| < draft-bo-behave-ref-req-00.txt | draft-bo-behave-ref-req-01.txt > | |||
|---|---|---|---|---|
| BEHAVE Working Group B. Zhou | BEHAVE Working Group B. Zhou | |||
| Internet-Draft H. Deng | Internet-Draft H. Deng | |||
| Intended status: Informational China Mobile | Intended status: Informational China Mobile | |||
| Expires: April 22, 2010 October 19, 2009 | Expires: April 29, 2010 October 26, 2009 | |||
| Requirements for Referral in Mobile Network, input to GROBJ BoF | Requirements for Referral in Mobile Network, input to GROBJ BoF | |||
| draft-bo-behave-ref-req-00 | draft-bo-behave-ref-req-01 | |||
| Status of this Memo | Status of this Memo | |||
| This Internet-Draft is submitted to IETF in full conformance with the | This Internet-Draft is submitted to IETF in full conformance with the | |||
| provisions of BCP 78 and BCP 79. | provisions of BCP 78 and BCP 79. | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF), its areas, and its working groups. Note that | Task Force (IETF), its areas, and its working groups. Note that | |||
| other groups may also distribute working documents as Internet- | other groups may also distribute working documents as Internet- | |||
| Drafts. | Drafts. | |||
| skipping to change at page 1, line 32 ¶ | skipping to change at page 1, line 32 ¶ | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| The list of current Internet-Drafts can be accessed at | The list of current Internet-Drafts can be accessed at | |||
| http://www.ietf.org/ietf/1id-abstracts.txt. | http://www.ietf.org/ietf/1id-abstracts.txt. | |||
| The list of Internet-Draft Shadow Directories can be accessed at | The list of Internet-Draft Shadow Directories can be accessed at | |||
| http://www.ietf.org/shadow.html. | http://www.ietf.org/shadow.html. | |||
| This Internet-Draft will expire on April 22, 2010. | This Internet-Draft will expire on April 29, 2010. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2009 IETF Trust and the persons identified as the | Copyright (c) 2009 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents in effect on the date of | Provisions Relating to IETF Documents in effect on the date of | |||
| publication of this document (http://trustee.ietf.org/license-info). | publication of this document (http://trustee.ietf.org/license-info). | |||
| Please review these documents carefully, as they describe your rights | Please review these documents carefully, as they describe your rights | |||
| skipping to change at page 2, line 16 ¶ | skipping to change at page 2, line 16 ¶ | |||
| This document lays out the requirements that need to be met by the | This document lays out the requirements that need to be met by the | |||
| potential referral modifications for the mobile network. | potential referral modifications for the mobile network. | |||
| Table of Contents | Table of Contents | |||
| 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 | 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
| 1.1. Conventions used in this document . . . . . . . . . . . . . 3 | 1.1. Conventions used in this document . . . . . . . . . . . . . 3 | |||
| 2. Requirements of referral design . . . . . . . . . . . . . . . . 4 | 2. Requirements of referral design . . . . . . . . . . . . . . . . 4 | |||
| 2.1. R1 Standard referral format . . . . . . . . . . . . . . . . 4 | 2.1. R1 Standard referral format . . . . . . . . . . . . . . . . 4 | |||
| 2.2. R2 Guarantee of NAT traversal . . . . . . . . . . . . . . . 4 | 2.2. R2 Simplify ALG during NAT traversal . . . . . . . . . . . 4 | |||
| 2.3. R3 Network inspection consideration . . . . . . . . . . . . 4 | ||||
| 3. Security Considerations . . . . . . . . . . . . . . . . . . . . 5 | 3. Security Considerations . . . . . . . . . . . . . . . . . . . . 5 | |||
| 4. IANA Considerations . . . . . . . . . . . . . . . . . . . . . . 6 | 4. IANA Considerations . . . . . . . . . . . . . . . . . . . . . . 6 | |||
| 5. Normative References . . . . . . . . . . . . . . . . . . . . . 7 | 5. Normative References . . . . . . . . . . . . . . . . . . . . . 7 | |||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 8 | Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 8 | |||
| 1. Introduction | 1. Introduction | |||
| Mobile operators are using referrals in their network to make | Mobile operators are using referrals in their network to make | |||
| entities reachable straightforward. However, this simple approach is | entities reachable straightforward. However, this simple approach is | |||
| failed by deployment of firewall and translator (like NAT) in the | failed by deployment of firewall and translator (like NAT) in the | |||
| skipping to change at page 4, line 9 ¶ | skipping to change at page 4, line 9 ¶ | |||
| 1.1. Conventions used in this document | 1.1. Conventions used in this document | |||
| The key words "MUST", "MUST NOT", "REQUIRED", "SHALL","SHALL NOT", | The key words "MUST", "MUST NOT", "REQUIRED", "SHALL","SHALL NOT", | |||
| "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | |||
| document are to be interpreted as described in [RFC2119]. | document are to be interpreted as described in [RFC2119]. | |||
| 2. Requirements of referral design | 2. Requirements of referral design | |||
| 2.1. R1 Standard referral format | 2.1. R1 Standard referral format | |||
| The referral format need to be standardised. All kinds of | The referral formats need to be standardized. Applications can | |||
| applications can understand the meaning of referral informed. | understand the meaning of referral informed, such as IP address, | |||
| possibly protocol and port numbers. However, there is an open | ||||
| question whether this standard referral design should be use for new | ||||
| applications only, or including all existing applications. | ||||
| 2.2. R2 Guarantee of NAT traversal | 2.2. R2 Simplify ALG during NAT traversal | |||
| The referral (entity A) need to inform entity B how to reach entity C | There are middle boxes, like firewalls and translators, exist in the | |||
| with NAT traversal, if there is a NAT between B and C. This can | mobile network, which cause applications need to do translations, | |||
| reduce the cost of NAT ALG. | especially ALG. The cost of translation functions included ALG is | |||
| huge for the mobile operator in terms of implementation, performance. | ||||
| Standard referral could simplify ALG implementation during NAT | ||||
| traversal in the mobile network. | ||||
| 2.3. R3 Network inspection consideration | ||||
| Operators sometimes need to inspect information or details during | ||||
| communication for administration motivations. If referral format is | ||||
| standardized, it is easy for operator to capture and investigate the | ||||
| communication information they required. | ||||
| 3. Security Considerations | 3. Security Considerations | |||
| This document describes the motivation and requirements for a host | This document does not create any new security considerations. | |||
| based translation solution and does not create any new security | ||||
| considerations. | ||||
| 4. IANA Considerations | 4. IANA Considerations | |||
| This document does not require any IANA actions. | This document does not require any IANA actions. | |||
| 5. Normative References | 5. Normative References | |||
| [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | |||
| Requirement Levels", BCP 14, RFC 2119, March 1997. | Requirement Levels", BCP 14, RFC 2119, March 1997. | |||
| End of changes. 8 change blocks. | ||||
| 13 lines changed or deleted | 25 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||