summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc4881.txt
diff options
context:
space:
mode:
authorThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
committerThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
commit4bfd864f10b68b71482b35c818559068ef8d5797 (patch)
treee3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc4881.txt
parentea76e11061bda059ae9f9ad130a9895cc85607db (diff)
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc4881.txt')
-rw-r--r--doc/rfc/rfc4881.txt3587
1 files changed, 3587 insertions, 0 deletions
diff --git a/doc/rfc/rfc4881.txt b/doc/rfc/rfc4881.txt
new file mode 100644
index 0000000..e504f30
--- /dev/null
+++ b/doc/rfc/rfc4881.txt
@@ -0,0 +1,3587 @@
+
+
+
+
+
+
+Network Working Group K. El Malki, Ed.
+Request for Comments: 4881 Athonet
+Category: Experimental June 2007
+
+
+ Low-Latency Handoffs in Mobile IPv4
+
+Status of This Memo
+
+ This memo defines an Experimental Protocol for the Internet
+ community. It does not specify an Internet standard of any kind.
+ Discussion and suggestions for improvement are requested.
+ Distribution of this memo is unlimited.
+
+Copyright Notice
+
+ Copyright (C) The IETF Trust (2007).
+
+Abstract
+
+ Mobile IPv4 describes how a Mobile Node can perform IPv4-layer
+ handoffs between subnets served by different Foreign Agents. In
+ certain cases, the latency involved in these handoffs can be above
+ the threshold required for the support of delay-sensitive or real-
+ time services. The aim of this document is to present two methods to
+ achieve low-latency Mobile IPv4 handoffs. In addition, a combination
+ of these two methods is described. The described techniques allow
+ greater support for real-time services on a Mobile IPv4 network by
+ minimizing the period of time when a Mobile Node is unable to send or
+ receive IPv4 packets due to the delay in the Mobile IPv4 Registration
+ process.
+
+Table of Contents
+
+ 1. Introduction ....................................................3
+ 1.1. Terminology ................................................4
+ 1.2. The Techniques .............................................5
+ 1.3. L2 Triggers ................................................7
+ 1.4. Requirements Language ......................................9
+ 2. Requirements ....................................................9
+ 3. The PRE-REGISTRATION Handoff Method ............................10
+ 3.1. Operation .................................................11
+ 3.2. Network-Initiated Handoff .................................13
+ 3.3. Mobile-Initiated Handoff ..................................15
+ 3.4. Obtaining and Proxying nFA Advertisements .................17
+ 3.4.1. Inter-FA Solicitation ..............................17
+ 3.4.2. Tunneled nFA Advertisements ........................18
+ 3.5. Caching Router Advertisements .............................19
+
+
+
+El Malki, Ed. Experimental [Page 1]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+ 3.6. Movement Detection, MN, and FA Considerations .............19
+ 3.7. L2 Address Considerations .................................21
+ 3.8. Applicability of PRE-REGISTRATION Handoff .................21
+ 4. The POST-REGISTRATION Handoff Method ...........................23
+ 4.1. Two-Party Handoff .........................................24
+ 4.2. Three-Party Handoff .......................................28
+ 4.3. Renewal or Termination of Tunneling Service ...............34
+ 4.4. When Will the MN Perform a Mobile IPv4 Registration? ......34
+ 4.5. Handoff Request (HRqst) Message Format ....................36
+ 4.6. Handoff Reply (HRply) Message Format ......................38
+ 4.7. Handoff to Third (HTT) Message Format .....................40
+ 4.8. Applicability of POST-REGISTRATION Handoff Method .........40
+ 5. Combined Handoff Method ........................................41
+ 6. Layer 2 and Layer 3 Handoff Timing Considerations ..............42
+ 7. Reverse Tunneling Support ......................................42
+ 8. Handoff Signaling Failure Recovery .............................43
+ 8.1. PRE-REGISTRATION Signaling Failure Recovery ...............43
+ 8.1.1. Failure of PrRtSol and PrRtAdv .....................43
+ 8.1.2. Failure of Inter-FA Solicitation and
+ Advertisement ......................................44
+ 8.2. POST-REGISTRATION Signaling Failure Recovery ..............44
+ 8.2.1. HRqst Message Dropped ..............................44
+ 8.2.2. HRply Message Dropped ..............................45
+ 9. Generalized Link Layer and IPv4 Address (LLA) Extension ........46
+ 9.1. 3GPP2 IMSI Link Layer Address and Connection ID
+ Extension .................................................47
+ 9.2. 3GPP IMSI Link Layer Address Extension ....................48
+ 9.3. Ethernet Link Layer Address Extension .....................49
+ 9.4. IEEE 64-Bit Global Identifier (EUI-64) Address Extension ..50
+ 9.5. Solicited IPv4 Address Extension ..........................51
+ 9.6. Access Point Identifier Extension .........................52
+ 9.7. FA IPv4 Address Extension .................................53
+ 10. IANA Considerations ...........................................53
+ 10.1. New Extension Values .....................................53
+ 10.2. Generalized Link Layer and IP Address Identifier (LLA) ...54
+ 10.3. New Message Type and Code ................................54
+ 11. Security Considerations .......................................55
+ 12. Acknowledgements ..............................................57
+ 13. References ....................................................57
+ 13.1. Normative References .....................................57
+ 13.2. Informative References ...................................58
+ Appendix A - Gateway Foreign Agents................................59
+ Appendix B - Low Latency Handoffs for Multiple-Interface MNs.......60
+ Appendix C - PRE_REGISTRATION Message Summary......................61
+
+
+
+
+
+
+
+El Malki, Ed. Experimental [Page 2]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+1. Introduction
+
+ Mobile IPv4 [1] describes how a Mobile Node (MN) can perform IPv4-
+ layer handoff between subnets served by different Foreign Agents
+ (FAs). In certain cases, the latency involved in handoff can be
+ above the threshold required for the support of delay-sensitive or
+ real-time services. The aim of this document is to present two
+ techniques to achieve low-latency Mobile IPv4 handoff during movement
+ between FAs. A further combination of these two techniques is also
+ described. The presented techniques allow greater support for real-
+ time services on a Mobile IPv4 network by minimizing the period of
+ time during which an MN is unable to send or receive IPv4 packets due
+ to the delay in the Mobile IPv4 Registration process. One or more of
+ these techniques may be required to achieve fast Mobile IPv4 handoffs
+ over different wireless technologies (e.g., WLAN, Cellular, WiMAX,
+ Flash-OFDM, etc.). Each wireless technology has different layer 2
+ handoff procedures, and the best low-latency technique for each
+ scenario should be used to optimize the handoff performance. Further
+ deployment and experimentation are required to determine which
+ technique is best suited to the wireless technologies in terms of
+ implementation and performance. Therefore, the authors encourage
+ further performance measurements and work on low-latency-over-foo
+ specifications in collaboration with the appropriate wireless
+ technology fora to describe the applicability to different wireless
+ layer 2s.
+
+ In the rest of this section, terminology used throughout the document
+ is presented, the handoff techniques are briefly described, and the
+ use of link-layer information is outlined. In Section 2, a brief
+ description of requirements is presented. Section 3 describes the
+ details of the PRE-REGISTRATION handoff technique, and Section 4
+ describes the details of the POST-REGISTRATION handoff technique. In
+ Section 5, a combined method using the two handoff techniques
+ together is presented. Section 6 discusses layer 2 and layer 3
+ handoff timing considerations. Section 7 discusses reverse tunneling
+ support, Section 8 describes mechanisms to recover from message
+ failures, and Section 9 describes protocol extensions required by the
+ handoff techniques. Sections 10 and 11 discuss IANA and security
+ considerations. Finally, the three appendices discuss additional
+ material related to the handoff techniques. Appendix A gives a short
+ introduction to Regional Registrations [11], which can be used
+ together with low-latency handoffs. Appendix B discusses low-latency
+ handoff when an MN has multiple wireless L2 interfaces, in which case
+ the techniques in this document may not be necessary. Appendix C
+ provides a summary of the messages used in PRE-REGISTRATION.
+
+
+
+
+
+
+El Malki, Ed. Experimental [Page 3]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+1.1. Terminology
+
+ This section presents a few terms used throughout the document.
+
+ oFA - old Foreign Agent (FA), the FA involved in handling the
+ care-of address (CoA) of a Mobile Node (MN) prior to a layer 3
+ (L3) handoff.
+
+ nFA - new Foreign Agent, the FA anticipated to be handling an MN's
+ care-of address after completion of an L3 handoff.
+
+ aFA - anchor Foreign Agent, the FA that is currently handling the
+ network end of the tunnel in POST-REGISTRATION.
+
+ L2 handoff - Movement of an MN's point of layer 2 (L2) connection
+ from one wireless access point to another.
+
+ L3 handoff - Movement of an MN between FAs that involves changing
+ the care-of address at Layer 3 (L3).
+
+ L2 trigger - Information from L2 that informs L3 of particular
+ events before and after L2 handoff. The descriptions of L2
+ triggers in this document are not specific to any particular
+ L2, but rather represent generalizations of L2 information
+ available from a wide variety of L2 protocols.
+
+ L2-MT - An L2 trigger that occurs at the MN, informing of movement
+ to a certain nFA (Mobile Trigger).
+
+ L2-ST or source trigger - An L2 trigger that occurs at oFA,
+ informing the oFA that L2 handoff is about to occur.
+
+ L2-TT or target trigger - An L2 trigger that occurs at nFA,
+ informing the nFA that an MN is about to be handed off to nFA.
+
+ L2-LU - An L2 trigger that occurs at the MN or nFA, informing that
+ the L2 link between MN and nFA is established.
+
+ L2-LD - An L2 trigger that occurs at the oFA, informing the oFA
+ that the L2 link between MN and oFA is lost.
+
+ low-latency handoff - L3 handoff in which the period of time
+ during which the MN is unable to receive packets is minimized.
+
+ low-loss handoff - L3 handoff in which the number of packets
+ dropped or delayed is minimized. Low-loss handoff is often
+ called smooth handoff.
+
+
+
+
+El Malki, Ed. Experimental [Page 4]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+ seamless handoff - L3 handoff that is both low latency and low
+ loss.
+
+ bidirectional edge tunnel (BET) - A bidirectional tunnel
+ established between two FAs for purposes of temporarily routing
+ an MN's traffic to/from it on a new subnet without requiring
+ the MN to change CoA.
+
+ ping-pong - Rapid back-and-forth movement between two wireless
+ access points often due to failure of L2 handoff. Ping-pong
+ can occur if radio conditions for both the old and new access
+ points are about equivalent and less than optimal for
+ establishing a good, low-error L2 connection.
+
+ network-initiated handoff - L3 handoff in which oFA or nFA
+ initiates the handoff.
+
+ mobile-initiated handoff - L3 handoff in which the MN initiates
+ the handoff.
+
+ MN or FA identifier - An IPv4 address of an MN or FA, or an L2
+ identifier that can be resolved to the IPv4 address of an MN or
+ FA. If the identifier is an L2 identifier, it may be specific
+ to the L2 technology.
+
+1.2. The Techniques
+
+ Mobile IPv4 was originally designed without any assumptions about the
+ underlying link layers over which it would operate so that it could
+ have the widest possible applicability. This approach has the
+ advantage of facilitating a clean separation between L2 and L3 of the
+ protocol stack, but it has negative consequences for handoff latency.
+ The strict separation between L2 and L3 results in the following
+ built-in sources of delay:
+
+ - The MN may only communicate with a directly connected FA. This
+ implies that an MN may only begin the registration process after
+ an L2 handoff to nFA (new FA) has completed.
+
+ - The registration process takes some non-zero time to complete as
+ the Registration Requests propagate through the network. During
+ this period of time, the MN is not able to send or receive IPv4
+ packets.
+
+ This document presents techniques for reducing these built-in delay
+ components of Mobile IPv4. The techniques can be divided into two
+ general categories, depending on which of the above problems they are
+ attempting to address:
+
+
+
+El Malki, Ed. Experimental [Page 5]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+ - Allow the MN to communicate with the nFA while still connected
+ to the oFA.
+
+ - Provide for data delivery to the MN at the nFA even before the
+ formal registration process has completed.
+
+ The first category of techniques allows the MN to "pre-build" its
+ registration state on the nFA prior to an underlying L2 handoff. The
+ second category of techniques allows for service to continue
+ uninterrupted while the handoff is being processed by the network
+ without requiring the MN's involvement.
+
+ Three methods are presented in this document to achieve low-latency
+ L3 handoff, one for each category described above and one as a
+ combination of the two:
+
+ - PRE-REGISTRATION handoff method,
+
+ - POST-REGISTRATION handoff method, and
+
+ - combined handoff method.
+
+ The PRE-REGISTRATION handoff method allows the MN to be involved in
+ an anticipated IPv4-layer handoff. The MN is assisted by the network
+ in performing an L3 handoff before it completes the L2 handoff. The
+ L3 handoff can be either network-initiated or mobile-initiated.
+ Accordingly, L2 triggers are used both in the MN and in the FA to
+ trigger particular L3 handoff events. The PRE-REGISTRATION method
+ coupled with L2 mobility helps to achieve seamless handoffs between
+ FAs. The basic Mobile IPv4 concept involving advertisement followed
+ by registration is supported, and the PRE-REGISTRATION handoff method
+ relies on Mobile IPv4 security. No new messages are proposed, except
+ for an extension to the Agent Solicitation message in the mobile-
+ initiated case.
+
+ The POST-REGISTRATION handoff method proposes extensions to the
+ Mobile IPv4 protocol to allow the oFA (old FA) and nFA (new FA) to
+ utilize L2 triggers to set up a bidirectional tunnel between oFA and
+ nFA that allows the MN to continue using its oFA while on nFA's
+ subnet. This enables a rapid establishment of service at the new
+ point of attachment, which minimizes the impact on real-time
+ applications. The MN must eventually perform a formal Mobile IPv4
+ Registration after L2 communication with the new FA is established,
+ but this can be delayed as required by the MN or FA. Until the MN
+ performs registration, the FAs will set up and move bidirectional
+ tunnels as required to give the MN continued connectivity.
+
+
+
+
+
+El Malki, Ed. Experimental [Page 6]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+ The combined method involves running a PRE-REGISTRATION and a POST-
+ REGISTRATION handoff in parallel. If the PRE-REGISTRATION handoff
+ can be performed before the L2 handoff completes, the combined method
+ resolves to a PRE-REGISTRATION handoff. However, if the PRE-
+ REGISTRATION handoff does not complete within an access technology
+ dependent time period, the oFA starts forwarding traffic for the MN
+ to the nFA as specified in the POST-REGISTRATION handoff method.
+ This provides for a useful backup mechanism when completion of a
+ PRE-REGISTRATION handoff cannot always be guaranteed before the L2
+ handoff completion.
+
+ It should be noted that the methods described in this document may be
+ applied to MNs having a single interface (e.g., Wireless LAN
+ interface) or multiple interfaces (e.g., one WLAN and one cellular
+ interface). However, the case of multiply-interfaced MNs needs
+ special consideration, since the handoff methods described in this
+ document may not be required in all cases (see Appendix B).
+
+1.3. L2 Triggers
+
+ An L2 trigger is a signal of an L2 event. In this document, the L2
+ events relate to the L2 handoff process. One possible event is early
+ notice of an upcoming change in the L2 point of attachment of the
+ mobile node to the access network. Another possible event is the
+ completion of relocation of the mobile node's L2 point of attachment
+ to a new L2 access point. This information may come explicitly from
+ L2 in a solicited or unsolicited manner, or it may be derived from L2
+ messages. Although the protocols outlined in this document make use
+ of specific L2 information, Mobile IPv4 should be kept independent of
+ any specific L2. L2 triggers are an abstraction mechanism for a
+ technology-specific trigger. Therefore, an L2 trigger that is made
+ available to the Mobile IPv4 stack is assumed to be generic and
+ technology independent. The precise format of these triggers is not
+ covered in this document, but the information required to be
+ contained in the L2 triggers for low-latency handoffs is specified.
+
+ In order to properly abstract from the L2, it is assumed that one of
+ the three entities -- the MN, oFA, or nFA -- is made aware of the
+ need for an L2 handoff and that the nFA or MN can optionally also be
+ made aware that an L2 handoff has completed. A specific L2 will
+ often dictate when a trigger is received and which entity will
+ receive it. Certain L2s provide advance triggers on the network
+ side, while others provide advance triggers on the MN. Also, the
+ particular timing of the trigger with respect to the actual L2
+ handoff may differ from technology to technology. For example, some
+ wireless links may provide such a trigger well in advance of the
+ actual handoff. In contrast, other L2s may provide little or no
+ information in anticipation of the L2 handoff.
+
+
+
+El Malki, Ed. Experimental [Page 7]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+ An L2 trigger may be categorized according to whether it is received
+ by the MN, oFA, or nFA. Table 1 gives such a categorization along
+ with information contained in the trigger. The methods presented in
+ this document operate based on different types of L2 triggers as
+ shown in Table 1. Once the L2 trigger is received, the handoff
+ processes described hereafter are initiated. The three triggers,
+ L2-ST, L2-TT, and L2-MT, are independent of each other and are not
+ expected to occur together since each will trigger a different type
+ of handoff behaviour.
+
+ +-------------+----------------------+------------------------------+
+ | L2 Trigger | Mobile | Source |
+ | | Trigger | Trigger |
+ | | (L2-MT) | (L2-ST) |
+ +-------------+----------------------+------------------------------+
+ | Recipient | MN | oFA |
+ +-------------+----------------------+--------------+---------------+
+ | Method | PRE | PRE | POST |
+ | | mobile-initiated | network- | source |
+ | | | initiated | trigger |
+ +-------------+----------------------+--------------+---------------+
+ | When? | sufficiently before | sufficiently | sufficiently |
+ | | the L2 handoff | before L2 | before L2 |
+ | | so that MN can | handoff for | handoff for |
+ | | solicit PrRtAdv | FA to send | oFA & nFA to |
+ | | from oFA | PrRtAdv | exchange |
+ | | | to MN | HRqst/HRply |
+ +-------------+----------------------+--------------+---------------+
+ | Parameters | nFA identifier | nFA identifier, MN identifier|
+ +-------------+----------------------+------------------------------+
+
+ Table 1 - L2 Trigger
+ (continued on next page)
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+El Malki, Ed. Experimental [Page 8]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+ +------------+----------------------+---------------+---------------+
+ | L2 Trigger | Target | Link-Up | Link-Down |
+ | | Trigger | (L2-LU) | (L2-LD) |
+ | | (L2-TT) | | |
+ |------------+----------------------+---------------+---------------+
+ | Recipient | nFA | MN or nFA | oFA |
+ |------------+-----------+----------+---------------+---------------+
+ | Method | PRE | POST | PRE & POST | POST |
+ | | network- | target | | |
+ | | initiated | trigger | | |
+ |------------+----------------------+---------------+---------------+
+ | When? | | when radio | when radio |
+ | | same as | link between | link between |
+ | | source trigger | MN & nFA is | MN and oFA |
+ | | | established | is lost |
+ |------------+----------------------+---------------+---------------+
+ | Parameters | oFA identifier | @MN: nFA IPv4 | MN identifier |
+ | | MN identifier | or L2 addr. | |
+ | | | @nFA: MN IPv4 | |
+ | | | or L2 addr. | |
+ +------------+----------------------+---------------+---------------+
+
+ Table 1 - L2 Trigger
+
+1.4. Requirements Language
+
+ In this document, the key words "MAY", "MUST", "MUST NOT",
+ "OPTIONAL", "RECOMMENDED", "SHOULD", and "SHOULD NOT" are to be
+ interpreted as described in [2].
+
+2. Requirements
+
+ The following requirements are applicable to low-latency handoff
+ techniques and are supported by the methods in this document:
+
+ - to provide low-latency and low-loss handoff for real-time
+ services,
+
+ - to have no dependence on a wireless L2 technology,
+
+ - to support inter- and intra-access technology handoffs, and
+
+ - to limit wireless bandwidth usage.
+
+
+
+
+
+
+
+
+El Malki, Ed. Experimental [Page 9]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+3. The PRE-REGISTRATION Handoff Method
+
+ The PRE-REGISTRATION handoff method is based on the normal Mobile
+ IPv4 handoff procedure specified in [1], according to which:
+
+ - an advertisement for an FA is received by an MN,
+
+ - the advertisement allows the MN to perform movement detection,
+ and
+
+ - the MN registers with the FA.
+
+ The basic messages specified in [1] are extended to carry information
+ required to achieve fast handoffs. The PRE-REGISTRATION method
+ allows both the MN and FA to initiate the layer 3 handoff and it can
+ make use of L2 triggers on either the FA or MN side, depending on
+ whether network-initiated or mobile-initiated handoff occurs.
+
+ PRE-REGISTRATION supports the normal Mobile IPv4 model [1] and
+ optionally also the Regional Registration model [11]. There can be
+ advantages in implementing [11] together with low-latency handoff
+ mechanisms, in particular in cases where the Home Agent (HA) is at a
+ distance (in terms of delay) from the nFA. The time required for the
+ handoff procedure to complete can be reduced by using a closer local
+ HA, called Gateway Foreign Agent (GFA) in [11]. However,
+ implementation of [11] is not required by PRE-REGISTRATION. PRE-
+ REGISTRATION also supports movement where a new Authentication,
+ Authorization, and Accounting (AAA) transaction must occur to
+ authenticate the MN with a new domain.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+El Malki, Ed. Experimental [Page 10]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+3.1. Operation
+
+ The PRE-REGISTRATION handoff mechanism is summarized in Figure 1.
+
+ +---------+
+ | HA (GFA)|<---------+
+ +---------+ | 4. (Reg)RegReq
+ | 5. (Reg)RegReply
+ v
+ +-----+ 1a. PrRtSol +-----+
+ | | -----------------> | nFA |
+ | oFA | 1b. PrRtAdv | |
+ +-----+ <----------------- +-----+
+ ^ | ^
+ (2a. PrRtSol)| | 2b |
+ | | PrRtAdv | 3. (Reg)RegReq
+ | | |
+ | v --------------------+
+ +-----+ /
+ | MN |
+ +-----+ - - - - - ->
+ Movement
+
+ Figure 1 - PRE-REGISTRATION Handoff Protocol
+
+ The following steps provide more detail on the protocol:
+
+ 1. Message 1a is a Proxy Router (Agent) Solicitation (PrRtSol)
+ from oFA to nFA. It is a Mobile IP agent solicitation
+ containing an identifier for the nFA (i.e., IP address or L2
+ address) in a Generalized Link Layer and IP Address Extension
+ (see Section 9). When message 1a is received by the nFA
+ containing nFA's correct identifier in the LLA extension, the
+ nFA MUST return the Proxy Router Advertisement (Agent
+ Advertisement) in message 1b. Message 1b is simply nFA's Agent
+ Advertisement containing the nFA layer 2 address in a
+ Generalized Link Layer and IP Address (LLA) Extension (see
+ Section 9.3). Messages 1a and 1b SHOULD occur in advance of
+ the PRE-REGISTRATION handoff in order not to delay the handoff.
+ For this to occur, oFA SHOULD solicit and cache advertisements
+ from neighboring nFAs using messages 1a and 1b, thus decoupling
+ the timing of this exchange from the rest of the PRE-
+ REGISTRATION handoff. When the L3 handoff is initiated by a
+ target L2 trigger at nFA (L2-TT), message 1b equals message 2b
+ and is sent unsolicited directly to MN (tunneled by nFA to MN
+ through oFA) instead of being relayed by oFA.
+
+
+
+
+
+El Malki, Ed. Experimental [Page 11]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+ 2. Message 2a is a Proxy Router Solicitation (PrRtSol) from MN to
+ oFA. It is different from a normal Router (Agent) Solicitation
+ since it is soliciting an advertisement from a router different
+ from the one receiving this message. It is a Mobile IP Agent
+ Solicitation containing an identifier for the nFA (i.e., IP
+ address or L2 address) in a Generalized Link Layer and IP
+ Address Extension (see Section 9). The presence of message 2a
+ indicates that the handoff is mobile-initiated and its absence
+ means that the handoff is network-initiated. In mobile-
+ initiated handoff, message 2a occurs if there is an L2 trigger
+ in the MN to solicit for a Proxy Router Advertisement
+ (PrRtAdv). When message 2a is received by the oFA, it MUST
+ return the Proxy Router Advertisement (Agent Advertisement) in
+ message 2b. This is simply nFA's Agent Advertisement
+ containing the nFA layer 2 address in a Generalized Link Layer
+ and IP Address (LLA) Extension (see Section 9.3). In network-
+ initiated source-triggered handoff, the L2 trigger occurs at
+ oFA, and oFA MUST relay the Agent Advertisement in message 2b
+ without the need for the MN to solicit. Note that it is also
+ possible for nFA to advertise directly to the MN in the
+ network-initiated target-triggered case (see Section 3.2).
+
+ 3. The MN performs movement detection upon receipt of a solicited
+ or unsolicited Agent Advertisement and, if required, it sends a
+ Registration Request (RegReq) message [1] in message 3 to nFA.
+ When a local Gateway Foreign Agent (GFA) is present, this
+ message can optionally be a Regional Registration Request
+ (RegRegReq) [11]. Message 3 is routed through oFA since the MN
+ is not directly connected to nFA prior to the L2 handoff.
+
+ 4. Messages 4 and 5 complete the standard Mobile IPv4 Registration
+ [1] or optionally Regional Registration [11] initiated with
+ message 3. The Registration Request MUST contain the MN's
+ layer 2 address in a Generalized Link Layer and IP Address
+ Extension (see Sections 3.7 and 9). This identifier may be a
+ plain Ethernet address or an identifier specific to the
+ wireless technology. If the MN is not already connected to
+ nFA, the Registration Reply in message 5 MUST be buffered by
+ the nFA and unicast to the MN on-link as soon as the MN
+ connects to nFA (i.e., L2-LU trigger at nFA, which can be
+ implemented by the MN sending an Agent Solicitation or
+ optionally using special layer 2 techniques, which are outside
+ the scope of this document). This is necessary since the MN
+ may have to detach from oFA, due to the wireless L2 connection,
+ before it receives the reply. The MN's L2 address is obtained
+ using the extensions in Section 9, as described in Section 3.7.
+ Figures 2 and 3 illustrate this procedure.
+
+
+
+
+El Malki, Ed. Experimental [Page 12]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+ 5. If the registration is successful, packets for the MN are
+ tunneled from the HA (or GFA) to the nFA and then to the MN.
+
+ PRE-REGISTRATION is not dependent on [11]. However, if the HA is at
+ a distance (in terms of delay) from the nFA, the use of a local GFA
+ may reduce the time required for the handoff procedure to complete.
+
+ The time at which the L2 trigger is received by the oFA or MN,
+ thereby triggering the PRE-REGISTRATION handoff, compared to the time
+ at which the actual L2 handoff occurs is important for the optimal
+ performance of the low-latency handoff. That is, in the optimal
+ case, the L2 trigger will be received and the four messaging steps of
+ PRE-REGISTRATION described above will be completed (i.e., up to when
+ the Registration Request is processed by HA or GFA) before the MN
+ moves. Optimally, the Registration Reply and the first packet
+ redirected by the HA (or GFA) to nFA will reach the MN at the moment
+ in which the MN's L2 link to nFA is fully established. The MN would
+ therefore not suffer any disruption due to the L3 handoff. This
+ cannot always be guaranteed unless particular implementation
+ techniques are used. To alleviate a part of this timing problem, the
+ MN MAY set the S bit [1] in low-latency Registration Requests sent by
+ the MN. This allows the MN to receive packets at both oFA and nFA
+ during the short layer 2 handoff time. Other techniques may be
+ required, such as L2 techniques or buffering, but these are outside
+ the scope of this document. In addition, further handoff smoothing
+ considerations may be required to prevent the loss of packets in-
+ flight between HA (or GFA) and oFA while the MN performs a PRE-
+ REGISTRATION handoff. These are also outside the scope of this
+ document.
+
+ Figures 2, 3, and 4 contain message timing diagrams for the network-
+ initiated and mobile-initiated PRE-REGISTRATION handoff procedures.
+
+3.2. Network-Initiated Handoff
+
+ As described in Table 1, a PRE-REGISTRATION handoff can be initiated
+ at oFA by a source trigger or at nFA by a target trigger. Figures 2
+ and 3 contain message timing diagrams for PRE-REGISTRATION network-
+ initiated handoff for source and target triggers.
+
+ A source-triggered, network-initiated handoff occurs when an L2
+ trigger is received at the oFA informing it of a certain MN's
+ upcoming movement from oFA to nFA. The L2 trigger contains
+ information including the MN's identifier (i.e., the IPv4 address
+ itself or an identifier that can be resolved to the IPv4 address) and
+ the nFA's identifier. An identifier may be an IPv4 address or
+ something specific to the wireless technology (e.g., Base Station or
+ Access Point Identifier). A target-triggered, network-initiated
+
+
+
+El Malki, Ed. Experimental [Page 13]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+ handoff occurs when an L2 trigger is received at the nFA informing it
+ of a certain MN's upcoming movement from oFA. This type of trigger
+ is also shown in Table 1 and contains information including the MN's
+ and the oFA's identifier.
+
+ MN oFA nFA HA/GFA
+ | |<~~~~~~ L2-Source | |
+ | | Trigger | |
+ |<--------------------| | |
+ | PrRtAdv | | |
+ | | | |
+ |---------------------------------------->| |
+ | RegReq or | | |
+ | RegRegReq (routed via oFA) |------------------->|
+ | | RegReq or RegRegReq|
+ | | |
+ | Buffered ~~~~~>|<-------------------|
+ |---------------------------------------->| (Reg)RegReply |
+ | Agent Solicitation | |
+ | (sent when MN connects to nFA) | |
+ | | |
+ |<----------------------------------------| |
+ | (Reg)RegReply | |
+ | (sent when nFA receives Solicitation or L2-LU) |
+
+ Figure 2 - PRE-REGISTRATION Handoff Message Timing Diagram
+ (Network-Initiated, Source Trigger)
+
+ In a source-triggered handoff, when oFA receives the trigger (L2-ST),
+ it MUST send message 2b, the Proxy Router Advertisement (PrRtAdv), to
+ the MN. The PrRtAdv is nFA's Agent Advertisement [1] with one of the
+ link-layer extensions described in Section 9. The use of the
+ contents of this extension is described in Section 3.7. Messages 1a
+ and 1b SHOULD be exchanged by oFA and nFA before the L2 trigger is
+ received (see Section 3.4.1). Message 2a is not used.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+El Malki, Ed. Experimental [Page 14]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+ MN oFA nFA HA/GFA
+ | | L2-Target~~~~~~~~>| |
+ | | Trigger | |
+ | |...................| |
+ |<--------------------------------------- | |
+ | (PrRtAdv) |...................| |
+ | | Tunneled Agent Advertisement |
+ | | | |
+ |---------------------------------------->| |
+ | RegReq. or | | |
+ | RegRegReq (routed via oFA) |------------------->|
+ | | RegReq or RegRegReq|
+ | | |
+ | Buffered ~~~~~>|<-------------------|
+ |---------------------------------------->| (Reg)RegReply |
+ | Agent Solicitation | |
+ | (sent when MN connects to nFA) | |
+ | | |
+ |<----------------------------------------| |
+ | (Reg)RegReply | |
+ | (sent when nFA receives Solicitation or L2-LU) |
+
+ Figure 3 - PRE-REGISTRATION Handoff Message Timing Diagram
+ (Network-Initiated, Target Trigger)
+
+ In a target-triggered handoff, when nFA receives the trigger (L2-TT),
+ it MUST tunnel an Agent Advertisement to the MN through oFA to
+ initiate the L3 handoff. The inner advertisement is unicast by nFA
+ to MN, thus nFA treats the target trigger as a Router (Agent)
+ Solicitation. This advertisement is tunneled to oFA, which functions
+ as a normal router, decapsulating the advertisement and forwarding it
+ to the MN. This message MUST be authenticated to prevent attacks
+ (see Section 3.4.2).
+
+3.3. Mobile-Initiated Handoff
+
+ As shown in Table 1, a mobile-initiated handoff occurs when an L2
+ trigger is received at the MN informing that it will shortly move to
+ nFA. The L2 trigger contains information such as the nFA's
+ identifier (i.e., nFA's IPv4 address or an identifier that can be
+ resolved to the nFA's IPv4 address). As an example, a Wireless LAN
+ MN may perform a scan to obtain the Base Station Identifier (BSSID)
+ of the access point that is a potential handoff target (i.e., its
+ signal is becoming stronger). The message timing diagram is shown in
+ Figure 4.
+
+
+
+
+
+
+El Malki, Ed. Experimental [Page 15]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+ MN oFA nFA HA/GFA
+ |<~~~~~ L2-Trigger | | |
+ | | | |
+ |-------------------->| | |
+ | PrRtSol | | |
+ | | | |
+ |<--------------------| | |
+ | PrRtAdv | | |
+ | | | |
+ |---------------------------------------->| |
+ | RegReq or | | |
+ | RegRegReq (routed via oFA) |------------------->|
+ | | RegReq or RegRegReq|
+ | | |
+ | Buffered ~~~~~>|<-------------------|
+ |---------------------------------------->| (Reg)RegReply |
+ | Agent Solicitation | |
+ | (sent when MN connects to nFA) | |
+ | | |
+ |<----------------------------------------| |
+ | (Reg)RegReply | |
+ | (sent when nFA receives Solicitation or L2-LU) |
+
+ Figure 4 - PRE-REGISTRATION Handoff Message Timing Diagram
+ (Mobile-Initiated)
+
+ As a consequence of the L2 trigger (L2-MT), the MN MUST send message
+ 1a, the Proxy Router Solicitation (PrRtSol). This message is a
+ unicast Agent Solicitation to oFA for a Proxy Router Advertisement
+ (PrRtAdv). This solicitation MUST have a TTL=1 as in [1]. The Proxy
+ Router Advertisement Solicitation unicast to oFA is an Agent
+ Solicitation with a special extension. The solicitation MUST have an
+ extension containing an FA identifier (i.e., IPv4 address or L2
+ address contained in an LLA extension, see Section 9) because the MN
+ is soliciting another specific FA's advertisement from the oFA. This
+ specific FA will be the MN's nFA. The identifier is the IPv4 address
+ of the nFA or another identifier that can be used by the oFA to
+ resolve to nFA's IPv4 address. If the identifier is not an IPv4
+ address, it MAY be specific to the underlying wireless technology,
+ for example, an access point or Base Station Identifier (e.g., WLAN
+ BSSID) that can be mapped by oFA to the nFA IPv4 address as described
+ in Section 3.4.1. The extension containing the identifier is a sub-
+ type of the Generalized Link Layer Address Extension described in
+ Section 9.
+
+ Two extension sub-types have been defined to contain the nFA's IPv4
+ address and an access point identifier. They are called the
+ Solicited Agent IPv4 Address Extension and the Access Point
+
+
+
+El Malki, Ed. Experimental [Page 16]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+ Identifier Extension, and are described in Sections 9.5 and 9.6.
+ These two extensions SHOULD NOT be present in the same PrRtSol
+ message.
+
+ When oFA receives the PrRtSol message, it MUST reply to the MN with
+ the Proxy Router Advertisement (PrRtAdv, message 2b). The PrRtAdv is
+ simply the Agent Advertisement for the requested nFA, proxied by oFA.
+ In order to expedite the handoff, the actual nFA advertisement SHOULD
+ be cached by the oFA following a previous exchange with nFA, shown in
+ messages 1a and 1b, as specified in Section 3.5. The PrRtAdv message
+ MUST contain the nFA's L2 address (using the LLA extension in Section
+ 9.3). This is further described in Section 3.7.
+
+3.4. Obtaining and Proxying nFA Advertisements
+
+ Since L2 triggers are involved in initiating PRE-REGISTRATION
+ handoff, the trigger timing SHOULD be arranged such that a full L3
+ PRE-REGISTRATION handoff can complete before the L2 handoff process
+ completes. That is, the L2 handoff should be completed after the
+ MN's registration with the nFA is performed (message 3 in Figure 1).
+ The registration MAY be transmitted in more than one copy (default
+ recommendation: 2) to reduce the probability that it is lost due to
+ errors on the wireless link. This would not apply to reliable
+ wireless links where retransmissions are performed at layer 2 in case
+ of error to guarantee packet delivery.
+
+ A PRE-REGISTRATION handoff in this case requires the MN to receive an
+ Agent Advertisement from the nFA through the old wireless access
+ point. How to achieve this is discussed in the following
+ subsections. Messages exchanged between FAs MUST be authenticated to
+ prevent impersonation attacks. The minimal requirement is that all
+ FAs involved in low-latency handoffs MUST support manual pre-
+ configuration of security associations with other neighboring FAs,
+ involving shared keys and the default algorithms of [1] (see the
+ Security Considerations of this document).
+
+3.4.1. Inter-FA Solicitation
+
+ This applies to the network-initiated source-triggered (L2-ST) and
+ mobile-initiated (L2-MT) cases only. Inter-FA solicitation assumes
+ that oFA has access to the IPv4 address of the nFA. The IPv4 address
+ of nFA is obtained by means of an L2 trigger at oFA in the network-
+ initiated case (see Section 3.2) or by means of the extension to the
+ Proxy Router Solicitation (PrRtSol) from the MN in the mobile-
+ initiated case (see Section 3.3). This extension to the PrRtSol may
+ contain an IPv4 address or another identifier, for example, an
+ identifier of a Wireless Base Station such as the WLAN BSSID. In the
+ latter case, the oFA must implement a mechanism to resolve the Base
+
+
+
+El Malki, Ed. Experimental [Page 17]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+ Station Identifier to an IPv4 address. The default mechanism is to
+ use a configured table of neighboring Base Station Identifiers (e.g.,
+ BSSID) to FA IPv4 address mappings in each FA. Other automated
+ discovery mechanisms may also be used.
+
+ If oFA does not cache advertisements (see Section 3.5) once it
+ receives an L2 trigger and obtains the address of the nFA for a
+ specific MN, it MUST send a unicast Agent Solicitation (PrRtSol) to
+ nFA. The nFA replies to the oFA by unicasting an Agent Advertisement
+ with appropriate extensions (PrRtAdv). This method removes the TTL
+ limitation of [1] for Mobile IPv4 messages (i.e., TTL=1 is not
+ applicable here). The TTL limitation cannot be applied since oFA and
+ nFA may be more than one hop away and since it is unnecessary for a
+ secured unicast message. The ICMP solicitations and advertisements
+ MUST be authenticated and integrity protected. These messages MUST
+ be protected using Encapsulating Security Payload (ESP) [10] to
+ prevent attacks (see the Security Considerations section of this
+ document). An FA MUST NOT accept ICMP solicitations or
+ advertisements from sources that are not authenticated.
+
+ As a practical matter, oFA SHOULD pre-solicit and cache
+ advertisements from known neighboring FAs (see section 3.5) to avoid
+ performing the solicitation during an actual handoff procedure.
+
+3.4.2. Tunneled nFA Advertisements
+
+ This applies to the network-initiated target-triggered (L2-TT) case
+ only. Following a target trigger (L2-TT) the nFA MUST send a
+ tunneled Agent Advertisement to the MN through oFA. Tunneling nFA
+ advertisements assumes that the nFA is aware of the IPv4 address for
+ oFA and the MN. These IPv4 addresses are obtained by means of the FA
+ and MN identifiers contained in an L2 trigger received at nFA in the
+ network-initiated case (see Section 3.2). However, in [1] the TTL
+ must be 1 on Agent Advertisements from the nFA. Therefore, tunneling
+ advertisements is applicable if the TTL limitation of [1] is relaxed.
+ For this purpose, a pre-established security association between oFA
+ and nFA MUST be in place to authenticate this message and relax the
+ TTL limitation. If the implementation requires this, a tunnel SHOULD
+ be configured when the inter-FA security association is established.
+ The tunneled ICMP advertisement MUST be secured using tunnel mode ESP
+ [10] between nFA and oFA. An FA MUST NOT accept tunneled ICMP
+ packets destined to it from sources that are not authenticated.
+
+
+
+
+
+
+
+
+
+El Malki, Ed. Experimental [Page 18]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+3.5. Caching Router Advertisements
+
+ In the mobile-initiated (L2-MT) case and the network-initiated
+ source-triggered (L2-ST) case, the message exchange 1 in Figure 1
+ could impose an additional latency on the L3 handoff process if done
+ as part of the handoff procedure. In order to remove this source of
+ latency, the inter-FA Router (Agent) Solicitation and Advertisement
+ exchange SHOULD be performed in advance of handoff. A process SHOULD
+ be in place at the oFA to solicit its neighboring nFAs at a
+ predefined time interval (MIN_SOLICITATION_INTERVAL). This interval
+ SHOULD NOT be set too small to avoid unnecessary consumption of
+ network bandwidth and nFA processing resources. The minimum value of
+ MIN_SOLICITATION_INTERVAL is 1 second. If the FA Challenge/Response
+ mechanism in [7] is used, then the MIN_SOLICITATION_INTERVAL MUST be
+ set to a value smaller then the window of time in which a challenge
+ remains valid so that the nFA challenge does not expire before the MN
+ issues the Registration Request. Therefore, the recommended default
+ value for the MIN_SOLICITATION_INTERVAL in oFA is (0.5 * nFA's
+ CHALLENGE_WINDOW * nFA's Agent Advertisement interval). The
+ CHALLENGE_WINDOW and Agent Advertisement interval are defined in [7]
+ and [1] respectively. The minimum requirement is that the
+ MIN_SOLICITATION_INTERVAL MUST be manually configurable, while
+ possible autoconfiguration mechanisms are outside the scope of this
+ document. To allow advertisement caching in certain implementations
+ and in cases where the nFA advertisement interval is very small, it
+ MAY be necessary for the implementation in nFA to allow different
+ CHALLENGE_WINDOW and Agent Advertisement interval settings for its
+ nFA-oFA interface.
+
+ The oFA SHOULD cache the most recent advertisement from its
+ neighboring nFAs. This advertisement MUST be sent to the MN in
+ message 2b with a TTL=1. The oFA SHOULD also have a mechanism in
+ place to create a list of neighboring nFAs. The minimum requirement
+ for each FA is that it SHOULD allow manual configuration of a list of
+ nFA addresses that an MN could possibly perform an L3 handoff to.
+ The FA addresses in this list will depend on deployment and radio
+ coverage. It is also possible to specify another protocol to achieve
+ nFA discovery, but this is outside the scope of this document.
+
+3.6. Movement Detection, MN, and FA Considerations
+
+ When the MN receives an Agent Advertisement with a Mobility Agent
+ extension, it performs actions according to the following movement
+ detection mechanism: the MN SHOULD be "Eager" to perform new
+ bindings. This means that the MN SHOULD perform registrations with
+ any new FA from which it receives an advertisement (i.e., MN is
+ Eager), as long as there are no locally-defined policies in the MN
+ that discourage the use of the discovered FA. For example, the MN
+
+
+
+El Malki, Ed. Experimental [Page 19]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+ could have a policy based on the cost of service. The method by
+ which the MN determines whether the FA is a new FA is described in
+ [1] and MAY use an FA-NAI extension [11]. By being "Eager" to
+ perform registrations, the MN reduces latency times.
+
+ The MN also needs to change its default router from oFA to nFA. The
+ MN MUST change its default router to nFA as soon as the PRE-
+ REGISTRATION procedure has completed (i.e., Registration Reply is
+ received by MN) as described in [1].
+
+ Overall, the MN behaves as described in [1] with the following
+ changes: the specified movement detection mechanism mentioned above
+ and the ability to use the L2-MT to initiate an Agent Solicitation
+ with a special extension (PrRtSol). Also, when the MN receives an
+ L2-LU trigger (i.e., new interface or link is up), it MUST
+ immediately send an Agent Solicitation [1] on that interface. An nFA
+ that receives an Agent Solicitation [1] will use it as an L2-LU
+ trigger event, and according to [1] it will record the MN's
+ IPv4/layer 2 addresses (i.e., the Address Resolution Protocol (ARP)
+ entry). At that point, the nFA starts delivering data to the MN
+ including the previously buffered Registration Reply. The nFA MAY
+ also use other L2 mechanisms to detect earlier that the MN has
+ attached to the new link and to start forwarding data to it. The MN
+ SHOULD NOT attempt to retransmit a low-latency Registration Request
+ (i.e., Registration Request containing an LLA extension described in
+ Section 9.) when it does not receive the Registration Reply.
+
+ When moving from a PRE-REGISTRATION network to a normal Mobile IPv4
+ [1] network, the MN will no longer receive PrRtAdv messages (i.e.,
+ Agent Advertisements with the LLA extension). If the MN still
+ receives L2-MTs, it will attempt to send PrRtSol messages. The
+ normal FA will reply with a normal Agent Advertisement [1]. If the
+ MN does not receive a PrRtAdv in reply to its PrRtSol, it MAY
+ retransmit the PrRtSol message once after PRE_SOL_INTERVAL seconds
+ and then for another PRE_SOL_ATTEMPTS times with exponential backoff
+ of the transmission interval. If a PrRtAdv is not received within
+ PRE_SOL_INTERVAL seconds after the last PrRtSol attempt, the MN MUST
+ stop sending PrRtSol messages until after a registration with a new
+ FA is performed. The default value for PRE_SOL_ATTEMPTS is 2, and
+ for PRE_SOL_INTERVAL, it is 1 second. It should be noted that the
+ performance of the movement detection mechanism mandated in PRE-
+ REGISTRATION (i.e., eager to register) may have sub-optimal behaviour
+ in a standard Mobile IPv4 [1] network. Therefore, standard movement
+ detection mechanisms [1] should be used in plain Mobile IPv4
+ networks. Instead, when the MN moves from a normal Mobile IPv4 [1]
+ network to a PRE-REGISTRATION network, the MN starts receiving L2-MT
+ triggers or PrRtAdv messages. When the MN receives L2-MT triggers or
+ PrRtAdv messages, it SHOULD follow the PRE-REGISTRATION procedure.
+
+
+
+El Malki, Ed. Experimental [Page 20]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+ If there is uncertainty as to which mode to choose (e.g., MN receives
+ messages from both PRE-REGISTRATION and normal FAs), the MN decides
+ based on its registration status with the current FA. If the MN
+ already has a valid normal Mobile IPv4 Registration [1] with the
+ advertising FA, it SHOULD give priority to the PRE-REGISTRATION
+ procedure. Otherwise it SHOULD give priority to normal Mobile IPv4
+ [1] Registration procedure. The MN SHOULD NOT attempt to perform
+ PRE-REGISTRATION and standard Mobile IPv4 [1] Registrations in
+ parallel.
+
+3.7. L2 Address Considerations
+
+ Some special considerations should be taken with respect to the
+ wireless system on which this handoff method is being implemented.
+ Consider an Ethernet-like system such as IEEE 802.11, for example.
+ In PRE-REGISTRATION, the MN is registering with an FA (nFA) that is
+ not its current first-hop router; therefore, the L2 address of the
+ Ethernet frame containing the MN's Registration Request reaching the
+ nFA is not the MN's address. Therefore, the FA MUST NOT use the
+ Ethernet address of the incoming Registration Request as the MN's L2
+ address as specified in [1]. This applies to the cases where the
+ wireless access points are bridges or routers and independently of
+ whether the FA is implemented in the wireless access points
+ themselves. In this case, the MN's Registration Request (or Regional
+ Registration Request) MUST use an L2 address extension to the
+ registration message. Such an L2 address is either the same L2
+ address that remains constant as the MN moves, or it is the MN's L2
+ address at nFA. To communicate its L2 address, the MN includes a
+ Generalized Link Layer and IP Address Extension (see Section 9) with
+ its Registration Request (or Regional Registration Request) message.
+ If this extension is present, the FA MUST use the L2 address
+ contained in the extension to communicate with the MN. If a
+ particular wireless L2 technology has defined a special interface to
+ the wireless network that allows the FA to resolve the mapping
+ between an MN's IPv4 address and its L2 address without the need to
+ use the extension, the L2 address extension contents may be
+ discarded. For the same reasons above, the MN MUST NOT use the
+ source L2 address of the Agent Advertisement message (PrRtAdv) as its
+ default router's L2 address. Therefore, the nFA MUST include a
+ Generalized Link Layer and IP Address Extension (see Section 9.3)
+ with its Agent Advertisement (PrRtAdv) messages.
+
+3.8. Applicability of PRE-REGISTRATION Handoff
+
+ The PRE-REGISTRATION handoff method is applicable to scenarios where
+ a period of service disruption due to layer 3 is not acceptable, for
+ example, when performing real-time communications, and therefore
+ where an anticipation of the layer 3 handoff is required. Security
+
+
+
+El Malki, Ed. Experimental [Page 21]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+ for the PRE-REGISTRATION handoff method is based on the same security
+ model as [1] including the use of AAA. A prerequisite for PRE-
+ REGISTRATION is that the FA or MN is able to obtain an L2 trigger
+ informing it of a pending L2 handoff procedure. The target of the L2
+ handoff is another access point or radio network that is in the
+ coverage area of a new FA. The L2 trigger information may be in the
+ form of identifiers that need to be resolved to IPv4 addresses using
+ methods that may be specific to the wireless network and are not
+ considered here. If, for example, the oFA or MN determines that the
+ IPv4 address of the new FA matches oFA's address, then the PRE-
+ REGISTRATION handoff SHOULD NOT be initiated.
+
+ The L2 trigger must allow enough time for the PRE-REGISTRATION
+ handoff procedure to be performed. In many wireless L2 technologies,
+ the L2 handoff procedure involves a number of message exchanges
+ before the effective L2 handoff is performed. For such technologies,
+ PRE-REGISTRATION handoff can be initiated at the beginning of the L2
+ handoff procedure and completed before the L2 handoff is completed.
+ It is efficient to engineer the network such that this succession of
+ events is ensured.
+
+ The PRE-REGISTRATION handoff method is applicable in the following
+ cases:
+
+ - when the MN has locally defined policies that determine a
+ preference for one access over another, for example, due to
+ service cost within the same or different technology, and
+ therefore where it is necessary to allow the MN to select the
+ appropriate FA with which to connect.
+
+ - when L2 security between the MN and the FA is either not present
+ or cannot be relied upon to provide adequate security.
+
+ - when the trigger to initiate the handoff is received at the MN.
+
+ In the first case, it is necessary to involve eventual local MN
+ policies in the movement detection procedure as described in Section
+ 3.6.
+
+
+
+
+
+
+
+
+
+
+
+
+
+El Malki, Ed. Experimental [Page 22]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+4. The POST-REGISTRATION Handoff Method
+
+ The POST-REGISTRATION handoff method uses bidirectional edge tunnels
+ (BETs) or unidirectional tunnels to perform low-latency change in the
+ L2 point of attachment for the MN without requiring any involvement
+ by the MN. Figure 5 illustrates the basic POST-REGISTRATION handoff.
+
+ +------+
+ | CN |
+ +------+
+ |
+ ...
+ |
+ +------+ BET +------+
+ | aFA |==========| nFA |
+ +------+ +------+
+ | wireless link
+ |
+ movement +------+
+ ---------> | MN |
+ +------+
+
+ Figure 5 - POST-REGISTRATION Concept
+
+ Following a successful Mobile IPv4 Registration between MN and oFA,
+ the oFA becomes the mobility anchor point for the MN, called the
+ anchor FA (aFA). When the MN moves from oFA to nFA, rather than
+ performing signaling over the wireless link to register with the nFA,
+ the MN can defer the L3 handoff and continue to use its aFA (i.e.,
+ oFA in this case). If the MN moves to a third FA before registering
+ with the nFA, in certain cases described later, the third FA signals
+ aFA to move the wireless link end of the BET from nFA to it. The
+ network end of the BET remains anchored at aFA until the MN performs
+ the Mobile IPv4 Registration.
+
+ Messages between oFA/aFA and nFA MUST be authenticated. The minimal
+ requirement is that all FAs involved in low-latency handoffs MUST
+ support manual pre-configuration of security associations with other
+ neighboring FAs, involving shared keys and the default algorithms of
+ [1]. POST-REGISTRATION FAs MUST implement the inter-FA
+ authentication extension (FA-FA authentication extension) specified
+ in [11] and MAY additionally use other security mechanisms.
+
+
+
+
+
+
+
+
+
+El Malki, Ed. Experimental [Page 23]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+4.1. Two-Party Handoff
+
+ Two-party handoff occurs when the MN moves from oFA to nFA.
+ Normally, this movement would result in a new Mobile IPv4
+ Registration at nFA. However, in POST-REGISTRATION, the MN and nFA
+ MAY delay this but maintain connectivity using the BET (or
+ alternatively unidirectional tunnel) between oFA and nFA. The
+ protocol is shown in Figure 6.
+
+ 1a) L2-ST ~~~~> +------+ 2) HRqst +------+ <~~~ 1b) L2-TT
+ | oFA |<-------->| nFA |
+ 4a) L2-LD~> +------+ 3) HRply +------+ <~~~ 4b) L2-LU
+ ^ ^
+ old L2 | | new L2
+ +-------+ +-----+
+ | |
+ | |
+ V V
+ +------+ movement
+ 4c) L2-LU ---> | MN | --------->
+ +------+
+
+ Figure 6 - Two-Party Handoff (POST-REGISTRATION)
+
+ The following describes the progress of a two-party handoff. The
+ numbered items refer to steps in Figure 6. The source-triggered
+ HRqst/HRply message for tunnel creation, the target-triggered
+ HRqst/HRply message for tunnel creation, and the HRqst/HRply to
+ extend or terminate a BET (or unidirectional tunnel) are identified
+ using the suffixes (s), (t), and (r), respectively.
+
+ 1) Either the oFA or nFA receives an L2 trigger informing it that
+ a certain MN is about to move from oFA to nFA. The two cases
+ are:
+
+ a) The L2 trigger is a source trigger (L2-ST) at oFA. The
+ trigger contains the MN's L2 address and an identifier for
+ the nFA (the IPv4 address itself or an L2 address that can
+ be resolved to the IPv4 address of the nFA).
+
+ b) The L2 trigger is a target trigger (L2-TT) at nFA. The
+ trigger contains the MN's L2 address and an identifier for
+ the oFA (the IPv4 address itself or an L2 address that can
+ be resolved to the IPv4 address of the oFA).
+
+ 2) The FA receiving the trigger sends a Handoff Request (HRqst) to
+ the other FA. There are two cases:
+
+
+
+
+El Malki, Ed. Experimental [Page 24]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+ a) If oFA is sending the HRqst, the H bit is set and the N bit
+ is unset, indicating it is an HRqst(s). The HRqst(s)
+ contains the lifetime of the tunnel the oFA is willing to
+ support, the MN's IPv4 home address, the MN's HA address,
+ and an LLA option with the MN's L2 address. If the lifetime
+ is zero and the T bit is not set, the oFA is not willing to
+ tunnel any packets for MN. A positive lifetime and a set T
+ bit indicate that the oFA is willing to tunnel for the
+ indicated time. Section 4.5 describes the HRqst(s) and
+ Section 9 describes the LLA option.
+
+ b) If nFA is sending the HRqst, the N bit is set and the H bit
+ is unset, indicating that it is an HRqst(t). If the T bit
+ is set, nFA has requested a reverse tunnel and the HRqst(t)
+ contains the lifetime of the tunnel the nFA is requesting.
+ The HRqst(t) also contains an LLA option with the MN's L2
+ address. The MN's IPv4 home address and HA address are not
+ sent, unless they are discovered by some means outside the
+ scope of this document (for example, as part of the L2-TT).
+ Section 4.5 describes the HRqst(t).
+
+ 3) The FA receiving the HRqst sends a Handoff Reply (HRply) to the
+ other FA. There are two cases:
+
+ a) If oFA is sending the HRply, the N bit is set and the H and
+ R bits are unset, indicating that the reply is in response
+ to a HRqst(t), i.e., it is an HRply(t). If the T bit is
+ set, the HRply(t) contains the tunnel lifetime the oFA is
+ willing to provide; otherwise, the tunnel lifetime is set to
+ zero indicating that the oFA is not willing to provide
+ tunnel service. If both HRply(t) and HRqst(t) have the T
+ bit set and non-zero lifetime, a BET is established. The
+ HRply(t) also contains the MN's home subnet IPv4 address,
+ the MN's HA address, and an LLA option containing the MN's
+ L2 address. Section 4.6 describes the HRply(t).
+
+ b) If nFA sends the HRply, the H bit is set and the N and R
+ bits are unset, indicating that this is a response to
+ HRqst(s), i.e., it is an HRply(s). If the T bit is set, the
+ nFA indicates that it requests a reverse tunnel, and the
+ lifetime field is set with the requested tunnel lifetime.
+ The T bit can be set in HRply only if the oFA had set the T
+ bit in the corresponding HRqst or if the nFA is required to
+ reverse tunnel incoming packets to oFA because ingress
+ filtering is enabled on its network. This establishes a
+ BET. The tunnel lifetime requested by the nFA must be less
+ than or equal to the tunnel lifetime offered by oFA in the
+ HRqst(s). Section 4.6 describes the HRply(s).
+
+
+
+El Malki, Ed. Experimental [Page 25]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+ 4) The point during the L2 handoff in which the MN is no longer
+ connected on a given link is signaled by an L2-LD trigger at
+ oFA and MN. Completion of L2 handoff is signaled by an L2-LU
+ trigger at nFA and MN. The trigger is handled as follows:
+
+ a) When oFA receives the L2-LD trigger, it begins forwarding
+ MN-bound packets through the forward tunnel to nFA.
+
+ b) When the nFA receives the L2-LU trigger, it begins
+ delivering packets tunneled from oFA to MN and forwards
+ outbound packets from MN using normal routing mechanisms or
+ through a reverse tunnel to oFA or HA. The nFA at this
+ point may not yet be the default router of the MN (see
+ Section 4.4); therefore, to receive all outbound packets
+ from the MN the nFA must send a unicast proxy ARP message
+ (used in [1]) to the MN upon receiving an L2-LU trigger.
+ This proxy ARP message is an ARP Reply [5] sent by the nFA
+ on behalf of oFA, therefore supplying the nFA link-layer
+ address in the Sender Hardware Address field and the oFA
+ IPv4 address in the Target Protocol Address field.
+
+ c) When the MN receives the L2-LU, it MAY initiate the Mobile
+ IPv4 Registration process by soliciting an Agent
+ Advertisement as described in [1]. If the registration is
+ successful, the nFA takes over the role of anchor FA (aFA)
+ from the oFA. Alternatively, the MN MAY defer the Mobile
+ IPv4 Registration (see Section 4.4).
+
+ 5) The oFA becomes an aFA if the MN moves to a third FA before
+ having performed a Mobile IPv4 Registration with nFA.
+
+ 6) Should L2 handoff fail in Step 4 (due to L2 reasons) and a
+ ping-pong situation arise, the oFA may be able to determine
+ this case through the trigger mechanism (i.e., FA sees
+ successive L2-ST/L2-TT followed by L2-LD and then L2-LU). The
+ FA that originated the HRqst can in this case cancel the tunnel
+ by sending an HRqst(r) to the other FA with lifetime zero. It
+ will then simply continue delivering packets to MN exactly as
+ if no handoff had been pending. Section 4.5 describes the
+ HRqst(r).
+
+ If the oFA sets the B bit in HRqst/HRply and the nFA has not
+ requested a reverse tunnel by setting the T bit, the nFA SHOULD
+ tunnel outgoing packets from the MN to the HA because the MN has
+ requested this service from the oFA. The nFA SHOULD offer this
+ service only if no security between the nFA and the MN's HA is
+ required, or if there is an existing nFA-HA security association.
+
+
+
+
+El Malki, Ed. Experimental [Page 26]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+ The actual timing of BET or unidirectional tunnel placement depends
+ on the available L2 triggers. The forward tunnel from oFA to nFA is
+ constructed using one of the tunneling procedures described in [1]
+ for the HA to FA tunnel with the difference that the ends of the
+ tunnel are at the oFA and nFA, respectively. The reverse tunnel from
+ nFA to oFA is constructed as described in [3] with the difference
+ that the network end of the tunnel is at the oFA instead of the HA.
+ If both forward and reverse tunnels are established, then a BET has
+ been established. With optimal L2 trigger information, as described
+ above, the FAs can set up the BET immediately when the L2 handoff is
+ initiated, start tunneling MN-bound data when the link to the MN goes
+ down, and the nFA can use the link-up trigger to start delivering
+ packets. In the absence of optimal L2 trigger information, the HRply
+ can act as the trigger to start tunneling MN-bound data, but in this
+ case, the period of packet delivery disruption to the MN could still
+ be present and additional measures may be required to provide
+ uninterrupted service. Particular implementation and deployment
+ scenarios could require techniques to smooth the handoff by providing
+ a means to convey packets arriving during the L2 handoff. The exact
+ techniques are outside the scope of this document.
+
+ Figures 7 and 8 show timing diagrams for source trigger (L2-ST) and
+ target trigger (L2-TT) two-party handoffs, respectively.
+
+ MN nFA oFA
+ | | |
+ | | HRqst(s) |<~~~ L2-ST
+ | |<------------------|
+ | | HRply(s) |
+ | |------------------>|
+ | | |
+ --------------------------------------------<~~~ L2-LD
+ L2 Handoff
+ --------------------------------------------<~~~ L2-LU
+ | | |
+ |<------------------->| |
+ | MN's traffic | |
+
+ Figure 7 - Two-Party Source Trigger Handoff Timing
+
+
+
+
+
+
+
+
+
+
+
+
+El Malki, Ed. Experimental [Page 27]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+ MN nFA oFA
+ | | |
+ | L2-TT ~~~>| HRqst(t) |
+ | |------------------>|
+ | | HRply(t) |
+ | |<------------------|
+ | | |
+ --------------------------------------------<~~~ L2-LD
+ L2 Handoff
+ --------------------------------------------<~~~ L2-LU
+ | | |
+ |<------------------->| |
+ | MN's traffic | |
+
+ Figure 8 - Two-Party Target Trigger Handoff Timing
+
+ Once the tunnel between aFA and the current FA is in place, it is
+ torn down by one of the following events:
+
+ 1) The aFA decides to stop tunneling because the lifetime it sent
+ expires and was not renewed, or the aFA or current FA decide to
+ terminate tunnel service prematurely for some other reason
+ (refer to Section 4.3).
+
+ 2) The MN completes the process by performing a Mobile IPv4
+ Registration with the current FA. This may be initiated by the
+ FA that sends an Agent Advertisement or by the MN that solicits
+ for an Agent Advertisement as in [1].
+
+ 3) The MN moves to a third FA (see Section 4.2)
+
+4.2. Three-Party Handoff
+
+ Three-party handoff is applicable when an MN, which has already
+ established an aFA and is receiving tunneled packets through its
+ current FA, moves to a new FA without performing a Mobile IPv4
+ Registration.
+
+ The need for the three-party handoff function depends on the wireless
+ system in which POST-REGISTRATION is being implemented. For radio L2
+ protocols in which it is possible for the MN to move so rapidly from
+ one FA to another such that a probability exists that the Mobile IPv4
+ Registration with nFA will not complete before the MN moves on, HTT
+ (Handoff to Third) SHOULD be implemented. Certain wireless systems
+ and implementations do not allow such fast movement between FAs and
+ may force the Mobile IPv4 Registration to occur soon after L2
+ handoff, in which case three-party handoff is not applicable. If
+ this three-party handoff feature is not implemented, the FA SHOULD
+
+
+
+El Malki, Ed. Experimental [Page 28]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+ send an Agent Advertisement to the MN after L2 handoff has completed
+ (L2-LU at nFA) and/or the MN SHOULD solicit an Agent Advertisement
+ after L2 handoff (L2-LU at MN).
+
+ +------+
+ +--->| aFA |<---+
+ | +------+ |
+ 4b) HRqst(r) | | 3) HRqst(t)
+ HRply(r) | | HRply(t)
+ | |
+ v 2a) HRqst v
+ 1a) L2-ST ~~~> +------+ HTT +------+ <~~~ 1b) L2-TT
+ | oFA |<-------->| nFA |
+ 4a) L2-LD ~~~> +------+ 2b) HTT +------+ <~~~ 5a) L2-LU
+ ^ HRply ^
+ old L2 | | new L2
+ +-------+ +-----+
+ | |
+ | |
+ V V
+ +------+ movement
+ 5b) L2-LU ~~~> | MN | --------->
+ +------+
+
+ Figure 9 - Three-Party Handoff
+
+ The L3 handoff can be deferred either because of a decision by the
+ MN/FA (i.e., MN does not send Agent Solicitations and FA does not
+ send Agent Advertisements), or it may result from rapid movement
+ between oFA and nFA that does not allow enough time for the
+ registration to complete. This scenario is shown in Figure 9. In
+ this case, oFA must inform nFA (i.e., the third FA) to contact aFA
+ about moving the radio end of the tunnel. This is performed with the
+ HTT message. The general idea behind the three-party handoff
+ procedure is that the oFA supplies nFA with the same information it
+ would have obtained via an L2-TT if handoff had occurred from aFA to
+ nFA; then, the nFA performs an HRqst(t)/HRply(t) sequence with aFA in
+ order to move the BET to nFA. When the L2 handoff is complete, oFA
+ sends an HRqst(r) to aFA to terminate the previous BET.
+
+ The following describes the progress of a three-party handoff. The
+ numbered items refer to steps in Figure 9.
+
+ 1) Either the oFA or nFA receives an L2 trigger informing it that
+ a certain MN is about to be moved. The two cases are:
+
+
+
+
+
+
+El Malki, Ed. Experimental [Page 29]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+ a) The L2 trigger is a source trigger (L2-ST) at oFA. The
+ trigger contains the MN's L2 address and an identifier for
+ the nFA (the IPv4 address itself or an L2 address that can
+ be mapped to the IPv4 address of the nFA).
+
+ b) The L2 trigger is a target trigger (L2-TT) at nFA. The
+ trigger contains the MN's L2 address and an identifier for
+ the oFA (the IPv4 address itself or an L2 address that can
+ be resolved to the IPv4 address of the oFA).
+
+ 2) The oFA and nFA exchange an HTT/HRply or HRqst/HTT pair. HTT
+ is indicated by setting both the H and N bits in the HRqst or
+ HRply. The HTT message MUST NOT have any tunnel flag bits set,
+ because the tunnel is negotiated between the aFA and nFA, not
+ oFA and nFA. There are two cases:
+
+ a) The L2 trigger is an L2-ST. The oFA sends HTT to nFA
+ containing the MN's home IPv4 address, the MN's HA address,
+ an LLA containing the aFA's IPv4 address, and an LLA
+ containing the L2 address of the MN. This is enough
+ information for nFA to perform a target-triggered handoff
+ with aFA. The nFA responds with an HRply(s). Section 4.7
+ describes the HTT.
+
+ b) The L2 trigger is an L2-TT. The nFA sends HRqst(t) to oFA,
+ exactly as if a two-party handoff were occurring. The oFA
+ responds with HTT containing the same information as in a)
+ above. This is enough information for nFA to perform a
+ target-triggered handoff with aFA.
+
+ 3) Upon receipt of the HTT, the nFA first checks its Visitor Cache
+ to see whether it is already tunneling for MN. If so, Step 6
+ is performed. If not, nFA performs a target-triggered handoff
+ with aFA, exactly as in Section 4.1, exchanging an
+ HRqst(t)/HRply(t) pair. Because aFA receives no L2 trigger
+ indicating when L2 handoff starts, it may start tunneling to
+ nFA upon transmission of the HRply(t).
+
+ 4) Once the L2 handoff is under way and the MN gets disconnected
+ at L2, aFA and oFA exchange messages canceling tunnel service
+ between aFA and oFA and allowing aFA to start the tunnel with
+ nFA.
+
+ a) The point in the L2 handoff process where the MN gets
+ disconnected from oFA is signaled at oFA by L2-LD.
+
+
+
+
+
+
+El Malki, Ed. Experimental [Page 30]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+ b) The oFA exchanges an HRqst(r)/HRply(r) pair having lifetime
+ zero with aFA. This cancels tunnel service between oFA and
+ aFA. If aFA has not already established a tunnel to nFA, it
+ must do so immediately upon receipt of the HRqst(r). The
+ aFA provides tunneling service exactly as described in
+ Section 4.1, Step 4a.
+
+ 5) Completion of L2 handoff is signaled by an L2-LU trigger at nFA
+ and/or MN. The nFA and MN handle the trigger as follows:
+
+ a) The nFA provides packet delivery service to the MN exactly
+ as described in Section 4.1, Step 4b.
+
+ b) The MN either defers or initiates Mobile IPv4 Registration
+ when it receives the L2-LU, as in Section 4.1.
+
+ 6) In the special case where nFA and aFA are the same (i.e., the
+ MN is moving back to the original anchor FA), aFA recognizes
+ that it is tunneling to oFA when it checks its Visitor Cache in
+ Step 3. In this case, there is no need for aFA to send the
+ HRqst(t)/HRply(t) in Step 3. Upon receipt of the L2-LU trigger
+ on handoff completion, the aFA begins routing packets to MN and
+ the tunnel to nFA is torn down. The oFA still exchanges the
+ HRqst(r)/HRply(r) with aFA in Step 4b because oFA cannot know a
+ priori that aFA and nFA are the same, but they are redundant.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+El Malki, Ed. Experimental [Page 31]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+ Figures 10 and 11 show timing diagrams for source trigger (L2-ST) and
+ target trigger (L2-TT) three-party handoff, respectively.
+
+ MN nFA oFA aFA
+ | | L2-ST ~~~> | |
+ | | | |
+ | |<-------------| |
+ | | HTT | |
+ | |------------->| |
+ | | HRply(s) | |
+ | |------------------------------>|
+ | | HRqst(t) | |
+ | |<------------------------------|
+ | | HRply(t) | |
+ | | | |
+ ----------------------------------<~~~ L2-LD |
+ |--------------->|
+ L2 Handoff | HRqst(r) |
+ | |
+ |<---------------|
+ | HRply(r) |
+ | |
+ ----------------------------------<~~~ L2-LU |
+ | MN's traffic | | |
+ |<-------------->| | |
+
+ Figure 10 - Three-Party Source Trigger Handoff Timing
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+El Malki, Ed. Experimental [Page 32]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+ MN nFA oFA aFA
+ | | | |
+ | |<~~~ L2-TT | |
+ | |------------->| |
+ | | HRqst(t) | |
+ | |<-------------| |
+ | | HTT | |
+ | |------------------------------>|
+ | | HRqst(t) | |
+ | |<------------------------------|
+ | | HRply(t) | |
+ | | | |
+ ----------------------------------<~~~ L2-LD |
+ |--------------->|
+ L2 Handoff | HRqst(r) |
+ | |
+ |<---------------|
+ | HRply(r) |
+ | |
+ ----------------------------------<~~~ L2-LU |
+ | MN's traffic | | |
+ |<-------------->| | |
+
+ Figure 11 - Three-Party Target Trigger Handoff Timing
+
+ Unlike two-party handoff, the timing of BET establishment between aFA
+ and nFA cannot fully depend on the availability of L2 trigger
+ information because aFA does not receive an L2 trigger signaling L2
+ handoff. The two timing extremes at which aFA can place the BET with
+ nFA are:
+
+ 1) At the earliest, aFA MAY start tunneling packets using the BET
+ to nFA after sending the HRply(t) to nFA in response to the
+ request for target-triggered handoff.
+
+ 2) At the latest, aFA MAY start tunneling packets using the BET to
+ nFA and tear down the BET with oFA when receiving the HRqst(r)
+ from oFA indicating that the MN has disconnected.
+
+ In addition, aFA MAY continue tunneling to oFA if 1) is selected,
+ until the HRqst(r) is received. In this case, the result may be
+ duplicated packets at the MN because the MN will receive packets
+ through oFA on the old L2 until it disconnects (L2-LD). If 2) is
+ selected, the additional latency will add to the MN's L3 service
+ disruption period. Of course, aFA can choose to place the BET
+ sometime between 1) and 2) if reliable bounds are available on the
+ duration of time between L2-ST/L2-TT and the MN's disconnection (L2-
+ LD). The exact selection of when to establish the BET is likely to
+
+
+
+El Malki, Ed. Experimental [Page 33]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+ be influenced by network engineering and implementation
+ considerations, including whether a handoff smoothing solution is
+ used, and is beyond the scope of this specification.
+
+4.3. Renewal or Termination of Tunneling Service
+
+ To prevent a BET from expiring when its lifetime runs out, the MN's
+ current FA signals the aFA to either renew or terminate the BET.
+ This may be the case when the MN defers Mobile IPv4 Registration. If
+ no such signal is received, the aFA will terminate the BET when the
+ lifetime expires. In addition, the current FA or aFA may need to
+ terminate the BET prior to the lifetime expiring. In order to avoid
+ error conditions in which tunnels do not expire even though the MN to
+ which they apply is no longer reachable, FAs SHOULD set the tunnel
+ lifetime field to some value other that 0xffff, which indicates "good
+ until canceled".
+
+ Figure 12 illustrates the message exchange that occurs between the FA
+ needing to terminate or extend the tunnel (designated FA(1) in the
+ figure) and the other FA (designated FA(2) in the figure). The
+ HRqst(r)/HRply(r) is indicated by setting the R bit in the
+ HRqst/HRply messages. If the HRqst(r) is renewing a BET, then it
+ contains a non-zero lifetime; otherwise, if the lifetime is set to
+ zero, it indicates tunnel termination. The aFA has complete control
+ over whether a tunnel is extended or terminated, and it MAY reply to
+ a request for extension with a shorter lifetime than was requested.
+
+ HRqst(r)
+ +------+ <-------- +------+
+ | FA(2)| ---------> | FA(1)|
+ +------+ HRply(r) +------+
+
+ Figure 12 - BET Renewal or Termination
+
+4.4. When Will the MN Perform a Mobile IPv4 Registration?
+
+ The MN/FA have control over when to perform the Mobile IPv4
+ Registration. Although the MN/FA may decide to defer Mobile IPv4
+ Registration for a certain period, three possible events can lead to
+ the need to terminate tunneling service. If this occurs, the MN MUST
+ perform the Mobile IPv4 Registration. These events are:
+
+ 1) The end of life for the BET is pending and a request by the
+ current FA to aFA for renewal has been denied, or alternatively
+ the current FA or aFA needs to terminate the BET prematurely.
+ The FA in this case MUST initiate the Mobile IPv4 Registration
+ by sending an Agent Advertisement to the MN as in [1].
+
+
+
+
+El Malki, Ed. Experimental [Page 34]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+ 2) The MN itself decides to perform a Mobile IPv4 Registration and
+ initiates it by sending an Agent Solicitation as in [1].
+
+ 3) During a source-triggered handoff, the oFA attempts to perform
+ BET handoff but nFA is not capable of performing it. The FA in
+ this case MUST initiate the Mobile IPv4 Registration by sending
+ the MN an Agent Advertisement as in [1]. Note that this
+ situation will never arise during target-triggered handoff
+ because an HRqst(t) will not be sent to oFA by an nFA that
+ doesn't support POST-REGISTRATION.
+
+ Some detailed scenarios relating to case 2) will be described
+ hereafter. According to [1], when using an FA care-of address, the
+ MN MAY use the FA as its default router. Otherwise, it MUST choose
+ its default router from those advertised in the ICMP Router
+ Advertisement portion of the Agent Advertisement. Here we assume
+ that the FA router is also the MN's default router. In POST-
+ REGISTRATION, when a tunnel is established between oFA and nFA and
+ the MN has moved to nFA, the oFA MUST NOT send Agent Advertisements
+ to the MN. In this case, it is possible that the MN will not receive
+ Agent Advertisements for extended periods of time. According to [8],
+ hosts will remove default router entries if the lifetime of the
+ Router Advertisement expires and no further advertisements are
+ received. Note that the ICMP Router Advertisement lifetime is not
+ related to the Registration Lifetime in the Mobility Agent
+ Advertisement extension [1]. To avoid this disruption, the MN MUST
+ solicit the default router (i.e., FA) before the lifetime of its
+ active default router entry runs out, or alternatively, the FA MUST
+ advertise as soon as the MN-nFA link is up (L2-LU). This effectively
+ means that the MN will at most be able to defer Mobile IPv4
+ Registration for as long as the remaining lifetime of the active
+ default router, as configured in the ICMP Router Advertisements. The
+ MN MUST perform a Mobile IPv4 Registration [1] when it receives an
+ Agent Advertisement following a POST-REGISTRATION handoff.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+El Malki, Ed. Experimental [Page 35]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+4.5. Handoff Request (HRqst) Message Format
+
+ This is a new Mobile IPv4 message carried on UDP (destination port
+ 434) [1]. The UDP header is followed by the fields below.
+
+ 0 1 2 3
+ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Type |H|N|R|M|G|T|B| Reserved |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Lifetime | Reserved |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | MN Home Address |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | HA Address |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | |
+ + Identification +
+ | |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Extensions ...
+ +-+-+-+-+-+-+-+-
+
+ Type 16 (Handoff Request)
+
+ H Source-triggered handoff request. When set and
+ the N bit is unset, indicates that the request
+ was the result of an L2-ST at oFA.
+
+ N Target triggered handoff request. When set and
+ the H bit is unset, indicates that the request
+ was the result of an L2-TT at nFA.
+
+ R Set if the request is an HRqst(r) (i.e., a
+ request to renew the tunnel, H and N bits must
+ be unset).
+
+ M The FA issuing the HRqst will use Minimal
+ Encapsulation as defined in [1,5] for the
+ tunnel.
+
+ G The FA issuing the HRqst will use Generic
+ Routing Encapsulation (GRE) [4] as defined in
+ [1,5] for the tunnel. Extensions of HRqst
+ containing GRE type and key Fields are outside
+ the scope of this document.
+
+
+
+
+
+El Malki, Ed. Experimental [Page 36]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+ T For an HRqst(s), indicates that the oFA is
+ willing to support both forward and reverse
+ tunnel service. For an HRqst(t), indicates that
+ the nFA is requesting reverse tunnel service.
+
+ B When sent in an HRqst(s), indicates that the MN
+ has requested a reverse tunnel to the HA and
+ that the nFA SHOULD use a reverse tunnel to the
+ HA if it will not be reverse tunneling to the
+ oFA.
+
+ Lifetime The lifetime of the tunnel in seconds. If this
+ is an HRqst(t), then the lifetime represents a
+ request by nFA for a reverse tunnel. If this is
+ an HRqst(s), then the lifetime represents the
+ maximum amount of time that oFA is willing to
+ maintain both forward and reverse tunnels. If
+ this is an HRqst(r), then the lifetime
+ represents a request for the amount of time to
+ renew the tunnel's lifetime. A value of 0 on an
+ HRqst(s) indicates that the oFA is unwilling to
+ grant tunnel service. A value of 0 on an
+ HRqst(t) indicates that the nFA does not require
+ reverse tunnel service. A value of 0 on an
+ HRqst(r) indicates that the tunnel should be
+ terminated. A value of 0xffff indicates
+ infinity.
+
+ MN Home Address For HRqst(s), the home address of the MN.
+
+ HA Addr For HRqst(s), the HA address of the mobile node.
+
+ Identification As defined in [1].
+
+ Extensions The message MUST include an LLA (see Section 9)
+ containing the MN's L2 address and an L2 address
+ that can be mapped to an IPv4 address for the
+ FA. This message MUST contain the FA-FA
+ Authentication Extension [11] that is used to
+ secure the HRqst message.
+
+
+
+
+
+
+
+
+
+
+
+El Malki, Ed. Experimental [Page 37]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+4.6. Handoff Reply (HRply) Message Format
+
+ This is a new Mobile IPv4 message carried on UDP (destination port
+ 434) [1]. The UDP header is followed by the fields below.
+
+ 0 1 2 3
+ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Type |H|N|R|M|G|T|B| Reserved | Code |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Lifetime | Reserved |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | MN Home Address |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | HA Address |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | |
+ + Identification +
+ | |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Extensions ...
+ +-+-+-+-+-+-+-+-
+
+ Type 17 (Handoff Reply)
+
+ Code A value indicating the result of the Handoff
+ Request. Only two codes are currently
+ supported, 0, indicating success, and 1,
+ indicating that the handoff cannot be performed.
+ The remaining values are for future use.
+
+ Lifetime The lifetime, in seconds, for which the
+ bidirectional tunnel for the MN will be
+ maintained. If this is an HRply(s), then the
+ lifetime represents a request by nFA, and it can
+ be any value up to the maximum value sent in the
+ HRqst(s). Larger values are assumed to default
+ to oFA's maximum. If this is an HRply(t), then
+ the lifetime represents the maximum amount of
+ time that the oFA will grant to the nFA. If
+ this is an HRply(r), then the lifetime
+ represents the amount of time by which the
+ tunnel life will be extended. If the Code field
+ indicates that handoff failed, the Lifetime
+ field will be ignored and SHOULD be set to zero.
+ A value of 0 on an HRply(t) indicates that the
+ oFA is unwilling to grant service. A value of 0
+ on an HRply(s) indicates that the nFA does not
+
+
+
+El Malki, Ed. Experimental [Page 38]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+ require service. A value of 0 on an HRply(r)
+ indicates that the tunnel lifetime will be
+ terminated. A value of 0xffff indicates an
+ infinite lifetime.
+
+ H Source-triggered handoff reply. When set and
+ the N bit is unset, indicates that the reply is
+ in response to an HRqst(s).
+
+ N Target-triggered handoff reply. When set and
+ the H bit is unset, indicates that the reply is
+ in response to an HRqst(t).
+
+ R Set if the reply is an HRply(r). Neither the H
+ nor the N bit are set.
+
+ M The FA issuing the HRqst will use Minimal
+ Encapsulation as defined in [1,5] for the
+ tunnel.
+
+ G The FA issuing the HRqst will use GRE [4]
+ Encapsulation as defined in [1,5] for the
+ tunnel. When this flag bit is set, the HRply
+ may require extensions containing the GRE type
+ and key fields, but they are outside the scope
+ of this document.
+
+ T For an HRply(s), indicates that the nFA is
+ requesting to reverse tunnel service. For an
+ HRply(t), indicates that the oFA is willing to
+ provide both forward and reverse tunnel service.
+
+ B When sent in an HRply(t), indicates that the MN
+ has requested a reverse tunnel to the HA and
+ that the nFA SHOULD use a reverse tunnel to the
+ HA if it will not be reverse tunneling to the
+ oFA. It can be set in HRply(t) only if the T
+ bit was unset in the corresponding HRqst(t).
+
+ MN Home Address For HRply(t), the home IPv4 address of the MN.
+
+ HA Addr For HRply(t), the HA IPv4 address of the MN.
+
+ Identification As defined in [1].
+
+ Extensions This Message MUST contain the FA-FA
+ Authentication Extension [11] that is used to
+ secure the HRply message.
+
+
+
+El Malki, Ed. Experimental [Page 39]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+4.7. Handoff to Third (HTT) Message Format
+
+ The Handoff to Third message has the same format as the Handoff
+ Request and Handoff Reply messages, except both the H and N bits are
+ set. If the HTT message is in response to an L2-ST and is sent to
+ initiate a handoff, then, with the exception of the H and N bits, the
+ message has the same fields set and includes the same extensions as
+ an HRqst(s). If the HTT message is sent in response to an HRqst(t),
+ then, with the exception of the H and N bits, the message has the
+ same fields set and includes the same extensions as an HRply(t). The
+ tunnel bits MUST NOT be set in the HTT message because BET
+ construction is not negotiated between oFA and nFA; it is negotiated
+ between nFA and aFA in the ensuing HRqst(t)/HRply(t).
+
+ In addition, the HTT MUST contain the following extensions in the
+ specified order:
+
+ Solicited IPv4 Address Option: containing aFA's Address
+
+ LLA Option: containing the L2 address of the MN.
+
+4.8. Applicability of POST-REGISTRATION Handoff Method
+
+ The POST-REGISTRATION handoff approach allows FAs to communicate
+ directly about a pending handoff, and does not require any IPv4-layer
+ messages to be sent to or from an MN prior to the L2 handoff event.
+ Therefore, it eliminates a possible source of handoff latency. This
+ may be required when the link layer imposes hard deadlines on the
+ time at which a handoff must occur, such as when an MN is rapidly
+ moving out of a radio coverage area. Consequently, POST-REGISTRATION
+ is primarily of interest in handoff between FAs that support the same
+ radio access technology. Handoff between heterogeneous radio
+ technologies will, of necessity, require interaction between the MN
+ and the network, and so is not a domain of applicability for POST-
+ REGISTRATION.
+
+ Because a POST-REGISTRATION handoff is triggered by an unspecified
+ mechanism that informs the oFA or nFA that an L2 handoff is pending,
+ the POST-REGISTRATION approach is only applicable to networks where
+ such a mechanism is available. For example, an L2 may provide
+ indications of radio signal quality that cause the oFA or nFA to send
+ the POST-REGISTRATION handoff messages. Any such indications must
+ also provide each FA involved in the handoff with the identity of the
+ other, so that messages can be sent to the right place. This may
+ involve mapping L2 information onto FA IPv4 addresses. Also, the FAs
+ involved in a handoff must have pre-provisioned security arrangements
+ so that the POST-REGISTRATION messages can be authenticated. If a
+ handoff is to be completed as a result of the POST-REGISTRATION
+
+
+
+El Malki, Ed. Experimental [Page 40]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+ messaging, any L2 handoff indications must also be securely
+ authenticated so that traffic to the old point of attachment is not
+ improperly halted.
+
+ POST-REGISTRATION handoff is appropriate in the following cases:
+
+ - L2 triggers are available on the network to indicate that L2
+ handoff is pending.
+
+ - Pre-provisioned security mechanisms are in place to allow fast
+ and secure messaging between the FAs and between the MN and an
+ FA.
+
+ - Access point choice by the MN is not a concern or the choice
+ requires user intervention and therefore is not on the critical
+ path for handoff.
+
+5. Combined Handoff Method
+
+ The combined method uses both PRE-REGISTRATION and POST-REGISTRATION
+ handoff. If PRE-REGISTRATION does not complete prior to the
+ expiration of a timer on the nFA, the POST-REGISTRATION mechanism is
+ used to create the tunnel between oFA and nFA. This protects the MN
+ from delays caused by errors such as loss of the Mobile IPv4
+ Registration Reply message involved in PRE-REGISTRATION for the
+ mobile-initiated and network-initiated source-triggered cases. It
+ also protects the MN from delays caused by errors or the loss of any
+ of the Mobile IPv4 messages involved in PRE-REGISTRATION for the
+ network-initiated target-triggered case.
+
+ When the nFA receives a target trigger, it will follow the PRE-
+ REGISTRATION procedure. When the combined method is used, the nFA
+ MUST also start a timer when it receives a target trigger. The timer
+ should be set to a small value (default for target trigger case: 1
+ second).
+
+ According to PRE-REGISTRATION, the nFA will receive the Registration
+ Request from the MN. When the combined method is used, this
+ Registration Request sent by the MN MUST contain the IPv4 address of
+ the oFA in an FA IPv4 address LLA extension (see Section 9.7). This
+ same Registration Request message will contain multiple LLA
+ extensions, since it will also contain the MN's layer 2 address in an
+ LLA extension as described for PRE-REGISTRATION (see Sections 3.7 and
+ 9). When the nFA has not started the handoff procedure using a
+ target trigger (i.e., mobile-initiated or network-initiated target-
+ triggered cases), the nFA MUST start a timer as soon as it receives
+ the low-latency Registration Request from the MN. This timer should
+ be set to a small value (default: 1 second).
+
+
+
+El Malki, Ed. Experimental [Page 41]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+ In all cases, the timer MUST be reset when the Registration Reply
+ message is received by nFA. If the timer expires before the
+ Registration Reply is received, the nFA MUST initiate the POST-
+ REGISTRATION procedure. The nFA utilizes the oFA IPv4 address
+ (previously received in the extension to the Registration Request
+ message) as the destination of the POST-REGISTRATION HRqst message to
+ create the tunnel between nFA and oFA. The nFA MAY tear down this
+ tunnel when it receives and forwards a successful Registration Reply
+ for that MN.
+
+6. Layer 2 and Layer 3 Handoff Timing Considerations
+
+ In the optimal cases considered in the PRE-REGISTRATION and POST-
+ REGISTRATION handoffs, it was assumed that a timely L2 trigger would
+ be received in such a way that packets could be delivered to the MN
+ via its nFA immediately upon connection. In this way, the MN does
+ not suffer disruption due to the L3 handoff. However, such precise
+ timing of the L2 trigger and handoff mechanism with respect to the
+ actual L2 handoff event will not be possible in all wireless systems
+ and may depend on particular implementation techniques. Therefore,
+ some uncertainty may exist at L3 as to exactly when the L2 connection
+ between the MN and the nFA becomes fully established and can be used
+ for L3 traffic. It is possible that in certain implementations
+ traffic will be re-routed too early or too late with respect to the
+ moment when the connection between the MN and the nFA becomes fully
+ established. The techniques that may solve this problem and allow
+ the MN to receive traffic independently of the timing of the L2
+ handoff event include buffering and simultaneous bindings (i.e.,
+ bicasting: setting the S bit [1] in Registration Requests). However,
+ these are optional and are not mandated.
+
+7. Reverse Tunneling Support
+
+ The handoff methods all support reverse tunneling. The MN may
+ request reverse tunneling [3] by setting the T bit in its
+ Registration Request. In the case of POST-REGISTRATION, if the MN
+ had requested reverse tunneling previously at oFA, the handoff
+ message from oFA (see Section 4) includes the T bit enabled to inform
+ nFA to establish a BET for the visitor entry. Typically, the T bit
+ will always be set to ensure that any delays in the MN receiving its
+ new care-of address do not result in any delay in uplink packet
+ transmission from the MN, but local policies and particular L2
+ technologies may allow the reverse tunnel to be turned off.
+
+
+
+
+
+
+
+
+El Malki, Ed. Experimental [Page 42]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+8. Handoff Signaling Failure Recovery
+
+ In general and to a greater extent in wireless networks, packets
+ carrying handoff signaling may be dropped or lost due to errors on
+ the link. In this section, we consider mechanisms for recovery from
+ handoff signaling failures.
+
+8.1. PRE-REGISTRATION Signaling Failure Recovery
+
+ Failure of PRE-REGISTRATION signaling breaks down into three cases:
+
+ 1) Loss of messages PrRtSol and PrRtAdv on the air link.
+
+ 2) Loss of the solicitation by an FA to obtain another neighboring
+ FA's Advertisement or loss of the neighboring FA's
+ advertisement.
+
+ 3) Failure of the standard Mobile IPv4 Registration.
+
+ Of these, case 3) is handled by standard Mobile IPv4 mechanisms
+ described in [1]. Case 2) is expected to be a rare event because
+ spontaneous packet drop rates on the fixed network are caused by
+ congestion or router failure. Since bit error rates on wireless
+ links are higher than on fixed links, case 1) is more likely to
+ occur. In the following subsections, cases 1) and 2) are considered.
+
+8.1.1. Failure of PrRtSol and PrRtAdv
+
+ PRE-REGISTRATION handoff can fail in network-initiated handoff when
+ the PrRtAdv sent by oFA in response to the source trigger (L2-ST) or
+ the advertisement sent by nFA in response to the target trigger (L2-
+ TT) fails to reach the MN. PRE-REGISTRATION handoff can also fail in
+ mobile-initiated handoff when either the PrRtSol sent from the MN or
+ return PrRtAdv sent from the oFA is dropped. To reduce the
+ probability that PrRtAdv and PrRtSol are lost, the MN and FA MAY
+ transmit multiple copies of these messages. Should these messages
+ fail anyway, in both cases the MN connects to the nFA without having
+ received any prior signaling. In this case, the MN solicits an FA
+ Advertisement when it connects to nFA at L2 (L2-LU), as described in
+ Section 3.6, and performs a standard Mobile IPv4 Registration with
+ the nFA as specified in [1].
+
+
+
+
+
+
+
+
+
+
+El Malki, Ed. Experimental [Page 43]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+8.1.2. Failure of Inter-FA Solicitation and Advertisement
+
+ The solicitation from an FA to another neighboring FA may fail or the
+ corresponding advertisement from the neighboring FA may be lost. To
+ reduce the probability that these messages are lost, the FAs MAY
+ transmit multiple copies of these messages. If a failure occurs
+ anyway, the FA soliciting the Agent Advertisement is unable to send a
+ PrRtAdv in response to a source trigger or to a mobile-initiated
+ PrRtSol. In these cases, when the MN does not receive a notification
+ or confirmation of a PRE-REGISTRATION handoff, the MN MUST perform a
+ standard Mobile IPv4 Registration as soon as it connects to the nFA
+ (L2-LU) as described in Section 8.1.1.
+
+8.2. POST-REGISTRATION Signaling Failure Recovery
+
+ Failure occurs in POST-REGISTRATION when either the HRqst or HRply
+ message is dropped. The effects of the failure and the recovery
+ procedure depend on which message is dropped, and whether the handoff
+ is source or target triggered. Since all of the POST-REGISTRATION
+ signaling is going over the fixed network, it can be expected that
+ spontaneous dropping of packets in the absence of congestion and
+ router failure should be a relatively rare event. Nevertheless,
+ failure recovery mechanisms SHOULD be implemented.
+
+8.2.1. HRqst Message Dropped
+
+ If the HRqst message is dropped, the effect is the same for both
+ source- and target-triggered handoffs. In either case, the FA to
+ which the HRqst was destined will never respond with an HRply
+ message. If the handoff is source triggered, then the nFA never
+ learns of the handoff, and the oFA never receives confirmation. If
+ the handoff is target-triggered, then the oFA never learns of the
+ handoff, and the nFA never receives confirmation.
+
+ The recovery procedure in this case is as follows: the oFA MUST NOT
+ construct a forward tunnel when the MN moves off-link (L2-LD) if the
+ handoff is source-triggered, and the nFA MUST NOT construct a reverse
+ tunnel if the handoff is target triggered. If the nFA was not
+ informed of the handoff by an HRqst message (corresponding to failure
+ of source-triggered handoff) or if the handoff was not confirmed by
+ an HRply message (corresponding to failure of target-triggered
+ handoff), the nFA MUST unicast an Agent Advertisement to the MN as
+ soon as its L2 connection is established (L2-LU at nFA).
+
+
+
+
+
+
+
+
+El Malki, Ed. Experimental [Page 44]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+8.2.2. HRply Message Dropped
+
+ If the HRply message is dropped, the FA sending the HRply will assume
+ that the handoff has been confirmed, but the FA that is expecting to
+ receive the HRply does not receive confirmation. In this case, the
+ failure recovery procedure is different for source-triggered and
+ target-triggered handoffs.
+
+ In a target-triggered handoff, the oFA assumes that the handoff is
+ confirmed because it has sent the HRply, but the nFA has not received
+ it so it does not have confirmation. The oFA starts tunneling
+ packets to the nFA when the MN moves from its link (L2-LD). The nFA
+ MUST send an FA Advertisement to the MN as soon as its L2 link is up
+ (L2-LU at nFA) and MAY drop the tunneled packets. The nFA SHOULD
+ send an ICMP Destination Unreachable [9] message to the oFA. When
+ the oFA receives this message, it will terminate the tunnel and stop
+ forwarding packets. If reverse tunneling was requested, the nFA MUST
+ NOT reverse tunnel because it has not received handoff confirmation.
+
+ In source-triggered handoff, the nFA assumes that the handoff is
+ confirmed because it has sent the HRply, but the oFA has not received
+ it so it does not have confirmation. Without failure recovery, the
+ MN could move to the nFA without the oFA being able to start the
+ forward tunnel for the MN's packets, and the MN would not be able to
+ initiate a Mobile IPv4 Registration because it does not know that the
+ handoff has failed. In this situation, the oFA MUST send out an
+ HRqst message to the nFA with lifetime zero as soon as the MN leaves
+ its link (L2-LD). The oFA SHOULD continue to retransmit the HRqst
+ message, with exponential backoff for CONFIG-HFAIL seconds or until
+ it receives an HRply acknowledging the request to cancel the tunnel.
+ The default value for CONFIG-HFAIL is 10 seconds. When the nFA
+ receives the HRqst, it MUST immediately send an Agent Advertisement
+ to the MN, as is the case whenever a tunnel is canceled. In
+ addition, the oFA MUST also drop any packets received through the
+ reverse tunnel from the nFA. The oFA SHOULD NOT send the ICMP
+ Destination Unreachable message to the nFA because the nFA has been
+ informed by the HRqst message to cancel the tunnel. However, if the
+ nFA receives an ICMP Destination Unreachable message for the tunnel
+ prior to receiving the HRqst canceling the tunnel, it MUST send an FA
+ Advertisement to the MN and cancel the tunnel.
+
+
+
+
+
+
+
+
+
+
+
+El Malki, Ed. Experimental [Page 45]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+9. Generalized Link Layer and IPv4 Address (LLA) Extension
+
+ This section defines the Generalized Link Layer and IPv4 Address
+ (LLA) Extension, used by any node that needs to communicate link
+ layer and IPv4 addresses. The format of the extension relies on
+ sub-types, where each sub-type defines its own sub-structure. This
+ document defines six sub-types. Future RFCs should allocate their
+ own sub-type and define their own address formats.
+
+ 0 1 2 3
+ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Type | Length | Sub-Type | LLA ...
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+
+ Type
+
+ 138 (skippable) [1] - when used in Registration Requests
+ 140 (skippable) [1] - when used in Agent Advertisements
+
+ Length
+
+ The length of the Link Layer Address + the one-octet Sub-Type
+ field
+
+ Sub-Type
+
+ This field contains the Link Layer sub-type identifier
+
+ LLA
+
+ Contains the Link Layer Address
+
+
+ In this document, seven sub-types are defined:
+
+ 1 3GPP2 International Mobile Station Identity and
+ Connection ID [13]
+ 2 3GPP International Mobile Subscriber Identity [15]
+ 3 Ethernet 48-bit MAC address [5]
+ 4 64-bit Global ID, EUI-64 [6]
+ 5 Solicited IPv4 Address
+ 6 Access Point Identifier
+ 7 FA IPv4 Address
+
+ The following subsections describe the extensions.
+
+
+
+
+
+El Malki, Ed. Experimental [Page 46]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+9.1. 3GPP2 IMSI Link Layer Address and Connection ID Extension
+
+ The IMSI Link Layer Address Extension contains the International
+ Mobile Station Identity (IMSI).
+
+ 0 1 2 3
+ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Type | Length | Sub-Type | IMSI ...
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+
+ Type
+
+ 1 (skippable) [1]
+
+ Length
+
+ The length of the IMSI field + the one-octet Sub-Type field
+
+ Sub-Type
+
+ 1
+
+ IMSI
+
+ Contains the IMSI, in the form:
+ <IMSI>:<Connection Id>
+ Where the <IMSI> is an ASCII-based representation of the
+ International Mobile Station Identity, most significant
+ digit first, ":" is ASCII 0x3a, and the Connection ID is the
+ ASCII representation of a small, decimal number used for
+ distinguishing different link-layer connections from the
+ same mobile device.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+El Malki, Ed. Experimental [Page 47]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+9.2. 3GPP IMSI Link Layer Address Extension
+
+ The IMSI Link Layer Address Extension contains the International
+ Mobile Station Identity.
+
+ 0 1 2 3
+ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Type | Length | Sub-Type | IMSI ...
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+
+ Type
+
+ 2 (skippable) [1]
+
+ Length
+
+ The length of the IMSI field + the one-octet Sub-Type field
+
+ Sub-Type
+
+ 2
+
+ IMSI
+
+ Contains the IMSI, a number composed of 15 digits or less,
+ coded as described in [15].
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+El Malki, Ed. Experimental [Page 48]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+9.3. Ethernet Link Layer Address Extension
+
+ The Ethernet Link Layer Address Extension contains the 48-bit
+ Ethernet MAC Address, as defined in [5].
+
+ 0 1 2 3
+ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Type | Length | Sub-Type | MAC ...
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+
+ Type
+
+ 3 (skippable) [1]
+
+ Length
+
+ 7 (includes the Sub-Type field)
+
+ Sub-Type
+
+ 3
+
+ MAC
+
+ Contains the 48-bit Ethernet MAC Address.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+El Malki, Ed. Experimental [Page 49]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+9.4. IEEE 64-Bit Global Identifier (EUI-64) Address Extension
+
+ The 64-bit Global Identifier (EUI-64) Address Extension contains the
+ 64-bit address, as defined in [6].
+
+ 0 1 2 3
+ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Type | Length | Sub-Type | MAC ...
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+
+ Type
+
+ 4 (skippable) [1]
+
+ Length
+
+ 9 (includes the Sub-Type field)
+
+ Sub-Type
+
+ 4
+
+ MAC
+
+ Contains the 64-bit Global Identifier Address.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+El Malki, Ed. Experimental [Page 50]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+9.5. Solicited IPv4 Address Extension
+
+ The 32-bit Solicited IPv4 Address Extension contains the IPv4 address
+ of the agent (FA) being solicited. This extension MAY be present in
+ an ICMP Agent Solicitation as explained in Section 3.3.
+
+ 0 1 2 3
+ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Type | Length | Sub-Type | IPv4 addr ...
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+
+ Type
+
+ 5 (skippable) [1]
+
+ Length
+
+ 5 (includes the Sub-Type field)
+
+ Sub-Type
+
+ 5
+
+ IPv4 Address
+
+ Contains the 32-bit IPv4 Address of the solicited node.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+El Malki, Ed. Experimental [Page 51]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+9.6. Access Point Identifier Extension
+
+ The 32-bit Access Point Identifier Extension contains an identifier
+ of the access point to which the MN will move. This may be a
+ wireless L2 identifier. The MN is able to solicit an advertisement
+ from the FA servicing a certain access point by using this extension
+ with Agent Solicitations as explained in Section 3.3.
+
+ 0 1 2 3
+ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Type | Length | Sub-Type | AP ID...
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+
+ Type
+
+ 6 (skippable) [1]
+
+ Length
+
+ 5 (includes the Sub-Type field)
+
+ Sub-Type
+
+ 6
+
+ AP ID
+
+ Contains the 32-bit Access Point Identifier.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+El Malki, Ed. Experimental [Page 52]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+9.7. FA IPv4 Address Extension
+
+ The 32-bit FA IPv4 Address Extension contains the IPv4 address of the
+ agent (FA). This extension MAY be present in a Registration Request
+ message to identify the oFA as explained in Section 5.
+
+ 0 1 2 3
+ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Type | Length | Sub-Type | IPv4 addr ...
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+
+ Type
+
+ 7 (skippable) [1]
+
+ Length
+
+ 5 (includes the Sub-Type field)
+
+ Sub-Type
+
+ 7
+
+ IPv4 Address
+
+ Contains the 32-bit IPv4 Address of the FA node.
+
+10. IANA Considerations
+
+ This document defines one new extension to Mobile IPv4 Control
+ messages and one new extension to Mobile IPv4 Router Discovery
+ messages already maintained by IANA. This document also defines a
+ new Mobile IPv4 Control message type to be used between FAs. To
+ ensure correct interoperation based on this specification, IANA must
+ reserve values in the Mobile IPv4 number space for two new extensions
+ and one new message type. IANA must also manage the numbering spaces
+ created by the two new extensions, the message type, and its
+ associated Code field.
+
+10.1. New Extension Values
+
+ Section 9 introduces two extensions.
+
+ Generalized Link Layer and IPv4 Address (LLA) Extension for Router
+ Discovery messages: A new Mobile IPv4 extension that follows after
+ Mobile IPv4 ICMP Router Discovery messages (e.g., Mobile IP Agent
+ Advertisements). The type value of this extension belongs to the
+
+
+
+El Malki, Ed. Experimental [Page 53]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+ Mobile IPv4 number space for Router Discovery messages maintained by
+ IANA. The value assigned by IANA is 140. This new extension uses
+ the Link Layer and IPv4 Address Identifier (LLA) sub-type numbering
+ space that requires IANA management (see Section 10.2).
+
+ Generalized Link Layer and IPv4 Address (LLA) Extension for Mobile IP
+ Control messages: A new Mobile IPv4 extension appended to Mobile IP
+ Control messages (e.g., Registration Request). The type value of
+ this extension belongs to the Mobile IPv4 number space for extensions
+ to Mobile IPv4 Control messages maintained by IANA. It MUST be in
+ the skippable (128-255) range as defined in [1]. The value assigned
+ is 138 by IANA. This new extension uses the Link Layer and IP
+ Address Identifier (LLA) sub-type numbering space that requires IANA
+ management (see Section 10.2).
+
+10.2. Generalized Link Layer and IP Address Identifier (LLA)
+ Sub-type Values
+
+ This section describes the sub-type values that are applicable to
+ both the Generalized LLA Extensions for Mobile IP Control and Router
+ Discovery messages. This specification makes use of the sub-type
+ values 1-7, and all other values other than zero (reserved) are
+ available for assignment via IETF consensus [14]. The seven sub-type
+ values defined in this specification are:
+
+ 1 3GPP2 International Mobile Station Identity and
+ Connection ID [13]
+ 2 3GPP International Mobile Subscriber Identity [15]
+ 3 Ethernet 48-bit MAC address [5]
+ 4 64-bit Global ID, EUI-64 [6]
+ 5 Solicited IPv4 Address
+ 6 Access Point Identifier
+ 7 FA IPv4 Address
+
+10.3. New Message Type and Code
+
+ Sections 4.5 and 4.6 define two new Mobile IPv4 message types:
+ Handoff Request and Handoff Reply. These require two type numbers to
+ be assigned by IANA from the Mobile IPv4 Control message type address
+ space. The Handoff Reply message also introduces its own Code field
+ that requires IANA to manage a new Code address space. This
+ specification makes use of the Code values 0-1, where 0 identifies a
+ successful handoff and 1 defines a generic handoff failure. All
+ other values are available for assignment via IETF consensus [14].
+
+
+
+
+
+
+
+El Malki, Ed. Experimental [Page 54]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+ Code Values for Mobile IP Handoff Reply Messages
+
+ 0 Successful Handoff
+ 1 Generic Handoff Failure
+ 2-255 Unallocated
+
+11. Security Considerations
+
+ For the PRE-REGISTRATION method, as discussed in Section 3.8, the oFA
+ and nFA MUST share a security association to authenticate and
+ integrity protect messages transported between them. In addition,
+ oFA must be authorized to solicit nFA based on the security
+ association. The minimal requirement to establish a security
+ association between FAs is that both FAs support manual pre-
+ configuration of security associations involving shared keys. Other
+ mechanisms to establish security associations using IKE [16] based on
+ shared secrets or public keys may also be used. The inter-FA ICMP
+ messages (solicitations and advertisements) MUST be authenticated and
+ integrity protected using ESP [10]. The default ESP authentication
+ algorithm for use in this specification is HMAC-SHA1-96 [12]. The
+ absence of this security would allow denial-of-service attacks from
+ malicious nodes at any distance from the FA. To secure Registration
+ Request and Reply messages, PRE-REGISTRATION uses the security
+ mechanisms already described in [1] and optionally [11].
+
+ POST-REGISTRATION introduces a new change to Mobile IPv4, which is
+ the possibility that an MN may receive packets from an FA with which
+ it has not yet performed a Mobile IPv4 Registration. It is not
+ recommended that the MN drop packets from unknown FAs since it would
+ effectively eliminate the advantages of POST-REGISTRATION. From a
+ security viewpoint, dropping packets from unknown FAs would not
+ provide significant protection for an MN from any attack. This is
+ because any malicious host may use the MN's home address to send
+ packets to the MN through its current known FA; therefore, processing
+ packets received from unknown FAs would not provide worse security
+ than with normal Mobile IPv4.
+
+ In a similar way to PRE-REGISTRATION, in POST-REGISTRATION, oFA and
+ nFA MUST share a security association required to protect the Handoff
+ Request and Reply messages. The minimal requirement to establish a
+ security association between FAs is that the FAs support manual pre-
+ configuration of security associations involving shared keys. Other
+ mechanisms to establish security associations using IKE [16] based on
+ shared secrets or public keys may also be used. The Handoff Request
+ and Reply messages MUST be authenticated using the FA-FA
+ authentication extension [11] that uses the default algorithm
+ specified in [7]. The absence of this security would allow
+ impersonation attacks and denial-of-service attacks.
+
+
+
+El Malki, Ed. Experimental [Page 55]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+ The minimal requirement is that all FAs involved in low latency
+ handoffs MUST support manual pre-configuration of peer-to-peer
+ security associations with neighboring FAs, involving shared secrets
+ and are already required to support the default algorithms of [1].
+ Other mechanisms to establish security associations using IKE [16]
+ based on shared or public keys may also be used.
+
+ Since the techniques outlined in this document depend on particular
+ L2 information (triggers) to optimize performance, some level of L2
+ security is assumed. Both PRE- and POST-REGISTRATION techniques
+ depend on L2 triggers, but the L2 security implications are different
+ for the two techniques.
+
+ In particular, in POST-REGISTRATION, the L2 triggers initiate the
+ establishment of tunnels that route IPv4 packets for the MN to its
+ new location. Therefore, the L2 triggers MUST be secured against any
+ tampering by malicious nodes, either mobile or within the wired
+ network. The L2 addresses or IPv4 addresses for the MN and the FAs
+ that appear in the L2 triggers MUST correspond to the actual nodes
+ that are participating in the handoff. If there is any possibility
+ that tampering may occur, the recipient of an L2 trigger MUST have
+ some way of authenticating the L2 information. Wireless networks
+ that do not provide such features will be subject to impersonation
+ attacks, where malicious nodes could cause FAs to believe that an MN
+ has moved to other service areas or to allow a bogus MN to obtain
+ unauthorized service from an FA prior to performing a Mobile IPv4
+ Registration. In POST-REGISTRATION, the L2 triggers would typically
+ be sent between a wireless base station and the FA. No standard
+ protocol exists at this time to communicate the L2 trigger
+ information, but it is important that any future protocol used for
+ this purpose provides adequate security. If the wireless base
+ station and FA were integrated, then this security threat would not
+ apply. Also the layer 2 control messages on the wireless link must
+ be secured appropriately to prevent a malicious node from running
+ impersonation attacks and causing unwanted L2 triggers to be
+ generated. Integrity and replay protection would be required to
+ avoid impersonation threats and resource consumption threats where a
+ malicious node replays old messages to cause resource consumption.
+ This depends on the type of L2 security of the wireless link. For
+ example, in cellular technologies, the control messages are secured,
+ although the type of security varies depending on the cellular
+ standard, but this is not typically the case in WLAN IEEE 802.11
+ networks.
+
+ In PRE-REGISTRATION, the security of L2 triggers has different
+ implications. The PRE-REGISTRATION technique depends on Mobile IPv4
+ security between MN and FA, so the same security considerations in
+ [1] apply. Should malicious nodes be able to generate or modify L2
+
+
+
+El Malki, Ed. Experimental [Page 56]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+ trigger information (i.e., L2-ST or L2-TT), this would cause
+ advertisements to be sent to the MN. They would consume wireless
+ resources and processing in the MN, but would not allow an
+ impersonation attack. In order to prevent such denial-of-service
+ attacks, there should be a limit on the number of advertisements that
+ an FA (oFA) will relay to the MN as a result of the reception of L2
+ triggers. This number will depend on the L2 technology, and the
+ default limit is 10 per second.
+
+12. Acknowledgements
+
+ The authors want to thank Lennart Bang, Bryan Hartwell, Joel
+ Hortelius, Gianluca Verin, and Jonathan Wood for valuable comments
+ and suggestions on the whole document. The authors also thank the
+ Mobile IPv4 WG chairs, Phil Roberts and Basavaraj Patil, for their
+ input.
+
+13. References
+
+13.1. Normative References
+
+ [1] Perkins, C., Ed., "IP Mobility Support for IPv4", RFC 3344,
+ August 2002.
+
+ [2] Bradner, S., "Key words for use in RFCs to Indicate Requirement
+ Levels", BCP 14, RFC 2119, March 1997.
+
+ [3] Montenegro, G., Ed., "Reverse Tunneling for Mobile IP, revised",
+ RFC 3024, January 2001.
+
+ [4] Farinacci, D., Li, T., Hanks, S., Meyer, D., and P. Traina,
+ "Generic Routing Encapsulation (GRE)", RFC 2784, March 2000.
+
+ [5] Plummer, D., "Ethernet Address Resolution Protocol: Or
+ Converting Network Protocol Addresses to 48.bit Ethernet Address
+ for Transmission on Ethernet Hardware", STD 37, RFC 826,
+ November 1982.
+
+ [6] IEEE, "Guidelines for 64-bit Global Identifier (EUI-64)
+ Registration Authority",
+ http://standards.ieee.org/regauth/oui/tutorials/EUI64.html,
+ March 1997.
+
+ [7] Perkins, C., Calhoun, P., and J. Bharatia, "Mobile IPv4
+ Challenge/Response Extensions (Revised)", RFC 4721, January
+ 2007.
+
+
+
+
+
+El Malki, Ed. Experimental [Page 57]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+ [8] Deering, S., Ed., "ICMP Router Discovery Messages", RFC 1256,
+ September 1991.
+
+ [9] Postel, J., "Internet Control Message Protocol", STD 5, RFC 792,
+ September 1981.
+
+ [10] Kent, S., "IP Encapsulating Security Payload (ESP)", RFC 4303,
+ December 2005.
+
+ [11] Fogelstroem, E., Jonsson, A., and C. Perkins, "Mobile IPv4
+ Regional Registration", RFC 4857, June 2007.
+
+ [12] Madson, C. and R. Glenn, "The Use of HMAC-SHA-1-96 within ESP
+ and AH", RFC 2404, November 1998.
+
+13.2. Informative References
+
+ [13] TIA/EIA/IS-2000.
+
+ [14] Narten, T. and H. Alvestrand, "Guidelines for Writing an IANA
+ Considerations Section in RFCs", BCP 26, RFC 2434, October 1998.
+
+ [15] 3GPP TS 23.003 (www.3gpp.org).
+
+ [16] Kaufman, C., Ed., "Internet Key Exchange (IKEv2) Protocol", RFC
+ 4306, December 2005.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+El Malki, Ed. Experimental [Page 58]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+Appendix A - Gateway Foreign Agents
+
+ The Mobile IPv4 Regional Registration specification [11] introduces
+ the Gateway Foreign Agent (GFA), as a mobility agent that two FAs
+ providing service to an MN have in common. Figure A.1 provides an
+ example of an MN's initial registration through the GFA. If this is
+ the first registration message, the message MUST be forwarded to the
+ HA. All packets sent to the MN will be delivered to the GFA, which
+ in turn will forward the packets to the FA servicing the MN.
+
+ RegReq +-----+ RegReq
+ +----------->| oFA |--------------+
+ | +-----+ |
+ | v
+ +----+ +-----+ RegReq +----+
+ | MN | | GFA |<------->| HA |
+ +----+ +-----+ +----+
+
+ +-----+
+ | nFA |
+ +-----+
+
+ Figure A.1 - Initial Registrations through GFA
+
+ If the MN moves to an nFA that is serviced by a GFA common with oFA,
+ the MN MAY issue a Regional Registration Request (see Figure A.2).
+ The Regional Registration message does not need to be forwarded to
+ the HA, since the MN's traffic can still be delivered to the same
+ GFA. This optimized approach effectively reduces the latency
+ involved in the registration process.
+
+ +-----+
+ | oFA |
+ +-----+
+ +----+ +-----+ +----+
+ | MN | | GFA | | HA |
+ +----+ +-----+ +----+
+ | ^
+ | +-----+ |
+ +------------>| nFA |-------------+
+ RegRegReq +-----+ RegRegReq
+
+
+ Figure A.2 - Regional Registration through GFA
+
+ Note that the GFA may also be the MN's first-hop router.
+
+
+
+
+
+El Malki, Ed. Experimental [Page 59]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+Appendix B - Low-Latency Handoffs for Multiple-Interface MNs
+
+ For MNs that have two wireless network interfaces, either on the same
+ wireless network or on wireless networks having different wireless L2
+ technologies, the techniques discussed in this document may be
+ unnecessary if the Mobile IPv4 stack on the MN allows switching an
+ IPv4 address binding between interfaces. This Appendix discusses how
+ multiple wireless interfaces can aid low-latency handoff.
+
+ +------+ +---------+
+ | HA |--------| (GFA) |
+ +------+ +---------+
+ / \
+ ... ...
+ / \
+ / \
+ +------+ +------+
+ | oFA | | nFA |
+ +------+ +------+
+ | |
+ +------+ +------+
+ | RN1 | | RN2 |
+ +------+ +------+
+ +------+
+ | MN | --------->
+ +------+
+ Movement
+
+ Figure B.1 - Network Model for Mobile IPv4 with Multi-Access
+
+ Figure B.1 illustrates the normal and hierarchical MIPv4 models. As
+ shown in the figure, assume that the MN is connected to Radio Network
+ 1 (RN1) and is registered with oFA through which it is receiving
+ traffic. Suppose MN enters the coverage area of RN2 and nFA and that
+ it prefers connectivity to this network for reasons beyond the scope
+ of this document (e.g., user preferences, cost, QoS available, etc.).
+ The MN activates the interface to RN2 but continues communicating
+ through RN1. The MN may solicit advertisements from nFA through the
+ interface connected to RN1 to speed up the handoff process, provided
+ there is no TTL restriction, or it can solicit advertisements through
+ the interface connected to RN2 if it has been configured for IPv4
+ traffic.
+
+ Once the MN is registered with nFA and is successfully receiving and
+ transmitting through the new network, it tears down the interface to
+ RN1. If the MN has enough time to complete this procedure without
+ incurring degraded service or disconnection, the MN would experience
+ a seamless multi-access handoff, but it may not be possible in all
+
+
+
+El Malki, Ed. Experimental [Page 60]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+ cases, due to network coverage or for other reasons. Should multiple
+ interface handoff be possible, then the low-latency methods described
+ in this document are not necessary.
+
+ In order to support the possible failure of the connectivity with the
+ new network (RN2/nFA) in the short period following handoff, the MN
+ may use the S bit in its Mobile IPv4 Registration Request to maintain
+ simultaneous bindings with both its existing (HA or GFA) binding with
+ oFA and a new binding with nFA.
+
+Appendix C - PRE-REGISTRATION Message Summary
+
+ This appendix contains a quick reference for IPv4 and layer 2
+ addresses to be used in PRE-REGISTRATION messages.
+
+ Proxy Router Advertisement (PrRtAdv)
+ This is a standard Router/Agent Advertisement [1] with the following
+ characteristics:
+
+ Source IPv4 Address: nFA IPv4 Address
+ Source Layer 2 Address: oFA L2 Address
+ Destination IPv4 Address: MN IPv4 Address (from PrRtSol)
+ Destination Layer 2 Address: MN L2 Address (from PrRtSol)
+ LLA Extension (defined in this spec): containing nFA Layer 2
+ Address.
+
+ Proxy Router Solicitation (PrRtSol)
+ This is a standard Router/Agent Solicitation [1] with the following
+ characteristics:
+
+ Source IPv4 Address: MN Address
+ Source Layer 2 Address: MN Address
+ Destination IPv4 Address: oFA Address (from source address of
+ previous Router Advertisement or PrRtAdv)
+ Destination Layer 2 Address: oFA Address (from source address of
+ previous Router Advertisement or PrRtAdv LLA)
+ LLA Extension (defined in this spec): depends on the layer 2
+ technology (e.g., typically for WLAN, this would be the BSSID of
+ the new WLAN Access Point)
+
+ Registration Request (as seen on MN-oFA link)
+ This is a Mobile IPv4 Registration Request message [1] with the
+ following characteristics:
+
+ Source IPv4 Address: MN Address
+ Source Layer 2 Address: MN Address
+ Destination IPv4 Address: nFA Address (from source addr of
+ PrRtAdv)
+
+
+
+El Malki, Ed. Experimental [Page 61]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+ Destination Layer 2 Address: Default Router (i.e., oFA Address)
+ LLA Extension (defined in this spec): containing the MN's L2
+ address that must be used by nFA. This will typically be an
+ Ethernet MAC address but other types can be used as specified in
+ Section 9 of this document.
+
+ Although this is not mandated, an MN implementation may set the S bit
+ (see Section 6) in Registration Request messages to improve the
+ handoff and avoid problems due to failed layer 2 handoffs and layer 2
+ ping-pong effects between two base stations.
+
+ Registration Reply (as seen on oFA-MN link)
+ This is a Mobile IPv4 Registration Reply message [1] with the
+ following characteristics:
+
+ Source IPv4 Address: nFA Address
+ Source Layer 2 Address: oFA Address
+ Destination IPv4 Address: MN Address (from source of Registration
+ Request)
+ Destination Layer 2 Address: MN Address (from source of
+ Registration Request)
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+El Malki, Ed. Experimental [Page 62]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+Contributing Authors
+
+ Pat Calhoun
+ Cisco Systems
+ EMail: pcalhoun@cisco.com
+
+ Tom Hiller
+ Lucent Technologies
+ EMail: tom.hiller@lucent.com
+
+ James Kempf
+ NTT DoCoMo USA Labs
+ EMail: kempf@docomolabs-usa.com
+
+ Peter J. McCann
+ Motorola Labs
+ EMail: pete.mccann@motorola.com
+
+ Ajoy Singh
+ Motorola
+ EMail: asingh1@email.mot.com
+
+ Hesham Soliman
+ Elevate Technologies
+ EMail: Hesham@elevatemobile.com
+
+ Sebastian Thalanany
+ US Cellular
+ EMail: Sebastian.thalanany@uscellular.com
+
+Editor's Address
+
+ Karim El Malki
+ Athonet
+ EMail: karim@athonet.com
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+El Malki, Ed. Experimental [Page 63]
+
+RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+
+
+Full Copyright Statement
+
+ Copyright (C) The IETF Trust (2007).
+
+ This document is subject to the rights, licenses and restrictions
+ contained in BCP 78, and except as set forth therein, the authors
+ retain all their rights.
+
+ This document and the information contained herein are provided on an
+ "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
+ OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
+ THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
+ OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
+ THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
+ WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
+
+Intellectual Property
+
+ The IETF takes no position regarding the validity or scope of any
+ Intellectual Property Rights or other rights that might be claimed to
+ pertain to the implementation or use of the technology described in
+ this document or the extent to which any license under such rights
+ might or might not be available; nor does it represent that it has
+ made any independent effort to identify any such rights. Information
+ on the procedures with respect to rights in RFC documents can be
+ found in BCP 78 and BCP 79.
+
+ Copies of IPR disclosures made to the IETF Secretariat and any
+ assurances of licenses to be made available, or the result of an
+ attempt made to obtain a general license or permission for the use of
+ such proprietary rights by implementers or users of this
+ specification can be obtained from the IETF on-line IPR repository at
+ http://www.ietf.org/ipr.
+
+ The IETF invites any interested party to bring to its attention any
+ copyrights, patents or patent applications, or other proprietary
+ rights that may cover technology that may be required to implement
+ this standard. Please address the information to the IETF at
+ ietf-ipr@ietf.org.
+
+Acknowledgement
+
+ Funding for the RFC Editor function is currently provided by the
+ Internet Society.
+
+
+
+
+
+
+
+El Malki, Ed. Experimental [Page 64]
+