< draft-thubert-nemo-ro-taxonomy-02.txt   draft-thubert-nemo-ro-taxonomy-03.txt >
Network Working Group P. Thubert NEMO Working Group C. Ng
Internet-Draft M. Molteni Internet-Draft Panasonic Singapore Labs
Expires: August 15, 2004 Cisco Systems Expires: April 25, 2005 P. Thubert
C. Ng Cisco Systems
Panasonic Singapore Labs
H. Ohnishi H. Ohnishi
NTT NTT
E. Paik E. Paik
Seoul National Univ. KT
February 15, 2004 October 25, 2004
Taxonomy of Route Optimization models in the Nemo Context Taxonomy of Route Optimization models in the NEMO Context
draft-thubert-nemo-ro-taxonomy-02 draft-thubert-nemo-ro-taxonomy-03
Status of this Memo Status of this Memo
This document is an Internet-Draft and is in full conformance with This document is an Internet-Draft and is subject to all provisions
all provisions of Section 10 of RFC2026. of section 3 of RFC 3667. By submitting this Internet-Draft, each
author represents that any applicable patent or other IPR claims of
which he or she is aware have been or will be disclosed, and any of
which he or she become aware will be disclosed, in accordance with
RFC 3668.
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that other Task Force (IETF), its areas, and its working groups. Note that
groups may also distribute working documents as Internet-Drafts. other groups may also distribute working documents as
Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six months Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at http:// The list of current Internet-Drafts can be accessed at
www.ietf.org/ietf/1id-abstracts.txt. http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html. http://www.ietf.org/shadow.html.
This Internet-Draft will expire on August 15, 2004. This Internet-Draft will expire on April 25, 2005.
Copyright Notice Copyright Notice
Copyright (C) The Internet Society (2004). All Rights Reserved. Copyright (C) The Internet Society (2004).
Abstract Abstract
NEMO enables Mobile Networks by extending Mobile IP to support Mobile With current Network Mobility (NEMO) Basic Support, all
Routers. This memo documents how the MIPv6 concept of Route communications to and from mobile network nodes must go through the
Optimization can to be adapted for NEMO to optimize traffic routing MR-HA tunnel when the mobile network is away. This results in
between nodes in a mobile network and their correspodnet nodes. increased length of packet route and increased packet delay. To
Different route optimizations schemes are discussed, including: overcome these limitations, one might have to turn to route
optimization (RO) for NEMO. This memo documents various types of
route optimization in NEMO, and explores the benefits and tradeoffs
in different aspects of NEMO route optimization.
1. route optimization with corresponding nodes initiated bu mobile Table of Contents
routers on behalf of the mobile network nodes;
2. a visiting mobile node performing MIPv6 RO over the NEMO base 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
protocol; 2. Problem Statement of NEMO Route Optimization . . . . . . . . . 4
2.1 Sub-Optimality with NEMO Basic Support . . . . . . . . . . 4
2.2 Nesting of Mobile Networks . . . . . . . . . . . . . . . . 5
2.3 MIPv6 Host in Mobile Networks . . . . . . . . . . . . . . 7
2.4 Communications within a Mobile Networks . . . . . . . . . 7
3. Solution Space of NEMO Route Optimization . . . . . . . . . . 8
3.1 MR-to-CN Optimization . . . . . . . . . . . . . . . . . . 9
3.2 Infrastructure Optimization . . . . . . . . . . . . . . . 10
3.3 Nested Tunnels Optimization . . . . . . . . . . . . . . . 11
3.4 MIPv6-over-NEMO Optimization . . . . . . . . . . . . . . . 12
3.5 Intra-NEMO Optimization . . . . . . . . . . . . . . . . . 13
4. Analysis of Solution Space . . . . . . . . . . . . . . . . . . 14
4.1 General Considerations of RO Solution . . . . . . . . . . 14
4.1.1 Additional Signaling Overhead . . . . . . . . . . . . 14
4.1.2 Increased Protocol Complexity . . . . . . . . . . . . 15
4.1.3 Mobility Awareness . . . . . . . . . . . . . . . . . . 15
4.1.4 New Functionalities . . . . . . . . . . . . . . . . . 15
4.1.5 Other Considerations . . . . . . . . . . . . . . . . . 17
4.2 Specific Types of RO Solution . . . . . . . . . . . . . . 17
4.2.1 MR-to-CN Optimization . . . . . . . . . . . . . . . . 17
4.2.2 Infrastructure Optimization . . . . . . . . . . . . . 19
4.2.3 Nested Tunnels Optimization . . . . . . . . . . . . . 20
4.2.4 MIPv6-over-NEMO Optimization . . . . . . . . . . . . . 21
4.2.5 Intra-NEMO Optimization . . . . . . . . . . . . . . . 23
5. Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . 24
6. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 25
7. References . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . 27
A. Proposed Route Optimizations . . . . . . . . . . . . . . . . . 29
A.1 MR-to-CN Optimizations . . . . . . . . . . . . . . . . . . 29
A.2 Infrastructure Optimizations . . . . . . . . . . . . . . . 29
A.3 Nested Tunnel Optimizations . . . . . . . . . . . . . . . 30
A.4 MIPv6-over-NEMO Optimizations . . . . . . . . . . . . . . 32
A.5 Intra-NEMO Optimizations . . . . . . . . . . . . . . . . . 33
Intellectual Property and Copyright Statements . . . . . . . . 34
3. performing RO over the routing infrastructure involving 1. Introduction
optimizing the route between two routers situated near to each
end point, instead of end-to-end; and
4. minimizing the number of tunnels required when there is multiple With current Network Mobility (NEMO) Basic Support [1], all
levels of nesting. communications to and from nodes in a mobile network must go through
the bi-directional tunnel established between the mobile router (MR)
and its home agent (HA) when the mobile network is away. Although
such an arrangement allows mobile network nodes (MNNs) to reach and
be reached by any node on the Internet, there are associated
limitations which might be unacceptable for certain applications. To
substantially ameliorate these limitations, one might have to turn to
route optimization (RO) for NEMO. Here, we use the term "route
optimization" to loosely refer to any approach that optimize the
route taken by packets sent between a mobile network node and
correspondent node (CN).
Table of Contents This document aims to explore limitations inherent in NEMO Basic
Support, and analyze the possible approaches to route optimization
with NEMO. It is expected for readers to be familiar with general
terminologies related to mobility in [2] and [3], and NEMO related
terms defined in [4]. In addition, it is beneficial to keep in mind
the design requirements of NEMO [5]. A point to note is that since
this document discusses aspects of route optimization, the readers
may assume that a mobile network or a mobile host is away when they
are mentioned throughout this document, unless it is explicitly
specified that they are at home.
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 It is the objective of this document to address the need for a route
2. MR-to-CN . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 optimization analysis in the NEMO Working Group. To quote the
3. MIPv6 Route Optimization over NEMO . . . . . . . . . . . . . . 4 charter of the NEMO Working group:
4. Optimization within the infrastructure . . . . . . . . . . . . 4
4.1 Route Optimization within a ISP network . . . . . . . . . . . 5
4.2 Correspondent Router . . . . . . . . . . . . . . . . . . . . . 6
4.3 Distributed Anchor Routers . . . . . . . . . . . . . . . . . . 7
5. Nested Mobile Network . . . . . . . . . . . . . . . . . . . . 8
5.1 Nested Tunnels Optimization . . . . . . . . . . . . . . . . . 8
5.2 Route Optimization inside the Nested Mobile Network . . . . . 12
6. General Considerations . . . . . . . . . . . . . . . . . . . . 12
6.1 Securing the protocol in nested tunnels optimization . . . . . 12
6.2 Recursive complexity in route optimization . . . . . . . . . . 12
6.3 Mobile Access router selection . . . . . . . . . . . . . . . . 13
6.4 Mobility transparency and RO . . . . . . . . . . . . . . . . . 14
6.5 Multihoming Considerations . . . . . . . . . . . . . . . . . . 15
7. Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . 15
8. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 15
References . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . 17
Intellectual Property and Copyright Statements . . . . . . . . 19
1. Introduction "... The WG will work on: ... ... [an] informational document
which specifies a detailed problem statement for route
optimization and looks at various approaches to solving this
problem. This document will look into the issues and tradeoffs
involved in making the network's movement visible to some nodes,
by optionally making them "NEMO aware". The interaction between
route optimization and IP routing will also be described in this
document. Furthermore, security considerations for the various
approaches will also be considered. ..."
This document assumes the reader is familiar with Mobile IPv6 defined To such end, this document first describes the problem of route
in [1], with the concept of Mobile Router (MR) and with the Nemo optimization in NEMO in Section 2. Next, we explore into various
terminology defined in [2]. possible approaches to solving the problem of route optimization in
Section 3. Following this, Section 4 discusses various issues that a
route optimization solution might face. Finally, Section 5 concludes
this memo. In addition, we attempt to list various proposed
solutions for route optimization in Appendix A, and classify them
according to the solution space described in Section 3.
From the discussions on the mailing list, it appears that the common 2. Problem Statement of NEMO Route Optimization
current understanding of the problem space of Route Optimization
(RO), in the Nemo context, is still limited.
This draft attempts to clarify the state of the discussion and In essence, the problem of route optimization in NEMO is to eliminate
propose a taxonomy of the various aspects of the problem. We will limitations, or sub-optimality, introduced by the bi-directional
look at different possible types of route optimizations related to tunnel between a mobile router and its home agent (also known as the
mobile network. MR-HA tunnel). In the following sub-sections, we will describe the
effects of sub-optimal routing with NEMO-Basic Support, and how they
get amplified with nesting of mobile networks. We will also look
into the nesting of a Mobile IPv6 (MIPv6) host in a mobile network.
In addition, we will explore the impact of MR-HA tunnel on
communications between two mobile network nodes (MNNs) on different
links of the same mobile network.
Firstly, the Mobile Router can initiate route optimization with Readers might be interested to note the availability of [6] which
corresponding nodes (CN) on behalf of the mobile network nodes (MNN). also discusses the problem statement of NEMO route optimization.
Secondly, we consider the feasibility of having a visiting mobile 2.1 Sub-Optimality with NEMO Basic Support
node (VMN) performing MIPv6 RO over the NEMO base protocol.
Thirdly, we explore the prospect of performing RO over the routing With NEMO Basic Support, all packets sent between a mobile network
infrastructure. This involves optimizing the route between two node and its correspondent node are forwarded through the MR-HA
routers situated near to each end point. tunnel. This results in a sub-optimal routing, also known as
"dog-leg routing", with NEMO Basic Support. This sub-optimality has
the following undesirable effects:
Lastly, route optimizations involving nested mobile networks are o Longer route leading to increased delay
explored. This involves minimizing the number of tunnels required
when there is multiple levels of nesting.
2. MR-to-CN Because a packet must transit from a mobile network to the home
agent then to the correspondent node, the transit time of the
packet is always higher than if the packet were to go straight
from the mobile network to the correspondent node. In the best
case, where the correspondent node resides near the home agent,
the increase in packet delay is minimal. In the worst case, where
both the mobile network and the correspondent node are located at
a point furthest away from the home agent on the Internet, the
increase in delay is tremendous. Applications such as real-time
multimedia streaming may not be able to tolerate such increase in
packet delay.
This section covers the case where the Route Optimization is o Increased packets overhead
performed between the MR and the correspondent nodes which mobile
network nodes (MNNs) are communicating with. This scenario is useful
when a lot of MNNs in a mobile network is communicating with a few
corresponding nodes. In such cases the MR only needs to send one
binding update (BU) to optimized the route between CN and a few MNNs.
A major issue with this form of optimization is that the end-to-end The encapsulation of packets in the MR-HA tunnel results in
principle of the MIPv6 Reverse Routability (RR) test is broken. The increased packet size due to addition of an outer packet. This
RR test is meant to ensure the care-of address (CoA) and the home reduces the bandwidth efficiency, as IPv6 header can be quite
address (HoA) are collocated. With a mobile network, when the MR substantial (at least 40 bytes).
performs RO on behalf of the MNNs, the CoA in BU will be the MR's
CoA. Thus, a MNN is reachable via the CoA, but not at the CoA.
Some tricks may be performed on the fly by the MRs but it seems that o Increased processing delay
a clean MR-to-CN optimization for Nemo will impact the CN function.
Once we modify the CN behavior, we need to introduce a negotiation The encapsulation of packets in the MR-HA tunnel also results in
from the start of the RR test to determine the protocol. In increased processing delay at the points of encapsulation and
particular, the Mobile Node and the CN must decide whether checking decapsulation.
the collocation is possible, and if not, whether a CN is willing to
accept the risk. If not, the optimization may be limited to
triangular routing MR->CN->HA->MR.
This is a major evolution from [1], since MIPv6 has no such o Increased chances of packet fragmentation
negotiation capability at this time.
3. MIPv6 Route Optimization over NEMO The increased in packet size due to packet encapsulation may
increase the chances of the packet being fragmented along the
MR-HA tunnel. This can occur if there is no prior path MTU
discovery conducted, or if the MTU discovery mechanism did not
take into account the encapsulation of packets. Packets
fragmentation will result in a further increase in packet delays,
and further reduction of bandwidth efficiency.
MIPv6 mobile nodes can move everywhere. If the user brings mobile 2.2 Nesting of Mobile Networks
nodes (e.g. MIP VoIP terminal) into the vehicle that supports NEMO
function, packets destined to the mobile node will have to be routed
not only to its home agent but also the home agent of the mobile
router. This pattern resembles Nested NEMO case which is described in
later section. This solution is needed to use both MIPv6 and NEMO
technologies efficiently.
When a Mobile Node visits a Mobile Network, the best Route With nesting of mobile networks, the use of NEMO Basic Support
Optimization is obtained if the path in the Infrastructure is the further amplifies the sub-optimality of routing. We call this the
same as if the Mobile Network was attached at the attachment point of amplification effect of nesting, where the (undesirable) effects of
the Mobile Router (i.e., there is not additional Tunneling that is sub-optimal routing with NEMO Basic Support is amplified with each
linked to NEMO). level of nesting of mobile networks. This is best illustrated by an
example shown in Figure 1.
A possible approach to this is to extend the solution for nested HAofMR1
mobile network optimization to include VMN as well. In this case, +-----------|---------+
the VMN is treated as though it is an MR. This type of solution will HAofMR2 --| Internet |---CN
most likely require some extensions for a MIPv6 VMN and CN. +---------------|-----+
/ Access Router
HAofMR3 |
====?========
MR1
|
====?===========?===========?===
MR5 MR2 MR6
| | |
==|======= ===?====== ======|==
LFN2 MR3 LFN3
|
==|=========?==
LFN1 MR4
|
=========
4. Optimization within the infrastructure Figure 1: An example of nested Mobile Network
This section elaborates on cases where the Route Optimization is Using NEMO Basic Support, the flow of packets between a Local Fixed
performed within the Routing Infrastructure. This model is useful Node LFN1 and a correspondent node CN would need to go through three
when an ISP wants to control the route optimization procedures and separate tunnels, illustrated in Figure 2 below.
does not desire to add any functions to the CN or the MR in order to
achieve route optimizations between CN and LFN.
In this model, both the LFN behind the MR and the Correspondent can ----------.
be MIP agnostic. The drawback is the introduction of Mobile Routes in --------/ /----------.
specific Routers, causing additional signaling and load to the -------/ | | /-------
Routing Fabric. CN ------( - - | - - - | - - - | - - - | - - (------- LFN
HAofMR3-------\ | | \-------MR3
HAofMR2--------\ \----------MR2
HAofMR1---------MR1
The general idea is that there is a correspondent-side router (C-side Figure 2: Nesting of Bi-Directional Tunnels
Router) in the infrastructure that is located "closer" to the CN than
the HA of the MR. This C-side Router can terminate MIP on behalf of
the CN.
Correspondent nnnnnnnnnnnnnnnnnnnnnnnn Home Agent This leads to the following problems:
# n #
o # n # # :== Tunnel
o # n # o :== Optimized
o # n # n :== Non-Optimized
o # n #
################################## n #
C-Side oooooooooooooooooooooooooooooooo Mobile
Router ################################ Router
|
====Mobile Network=======
Optimization in the Infrastructure o 'Pinball' routing
This optimization is only valid when the path via the C-side Router Both inbound and outbound packets will flow via the HAs of all the
is shorter than the path via the Home Agent. MRs on their path within the NEMO, with increased latency, less
resilience and more bandwidth usage. To illustrate this effect,
Figure 3 below shows the route taken by a packet sent from LFN1 to
CN:
The Optimization can take place independently for the 2 directions of +--> HAofMR3 ---------------------+
the traffic: | |
+----------------- HAofMR2 <--+ |
| |
+---------------+ |
| V
HAofMR1 <------+ CN
|
|
LFN1 --> MR3 --> MR2 --> MR1
Egress Figure 3: 'Pinball' Routing
The MR locates the C-side Router, establishes a tunnel with that For more illustration of the pinball routing, see [7].
Router and sets a route to the Correspondent Node via the C-side
Router over the Tunnel. After this, traffic to the Correspondent
Node does not flow through the Home Agent anymore.
Ingress o Increased Packet Size
The C-side Router is on the way of the traffic from the An extra IPv6 header is added per level of nesting to all the
Correspondent Node to the Home Agent. Also, it is aware of the MR packets. The header compression suggested in [8] cannot be
and the mobile network behind the MR and establishes the applied because both the source and destination (the intermediate
appropriate tunnel and route. After this, it is able to reroute MR and its HA), are different hop to hop.
traffic to the mobile network over the tunnel to the MR.
4.1 Route Optimization within a ISP network 2.3 MIPv6 Host in Mobile Networks
This form of Route Optimization provides local savings for an ISP. When a MIPv6 mobile node joins a mobile network, it becomes a
This idea was described in Ohnishi's Mobile Border Gateway draft. The visiting mobile node (VMN) of the mobile network. Packets sent to
goal is to locate the closest (BGP) gateway for a Correspondent that and from the visiting mobile node will have to be routed not only to
is located outside of the domain, and tunnel between the MR and that the home agent of the visiting mobile node, but also to the home
gateway as opposed to the Home Agent for that specific Correspondent. agent of the mobile router in the mobile network. This suffers the
same amplification effect of nested mobile router mentioned in
Section 2.2.
4.2 Correspondent Router In addition, although Mobile IPv6 [2] allows a mobile host to perform
route optimization with its correspondent node to avoid tunneling
with its home agent, the "optimized" route is no longer optimized
when the mobile host is attached to a mobile network. This is
because the route between the mobile host and its correspondent node
is subjected to the sub-optimality introduced by the MR-HA tunnel.
Interested readers may refer to [7] for examples of how the routes
will appear with nesting of MIPv6 hosts in mobile networks.
A globally better optimization is obtained if the tunnel from the MR 2.4 Communications within a Mobile Networks
is terminated closer to the destination on the Correspondent side.
This is the role of a Correspondent Router (CR).
+-------------------+ # :== Tunnel The reliance on the MR-HA tunnel has its implications on MNNs in a
| Autonomous System | o :== Optimized nested mobile network communicating with each other. Let us consider
| ----------------- | n :== Non-Optimized the previous example illustrated in Figure 1. Suppose LFN1 and LFN2
| | are communicating with each other. With NEMO Basic Support, a packet
| | sent from LFN1 to LFN2 will follow the path of: LFN1 -> MR3 -> MR2 ->
| Correspondent nnnnnnnnnnnnnnnnnnnnnnnnnnnnn Home Agent MR1 -> HAofMR1 -> HAofMR2 -> HAofMR3 -> HAofMR5 -> HAofMR1 -> MR1 ->
| | # n # MR5 -> LFN2. A round-about trip indeed where the direct path would
| o | # n # be LFN1 -> MR3 -> MR2 -> MR5 -> LFN2.
| o | # n #
| o | # n #
| o | # n #
| o | # n #
| #################################### ?
| CR oooooooooooooooooooooooooooooooooooooo Mobile
| #################################### Router
| | |
+-------------------+ ===========Mobile Network========
Correspondent Router The consequences of increase packet delay and packet size have been
discussed in previous sub-sections. Here, there is an additional
effect that is undesirable: should MR1 loses its connection to the
global Internet, LFN1 and LFN2 can no longer communicates with each
other, even though the direct path from LFN1 to LFN2 is unaffected!
The MR locates the CR for a given Correspondent and establishes a 3. Solution Space of NEMO Route Optimization
Tunnel to the CR for that destination and its prefix(es). Then, the
CR establishes the Tunnel back to the MR and the Mobile Routes to the
MR's Mobile Networks via that Tunnel.
A key point is that the CR must be on the interception path of the To address the problems discussed in Section 2, one can incorporate
traffic from the Correspondent to the Mobile Networks in order to route optimization into NEMO. This is also known as the NEMO
reroute the traffic over the appropriate Tunnel. This can be achieved Extended Support. Although a standardized NEMO Extended Support has
in several fashions: yet materialize, one can expect it to show some of the following
benefits:
Redistribution o Shorter Delay
There's a limited Number of CRs that cover an Autonomous System. Route optimization involves the selection and utilization of a
They redistribute the Mobile Routes on the fly, or within rate and shorter (or faster) route to be taken for traffic between a mobile
amount limits. Garbage Collection is done at appropriate time to network node and correspondent node. Hence a major benefit of
limit the perturbation on the Routing. route optimization should be shorter delay experiences by the data
traffic between the two end nodes. This may possibly in turn
leads to better overall Quality of Services characteristics, such
as reduced jitter and packet loss.
Default Router o Reduced Consumption of Overall Network Resources
The CR is a Default Router for the Correspondent, or for the whole Through the selection of a shorter route, the total link
AS of the Correspondent (it's a border gateway). In this case, utilization for all links used by traffic between the two end
redistribution is not needed. nodes should be much lower than that used if route optimization is
not carried out. This would result in a lighter network load with
reduced congestion.
Core Routers o Less Susceptibility to Link Failure
The Core Routers for the network of the Correspondent are all CRs. An optimized route would conceivably utilize a lesser number of
If the path from the correspondent to the Home Agent does not pass links between the two end nodes. Hence, the probability of
via a CR, then it's not worth optimizing. If it is, then the CRs connectivity loss due to a single point of failure at a link
are on the way. Again, redistribution is not needed. should be lower as compared to the longer non-optimized route.
4.3 Distributed Anchor Routers o Greater Data Efficiency
Taking the idea of a correspondent router a step further, it is Depending on the actual solution for NEMO Extended Support, the
possible to have a distributed set of anchor routers across the data packets exchanged between the two end nodes may not require
Internet. Outgoing packets sent from a mobile network will be as many levels of encapsulation as required by NEMO Basic Support.
tunneled to one of the nearest anchor router (instead of to the home This would mean less packet overheads, and higher data efficiency.
agent of the mobile router). This M-Side (Mobile Network Side)
anchor router will decapsulate the packet, inspect the destination,
and tunnel the packet to another anchor router situated near the CN
(C-Side Anchor Router). From there, the packet will be decapsulated
and forwarded to the CN.
Correspondent nnnnnnnnnnnnnnnnnnnnnnn Home Agent There are multiple proposals for providing various forms of route
o # n # optimizations for NEMO (see Appendix A). In the following
o # n # # :== Tunnel sub-sections, we describe the solution space of route optimization by
o # n # o :== Optimized listing different types of approach to route optimization. Readers
o # n # n :== Non-Optimized might be interested to take note of a route optimization model
o # n # described in [9] which describes route optimization model based on
C-Side ################## M-Side ###### n # the variations of tunnel end-points.
Anchor oooooooooooooooooo Anchor oooo Mobile
Router ################## Router #### Router
|
====Mobile Network=======
Optimization in the Infrastructure 3.1 MR-to-CN Optimization
The C-Side Anchor Router will be subjected to the same condition as o Binding Update with Network Prefix
listed in the previous sub-section if packets sent from the CN to the
mobile network are to be route-optimized too. Otherwise, the
solution will only partially optimize routing to a triangular routing
(i.e. packet sent by CN will still go through the home agent of the
mobile network).
The anchor router share many similarities with the concept of A straight-forward approach to route optimization is in NEMO is
Mobility Anchor Point (MAP) proposed in Hierarchical MIPv6 (HMIPv6) for the mobile router to attempt route optimization with
[9]. In fact, it can be combined with HMIPv6 whereby each M-Side correspondent node. This can be viewed as a logical extension to
anchor router is also an MAP, and the MR obtains a regional NEMO Basic Support, where the mobile router would send binding
care-of-address from the MAP. updates to the correspondent node containing one or more Mobile
Network Prefix option. The correspondent node having received the
binding update, can then set up a bi-directional tunnel with the
mobile router at the current care-of address of the mobile router,
and inject a route to its routing table so that packets destined
for addresses in the mobile network prefix will be routed through
the bi-directional tunnel.
5. Nested Mobile Network This approach is particularly useful when a lot of MNNs in a
mobile network is communicating with a few corresponding nodes.
In such cases, a single binding update can optimize the routes of
many flows between the correspondent node and the MNNs.
5.1 Nested Tunnels Optimization o MR as a Proxy
This section covers the case where one mobile network is within A somewhat similar approach is for the mobile router to act as a
another mobile network. For example, a user brings a Personal Area "proxy" for the MNNs in its mobile network. In this case, The MR
Network (PAN) consisting of some IP devices to a train which is also uses standard MIPv6 route optimization procedure to bind the
using NEMO technology. In another example, a car which conatins a address of a MNN to its care-of address. This has the advantage
mobile network moves into the ferry which has another mobile network. of keeping the implementations of MNNs and correspondent nodes
This configuration of mobile networks within another mobile network unchanged, and can be done by having the mobile router to perform
is called nested Mobile Networks. the following steps:
Let us illustrate the problem by an example. In this example, the * determining when to perform RO (eg. by the flow packet count)
nested Mobile Network has a tree topology. In the tree each node is a
basic Mobile Network, represented by its MR.
+---------------------+ * sending CoTI and HoTI on behalf of the MNN
| Internet |---CN
+---------------|-----+
/ Access Router
MR3_HA |
======?======
MR1
|
====?=============?==============?===
MR5 MR2 MR6
| | |
=========== ===?========= =============
MR3
|
==|=========?== Net3
LFN1 MR4
|
=========
An example nested Mobile Network * receiving CoT (trivial, since it is addressed to the MR)
This example focuses on a Local Fixed Node (LFN) at depth 3 (in Net3) * intercepting the HoT (which requires inspection of the packets
inside the tree, represented by its mobile router MR3. The path to addressed to the MNN)
the Top Level Mobile Router (TLMR) MR1 and then the Internet is:
MR3 -> MR2 -> MR1 -> Internet * sending the BU and receiving the BA on behalf of MNN
Consider the case where a LFN belonging to Net3 sends a packet to a * inserting the Home Address Option in packets sent by the MNN
Correspondent Node (CN) in the Internet, and the CN replies back.
With no Nested Tunnels Optimization, we would have three * removing the type 2 routing header in packets sent to the MNN
bi-directional nested tunnels, as described in [3] and illustrated in
the following drawings:
-----------. * adjusting various ICMP packets to account for the modification
--------/ /-----------. it performs
-------/ | | /-----------
CN ------( - - | - - - | - - - | - - - | - - - (-------- LFN
MR3_HA -------\ | | \----------- MR3
MR2_HA --------\ \----------- MR2
MR1_HA ----------- MR1
No Nested Tunnels Optimization 3.2 Infrastructure Optimization
Such a solution introduces the following problems: There are two known approaches to achieve infrastructure
optimization. The first approach involves the introduction of an
entity known as a correspondent-side router (C-side Router), or
sometimes known simply as a correspondent router (CR) within the
routing infrastructure. As long as the correspondent router is
located "closer" to the correspondent node than the home agent of the
mobile router, the route between MNN and the correspondent node can
be said to have optimized. This is illustrated in Figure 4.
"Pinball" routing ************************** HAofMR
* #*#
* #*# +---------------------+
CN #*# | LEGEND |
o #*# +---------------------+
o ############### #*# | #: Tunnel |
CR ooooooooooooooo MR | *: NEMO Basic route |
############### | | o: Optimized route |
MNN +---------------------+
Both inbound and outbound packets will flow via the HAs of all the Figure 4: Infrastructure Optimization
MRs on their path within the NEMO, with increased latency, less
resilience and more bandwidth usage. To illustrate this effect,
the figure below shows the route taken by a packet sent from LFN
to CN:
+--> HAofMR1 ---------------------+ This form of optimization can take place independently for the 2
| | directions of the traffic:
+----------------- HAofMR2 <--+ |
| |
+---------------+ |
| V
HAofMR3 <------+ CN
|
|
LFN --> MR1 --> MR2 --> MR3
'Pinball' Routing o From MNN to CN
Packet size The mobile router locates the correspondent router, establishes a
tunnel with that correspondent router and sets a route to the
correspondent node via the correspondent router over the tunnel.
After this, traffic to the correspondent node does not flow
through the home agent anymore.
An extra IPv6 header is added per level of nesting to all the o From CN to MNN
packets. The header compression suggested in [4] cannot be applied
because both the source and destination (the intermediate MR and
its HA), are different hop to hop.
On the other hand, with a Nested Tunnel Optimization, we would have The correspondent router is on the path of the traffic from the
at most one bi-directional tunnel outside the Mobile Network, that correspondent node to the home agent. In addition, it has an
may depend on the traffic flow: established tunnel with the current care-of address of the mobile
router and is aware of the mobile network prefix(es) managed by
the mobile router. The correspondent router can thus intercept
packets going to the mobile network, and forward them to the
mobile router over the established tunnel.
__- --_ The advantage of this approach is that no additional functionality is
Tunnel---------------------------- MR1 ( Mobile ) MR3 required for the correspondent node and mobile network nodes.
CN ----------( - - - - - - - - - - ( - - - - )--------- LFN
Endpoint---------------------------- MR1 ( Network ) MR3
--___---
Nested Tunnels Optimization The second approach is to have optimizations carried out fully in
infrastructure. One example is to make use of mobile anchor points
(MAP) in HMIPv6 [10] to optimize routes between themselves. Another
example is to make use of the global HAHA protocol [11]. In this
case, proxy home agents are distributed in the infrastructure and
mobile routers bind to the closest proxy. The proxy performs, in
turn, a primary binding with a real home agent for that mobile
router. Then, the proxy might establish secondary bindings with
other home agents or proxies in the infrastructure, in order to
improve the end-to-end path. In this case, the proxies discover each
other, establish a tunnel and exchange the relevant mobile network
prefix information in the form of explicit prefix routes. There is
no need for return routability test or its like since the security is
built in the infrastructure, one way or an other, and the proxies
belong to the infrastructure.
The end-point of such a Tunnel on the Mobile side may either be MR1 3.3 Nested Tunnels Optimization
or MR3, depending on the solution. In the case of a Mobile Node
visiting Net3, that Mobile Node may also be the end-point.
The potential approaches for avoiding the nesting of tunnels include: Nested tunnels optimization is targeted at nested mobile networks,
where there will be multiple levels of MR-HA tunnels with NEMO Basic
Support. Such a solution will seek to minimize the number of
tunnels, possibly by collapsing the amount of tunnels required
through dome form of signaling between the mobile routers and home
agents. This ameliorate the amplification effect of tunnel nesting,
and at best, the performance of a nested mobile network will be the
same as though there were no nesting of mobile networks.
Mobile Aggregation There have been various proposals on nested tunnels optimization, and
we can model them according to:
This model applies to a category of problems were the Mobile o Sending Information of Upstream Mobile Routers
Networks share a same administration and consistently move
together (e.g. a fleet at sea). In this model, there is a cascade
of Home Agents.
The main Home Agent is fixed in the infrastructure, and advertises This involves sending information on upstream mobile router(s) to
an aggregated view of all the Mobile Networks. This aggregation is the home agent of a nested mobile router, thereby enabling the
actually divided over a number of Mobile Routers, the TLMRs. The home agent to forward tunneled packets directly to the nested
TLMRs subdivide some of their address space to the other Mobile mobile router via the upstream mobile router(s), skipping the home
Routers forming their fleet, for which they are Home Agent. agents of upstream mobile router(s). This usually involves the
use of a routing header to route packets through the upstream
mobile router(s).
As Home Agents, the TLMRs terminate MIP Tunnels from the inside of The information of upstream mobile router (for simplicity, we
the Mobile Network. As Mobile Router, they also terminate their refer to it as "upstream information") may contain information on
home Tunnels. As routers, they forward packets between the 2 the entire chain of upstream mobile routers, or it may only
tunnels. contain information on the immediate parent mobile router. For
the former, the home agent can build a multihop routing header
from a single transmission of the information. For the latter,
each upstream mobile router may have to send binding update to the
home agent of the nested mobile router, thereby enabling the home
agent of the nested mobile router to build a multihop routing
header recursively.
Surrogate o Prefix Delegation
The TLMR acts as a proxy in the MIP registration, in a fashion of An alternative approach to nested tunnels optimization is to use
MIPv4 Foreign Agent or HMIP MAP (see [9]). For instance, the TLMR prefix delegation. Here, each mobile router in a nested mobile
maintains a Tunnel to each MR, a Tunnel to the HA of each MR, and network is delegated a mobile network prefix from the access
switches packets between the two. router using DHCP Prefix Delegation [12]. Each mobile router also
autoconfigures its care-of address from this delegated prefix. In
this way, the care-of addresses of each mobile router are all from
an aggregatable address space starting from the access router.
This may be used to eliminate any nesting of tunnels. It may also
be used to achieve MIPv6-over-NEMO optimization (see Section 3.4)
if MIPv6 hosts autoconfigure their care-of addresses from the
prefix as well.
Internal Routing and gateway o Mobile Aggregation
This item can be approached from a MANET standpoint. This was This model applies to a category of problems where the mobile
already done for DSR (see [10]) and AODV (see [11] and [8]) From a networks share a same administration and consistently move
Nemo standpoint, a full MANET is not necessary since the goal is together (e.g. a fleet at sea). In this model, there is a
to find a way to the infrastructure, as opposed to any-to-any cascade of home agents. The main home agent is fixed in the
connectivity. infrastructure, and advertises an aggregated view of all the
mobile networks. This aggregation is actually divided over a
number of mobile routers, the root-MRs. The root-MRs subdivide
some of their address space to the other mobile routers forming
their fleet, for which they are home agent. As home agents, the
root-MRs terminate tunnels from the inside of the mobile network.
As mobile router, they also terminate their home tunnels. As
routers, they forward packets between the 2 tunnels.
RRH 3.4 MIPv6-over-NEMO Optimization
The Reverse Routing Header (RRH) approach avoids the multiple MIPv6-over-NEMO optimization involves providing optimization for a
encapsulation of the traffic but maintains the home tunnel of the visiting mobile node within a mobile network. There are two aspects
first MR on the egress path. It is described in details in [5]. to MIPv6-over-NEMO optimization:
The first MR on the way out (egress direction) encapsulates the
packet over its reverse tunnel, using a form of Record Route
header, the RRH.
The next MRs simply swap their CoA and the source of the packet, o Nested Tunnels
saving the original source in the RRH. The HA transforms the RRH
in a Routing Header to perform a Source Routing across the nested
Mobile Network, along the ingress path to the target MR.
Access Router Option This aims to reduce the amplification effect of nested tunnels due
to the nesting of the tunnel between the visiting mobile node and
its home agent within the tunnel between the mobile router of the
mobile network and the home agent of the mobile router.
The Access Router Option (ARO) approach [6] is somewhat similar to This is very similar to "Nested Tunnels Optimization" described in
the RRH in that only the home tunnel of the first MR in the egress Section 3.3. Thus, a possible approach is to extend the solution
path is maintained. This is done by having MR to send an ARO in for nested tunnels optimization to visiting mobile node as well.
Binding Update to inform its HA the address of its access router.
Using this information, HA can build a Routing Header to
source-route a packet to the target MR within in a nested mobile
network. Details can be found in [6].
Prefix delegation approach o MIPv6 Route Optimization
The prefix delegation approach [7] is somewhat to HMIPv6 what Nemo This aims to remove the sub-optimality of a MR-HA tunnel from the
is to MIPv6. The Access Router of the nested structure is both a MIPv6 route optimization established between a visiting mobile
Nemo Home Agent and a DHCP-PD server, for an aggregation that it node and correspondent node. One approach is to simply extend the
owns and advertises to the Infrastructure. When visiting the solution for nested tunnels optimization to correspondent node.
nested structure, each MR is delegated a mobile network prefix Another (arguably "evil") approach is for the mobile router to
from the AR using DHCP-Prefix Delegation. The MR registers this "play some trick" to the MIPv6 route optimization, such as
delegated MNP to the AR that is acting as a Nemo Home Agent. The altering messages exchanged during the return routability
MR also autoconfigures an address from the delegated MNP and uses procedure between the visiting mobile node and correspondent node,
it as a CareOf to register its own MNPs to its own Home Agent so that packets sent from correspondent node to the visiting
using Nemo basic support. It is possible for a MR to protect its mobile node will be routed to the care-of address of the mobile
own MNPs while advertising in the clear the local MNP for other router once route optimization is established (see Section 3.1:
MRs to roam in. This allows a strict privacy of visited and "MR as a Proxy"). Alternatively, the mobile router can perform
visitors, and enables some specific policies in each Mobile return routability procedure on behalf of the visiting mobile
Router. Details can be found in [7]. node. This would most likely require some signaling protocol
between the visiting mobile node and the mobile router, but may be
able to keep the functionality of the correspondent node
unchanged.
5.2 Route Optimization inside the Nested Mobile Network 3.5 Intra-NEMO Optimization
Although optimization within a mobile network is not within the A route optimization solution may seek to improve the communications
charter of the NEMO working group, it might be insightful to discuss between two mobile network nodes within a nested mobile network. An
such optimizations. example will be the optimization of packets route taken between LFN1
and LFN2 of Figure 1.
The expectation is that the mobile routes installed by NEMO can One may be able to extend a well-designed solution for MR-to-CN
cohabit with a MANET support that would perform the RO inside the optimization to provide Intra-NEMO optimization, where, for example
Nested Mobile Network. In other words, MIP redistributes its prefixes in Figure 1, LFN1 is treated as a correspondent node in the view of
locally to a MANET and the MR-HA tunnel is bypassed. MR5, and LFN2 is treated as a correspondent node in the view of MR3.
6. General Considerations Another possibility is for the infrastructure optimization technique
to be applied here. Using the same example of communication between
LFN1 and LFN2, MR3 may treat MR5 as a correspondent router for LFN2,
and MR5 treats MR3 as a correspondent router for LFN1.
6.1 Securing the protocol in nested tunnels optimization 4. Analysis of Solution Space
These approaches are generally difficult to secure unless all the In this section, we present an analysis of the solution space.
Mobile Routers and Visiting Mobile Node belong to a same First, we discuss the general issues that will be faced by a NEMO
administrative domain and share predefined Security Associations. Extended Support solution in Section 4.1. Then, we explore deeper
into specific types of route optimization solutions in Section 4.2.
Even if an intermediate MR is 'trusted', this does not prove it is 4.1 General Considerations of RO Solution
able to provide the necessary bandwidth, and may not provide a good
service. Eventually, a MR that is capable of securing (IPSec) its
traffic may select a Mobile Access Router based on quality of service
heuristics as opposed as trust.
The problem is global to the whole Mobile Network in the case of a Although route optimization, or NEMO Extended Support, can bring
MANET-based solution. For an RRH-based solution, the threat comes benefits as described in previous section, it does so with some
from on-axis MRs in the nested Mobile Network but is mostly limited tradeoffs. The actual type and degree of tradeoffs depend greatly on
to denial of service. This is detailed in [5]. The approach taken is the solution; however, in general, one would expect the costs
to limit the threat to Black Hole and Grey Hole by using IPSec. described in the following sub-sections to be incurred.
6.2 Recursive complexity in route optimization 4.1.1 Additional Signaling Overhead
A number of drafts and publications suggest -or can be extended to- a The nodes involved in performing route optimization would be expected
model where the Home Agent and any arbitrary Correspondent would to exchange additional signaling information in order to establish
actually get individual binding from the chain of nested Mobile route optimization. The cost of such signaling may be high,
Routers, and form a routing header appropriately. depending on the actual solution. Such a cost may scale to
unacceptable height when the number of mobile network nodes and/or
correspondent nodes is increased.
An intermediate MR would keep track of all the pending communications This signaling overhead is often in the form of binding update sent
between hosts in its subtree of Mobile Networks and their CNs, and a to home agents or correspondent nodes. One issue that may impact
binding message to each CN each time it changes its point of route optimization solution is known as the phenomenon of "Binding
attachment. Update Storm". This occurs when a change in point of attachment of
the mobile networks is accompanied with a sudden burst of binding
update messages being generated, resulting in temporary congestion,
packet delays or even packet lost.
If this was done, then each CN, by receiving all the binding messages There has been argument that binding update storm may not be as
and processing them recursively, could infer a partial topology of significant as it seems. For instance, consider a mobile network
the nested Mobile Network, sufficient to build a multi-hop routing where mobile network nodes is receiving x video stream at 25 packets
header for packets sent to nodes inside the nested Mobile Network. per seconds. On the average, the mobile network is handling a total
traffic of 25*x packets per second. Assuming one binding update has
to be sent for each video stream server, a change in point of
attachment would result in at most 6*x signaling messages (if we
include the return routability procedure messages and a binding
acknowledgment). Thus the signaling overhead is small compared to
the normal data traffic that the mobile network is handling, and
hence the effect of binding update storm is small. On the other
hand, if the normal data rate is small, the effect of binding update
storm may have a greater impact. From this discussion, it appears
that the significance of binding update storm may depend on the
application type (eg. high or low data rate, tolerance on packets
delay, etc).
However, this extension has a cost: It is also possible to further moderate the effect of Binding Update
Storm by having some sort of "exponential back-off" mechanism in
place for the sending of binding updates. Such a scheme aims to
spread the burst of binding update transmissions over a longer period
of time, thereby reducing possibility of congestion and packet drops.
1. Binding Update storm 4.1.2 Increased Protocol Complexity
when one MR changes its point of attachment, it needs to send a Some nodes will be required to have additional functionalities in
BU to all the CNs of each node behind him. When the Mobile order to incorporate NEMO Extended Support. This increases the node
Network is nested, the number of nodes and relative CNs can be complexity. It may not be feasible to implement new functionalities
huge, leading to congestions and drops. on legacy nodes. If such nodes are mobile, this may prove to be a
significant cost due to the limited memory resources such devices
usually have.
2. Protocol Hacks Coupled with the increased in protocol complexity, nodes that are
involved in the establishment and maintenance of route optimization
will have to bear increased processing load. If such nodes are
mobile, this may prove to be a significant cost due to the limited
power and processing resources such devices usually have.
Also, in order to send the BUs, the MR has to keep track of all 4.1.3 Mobility Awareness
the traffic it forwards to maintain his list of CNs. In case of
IPSec tunneled traffic, that CN information may not be available.
3. CN operation One advantage of NEMO Basic Support is that the correspondent nodes
and mobile network nodes need not be aware of the actual location and
mobility of the mobile network. With route optimization, it might be
necessary to reveal the current care-of address and any change of
point of attachment of the mobile router to other nodes, such as the
mobile network nodes or correspondent node. This may mean a tradeoff
between location privacy and route optimization. In MIPv6, the
mobile node can decide whether or not to perform route optimization
with a given correspondent node. Thus, the mobile node is in control
of whether to trade location privacy for an optimized route. It will
be desirable that such control is also available in a route optimized
solution of NEMO should the solution contain the same tradeoff.
However, for solutions where route optimization decision is made by
mobile router, it will be difficult for mobile network nodes to
control the decision of having this tradeoff.
The computation burden of the CN becomes heavy, because it has to 4.1.4 New Functionalities
analyze each BU in a recursive fashion in order to infer nested
Mobile Network topology required to build a multi hop routing
header.
4. Missing BU All route optimization approaches require some sort of new
functionalities be implemented on some nodes. In general, it is
desirable to keep the number of nodes that require new
functionalities to be kept as small as possible. This allows for
easier adoption of the solution, and also creates less impact on the
existing infrastructure.
If a CN doesn't receive the full set of PSBU sent by the MR, it In addition, if route optimization solution requires new
will not be able to infer the full path to a node inside the functionalities on the part of some other nodes other than nodes
nested Mobile Network. The RH will be incomplete and the packet within the mobile network, a mechanism for other nodes (such as
may or may not be delivered. mobile router) to detect if support for the new functionalities are
available should also be provided. Furthermore, it is desirable for
there to be a graceful fall back procedure the required
functionalities are unavailable.
5. Obsolete BU Possible nodes that are required to be changed includes:
If the Binding messages are sent asynchronously by each MR, then, o Local Fixed Nodes
when the relative position of MRs and/or the TLMR point of
attachment change rapidly, the image of Mobile Network that the
CN maintains is highly unstable. If only one BU in the chain is
obsolete due to the movement of an intermediate MR, the
connectivity may be lost.
6.3 Mobile Access router selection It is generally undesirable to affect local fixed nodes. However,
some approaches require mobile network nodes to implement new
functionalities to enjoy benefits of route optimizations.
In some case, nested Mobile Networks attaches to visiting network o Visiting Mobile Nodes
with multiples mobile access router that are gateways to the global
internet. These RO methods may cover the function in which how the MR
in the nested Mobile Network choose the one of the mobile access
routers. This function is not explicitly described in current
methods and needs to be discussed.
6.4 Mobility transparency and RO Visiting mobile nodes in general should already have implemented
MIPv6 functionalities, and since MIPv6 is a relatively new
standard, there is still a considerable window to allow mobile
devices to implement new functionalities.
[cwng's interpretation of Mobility Transparency in RO] o Mobile Routers
It is desirable in mobility-related protocols that the mobility of a It is expected for mobile routers to implement new functionalities
mobile node is transparent to other entities and other layers in the in order to enable route optimizations.
mobile node. The Basic NEMO support achieve this mobility
transparency of the mobile network to the MNNs by a MR-HA tunnel so
that MNNs need not be aware of the MR's change in point of
attachment.
Such a feature is, as mentioned, desirable. However, when route o Access Routers
optimizations, end-to-end principle, and other factors come into
consideration, achieving mobility transparency may not be practical.
For instance, to achieve nested tunnel optimizations, the mobility of Some approaches require access routers, or nodes in the access
the top-level MR is often exposed to other entities, such as the HA network to implement some new functionalities. A clear example
of a nested MR. In the case of MR performing BU for MNNs, it might will be prefix delegation approach.
be necessary to pass mobility information of the MR to CN (and even
MNN) in order not to break the end-to-end principle. For the
scenario of optimization using infrastructure, the mobility
information might be necessarily exposed to correspondent routers or
MAP.
Thus, one should bear in mind when designing RO solution that a o Home Agents
sacrifice might be necessary when weighing conflicting factors such
as mobility transparency, optimization level, and end-to-end
integrity.
[Hosik's interpretation of Mobility Transparency in RO] Although it is likely that vendors and operators would not mind
having new functionalities in home agents, few route optimizations
approaches would impact the home agents.
In the case of extended support of NEMO such as nested NEMO, mobility o Correspondent Nodes
transparency is desirable but that is not mandatory for the
efficiency of the route optimization. For example, the notebook and
PDA inside a vehicle can access to the Internet through the mobile
router of the vehicle. In that case, if the movement of the vehicle
affects to the notebook or the PDA, they can perform individual
binding update operation to the correspondent node or its home agent
but that can cause location privacy problem.
[Onishi's interpretation of Mobility Transparency in RO] It is generally undesirable for correspondent nodes to be required
to implement new functionalities.
In RO solutions, MR can optimize the route between its own HA and MR. o Correspondent Routers
It is desirable that communication can not be interrupted by this
route optimization. ????
6.5 Multihoming Considerations Correspondent routers are new entity to be deployed in the
infrastructure. Such addition would generally cause the least
disruption to the existing routing infrastructure.
In multihomed mobile networks, route optimization is dependant on how 4.1.5 Other Considerations
the connections to the Internet are available and selected.
In case of macro mobility, we may have multiple HAs from place to There are other considerations when analyzing the route optimization
place. New route optimization could be possible by routing between CN solution space. These may not be a 'tradeoff" so to speak, but are
and one of the multiple Home Agents (possibly using differenc Home beneficial to keep in mind when considering a route optimization
Addresses). solutions.
When multiple connections are available for the purpose of fault o Compatibility with NEMO Basic Support
tolerance, a selection mechanism is needed for CN to eveluate the
connection availability in order to perform route optimization.
7. Conclusion It will be beneficial to vendors if a route optimized solution for
NEMO is compatible with NEMO Basic Support. This reduces the
complexity and achieves greater reuse of existing functionalities.
The Problem space of Route Optimization in the NEMO context is o In-Plane Signaling versus Off-Plane Signaling
multifold and can be split is several work areas. It will be
There is also considerations of whether route optimization
signaling should be done in-plane and off-plane. In-plane
signaling involves embedding signaling information into headers of
data packets (a good example would be the Reverse Routing Header
[13]). Off-plane signaling involves separating the signaling
packets from the data packets. Most proposals involving sending
of binding updates fall within this category.
4.2 Specific Types of RO Solution
Many of the tradeoffs discussed previously in Section 4.2 are
dependent on the actual route optimization approach. In the
following sub-sections, we will explore deeper into the issues
involved in each specific type of route optimization approach.
4.2.1 MR-to-CN Optimization
One approach of MR-to-CN optimization involves the mobile router
sending binding update messages with mobile network prefix
information to the correspondent node. This raised several issues:
o Security Considerations
With mobile router sending binding update containing network
prefix information to correspondent node, there is a question on
the additional risk imposed on the correspondent node. Although
return routability procedure allows the correspondent node to
verify that the care-of and home addresses of the mobile router
are indeed collocated, it does not allow the correspondent node to
verify the validity of the network prefix. If the correspondent
node accepts the binding without verification, it will be exposed
to a class of attacks where the attacker tricks the correspondent
node into forwarding packets destined for a mobile network to the
attacker.
Hence, MR-to-CN optimization would most likely require an extended
return routability procedure to be developed for correspondent
node to authenticate the validity of the mobile network prefix.
This require additional functionality on the correspondent node,
and a mechanism must be provided for the mobile router to check if
the correspondent node has such functionality implemented.
o Mobility Awareness
By sending binding update with mobile network prefix to the
correspondent node, the mobile router is effectively revealing the
location and mobility of the mobile network to the correspondent
node. Hence this is a case of trading location privacy for route
optimization. However, since route optimization in this case is
initiated by the mobile router, the mobile network nodes may not
have an influence to the decision of whether the tradeoff should
be made.
o Binding Update Storm
If the mobile network nodes in a mobile network are communicating
with a lot of correspondent nodes, whenever the mobile router
changes its point of attachment, it needs to send out a large
number of binding updates to correspondent nodes. This is further
worsen by the fact that the mobile router has to perform the
return routability procedure prior to sending binding updates.
Another approach involves the mobile router acting as a proxy for
MNNs behind it. This has the following issues:
o Security Considerations
Having the mobile router alters packets (such as inserting home
address destination option and removing type 2 routing header)
raise considerable security concerns. Such a scheme may break
existing IPSec protocols, and cause packets to be dropped.
o Complexity
This also greatly increases the complexity of a mobile router, as
it needs to look beyond the standard IPv6 headers for
ingress/egress packets, and performs hacks appropriately. The
mobile router is also required to maintain some form of state
information for each pair of MNN and CN, resulting in scaling
issues. This scheme also places all processing burden on the
mobile router, which may be undesirable for mobile device with
limited power and processing resources.
o Binding Update Storm
Whenever the mobile router changes its point of attachment, it
needs to perform binding updates with every correspondent node.
Some CN selection scheme may be required to moderate the effect of
binding update storm and processing burden on the mobile router.
o A Hack of Existing Protocol
There have been comments on the NEMO WG mailing list that such an
approach is essentially a hack of the existing return routability
procedure. The disadvantages of it being a hack is that firstly a
change/extension in the current return routability procedure would
render this hack broken, and secondly, it might be very difficult
to accommodate other protocols that are not aware of such hacks
(IPSec being an excellent example).
o Nesting of Mobile Routers
Should one mobile router be attached to another mobile router, it
is unclear how this solution will work if both mobile routers try
to perform route optimization on behalf of the same mobile network
node. Using Figure 1 as an example, if MR5 perform route
optimization on behalf of LFN2, and then MR1 again tries to act as
a proxy to MR5, the results might be messy without any
co-ordination between these mobile routers.
4.2.2 Infrastructure Optimization
An infrastructure optimization approach using correspondent routers
may face the following issues:
o Security Considerations
The first security-related issue is how do the mobile router
verify the validity of a correspondent router. In other words,
the mobile router needs some mechanism to ascertain that the
correspondent router is indeed a valid correspondent router
capable of forwarding packets to and from the correspondent node.
A second security-related issue is how can the correspondent
router verify the validity of a mobile router. In other words,
the correspondent router needs some mechanism to ascertain that
the mobile router is indeed managing the mobile network prefix it
claims to be managing. This is related to the issues discussed in
Section 4.2.1.
o Mobility Awareness
Infrastructure optimization requires the correspondent router to
be informed of the location and mobility of the mobile network.
Correspondent nodes and mobile network nodes remain ignorant of
the mobile network's mobility.
o Discovery of Correspondent Routers
How should a mobile router discover a correspondent router given a
particular correspondent node? The discovery mechanism may have
impact on the security issue discussed earlier.
4.2.3 Nested Tunnels Optimization
Nested tunnels optimization usually involves the nested mobile router
sending information of upstream mobile router(s).
o Security Considerations
One issue for consideration is whether the home agent should trust
the upstream information supplied by the nested mobile router. If
the upstream information falsely points to a victim node, the home
agent may unconsciously flood the victim with packets intended for
the nested mobile network.
This risk can be minimized if the upstream information is
protected by security association between the nested mobile router
and its home agent (e.g. the upstream information may be
transmitted in a binding update that is protected from tampering).
However, this does not protect against a malicious mobile router
intentionally supplying false upstream information to its home
agent, with the intent of launching a flooding attack against a
victim node.
o Mobility Awareness
Usually, nested tunnels optimization involves the nested mobile
router sending upstream information to its home agent. This
implies that the upstream mobile router will have to reveal some
information to sub-mobile routers. Such information may reveal
the location and mobility of the upstream mobile router.
o Binding Update Storm
Depending on the specifics of a solution for nested tunnels
optimization, the upstream information may be the care-of address
of the upstream mobile router. This will leads to the a burst of
binding update messages whenever an upstream mobile router changes
its point of attachment, since all its sub-MRs must send binding
updates to their home agents to update the new upstream
information.
o Complexity
Sending of upstream information for nested tunnels optimization
requires the home agent to store the upstream information in order
to build a routing header. Complexity of the home agent is
further increased if the upstream information is sent individually
by all upstream mobile routers, requiring the home agent to
recursively build a routing header.
Alternatively, a prefix delegation approach may be used to achieve
nested tunnel optimization by eliminating the need for nesting. This
approach may face the following issues:
o Protocol Complexity
This approach requires the access router (or some other entity
within the access network) to possess prefix delegation
functionality, and also maintains information on what prefix is
delegated to which node.
o Binding Update Storm
A change in the point of attachment of the root mobile router will
require every nested mobile router (and possibly visiting mobile
nodes) to change their care-of addresses and delegated prefixes.
These will cause a burst of binding update and prefix delegation
activities where every mobile routers and visiting mobile nodes
start sending binding updates to their home agents and possibly
correspondent nodes.
4.2.4 MIPv6-over-NEMO Optimization
If MIPv6 route optimization is not used, the optimization for
MIPv6-over-NEMO is very similar to nested tunnels optimization, where
the MIPv6 mobile node acts like a visiting mobile router. The
analysis of such optimization is thus similar to those discussed in
Section 4.2.3, and hence will not be repeated here. In this section,
we explore the issues if MIPv6 route optimization is used.
As described in Section 3.4, MIPv6-over-NEMO optimization can be
achieved using various approaches. One approach involves including
upstream information (see nested tunnels optimization) in the binding
update sent from the visiting mobile node to the correspondent node.
This approach has the following considerations:
o Security Considerations
A security-related issue is how can the correspondent node verify
the validity of the supplied upstream information. See also
Section 4.2.3.
o Mobility Awareness
The visiting mobile node will need to acquire the upstream
information, most likely including the mobility and location
information of the upstream mobile routers.
On the other hand, the mobile router can perform some hacks on the
return routability messages exchanged between the visiting mobile
node and correspondent node to achieve MIPv6-over-NEMO optimization.
This, is generally undesirable due to:
o Security Considerations
Such a scheme may break existing security related protocols, as it
requires the mobile router to make changes to contents of a packet
that is not originated by the mobile router.
Alternatively, the mobile router can perform return routability
procedure on behalf of the visiting mobile node. Here the issues
are:
o Security Considerations
Such a scheme require the visiting mobile node to place
considerable trust on the mobile router, as the mobility
management key is now transfered to the mobile router.
o Mobility Awareness
This approach aims to keep the functionality of the correspondent
node to be identical as those required by MIPv6 route
optimization. The expense will be that a new form of signaling
between the visiting mobile node and mobile router would most
likely be required.
o Processing Burden
This approach also increases the processing burden of the mobile
router, as it needs to maintain information necessary for route
optimization to work for every correspondent node that is
communicating with each visiting mobile node. This may not scale
very well when one consider, for example, a train network, where
there are hundreds of visiting mobile nodes in one mobile network.
4.2.5 Intra-NEMO Optimization
As mentioned in Section 3.5, it is likely that any MR-to-CN
optimization may be able to fulfill the role of an intra-NEMO
optimization. Such solutions will face the same issues as described
in Section 4.2.1, as well as the following:
o Reliance on Outside Infrastructure
Most MR-to-CN optimization rely on the operations of home agent in
one way or another. For instance, the return routability
procedure requires a Home Test (HoT) or Home Test Init (HoTI)
messages be forwarded by the home agent. This means that should
the path to the Internet be broken, such optimization techniques
can no longer be used (and thus LFN1 can no longer communicates
with LFN2 in the example of Figure 1).
5. Conclusion
The problem space of route optimization in the NEMO context is
multifold and can be split into several work areas. It will be
critical, though, that the solution to a given piece of the puzzle be critical, though, that the solution to a given piece of the puzzle be
compatible and integrate smoothly with the others. compatible and integrate smoothly with the others.
Hopefully, the solutions will build on MIPv6 ([1]), as recommended by This memo explored into various problems of sub-optimality of NEMO
the NEMO Charter. On the other hand, MIPv6 seems to be evolving in a Basic Support, and discussed different aspects of a route optimized
direction that makes it more and more difficult to provide a NEMO solution in NEMO. The intent of this document is to trigger fruitful
solution with backward compatibility, since: discussions that in turn will enhance our common understanding of the
route optimization problem and solution space.
1) The RR test prevents a MR-LFN dichotomy on the Mobile Side, 6. Acknowledgments
2) The RR test has no negotiable option and is not open for The authors wish to thank: Greg Daley, Thierry Ernst, Erik Nordmark,
extension, and T.J. Kniveton, Alexandru Petrescu, Hesham Soliman, Ryuji Wakikawa
and Patrick Wetterwald for their various contributions. In addition,
the authors would also like to extend their heart-felt gratitude to
Marco Molteni, who was a co-author for the earlier versions of this
document.
3) The HaO and RH type 2 are designed for a collocated CareOf 7 References
Address. More specifically, they are not designed to be multi-hop as
RRH is, and not extensible, though RRH can be considered as an
extension of HAO.
The authors intent is to trigger fruitful discussions that in turn [1] Devarapalli, V., "Network Mobility (NEMO) Basic Support
will enhance our common understanding of the problem space so that at Protocol", draft-ietf-nemo-basic-support-03 (work in progress),
some point, this paper turns into a problem statement for the Nemo June 2004.
Route Optimization.
8. Acknowledgements [2] Johnson, D., Perkins, C. and J. Arkko, "Mobility Support in
IPv6", RFC 3775, June 2004.
The authors wish to thank: Greg Daley, Thierry Ernst, Hiroyuki [3] Manner, J. and M. Kojo, "Mobility Related Terminology", RFC
Ohnishi, T.J. Kniveton, Alexandru Petrescu, Hesham Soliman, Ryuji 3753, June 2004.
Wakikawa and Patrick Wetterwald for their various contributions.
References [4] Ernst, T. and H. Lach, "Network Mobility Support Terminology",
draft-ietf-nemo-terminology-01 (work in progress), February
2004.
[1] Johnson, D., Perkins, C. and J. Arkko, "Mobility Support in [5] Ernst, T., "Network Mobility Support Goals and Requirements",
IPv6", draft-ietf-mobileip-ipv6-24 (work in progress), July draft-ietf-nemo-requirements-02 (work in progress), February
2003. 2004.
[2] Ernst, T. and H. Lach, "Network Mobility Support Terminology", [6] Zhao, F., Wu, F. and S. Jung, "NEMO Route Optimization Problem
draft-ietf-nemo-terminology-00 (work in progress), May 2003. Statement, Requirements and Evaluation Considerations",
draft-zhao-nemo-ro-ps-00 (work in progress), October 2004.
[3] kniveton, t., "Mobile Router Support with Mobile IP", [7] Watari, M. and T. Ernst, "Route Optimization with Nested
draft-kniveton-mobrtr-02 (work in progress), July 2002. Correspondent Nodes", draft-watari-nemo-nested-cn-00 (work in
progress), October 2004.
[4] Deering, S. and B. Zill, "Redundant Address Deletion when [8] Deering, S. and B. Zill, "Redundant Address Deletion when
Encapsulating IPv6 in IPv6", Encapsulating IPv6 in IPv6",
draft-deering-ipv6-encap-addr-deletion-00 (work in progress), draft-deering-ipv6-encap-addr-deletion-00 (work in progress),
November 2001. November 2001.
[5] Thubert, P. and M. Molteni, "IPv6 Reverse Routing Header and [9] Na, J., "Generic Route Optimization Model for NEMO Extended
Support", draft-na-nemo-gen-ro-model-00 (work in progress),
July 2004.
[10] Soliman, H., Castelluccia, C., Malki, K. and L. Bellier,
"Hierarchical Mobile IPv6 mobility management (HMIPv6)",
draft-ietf-mipshop-hmipv6-02 (work in progress), June 2004.
[11] Thubert, P., "Global HA to HA protocol",
draft-thubert-nemo-global-haha-00 (work in progress), October
2004.
[12] Droms, R. and O. Troan, "IPv6 Prefix Options for DHCPv6",
draft-troan-dhcpv6-opt-prefix-delegation-01 (work in progress),
May 2002.
[13] Thubert, P. and M. Molteni, "IPv6 Reverse Routing Header and
its application to Mobile Networks", its application to Mobile Networks",
draft-thubert-nemo-reverse-routing-header-04 (work in draft-thubert-nemo-reverse-routing-header-05 (work in
progress), February 2004. progress), June 2004.
[6] Tanaka, T. and C. Ng, "Securing Nested Tunnels Optimization [14] Ng, C. and J. Hirano, "Extending Return Routability Procedure
with Access Router Option", for Network Prefix (RRNP)", draft-ng-nemo-rrnp-00 (work in
draft-ng-nemo-access-router-option-00 (work in progress), progress), October 2004.
November 2002.
[7] Droms, R. and P. Thubert, "DHCPv6 Prefix Delegation for NEMO", [15] Bernardos, C., Bagnulo, M. and M. Calderon, "MIRON: MIPv6 Route
draft-droms-nemo-dhcpv6-pd-01 (work in progress), February Optimization for NEMO", ASWN 2004, Online:
http://www.it.uc3m.es/cjbc/papers/miron_aswn2004.pdf.
[16] Ng, C. and T. Tanaka, "Securing Nested Tunnels Optimization
with Access Router Option",
draft-ng-nemo-access-router-option-01 (work in progress), July
2004. 2004.
[8] Wakikawa, R., "Global Connectivity for IPv6 Mobile Ad Hoc [17] Na, J., "Route Optimization Scheme based on Path Control
Networks", draft-wakikawa-manet-globalv6-03 (work in progress), Header", draft-na-nemo-path-control-header-00 (work in
October 2003. progress), April 2004.
[9] Soliman, H., Castelluccia, C., Malki, K. and L. Bellier, [18] Wakikawa, R., "Optimized Route Cache Protocol (ORC)",
"Hierarchical MIPv6 mobility management (HMIPv6)", draft-wakikawa-nemo-orc-00 (work in progress), July 2004.
draft-ietf-mobileip-hmipv6-06 (work in progress), July 2002.
[10] Johnson, D., "The Dynamic Source Routing Protocol for Mobile Ad [19] Na, J., "Secure Nested Tunnels Optimization using Nested Path
Hoc Networks (DSR)", draft-ietf-manet-dsr-09 (work in Information", draft-na-nemo-nested-path-info-00 (work in
progress), April 2003. progress), September 2003.
[11] Perkins, C., Royer, E. and S. Das, "Ad Hoc On Demand Distance [20] Kang, H., "Route Optimization for Mobile Network by Using
Vector (AODV) Routing", draft-ietf-manet-aodv-11 (work in Bi-directional Between Home Agent and Top Level Mobile
progress), July 2002. Router", draft-hkang-nemo-ro-tlmr-00 (work in progress), June
2003.
[12] Postel, J., "Internet Protocol", STD 5, RFC 791, September [21] Ohnishi, H., "HMIP based Route optimization method in a mobile
1981. network", draft-ohnishi-nemo-ro-hmip-00 (work in progress),
October 2003.
[13] Deering, S. and R. Hinden, "Internet Protocol, Version 6 (IPv6) [22] Paakkonen, P. and J. Latvakoski, "Mobile Network Prefix
Specification", RFC 2460, December 1998. Delegation extension for Mobile IPv6",
draft-paakkonen-nemo-prefix-delegation-00 (work in progress),
March 2003.
Authors' Addresses [23] Droms, R. and P. Thubert, "DHCPv6 Prefix Delegation for NEMO",
draft-droms-nemo-dhcpv6-pd-01 (work in progress), February
2004.
Pascal Thubert [24] Lee, K., "Route Optimization for Mobile Nodes in Mobile Network
Cisco Systems Technology Center based on Prefix Delegation", draft-leekj-nemo-ro-pd-02 (work
Village d'Entreprises Green Side in progress), February 2004.
400, Avenue Roumanille
Biot - Sophia Antipolis 06410
FRANCE
EMail: pthubert@cisco.com [25] Jeong, J., "ND-Proxy based Route Optimization for Mobile Nodes
in Mobile Network", draft-jeong-nemo-ro-ndproxy-02 (work in
progress), February 2004.
Marco Molteni [26] Perera, E., "Extended Network Mobility Support",
Cisco Systems Technology Center draft-perera-nemo-extended-00 (work in progress), July 2003.
Village d'Entreprises Green Side
400, Avenue Roumanille
Biot - Sophia Antipolis 06410
FRANCE
EMail: mmolteni@cisco.com Authors' Addresses
Chan-Wah Ng Chan-Wah Ng
Panasonic Singapore Laboratories Pte Ltd Panasonic Singapore Laboratories Pte Ltd
Blk 1022 Tai Seng Ave #06-3530 Blk 1022 Tai Seng Ave #06-3530
Tai Seng Industrial Estate Tai Seng Industrial Estate
Singapore 534415 Singapore 534415
SG SG
Phone: +65 65505420
EMail: cwng@psl.com.sg EMail: cwng@psl.com.sg
Pascal Thubert
Cisco Systems Technology Center
Village d'Entreprises Green Side
400, Avenue Roumanille
Biot - Sophia Antipolis 06410
FRANCE
EMail: pthubert@cisco.com
Hiroyuki Ohnishi Hiroyuki Ohnishi
NTT network service systems laboratories, NTT cooperation NTT network service systems laboratories, NTT cooperation
9-11, Midori-Cho 3-Chome 9-11, Midori-Cho 3-Chome
Musashino-shi Musashino-shi
Tokyo 180-8585 Tokyo 180-8585
JAPAN JAPAN
EMail: ohnishi.hiroyuki@lab.ntt.co.jp EMail: ohnishi.hiroyuki@lab.ntt.co.jp
Eun Kyoung Paik
Seoul National University
Shillim-dong, Kwanak-gu
Seoul 151-744
KOREA
EMail: eun@mmlab.snu.ac.kr Paik, Eun Kyoung
KT
Portable Internet Team, Convergence Lab., KT
17 Woomyeon-dong, Seocho-gu
Seoul 137-792
Korea
Phone: +82-2-526-5233
Fax: +82-2-526-5200
EMail: euna@kt.co.kr
URI: http://mmlab.snu.ac.kr/~eun/
Appendix A. Proposed Route Optimizations
Here, we attempt to list the numerous proposed solutions according to
the solution space defined in Section 3. Although we made effort in
listing all possible solutions, sincere apology is extended to
authors of solutions that we might have missed out.
A.1 MR-to-CN Optimizations
Most MR-to-CN optimizations proposals are implicitly achieved by
sending mobile network prefixes to correspondent nodes. The Return
Routability procedure with Network Prefix (RRNP) [14] proposed an
extension to return routability procedure for verifying the validity
of mobile network prefixes.
One approach that uses the mobile router as a proxy for establishing
route optimization on behalf of mobile network nodes can be found in
[15].
In addition, various nested tunnel optimizations proposals (see
Appendix A.3) can also be extended to correspondent node, thus
enabling the MR-to-CN optimizations. Example includes the Reverse
Routing Header (RRH) [13], Access Router Option (ARO) [16].
A.2 Infrastructure Optimizations
All known infrastructure optimization proposals defines the entity
known as correspondent router capable of terminating bi-directional
tunnels from mobile routers on behalf of correspondent nodes, thereby
achieving route optimization. The difference between these proposals
is mainly the way correspondent routers are discovered. Proposals
include:
o Path Control Header (PCH) [17]
The PCH approach requires the home agent to piggyback a Path
Control Header on the packet when forwarding packets arriving from
a bi-directional tunnel to a correspondent node. Because PCH is a
hop-by-hop option header, all intermediate routers lying between
the home agent and the correspondent node will inspect the PCH.
If a correspondent router exists among these intermediate router,
it can contact the mobile router (identified in the PCH) and
establish a optimized tunnel with the mobile router.
o Optimized Routing Cache (ORC) [18]
The ORC approach defines the functionality of a correspondent
router able to terminate bi-directional tunnels from mobile
routers. Mobile routers discover correspondent routers by sending
a query message to a multicast address corresponding to "all
correspondent router" address. The query message contains the
address of the correspondent node for which the mobile router
wishes to send packets to. The correspondent router managing the
network within which the correspondent node resides will responds
to this query. The proposal also suggest correspondent router to
inform mobile routers the prefix information of the network it is
capable of managing, so that any other traffic flows that
originate and end at the mobile network and the network the
correspondent router is managing can also enjoy route
optimization.
A.3 Nested Tunnel Optimizations
Many proposed solutions for NEMO Extended Support targets the nested
tunnel optimization. Most of these involves sending of upstream
information to the home agent of a nested mobile router, including
o Reverse Routing Header (RRH) [13]
The RRH approach avoids the multiple encapsulation of the traffic
but maintains the home tunnel of the first mobile router on the
egress path. The first mobile router on the way out (egress
direction) encapsulates the packet over its reverse tunnel, using
a form of Record Route header, the RRH.
The upstream mobile routers simply swap their care-of address and
the source of the packet, saving the original source in the RRH.
The home agent transforms the RRH in a Routing Header to perform
source routing across the nested mobile network, along the ingress
path to the target mobile router.
o Access Router Option (ARO) [16]
The ARO approach is somewhat similar to the RRH in that only the
home tunnel of the first nested mobile router in the egress path
is maintained. This is done by having the nested mobile router to
send an ARO in Binding Update to inform its home agent the address
of its access router (i.e. an upstream mobile router). Using
this information, the home agent can build a Routing Header to
source-route a packet to the nested mobile router within in a
nested mobile network. Upstream mobile routers can also send
binding update messages to the home agent of the nested mobile
router, thus allowing a complete routing header be built
recursively by the home agent.
o Nested Path Info (NPI) [19]
The NPI approach is somewhat similar to the ARO approach, except
that instead of sending only the home address of the upstream
mobile router to its home agent, a nested mobile router send a
nested information on the care-of addresses of all upstream mobile
routers. Using this information, the home agent can build a
Routing Header to source-route a packet to the nested mobile
router within in a nested mobile network.
o Top Level Mobile Router (TLMR) [20]
In TLMR, each visiting mobile router obtains the address of the
root-MR through router advertisement messages. This information
is passed to its home agent in a binding update message. The
visiting mobile router also registers with the root-MR. With
these registrations, the root-MR maintains a topology of the
mobile network. In addition, the root MR also establish tunnels
with the home agents of every visiting mobile router. This way,
packet to and from each nested mobile network will be relayed
through the root-MR, through an additional tunnel between the
root-MR and the home agent of the nested mobile network.
o Hierarchical Mobile IP (HMIP) [21]
This approach proposes an adaptation of HMIPv6 [10] for NEMO.
Here, information on the root-MR (acting as a Mobile Anchor Point,
MAP) is passed to nested mobile routers in the MAP option of a
router advertisement. Nested mobile routers then register their
regional and local care-of address with the root-MR. Packets are
then transfered to and from a nested mobile router through two
separate tunnels: one between the nested mobile router and the
root-MR, the other between the root-MR and the home agent of the
nested mobile router.
Other approaches that does not really require the sending of upstream
information to home agent includes:
o Prefix Delegation [22][23][24]
The prefix delegation approach is somewhat to HMIPv6 what NEMO is
to MIPv6. The Access Router of the nested structure is both a
NEMO home agent and a DHCP-PD server, for an aggregation that it
owns and advertises to the infrastructure. When visiting the
nested structure, each mobile router is delegated a mobile network
prefix from the access router using DHCP-Prefix Delegation. The
mobile router registers this delegated prefix to the access router
that is acting as a NEMO home agent. The mobile router also
autoconfigures an address from the delegated prefix and uses it as
a care-of address to register its own mobile network prefix(es) to
its own home agent using NEMO Basic Support. It is possible for a
mobile router to protect its own mobile network prefixes while
advertising in the clear the local prefix for other mobile routers
to roam into. This allows a strict privacy of visited and
visitors, and enables some specific policies in each mobile
router.
o Neighbor Discovery Proxy (ND-Proxy) [25]
The ND-Proxy approach achieves route optimization by having mobile
routers to act as neighbor discovery proxy. Mobile router will
configure a care-of address from the network prefix advertised by
its access router, and also relay this prefix to its subnets. As
ND-Proxy, mobile routers will also handle neighbor discovery on
behalf of visiting mobile nodes in its subnets. As such, the
entire mobile network and its access network forms a logical
multilink subnet, thus eliminating any nesting. This solution
also lends itself well to achieve MIPv6-over-NEMO optimization.
A.4 MIPv6-over-NEMO Optimizations
Some solutions proposed for nested tunnels optimization can be
extended for MIPv6-over-NEMO optimization, including Access Router
Option (ARO) [16], Top Level Mobile Router (TLMR) [20], Prefix
Delegation approaches [22][23][24], and Neighbor Discovery Proxy
(ND-Proxy) [25]. One solution that caters specifically for
MIPv6-over-NEMO optimization is:
o Extended Network Mobility Support [26]
This approach is somewhat similar to the Prefix Delegation in
which the mobile router would obtain a prefix from its access
network, and allows visiting mobile network nodes to autoconfigure
their care-of addresses from this prefix. By doing so, packets
destined to any MIPv6 node within the mobile network will not go
through the home agent of the mobile router, thereby achieving
MIPv6-over-NEMO optimization. This solution also allows the
mobile router to act as home agent for local fixed nodes and local
mobile nodes within the mobile network in an attempt to allow
these nodes to achieve route optimization (using standard MIPv6
techniques).
A.5 Intra-NEMO Optimizations
Currently, there are no proposals that specifically target intra-NEMO
optimization, though as explained previously, most solutions that
achieves MN-to-CN optimizations can also achieve intra-NEMO
optimization.
Intellectual Property Statement Intellectual Property Statement
The IETF takes no position regarding the validity or scope of any The IETF takes no position regarding the validity or scope of any
intellectual property or other rights that might be claimed to Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights this document or the extent to which any license under such rights
might or might not be available; neither does it represent that it might or might not be available; nor does it represent that it has
has made any effort to identify any such rights. Information on the made any independent effort to identify any such rights. Information
IETF's procedures with respect to rights in standards-track and on the procedures with respect to rights in RFC documents can be
standards-related documentation can be found in BCP-11. Copies of found in BCP 78 and BCP 79.
claims of rights made available for publication and any assurances of
licenses to be made available, or the result of an attempt made to Copies of IPR disclosures made to the IETF Secretariat and any
obtain a general license or permission for the use of such assurances of licenses to be made available, or the result of an
proprietary rights by implementors or users of this specification can attempt made to obtain a general license or permission for the use of
be obtained from the IETF Secretariat. such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary copyrights, patents or patent applications, or other proprietary
rights which may cover technology that may be required to practice rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF Executive this standard. Please address the information to the IETF at
Director. ietf-ipr@ietf.org.
Full Copyright Statement
Copyright (C) The Internet Society (2004). All Rights Reserved. Disclaimer of Validity
This document and translations of it may be copied and furnished to This document and the information contained herein are provided on an
others, and derivative works that comment on or otherwise explain it "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
or assist in its implementation may be prepared, copied, published OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
and distributed, in whole or in part, without restriction of any ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
kind, provided that the above copyright notice and this paragraph are INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
included on all such copies and derivative works. However, this INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
document itself may not be modified in any way, such as by removing WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
the copyright notice or references to the Internet Society or other
Internet organizations, except as needed for the purpose of
developing Internet standards in which case the procedures for
copyrights defined in the Internet Standards process must be
followed, or as required to translate it into languages other than
English.
The limited permissions granted above are perpetual and will not be Copyright Statement
revoked by the Internet Society or its successors or assignees.
This document and the information contained herein is provided on an Copyright (C) The Internet Society (2004). This document is subject
"AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING to the rights, licenses and restrictions contained in BCP 78, and
TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING except as set forth therein, the authors retain all their rights.
BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Acknowledgment Acknowledgment
Funding for the RFC Editor function is currently provided by the Funding for the RFC Editor function is currently provided by the
Internet Society. Internet Society.
 End of changes. 184 change blocks. 
612 lines changed or deleted 1231 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/