| < draft-wakikawa-nemo-orc-00.txt | draft-wakikawa-nemo-orc-01.txt > | |||
|---|---|---|---|---|
| INTERNET DRAFT Ryuji Wakikawa | INTERNET DRAFT Ryuji Wakikawa | |||
| 10 July 2004 Masafumi Watari | Expires: 24 Apr 2005 Masafumi Watari | |||
| Keio Univ./WIDE | Keio Univ./WIDE | |||
| 24 Oct 2004 | ||||
| Optimized Route Cache Protocol (ORC) | Optimized Route Cache Protocol (ORC) | |||
| draft-wakikawa-nemo-orc-00.txt | draft-wakikawa-nemo-orc-01.txt | |||
| Status of This Memo | Status of This Memo | |||
| By submitting this Internet-Draft, I certify that any applicable | This document is an Internet-Draft and is subject to all provisions | |||
| patent or other IPR claims of which I am aware have been disclosed, | of section 3 of RFC 3667. By submitting this Internet-Draft, each | |||
| and any of which I become aware will be disclosed, in accordance with | author represents that any applicable patent or other IPR claims of | |||
| which he or she is aware have been or will be disclosed, and any of | ||||
| which he or she become aware will be disclosed, in accordance with | ||||
| RFC 3668. | RFC 3668. | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF), its areas, and its working groups. Note | Task Force (IETF), its areas, and its working groups. Note | |||
| that other groups may also distribute working documents as | that other groups may also distribute working documents as | |||
| Internet-Drafts. | Internet-Drafts. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at | and may be updated, replaced, or obsoleted by other documents at | |||
| any time. It is inappropriate to use Internet-Drafts as reference | any time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as ``work in progress.'' | material or to cite them other than as "work in progress." | |||
| The list of current Internet-Drafts can be accessed at: | The list of current Internet-Drafts can be accessed at: | |||
| http://www.ietf.org/ietf/1id-abstracts.txt | http://www.ietf.org/ietf/1id-abstracts.txt. | |||
| The list of Internet-Draft Shadow Directories can be accessed at: | The list of Internet-Draft Shadow Directories can be accessed at: | |||
| http://www.ietf.org/shadow.html. | http://www.ietf.org/shadow.html. | |||
| Copyright Notice | ||||
| Copyright (C) The Internet Society (2004). | ||||
| Abstract | Abstract | |||
| This draft proposes Optimized Route Cache Protocol (ORC) to provide | This draft proposes Optimized Route Cache Protocol (ORC) to provide | |||
| route optimization for the NEMO Basic Support protocol. ORC provides | route optimization for the NEMO Basic Support protocol. ORC provides | |||
| a dynamic route optimization mechanism, similar to route optimization | a dynamic route optimization mechanism, similar to route optimization | |||
| in Mobile IPv6. | in Mobile IPv6. | |||
| The ORC aims to manage binding information as if routing information | The ORC aims to manage binding information for when routing | |||
| of each mobile network are located at special routers called | information of each mobile network are located at special routers | |||
| ``Correspondent Router''. | called ``Correspondent Router''. | |||
| Contents | Contents | |||
| Status of This Memo i | Status of This Memo i | |||
| Abstract i | Abstract i | |||
| 1. Introduction 2 | ||||
| 2. ORC Concept 2 | 1. Introduction 3 | |||
| 3. Terminology 3 | 2. ORC Concept 3 | |||
| 4. ORC Overview 4 | 3. Terminology 4 | |||
| 4.1. Correspondent Router Discovery . . . . . . . . . . . . . 4 | ||||
| 4.2. Binding Registration to Correspondent Router . . . . . . 4 | ||||
| 4.3. Forwarding between Mobile Router and Correspondent Router 5 | ||||
| 5. Extensions to Mobile IPv6 and the Basic NEMO protocol 5 | 4. ORC Overview 5 | |||
| 5.1. Forwarding Table Data Structure . . . . . . . . . . . . . 5 | 4.1. Correspondent Router Discovery . . . . . . . . . . . . . 5 | |||
| 5.2. Mobility Header Messages . . . . . . . . . . . . . . . . 6 | 4.2. Binding Registration to Correspondent Router . . . . . . 5 | |||
| 5.2.1. Binding Update . . . . . . . . . . . . . . . . . 6 | 4.3. Forwarding between Mobile Router and Correspondent Router 6 | |||
| 5.2.2. Binding Acknowledgment . . . . . . . . . . . . . 6 | ||||
| 5.2.3. Managed Prefix Lists sub-option . . . . . . . . . 6 | ||||
| 5.3. New ICMP Messages . . . . . . . . . . . . . . . . . . . . 7 | ||||
| 5.3.1. Correspondent Router Discovery Request . . . . . 7 | ||||
| 5.3.2. Correspondent Router Discovery Reply . . . . . . 8 | ||||
| 6. Protocol Operations 10 | 5. Extensions to Mobile IPv6 and the Basic NEMO protocol 6 | |||
| 6.1. Correspondent Router Discovery . . . . . . . . . . . . . 10 | 5.1. Forwarding Table Data Structure . . . . . . . . . . . . . 6 | |||
| 6.2. Binding Registration to Correspondent Router . . . . . . 11 | 5.2. Mobility Header Messages . . . . . . . . . . . . . . . . 7 | |||
| 6.2.1. Sending Binding Update . . . . . . . . . . . . . 11 | 5.2.1. Binding Update . . . . . . . . . . . . . . . . . 7 | |||
| 6.2.2. Return Routability . . . . . . . . . . . . . . . 11 | 5.2.2. Binding Acknowledgment . . . . . . . . . . . . . 7 | |||
| 6.3. Intercepting Packets by Correspondent Router . . . . . . 12 | 5.2.3. Managed Prefix Lists sub-option . . . . . . . . . 7 | |||
| 6.4. Routing to Mobile Network . . . . . . . . . . . . . . . . 13 | 5.3. New ICMP Messages . . . . . . . . . . . . . . . . . . . . 8 | |||
| 5.3.1. Correspondent Router Discovery Request . . . . . 8 | ||||
| 5.3.2. Correspondent Router Discovery Reply . . . . . . 9 | ||||
| 7. Support for Nested Mobile Networks 13 | 6. Protocol Operations 11 | |||
| 6.1. Correspondent Router Discovery . . . . . . . . . . . . . 11 | ||||
| 6.2. Binding Registration to Correspondent Router . . . . . . 12 | ||||
| 6.2.1. Sending Binding Update . . . . . . . . . . . . . 12 | ||||
| 6.2.2. Return Routability . . . . . . . . . . . . . . . 12 | ||||
| 6.3. Intercepting Packets by Correspondent Router . . . . . . 13 | ||||
| 6.4. Routing to Mobile Network . . . . . . . . . . . . . . . . 14 | ||||
| 8. Security Consideration 14 | 7. Security Consideration 14 | |||
| 9. Acknowledgements 14 | 8. Acknowledgements 14 | |||
| References 14 | References 14 | |||
| Authors' Addresses 15 | Authors' Addresses 16 | |||
| Appendices 16 | ||||
| A. Example Scenario 16 | Appendices 17 | |||
| B. Correspondent Router Hierarchy 18 | A. Example Scenario 17 | |||
| C. Route Optimization in Nested Mobile Network 20 | B. Correspondent Router Hierarchy 19 | |||
| C. Modifications from the last version 21 | ||||
| 1. Introduction | 1. Introduction | |||
| The NEMO Basic Support protocol [4] is currently being standardized | The NEMO Basic Support protocol [4] is currently being standardized | |||
| at the IETF NEMO working group. However, the NEMO Basic Support | at the IETF NEMO working group. However, the NEMO Basic Support | |||
| protocol does not provide route optimization, but always use a | protocol does not provide route optimization, but always use a | |||
| bi-directional tunnel established between a mobile router and | bi-directional tunnel established between a mobile router and | |||
| its home agent. Optimized route cache protocol is designed as an | its home agent. Optimized route cache protocol is designed as an | |||
| extension to the NEMO Basic Support protocol for providing certain | extension to the NEMO Basic Support protocol for providing certain | |||
| route optimization. ORC was proposed earlier in the paper [8]. | route optimization. ORC was proposed earlier in the paper [8]. | |||
| skipping to change at page 2, line 41 ¶ | skipping to change at page 3, line 41 ¶ | |||
| correspondent routers that can be configured anywhere in the | correspondent routers that can be configured anywhere in the | |||
| Internet to be an anchor router for the mobile network, providing | Internet to be an anchor router for the mobile network, providing | |||
| certain level of route optimization. Practically, the correspondent | certain level of route optimization. Practically, the correspondent | |||
| routers should be scattered near the transit AS to allow direct | routers should be scattered near the transit AS to allow direct | |||
| forwarding to the mobile network before reaching the home agent. | forwarding to the mobile network before reaching the home agent. | |||
| Because it is impossible to replace all routers on the Internet | Because it is impossible to replace all routers on the Internet | |||
| with the correspondent routers support, it is effective to place a | with the correspondent routers support, it is effective to place a | |||
| correspondent router at places where traffic is converged like the | correspondent router at places where traffic is converged like the | |||
| Internet Exchange Point (IXP). | Internet Exchange Point (IXP). | |||
| The optimized routing cache protocol is kind of a best effect routing | The optimized routing cache protocol provides optimal route path in | |||
| protocol, where the path is only optimized where correspondent | best effort when correspondent routers exist. However, the level of | |||
| routers exist. However, the level of optimization can be improved | optimization can be improved depending on where the correspondent | |||
| depending on where the correspondent routers are placed, and the | routers are placed, and the path it takes. The correspondent routers | |||
| path it takes. The correspondent routers can also be dynamically | can also be dynamically discovered if necessary, to provide certain | |||
| discovered if necessary, to provide certain route optimization. | route optimization. | |||
| Since the binding is processed and maintained only by the | Since the binding is processed and maintained only by the | |||
| correspondent routers scattered over the Internet, mobile router | correspondent routers scattered over the Internet, mobile router | |||
| does not need to handle bindings for each correspondent nodes. It | does not need to handle bindings for each correspondent nodes. It | |||
| is clearly redundant operations if both the mobile router and the | is clearly redundant operations if both the mobile router and the | |||
| remote network manage bindings for the same communicating network. | remote network manage bindings for the same communicating network. | |||
| This also allows the end-nodes to communicate in the optimized route | This also allows the end-nodes to communicate in the optimized route | |||
| without requiring any additional functions. | without requiring any additional functions. | |||
| This concept can be applied to Mobile IPv6 as well. In Mobile IPv6, | This concept can be applied to Mobile IPv6 as well. In Mobile IPv6, | |||
| skipping to change at page 3, line 46 ¶ | skipping to change at page 4, line 46 ¶ | |||
| anycast identifier. The anycast identifier is to be defined by | anycast identifier. The anycast identifier is to be defined by | |||
| IANA. | IANA. | |||
| Managed Prefix | Managed Prefix | |||
| Prefixes which are managed by each correspondent router. | Prefixes which are managed by each correspondent router. | |||
| The Managed Prefix is often configured with administrative | The Managed Prefix is often configured with administrative | |||
| policy. For example, if a correspondent router is placed for | policy. For example, if a correspondent router is placed for | |||
| an administrative domain (let's say 2001:a:b::/32), the Managed | an administrative domain (let's say 2001:a:b::/32), the Managed | |||
| Prefix for the correspondent router is the 2001:a:b::/32. | Prefix for the correspondent router is the 2001:a:b::/32. | |||
| Mobile router can forward any packets meant for the managed | Mobile router can tunnel any packets meant for the managed | |||
| prefixes to the correspondent router. The correspondent | prefixes to the correspondent router. The correspondent | |||
| router has responsibility to route packets correctly to the | router has responsibility to route packets correctly to the | |||
| destination which is in the managed prefixes. | destination which is in the managed prefixes. | |||
| Proxy Route | Proxy Route | |||
| A proxy Route is used to intercept packets by a correspondent | A proxy Route is used to intercept packets by a correspondent | |||
| router at an administrative domain. A proxy route is to direct | router at an administrative domain. A proxy route is to direct | |||
| a route of a mobile network prefix to a correspondent router. | a route of a mobile network prefix to a correspondent router. | |||
| Proxy route contains a mobile network prefix of a correspondent | Proxy route contains a mobile network prefix of a correspondent | |||
| skipping to change at page 5, line 9 ¶ | skipping to change at page 6, line 9 ¶ | |||
| the correspondent router. The mobile router MUST set ORC flag 'O' in | the correspondent router. The mobile router MUST set ORC flag 'O' in | |||
| the Binding Update and include the Mobile Network Prefix sub-options. | the Binding Update and include the Mobile Network Prefix sub-options. | |||
| The Binding Update message is same as a Binding Update sent to a Home | The Binding Update message is same as a Binding Update sent to a Home | |||
| Agent except for the flag field (i.e. 'O' flag set and 'H' flag | Agent except for the flag field (i.e. 'O' flag set and 'H' flag | |||
| unset). | unset). | |||
| After processing the Binding Update successfully, the correspondent | After processing the Binding Update successfully, the correspondent | |||
| router MUST return a Binding Acknowledgment including the managed | router MUST return a Binding Acknowledgment including the managed | |||
| prefix list. The managed prefix is used when the mobile router | prefix list. The managed prefix is used when the mobile router | |||
| decides which packets are sent to which correspondent router. The | decides which packets are sent to which correspondent router. The | |||
| Home Agent setup forwarding for all the mobile network prefixes | correspondent router setup forwarding for all the mobile network | |||
| notified by the mobile router. | prefixes notified by the mobile router. | |||
| After getting successful Binding Acknowledgment, the mobile router | After getting successful Binding Acknowledgment, the mobile router | |||
| set up forwarding for all managed prefixes. If the mobile router | set up forwarding for all managed prefixes. If the mobile router | |||
| gets error status code in the Binding Acknowledgment or cannot get | gets error status code in the Binding Acknowledgment or cannot get | |||
| any Binding Acknowledgment, it SHOULD stop sending Binding Update to | any Binding Acknowledgment, it SHOULD stop sending Binding Update to | |||
| the correspondent router and SHOULD mark the correspondent router as | the correspondent router and SHOULD mark the correspondent router as | |||
| invalid. | invalid. | |||
| There is alternative mechanism based on Return Routability to send | There is alternative mechanism based on Return Routability to send | |||
| secured Binding Update. The detailed operation is introduced in | secured Binding Update. The detailed operation is introduced in | |||
| skipping to change at page 6, line 9 ¶ | skipping to change at page 7, line 9 ¶ | |||
| - Correspondent Router Address | - Correspondent Router Address | |||
| - Managed Prefix Lists | - Managed Prefix Lists | |||
| The list of Managed Prefix which is notified by the correspondent | The list of Managed Prefix which is notified by the correspondent | |||
| router | router | |||
| 5.2. Mobility Header Messages | 5.2. Mobility Header Messages | |||
| 5.2.1. Binding Update | 5.2.1. Binding Update | |||
| 0 1 2 3 | ||||
| 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | ||||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| | Sequence # | | | Sequence # | | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| |A|H|L|K|M|R|O| Reserved | Lifetime | | |A|H|L|K|M|R|O| Reserved | Lifetime | | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| | | | | | | |||
| . . | . . | |||
| . Mobility options . | . Mobility options . | |||
| . . | . . | |||
| | | | | | | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| ORC Flag (O) | ORC Flag (O) | |||
| The flag is used to identify a Binding Update sent | The flag is used to identify a Binding Update sent | |||
| for a correspondent router. | for a correspondent router. | |||
| 5.2.2. Binding Acknowledgment | 5.2.2. Binding Acknowledgment | |||
| 0 1 2 3 | ||||
| 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | ||||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| | Status |K|O| Reserved | | | Status |K|O| Reserved | | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| | Sequence # | Lifetime | | | Sequence # | Lifetime | | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| | | | | | | |||
| . . | . . | |||
| . Mobility options . | . Mobility options . | |||
| . . | . . | |||
| | | | | | | |||
| skipping to change at page 8, line 8 ¶ | skipping to change at page 9, line 8 ¶ | |||
| 5.3.1. Correspondent Router Discovery Request | 5.3.1. Correspondent Router Discovery Request | |||
| The Correspondent Router Discovery Request message is used by a | The Correspondent Router Discovery Request message is used by a | |||
| mobile node to discover correspondent routers where correspondent | mobile node to discover correspondent routers where correspondent | |||
| nodes are located. The message format is as follows. | nodes are located. The message format is as follows. | |||
| 0 1 2 3 | 0 1 2 3 | |||
| 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| | Type | Code | Checksum | | | Type | Code | Checksum | | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| | Identifier | Reserved | | | Identifier | Reserved | | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| Type | Type | |||
| To be assigned by IANA | To be assigned by IANA | |||
| Code | Code | |||
| 0 | 0 | |||
| skipping to change at page 9, line 8 ¶ | skipping to change at page 10, line 8 ¶ | |||
| 5.3.2. Correspondent Router Discovery Reply | 5.3.2. Correspondent Router Discovery Reply | |||
| The Correspondent Router Discovery Reply message is used by a | The Correspondent Router Discovery Reply message is used by a | |||
| correspondent router to send lists of correspondent routers | correspondent router to send lists of correspondent routers | |||
| configured at the network in reply to the Correspondent Router | configured at the network in reply to the Correspondent Router | |||
| Discovery Request message. The message format is as follows. | Discovery Request message. The message format is as follows. | |||
| 0 1 2 3 | 0 1 2 3 | |||
| 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| | Type | Code | Checksum | | | Type | Code | Checksum | | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| | Identifier | Reserved | | | Identifier | Reserved | | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| | Reserved | Preference | Prefix Length | | | Reserved | Preference | Prefix Length | | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| | | | | | | |||
| + + | + + | |||
| | | | | | | |||
| + Correspondent Router Address + | + Correspondent Router Address + | |||
| | | | | | | |||
| skipping to change at page 13, line 14 ¶ | skipping to change at page 14, line 14 ¶ | |||
| 6.4. Routing to Mobile Network | 6.4. Routing to Mobile Network | |||
| Whenever a correspondent router receives packets and query routing | Whenever a correspondent router receives packets and query routing | |||
| table as general router operations, it also searches for binding | table as general router operations, it also searches for binding | |||
| cache for a destination address in the IPv6 header just like any | cache for a destination address in the IPv6 header just like any | |||
| home agent. The correspondent router should select the prefix | home agent. The correspondent router should select the prefix | |||
| longest matched binding and route for the destination. When the | longest matched binding and route for the destination. When the | |||
| correspondent router finds the prefix longest matched binding for the | correspondent router finds the prefix longest matched binding for the | |||
| destination, it must search binding cache database recursively for | destination, it must search binding cache database recursively for | |||
| the next hope address of the binding and must select the last matched | the next hop address of the binding and must select the last matched | |||
| binding for the destination. This recursive operation is aimed to | binding for the destination. This recursive operation is aimed to | |||
| support nested mobility. | support nested mobility. | |||
| Once the correspondent router finds a binding instead of an IGP | Once the correspondent router finds a binding instead of an IGP | |||
| route for outgoing packets, it tunnels the packets directly to the | route for outgoing packets, it tunnels the packets directly to the | |||
| care-of address of the destination according to the registered | care-of address of the destination according to the registered | |||
| binding. For the opposite direction, the mobile router may reverse | binding. For the opposite direction, the mobile router may reverse | |||
| tunnel packets to the correspondent router at correspondent node's | tunnel packets to the correspondent router at correspondent node's | |||
| IGP domain which is found with route of the correspondent router's | IGP domain which is found with route of the correspondent router's | |||
| managed prefixes in mobile router's routing table. The correspondent | managed prefixes in mobile router's routing table. The correspondent | |||
| router then decapsulates packets and route them to a correspondent | router then decapsulates packets and route them to a correspondent | |||
| node. The mobile router does not insert the home address option as | node. The mobile router does not insert the home address option as | |||
| Mobile IPv6, since falsification of mobile network node's packets | Mobile IPv6, since falsification of mobile network node's packets | |||
| on intermediate nodes like the mobile router should be avoided | on intermediate nodes like the mobile router should be avoided | |||
| for security considerations. The encapsulation of packets adds | for security considerations. The encapsulation of packets adds | |||
| additional IPv6 header, and it does not change original packets. | additional IPv6 header, and it does not change original packets. | |||
| 7. Support for Nested Mobile Networks | 7. Security Consideration | |||
| The optimized route cache protocol allows route optimization in | ||||
| nested mobile networks. The route optimization in optimized route | ||||
| cache protocol allows bypassing of all HAs which are serving the | ||||
| mobile routers in the nested mobile network, and create a direct path | ||||
| from the mobile network node to the correspondent node. | ||||
| The concept of route optimization in optimized route cache protocol | ||||
| is to achieve optimized route between the correspondent router and | ||||
| the nested mobile network with only a single tunnel encapsulation, | ||||
| together with routing headers, if necssary. The routes for each | ||||
| mobile network in the nest are assumed to be exchanged among the | ||||
| each mobile routers. This can be done by using a kind of an ad-hoc | ||||
| routing protocol, or extending router advertisement messages, as | ||||
| described in Appendix C. | ||||
| The route optimization is fully controlled and triggered by the sub | ||||
| mobile routers for which it's carrying the mobile network, and is | ||||
| independent from the root mobile router. In other words, the root | ||||
| mobile routers does not need to maintain information of the mobile | ||||
| routers attached behind them, for example maintaining binding update | ||||
| lists and sending binding update messages on behalf of them. | ||||
| 8. Security Consideration | ||||
| The optimized route cache protocol enables to manage routing | The optimized route cache protocol enables to manage routing | |||
| information across AS boundaries. In other words, it is possible for | information across AS boundaries. In other words, it is possible for | |||
| a mobile router to alter routing table of opposite routers. Wrong | a mobile router to alter routing table of opposite routers. Wrong | |||
| binding registrations will cause opposite ASs to fall into confusion | binding registrations will cause opposite ASs to fall into confusion | |||
| or to have black-hole of routing. The ORC employees Mobile IPv6 | or to have black-hole of routing. The ORC employees Mobile IPv6 | |||
| security mechanism [5] for protecting binding updates which are the | security mechanism [5] for protecting binding updates which are the | |||
| IPsec authentication header [1] and the return routability scheme. | IPsec authentication header [1] and the return routability scheme. | |||
| Furthermore, recipient routers can apply their IGP domain or AS | Furthermore, recipient routers can apply their IGP domain or AS | |||
| routing policies to handle each binding. | routing policies to handle each binding. | |||
| 9. Acknowledgements | 8. Acknowledgements | |||
| The authors would like to thank Keisuke Uehara, Susumu Koshiba, Jun | The authors would like to thank Keisuke Uehara, Susumu Koshiba, Jun | |||
| Murai, and WIDE Project for their contributions. | Murai, and WIDE Project for their contributions. | |||
| References | References | |||
| [1] R. Atkinson. IP Authentication Header. Request for Comments | [1] R. Atkinson. IP Authentication Header. Request for Comments | |||
| (Proposed Standard) 1826, Internet Engineering Task Force, August | (Proposed Standard) 1826, Internet Engineering Task Force, August | |||
| 1995. | 1995. | |||
| skipping to change at page 18, line 25 ¶ | skipping to change at page 19, line 25 ¶ | |||
| router tunnels the packets to the mobile router. | router tunnels the packets to the mobile router. | |||
| Figure 3 shows the case where the mobile router selects the | Figure 3 shows the case where the mobile router selects the | |||
| correspondent router configured at the leaf network. The | correspondent router configured at the leaf network. The | |||
| correspondent router advertises the proxy route for the mobile router | correspondent router advertises the proxy route for the mobile router | |||
| to other routers in the same network domain. Otherwise, packets | to other routers in the same network domain. Otherwise, packets | |||
| are silently routed to the Internet without interception of the | are silently routed to the Internet without interception of the | |||
| correspondent router. Packets sent to the mobile router are routed | correspondent router. Packets sent to the mobile router are routed | |||
| to one of routers according to the proxy route and then routed to the | to one of routers according to the proxy route and then routed to the | |||
| Correspondent Node | Mobile Router | |||
| + | + | |||
| | | | | |||
| +-----+-------------+ | +-----+-------------+ | |||
| | Internet | | | Internet | | |||
| +--+------------+---+ | +--+------------+---+ | |||
| | | | | | | |||
| +-----+--+ +--+-----+ | +-----+--+ +--+-----+ | |||
| | CR +------+ Router | /32 network | | CR +------+ Router | /32 network | |||
| +-BC--+--+ +--+--PR-+ | +-BC--+--+ +--+--PR-+ | |||
| Binding Cache / " / " Proxy Route | Binding Cache / " / " Proxy Route | |||
| skipping to change at page 19, line 25 ¶ | skipping to change at page 20, line 25 ¶ | |||
| prohibits the correspondent router support. | prohibits the correspondent router support. | |||
| Increasing the number of correspondent routers caring the mobile | Increasing the number of correspondent routers caring the mobile | |||
| network is an important factor to optimize routes between a mobile | network is an important factor to optimize routes between a mobile | |||
| node and correspondent nodes as much as possible. By contrast, | node and correspondent nodes as much as possible. By contrast, | |||
| the optimized route cache protocol does not always force to have a | the optimized route cache protocol does not always force to have a | |||
| number of correspondent routers. Binding registrations to all the | number of correspondent routers. Binding registrations to all the | |||
| correspondent routers bring considerable overheads to a mobile router | correspondent routers bring considerable overheads to a mobile router | |||
| and prevents scalability and quickness of movement processing. | and prevents scalability and quickness of movement processing. | |||
| Correspondent Node | Mobile Router | |||
| + | + | |||
| | | | | |||
| +-----+-------------+ | +-----+-------------+ | |||
| | Internet | | | Internet | | |||
| +--+------------+---+ | +--+------------+---+ | |||
| | | | | | | |||
| +-----+--+ +--+-----+ | +-----+--+ +--+-----+ | |||
| | Router +------+ Router | /32 network | | Router +------+ Router | /32 network | |||
| +-PR--+--+ +--+--PR-+ | +-PR--+--+ +--+--PR-+ | |||
| Proxy Route / " / " Proxy Route | Proxy Route / " / " Proxy Route | |||
| skipping to change at page 20, line 5 ¶ | skipping to change at page 21, line 5 ¶ | |||
| +---+----+ | +---+----+ | |||
| | CR | /64 network | | CR | /64 network | |||
| +---+-BC-+ | +---+-BC-+ | |||
| | Binding Cache | | Binding Cache | |||
| +--+--+--+--+ | +--+--+--+--+ | |||
| CN CN CN CN CN | CN CN CN CN CN | |||
| Correspondent Nodes | Correspondent Nodes | |||
| Figure 3: Registration to Lower Router | Figure 3: Registration to Lower Router | |||
| C. Route Optimization in Nested Mobile Network | C. Modifications from the last version | |||
| The optimized route cache protocol allows route optimization in | ||||
| nested mobile networks. The route optimization in optimized route | ||||
| cache protocol allows bypassing of all HAs which are serving the | ||||
| mobile routers in the nested mobile network, and create a direct path | ||||
| from the mobile network node to the correspondent node. | ||||
| In providing such optimized route, we introduce a new mechanism | ||||
| called, ``a reflective binding update'', which is sent by the | ||||
| correspondent router in reflect to a request for a route optimization | ||||
| sent by the sub mobile router. The reflective binding update is | ||||
| used to maintain bindings at the correspondent router for the nested | ||||
| mobile network. | ||||
| Figure 4 shows a simple case where the nested level is two, and the | ||||
| correspondent node is located behind the correspondent router. The | ||||
| route optimization is fully controlled and triggered by the sub-MR, | ||||
| and is independent from the root-MR. Therefore, the root-MR does | ||||
| not need to maintain information of the mobile routers attached | ||||
| behind them. The correspondent router in the figure can also be a | ||||
| mobile router with another mobile router behind it. Even if both | ||||
| communicating sides are nested mobile networks, the optimized route | ||||
| cache protocol can create an optimized route. | ||||
| +-----+ +-----+ | ||||
| | HA1 | | HA2 | Home Agents | ||||
| +--+--+ +--+--+ | ||||
| | | | ||||
| +--+-------------+--+ | ||||
| | Internet | | ||||
| +-+---------------+-+ | ||||
| | | | ||||
| +----+---+ +--+-----+ | ||||
| root-MR | MR1 | | CR | Correspondent Router | ||||
| +-+------+ +------+-+ | ||||
| | | | ||||
| +------+-+ +--+--+--+--+ | ||||
| sub-MR | MR2 | CN CN CN CN CN | ||||
| +----+---+ Correspondent Nodes | ||||
| | | ||||
| +---+---+---+ | ||||
| MNN MNN MNN MNN | ||||
| Mobile Network Nodes | ||||
| Figure 4: Route Optimization in Nested Mobile Networks | ||||
| The route optimization is first initialized by the sub-MR when | ||||
| receiving a forwarded packet from its home agent. If the sub-MR | ||||
| in the nested mobile network decides that route optimization is | ||||
| needed, it sends a correspondent router discovery request to the | ||||
| correspondent network if necessary, as described in section 4.1. The | ||||
| decision can be based on protocols, port numbers, or the amount of | ||||
| tunneled packets received from a specific source address. | ||||
| After receiving a valid correspondent router discovery reply, the | - remove nested mobile networks support | |||
| sub-MR sends a binding update to the correspondent router, indicating | ||||
| a request for a route optimization in the nested mobile network. | ||||
| The indication is done with a corresponding flag in the binding | ||||
| update message, together with the care of address of the root-MR in | ||||
| the binding update message sub-option. The care of address of the | ||||
| root-MR is originally notified to the sub-MR by extending the router | ||||
| advertisement message sent from the root-MR. | ||||
| When the correspondent router receives the binding update message, | - fix a few typo and packet formats | |||
| it returns a binding acknowledgment to the sending mobile router, | ||||
| and retrieves the care of address of the root-MR. The correspondent | ||||
| router then sends a binding update message to the root-MR for the | ||||
| network claimed by the correspondent router. This binding update | ||||
| messages is called, ``a reflective binding update''. | ||||
| After a successful creation of the bindings between the correspondent | Intellectual Property Statement | |||
| router and the root-MR, packets meant for the mobile network under | ||||
| the sub-MR are directly tunneled to the sub-MR at the correspondent | ||||
| router, together with the routing header for the root-MR. Likewise, | ||||
| packets meant for the correspondent network are directly tunneled to | ||||
| the correspondent router with the routing header for the root-MR. | ||||
| The router advertisement message sent by the mobile routers should | The IETF takes no position regarding the validity or scope of any | |||
| be extended to support route optimization. Precisely, the router | Intellectual Property Rights or other rights that might be claimed to | |||
| advertisement should include the care of address of the mobile | pertain to the implementation or use of the technology described in | |||
| router's egress interface. If incase the care of address of the | this document or the extent to which any license under such rights | |||
| mobile router changes due to movements, the new care of address | might or might not be available; nor does it represent that it has | |||
| should be advertised with the router advertisement message. | made any independent effort to identify any such rights. Information | |||
| on the procedures with respect to rights in RFC documents can be | ||||
| found in BCP 78 and BCP 79. | ||||
| When the sub-MR detects the change of the care of address in the | Copies of IPR disclosures made to the IETF Secretariat and any | |||
| router advertisement message, it should then send a new binding | assurances of licenses to be made available, or the result of an | |||
| update message to the correspondent router. Since invalid binding at | attempt made to obtain a general license or permission for the | |||
| the correspondent router will only cause the packets to go via the | use of such proprietary rights by implementers or users of this | |||
| home agent, it is not critical for operation. | specification can be obtained from the IETF on-line IPR repository at | |||
| http://www.ietf.org/ipr. | ||||
| Full Copyright Statement | The IETF invites any interested party to bring to its attention any | |||
| copyrights, patents or patent applications, or other proprietary | ||||
| rights that may cover technology that may be required to implement | ||||
| this standard. Please address the information to the IETF at | ||||
| ietf-ipr@ietf.org. | ||||
| Copyright (C) The Internet Society (2003). All Rights Reserved. | Disclaimer of Validity | |||
| This document and translations of it may be copied and furnished to | This document and the information contained herein are provided | |||
| others, and derivative works that comment on or otherwise explain it | on an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE | |||
| or assist in its implementation may be prepared, copied, published | REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE | |||
| and distributed, in whole or in part, without restriction of any | INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR | |||
| kind, provided that the above copyright notice and this paragraph | IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF | |||
| are included on all such copies and derivative works. However, | THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED | |||
| this document itself may not be modified in any way, such as by | WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. | |||
| removing the copyright notice or references to the Internet Society | ||||
| or other Internet organizations, except as needed for the purpose | ||||
| of developing Internet standards in which case the procedures | ||||
| for copyrights defined in the Internet Standards process must be | ||||
| followed, or as required to translate it into languages other than | ||||
| English. | ||||
| The limited permissions granted above are perpetual and will not be | Copyright Statement | |||
| revoked by the Internet Society or its successors or assignees. | ||||
| This document and the information contained herein is provided on an | Copyright (C) The Internet Society (2004). This document is subject | |||
| "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING | to the rights, licenses and restrictions contained in BCP 78, and | |||
| TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING | except as set forth therein, the authors retain all their rights. | |||
| BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION | ||||
| HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF | ||||
| MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. | ||||
| Acknowledgement | Acknowledgement | |||
| Funding for the RFC Editor function is currently provided by the | Funding for the RFC Editor function is currently provided by the | |||
| Internet Society. | Internet Society. | |||
| End of changes. 45 change blocks. | ||||
| 191 lines changed or deleted | 102 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||