summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc5270.txt
diff options
context:
space:
mode:
authorThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
committerThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
commit4bfd864f10b68b71482b35c818559068ef8d5797 (patch)
treee3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc5270.txt
parentea76e11061bda059ae9f9ad130a9895cc85607db (diff)
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc5270.txt')
-rw-r--r--doc/rfc/rfc5270.txt1011
1 files changed, 1011 insertions, 0 deletions
diff --git a/doc/rfc/rfc5270.txt b/doc/rfc/rfc5270.txt
new file mode 100644
index 0000000..f55a14e
--- /dev/null
+++ b/doc/rfc/rfc5270.txt
@@ -0,0 +1,1011 @@
+
+
+
+
+
+
+Network Working Group H. Jang
+Request for Comments: 5270 SAMSUNG
+Category: Informational J. Jee
+ ETRI
+ Y. Han
+ KUT
+ S. Park
+ SAMSUNG Electronics
+ J. Cha
+ ETRI
+ June 2008
+
+
+ Mobile IPv6 Fast Handovers over IEEE 802.16e Networks
+
+Status of This Memo
+
+ This memo provides information for the Internet community. It does
+ not specify an Internet standard of any kind. Distribution of this
+ memo is unlimited.
+
+Abstract
+
+ This document describes how a Mobile IPv6 Fast Handover can be
+ implemented on link layers conforming to the IEEE 802.16e suite of
+ specifications. The proposed scheme tries to achieve seamless
+ handover by exploiting the link-layer handover indicators and thereby
+ synchronizing the IEEE 802.16e handover procedures with the Mobile
+ IPv6 fast handover procedures efficiently.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Jang, et al. Informational [Page 1]
+
+RFC 5270 FMIPv6 over 802.16e June 2008
+
+
+Table of Contents
+
+ 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 2
+ 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3
+ 3. IEEE 802.16e Handover Overview . . . . . . . . . . . . . . . . 4
+ 4. Network Topology Acquisition and Network Selection . . . . . . 5
+ 5. Interaction between FMIPv6 and IEEE 802.16e . . . . . . . . . 6
+ 5.1. Access Router Discovery . . . . . . . . . . . . . . . . . 6
+ 5.2. Handover Preparation . . . . . . . . . . . . . . . . . . . 7
+ 5.3. Handover Execution . . . . . . . . . . . . . . . . . . . . 8
+ 5.4. Handover Completion . . . . . . . . . . . . . . . . . . . 9
+ 6. The Examples of Handover Scenario . . . . . . . . . . . . . . 10
+ 6.1. Predictive Mode . . . . . . . . . . . . . . . . . . . . . 10
+ 6.2. Reactive Mode . . . . . . . . . . . . . . . . . . . . . . 12
+ 7. IEEE 802.21 Considerations . . . . . . . . . . . . . . . . . . 14
+ 8. Security Considerations . . . . . . . . . . . . . . . . . . . 14
+ 9. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 15
+ 10. References . . . . . . . . . . . . . . . . . . . . . . . . . . 15
+ 10.1. Normative References . . . . . . . . . . . . . . . . . . . 15
+ 10.2. Informative References . . . . . . . . . . . . . . . . . . 16
+
+1. Introduction
+
+ Mobile IPv6 Fast Handover protocol (FMIPv6) [RFC5268] was proposed to
+ complement the Mobile IPv6 (MIPv6) [RFC3775] by reducing the handover
+ latency for the real-time traffic. FMIPv6 assumes the support from
+ the link-layer technology; however, the specific link-layer
+ information available and its available timing differs according to
+ the particular link-layer technology in use, as pointed out in
+ [RFC4260], which provides an FMIPv6 solution for the IEEE 802.11
+ networks. So, this document is proposed to provide an informational
+ guide to the developers about how to optimize the FMIPv6 handover
+ procedures, specifically in the IEEE 802.16e networks
+ [IEEE802.16][IEEE802.16e].
+
+ The proposed scheme achieves seamless handover by exploiting the
+ link-layer handover indicators and designing an efficient
+ interleaving scheme of the 802.16e and the FMIPv6 handover
+ procedures. The scheme targets a hard handover, which is the default
+ handover type of IEEE 802.16e. For the other handover types, i.e.,
+ the Macro Diversity Handover (MDHO) and Fast Base Station Switching
+ (FBSS), the base stations in the same diversity set are likely to
+ belong to the same subnet for diversity, and FMIPv6 might not be
+ needed. Regarding the MDHO and the FBSS deployment with FMIPv6,
+ further discussion will be needed and is not in the scope of this
+ document.
+
+
+
+
+
+Jang, et al. Informational [Page 2]
+
+RFC 5270 FMIPv6 over 802.16e June 2008
+
+
+ We begin with a summary of handover procedures of [IEEE802.16e] and
+ then present the optimized complete FMIPv6 handover procedures by
+ using the link-layer handover indicators. The examples of handover
+ scenarios are described for both the predictive mode and reactive
+ mode.
+
+2. Terminology
+
+ The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
+ "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
+ document is to be interpreted as described in [RFC2119].
+
+ Most of terms used in this document are defined in MIPv6 [RFC3775]
+ and FMIPv6 [RFC5268].
+
+ The following terms come from the IEEE 802.16e specification
+ [IEEE802.16e].
+
+ MOB_NBR-ADV
+
+ An IEEE 802.16e neighbor advertisement message sent
+ periodically by a base station.
+
+ MOB_MSHO-REQ
+
+ An IEEE 802.16e handover request message sent by a mobile node.
+
+ MOB_BSHO-RSP
+
+ An IEEE 802.16e handover response message sent by a base
+ station.
+
+ MOB_BSHO-REQ
+
+ An IEEE 802.16e handover request message sent by a base
+ station.
+
+ MOB_HO-IND
+
+ An IEEE 802.16e handover indication message sent by a mobile
+ node.
+
+ BSID
+
+ An IEEE 802.16e base station identifier.
+
+
+
+
+
+
+Jang, et al. Informational [Page 3]
+
+RFC 5270 FMIPv6 over 802.16e June 2008
+
+
+3. IEEE 802.16e Handover Overview
+
+ Compared with the handover in the WLAN (Wireless Local Area Network),
+ the IEEE 802.16e handover mechanism consists of more steps since the
+ 802.16e embraces the functionality for elaborate parameter adjustment
+ and procedural flexibility.
+
+ When a mobile node (MN) stays in a link, it listens to the Layer 2
+ neighbor advertisement messages, named MOB_NBR-ADV, from its serving
+ base station (BS). A BS broadcasts them periodically to identify the
+ network and announce the characteristics of neighbor BSs. Receiving
+ this, the MN decodes this message to find out information about the
+ parameters of neighbor BSs for its future handover. With the
+ provided information in a MOB_NBR-ADV, the MN may minimize the
+ handover latency by obtaining the channel number of neighbors and
+ reducing the scanning time, or may select the better target BS based
+ on the signal strength, Quality-of-Service (QoS) level, service
+ price, etc.
+
+ The handover procedure is conceptually divided into two steps:
+ "handover preparation" and "handover execution" [SH802.16e]. The
+ handover preparation can be initiated by either an MN or a BS.
+
+ During this period, neighbors are compared by the metrics such as
+ signal strength or QoS parameters, and a target BS is selected among
+ them. If necessary, the MN may try to associate (initial ranging)
+ with candidate BSs to expedite a future handover. Once the MN
+ decides to handover, it notifies its intent by sending a MOB_MSHO-REQ
+ message to the serving BS (s-BS). The BS then replies with a
+ MOB_BSHO-RSP containing the recommended BSs to the MN after
+ negotiating with candidates. Optionally, it may confirm handover to
+ the target BS (t-BS) over backbone when the target is decided.
+ Alternatively, the BS may trigger handover with a MOB_BSHO-REQ
+ message.
+
+ After handover preparation, handover execution starts. The MN sends
+ a MOB_HO-IND message to the serving BS as a final indication of its
+ handover. Once it makes a new attachment, it conducts 802.16e
+ ranging through which it can acquire physical parameters from the
+ target BS, tuning its parameters to the target BS. After ranging
+ with the target BS successfully, the MN negotiates basic capabilities
+ such as maximum transmit power and modulator/demodulator type. It
+ then performs authentication and key exchange procedures, and finally
+ registers with the target BS. If the target BS has already learned
+ some contexts such as authentication or capability parameters through
+ backbone, it may omit the corresponding procedures. For the details
+ of the 802.16 handover procedures, refer to Section 6.3.22 of
+ [IEEE802.16e]. After completing registration, the target BS starts
+
+
+
+Jang, et al. Informational [Page 4]
+
+RFC 5270 FMIPv6 over 802.16e June 2008
+
+
+ to serve the MN and communication via target BS is available.
+ However, in case the MN moves to a different subnet, it should
+ reconfigure a new IP address and reestablish an IP connection. To
+ resume the active session of the previous link, the MN should also
+ perform IP layer handover.
+
+4. Network Topology Acquisition and Network Selection
+
+ This section describes how discovery of adjacent networks and
+ selection of target network work in the IEEE 802.16e for background
+ information.
+
+ An MN can learn the network topology and acquire the link information
+ in several ways. First of all, it can do that via L2 neighbor
+ advertisements. A BS supporting mobile functionality shall broadcast
+ a MOB_NBR-ADV message periodically that includes the network topology
+ information (its maximum interval is 1 second). This message
+ includes BSIDs and channel information of neighbor BSs, and it is
+ used to facilitate the MN's synchronization with neighbor BSs. An MN
+ can collect the necessary information of the neighbor BSs through
+ this message for its future handover.
+
+ Another method for acquisition of network topology is scanning, which
+ is the process to seek and monitor available BSs in order to find
+ suitable handover targets. While a MOB_NBR-ADV message includes
+ static information about neighbor BSs, scanning provides rather
+ dynamic parameters such as link quality parameters. Since the
+ MOB_NBR-ADV message delivers a list of neighbor BSIDs periodically
+ and scanning provides a way to sort out some adequate BSs, it is
+ recommended that when new BSs are found in the advertisement, the MN
+ identifies them via scanning and resolves their BSIDs to the
+ information of the subnet where the BS is connected. The
+ association, an optional initial ranging procedure occurring during
+ scanning, is one of the helpful methods to facilitate the impending
+ handover. The MN is able to get ranging parameters and service
+ availability information for the purpose of proper selection of the
+ target BS and expediting a potential future handover to it. The
+ detailed explanation of association is described in Section 6.3.22 of
+ [IEEE802.16e].
+
+ Besides the methods provided by 802.16e, the MN may rely on other
+ schemes. For instance, the topology information may be provided
+ through the MIIS (Media Independent Information Service)
+ [IEEE802.21], which has been developed by the IEEE 802.21 working
+ group. The MIIS is a framework by which the MN or network can obtain
+ network information to facilitate network selection and handovers.
+
+
+
+
+
+Jang, et al. Informational [Page 5]
+
+RFC 5270 FMIPv6 over 802.16e June 2008
+
+
+ After learning about neighbors, the MN may compare them to find a BS,
+ which can serve better than the serving BS. The target BS may be
+ determined by considering various criteria such as required QoS,
+ cost, user preference, and policy. How to select the target BS is
+ not in the scope of this document.
+
+5. Interaction between FMIPv6 and IEEE 802.16e
+
+ In this section, a set of primitives is introduced for an efficient
+ interleaving of the IEEE 802.16e and the FMIPv6 procedures as below.
+ The following sections present the handover procedures in detail by
+ using them.
+
+ o NEW_LINK_DETECTED (NLD)
+
+ A trigger from the link layer to the IP layer in the MN to
+ report that a new link has been detected.
+
+ o LINK_HANDOVER_IMPEND (LHI)
+
+ A trigger from the link layer to the IP layer in the MN to
+ report that a link-layer handover decision has been made and
+ its execution is imminent.
+
+ o LINK_SWITCH (LSW)
+
+ A control command from the IP layer to the link layer in the MN
+ in order to force the MN to switch from an old BS to a new BS.
+
+ o LINK_UP (LUP)
+
+ A trigger from the link layer to the IP layer in the MN to
+ report that the MN completes the link-layer connection
+ establishment with a new BS.
+
+5.1. Access Router Discovery
+
+ Once a new BS is detected through reception of a MOB_NBR-ADV and
+ scanning, an MN may try to learn the associated access router (AR)
+ information as soon as possible. In order to enable its quick
+ discovery in the IP layer, the link layer (802.16) triggers a
+ NEW_LINK_DETECTED primitive to the IP layer (FMIPv6) on detecting a
+ new BS.
+
+ Receiving the NEW_LINK_DETECTED from the link layer, the IP layer
+ tries to learn the associated AR information by exchanging an RtSolPr
+ (Router Solicitation for Proxy Advertisement) and a PrRtAdv (Proxy
+ Router Advertisement) with the PAR (Previous Access Router).
+
+
+
+Jang, et al. Informational [Page 6]
+
+RFC 5270 FMIPv6 over 802.16e June 2008
+
+
+ According to [RFC5268], the MN may send an RtSolPr at any convenient
+ time. However, this proposal recommends that, if feasible, the MN
+ send it as soon as possible after receiving the NEW_LINK_DETECTED for
+ quick router discovery because detection of a new BS usually implies
+ MN's movement, which may result in handover.
+
+ Transmission of RtSolPr messages may cause the signaling overhead
+ problem that is mentioned in Section 2 of [RFC4907]. To rate-limit
+ the retransmitted RtSolPr messages, FMIPv6 provides a back-off
+ mechanism. It is also possible that attackers may forge a MOB_NBR-
+ ADV message so that it can contain a bunch of bogus BSIDs or may send
+ a flood of MOB_NBR-ADV messages each of which contains different
+ BSIDs. This problem is mentioned in Section 8.
+
+5.2. Handover Preparation
+
+ When the MN decides to change links based on its policy such as the
+ degrading signal strength or increasing packet loss rate, it
+ initiates handover by sending a MOB_MSHO-REQ to the BS and will
+ receive a MOB_BSHO-RSP from the BS as a response. Alternatively, the
+ BS may initiate handover by sending a MOB_BSHO-REQ to the MN.
+
+ On receiving either a MOB_BSHO-RSP or a MOB_BSHO-REQ, the link layer
+ triggers a LINK_HANDOVER_IMPEND in order to signal the IP layer of
+ arrival of MOB_BSHO-REQ/MOB_BSHO-RSP quickly. At this time, the
+ target BS decided in the link layer is delivered to the IP layer as a
+ parameter of the primitive. The primitive is used to report that a
+ link-layer handover decision has been made and its execution is
+ imminent. It can be helpfully used for FMIPv6 as an indication to
+ start the handover preparation procedure, that is to send an FBU
+ (Fast Binding Update) message to the PAR.
+
+ To avoid erroneous results due to unreliable and inconsistent
+ characteristics of link, for instance, to move to the unpredicted
+ network or to stay in the current network after sending an FBU,
+ Section 2 of [RFC4907] advises the use of a combination of signal
+ strength data with other techniques rather than relying only on
+ signal strength for handover decision. For example, the
+ LINK_HANDOVER_IMPEND may be sent after validating filtered signal
+ strength measurements with other indications of link loss such as
+ lack of beacon reception.
+
+ Once the IP layer receives the LINK_HANDOVER_IMPEND, it checks
+ whether or not the specified target network belongs to a different
+ subnet based on the information collected during the Access Router
+ Discovery step. If the target proves to be in the same subnet, the
+ MN can continue to use the current IP address after handover, and
+ there is no need to perform FMIPv6. Otherwise, the IP layer
+
+
+
+Jang, et al. Informational [Page 7]
+
+RFC 5270 FMIPv6 over 802.16e June 2008
+
+
+ formulates a prospective NCoA (New Care-of Address) with the
+ information provided in the PrRtAdv message and sends an FBU message
+ to the PAR.
+
+ When the FBU message arrives in the PAR successfully, the PAR and the
+ NAR (New Access Router) process it according to [RFC5268]. The PAR
+ sets up a tunnel between the PCoA (Previous Care-of Address) and NCoA
+ by exchanging HI (Handover Initiate) and HAck (Handover Acknowledge)
+ messages with the NAR, forwarding the packets destined for the MN to
+ the NCoA. The NCoA is confirmed or re-assigned by the NAR in the
+ HAck and, finally delivered to the MN through the FBack (Fast Binding
+ Acknowledgment) in case of predictive mode.
+
+ After the MN sends a MOB_HO-IND to the serving BS, data packet
+ transfer between the MN and the BS is no longer allowed. Note that
+ when a MOB_HO-IND is sent out before an FBack arrives in the MN, it
+ is highly probable that the MN will operate in reactive mode because
+ the serving BS releases all the MN's connections and resources after
+ receiving a MOB_HO-IND. Therefore, if possible, the MN should
+ exchange FBU and FBack messages with the PAR before sending a MOB_HO-
+ IND to the BS so as to operate in predictive mode.
+
+5.3. Handover Execution
+
+ If the MN receives an FBack message on the previous link, it runs in
+ predictive mode after handover. Otherwise, it should run in reactive
+ mode. In order for the MN to operate in predictive mode as far as
+ possible after handover, implementations may allow use of a
+ LINK_SWITCH primitive. The LINK_SWITCH is a command in order to
+ force the MN to switch from an old BS to a new BS and the similar
+ concept has introduced for the wireless LAN in [RFC5184]. When it is
+ applied, the MN's IP layer issues a LINK_SWITCH primitive to the link
+ layer on receiving the FBack message in the previous link. Until it
+ occurs, the link layer keeps the current (previous) link if feasible
+ and postpones sending a MOB_HO-IND message while waiting for the
+ FBack message.
+
+ After switching links, the MN synchronizes with the target BS and
+ performs the 802.16e network entry procedure. The MN exchanges the
+ RNG-REQ/RSP, SBC-REQ/RSP, PKM-REQ/RSP, and REG-REQ/RSP messages with
+ the target BS. Some of these messages may be omitted if the
+ (previously) serving BS transferred the context to the target BS over
+ the backbone beforehand. When the network entry procedure is
+ completed and the link layer is ready for data transmission, it
+ informs the IP layer of the fact with a LINK_UP primitive.
+
+
+
+
+
+
+Jang, et al. Informational [Page 8]
+
+RFC 5270 FMIPv6 over 802.16e June 2008
+
+
+ Section 2 of [RFC4907] recommends that link indications should be
+ designed with built-in damping. The LINK_UP primitive defined in
+ this document is generated by the link layer state machine based on
+ the 802.16e link layer message exchanges, that is, the IEEE 802.16e
+ network entry and the service flow creation procedures. Therefore,
+ the LINK_UP is typically less sensitive to changes in transient link
+ conditions. The link may experience an intermittent loss. Even in
+ such a case, the following FMIPv6 operation is performed only when
+ the MN handovers to the link with a different subnet and there is no
+ signaling overhead as a result of a intermittent loss.
+
+5.4. Handover Completion
+
+ When the MN's IP layer receives a LINK_UP primitive from the link
+ layer, it should check whether it has moved into the target network
+ predicted by FMIPv6. In case the target BS is within the same
+ subnet, the MN does not perform the FMIPv6 operation.
+
+ * If the MN discovers itself in the predicted target network and
+ receives an FBack message in the previous link, the MN's IP
+ layer sends an UNA (Unsolicited Neighbor Advertisement) to the
+ NAR (predictive mode).
+
+ * If the MN has moved to the target network without receiving an
+ FBack message in the previous link, the IP layer sends an UNA
+ and also an FBU message immediately after sending the UNA
+ message (reactive mode). The NAR may provide a different IP
+ address by using an RA (Router Advertisement) with a NAACK
+ (Neighbor Advertisement Acknowledge) option other than the
+ formulated NCoA by the MN.
+
+ * The MN may discover itself in the unpredicted network
+ (erroneous movement). If this is the case, the MN moves to the
+ network that is not the target specified in the
+ LINK_HANDOVER_IMPEND primitive. For the recovery from such an
+ invalid indication, which is mentioned in Section 2 of
+ [RFC4907], the MN should send a new FBU to the PAR according to
+ Section 5.6 of [RFC5268] so that the PAR can update the
+ existing binding entry and redirect the packets to the new
+ confirmed location.
+
+ In both cases of predictive and reactive modes, once the MN has moved
+ into the new link, it uses the NCoA formulated by the MN as a source
+ address of the UNA, irrespective of NCoA availability. It then
+ starts a Duplicate Address Detection (DAD) probe for NCoA according
+ to [RFC4862]. In case the NAR provides the MN with a new NCoA, the
+ MN MUST use the provided NCoA instead of the NCoA formulated by the
+ MN.
+
+
+
+Jang, et al. Informational [Page 9]
+
+RFC 5270 FMIPv6 over 802.16e June 2008
+
+
+ When the NAR receives an UNA message, it deletes its proxy neighbor
+ cache entry if it exists, and forwards buffered packets to the MN
+ after updating the neighbor cache properly. Detailed UNA processing
+ rules are specified in Section 6.4 of [RFC5268].
+
+6. The Examples of Handover Scenario
+
+ In this section, the recommended handover procedures over 802.16e
+ network are shown for both predictive and reactive modes. It is
+ assumed that the MN handovers to the network that belongs to a
+ different subnet.
+
+ In the following figures, the messages between the MN's Layer 2 (MN
+ L2) and the BS are the IEEE 802.16 messages, while messages between
+ the MN's Layer 3 (MN L3) and the PAR and messages between PAR and NAR
+ are the FMIPv6 messages. The messages between the MN L2 and the MN
+ L3 are primitives introduced in this document.
+
+6.1. Predictive Mode
+
+ The handover procedures in the predictive mode are briefly described
+ as follows. Figure 3 illustrates these procedures.
+
+ 1. A BS broadcasts a MOB_NBR-ADV periodically.
+
+ 2. If the MN discovers a new neighbor BS in this message, it may
+ perform scanning for the BS.
+
+ 3. When a new BS is found through the MOB_NBR-ADV and scanning,
+ the MN's link layer notifies it to the IP layer by a
+ NEW_LINK_DETECTED primitive.
+
+ 4. The MN tries to resolve the new BS's BSID to the associated
+ AR by exchange of RtSolPr and PrRtAdv messages with the PAR.
+
+ 5. The MN initiates handover by sending a MOB_MSHO-REQ message
+ to the BS and receives a MOB_BSHO-RSP from the BS.
+ Alternatively, the BS may initiate handover by sending a
+ MOB_BSHO-REQ to the MN.
+
+ 6. When the MN receives either a MOB_BSHO-RSP or a MOB_BSHO-REQ
+ from the BS, its link layer triggers a LINK_HANDOVER_IMPEND
+ primitive to the IP layer.
+
+
+
+
+
+
+
+
+Jang, et al. Informational [Page 10]
+
+RFC 5270 FMIPv6 over 802.16e June 2008
+
+
+ 7. On reception of the LINK_HANDOVER_IMPEND, the MN's IP layer
+ identifies that the target delivered along with the
+ LINK_HANDOVER_IMPEND belongs to a different subnet and sends
+ an FBU message to the PAR. On receiving this message, the
+ PAR establishes tunnel between the PCoA and the NCoA by
+ exchange of HI and HAck messages with the NAR, and it
+ forwards packets destined for the MN to the NCoA. During
+ this time, the NAR may confirm NCoA availability in the new
+ link via HAck.
+
+ 8. The MN receives the FBack message before its handover and
+ sends a MOB_HO-IND message as a final indication of handover.
+ Issue of a MOB_HO-IND may be promoted optionally by using a
+ LINK_SWITCH command from the IP layer. Afterwards it
+ operates in predictive mode in the new link.
+
+ 9. The MN conducts handover to the target BS and performs the
+ IEEE 802.16e network entry procedure.
+
+ 10. As soon as the network entry procedure is completed, the MN's
+ link layer signals the IP layer with a LINK_UP. On receiving
+ this, the IP layer identifies that it has moved to a
+ predicted target network and received the FBack message in
+ the previous link. It issues an UNA to the NAR by using the
+ NCoA as a source IP address. At the same time, it starts to
+ perform DAD for the NCoA.
+
+ 11. When the NAR receives the UNA from the MN, it delivers the
+ buffered packets to the MN.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Jang, et al. Informational [Page 11]
+
+RFC 5270 FMIPv6 over 802.16e June 2008
+
+
+ (MN L3 MN L2) s-BS PAR t-BS NAR
+ | | | | | |
+ 1-2. | |<---MOB_NBR-ADV --------| | | |
+ | |<-------Scanning------->| | | |
+ 3. |<-NLD-| | | | |
+ 4. |--------------(RtSolPr)-------------->| | |
+ |<--------------PrRtAdv----------------| | |
+ | | | | | |
+ 5. | |------MOB_MSHO-REQ----->| | | |
+ | |<-----MOB_BSHO-RSP------| | | |
+ | | or | | | |
+ | |<-----MOB_BSHO-REQ------| | | |
+ 6. |<-LHI-| | | | |
+ 7. |------------------FBU---------------->| | |
+ | | | |--------HI-------->|
+ | | | |<------HACK--------|
+ |<-----------------FBack---------------|--> | |
+ | | | Packets==============>|
+ 8. |(LSW)>|-------MOB_HO-IND------>| | | |
+ disconnect| | | | |
+ connect | | | | |
+ 9. | |<---------IEEE 802.16 network entry-------->| |
+ 10. |<-LUP-| | | | |
+ |----------------------------UNA-------------------------->|
+ 11. |<==================================================== Packets
+ | | | | |
+
+ Figure 3. Predictive Fast Handover in 802.16e
+
+6.2. Reactive Mode
+
+ The handover procedures in the reactive mode are described as
+ follows. Figure 4 is illustrating these procedures.
+
+ 1. ~ 7. The same as procedures of predictive mode.
+
+ 8. The MN does not receive the FBack message before handover and
+ sends a MOB_HO-IND message as a final indication of handover.
+ Afterwards, it operates in reactive mode in the new link.
+
+ 9. The MN conducts handover to the target network and performs
+ the 802.16e network entry procedure.
+
+
+
+
+
+
+
+
+
+Jang, et al. Informational [Page 12]
+
+RFC 5270 FMIPv6 over 802.16e June 2008
+
+
+ 10. As soon as the network entry procedure is completed, the MN's
+ link layer signals the IP layer with a LINK_UP. On receiving
+ this, the IP layer identifies that it has moved to the
+ predicted target network without receiving the FBack in the
+ previous link. The MN issues an UNA to the NAR by using NCoA
+ as a source IP address and starts to perform DAD for the
+ NCoA. Additionally, it sends an FBU to the PAR in the
+ reactive mode.
+
+ 11. When the NAR receives the UNA and the FBU from the MN, it
+ forwards the FBack to the PAR. The FBack and Packets are
+ forwarded from the PAR and delivered to the MN (NCoA) through
+ the NAR. The NAR may supply a different IP address than the
+ NCoA by sending an RA with a NAACK option to the MN.
+
+ (MN L3 MN L2) s-BS PAR t-BS NAR
+ | | | | | |
+ 1-2. | |<---MOB_NBR-ADV & Scan--| | | |
+ | |<-------Scanning------->| | | |
+ 3. |<-NLD-| | | | |
+ 4. |--------------(RtSolPr)-------------->| | |
+ |<--------------PrRtAdv----------------| | |
+ | | | | | |
+ 5. | |------MOB_MSHO-REQ----->| | | |
+ | |<-----MOB_BSHO-RSP------| | | |
+ | | or | | | |
+ | |<-----MOB_BSHO-REQ------| | | |
+ 6. |<-LHI-| | | | |
+ 7. |--------FBU----X---> | | | |
+ 8. | |-------MOB_HO-IND------>| | | |
+ disconnect| | | | |
+ connect | | | | |
+ 9. | |<---------IEEE 802.16 network entry-------->| |
+ 10. |<-LUP-| | | | |
+ |----------------------------UNA-------------------------->|
+ |----------------------------FBU--------------------------)|
+ 11. | | | |<-------FBU-------)|
+ | | | |<-----HI/HAck----->|
+ | | | | (if necessary) |
+ | | | Packets & FBack=========>|
+ |<=========================================================|
+ | | | | | |
+
+ Figure 4. Reactive Fast Handover in 802.16e
+
+
+
+
+
+
+
+Jang, et al. Informational [Page 13]
+
+RFC 5270 FMIPv6 over 802.16e June 2008
+
+
+7. IEEE 802.21 Considerations
+
+ It is worth noting that great research has been conducted on defining
+ generic services in the IEEE 802.21 working group that facilitate
+ handovers between heterogeneous access links. The standard works are
+ named as a Media Independent Handover (MIH) Service [IEEE802.21], and
+ propose three kinds of services: Media Independent Event Service
+ (MIES), Media Independent Command Service (MICS), and Media
+ Independent Information Service (MIIS).
+
+ An MIES defines the events triggered from lower layers (physical and
+ link) to higher layers (network and above) in order to report changes
+ of physical and link-layer conditions. On the other hand, an MICS
+ supports the commands sent from higher layers to lower layers, and it
+ provides users with a way of managing the link behavior relevant to
+ handovers and mobility. An MIIS provides a framework by which the MN
+ or network can obtain network information to facilitate network
+ selection and handovers.
+
+ Although the purpose of IEEE 802.21 has been developed to enhance the
+ user experience of MNs roaming between heterogeneous networks, the
+ results may be utilized to optimize the handover performance in a
+ homogeneous network. When the MIH primitives are available for
+ handover in the 802.16e network, the MN can use them instead of the
+ primitives proposed in this document. Table 1 shows examples of the
+ mapping between the proposed primitives and the MIH primitives.
+
+ +-------------------------+-------------------------+
+ | Proposed primitives | MIH primitives |
+ +===================================================+
+ | NEW_LINK_DETECTED | LINK_DETECTED |
+ +---------------------------------------------------+
+ | LINK_HANDOVER_IMPEND | LINK_HANDOVER_IMMINENT |
+ +---------------------------------------------------+
+ | LINK_SWITCH | HANDOVER_COMMIT |
+ +---------------------------------------------------+
+ | LINK_UP | LINK_UP |
+ +---------------------------------------------------+
+
+ Table 1. The Proposed Primitives and MIH Primitives
+
+8. Security Considerations
+
+ The primitives defined in this document are used only for local
+ indication inside of the MN, so no security mechanism is required to
+ protect those primitives. However, FMIPv6 messages and IEEE 802.16e
+ messages, which may trigger the primitives, need to be protected.
+
+
+
+
+Jang, et al. Informational [Page 14]
+
+RFC 5270 FMIPv6 over 802.16e June 2008
+
+
+ Security considerations of the FMIPv6 specification [RFC5268] are
+ applicable to this document. It is also worthwhile to note that the
+ IEEE802.16e has a security sub-layer that provides subscribers with
+ privacy and authentication over the broadband wireless network. This
+ layer has two main component protocols: a privacy key management
+ protocol (PKM) for key management and authentication and an
+ encapsulation protocol for encrypting data. From the perspective of
+ the 802.16e, FMIPv6 messages are considered as data and are delivered
+ securely by using those protocols.
+
+ However, some of IEEE 802.16e management messages are sent without
+ authentication. For example, there is no protection to secure
+ 802.16e broadcast messages. It may be possible for the attacker to
+ maliciously forge a MOB_NBR-ADV message so that it contains the bogus
+ BSIDs, or send a flood of MOB_NBR-ADV messages having different bogus
+ BSIDs toward the MN. As a result, the MN may trigger a bunch of
+ NEW_LINK_DETECTED primitives and send useless consecutive RtSolPr
+ messages to the PAR, finally resulting in wasting the air resources.
+ Therefore, the MN SHOULD perform scanning when detecting new BSs in
+ the received MOB_NBR-ADV messages in order to assure the included
+ neighbor information.
+
+ It is also possible that attackers try a DoS (Denial-of-Service)
+ attack by sending a flood of MOB_BSHO-REQ messages and triggering
+ LINK_HANDOVER_IMPEND primitives in the MN. But the IEEE 802.16e
+ provides a message authentication scheme for management messages
+ involved in handover as well as network entry procedures by using a
+ message authentication code (MAC) such as HMAC/CMAC (hashed/cipher
+ MAC). Thus, those management messages are protected from the
+ malicious use by attackers who intend to trigger LINK_HANDOVER_IMPEND
+ or LINK_UP primitives in the MN.
+
+9. Acknowledgments
+
+ Many thanks to the IETF Mobility Working Group members of KWISF
+ (Korea Wireless Internet Standardization Forum) for their efforts on
+ this work. In addition, we would like to thank Alper E. Yegin,
+ Jinhyeock Choi, Rajeev Koodli, Jonne Soininen, Gabriel Montenegro,
+ Singh Ajoy, Yoshihiro Ohba, Behcet Sarikaya, Vijay Devarapalli, and
+ Ved Kafle who have provided technical advice.
+
+10. References
+
+10.1. Normative References
+
+ [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
+ Requirement Levels", BCP 14, RFC 2119, March 1997.
+
+
+
+
+Jang, et al. Informational [Page 15]
+
+RFC 5270 FMIPv6 over 802.16e June 2008
+
+
+ [RFC3775] Johnson, D., Perkins, C., and J. Arkko, "Mobility
+ Support in IPv6", RFC 3775, June 2004.
+
+ [RFC4862] Thomson, S., Narten, T., and T. Jinmei, "IPv6
+ Stateless Address Autoconfiguration", RFC 4862,
+ September 2007.
+
+ [RFC5268] Koodli, R., Ed., "Mobile IPv6 Fast Handovers",
+ RFC 5268, June 2008.
+
+ [IEEE802.16] "IEEE Standard for Local and Metropolitan Area
+ Networks, Part 16: Air Interface for Fixed Broadband
+ Wireless Access Systems", IEEE Std 802.16-2004,
+ October 2004.
+
+ [IEEE802.16e] "IEEE Standard for Local and Metropolitan Area
+ Networks, Amendment 2: Physical and Medium Access
+ Control Layers for Combined Fixed and Mobile Operation
+ in Licensed Bands and Corrigendum 1", IEEE
+ Std 802.16e-2005 and IEEE Std 802.16-2004/Cor 1-2005,
+ February 2006.
+
+10.2. Informative References
+
+ [RFC4260] McCann, P., "Mobile IPv6 Fast Handovers for 802.11
+ Networks", RFC 4260, November 2005.
+
+ [RFC5184] Teraoka, F., Gogo, K., Mitsuya, K., Shibui, R., and K.
+ Mitani, "Unified Layer 2 (L2) Abstractions for Layer 3
+ (L3)-Driven Fast Handover", RFC 5184, May 2008.
+
+ [RFC4907] Aboba, B., "Architectural Implications of Link
+ Indications", RFC 4907, June 2007.
+
+ [IEEE802.21] "Draft IEEE Standard for Local and Metropolitan Area
+ Networks: Media Independent Handover Services", IEEE
+ Std P802.21 D9.0, February 2008.
+
+ [SH802.16e] Kim, K., Kim, C., and T. Kim, "A Seamless Handover
+ Mechanism for IEEE 802.16e Broadband Wireless Access",
+ International Conference on Computational Science vol.
+ 2, pp.527-534, 2005.
+
+
+
+
+
+
+
+
+
+Jang, et al. Informational [Page 16]
+
+RFC 5270 FMIPv6 over 802.16e June 2008
+
+
+Authors' Addresses
+
+ Heejin Jang
+ SAMSUNG Advanced Institute of Technology
+ P.O. Box 111
+ Suwon 440-600
+ Korea
+
+ EMail: heejin.jang@gmail.com
+
+
+ Junghoon Jee
+ Electronics and Telecommunications Research Institute
+ 161 Gajeong-dong, Yuseong-gu
+ Daejon 305-350
+ Korea
+
+ EMail: jhjee@etri.re.kr
+
+
+ Youn-Hee Han
+ Korea University of Technology and Education
+ Gajeon-ri, Byeongcheon-myeon
+ Cheonan 330-708
+ Korea
+
+ EMail: yhhan@kut.ac.kr
+
+
+ Soohong Daniel Park
+ SAMSUNG Electronics
+ 416 Maetan-3dong, Yeongtong-gu
+ Suwon 442-742
+ Korea
+
+ EMail: soohong.park@samsung.com
+
+
+ Jaesun Cha
+ Electronics and Telecommunications Research Institute
+ 161 Gajeong-dong, Yuseong-gu
+ Daejon 305-350
+ Korea
+
+ EMail: jscha@etri.re.kr
+
+
+
+
+
+
+Jang, et al. Informational [Page 17]
+
+RFC 5270 FMIPv6 over 802.16e June 2008
+
+
+Full Copyright Statement
+
+ Copyright (C) The IETF Trust (2008).
+
+ This document is subject to the rights, licenses and restrictions
+ contained in BCP 78, and except as set forth therein, the authors
+ retain all their rights.
+
+ This document and the information contained herein are provided on an
+ "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
+ OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
+ THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
+ OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
+ THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
+ WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
+
+Intellectual Property
+
+ The IETF takes no position regarding the validity or scope of any
+ Intellectual Property Rights or other rights that might be claimed to
+ pertain to the implementation or use of the technology described in
+ this document or the extent to which any license under such rights
+ might or might not be available; nor does it represent that it has
+ made any independent effort to identify any such rights. Information
+ on the procedures with respect to rights in RFC documents can be
+ found in BCP 78 and BCP 79.
+
+ Copies of IPR disclosures made to the IETF Secretariat and any
+ assurances of licenses to be made available, or the result of an
+ attempt made to obtain a general license or permission for the use of
+ such proprietary rights by implementers or users of this
+ specification can be obtained from the IETF on-line IPR repository at
+ http://www.ietf.org/ipr.
+
+ The IETF invites any interested party to bring to its attention any
+ copyrights, patents or patent applications, or other proprietary
+ rights that may cover technology that may be required to implement
+ this standard. Please address the information to the IETF at
+ ietf-ipr@ietf.org.
+
+
+
+
+
+
+
+
+
+
+
+
+Jang, et al. Informational [Page 18]
+