| < draft-clausen-nemo-ro-problem-statement-00.txt | draft-clausen-nemo-ro-problem-statement-01.txt > | |||
|---|---|---|---|---|
| INTERNET-DRAFT Thomas Clausen | ||||
| IETF NEMO Working Group Emmanuel Baccelli | (MA)NEMO E. Baccelli | |||
| Expiration: 15 April 2005 LIX, Ecole Polytechnique, France | Internet-Draft INRIA | |||
| Ryuji Wakikawa | Expires: September 6, 2007 T. Clausen | |||
| Keio University/WIDE | LIX, Ecole Polytechnique, France | |||
| 15 October 2004 | R. Wakikawa | |||
| Keio University, WIDE | ||||
| March 5, 2007 | ||||
| NEMO Route Optimisation Problem Statement | NEMO Route Optimisation Problem Statement | |||
| draft-clausen-nemo-ro-problem-statement-00.txt | draft-clausen-nemo-ro-problem-statement-01 | |||
| Status of this Memo | Status of this Memo | |||
| This document is a submission to the Network Mobility Working Group | By submitting this Internet-Draft, each author represents that any | |||
| of the Internet Engineering Task Force (IETF). Comments should be | applicable patent or other IPR claims of which he or she is aware | |||
| submitted to the nemo@ietf.org mailing list. | have been or will be disclosed, and any of which he or she becomes | |||
| aware will be disclosed, in accordance with Section 6 of BCP 79. | ||||
| Distribution of this memo is unlimited. | ||||
| By submitting this Internet-Draft, I certify that any applicable | ||||
| patent or other IPR claims of which I am aware have been disclosed, | ||||
| or will be disclosed, and any of which I become aware will be | ||||
| disclosed, in accordance with RFC 3668. | ||||
| This document is an Internet-Draft and is in full conformance with | ||||
| all provisions of Section 10 of RFC 2026. | ||||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF), its areas, and its working groups. Note that other | Task Force (IETF), its areas, and its working groups. Note that | |||
| groups may also distribute working documents as Internet-Drafts. | other groups may also distribute working documents as Internet- | |||
| Drafts. | ||||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| The list of current Internet-Drafts can be accessed at | The list of current Internet-Drafts can be accessed at | |||
| http://www.ietf.org/ietf/1id-abstracts.txt | http://www.ietf.org/ietf/1id-abstracts.txt. | |||
| The list of Internet-Draft Shadow Directories can be accessed at | The list of Internet-Draft Shadow Directories can be accessed at | |||
| http://www.ietf.org/shadow.html. | http://www.ietf.org/shadow.html. | |||
| Abstract | This Internet-Draft will expire on September 6, 2007. | |||
| The NEMO working group has developed a protocol suite, extending the | Copyright Notice | |||
| notion of edge-mobility on the Internet to include that of network | ||||
| mobility. This implies that a set of nodes, along with their mobile | ||||
| router, change their point of attachment and that traffic to these | ||||
| nodes is tunneled to be delivered through their new point of | ||||
| attachment. This mechanism is transparent to applications in that | ||||
| existing traffic to a node is being encapsulated and tunneled, | ||||
| regardless of where the network containing the destination node is | ||||
| attached. | ||||
| The NEMO specification is not limited to a single level of mobile | Copyright (C) The IETF Trust (2007). | |||
| networks, attaching to the stationary Internet. Rather, arbitrary | ||||
| levels of nested mobile networks are supported, employing for each | ||||
| level of nesting the same encapsulation and tunneling mechanisms. | ||||
| With arbitrarily deep nested mobile networks, the overhead incurred | Abstract | |||
| through tunneling and encapsulation of data traffic can, however, | ||||
| become large. As a consequence, a number of different proposals | ||||
| exist, which aim at performing "route optimization" for nested mobile | ||||
| networks. | ||||
| This document aims at describing the different scenarios in which | The NEMO basic support specification is not limited to a single level | |||
| route-optimization is desired, as well as the different proposed | of mobile networks attaching to the stationary Internet. Rather, | |||
| solutions for achieving route-optimization in nested mobile networks. | arbitrary levels of nested mobile networks are supported, employing | |||
| for each level of nesting the same attachment, encapsulation and | ||||
| tunnelling mechanisms. With arbitrarily deep nested mobile networks, | ||||
| paths taken by data traffic can be extremely sub-optimal both inside | ||||
| the nested topology through successive mobile routers, and outside | ||||
| the nested topology, through successive Home Agents over the | ||||
| Internet. Moreover, the overhead incurred through tunnelling and | ||||
| encapsulation of data traffic can become prohibitively large. This | ||||
| document analyses the scenarios in which these problems are | ||||
| particularly acute. | ||||
| Table of Contents | Table of Contents | |||
| 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . 4 | 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
| 1.1. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . 4 | 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 4 | |||
| 1.2. Applicability . . . . . . . . . . . . . . . . . . . . . . . . . 4 | 3. Deployment Scenarios . . . . . . . . . . . . . . . . . . . . . 5 | |||
| 2. Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 | 3.1. Internet - Nested NEMO Communication . . . . . . . . . . . 5 | |||
| 2.1. NEMO-to-NEMO . . . . . . . . . . . . . . . . . . . . . . . . . 5 | 3.2. Intra Nested NEMO Communication . . . . . . . . . . . . . 6 | |||
| 2.2. Internet-to-NEMO . . . . . . . . . . . . . . . . . . . . . . . 6 | 3.3. RFC3963 Loops . . . . . . . . . . . . . . . . . . . . . . 7 | |||
| 3. Solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 | 4. Problem Statement . . . . . . . . . . . . . . . . . . . . . . 8 | |||
| 3.1. NEMO-to-NEMO . . . . . . . . . . . . . . . . . . . . . . . . . 8 | 4.1. Lack of Nested Topology State Information . . . . . . . . 8 | |||
| 3.1.1. Route Optimization Mechanisms Within Nested NEMO . . . . . . 9 | 4.2. Goals of Route Optimization for Nested NEMO networks . . . 9 | |||
| 3.1.2. Ad-hoc Network of Mobile Routers . . . . . . . . . . . . . . 9 | 4.3. Solution Guidelines . . . . . . . . . . . . . . . . . . . 9 | |||
| 3.2. Internet-to-NEMO . . . . . . . . . . . . . . . . . . . . . . . 11 | 5. Security Considerations . . . . . . . . . . . . . . . . . . . 11 | |||
| 3.2.1. Route Optimization Mechanisms Initiated by MR or MNN . . . . 11 | 6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 12 | |||
| 3.2.2. Route Optimization Initiated by a Non-Mobile Router . . . . . 12 | 7. References . . . . . . . . . . . . . . . . . . . . . . . . . . 13 | |||
| 4. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . . 12 | Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 14 | |||
| 5. Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 12 | Intellectual Property and Copyright Statements . . . . . . . . . . 15 | |||
| 6. References . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 | ||||
| 7. Changes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 | ||||
| 8. IANA Considerations . . . . . . . . . . . . . . . . . . . . . . . 14 | ||||
| 9. Security Considerations . . . . . . . . . . . . . . . . . . . . . 14 | ||||
| 10. Copyright . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 | ||||
| 1. Introduction | 1. Introduction | |||
| The NEMO protocol suite extends Mobile IP in enabling a set of nodes, | The NEMO basic support specification [1] extends the notion of edge- | |||
| along with their mobile router, to change their point of attachment | mobility on the Internet to include that of network mobility. This | |||
| to the Internet. NEMO enables the traffic to these nodes to be tun- | implies that a set of nodes, along with their mobile router, change | |||
| neled for delivery through their new point of attachment. The use of | their point of attachment and that traffic to these nodes is | |||
| tunneling makes this mechanism transparent to applications, wherever | tunnelled to be delivered through their new point of attachment. | |||
| the new point of attachement, even in case of several layers of | This mechanism is transparent to applications in that existing | |||
| nested mobility (i.e. mobile nodes, or mobile routers, indirectly | traffic to a node is being encapsulated and tunnelled, regardless of | |||
| accessing the Internet through other mobile routers). | where the network containing the destination node is attached. | |||
| However, this approach is not without a certain cost: with arbitrar- | The NEMO basic support specification is furthermore not limited to a | |||
| ily deep nested mobile networks, the overhead due to tunneling, dog- | single level of mobile networks attaching to the stationary Internet. | |||
| leg routing and encapsulation of data traffic can become large. A | Rather, arbitrary levels of nested mobile networks are supported, | |||
| number of different solutions have been proposed in order to optimize | employing for each level of nesting the same transparent mechanisms | |||
| this routing in some of these cases. | relying on attachment, encapsulation and tunnelling. | |||
| A review of some of these solutions is provided in this document, as | However, with arbitrarily deep nested mobile networks, paths taken by | |||
| well as the discussion of which cases and to what extent route opti- | data traffic can become extremely sub-optimal both (i) inside the | |||
| mization is desireable with NEMO. | nested topology through successive mobile routers, and (ii) outside | |||
| the nested topology, through successive Home Agents over the | ||||
| Internet. Moreover, the overhead incurred through tunnelling and | ||||
| encapsulation of data traffic can become prohibitively large. | ||||
| 1.1. Terminology | This document describes cases where problems due to sub-optimal data | |||
| traffic paths and encapsulation overhead are acute, providing a | ||||
| discussion of which cases and to what extent route optimisation is | ||||
| desirable with NEMO. | ||||
| 2. Terminology | ||||
| The keywords "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | The keywords "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | |||
| "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | |||
| document are to be interpreted as described in RFC2119 [5]. | document are to be interpreted as described in RFC2119 [5]. | |||
| It is assumed that readers are familiar with NEMO terminology as | It is moreover assumed that readers are familiar with NEMO | |||
| described and employed in [1] and [8]. | terminology as described and employed in [1] and [2]. | |||
| 1.2. Applicability | ||||
| This document aims at discussing scenarios where route optimization | ||||
| is desirable in a NEMO environment, and what level of route optimiza- | ||||
| tion is desired in those cases. A review of some existing solutions | ||||
| and ideas is thereby provided. | ||||
| 2. Scenarios | ||||
| At least two distinct scenarios exist, where route optimization is | 3. Deployment Scenarios | |||
| desireable. Those are, respectively, when a node in a NEMO network | ||||
| wishes to communicate with a node in another NEMO network which is | ||||
| part of the same nesting, and when a node from the Internet wishes to | ||||
| communicate with a node in a nested NEMO network. | ||||
| While the scenarios may have commonalities, their possible solution- | Two categories of scenarios exist, where route optimisation is | |||
| space differs and they are therefore described seperately below. | desirable. Those are, respectively: (i) when a host from the | |||
| Internet wishes to communicate with a host in a nested NEMO, and (ii) | ||||
| when a host in a nested NEMO wishes to communicate with a host in | ||||
| another nested NEMO which is part of the same nested NEMO topology. | ||||
| Some of these issues are also elaborated in [4]. | ||||
| 2.1. NEMO-to-NEMO | 3.1. Internet - Nested NEMO Communication | |||
| In this scenario, a number of NEMO networks are nested to one | In this category of scenario, a number of NEMO networks are nested to | |||
| another, and nodes in the different NEMO networks are communicating | one another, and a host in the Internet wishes to communicate with a | |||
| with one another. For the purpose of this scenario description, refer | host in one of the NEMO networks. For the purpose of describing this | |||
| to the schematics below: | scenario, the example depicted in Fig. 1 below is considered. | |||
| ---------- ---------- ---------- | ---------- ---------- ---------- ---------- | |||
| | | | | | | | | | | | | | | | | |||
| | NEMO 1 |--| NEMO 2 |--| NEMO 3 |--Internet | | NEMO 1 |--| NEMO 2 |--| NEMO 3 |--Internet--| Host 1 | | |||
| | | | | | | | | | | | | | | | | | | |||
| ---------- ---------- ---------- | | ---------- ---------- ---------- | ---------- | |||
| | ---------- | | ---------- | |||
| ---------- | | | | ---------- | | | | |||
| | | |----| HA 2 | | | | |----| HA 2 | | |||
| | HA 1 |---------| | | | | HA 1 |---------| | | | |||
| | | | ---------- | | | | ---------- | |||
| ---------- | | ---------- | | |||
| ---------- | ---------- | |||
| | | | | | | |||
| | HA 3 | | | HA 3 | | |||
| | | | | | | |||
| ---------- | ---------- | |||
| Figure 1: Nested NEMO networks -- NEMO-to-NEMO communication | Figure 1: Nested NEMO networks -- Internet-to-NEMO communication | |||
| We assume that each box labeled "NEMO x" refers to a Mobile Router | We assume that each box labelled "NEMO x" refers to a Mobile Router | |||
| (MR), running the NEMO protocol, as well as the nodes attached to | (MR), running the NEMO protocol, as well as the hosts attached to | |||
| that mobile router. We further assume, that each line indicates a | that mobile router. We further assume, that each line indicates a | |||
| direct connection between routers -- i.e. the mobile router in "NEMO | direct connection between routers -- i.e. the mobile router in "NEMO | |||
| 1" has a direct connection to the mobile router in "NEMO 2". Each box | 1" has a direct connection to the mobile router in "NEMO 2". Each | |||
| labeled "HA x" refers to the Home Agent for the NEMO network x -- | box labelled "HA x" refers to the Home Agent for the NEMO network x | |||
| i.e. that HA 1 is the Home Agent for the mobile network NEMO 1. | -- i.e. that HA 1 is the Home Agent for the mobile network NEMO 1. | |||
| If a node from NEMO 3 wishes to communicate with a node from "NEMO | The host labelled "Host 1" wishes to communicate with a host in NEMO | |||
| 1", then the data traffic would first be sent to the Home Agent of | 1. Data traffic will first be routed through HA 1 the Home Agent of | |||
| NEMO 1 -- i.e. to HA 1. At HA 1, a binding would exist, identifying | NEMO 1. At HA 1, a binding would exist, identifying NEMO 1 as being | |||
| NEMO 1 as being attached to the network of NEMO 2. Thus, the traffic | attached to the network of NEMO 2. Thus, the traffic would be | |||
| would be encapsulated, and sent to the HA of NEMO 2, i.e. HA 2. At HA | encapsulated, and sent to the HA of NEMO 2, i.e. HA 2. At HA 2, a | |||
| 2, a binding would exist, identifying that, indeed, NEMO 2 is | binding would exist, identifying that, indeed, NEMO 2 is attached to | |||
| attached to the network of NEMO 3. Another encapsulation would | the network of NEMO 3. Another encapsulation would ensure, and the | |||
| ensure, and the traffic sent to HA 3. At HA 3, a binding would | traffic sent to HA 3. At HA 3, a binding would identify the point of | |||
| identify the point of attachment of NEMO 3 to the internet, and the | attachment of NEMO 3 to the internet, and the data traffic would be | |||
| data traffic would be encapsulated one final time prior to being | encapsulated one final time prior to being delivered to NEMO 3 -- | |||
| delivered to NEMO 3 -- where decapsulation and handoff to NEMO 2, | where decapsulation and handoff to NEMO 2, then NEMO 1 occurs. | |||
| then NEMO 1 occurs. | ||||
| In this scenario, short path between NEMO 1 and NEMO 3, without | This simple example scenario therefore involves communication with | |||
| transversing the Internet and HA1-3, exists, however is not used in | (i) triple encapsulation of the data, and (ii) its transmission via 3 | |||
| the current NEMO specification. | arbitrary locations across the Internet. More generally, if instead | |||
| of a depth 3 the nested NEMO structure had a depth N, the | ||||
| communication would involve worst case N levels of encapsulation of | ||||
| the data, and its transmission via N arbitrary locations across the | ||||
| Internet. This is thus very sub-optimal communication across the | ||||
| Internet ([3]. | ||||
| More generally, assume a set of NEMO networks forming a connected | 3.2. Intra Nested NEMO Communication | |||
| network via their mobile routers without transversing the Internet. | ||||
| For communication between nodes in these NEMO networks, a solution | ||||
| should exist, which provides routes between the nodes without | ||||
| transversing the Internet and without incuring excessive nested | ||||
| encapsulations. | ||||
| 2.2. Internet-to-NEMO | In this category of scenario, a number of NEMO networks are nested to | |||
| one another, and hosts in the different nested NEMOs are | ||||
| communicating with one another. For the purpose of describing this | ||||
| scenario, the example depicted in Fig. 2 below is considered. | ||||
| In this scenario, a number of NEMO networks are nested to one | ---------- ---------- ---------- | |||
| another, and a node in the Internet wishes to communicate to a node | | | | | | | | |||
| in one of the NEMO networks. For the purpose of this scenario | | NEMO 1 |--| NEMO 2 |--| NEMO 3 |--Internet | |||
| description, refer to the schematics below: | | | | | | | | | |||
| ---------- ---------- ---------- | | ||||
| | ---------- | ||||
| ---------- | | | | ||||
| | | |----| HA 2 | | ||||
| | HA 1 |---------| | | | ||||
| | | | ---------- | ||||
| ---------- | | ||||
| ---------- | ||||
| | | | ||||
| | HA 3 | | ||||
| | | | ||||
| ---------- | ||||
| ---------- ---------- ---------- ---------- | Fig. 2: Nested NEMO networks -- NEMO-to-NEMO communication | |||
| | | | | | | | | | ||||
| | NEMO 1 |--| NEMO 2 |--| NEMO 3 |--Internet--| Node 1 | | ||||
| | | | | | | | | | | ||||
| ---------- ---------- ---------- | ---------- | ||||
| | ---------- | ||||
| ---------- | | | | ||||
| | | |----| HA 2 | | ||||
| | HA 1 |---------| | | | ||||
| | | | ---------- | ||||
| ---------- | | ||||
| ---------- | ||||
| | | | ||||
| | HA 3 | | ||||
| | | | ||||
| ---------- | ||||
| Figure 2: Nested NEMO networks -- Internet-to-NEMO communication | If a host from NEMO 3 wishes to communicate with a host from NEMO 1, | |||
| then the data traffic would first be sent out the nested NEMO | ||||
| network, over the Internet to HA 1. The data traffic would then be | ||||
| encapsulated and tunnelled to HA 2, which will in turn add another | ||||
| layer of encapsulation and tunnel the traffic to HA3 which will do | ||||
| the same before the data returns to our nested NEMO network. | ||||
| Successive decapsulation and transmission via NEMO 3, NEMO 2 and NEMO | ||||
| 1 will then happen before data is delivered to the destination. | ||||
| The node labeled "Node 1" wishes to communicate with a node in NEMO | Again, this simple example scenario involves communication with (i) | |||
| 1. Similarly to the previous scenario, this will happen through con- | triple encapsulation of the data, and (ii) its transmission via 3 | |||
| necting to HA 1, then encapsulation and tunneling data to HA 2 and | arbitrary locations across the Internet. And again, more generally, | |||
| HA3 before the data arrives at the edge of our nested NEMO network. | if instead of a depth 3 the nested NEMO structure had a depth N, the | |||
| communication would involve N levels of encapsulation of the data, | ||||
| and its transmission via N arbitrary locations across the Internet. | ||||
| This is therefore very sub-optimal communication across the Internet, | ||||
| as communication inside the nested NEMO network should be sufficient. | ||||
| Only then can decapsulation and transmission via NEMO 3, NEMO 2 and | 3.3. RFC3963 Loops | |||
| NEMO 1 happen. | ||||
| In this scenario, while no direct link exists between Node 1 and the | [1] allows for NEMO mobile routers to nest to one another, however | |||
| node in NEMO 1, triple encapsulation and transmission via HA1-3 | does not stipulate how to form the links of the nest. In particular, | |||
| occurs. | [1] allows for, as is illustrated in the following Fig. 3, NEMO 1 to | |||
| select NEMO 2 as its point of attachment, with NEMO 2 selecting NEMO | ||||
| 3 as point of attachment and NEMO 3 selecting NEMO 1 - thereby | ||||
| forming a loop. Absent other mechanisms, this loop will persist, | ||||
| potentially disconnecting both NEMO 1, NEMO 2 and NEMO 3 from the | ||||
| wider network, from the Internet, and - if traffic between NEMO nodes | ||||
| is tunnelled through HAs, also from each other. [1] does not provide | ||||
| functionality allowing to detect this loop: a MR cannot know whether | ||||
| it connects to a mobile network or a general IPv6 network. | ||||
| More generally, a path between a node in the Internet and the edge of | ---------- ---------- | |||
| the nested NEMO networks exists, which does not necessarilly involve | | |--| | | |||
| any of the Home Agents for the NEMO networks. For such communication, | | NEMO 1 | | NEMO 2 | | |||
| a solution should exist which avoids nested encapsulations (i.e. | | | | | | |||
| allows data to be encapsulated only once, in order to arrive at the | ---------- ---------- | |||
| edge of the nested NEMO networks), and which does not force a path | | | | |||
| which involves all the Home Agents of the nested NEMO networks on the | ---------- | |||
| path to the destination. | | | | |||
| | NEMO 3 | | ||||
| | | | ||||
| ---------- | ||||
| In addition, nested encapsulation brings a limitation to the number | Fig. 3: Loop in Nested NEMO networks | |||
| of nested levels, due to MTU size. For example, the current NEMO | ||||
| basic support specification does not allow a level higher than 40 in | ||||
| nesting in NEMO (with usual MTU = 1500 bytes), due to the size of the | ||||
| 40 IPv6 headers, i.e. 40 bytes x 40 > MTU. In this case IP fragmen- | ||||
| tation does not help, since the total size of IPv6 headers exceeds | ||||
| the MTU. Thus, the avoidance of nested encapsulations also eliminates | ||||
| the limitation on the level of nesting in NEMO. | ||||
| 3. Solutions | 4. Problem Statement | |||
| Common for the scenarios from the previous section is, that the | Encapsulation and tunnelling specified by NEMO basic support [1] are | |||
| encapsulation and tunneling is due to the facts that: | governed by the following principles: | |||
| - the node which originates data traffic does not know where the | 1. A router which forwards data traffic does not know where the | |||
| destination node is located and therefore assumes that the | destination is located and therefore assumes that it is at its | |||
| node is at its Home Network; | Home Network; | |||
| - no router knows the full path to the destination, which in | 2. A Home Agent does not know if a NEMO is directly or indirectly | |||
| particular means that: | bound to the Internet, which in particular means that: | |||
| - no router knows the topology of the nested NEMO network(s). | 3. No router knows the topology of the nested NEMO network(s). | |||
| As a concequence, each logical hop (from source to Home Agent of des- | While these principles are functional, they have the consequences | |||
| tination, or from Home Agent to Home Agent of the nested NEMO net- | that are described in the following. | |||
| works) adds layers of encapsulation, until the point of attachment | ||||
| between the Internet and the NEMO edge, the Access Router (AR) is | ||||
| reached. | ||||
| Concequently, if the source node, or any intermediate node, had addi- | 4.1. Lack of Nested Topology State Information | |||
| tional information about the network topology, more beneficial | ||||
| tunnels could be created, and less encapsulation would be required. | ||||
| For example if, in figure 2 above, Node 1 knew directly that the | The lack of state information about the nested NEMO topology and its | |||
| gateway from the Internet to "the network where nodes from NEMO 1 are | point(s) of attachment to the Internet causes routing to involve | |||
| attached" was the Access Router of NEMO 3, and if the mobile router | logical hops (from source to Home Agent of destination, or from Home | |||
| in NEMO 3 knew the topology of the nested NEMO network, a tunnel | Agent to Home Agent), each of those adding a layer of encapsulation | |||
| could be directly created from Node 1 to NEMO 3, with assurance that | and a detour across the Internet, until a point of attachment between | |||
| the mobile router in NEMO 3 would be able to route data packets cor- | the Internet and the nested NEMO network is reached. | |||
| rectly to the destination. | ||||
| 3.1. NEMO-to-NEMO | This lack causes extreme data paths sub-optimality and extreme data | |||
| encapsulation overhead in cases where the nested topology is of depth | ||||
| greater than 2, as depicted in Section 3.2 and Section 3.1. | ||||
| The NEMO-to-NEMO problem, as described in section 2.1, is one of how | The following items summarise the problems incurring from lack of | |||
| to avoid transversing the Internet in order to communicate between | nested topology state information: | |||
| two nodes which are part of the same nested NEMO network. More gener- | ||||
| ally, this can be expressed as "how traffic is routed within the NEMO | ||||
| network". | ||||
| NEMO basic support [1] specifies that traffic be routed via Home | Internet Route Suboptimality - where traffic from the internet | |||
| Agents, indicating an assumption of limited depth of nested networks | transverses more than one HA, incurring both route sub-optimality | |||
| and traffic patterns being predominantly traffic of the Internet-to- | and nested encapsulation; | |||
| NEMO type. Each mobile router in a NEMO network knows only of its | ||||
| attachments, i.e. its access router and the nodes within its own | ||||
| mobile network. A mobile router in NEMO does not know about any nest- | ||||
| ings, i.e. it does not know the topology of the nested NEMO network | ||||
| -- and as such, can only provide routes to the Home Agents on the | ||||
| Internet. | ||||
| In order to avoid the scenario described in section 2.1, where data | Intra-NEMO Route Suboptimality - where traffic between hosts in the | |||
| packets for delivery within the nested NEMO network are routed | nested NEMO network is forced through the Internet gateway and | |||
| through the Internet and the nested networks Home Agents, when a more | subsequently through one or more HAs, incurring both route sub- | |||
| localized aproach would have been possible, additional state can be | optimality and nested encapsulation; | |||
| maintained in the nested NEMO networks. A number of approaches for | ||||
| maintaining state in mobile routers and/or Home Agents of mobile net- | ||||
| works have been discussed, including [3], [4], [9], [10], [11], [12], | ||||
| [13], in which techniques such as route caching are discussed. These | ||||
| techniques can be deployed in Home Agents, in routers, specifically | ||||
| designated as aggregation points for NEMO tunnels, as well as within | ||||
| the mobile routers in order to optimize routes within a nested NEMO | ||||
| network. This is detailed in section 3.1.1. | ||||
| Essentially, however, the issue of route optimization within a nested | Intra-NEMO loops - where, due to unfortunate selection of which MR | |||
| NEMO network is one of routing: maintaining state in each mobile | is attaching to which MR, loops occur. | |||
| router such that an intelligent forwarding decision can be made. | ||||
| I.e., if the destination can be detected to be "local" to the nest of | ||||
| NEMO networks, a route to the destination can be constructed directly | ||||
| through the NEMO mobile routers without passing through the Home | ||||
| Agents. Alternatively, if the destination is not local, data are | ||||
| routed to the Home Agent, where basic NEMO tunneling and encapsula- | ||||
| tion take effect. Deploying a routing protocol for maintaining suffi- | ||||
| cient state in the nodes in the nested NEMO network is detailed in | ||||
| section 3.1.2. | ||||
| 3.1.1. Route Optimization Mechanisms Within Nested NEMO | 4.2. Goals of Route Optimization for Nested NEMO networks | |||
| Some approaches have been proposed to tackle the problem of route | The goal of route optimisation for nested NEMO is to alleviate the | |||
| optimization inside nested NEMO networks. For instance, Nested NEMO | problems regarding (i) Internet route sub-optimality, (ii) Intra-NEMO | |||
| Tree Discovery [4] offers a mechanism that aims at avoiding routing | route sub-optimality, and (iii) Intra-NEMO loops. Additional | |||
| loops by organizing and maintaining a tree structure within the net- | information about the nested topology must be available to Mobile | |||
| work of nested NEMOs, the root being the Access Router or the Mobile | Routers and/or Home agents, which: | |||
| Router directly connected to the Access Router (the Top Level Mobile | ||||
| Router). | ||||
| Source routing is also proposed to be used in this environment. | o may serve to allow NEMO MRs to detect and alleviate loops or to | |||
| Approaches like RRH [12] use the recording of the sequences of tra- | prevent such from occurring in the first place. Specifically, | |||
| versed Mobile Routers on the way out of the nested NEMO network (to | this allows a NEMO MR to ensure that a loop-free path to the | |||
| the Internet, say, to bind) in order to forward traffic efficiently | Internet Gateway exists; | |||
| in the nested NEMO network. | ||||
| On the other hand, approaches like ORC (Optimized Route Cache Proto- | o may serve to establish and maintain an intra-NEMO routing mesh, | |||
| col [3]) could be adapted to serve the purpose of insuring some level | allowing to bypass the Internet Gateway and HAs for intra-NEMO | |||
| of optimized routing inside nested NEMO networks. Some router, say | communications; | |||
| the top level mobile router, could be configured to play a role simi- | ||||
| lar to a correspondent router, organizing the forwarding of packets | ||||
| inside the nested NEMO network. This special router could be dynami- | ||||
| cally discovered inside the nested NEMO network. | ||||
| A more general form of this mechanism would be to have each MR in the | o may serve to bypass dog-leg routing in communications from sources | |||
| nested NEMO network possess this extended information about the | on the Internet to a mobile node in the nested NEMO network. | |||
| nested NEMO network. This does then, de-facto, become a situation | ||||
| where each MR knows the entire topology of the nested NEMO network, | ||||
| and will be able to act in the capacity of router for such traffic. | ||||
| This generalized mechanism is described in more details in section | ||||
| 3.1.2. | ||||
| 3.1.2. Ad-hoc Network of Mobile Routers | 4.3. Solution Guidelines | |||
| A NEMO network consists of a mobile router, to which a set of nodes | A solution to the NEMO Route Optimisation problem will: | |||
| are (statically) attached. The mobile router communicates with (i.e. | ||||
| has direct links with) other mobile routers, and possibly with the | ||||
| Internet at large. As such, a NEMO network is not much different from | ||||
| any other network. What makes NEMO networks different from other net- | ||||
| works is, that they may change their point of attachment at will -- | ||||
| i.e. the topology formed by NEMO mobile routers is dynamic. | ||||
| Thus, in order to provide routes between any two nodes in the nested | o provide a mechanism whereby each MR has sufficient topological | |||
| NEMO network, a mechanism must be in place which ensures that the | awareness such that it may select the router(s) to which it | |||
| dynamic topology of the nested NEMO network can be accurately tracked | attaches such that routing loops are avoided; | |||
| and used for routing table calculations. | ||||
| The IETF MANET working group has been developing routing protocols | o provide a mechanism whereby each MR has sufficient topological | |||
| for dynamic ad-hoc networks, such as OLSR [2] and AODV [6] (both | awareness such that it may select a suitable path towards the | |||
| RFC), with the characteristics that the developed protocols should be | Internet Gateway for communication towards the Internet and - in | |||
| light-weight, able to react to rapid topology changes and limit the | particular - towards its HA; | |||
| signalling overhead. An approach to route optimization within the | ||||
| NEMO-to-NEMO scenario could therefore be to consider the mobile | ||||
| routers of the nested NEMO networks as nodes in an ad-hoc network, | ||||
| and run an ad-hoc routing protocol to ensure that each mobile router | ||||
| would be able to determine if data could be locally (i.e. within the | ||||
| nested NEMO network) delivered, or had to be tunneled back to the | ||||
| Home Agent. | ||||
| OLSR [2], for example, provides light-weight OSPF-like [7] routing | o provide a mechanism whereby each Internet Gateway has sufficient | |||
| functionality. This includes efficient maintenance of the topology | topological awareness such that it may select a suitable path | |||
| spanned by the links between the mobile routers in the face of net- | towards each MR in the nested NEMO network for which it is | |||
| work dynamics, as well as the ability for a mobile router to adver- | providing Internet access; | |||
| tize associated nodes which do not run the OLSR routing protocol | ||||
| (e.g. nodes associated to a mobile router, which are not themself | ||||
| mobile routers). It is also possible for Mobile Network Nodes to | ||||
| obtain global connectivity, as described in [16]. | ||||
| Employing a protocol such as OLSR among the mobile routers in a | o provide a mechanism whereby each MR has sufficient topological | |||
| nested NEMO network would yield the ability for any mobile router to | awareness such that it may select a suitable path towards another | |||
| determine if a destination can be reached through a path local to the | MR within the NEMO without transversing the Internet Gateway; | |||
| nested NEMO network, or if forwarding to the Home Agent is required. | ||||
| Additionally, this would also ease the Internet-to-NEMO scenario. In | ||||
| order to deliver an IP datagram to a node in the nested NEMO network, | ||||
| only a path to the access router between the nested NEMO network and | ||||
| the Internet would be required: once an IP datagram arrives in the | ||||
| nested NEMO network, the routing tables in the mobile routers, as | ||||
| provided by OLSR, would allow direct routing to the destination. | ||||
| Thus, there would no longer be a requirement to do nested encapsula- | ||||
| tion on each logical hop (i.e. each transversal of a Home Agent) in | ||||
| order to be able to decapsulate and correctly forward IP datagrams in | ||||
| the nested NEMO network. | ||||
| Thus even if no route optimizations are performed in the Internet-to- | o provide a mechanism whereby each MR has sufficient topological | |||
| NEMO scenario, an overhead reduction can still be achieved through | awareness such that it may provide suitable binding updates with | |||
| much lower encapsulation requirements. | its HA. A particular case of this is if the MR can provide | |||
| binding updates such that multiple encapsulations and sub-optimal | ||||
| routes on the Internet can be avoided when a MR is connected to | ||||
| the Internet Gateway through multiple intermediate MRs in the NEMO | ||||
| nest. | ||||
| 3.2. Internet-to-NEMO | Mechanisms developed for maintaining and using such information must | |||
| address the distributed, multi-hop nature of nested NEMO networks, | ||||
| and be able to follow topology and connectivity changes by updating | ||||
| state information in Mobile Routers and/or Home Agents accordingly. | ||||
| The goal here is, again, to avoid unnecessary encapsulation and dog- | Solutions must achieve their task while being conservative in their | |||
| leg routing. Indeed, it is desirable to avoid letting the level of | network resource consumption and while avoiding prohibitively long | |||
| nested mobility on the edges of the network dictating the number of | delays. | |||
| Home Agents (and therefore the amount of encapsulation) the packets | ||||
| have to go through. There should be a way to limit the level of tun- | ||||
| neling to only one encapsulation IP in IP, and at the same time, min- | ||||
| imize the traffic relayed by Home Agents. | ||||
| Existing solution to route optimization problems in NEMO therefore | 5. Security Considerations | |||
| aim at, basically, minimizing the required amount of tunneling in | ||||
| various nested mobility cases. They can be categorized as follows: | ||||
| - route optimization initiated by Mobile Routers (MR) or Mobile | This document does currently not specify security considerations. | |||
| Network Nodes (MNN); | ||||
| - route optimization initiated by intermediate non-mobile | 6. IANA Considerations | |||
| routers on the path to Corresponding Nodes. | ||||
| The following sub-sections briefly review these solutions. | This document does currently not specify IANA considerations. | |||
| 3.2.1. Route Optimization Mechanisms Initiated by MR or MNN | 7. References | |||
| In case of nested mobility (i.e. a mobile router attaches to another | [1] Devarapalli, V., Wakikawa, R., Petrescu, A., and P. Thubert, | |||
| mobile router, or a visiting mobile node attaches to a mobile | "Network Mobility (NEMO) Basic Support Protocol", RFC 3963, | |||
| router), several encapsulations will occur on top of each other, and | 2005. | |||
| a sub-optimal path will be used to reach the destination, going | ||||
| through each and every Home Agent. In order to slim this down, sev- | ||||
| eral nested tunnel optimizations have been discussed. | ||||
| The HMIP-like mechanisms suggested in [15] or the TLMR (Top Level | [2] Ernst, T. and H-Y. Lach, "Network Mobility Support Terminology", | |||
| Mobile Router [11]) approach use one or more Mobile Routers chosen | draft-ietf-nemo-terminology-06 (work in progress), 2006. | |||
| for their location (closest to the Access Router) to act as proxy for | ||||
| Mobile IP, and/or act as Home Agents for other mobile nodes inside | ||||
| the attached mobile networks, like proposed in [14]. Instead of | ||||
| adding another layer encapsulation, those TLMR switch between ingress | ||||
| and egress tunnels and can reduce the amount of binding. | ||||
| Similarily, ARO (Access Router Option [13]) proposes nested tunnel | [3] NG, C., Zhao, F., Watari, M., and P. Thubert, "Network Mobility | |||
| optimizations based on the registration of the top level Access | Route Optimization Solution Space Analysis", | |||
| Router of any nested NEMO to the Home Agent in order to bypass the | draft-ietf-nemo-ro-space-analysis-03 (work in progress), 2006. | |||
| HAs of all the MR on the way to the Access Router. | ||||
| On the other hand, source routing approaches like RRH (Reverse | [4] NG, C., Zhao, F., Watari, M., and P. Thubert, "Network Mobility | |||
| Routing Header [12]) or Path Control Header [9] use loose source | Route Optimization Problem Statement", | |||
| routing in order to avoid IP encapsulation. However, source routing | draft-ietf-nemo-ro-problem-statement-03 (work in progress), | |||
| is not always desirable, and might not be widely accepted. | 2006. | |||
| 3.2.2. Route Optimization Initiated by a Non-Mobile Router | [5] Bradner, S., "Key words for use in RFCs to Indicate Requirement | |||
| Levels", RFC 2119, 1997. | ||||
| Some approaches such as ORC (Optimized Route Cache Protocol [3]) or | Authors' Addresses | |||
| other proposals using so called Anchor Routers or Correspondent side | ||||
| routers (see [10] for further references), advocate the adding of new | ||||
| functionalities in some routers that are ideally chosen to be opti- | ||||
| mally placed with respect to traffic flows between ASs. Those routers | ||||
| intercept and terminate the tunneling on behalf of the Correspondent | ||||
| Node, therefore optimizing the route from then on. However, this is | ||||
| not easy to deploy, and the optimization is partial. | ||||
| 4. Acknowledgements | Emmanuel Baccelli | |||
| INRIA | ||||
| The authors would like to thank Hitachi Labs Europe for their support. | Phone: +33 1 69 33 55 11 | |||
| Email: Emmanuel.Baccelli@inria.fr | ||||
| 5. Authors' Addresses | Thomas Heide Clausen | |||
| LIX, Ecole Polytechnique, France | ||||
| Thomas Heide Clausen, | Phone: +33 6 6058 9349 | |||
| Project PCRI | ||||
| Pole Commun de Recherche en Informatique du plateau de Saclay, | ||||
| CNRS, Ecole Polytechnique, INRIA, Universite Paris Sud, | ||||
| Ecole polytechnique, | ||||
| Laboratoire d'informatique, | ||||
| 91128 Palaiseau Cedex, France | ||||
| Phone: +33 1 69 33 40 73, | ||||
| Email: T.Clausen@computer.org | Email: T.Clausen@computer.org | |||
| URI: http://www.lix.polytechnique.fr/Labo/Thomas.Clausen/ | ||||
| Emmanuel Baccelli | ||||
| HITACHI Labs Europe/ Project PCRI, | ||||
| Pole Commun de Recherche en Informatique du plateau de Saclay, | ||||
| CNRS, Ecole Polytechnique, INRIA, Universite Paris Sud, | ||||
| Ecole polytechnique, | ||||
| Laboratoire d'informatique, | ||||
| 91128 Palaiseau Cedex, France | ||||
| Phone: +33 1 69 33 40 73, | ||||
| Email: Emmanuel.Baccelli@inria.fr | ||||
| Ryuji Wakikawa | Ryuji Wakikawa | |||
| Keio University and WIDE | Keio University, WIDE | |||
| 5322 Endo Fujisawa Kanagawa | ||||
| 252 JAPAN | ||||
| Phone: +81-466-49-1394 | ||||
| EMail: ryuji@sfc.wide.ad.jp | ||||
| Fax: +81-466-49-1395 | ||||
| 6. References | ||||
| [1] V. Devarapalli, R. Wakikawa, A. Petrescu, and P. Thubert. Nemo | ||||
| Basic Support Protocol (work in progress). Internet Draft (draft- | ||||
| ietf-nemo-basic-support-02), Internet Engineering Task Force, | ||||
| December 2003. | ||||
| [2] T. Clausen, P. Jacquet, Optimized Link State Routing Protocol. | ||||
| Request for Comments (Experimental) 3626, October 2003. | ||||
| [3] R. Wakikawa, M. Watari. Optimized Route Cache Protocol (ORC) (work | ||||
| in progress). Internet Draft (draft-wakikawa-nemo-orc-00.txt), | ||||
| Internet Engineering Task Force, July 2004. | ||||
| [4] P. Thubert, N. Montavont. Nested Nemo Tree Discovery (work in | ||||
| progress). Internet Draft (draft-thubert-tree-discovery-00.txt), | ||||
| Internet Engineering Task Force, May 2004. | ||||
| [5] S. Bradner. Key words for use in RFCs to Indicate Requirement Lev- | ||||
| els. Request for Comments (Best Current Practice) 2119, Internet | ||||
| Engineering Task Force, March 1997. | ||||
| [6] C. Perkins, E. Belding-Royer, S. Das. Ad hoc On-Demand Distance Vec- | ||||
| tor (AODV) Routing, Request for Comments (Experimental) 3561, July | ||||
| 2003 | ||||
| [7] Moy, J., "OSPF Version 2", RFC 2328, April 1998. | ||||
| [8] T. Ernst, H-Y. Lach. Network Mobility Support Terminology (work in | ||||
| progress). Internet Draft (draft-ietf-nemo-terminology-01), Inter- | ||||
| net Engineering Task Force, February 2004. | ||||
| [9] Jongkeun Na et al. Route Optimization Scheme based on Path Control | ||||
| Header (work in progress). Internet Draft (draft-na-nemo-path-con- | ||||
| trol-header-00), Internet Engineering Task Force, April 2004. | ||||
| [10] P. Thubert et al. Taxonomy of Route Optimization models in the Nemo | ||||
| Context (work in progress). Internet Draft (draft-thubert-nemo-ro- | ||||
| taxonomy-02), Internet Engineering Task Force, February 2004. | ||||
| [11] H. Kang et al. Route Optimization for Mobile Network by Using Bi- | ||||
| directional Between Home Agent and Top Level Mobile Router (work in | ||||
| progress). Internet Draft (draft-hkang-nemo-ro-tlmr-00.txt), Inter- | ||||
| net Engineering Task Force, June 2003. | ||||
| [12] P. Thubert et al. IPv6 Reverse Routing Header and its application | ||||
| to Mobile Networks (work in progress). Internet Draft (draft-thu- | ||||
| bert-nemo-reverse-routing-header-05), Internet Engineering Task | ||||
| Force, June 2004. | ||||
| [13] C. Ng et al. Securing Nested Tunnels Optimization with Access | ||||
| Router Option (work in progress). Internet Draft (draft-ng-nemo- | ||||
| access-router-option-01), Internet Engineering Task Force, July | ||||
| 2004. | ||||
| [14] E. Perera et al. Extended Network Mobility Support (work in | Phone: +81-466-49-1394 | |||
| progress). Internet Draft (draft-perera-nemo-extended-00.txt), | Email: Ryuji@sfc.wide.ad.jp | |||
| Internet Engineering Task Force, July 2003. | ||||
| [15] H. Ohnishi et al. HMIP based Route Optimization Method in a Mobile | Full Copyright Statement | |||
| Network (work in progress). Internet Draft (draft-ohnishi-nemo-ro- | ||||
| hmip-00.txt), Internet Engineering Task Force, April 2003. | ||||
| [16] R. Wakikawa et al. Global Connectivity for IPv6 Mobile Ad Hoc Net- | Copyright (C) The IETF Trust (2007). | |||
| works (work in progress). Internet Draft (draft-wakikawa-manet- | ||||
| globalv6-03.txt), Internet Engineering Task Force, October 2003. | ||||
| 7. Changes | This document is subject to the rights, licenses and restrictions | |||
| contained in BCP 78, and except as set forth therein, the authors | ||||
| retain all their rights. | ||||
| This is the initial version of this specification. | This document and the information contained herein are provided on an | |||
| "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS | ||||
| OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND | ||||
| THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS | ||||
| OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF | ||||
| THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED | ||||
| WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. | ||||
| 8. IANA Considerations | Intellectual Property | |||
| This document does currently not specify IANA considerations. | The IETF takes no position regarding the validity or scope of any | |||
| Intellectual Property Rights or other rights that might be claimed to | ||||
| pertain to the implementation or use of the technology described in | ||||
| this document or the extent to which any license under such rights | ||||
| might or might not be available; nor does it represent that it has | ||||
| made any independent effort to identify any such rights. Information | ||||
| on the procedures with respect to rights in RFC documents can be | ||||
| found in BCP 78 and BCP 79. | ||||
| 9. Security Considerations | Copies of IPR disclosures made to the IETF Secretariat and any | |||
| assurances of licenses to be made available, or the result of an | ||||
| attempt made to obtain a general license or permission for the use of | ||||
| such proprietary rights by implementers or users of this | ||||
| specification can be obtained from the IETF on-line IPR repository at | ||||
| http://www.ietf.org/ipr. | ||||
| This document does not specify any security considerations. | The IETF invites any interested party to bring to its attention any | |||
| copyrights, patents or patent applications, or other proprietary | ||||
| rights that may cover technology that may be required to implement | ||||
| this standard. Please address the information to the IETF at | ||||
| ietf-ipr@ietf.org. | ||||
| 10. Copyright | Acknowledgment | |||
| Copyright (C) The Internet Society (2004). This document is subject | ||||
| to the rights, licenses and restrictions contained in BCP 78, and | ||||
| except as set forth therein, the authors retain all their rights. | ||||
| This document and the information contained herein are provided on an | Funding for the RFC Editor function is provided by the IETF | |||
| "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS | Administrative Support Activity (IASA). | |||
| OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET | ||||
| ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, | ||||
| INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFOR- | ||||
| MATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES | ||||
| OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. | ||||
| End of changes. 91 change blocks. | ||||
| 481 lines changed or deleted | 333 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||