . . . . . . . . . . . . . . 1415 1. Introduction The NEMOprotocol suitebasic support specification [1] extendsMobile IP in enablingthe notion of edge- mobility on the Internet to include that of network mobility. This implies that a set of nodes, along with their mobile router,tochange their point of attachmentto the Internet. NEMO enables theand that traffic to these nodes is tunnelled to betun- neled for deliverydelivered through their new point of attachment.The use of tunneling makes thisThis mechanism is transparent toapplications, wherever the new point of attachement, evenapplications incasethat existing traffic to a node is being encapsulated and tunnelled, regardless ofseveral layerswhere the network containing the destination node is attached. The NEMO basic support specification is furthermore not limited to a single level ofnested mobility (i.e. mobile nodes, ormobilerouters, indirectly accessingnetworks attaching to theInternet through otherstationary Internet. Rather, arbitrary levels of nested mobilerouters).networks are supported, employing for each level of nesting the same transparent mechanisms relying on attachment, encapsulation and tunnelling. However,this approach is not without a certain cost:witharbitrar- ilyarbitrarily deep nested mobile networks, paths taken by data traffic can become extremely sub-optimal both (i) inside the nested topology through successive mobile routers, and (ii) outside the nested topology, through successive Home Agents over the Internet. Moreover, the overheaddue to tunneling, dog- leg routingincurred through tunnelling and encapsulation of data traffic can become prohibitively large.A number of different solutions have been proposed in orderThis document describes cases where problems due tooptimize this routing in some of these cases. A review of some of these solutions is provided in this document, as well as thesub-optimal data traffic paths and encapsulation overhead are acute, providing a discussion of which cases and to what extent routeopti- mizationoptimisation isdesireabledesirable with NEMO.1.1.2. Terminology The keywords "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC2119 [5]. It is moreover assumed that readers are familiar with NEMO terminology as described and employed in [1] and[8]. 1.2. Applicability This document aims at discussing scenarios where route optimization is desirable in a NEMO environment, and what level of route optimiza- tion is desired in those cases. A review of some existing solutions and ideas is thereby provided. 2.[2]. 3. Deployment ScenariosAt least two distinctTwo categories of scenarios exist, where routeoptimizationoptimisation isdesireable.desirable. Those are,respectively,respectively: (i) when anodehost from the Internet wishes to communicate with a host in a nested NEMO, and (ii) when a host in a nested NEMOnetworkwishes to communicate with anodehost in another nested NEMOnetworkwhich is part of the samenesting, and when a node from the Internet wishes to communicate with a node in anested NEMOnetwork. While the scenarios may have commonalities, their possible solution- space differs and theytopology. Some of these issues aretherefore described seperately below. 2.1. NEMO-to-NEMOalso elaborated in [4]. 3.1. Internet - Nested NEMO Communication In this category of scenario, a number of NEMO networks are nested to one another, andnodesa host in thedifferent NEMO networks are communicatingInternet wishes to communicate with a host in oneanother.of the NEMO networks. For the purpose of describing thisscenario description, refer toscenario, theschematics below:example depicted in Fig. 1 below is considered. ---------- ---------- ---------- ---------- | | | | | | | | | NEMO 1 |--| NEMO 2 |--| NEMO 3|--Internet|--Internet--| Host 1 | | | | | | | | | | ---------- ---------- ---------- | ---------- | ---------- ---------- | | | | | |----| HA 2 | | HA 1 |---------| | | | | | ---------- ---------- | ---------- | | | HA 3 | | | ---------- Figure 1: Nested NEMO networks --NEMO-to-NEMOInternet-to-NEMO communication We assume that each boxlabeledlabelled "NEMO x" refers to a Mobile Router (MR), running the NEMO protocol, as well as thenodeshosts attached to that mobile router. We further assume, that each line indicates a direct connection between routers -- i.e. the mobile router in "NEMO 1" has a direct connection to the mobile router in "NEMO 2". Each boxlabeledlabelled "HA x" refers to the Home Agent for the NEMO network x -- i.e. that HA 1 is the Home Agent for the mobile network NEMO 1.If a node from NEMO 3The host labelled "Host 1" wishes to communicate with anode from "NEMO 1", then the datahost in NEMO 1. Data trafficwouldwill first besent torouted through HA 1 the Home Agent of NEMO1 -- i.e. to HA1. At HA 1, a binding would exist, identifying NEMO 1 as being attached to the network of NEMO 2. Thus, the traffic would be encapsulated, and sent to the HA of NEMO 2, i.e. HA 2. At HA 2, a binding would exist, identifying that, indeed, NEMO 2 is attached to the network of NEMO 3. Another encapsulation would ensure, and the traffic sent to HA 3. At HA 3, a binding would identify the point of attachment of NEMO 3 to the internet, and the data traffic would be encapsulated one final time prior to being delivered to NEMO 3 -- where decapsulation and handoff to NEMO 2, then NEMO 1 occurs.In this scenario, short path between NEMO 1 and NEMO 3, without transversingThis simple example scenario therefore involves communication with (i) triple encapsulation of theInternetdata, andHA1-3, exists, however is not used in(ii) its transmission via 3 arbitrary locations across thecurrent NEMO specification.Internet. More generally,assume a setif instead of a depth 3 the nested NEMOnetworks formingstructure had aconnected networkdepth N, the communication would involve worst case N levels of encapsulation of the data, and its transmission viatheir mobile routers without transversingN arbitrary locations across the Internet.ForThis is thus very sub-optimal communicationbetween nodes in these NEMO networks, a solution should exist, which provides routes between the nodes without transversingacross the Internetand without incuring excessive nested encapsulations. 2.2. Internet-to-NEMO([3]. 3.2. Intra Nested NEMO Communication In this category of scenario, a number of NEMO networks are nested to one another, anda nodehosts in theInternet wishes to communicate to a node indifferent nested NEMOs are communicating with oneof the NEMO networks.another. For the purpose of describing thisscenario description, refer toscenario, theschematics below: ----------example depicted in Fig. 2 below is considered. ---------- ---------- ---------- | | | | | | || |NEMO 1 |--| NEMO 2 |--| NEMO 3|--Internet--| Node 1 | | ||--Internet | | | | | | | ---------- ---------- ---------- |----------| ---------- ---------- | | | | | |----| HA 2 | | HA 1 |---------| | | | | | ---------- ---------- | ---------- | | | HA 3 | | | ----------FigureFig. 2: Nested NEMO networks --Internet-to-NEMONEMO-to-NEMO communicationThe node labeled "Node 1"If a host from NEMO 3 wishes to communicate with anode inhost from NEMO1. Similarly to1, then theprevious scenario, this will happen through con- nectingdata traffic would first be sent out the nested NEMO network, over the Internet to HA1,1. The data traffic would thenencapsulationbe encapsulated andtunneling datatunnelled to HA22, which will in turn add another layer of encapsulation and tunnel the traffic to HA3 which will do the same before the dataarrives at the edge ofreturns to our nested NEMO network.Only then canSuccessive decapsulation and transmission via NEMO 3, NEMO 2 and NEMO 1happen. In this scenario, while no direct link exists between Node 1 andwill then happen before data is delivered to thenode in NEMO 1,destination. Again, this simple example scenario involves communication with (i) triple encapsulation of the data, and (ii) its transmission viaHA1-3 occurs. More generally, a path between a node in the Internet and3 arbitrary locations across theedgeInternet. And again, more generally, if instead of a depth 3 the nested NEMOnetworks exists, which does not necessarilly involve any of the Home Agents for the NEMO networks. For such communication,structure had asolution should exist which avoids nested encapsulations (i.e. allows data to be encapsulated only once, in order to arrive atdepth N, theedgecommunication would involve N levels of encapsulation of thenested NEMO networks),data, andwhich does not force a path which involves all the Home Agents ofits transmission via N arbitrary locations across thenested NEMO networks onInternet. This is therefore very sub-optimal communication across thepath toInternet, as communication inside thedestination. In addition,nestedencapsulation brings a limitationNEMO network should be sufficient. 3.3. RFC3963 Loops [1] allows for NEMO mobile routers tothe number of nested levels, duenest toMTU size. For example, the current NEMO basic support specificationone another, however does notallow a level higher than 40 in nesting in NEMO (with usual MTU = 1500 bytes), duestipulate how to form thesizelinks of the40 IPv6 headers, i.e. 40 bytes x 40 > MTU.nest. Inthis case IP fragmen- tation does not help, since the total size of IPv6 headers exceeds the MTU. Thus,particular, [1] allows for, as is illustrated in theavoidancefollowing Fig. 3, NEMO 1 to select NEMO 2 as its point ofnested encapsulations also eliminates the limitation on the levelattachment, with NEMO 2 selecting NEMO 3 as point ofnesting in NEMO. 3. Solutions Common for the scenariosattachment and NEMO 3 selecting NEMO 1 - thereby forming a loop. Absent other mechanisms, this loop will persist, potentially disconnecting both NEMO 1, NEMO 2 and NEMO 3 from theprevious section is, thatwider network, from theencapsulationInternet, andtunneling- if traffic between NEMO nodes isduetunnelled through HAs, also from each other. [1] does not provide functionality allowing to detect this loop: a MR cannot know whether it connects to a mobile network or a general IPv6 network. ---------- ---------- | |--| | | NEMO 1 | | NEMO 2 | | | | | ---------- ---------- | | ---------- | | | NEMO 3 | | | ---------- Fig. 3: Loop in Nested NEMO networks 4. Problem Statement Encapsulation and tunnelling specified by NEMO basic support [1] are governed by thefacts that: - the nodefollowing principles: 1. A router whichoriginatesforwards data traffic does not know where the destinationnodeis located and therefore assumes thatthe nodeit is at its Home Network;- no router knows the full path2. A Home Agent does not know if a NEMO is directly or indirectly bound to thedestination,Internet, which in particular means that:- no3. No router knows the topology of the nested NEMO network(s).As a concequence, eachWhile these principles are functional, they have the consequences that are described in the following. 4.1. Lack of Nested Topology State Information The lack of state information about the nested NEMO topology and its point(s) of attachment to the Internet causes routing to involve logicalhophops (from source to Home Agent ofdes- tination,destination, or from Home Agent to HomeAgentAgent), each ofthe nested NEMO net- works) adds layersthose adding a layer ofencapsulation, untilencapsulation and a detour across the Internet, until a point of attachment between the Internet and the nested NEMOedge, the Access Router (AR)network is reached.Concequently, if the source node, or any intermediate node, had addi- tional information about the network topology, more beneficial tunnels could be created,This lack causes extreme data paths sub-optimality andlessextreme data encapsulationwould be required. For example if,overhead infigure 2 above, Node 1 knew directly that the gateway from the Internet to "the networkcases wherenodes from NEMO 1 are attached" was the Access Router of NEMO 3, and if the mobile router in NEMO 3 knewthe nested topology is ofthe nested NEMO network, a tunnel could be directly created from Node 1 to NEMO 3, with assurance that the mobile routerdepth greater than 2, as depicted inNEMO 3 would be able to route data packets cor- rectly to the destination.Section 3.2 and Section 3.1.NEMO-to-NEMOTheNEMO-to-NEMO problem, as described in section 2.1, is one of how to avoid transversing the Internet in order to communicate between two nodes which are part of the same nested NEMO network. More gener- ally, this can be expressed as "how traffic is routed withinfollowing items summarise theNEMO network". NEMO basic support [1] specifies that traffic be routed via Home Agents, indicating an assumption of limited depthproblems incurring from lack of nestednetworks and traffic patterns being predominantlytopology state information: Internet Route Suboptimality - where trafficoffrom theInternet-to- NEMO type. Each mobile router in a NEMO network knows only of its attachments, i.e. its access routerinternet transverses more than one HA, incurring both route sub-optimality andthe nodes within its own mobile network. A mobile router in NEMO does not know about any nest- ings, i.e. it does not know the topology of thenestedNEMO network -- and as such, can only provide routes to the Home Agents on the Internet. In order to avoid the scenario described in section 2.1,encapsulation; Intra-NEMO Route Suboptimality - wheredata packets for delivery withintraffic between hosts in the nested NEMO networkare routedis forced through the Internet gateway andthe nested networks Home Agents, when asubsequently through one or morelocalized aproach would have been possible, additional state can be maintained in theHAs, incurring both route sub- optimality and nestedNEMO networks. A number of approaches for maintaining state in mobile routers and/or Home Agentsencapsulation; Intra-NEMO loops - where, due to unfortunate selection ofmobile net- works have been discussed, including [3], [4], [9], [10], [11], [12], [13], inwhichtechniques such as route caching are discussed. These techniques can be deployed in Home Agents, in routers, specifically designated as aggregation points for NEMO tunnels, as well as within the mobile routers in orderMR is attaching tooptimize routes within a nestedwhich MR, loops occur. 4.2. Goals of Route Optimization for Nested NEMOnetwork. This is detailed in section 3.1.1. Essentially, however, the issuenetworks The goal of routeoptimization within aoptimisation for nested NEMOnetworkisone of routing: maintaining state in each mobile router such that an intelligent forwarding decision can be made. I.e., if the destination can be detected to be "local"to alleviate thenest of NEMO networks, aproblems regarding (i) Internet routetosub-optimality, (ii) Intra-NEMO route sub-optimality, and (iii) Intra-NEMO loops. Additional information about thedestination cannested topology must beconstructed directly through the NEMO mobile routers without passing through the Home Agents. Alternatively, if the destination is not local, data are routedavailable totheMobile Routers and/or HomeAgent, where basicagents, which: o may serve to allow NEMOtunnelingMRs to detect andencapsula- tion take effect. Deploying a routing protocol for maintaining suffi- cient state in the nodesalleviate loops or to prevent such from occurring in thenested NEMO network is detailed in section 3.1.2. 3.1.1. Route Optimization Mechanisms Within Nestedfirst place. Specifically, this allows a NEMOSome approaches have been proposedMR totackle the problem of route optimization inside nested NEMO networks. For instance, Nested NEMO Tree Discovery [4] offers a mechanismensure thataims at avoiding routing loops by organizing and maintainingatree structure within the net- work of nested NEMOs, the root being the Access Router or the Mobile Router directly connectedloop-free path to theAccess Router (the Top Level Mobile Router). Source routing is also proposed to be used in this environment. Approaches like RRH [12] use the recording of the sequences of tra- versed Mobile Routers on the way out of the nested NEMO network (to the Internet, say,Internet Gateway exists; o may serve tobind) in orderestablish and maintain an intra-NEMO routing mesh, allowing toforward traffic efficiently in the nested NEMO network. Onbypass theother hand, approaches like ORC (Optimized Route Cache Proto- col [3]) could be adapted toInternet Gateway and HAs for intra-NEMO communications; o may servethe purpose of insuring some level of optimizedto bypass dog-leg routinginside nested NEMO networks. Some router, sayin communications from sources on thetop level mobile router, could be configured to play a role simi- larInternet to acorrespondent router, organizing the forwarding of packets inside the nested NEMO network. This special router could be dynami- cally discovered insidemobile node in the nested NEMO network. 4.3. Solution Guidelines Amore general form of this mechanism would besolution tohave each MR inthenestedNEMOnetwork possess this extended information about the nested NEMO network. This does then, de-facto, becomeRoute Optimisation problem will: o provide asituation wheremechanism whereby each MRknows the entire topology of the nested NEMO network, and will be able to act in the capacity of router for such traffic. This generalized mechanism is described in more details in section 3.1.2. 3.1.2. Ad-hoc Network of Mobile Routers A NEMO network consists of a mobile router, to which a set of nodes are (statically) attached. The mobile router communicates with (i.e.hasdirect links with) other mobile routers, and possibly with the Internet at large. As such, a NEMO network is not much different from any other network. What makes NEMO networks different from other net- works is,sufficient topological awareness such thattheyit maychange their point of attachment at will -- i.e.select thetopology formed by NEMO mobile routers is dynamic. Thus, in orderrouter(s) toprovide routes between any two nodes in the nested NEMO network, a mechanism must be in placewhichensuresit attaches such thatthe dynamic topology of the nested NEMO network can be accurately tracked and used forroutingtable calculations. The IETF MANET working grouploops are avoided; o provide a mechanism whereby each MR hasbeen developing routing protocols for dynamic ad-hoc networks,sufficient topological awareness suchas OLSR [2] and AODV [6] (both RFC), with the characteristicsthat it may select a suitable path towards thedeveloped protocols should be light-weight, able to react to rapid topology changes and limit the signalling overhead. An approach to route optimization within the NEMO-to-NEMO scenario could therefore be to consider the mobile routers of the nested NEMO networks as nodes in an ad-hoc network, and run an ad-hoc routing protocol to ensure that each mobile router would be able to determine if data could be locally (i.e. within the nested NEMO network) delivered, or had to be tunneled back to the Home Agent. OLSR [2],Internet Gateway forexample, provides light-weight OSPF-like [7] routing functionality. This includes efficient maintenance of the topology spanned by the links betweencommunication towards themobile routersInternet and - inthe face of net- work dynamics, as well as the ability forparticular - towards its HA; o provide amobile router to adver- tize associated nodes which do not run the OLSR routing protocol (e.g. nodes associated tomechanism whereby each Internet Gateway has sufficient topological awareness such that it may select amobile router, which are not themself mobile routers). It is also possible for Mobile Network Nodes to obtain global connectivity, as describedsuitable path towards each MR in[16]. Employing a protocol such as OLSR amongthemobile routers in anested NEMO networkwould yield the abilityforany mobile router to determine if a destination can be reached through a path local to the nested NEMO network, or if forwarding to the Home Agentwhich it isrequired. Additionally, this would also ease the Internet-to-NEMO scenario. In order to deliver an IP datagram toproviding Internet access; o provide anode in the nested NEMO network, onlymechanism whereby each MR has sufficient topological awareness such that it may select a suitable pathto the access router betweentowards another MR within thenestedNEMOnetwork andwithout transversing the Internetwould be required: once an IP datagram arrives in the nested NEMO network, the routing tables in the mobile routers, as provided by OLSR, would allow direct routing to the destination. Thus, there would no longer beGateway; o provide arequirement to do nested encapsula- tion on each logical hop (i.e.mechanism whereby eachtransversalMR has sufficient topological awareness such that it may provide suitable binding updates with its HA. A particular case ofa Home Agent) in order to be able to decapsulate and correctly forward IP datagrams in the nested NEMO network. Thus eventhis is ifno route optimizations are performed intheInternet-to- NEMO scenario, an overhead reductionMR canstill be achieved through much lower encapsulation requirements. 3.2. Internet-to-NEMO The goal here is, again, to avoid unnecessary encapsulationprovide binding updates such that multiple encapsulations anddog- leg routing. Indeed, it is desirable to avoid letting the level of nested mobilitysub-optimal routes on theedges of the network dictating the number of Home Agents (and therefore the amount of encapsulation) the packets have to go through. There shouldInternet can be avoided when awayMR is connected tolimitthelevel of tun- neling to only one encapsulation IPInternet Gateway through multiple intermediate MRs inIP, and at the same time, min- imizethetraffic relayed by Home Agents. Existing solution to route optimization problems inNEMOtherefore aim at, basically, minimizing the required amount of tunneling in various nested mobility cases. They can be categorized as follows: - route optimization initiated by Mobile Routers (MR) or Mobile Network Nodes (MNN); - route optimization initiated by intermediate non-mobile routers on the path to Corresponding Nodes. The following sub-sections briefly review these solutions. 3.2.1. Route Optimizationnest. MechanismsInitiated by MR or MNN In casedeveloped for maintaining and using such information must address the distributed, multi-hop nature of nestedmobility (i.e. a mobile router attaches to another mobile router, or a visiting mobile node attaches to a mobile router), several encapsulations will occur on top of each other,NEMO networks, anda sub-optimal path willbeusedable toreach the destination, going through eachfollow topology andevery Home Agent. In order to slim this down, sev- eral nested tunnel optimizations have been discussed. The HMIP-like mechanisms suggestedconnectivity changes by updating state information in[15] or the TLMR (Top Level Mobile Router [11]) approach use one or moreMobile Routerschosen for their location (closest to the Access Router) to act as proxy for Mobile IP,and/oract asHome Agentsfor other mobile nodes inside the attached mobile networks, like proposed in [14]. Instead of adding another layer encapsulation, those TLMR switch between ingress and egress tunnels and can reduce the amount of binding. Similarily, ARO (Access Router Option [13]) proposes nested tunnel optimizations based on the registration of the top level Access Router of any nested NEMO to the Home Agent in order to bypass the HAs of all the MR on the way to the Access Router. On the other hand, source routing approaches like RRH (Reverse Routing Header [12]) or Path Control Header [9] use loose source routing in order to avoid IP encapsulation. However, source routing is not always desirable, and might not be widely accepted. 3.2.2. Route Optimization Initiated by a Non-Mobile Router Some approaches such as ORC (Optimized Route Cache Protocol [3]) or other proposals using so called Anchor Routers or Correspondent side routers (see [10] for further references), advocate the adding of new functionalitiesaccordingly. Solutions must achieve their task while being conservative insome routers that are ideally chosen to be opti- mally placed with respect to traffic flows between ASs. Those routers intercept and terminate the tunneling on behalf of the Correspondent Node, therefore optimizing the route from then on. However, this is not easy to deploy, and the optimization is partial. 4. Acknowledgements The authors would like to thank Hitachi Labs Europe fortheirsupport. 5. Authors' Addresses Thomas Heide Clausen, Project PCRI Pole Commun de Recherche en Informatique du plateau de Saclay, CNRS, Ecole Polytechnique, INRIA, Universite Paris Sud, Ecole polytechnique, Laboratoire d'informatique, 91128 Palaiseau Cedex, France Phone: +33 1 69 33 40 73, Email: T.Clausen@computer.org Emmanuel Baccelli HITACHI Labs Europe/ Project PCRI, Pole Commun de Recherche en Informatique du plateau de Saclay, CNRS, Ecole Polytechnique, INRIA, Universite Paris Sud, Ecole polytechnique, Laboratoire d'informatique, 91128 Palaiseau Cedex, France Phone: +33 1 69 33 40 73, Email: Emmanuel.Baccelli@inria.fr Ryuji Wakikawa Keio Universitynetwork resource consumption andWIDE 5322 Endo Fujisawa Kanagawa 252 JAPAN Phone: +81-466-49-1394 EMail: ryuji@sfc.wide.ad.jp Fax: +81-466-49-1395while avoiding prohibitively long delays. 5. Security Considerations This document does currently not specify security considerations. 6. IANA Considerations This document does currently not specify IANA considerations. 7. References [1]V.Devarapalli,R.V., Wakikawa,A.R., Petrescu, A., and P.Thubert. NemoThubert, "Network Mobility (NEMO) Basic SupportProtocol (work in progress). Internet Draft (draft- ietf-nemo-basic-support-02), Internet Engineering Task Force, December 2003.Protocol", RFC 3963, 2005. [2] Ernst, T.Clausen, P. Jacquet, Optimized Link State Routing Protocol. Request for Comments (Experimental) 3626, October 2003.and H-Y. Lach, "Network Mobility Support Terminology", draft-ietf-nemo-terminology-06 (work in progress), 2006. [3]R. Wakikawa, M. Watari. OptimizedNG, C., Zhao, F., Watari, M., and P. Thubert, "Network Mobility RouteCache Protocol (ORC)Optimization Solution Space Analysis", draft-ietf-nemo-ro-space-analysis-03 (work inprogress). Internet Draft (draft-wakikawa-nemo-orc-00.txt), Internet Engineering Task Force, July 2004.progress), 2006. [4] NG, C., Zhao, F., Watari, M., and P. Thubert,N. Montavont. Nested Nemo Tree Discovery"Network Mobility Route Optimization Problem Statement", draft-ietf-nemo-ro-problem-statement-03 (work inprogress). Internet Draft (draft-thubert-tree-discovery-00.txt), Internet Engineering Task Force, May 2004.progress), 2006. [5]S. Bradner. KeyBradner, S., "Key words for use in RFCs to Indicate RequirementLev- els. Request for Comments (Best Current Practice)Levels", RFC 2119,Internet Engineering Task Force, March1997.[6] C. Perkins, E. Belding-Royer, S. Das. Ad hoc On-Demand Distance Vec- tor (AODV) Routing, Request for Comments (Experimental) 3561, July 2003 [7] Moy, J., "OSPF Version 2", RFC 2328, April 1998. [8] T. Ernst, H-Y. Lach. Network Mobility Support Terminology (work in progress). Internet Draft (draft-ietf-nemo-terminology-01), Inter- net Engineering Task Force, February 2004. [9] Jongkeun Na et al. Route Optimization Scheme based on Path Control Header (work in progress). Internet Draft (draft-na-nemo-path-con- trol-header-00), Internet Engineering Task Force, April 2004. [10] P. Thubert et al. Taxonomy of Route Optimization models in the Nemo Context (work in progress). Internet Draft (draft-thubert-nemo-ro- taxonomy-02), Internet Engineering Task Force, February 2004. [11] H. Kang et al. Route Optimization for Mobile Network by Using Bi- directional Between Home Agent and Top Level Mobile Router (work in progress). Internet Draft (draft-hkang-nemo-ro-tlmr-00.txt), Inter- net Engineering Task Force, June 2003. [12] P. Thubert et al. IPv6 Reverse Routing Header and its application to Mobile Networks (work in progress). Internet Draft (draft-thu- bert-nemo-reverse-routing-header-05), Internet Engineering Task Force, June 2004. [13] C. Ng et al. Securing Nested Tunnels Optimization with Access Router Option (work in progress). Internet Draft (draft-ng-nemo- access-router-option-01), Internet Engineering Task Force, July 2004. [14] E. Perera et al. Extended Network Mobility Support (work in progress). Internet Draft (draft-perera-nemo-extended-00.txt), Internet Engineering Task Force, July 2003. [15] H. Ohnishi et al. HMIP based Route Optimization Method in a Mobile Network (work in progress). Internet Draft (draft-ohnishi-nemo-ro- hmip-00.txt), Internet Engineering Task Force, April 2003. [16] R.Authors' Addresses Emmanuel Baccelli INRIA Phone: +33 1 69 33 55 11 Email: Emmanuel.Baccelli@inria.fr Thomas Heide Clausen LIX, Ecole Polytechnique, France Phone: +33 6 6058 9349 Email: T.Clausen@computer.org URI: http://www.lix.polytechnique.fr/Labo/Thomas.Clausen/ Ryuji Wakikawaet al. Global Connectivity for IPv6 Mobile Ad Hoc Net- works (work in progress). Internet Draft (draft-wakikawa-manet- globalv6-03.txt), Internet Engineering Task Force, October 2003. 7. Changes This is the initial version of this specification. 8. IANA Considerations This document does currently not specify IANA considerations. 9. Security Considerations This document does not specify any security considerations. 10.Keio University, WIDE Phone: +81-466-49-1394 Email: Ryuji@sfc.wide.ad.jp Full Copyright Statement Copyright (C) TheInternet Society (2004).IETF Trust (2007). This document is subject to the rights, licenses and restrictions contained in BCP 78, and except as set forth therein, the authors retain all their rights. This document and the information contained herein are provided on an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNETSOCIETYSOCIETY, THE IETF TRUST AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THEINFOR- MATIONINFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Intellectual Property The IETF takes no position regarding the validity or scope of any Intellectual Property Rights or other rights that might be claimed to pertain to the implementation or use of the technology described in this document or the extent to which any license under such rights might or might not be available; nor does it represent that it has made any independent effort to identify any such rights. Information on the procedures with respect to rights in RFC documents can be found in BCP 78 and BCP 79. Copies of IPR disclosures made to the IETF Secretariat and any assurances of licenses to be made available, or the result of an attempt made to obtain a general license or permission for the use of such proprietary rights by implementers or users of this specification can be obtained from the IETF on-line IPR repository at http://www.ietf.org/ipr. The IETF invites any interested party to bring to its attention any copyrights, patents or patent applications, or other proprietary rights that may cover technology that may be required to implement this standard. Please address the information to the IETF at ietf-ipr@ietf.org. Acknowledgment Funding for the RFC Editor function is provided by the IETF Administrative Support Activity (IASA).