< draft-thubert-nemo-ro-taxonomy-01.txt   draft-thubert-nemo-ro-taxonomy-02.txt >
Network Working Group P. Thubert Network Working Group P. Thubert
Internet-Draft M. Molteni Internet-Draft M. Molteni
Expires: December 2, 2003 Cisco Systems Expires: August 15, 2004 Cisco Systems
C. Ng C. Ng
Panasonic Singapore Labs Panasonic Singapore Labs
June 3, 2003 H. Ohnishi
NTT
E. Paik
Seoul National Univ.
February 15, 2004
Taxonomy of Route Optimization models in the Nemo Context Taxonomy of Route Optimization models in the Nemo Context
draft-thubert-nemo-ro-taxonomy-01 draft-thubert-nemo-ro-taxonomy-02
Status of this Memo Status of this Memo
This document is an Internet-Draft and is in full conformance with This document is an Internet-Draft and is in full conformance with
all provisions of Section 10 of RFC2026. all provisions of Section 10 of RFC2026.
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that Task Force (IETF), its areas, and its working groups. Note that other
other groups may also distribute working documents as Internet- groups may also distribute working documents as Internet-Drafts.
Drafts.
Internet-Drafts are draft documents valid for a maximum of six months Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at http:// The list of current Internet-Drafts can be accessed at http://
www.ietf.org/ietf/1id-abstracts.txt. www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html. http://www.ietf.org/shadow.html.
This Internet-Draft will expire on December 2, 2003. This Internet-Draft will expire on August 15, 2004.
Copyright Notice Copyright Notice
Copyright (C) The Internet Society (2003). All Rights Reserved. Copyright (C) The Internet Society (2004). All Rights Reserved.
Abstract Abstract
Nemo enables Mobile Networks by extending Mobile IP to support Mobile NEMO enables Mobile Networks by extending Mobile IP to support Mobile
Routers. This paper documents how the MIPv6 concept of Route Routers. This memo documents how the MIPv6 concept of Route
Optimization can to be adapted for Nemo to optimize: Optimization can to be adapted for NEMO to optimize traffic routing
between nodes in a mobile network and their correspodnet nodes.
Different route optimizations schemes are discussed, including:
1. the nested tunnels of the nested Nemo configuration 1. route optimization with corresponding nodes initiated bu mobile
routers on behalf of the mobile network nodes;
2. router-to-router in the infrastructure as opposed to end-to-end. 2. a visiting mobile node performing MIPv6 RO over the NEMO base
protocol;
and much more ... :) 3. performing RO over the routing infrastructure involving
optimizing the route between two routers situated near to each
end point, instead of end-to-end; and
4. minimizing the number of tunnels required when there is multiple
levels of nesting.
Table of Contents Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . 3 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Nested Mobile Network . . . . . . . . . . . . . . . . . . 3 2. MR-to-CN . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
2.1 Nested Tunnels Optimization . . . . . . . . . . . . . . . 3 3. MIPv6 Route Optimization over NEMO . . . . . . . . . . . . . . 4
2.1.1 Pitfalls and threats . . . . . . . . . . . . . . . . . . . 7 4. Optimization within the infrastructure . . . . . . . . . . . . 4
2.1.1.1 Securing the protocol . . . . . . . . . . . . . . . . . . 7 4.1 Route Optimization within a ISP network . . . . . . . . . . . 5
2.1.1.2 Recursive complexity . . . . . . . . . . . . . . . . . . . 7 4.2 Correspondent Router . . . . . . . . . . . . . . . . . . . . . 6
2.2 Route Optimization inside the Nested Mobile Network . . . 8 4.3 Distributed Anchor Routers . . . . . . . . . . . . . . . . . . 7
3. MR-to-CN . . . . . . . . . . . . . . . . . . . . . . . . . 9 5. Nested Mobile Network . . . . . . . . . . . . . . . . . . . . 8
4. MIPv6 Route Optimization over Nemo . . . . . . . . . . . . 9 5.1 Nested Tunnels Optimization . . . . . . . . . . . . . . . . . 8
5. Optimization within the infrastructure . . . . . . . . . . 9 5.2 Route Optimization inside the Nested Mobile Network . . . . . 12
5.1 Route Optimization within a ISP network . . . . . . . . . 10 6. General Considerations . . . . . . . . . . . . . . . . . . . . 12
5.2 Correspondent Router . . . . . . . . . . . . . . . . . . . 11 6.1 Securing the protocol in nested tunnels optimization . . . . . 12
5.3 Distributed Anchor Routers . . . . . . . . . . . . . . . . 12 6.2 Recursive complexity in route optimization . . . . . . . . . . 12
6. Conclusion . . . . . . . . . . . . . . . . . . . . . . . . 13 6.3 Mobile Access router selection . . . . . . . . . . . . . . . . 13
7. Acknowledgements . . . . . . . . . . . . . . . . . . . . . 13 6.4 Mobility transparency and RO . . . . . . . . . . . . . . . . . 14
References . . . . . . . . . . . . . . . . . . . . . . . . 14 6.5 Multihoming Considerations . . . . . . . . . . . . . . . . . . 15
Authors' Addresses . . . . . . . . . . . . . . . . . . . . 15 7. Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Full Copyright Statement . . . . . . . . . . . . . . . . . 16 8. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 15
References . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . 17
Intellectual Property and Copyright Statements . . . . . . . . 19
1. Introduction 1. Introduction
This document assumes the reader is familiar with Mobile IPv6 defined This document assumes the reader is familiar with Mobile IPv6 defined
in [1], with the concept of Mobile Router (MR) and with the Nemo in [1], with the concept of Mobile Router (MR) and with the Nemo
terminology defined in [2]. terminology defined in [2].
From the discussions on the mailing list, it appears that the common From the discussions on the mailing list, it appears that the common
current understanding of the problem space of Route Optimization current understanding of the problem space of Route Optimization
(RO), in the Nemo context, is still limited. (RO), in the Nemo context, is still limited.
This paper attempts to clarify the state of the discussion and This draft attempts to clarify the state of the discussion and
propose a taxonomy of the various aspects of the problem. We will propose a taxonomy of the various aspects of the problem. We will
look at different possible types of route optimizations related to look at different possible types of route optimizations related to
mobile network. mobile network.
Firstly, route optimizations involving nested mobile networks are Firstly, the Mobile Router can initiate route optimization with
explored. This involves minimizing the number of tunnels required
when there is multiple levels of nesting.
Secondly, the Mobile Router can initiate route optimization with
corresponding nodes (CN) on behalf of the mobile network nodes (MNN). corresponding nodes (CN) on behalf of the mobile network nodes (MNN).
Thirdly, we consider the feasibility of having a visiting mobile node Secondly, we consider the feasibility of having a visiting mobile
(VMN) performing MIPv6 RO over the NEMO base protocol. node (VMN) performing MIPv6 RO over the NEMO base protocol.
Lastly, we explore the prospect of performing RO over the routing Thirdly, we explore the prospect of performing RO over the routing
infrastructure. This involve optimizing the route between two infrastructure. This involves optimizing the route between two
routers situated near to each end point. routers situated near to each end point.
2. Nested Mobile Network Lastly, route optimizations involving nested mobile networks are
explored. This involves minimizing the number of tunnels required
when there is multiple levels of nesting.
2.1 Nested Tunnels Optimization 2. MR-to-CN
Let us illustrate the problem by an example. In this example, the This section covers the case where the Route Optimization is
nested Mobile Network has a tree topology. In the tree each node is performed between the MR and the correspondent nodes which mobile
a basic Mobile Network, represented by its MR. network nodes (MNNs) are communicating with. This scenario is useful
when a lot of MNNs in a mobile network is communicating with a few
corresponding nodes. In such cases the MR only needs to send one
binding update (BU) to optimized the route between CN and a few MNNs.
A major issue with this form of optimization is that the end-to-end
principle of the MIPv6 Reverse Routability (RR) test is broken. The
RR test is meant to ensure the care-of address (CoA) and the home
address (HoA) are collocated. With a mobile network, when the MR
performs RO on behalf of the MNNs, the CoA in BU will be the MR's
CoA. Thus, a MNN is reachable via the CoA, but not at the CoA.
Some tricks may be performed on the fly by the MRs but it seems that
a clean MR-to-CN optimization for Nemo will impact the CN function.
Once we modify the CN behavior, we need to introduce a negotiation
from the start of the RR test to determine the protocol. In
particular, the Mobile Node and the CN must decide whether checking
the collocation is possible, and if not, whether a CN is willing to
accept the risk. If not, the optimization may be limited to
triangular routing MR->CN->HA->MR.
This is a major evolution from [1], since MIPv6 has no such
negotiation capability at this time.
3. MIPv6 Route Optimization over NEMO
MIPv6 mobile nodes can move everywhere. If the user brings mobile
nodes (e.g. MIP VoIP terminal) into the vehicle that supports NEMO
function, packets destined to the mobile node will have to be routed
not only to its home agent but also the home agent of the mobile
router. This pattern resembles Nested NEMO case which is described in
later section. This solution is needed to use both MIPv6 and NEMO
technologies efficiently.
When a Mobile Node visits a Mobile Network, the best Route
Optimization is obtained if the path in the Infrastructure is the
same as if the Mobile Network was attached at the attachment point of
the Mobile Router (i.e., there is not additional Tunneling that is
linked to NEMO).
A possible approach to this is to extend the solution for nested
mobile network optimization to include VMN as well. In this case,
the VMN is treated as though it is an MR. This type of solution will
most likely require some extensions for a MIPv6 VMN and CN.
4. Optimization within the infrastructure
This section elaborates on cases where the Route Optimization is
performed within the Routing Infrastructure. This model is useful
when an ISP wants to control the route optimization procedures and
does not desire to add any functions to the CN or the MR in order to
achieve route optimizations between CN and LFN.
In this model, both the LFN behind the MR and the Correspondent can
be MIP agnostic. The drawback is the introduction of Mobile Routes in
specific Routers, causing additional signaling and load to the
Routing Fabric.
The general idea is that there is a correspondent-side router (C-side
Router) in the infrastructure that is located "closer" to the CN than
the HA of the MR. This C-side Router can terminate MIP on behalf of
the CN.
Correspondent nnnnnnnnnnnnnnnnnnnnnnnn Home Agent
# n #
o # n # # :== Tunnel
o # n # o :== Optimized
o # n # n :== Non-Optimized
o # n #
################################## n #
C-Side oooooooooooooooooooooooooooooooo Mobile
Router ################################ Router
|
====Mobile Network=======
Optimization in the Infrastructure
This optimization is only valid when the path via the C-side Router
is shorter than the path via the Home Agent.
The Optimization can take place independently for the 2 directions of
the traffic:
Egress
The MR locates the C-side Router, establishes a tunnel with that
Router and sets a route to the Correspondent Node via the C-side
Router over the Tunnel. After this, traffic to the Correspondent
Node does not flow through the Home Agent anymore.
Ingress
The C-side Router is on the way of the traffic from the
Correspondent Node to the Home Agent. Also, it is aware of the MR
and the mobile network behind the MR and establishes the
appropriate tunnel and route. After this, it is able to reroute
traffic to the mobile network over the tunnel to the MR.
4.1 Route Optimization within a ISP network
This form of Route Optimization provides local savings for an ISP.
This idea was described in Ohnishi's Mobile Border Gateway draft. The
goal is to locate the closest (BGP) gateway for a Correspondent that
is located outside of the domain, and tunnel between the MR and that
gateway as opposed to the Home Agent for that specific Correspondent.
4.2 Correspondent Router
A globally better optimization is obtained if the tunnel from the MR
is terminated closer to the destination on the Correspondent side.
This is the role of a Correspondent Router (CR).
+-------------------+ # :== Tunnel
| Autonomous System | o :== Optimized
| ----------------- | n :== Non-Optimized
| |
| |
| Correspondent nnnnnnnnnnnnnnnnnnnnnnnnnnnnn Home Agent
| | # n #
| o | # n #
| o | # n #
| o | # n #
| o | # n #
| o | # n #
| #################################### ?
| CR oooooooooooooooooooooooooooooooooooooo Mobile
| #################################### Router
| | |
+-------------------+ ===========Mobile Network========
Correspondent Router
The MR locates the CR for a given Correspondent and establishes a
Tunnel to the CR for that destination and its prefix(es). Then, the
CR establishes the Tunnel back to the MR and the Mobile Routes to the
MR's Mobile Networks via that Tunnel.
A key point is that the CR must be on the interception path of the
traffic from the Correspondent to the Mobile Networks in order to
reroute the traffic over the appropriate Tunnel. This can be achieved
in several fashions:
Redistribution
There's a limited Number of CRs that cover an Autonomous System.
They redistribute the Mobile Routes on the fly, or within rate and
amount limits. Garbage Collection is done at appropriate time to
limit the perturbation on the Routing.
Default Router
The CR is a Default Router for the Correspondent, or for the whole
AS of the Correspondent (it's a border gateway). In this case,
redistribution is not needed.
Core Routers
The Core Routers for the network of the Correspondent are all CRs.
If the path from the correspondent to the Home Agent does not pass
via a CR, then it's not worth optimizing. If it is, then the CRs
are on the way. Again, redistribution is not needed.
4.3 Distributed Anchor Routers
Taking the idea of a correspondent router a step further, it is
possible to have a distributed set of anchor routers across the
Internet. Outgoing packets sent from a mobile network will be
tunneled to one of the nearest anchor router (instead of to the home
agent of the mobile router). This M-Side (Mobile Network Side)
anchor router will decapsulate the packet, inspect the destination,
and tunnel the packet to another anchor router situated near the CN
(C-Side Anchor Router). From there, the packet will be decapsulated
and forwarded to the CN.
Correspondent nnnnnnnnnnnnnnnnnnnnnnn Home Agent
o # n #
o # n # # :== Tunnel
o # n # o :== Optimized
o # n # n :== Non-Optimized
o # n #
C-Side ################## M-Side ###### n #
Anchor oooooooooooooooooo Anchor oooo Mobile
Router ################## Router #### Router
|
====Mobile Network=======
Optimization in the Infrastructure
The C-Side Anchor Router will be subjected to the same condition as
listed in the previous sub-section if packets sent from the CN to the
mobile network are to be route-optimized too. Otherwise, the
solution will only partially optimize routing to a triangular routing
(i.e. packet sent by CN will still go through the home agent of the
mobile network).
The anchor router share many similarities with the concept of
Mobility Anchor Point (MAP) proposed in Hierarchical MIPv6 (HMIPv6)
[9]. In fact, it can be combined with HMIPv6 whereby each M-Side
anchor router is also an MAP, and the MR obtains a regional
care-of-address from the MAP.
5. Nested Mobile Network
5.1 Nested Tunnels Optimization
This section covers the case where one mobile network is within
another mobile network. For example, a user brings a Personal Area
Network (PAN) consisting of some IP devices to a train which is also
using NEMO technology. In another example, a car which conatins a
mobile network moves into the ferry which has another mobile network.
This configuration of mobile networks within another mobile network
is called nested Mobile Networks.
Let us illustrate the problem by an example. In this example, the
nested Mobile Network has a tree topology. In the tree each node is a
basic Mobile Network, represented by its MR.
+---------------------+ +---------------------+
| Internet |---CN | Internet |---CN
+---------------|-----+ +---------------|-----+
/ Access Router / Access Router
MR3_HA | MR3_HA |
======?====== ======?======
MR1 MR1
| |
====?=============?==============?=== ====?=============?==============?===
skipping to change at page 4, line 27 skipping to change at page 8, line 43
MR3 MR3
| |
==|=========?== Net3 ==|=========?== Net3
LFN1 MR4 LFN1 MR4
| |
========= =========
An example nested Mobile Network An example nested Mobile Network
This example focuses on a Local Fixed Node (LFN) at depth 3 (in Net3) This example focuses on a Local Fixed Node (LFN) at depth 3 (in Net3)
inside the tree, represented by its mobile router MR3. The path to inside the tree, represented by its mobile router MR3. The path to
the Top Level Mobile Router (TLMR) MR1 and then the Internet is: the Top Level Mobile Router (TLMR) MR1 and then the Internet is:
MR3 -> MR2 -> MR1 -> Internet MR3 -> MR2 -> MR1 -> Internet
Consider the case where a LFN belonging to Net3 sends a packet to a Consider the case where a LFN belonging to Net3 sends a packet to a
Correspondent Node (CN) in the Internet, and the CN replies back. Correspondent Node (CN) in the Internet, and the CN replies back.
With no Nested Tunnels Optimization, we would have three bi- With no Nested Tunnels Optimization, we would have three
directional nested tunnels, as described in [3] and illustrated in bi-directional nested tunnels, as described in [3] and illustrated in
the following drawings: the following drawings:
-----------. -----------.
--------/ /-----------. --------/ /-----------.
-------/ | | /----------- -------/ | | /-----------
CN ------( - - | - - - | - - - | - - - | - - - (-------- LFN CN ------( - - | - - - | - - - | - - - | - - - (-------- LFN
MR3_HA -------\ | | \----------- MR3 MR3_HA -------\ | | \----------- MR3
MR2_HA --------\ \----------- MR2 MR2_HA --------\ \----------- MR2
MR1_HA ----------- MR1 MR1_HA ----------- MR1
No Nested Tunnels Optimization No Nested Tunnels Optimization
Such a solution introduces the following problems: Such a solution introduces the following problems:
"Pinball" routing "Pinball" routing
Both inbound and outbound packets will flow via the HAs of all the Both inbound and outbound packets will flow via the HAs of all the
MRs on their path within the NEMO, with increased latency, less MRs on their path within the NEMO, with increased latency, less
resilience and more bandwidth usage. To illustrate this effect, resilience and more bandwidth usage. To illustrate this effect,
the figure below shows the route taken by a packet sent from LFN the figure below shows the route taken by a packet sent from LFN
to CN: to CN:
+--> HAofMR1 ---------------------+ +--> HAofMR1 ---------------------+
| | | |
+----------------- HAofMR2 <--+ | +----------------- HAofMR2 <--+ |
| | | |
+---------------+ | +---------------+ |
| V | V
HAofMR3 <------+ CN HAofMR3 <------+ CN
| |
| |
LFN --> MR1 --> MR2 --> MR3 LFN --> MR1 --> MR2 --> MR3
'Pinball' Routing 'Pinball' Routing
Packet size Packet size
An extra IPv6 header is added per level of nesting to all the An extra IPv6 header is added per level of nesting to all the
packets. The header compression suggested in [4] cannot be packets. The header compression suggested in [4] cannot be applied
applied because both the source and destination (the intermediate because both the source and destination (the intermediate MR and
MR and its HA), are different hop to hop. its HA), are different hop to hop.
On the other hand, with a Nested Tunnel Optimization, we would have On the other hand, with a Nested Tunnel Optimization, we would have
at most one bi-directional tunnel outside the Mobile Network, that at most one bi-directional tunnel outside the Mobile Network, that
may depend on the traffic flow: may depend on the traffic flow:
__- --_ __- --_
Tunnel---------------------------- MR1 ( Mobile ) MR3 Tunnel---------------------------- MR1 ( Mobile ) MR3
CN ----------( - - - - - - - - - - ( - - - - )--------- LFN CN ----------( - - - - - - - - - - ( - - - - )--------- LFN
Endpoint---------------------------- MR1 ( Network ) MR3 Endpoint---------------------------- MR1 ( Network ) MR3
--___--- --___---
Nested Tunnels Optimization Nested Tunnels Optimization
The end-point of such a Tunnel on the Mobile side may either be MR1 The end-point of such a Tunnel on the Mobile side may either be MR1
or MR3, depending on the solution. In the case of a Mobile Node or MR3, depending on the solution. In the case of a Mobile Node
visiting Net3, that Mobile Node may also be the end-point. visiting Net3, that Mobile Node may also be the end-point.
The potential approaches for avoiding the nesting of tunnels include: The potential approaches for avoiding the nesting of tunnels include:
Mobile Aggregation Mobile Aggregation
This model applies to a category of problems were the Mobile This model applies to a category of problems were the Mobile
Networks share a same administration and consistently move Networks share a same administration and consistently move
together (e.g. a fleet at sea). In this model, there is a together (e.g. a fleet at sea). In this model, there is a cascade
cascade of Home Agents. of Home Agents.
The main Home Agent is fixed in the infrastructure, and advertises The main Home Agent is fixed in the infrastructure, and advertises
an aggregated view of all the Mobile Networks. This aggregation an aggregated view of all the Mobile Networks. This aggregation is
is actually divided over a number of Mobile Routers, the TLMRs. actually divided over a number of Mobile Routers, the TLMRs. The
The TLMRs subdivide some of their address space to the other TLMRs subdivide some of their address space to the other Mobile
Mobile Routers forming their fleet, for which they are Home Agent. Routers forming their fleet, for which they are Home Agent.
As Home Agents, the TLMRs terminate MIP Tunnels from the inside of As Home Agents, the TLMRs terminate MIP Tunnels from the inside of
the Mobile Network. As Mobile Router, they also terminate their the Mobile Network. As Mobile Router, they also terminate their
home Tunnels. As routers, they forward packets between the 2 home Tunnels. As routers, they forward packets between the 2
tunnels. tunnels.
Surrogate Surrogate
The TLMR acts as a proxy in the MIP registration, in a fashion of The TLMR acts as a proxy in the MIP registration, in a fashion of
MIPv4 Foreign Agent or HMIP MAP (see [8]). For instance, the TLMR MIPv4 Foreign Agent or HMIP MAP (see [9]). For instance, the TLMR
maintains a Tunnel to each MR, a Tunnel to the HA of each MR, and maintains a Tunnel to each MR, a Tunnel to the HA of each MR, and
switches packets between the two. switches packets between the two.
Internal Routing and gateway Internal Routing and gateway
This item can be approached from a MANET standpoint. This was This item can be approached from a MANET standpoint. This was
already done for DSR (see [9]) and AODV (see [10] and [7]) From a already done for DSR (see [10]) and AODV (see [11] and [8]) From a
Nemo standpoint, a full MANET is not necessary since the goal is Nemo standpoint, a full MANET is not necessary since the goal is
to find a way to the infrastructure, as opposed to any-to-any to find a way to the infrastructure, as opposed to any-to-any
connectivity. connectivity.
RRH RRH
The Reverse Routing Header (RRH) approach avoids the multiple The Reverse Routing Header (RRH) approach avoids the multiple
encapsulation of the traffic but maintains the home tunnel of the encapsulation of the traffic but maintains the home tunnel of the
first MR on the egress path. It is described in details in [5]. first MR on the egress path. It is described in details in [5].
The first MR on the way out (egress direction) encapsulates the The first MR on the way out (egress direction) encapsulates the
packet over its reverse tunnel, using a form of Record Route packet over its reverse tunnel, using a form of Record Route
header, the RRH. header, the RRH.
The next MRs simply swap their CoA and the source of the packet, The next MRs simply swap their CoA and the source of the packet,
saving the original source in the RRH. The HA transforms the RRH saving the original source in the RRH. The HA transforms the RRH
in a Routing Header to perform a Source Routing across the nested in a Routing Header to perform a Source Routing across the nested
Mobile Network, along the ingress path to the target MR. Mobile Network, along the ingress path to the target MR.
Access Router Option Access Router Option
The Access Router Option (ARO) approach [6] is somewhat similar to The Access Router Option (ARO) approach [6] is somewhat similar to
the RRH in that only the home tunnel of the first MR in the egress the RRH in that only the home tunnel of the first MR in the egress
path is maintained. This is done by having MR to send an ARO in path is maintained. This is done by having MR to send an ARO in
Binding Update to inform its HA the address of its access router. Binding Update to inform its HA the address of its access router.
Using this information, HA can build a Routing Header to source- Using this information, HA can build a Routing Header to
route a packet to the target MR within in a nested mobile network. source-route a packet to the target MR within in a nested mobile
Details can be found in [6]. network. Details can be found in [6].
2.1.1 Pitfalls and threats Prefix delegation approach
2.1.1.1 Securing the protocol The prefix delegation approach [7] is somewhat to HMIPv6 what Nemo
is to MIPv6. The Access Router of the nested structure is both a
Nemo Home Agent and a DHCP-PD server, for an aggregation that it
owns and advertises to the Infrastructure. When visiting the
nested structure, each MR is delegated a mobile network prefix
from the AR using DHCP-Prefix Delegation. The MR registers this
delegated MNP to the AR that is acting as a Nemo Home Agent. The
MR also autoconfigures an address from the delegated MNP and uses
it as a CareOf to register its own MNPs to its own Home Agent
using Nemo basic support. It is possible for a MR to protect its
own MNPs while advertising in the clear the local MNP for other
MRs to roam in. This allows a strict privacy of visited and
visitors, and enables some specific policies in each Mobile
Router. Details can be found in [7].
5.2 Route Optimization inside the Nested Mobile Network
Although optimization within a mobile network is not within the
charter of the NEMO working group, it might be insightful to discuss
such optimizations.
The expectation is that the mobile routes installed by NEMO can
cohabit with a MANET support that would perform the RO inside the
Nested Mobile Network. In other words, MIP redistributes its prefixes
locally to a MANET and the MR-HA tunnel is bypassed.
6. General Considerations
6.1 Securing the protocol in nested tunnels optimization
These approaches are generally difficult to secure unless all the These approaches are generally difficult to secure unless all the
Mobile Routers and Visiting Mobile Node belong to a same Mobile Routers and Visiting Mobile Node belong to a same
administrative domain and share predefined Security Associations. administrative domain and share predefined Security Associations.
Even if an intermediate MR is 'trusted', this does not prove it is Even if an intermediate MR is 'trusted', this does not prove it is
able to provide the necessary bandwidth, and may not provide a good able to provide the necessary bandwidth, and may not provide a good
service. Eventually, a MR that is capable of securing (IPSec) its service. Eventually, a MR that is capable of securing (IPSec) its
traffic may select a Mobile Access Router based on quality of service traffic may select a Mobile Access Router based on quality of service
heuristics as opposed as trust. heuristics as opposed as trust.
The problem is global to the whole Mobile Network in the case of a The problem is global to the whole Mobile Network in the case of a
MANET-based solution. For an RRH-based solution, the threat comes MANET-based solution. For an RRH-based solution, the threat comes
from on-axis MRs in the nested Mobile Network but is mostly limited from on-axis MRs in the nested Mobile Network but is mostly limited
to denial of service. This is detailed in [5]. The approach taken to denial of service. This is detailed in [5]. The approach taken is
is to limit the threat to Black Hole and Grey Hole by using IPSec. to limit the threat to Black Hole and Grey Hole by using IPSec.
2.1.1.2 Recursive complexity 6.2 Recursive complexity in route optimization
A number of drafts and publications suggest -or can be extended to- a A number of drafts and publications suggest -or can be extended to- a
model where the Home Agent and any arbitrary Correspondent would model where the Home Agent and any arbitrary Correspondent would
actually get individual binding from the chain of nested Mobile actually get individual binding from the chain of nested Mobile
Routers, and form a routing header appropriately. Routers, and form a routing header appropriately.
An intermediate MR would keep track of all the pending communications An intermediate MR would keep track of all the pending communications
between hosts in its subtree of Mobile Networks and their CNs, and a between hosts in its subtree of Mobile Networks and their CNs, and a
binding message to each CN each time it changes its point of binding message to each CN each time it changes its point of
attachment. attachment.
skipping to change at page 8, line 10 skipping to change at page 13, line 10
If this was done, then each CN, by receiving all the binding messages If this was done, then each CN, by receiving all the binding messages
and processing them recursively, could infer a partial topology of and processing them recursively, could infer a partial topology of
the nested Mobile Network, sufficient to build a multi-hop routing the nested Mobile Network, sufficient to build a multi-hop routing
header for packets sent to nodes inside the nested Mobile Network. header for packets sent to nodes inside the nested Mobile Network.
However, this extension has a cost: However, this extension has a cost:
1. Binding Update storm 1. Binding Update storm
when one MR changes its point of attachment, it needs to send a when one MR changes its point of attachment, it needs to send a
BU to all the CNs of each node behind him. When the Mobile BU to all the CNs of each node behind him. When the Mobile
Network is nested, the number of nodes and relative CNs can be Network is nested, the number of nodes and relative CNs can be
huge, leading to congestions and drops. huge, leading to congestions and drops.
2. Protocol Hacks 2. Protocol Hacks
Also, in order to send the BUs, the MR has to keep track of all Also, in order to send the BUs, the MR has to keep track of all
the traffic it forwards to maintain his list of CNs. In case of the traffic it forwards to maintain his list of CNs. In case of
IPSec tunneled traffic, that CN information may not be available. IPSec tunneled traffic, that CN information may not be available.
3. CN operation 3. CN operation
The computation burden of the CN becomes heavy, because it has to The computation burden of the CN becomes heavy, because it has to
analyze each BU in a recursive fashion in order to infer nested analyze each BU in a recursive fashion in order to infer nested
Mobile Network topology required to build a multi hop routing Mobile Network topology required to build a multi hop routing
header. header.
4. Missing BU 4. Missing BU
skipping to change at page 8, line 39 skipping to change at page 13, line 39
If a CN doesn't receive the full set of PSBU sent by the MR, it If a CN doesn't receive the full set of PSBU sent by the MR, it
will not be able to infer the full path to a node inside the will not be able to infer the full path to a node inside the
nested Mobile Network. The RH will be incomplete and the packet nested Mobile Network. The RH will be incomplete and the packet
may or may not be delivered. may or may not be delivered.
5. Obsolete BU 5. Obsolete BU
If the Binding messages are sent asynchronously by each MR, then, If the Binding messages are sent asynchronously by each MR, then,
when the relative position of MRs and/or the TLMR point of when the relative position of MRs and/or the TLMR point of
attachment change rapidly, the image of Mobile Network that the attachment change rapidly, the image of Mobile Network that the
CN maintains is highly unstable. If only one BU in the chain is CN maintains is highly unstable. If only one BU in the chain is
obsolete due to the movement of an intermediate MR, the obsolete due to the movement of an intermediate MR, the
connectivity may be lost. connectivity may be lost.
2.2 Route Optimization inside the Nested Mobile Network 6.3 Mobile Access router selection
This is not part of the Nemo Charter.
The expectation is that the mobile routes installed by Nemo can
cohabit with a MANET support that would perform the RO inside the
Nested Mobile Network. In other words, MIP redistributes its
prefixes locally to a MANET and the MR-HA tunnel is bypassed.
3. MR-to-CN
This section covers the case where the Route Optimization is
performed between the MR and the Correspondent Node.
A major issue is that the MIPv6 Reverse Routability test is broken,
since it is meant to ensure that the CoA (the MR) an the Home Address
(the Mobile Node) are collocated. With a Mobile Network, a LFN is
reachable via the Care-Of Address, but not at the Care-Of Address.
Some tricks may be performed on the fly by the MRs but it seems that
a clean MR-to-CN optimization for Nemo will impact the CN function.
Once we modify the CN behavior, we need to introduce a negotiation
from the start of the RR test to determine the protocol. In
particular, the Mobile Node and the CN must decide whether checking
the collocation is possible, and if not, whether a CN is willing to
accept the risk. If not, the optimization may be limited to
triangular routing MR->CN->HA->MR.
This is a major evolution from [1], since MIPv6 has no such
negotiation capability at this time.
4. MIPv6 Route Optimization over Nemo
When a Mobile Node visits a Mobile Network, the best Route
Optimization is obtained if the path in the Infrastructure is the
same as if the Mobile Network was attached at the attachment point of
the Mobile Router (i.e., there is not additional Tunneling that is
linked to Nemo).
A possible approach to this is to extend the solution for nested
mobile network optimization to include VMN as well. In this case,
the VMN is treated as though it is an MR. This type of solution will
most likely require some extensions for a MIPv6 VMN and CN.
5. Optimization within the infrastructure
This section elaborates on cases where the Route Optimization is
performed within the Routing Infrastructure. In this model, both the
LFN behind the MR and the Correspondent can be MIP agnostic. The
drawback is the introduction of Mobile Routes in specific Routers,
causing additional signaling and load to the Routing Fabric.
The general idea is that there is a correspondent-side Router in the
infrastructure that is located "closer" to the Correspondent than the
HA. That Router can terminate MIP on behalf of the CN.
Correspondent nnnnnnnnnnnnnnnnnnnnnnnn Home Agent
# n #
o # n # # :== Tunnel
o # n # o :== Optimized
o # n # n :== Non-Optimized
o # n #
################################## n #
C-Side oooooooooooooooooooooooooooooooo Mobile
Router ################################ Router
|
====Mobile Network=======
Optimization in the Infrastructure
This optimization is only valid when the path via the correspondent-
side Router is shorter than the path via the Home Agent.
The Optimization can take place independently for the 2 directions of
the traffic:
Egress
The MR locates the correspondent-side Router, establishes a Tunnel
with that Router and sets a route to the Correspondent via the
correspondent-side Router over the Tunnel. At this point, the
traffic to the Correspondent does not flow via the Home Agent
anymore.
Ingress
The correspondent-side Router is on the way of the traffic from
the Correspondent to the Home Agent. Also, it is aware of the MR
and the Mobile Networks behind the MR and establishes the
appropriate Tunnel and Route. At that point, it is able to
reroute the traffic to the Mobile Network over the Tunnel to the
MR.
5.1 Route Optimization within a ISP network
This form of Route Optimization provides local savings for a ISP.
This idea was described in Ohnishi's Mobile Border Gateway draft.
The goal is to locate the closest (BGP) gateway for a Correspondent
that is located outside of the domain, and tunnel between the MR and
that gateway as opposed to the Home Agent for that specific
Correspondent.
5.2 Correspondent Router
A globally better optimization is obtained if the tunnel from the MR
is terminated closer to the destination on the Correspondent side.
This is the role of a Correspondent Router (CR).
+-------------------+ # :== Tunnel
| Autonomous System | o :== Optimized
| ----------------- | n :== Non-Optimized
| |
| |
| Correspondent nnnnnnnnnnnnnnnnnnnnnnnnnnnnn Home Agent
| | # n #
| o | # n #
| o | # n #
| o | # n #
| o | # n #
| o | # n #
| #################################### ?
| CR oooooooooooooooooooooooooooooooooooooo Mobile
| #################################### Router
| | |
+-------------------+ ===========Mobile Network========
Correspondent Router In some case, nested Mobile Networks attaches to visiting network
with multiples mobile access router that are gateways to the global
internet. These RO methods may cover the function in which how the MR
in the nested Mobile Network choose the one of the mobile access
routers. This function is not explicitly described in current
methods and needs to be discussed.
The MR locates the CR for a given Correspondent and establishes a 6.4 Mobility transparency and RO
Tunnel to the CR for that destination and its prefix(es). Then, the
CR establishes the Tunnel back to the MR and the Mobile Routes to the
MR's Mobile Networks via that Tunnel.
A key point is that the CR must be on the interception path of the [cwng's interpretation of Mobility Transparency in RO]
traffic from the Correspondent to the Mobile Networks in order to
reroute the traffic over the appropriate Tunnel. This can be
achieved in several fashions:
Redistribution It is desirable in mobility-related protocols that the mobility of a
mobile node is transparent to other entities and other layers in the
mobile node. The Basic NEMO support achieve this mobility
transparency of the mobile network to the MNNs by a MR-HA tunnel so
that MNNs need not be aware of the MR's change in point of
attachment.
There's a limited Number of CRs that cover an Autonomous System. Such a feature is, as mentioned, desirable. However, when route
They redistribute the Mobile Routes on the fly, or within rate and optimizations, end-to-end principle, and other factors come into
amount limits. Garbage Collection is done at appropriate time to consideration, achieving mobility transparency may not be practical.
limit the perturbation on the Routing.
Default Router For instance, to achieve nested tunnel optimizations, the mobility of
the top-level MR is often exposed to other entities, such as the HA
of a nested MR. In the case of MR performing BU for MNNs, it might
be necessary to pass mobility information of the MR to CN (and even
MNN) in order not to break the end-to-end principle. For the
scenario of optimization using infrastructure, the mobility
information might be necessarily exposed to correspondent routers or
MAP.
The CR is a Default Router for the Correspondent, or for the whole Thus, one should bear in mind when designing RO solution that a
AS of the Correspondent (it's a border gateway). In this case, sacrifice might be necessary when weighing conflicting factors such
redistribution is not needed. as mobility transparency, optimization level, and end-to-end
integrity.
Core Routers [Hosik's interpretation of Mobility Transparency in RO]
The Core Routers for the network of the Correspondent are all CRs. In the case of extended support of NEMO such as nested NEMO, mobility
If the path from the correspondent to the Home Agent does not pass transparency is desirable but that is not mandatory for the
via a CR, then it's not worth optimizing. If it is, then the CRs efficiency of the route optimization. For example, the notebook and
are on the way. Again, redistribution is not needed. PDA inside a vehicle can access to the Internet through the mobile
router of the vehicle. In that case, if the movement of the vehicle
affects to the notebook or the PDA, they can perform individual
binding update operation to the correspondent node or its home agent
but that can cause location privacy problem.
5.3 Distributed Anchor Routers [Onishi's interpretation of Mobility Transparency in RO]
Taking the idea of a correspondent router a step further, it is In RO solutions, MR can optimize the route between its own HA and MR.
possible to have a distributed set of anchor routers across the It is desirable that communication can not be interrupted by this
Internet. Outgoing packets sent from a mobile network will be route optimization. ????
tunneled to one of the nearest anchor router (instead of to the home
agent of the mobile router). This M-Side (Mobile Network Side)
anchor router will decapsulate the packet, inspect the destination,
and tunnel the packet to another anchor router situated near the CN
(C-Side Anchor Router). From there, the packet will be decapsulated
and forwarded to the CN.
Correspondent nnnnnnnnnnnnnnnnnnnnnnn Home Agent 6.5 Multihoming Considerations
o # n #
o # n # # :== Tunnel
o # n # o :== Optimized
o # n # n :== Non-Optimized
o # n #
C-Side ################## M-Side ###### n #
Anchor oooooooooooooooooo Anchor oooo Mobile
Router ################## Router #### Router
|
====Mobile Network=======
Optimization in the Infrastructure In multihomed mobile networks, route optimization is dependant on how
the connections to the Internet are available and selected.
The C-Side Anchor Router will be subjected to the same condition as In case of macro mobility, we may have multiple HAs from place to
listed in the previous sub-section if packets sent from the CN to the place. New route optimization could be possible by routing between CN
mobile network are to be route-optimized too. Otherwise, the and one of the multiple Home Agents (possibly using differenc Home
solution will only partially optimize routing to a triangular routing Addresses).
(i.e. packet sent by CN will still go through the home agent of the
mobile network).
The anchor router share many similarities with the concept of When multiple connections are available for the purpose of fault
Mobility Anchor Point (MAP) proposed in Hierarchical MIPv6 (HMIPv6) tolerance, a selection mechanism is needed for CN to eveluate the
[8]. In fact, it can be combined with HMIPv6 whereby each M-Side connection availability in order to perform route optimization.
anchor router is also an MAP, and the MR obtains a regional care-of-
address from the MAP.
6. Conclusion 7. Conclusion
The Problem space of Route Optimization in the Nemo context is The Problem space of Route Optimization in the NEMO context is
multifold and can be split is several work areas. It will be multifold and can be split is several work areas. It will be
critical, though, that the solution to a given piece of the puzzle be critical, though, that the solution to a given piece of the puzzle be
compatible and integrate smoothly with the others. compatible and integrate smoothly with the others.
Hopefully, the solutions will build on MIPv6 ([1]), as recommended by Hopefully, the solutions will build on MIPv6 ([1]), as recommended by
the Nemo Charter. On the other hand, MIPv6 seems to be evolving in a the NEMO Charter. On the other hand, MIPv6 seems to be evolving in a
direction that makes it more and more difficult to provide a Nemo direction that makes it more and more difficult to provide a NEMO
solution with backward compatibility, since: solution with backward compatibility, since:
1) The RR test prevents a MR-LFN dichotomy on the Mobile Side, 1) The RR test prevents a MR-LFN dichotomy on the Mobile Side,
2) The RR test has no negotiable option and is not open for 2) The RR test has no negotiable option and is not open for
extension, and extension, and
3) The HaO and RH type 2 are designed for a collocated CareOf 3) The HaO and RH type 2 are designed for a collocated CareOf
Address. More specifically, they are not designed to be multi-hop as Address. More specifically, they are not designed to be multi-hop as
RRH is, and not extensible, though RRH can be considered as an RRH is, and not extensible, though RRH can be considered as an
extension of HaO. extension of HAO.
The authors intent is to trigger fruitful discussions that in turn The authors intent is to trigger fruitful discussions that in turn
will enhance our common understanding of the problem space so that at will enhance our common understanding of the problem space so that at
some point, this paper turns into a problem statement for the Nemo some point, this paper turns into a problem statement for the Nemo
Route Optimization. Route Optimization.
7. Acknowledgements 8. Acknowledgements
The authors wish to thank: Greg Daley, Thierry Ernst, Hiroyuki The authors wish to thank: Greg Daley, Thierry Ernst, Hiroyuki
Ohnishi, T.J. Kniveton, Alexandru Petrescu, Hesham Soliman, Ryuji Ohnishi, T.J. Kniveton, Alexandru Petrescu, Hesham Soliman, Ryuji
Wakikawa and Patrick Wetterwald for their various contributions. Wakikawa and Patrick Wetterwald for their various contributions.
References References
[1] Perkins, C., Johnson, D. and J. Arkko, "Mobility Support in [1] Johnson, D., Perkins, C. and J. Arkko, "Mobility Support in
IPv6", draft-ietf-mobileip-ipv6-21 (work in progress), March IPv6", draft-ietf-mobileip-ipv6-24 (work in progress), July
2003. 2003.
[2] Lach, H. and T. Ernst, "Network Mobility Support Terminology", [2] Ernst, T. and H. Lach, "Network Mobility Support Terminology",
draft-ietf-nemo-terminology-00 (work in progress), May 2003. draft-ietf-nemo-terminology-00 (work in progress), May 2003.
[3] Kniveton, T., "Mobile Router Tunneling Protocol", draft- [3] kniveton, t., "Mobile Router Support with Mobile IP",
kniveton-mobrtr-03 (work in progress), November 2002. draft-kniveton-mobrtr-02 (work in progress), July 2002.
[4] Deering, S. and B. Zill, "Redundant Address Deletion when [4] Deering, S. and B. Zill, "Redundant Address Deletion when
Encapsulating IPv6 in IPv6", draft-deering-ipv6-encap-addr- Encapsulating IPv6 in IPv6",
deletion-00 (work in progress), November 2001. draft-deering-ipv6-encap-addr-deletion-00 (work in progress),
November 2001.
[5] Thubert, P. and M. Molteni, "IPv6 Reverse Routing Header and [5] Thubert, P. and M. Molteni, "IPv6 Reverse Routing Header and
its application to Mobile Networks", draft-thubert-nemo- its application to Mobile Networks",
reverse-routing-header-01 (work in progress), October 2002. draft-thubert-nemo-reverse-routing-header-04 (work in
progress), February 2004.
[6] Tanaka, T. and C. Ng, "Securing Nested Tunnels Optimization [6] Tanaka, T. and C. Ng, "Securing Nested Tunnels Optimization
with Access Router Option", draft-ng-nemo-access-router-option- with Access Router Option",
00 (work in progress), November 2002. draft-ng-nemo-access-router-option-00 (work in progress),
[7] Wakikawa, R., "Global Connectivity for IPv6 Mobile Ad Hoc
Networks", draft-wakikawa-manet-globalv6-02 (work in progress),
November 2002. November 2002.
[8] Castelluccia, C., Malki, K., Soliman, H. and L. Bellier, [7] Droms, R. and P. Thubert, "DHCPv6 Prefix Delegation for NEMO",
"Hierarchical Mobile IPv6 mobility management (HMIPv6)", draft- draft-droms-nemo-dhcpv6-pd-01 (work in progress), February
ietf-mobileip-hmipv6-07 (work in progress), October 2002. 2004.
[9] Johnson, D., Maltz, D., Broch, J. and J. Jetcheva, "The Dynamic [8] Wakikawa, R., "Global Connectivity for IPv6 Mobile Ad Hoc
Source Routing Protocol for Mobile Ad Hoc Networks", draft- Networks", draft-wakikawa-manet-globalv6-03 (work in progress),
ietf-manet-dsr-07 (work in progress), February 2002. October 2003.
[10] Das, S., Perkins, C. and E. Royer, "Ad Hoc On Demand Distance [9] Soliman, H., Castelluccia, C., Malki, K. and L. Bellier,
Vector (AODV) Routing", draft-ietf-manet-aodv-13 (work in "Hierarchical MIPv6 mobility management (HMIPv6)",
progress), February 2003. draft-ietf-mobileip-hmipv6-06 (work in progress), July 2002.
[11] Postel, J., "Internet Protocol", STD 5, RFC 791, September [10] Johnson, D., "The Dynamic Source Routing Protocol for Mobile Ad
Hoc Networks (DSR)", draft-ietf-manet-dsr-09 (work in
progress), April 2003.
[11] Perkins, C., Royer, E. and S. Das, "Ad Hoc On Demand Distance
Vector (AODV) Routing", draft-ietf-manet-aodv-11 (work in
progress), July 2002.
[12] Postel, J., "Internet Protocol", STD 5, RFC 791, September
1981. 1981.
[12] Deering, S. and R. Hinden, "Internet Protocol, Version 6 (IPv6) [13] Deering, S. and R. Hinden, "Internet Protocol, Version 6 (IPv6)
Specification", RFC 2460, December 1998. Specification", RFC 2460, December 1998.
Authors' Addresses Authors' Addresses
Pascal Thubert Pascal Thubert
Cisco Systems Technology Center Cisco Systems Technology Center
Village d'Entreprises Green Side Village d'Entreprises Green Side
400, Avenue Roumanille 400, Avenue Roumanille
Biot - Sophia Antipolis 06410 Biot - Sophia Antipolis 06410
FRANCE FRANCE
skipping to change at page 16, line 5 skipping to change at page 17, line 38
Chan-Wah Ng Chan-Wah Ng
Panasonic Singapore Laboratories Pte Ltd Panasonic Singapore Laboratories Pte Ltd
Blk 1022 Tai Seng Ave #06-3530 Blk 1022 Tai Seng Ave #06-3530
Tai Seng Industrial Estate Tai Seng Industrial Estate
Singapore 534415 Singapore 534415
SG SG
EMail: cwng@psl.com.sg EMail: cwng@psl.com.sg
Hiroyuki Ohnishi
NTT network service systems laboratories, NTT cooperation
9-11, Midori-Cho 3-Chome
Musashino-shi
Tokyo 180-8585
JAPAN
EMail: ohnishi.hiroyuki@lab.ntt.co.jp
Eun Kyoung Paik
Seoul National University
Shillim-dong, Kwanak-gu
Seoul 151-744
KOREA
EMail: eun@mmlab.snu.ac.kr
Intellectual Property Statement
The IETF takes no position regarding the validity or scope of any
intellectual property or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; neither does it represent that it
has made any effort to identify any such rights. Information on the
IETF's procedures with respect to rights in standards-track and
standards-related documentation can be found in BCP-11. Copies of
claims of rights made available for publication and any assurances of
licenses to be made available, or the result of an attempt made to
obtain a general license or permission for the use of such
proprietary rights by implementors or users of this specification can
be obtained from the IETF Secretariat.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights which may cover technology that may be required to practice
this standard. Please address the information to the IETF Executive
Director.
Full Copyright Statement Full Copyright Statement
Copyright (C) The Internet Society (2003). All Rights Reserved. Copyright (C) The Internet Society (2004). All Rights Reserved.
This document and translations of it may be copied and furnished to This document and translations of it may be copied and furnished to
others, and derivative works that comment on or otherwise explain it others, and derivative works that comment on or otherwise explain it
or assist in its implementation may be prepared, copied, published or assist in its implementation may be prepared, copied, published
and distributed, in whole or in part, without restriction of any and distributed, in whole or in part, without restriction of any
kind, provided that the above copyright notice and this paragraph are kind, provided that the above copyright notice and this paragraph are
included on all such copies and derivative works. However, this included on all such copies and derivative works. However, this
document itself may not be modified in any way, such as by removing document itself may not be modified in any way, such as by removing
the copyright notice or references to the Internet Society or other the copyright notice or references to the Internet Society or other
Internet organizations, except as needed for the purpose of Internet organizations, except as needed for the purpose of
developing Internet standards in which case the procedures for developing Internet standards in which case the procedures for
copyrights defined in the Internet Standards process must be copyrights defined in the Internet Standards process must be
followed, or as required to translate it into languages other than followed, or as required to translate it into languages other than
English. English.
The limited permissions granted above are perpetual and will not be The limited permissions granted above are perpetual and will not be
revoked by the Internet Society or its successors or assigns. revoked by the Internet Society or its successors or assignees.
This document and the information contained herein is provided on an This document and the information contained herein is provided on an
"AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Acknowledgement Acknowledgment
Funding for the RFC Editor function is currently provided by the Funding for the RFC Editor function is currently provided by the
Internet Society. Internet Society.
 End of changes. 80 change blocks. 
302 lines changed or deleted 476 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/