diff options
Diffstat (limited to 'doc/rfc/rfc3002.txt')
-rw-r--r-- | doc/rfc/rfc3002.txt | 2355 |
1 files changed, 2355 insertions, 0 deletions
diff --git a/doc/rfc/rfc3002.txt b/doc/rfc/rfc3002.txt new file mode 100644 index 0000000..023f75c --- /dev/null +++ b/doc/rfc/rfc3002.txt @@ -0,0 +1,2355 @@ + + + + + + +Network Working Group D. Mitzel +Request for Comments: 3002 Nokia +Category: Informational December 2000 + + + Overview of 2000 IAB Wireless Internetworking Workshop + +Status of this Memo + + This memo provides information for the Internet community. It does + not specify an Internet standard of any kind. Distribution of this + memo is unlimited. + +Copyright Notice + + Copyright (C) The Internet Society (2000). All Rights Reserved. + +Abstract + + This document provides an overview of a workshop held by the Internet + Architecture Board (IAB) on wireless internetworking. The workshop + was hosted by Nokia in Mountain View, CA, USA on February 29 thru + March 2, 2000. The goal of the workshop was to assess current and + future uses of Internet technology in wireless environments, to make + recommendations on research and standardization tasks to improve + acceptance of Internet network and transport protocols in wireless + environments, and to evaluate methods to improve communication and + collaboration among Internet standards working groups and those of + the telephony and wireless sectors. This report summarizes the + conclusions and recommendations of the IAB on behalf of the IETF + community. + + Comments should be submitted to the IAB-Wireless-Workshop@ietf.org + mailing list. + +Table of Contents + + 1 Introduction . . . . . . . . . . . . . . . . . . . . 3 + 2 Presentation Overview . . . . . . . . . . . . . . . . 4 + 3 Discussion and Observations . . . . . . . . . . . . . 9 + 3.1 Discussion on "Walled Garden" Service Model . . . . . 9 + 3.2 Discussion on Mobility and Roaming . . . . . . . . . 10 + 3.2.1 Discussion on Mobility and Roaming Model . . . . . . 11 + 3.2.2 Discussion on Mobility and Roaming Protocols . . . . 11 + 3.2.3 Discussion on Mobility and Roaming Services . . . . . 12 + 3.3 Discussion on Security Model . . . . . . . . . . . . 12 + 3.3.1 Discussion on User Identity . . . . . . . . . . . . . 12 + 3.3.2 Discussion on WAP Security . . . . . . . . . . . . . 13 + + + +Mitzel Informational [Page 1] + +RFC 3002 IAB Wireless Workshop December 2000 + + + 3.3.3 Discussion on 3G Network Security . . . . . . . . . . 13 + 3.4 Discussion on Transports . . . . . . . . . . . . . . 14 + 3.4.1 Discussion on Link Characteristics and Mobility + Effect on Transport . . . . . . . . . . . . . . . . . 14 + 3.4.2 Discussion on WAP Transport . . . . . . . . . . . . . 16 + 3.4.3 Discussion on IETF Transport Activities . . . . . . . 16 + 3.5 Discussion on Aeronautical Telecommunication Network + (ATN) Routing Policy. . . . . . . . . . . . . . . . . 17 + 3.6 Discussion on QoS Services . . . . . . . . . . . . . 18 + 3.6.1 Discussion on "Last Leg" QoS . . . . . . . . . . . . 18 + 3.6.2 Discussion on Path QoS Discovery . . . . . . . . . . 19 + 3.7 Discussion on Header Compression . . . . . . . . . . 20 + 3.8 Discussion on Applications Protocols . . . . . . . . 21 + 3.9 Discussion on Proxy Agents . . . . . . . . . . . . . 22 + 3.10 Discussion on Adoption of IPv6 . . . . . . . . . . . 22 + 3.11 Discussion on Signaling . . . . . . . . . . . . . . . 23 + 3.12 Discussion on Interactions Between IETF and Other + Standards Organizations . . . . . . . . . . . . . . . 24 + 4 Recommendations . . . . . . . . . . . . . . . . . . . 25 + 4.1 Recommendations on Fostering Interaction with Non- + Internet Standards Organizations . . . . . . . . . . 25 + 4.2 Recommendations for Dealing with "Walled Garden" + Model . . . . . . . . . . . . . . . . . . . . . . . . 26 + 4.3 Recommendations on IPv4 and IPv6 Scaling . . . . . . 27 + 4.4 Recommendations on IPv4 and IPv6 Mobility . . . . . . 28 + 4.5 Recommendations on TCP and Transport Protocols . . . 29 + 4.6 Recommendations on Routing . . . . . . . . . . . . . 31 + 4.7 Recommendations on Mobile Host QoS Support . . . . . 32 + 4.8 Recommendations on Application Mobility . . . . . . . 33 + 4.9 Recommendations on TCP/IP Performance Characterization + in WAP-like Environment . . . . . . . . . . . . . . . 33 + 4.10 Recommendations on Protocol Encoding . . . . . . . . 33 + 4.11 Recommendations on Inter-Domain AAA Services . . . . 34 + 4.12 Recommendations on Bluetooth . . . . . . . . . . . . 34 + 4.13 Recommendations on Proxy Architecture . . . . . . . . 34 + 4.14 Recommendations on Justifying IPv6-based Solutions for + Mobile / Wireless Internet . . . . . . . . . . . . . 35 + 5 Security Considerations . . . . . . . . . . . . . . . 35 + 6 Acknowledgments . . . . . . . . . . . . . . . . . . . 35 + 7 Bibliography . . . . . . . . . . . . . . . . . . . . 36 + A Participants . . . . . . . . . . . . . . . . . . . . 41 + B Author's Address . . . . . . . . . . . . . . . . . . 41 + Full Copyright Statement . . . . . . . . . . . . . . 42 + + + + + + + + +Mitzel Informational [Page 2] + +RFC 3002 IAB Wireless Workshop December 2000 + + +1 Introduction + + Wireless technology, including wireless LANs, data transfer over + cellular radio (GSM, 3GPP, etc), and mobile operations from aircraft + and near earth spacecraft are becoming increasingly important. Some + market projections suggest that a mobile Internet in parallel with or + augmenting the wired Internet may be comparable in size to the wired + Internet as early as 2003. + + The wireless operators have not, however, chosen to use IPv4, TCP, + full HTTP/HTML, and other applications for a variety of reasons. + These relate to edge device cost, bandwidth limitations, perceived + protocol imperfections, unnecessary complexities, the chattiness of + the application protocols, and network layer addressing issues. + Unfortunately, this creates some serious issues at the wired/wireless + demarcation: end to end operation is sacrificed, security is + compromised, and automated content modification in some form becomes + necessary. The IAB considers these to be serious fundamental issues, + which will in time be a serious impediment to the usability of the + combined Internet if not addressed. + + The Internet Architecture Board (IAB), on February 29 thru March 2, + 2000, held an invitational workshop on wireless internetworking. The + goal of the workshop was to assess current and future uses of + Internet technology in wireless environments, to make recommendations + on research and standardization tasks to improve acceptance of + Internet network and transport protocols in wireless environments, + and to evaluate methods to improve communication and collaboration + among Internet standards working groups and those of the telephony + and wireless sectors. + + The following topics were defined for discussion: + + + Local area wireless technologies + + + Cellular wireless technologies + + + Wireless Application Protocol (WAP) + + + Near-space and aviation wireless applications + + + Voice over IP (VoIP) over wireless networks + + + Security over wireless networks + + + Transport and QoS over wireless networks + + + Use of WWW protocols over wireless and small screen devices + + + +Mitzel Informational [Page 3] + +RFC 3002 IAB Wireless Workshop December 2000 + + + + Addressing requirements for wireless devices + + + Compression and bit error requirements for wireless networks + + The fundamental question addressed in these discussion is "what are + the issues, and what really needs to be done to unify the Internet + below the application layer." Applications will also need to be + addressed, but were perceived to be more than could be usefully + discussed in a three-day workshop, and probably require different + expertise. + + Section 2 presents a concise overview of the individual presentations + made during the workshop. References to more extensive materials are + provided. Details on major discussion topics are provided in section + 3. Section 4 presents the recommendations made to wireless + operators, IRTF, and IETF on the architectural roadmap for the next + few years. It should be noted that not all participants agreed with + all of the statements, and it was not clear whether anyone agreed + with all of them. However, the recommendations made are based on + strong consensus among the participants. Finally, section 5 + highlights references to security considerations discussed, appendix + A lists contact information of workshop participants, and appendix B + lists the author contact information. + +2 Presentation Overview + + Title: Overview of Wireless IP Devices (Network Implications...) + + Presenter: Heikki Hammainen + + Reference: + http://www.iab.org/IAB-wireless-workshop/talks/hh-IABpub.PDF, + http://www.iab.org/IAB-wireless-workshop/talks/hh-IABpub.ppt + + Overview: + + Title: Overview of IEEE 802.11 Wireless LAN's & Issues Running IP + over IEEE 802.11? + + Presenter: Juha Ala-Laurila + + Reference: + http://www.iab.org/IAB-wireless-work- + shop/talks/IEEE80211_IP.ppt + + Overview: + + + + + +Mitzel Informational [Page 4] + +RFC 3002 IAB Wireless Workshop December 2000 + + + Title: Overview of Bluetooth Wireless & Issues Running IP over + Bluetooth? + + Presenter: Pravin Bhagwat + + Reference: + http://www.iab.org/IAB-wireless-workshop/talks/BT- + overview.PDF, + http://www.iab.org/IAB-wireless-workshop/talks/BT- + overview.ppt + + Overview: + + Title: Overview of Cellular Data Systems & Approaches to more IP + centric Cellular Data System + + Presenter: Jonne Soinien + + Reference: + http://www.iab.org/IAB-wireless-workshop/talks/ + Cellular_JSo.PDF, + http://www.iab.org/IAB-wireless-workshop/talks/ + Cellular_JSo.ppt + + Overview: + + Title: IP Packet Data Service over IS-95 CDMA + + Presenter: Phil Karn + + Reference: + http://www.iab.org/IAB-wireless-workshop/talks/karn/index.htm + + Overview: + + Title: Wireless Internet Networking + + Presenter: Chih-Lin I + + Reference: + http://www.iab.org/IAB-wireless-workshop/talks/IAB000229.PDF, + http://www.iab.org/IAB-wireless-workshop/talks/IAB000229.ppt + + Overview: + + Title: Mobile IP in Cellular Data Systems + + Presenter: Charlie Perkins + + + +Mitzel Informational [Page 5] + +RFC 3002 IAB Wireless Workshop December 2000 + + + Reference: + http://www.iab.org/IAB-wireless-workshop/talks/WLIP99.PDF, + http://www.iab.org/IAB-wireless-workshop/talks/WLIP99.ppt + + Overview: + + Title: Overview of WAP + + Presenter: Alastair Angwin + + Reference: + http://www.iab.org/IAB-wireless-workshop/talks/iab-wap-1.pdf + + Overview: + + Title: Mobile Wireless Internet Forum (MWIF) + + Presenter: Alastair Angwin + + Reference: + http://www.iab.org/IAB-wireless-workshop/talks/MWIF_TC + _Presentation.PDF, + http://www.iab.org/IAB-wireless-workshop/talks/MWIF_TC + _Presentation.ppt + + Overview: + + Title: Some WAP History + + Presenter: Jerry Lahti + + Reference: + http://www.iab.org/IAB-wireless-workshop/talks/waphist.PDF, + http://www.iab.org/IAB-wireless-workshop/talks/waphist.ppt + + Overview: + + Title: Near-space Wireless Applications + + Presenter: Mark Allman + + Reference: + http://www.iab.org/IAB-wireless-workshop/talks/allman-iab- + wireless.pdf, + http://www.iab.org/IAB-wireless-workshop/talks/allman-iab- + wireless.ps + + Overview: + + + +Mitzel Informational [Page 6] + +RFC 3002 IAB Wireless Workshop December 2000 + + + Title: Air Traffic / Aviation Wireless + + Presenter: Chris Wargo + + Reference: + http://www.iab.org/IAB-wireless-workshop/talks/wargo-talk.PDF, + http://www.iab.org/IAB-wireless-workshop/talks/wargo-talk.ppt + + Overview: + + Title: VoIP over Wireless + + Presenter: Christian Huitema + + Reference: + http://www.iab.org/IAB-wireless-workshop/talks/iab-wless- + voip.PDF, + http://www.iab.org/IAB-wireless-workshop/talks/iab-wless- + voip.ppt + + Overview: + + Title: Security Issues in Wireless Networks and Mobile Computing + + Presenter: N. Asokan + + Reference: + http://www.iab.org/IAB-wireless-workshop/talks/mobile-secu- + rity.PDF, + http://www.iab.org/IAB-wireless-workshop/talks/mobile-secu- + rity.ppt + + Overview: + + Title: Security for Mobile IP in 3G Networks + + Presenter: Pat Calhoun + + Reference: + http://www.iab.org/IAB-wireless-workshop/talks/mip-sec-3g.PDF, + http://www.iab.org/IAB-wireless-workshop/talks/mip-sec-3g.ppt + + Overview: + + Title: On Inter-layer Assumptions (A View from the Transport Area) + + Presenter: Mark Handley + + + + +Mitzel Informational [Page 7] + +RFC 3002 IAB Wireless Workshop December 2000 + + + Reference: + http://www.iab.org/IAB-wireless-workshop/talks/handley- + wireless.pdf, + http://www.iab.org/IAB-wireless-workshop/talks/handley-wire- + less.ps + + Overview: + + Title: Does current Internet Transport work over Wireless? + + Presenter: Sally Floyd + + Reference: + http://www.iab.org/IAB-wireless-workshop/talks/IAB-wireless- + Mar00.pdf, + http://www.iab.org/IAB-wireless-workshop/talks/IAB-wireless- + Mar00.ps + + Overview: + + Title: QOS for Wireless (DiffServ, IntServ, other?) + + Presenter: Lixia Zhang + + Reference: + http://www.iab.org/IAB-wireless-workshop/talks/zhang-feb- + IAB.PDF, + http://www.iab.org/IAB-wireless-workshop/talks/zhang-feb- + IAB.ppt + + Overview: + + Title: Do current WWW Protocols work over Wireless and Small + Screen Devices? + + Presenter: Gabriel Montenegro + + Reference: + http://www.iab.org/IAB-wireless-workshop/talks/wireless- + www.PDF, + http://www.iab.org/IAB-wireless-workshop/talks/wireless- + www.ppt + + Overview: + + Title: Compression & Bit Error Requirements for Wireless + + Presenter: Mikael Degermark + + + +Mitzel Informational [Page 8] + +RFC 3002 IAB Wireless Workshop December 2000 + + + Reference: + http://www.iab.org/IAB-wireless-workshop/talks/iab-hc.PDF, + http://www.iab.org/IAB-wireless-workshop/talks/iab-hc.ppt + + Overview: + + Title: Addressing Requirements for Wireless Devices & IPv6 + + Presenter: Bob Hinden + + Reference: + http://www.iab.org/IAB-wireless-workshop/talks/Addressing- + IPv6.PDF, + http://www.iab.org/IAB-wireless-workshop/talks/Addressing- + IPv6.ppt + + Overview: + +3 Discussion and Observations + + During the workshop presentations a number of issues were discussed + and observations made. The following sections 3.1 -- 3.12 summarize + these discussion and observations. Rather than organizing the + material linearly by presentation, it is grouped according to common + "themes" and issues. + +3.1 Discussion on "Walled Garden" Service Model + + Presentations from members involved in the cellular wireless (3GPP, + 3G.IP, MWIF) and WAP environments quickly illustrated a significant + difference in protocol specification and service models from that + typically assumed by the Internet community. These communities focus + on defining a profile (set of protocols and operational parameters) + that combine to provide a well defined user service. In addition, + the carriers typically prefer to have complete (or as much as + possible) control over the entire service, including user access + device, transmission facilities, and service "content". This style + of service model appears to have been inherited from the classic + telephony provider model. The term "walled garden" was coined to + describe the resulting captive customer economic and service model. + That is, the user is constrained within the limits of the service + provided by the carrier with limited ability to extend features or + access services outside the provider. The "walled garden" + service model is in stark contrast to the "open" service assumed in + the Internet. The application, access device, and service content + may each be controlled by a different entity, and the service + provider is typically viewed as little more than a "bit pipe". + + + + +Mitzel Informational [Page 9] + +RFC 3002 IAB Wireless Workshop December 2000 + + + Additionally, specification typically define a standalone protocol or + application rather than the set of features and interoperation with + other components required to deploy a commercial service. + + Some discussion focused on whether cellular carriers could be + persuaded to transition toward the Internet "open" service model. + Responses indicated that there was little hope of this as carriers + will always fight being reduced to a "bit pipe", fearing they cannot + sustain sufficient revenues without the value added services. An + additional point raised was that the closed model of the "walled + garden" simplifies a number of issues, such as security, + authorization, and billing when the entire network is considered + secured and controlled under a single administration. These + simplification can eliminate roadblocks to service deployment before + scalable, interdomain solutions are available. + + Even though there seems little hope of evolving carriers away from + the "walled garden" service in the short term, there was significant + value in recognizing its presence. This led to observations that + "walled garden" Internet-based services will operate somewhat like + current intranet services. Also, mechanisms should be investigated + to simplify interoperation and controlled access to the Internet. + Finally, the difference between Internet protocol specification + contrasted to service profiles highlights some of the confusion those + in the telephony environment encounter when attempting to incorporate + Internet capabilities. + + Much of the current work in extending Internet-based services to + cellular customers has focused on data services such as email or web + access. One observation on the reluctance of carriers to release any + control over services was that this may be an impediment to adoption + of Internet-based voice services. Current work on voice over IP + (VoIP) and call signaling (SIP [30]) loosens control over these + services, much of the functionality is moved into the SIP agent with + the carrier being reduced to an access provider (i.e., "bit pipe"). + +3.2 Discussion on Mobility and Roaming + + An inherent characteristic of wireless systems is their potential for + accommodating device roaming and mobility. Some discussion focused + on the model of mobility presented to the user. There was also + considerable interest and discussion on protocols employed, using + cellular telephony and/or IP-based solutions. Finally, there was + some interest in exploring new services enabled by mobility. + + + + + + + +Mitzel Informational [Page 10] + +RFC 3002 IAB Wireless Workshop December 2000 + + +3.2.1 Discussion on Mobility and Roaming Model + + There was considerable discussion and concern over what style of + mobility and roaming needs to be supported. Current usage in the + Internet is dominated by the mode where a user performs some actions + at one location, then shuts down and moves, followed by restart at a + new location. + + 3G.IP uses the term "macro mobility" to describe this mode. + + The discussion attempted to discern whether the current mode of usage + is a perceived limitation introduced by current protocols. A clear + consensus could not be achieved. There was agreement that + introduction of this "macro mobility" roaming is a worthwhile first + step. However, that was immediately followed by questions on whether + it is a sufficient first step, and warning not to stop at this level. + There seems significant issues for continued investigation related to + enabling continual usage of a device during roaming ("micro + mobility") and the ability to retrieve previous connections after a + roaming event. + +3.2.2 Discussion on Mobility and Roaming Protocols + + Selection between cellular and IP protocols in support of roaming + provided another topic for significant discussion. Cellular + operators have already deployed protocols providing significant + support for roaming. This has led several efforts, such as 3GPP and + 3G.IP, toward architecture relying on telephone system for all + mobility support, hiding roaming from the IP layer. + + Arguments for cellular-based roaming centered on concerns about the + mobile IP model. There was concern that home agent and foreign agent + involvement in delivery might introduce bottleneck, and the + perception that mobile IP handoff is too slow. A rebuttal offered + was that IETF mobileip working group is introducing hierarchy and + route optimization to improve performance and robustness [50], and + there was disagreement on the point regarding slow handoff under + mobile IP. + + Detriments to the cellular-based roaming include the lack of IP + support out to the mobile device and the added tunneling protocols + and overhead required. Additionally, roaming is less well defined + when traversing service provider boundaries and may involve highly + non-optimal forwarding path. There appears significant work + remaining to reach convergence on opinions, and additional + investigation to support roaming across cellular, WLAN, and IP + boundaries. + + + + +Mitzel Informational [Page 11] + +RFC 3002 IAB Wireless Workshop December 2000 + + +3.2.3 Discussion on Mobility and Roaming Services + + 3G.IP mobility model is primarily focused on providing ubiquitous + service across a range of access media. However, the presentation + also highlighted a desire to develop new "location based" services. + Examples presented include locating nearby services or receiving + advertisement and solicitations from nearby business. + + There are several Internet protocols defined, such as anycast service + [47] and SLP [28], that may aid in developing location based + services. However, there was considerable frustration on the part of + 3G.IP in that there appears little commercial support of these + protocols, and even less direction on how to assemble and coordinate + the required protocols to deploy the desired services. + + This exchange illustrated the disconnect between interpreting + Internet standards and telephony service profiles. First, in the + Internet many protocols are defined but many are optional. Protocol + support is typically driven by market demand, which can lead to + "chicken and egg" problem. Secondly, individual protocols and + applications are developed rather than complete profile to compose a + commercial service. For this service, evaluating the usage and + scalability of service discovery protocols appears to be an area open + for further investigation. + +3.3 Discussion on Security Model + + Mobility and wireless environments introduce many complexities and + potential attacks to user authentication and privacy. In addition to + the discussion presented below, there was an overriding statement + made regarding the methodology that must be followed for all security + protocol development. It was felt quite strongly that the only + chance for success is that the definition be done in a public forum, + allowing full disclosure of all algorithms and thorough review by + security experts. Stated an alternate way, defining protocols in a + closed forum relying on cellphone manufacturers, or other non-experts + on IP security, is very likely to create security exposures. + +3.3.1 Discussion on User Identity + + Storage of user identity can have significant effect on device usage + and device portability. Discussion focused on whether identity + should be tied to the mobile device or a transferable SIM card. + Fixing identification with the device may simplify manufacture and + provide some tamper resistance, however it makes it very difficult to + deploy a public device taking on the identity of the user. These + alternative also affect transfer of identity and configuration state + on device replacement or upgrade. + + + +Mitzel Informational [Page 12] + +RFC 3002 IAB Wireless Workshop December 2000 + + + A related topic revolves around the user desire to employ a single + device but to take on a different identity and privilege based on the + usage at hand (e.g., to gain corporate access, home access, or + Internet access). The ability and ease of assuming these multiple + identities may be highly dependent on the model of identity + integration, as discussed above. Discussion highlighted potential + pitfalls based on tieing of device and user identities. IPsec use of + device IP address inhibits roaming capabilities as the address may + change based on location, and precludes distinguishing identity and + capabilities for current usage. IPsec requires additional work to + accommodate this added flexibility. + + A final topic of discussion on user identity establishment was + whether possession of the device is sufficient, or whether the user + should be required to authenticate to the device. In the real world + the first alternative is exemplified by the credit card model, while + the second is more analogous to the ATM card where the user must also + provide a PIN code. Both models seem useful in the real world, and + it's likely both will have uses in wireless networking. + +3.3.2 Discussion on WAP Security + + WAP wireless transport security (WTLS) is based on TLS [20], with + optimized handshake to allow frequent key exchange. The security + service employs a "vertical" integration model, with protocol + components throughout the network stack. Some argued that this is + the wrong model. A better approach may have been a security layer + with well defined interfaces. This could allow for later tradeoffs + among different protocols, driven by market, applications, and device + capabilities. + + Additional statements argued that the WAP security model illustrates + dangers from optimizing for a limited usage domain ("walled garden"). + Content provider systems requiring security (e.g., banks) must deploy + a special WAP proxy, which breaks the model of a single WAP "domain". + Similar issues are inherent in gatewaying to the Internet. + +3.3.3 Discussion on 3G Network Security + + The existing GSM/GPRS model uses long term shared secrets (embedded + in SIM card) with one-way authentication to the network, and with + privacy only provided on the access link. This is an example where + the "walled garden" service model has an advantage. Complete control + over the service access devices and network greatly reduces the range + of security concerns and potential attacks. + + + + + + +Mitzel Informational [Page 13] + +RFC 3002 IAB Wireless Workshop December 2000 + + + Future 3GPP and 3GPP2 plan to push IP all the way out to the wireless + device. An observation is that this results in more potential for + exposure of signaling and control plane to attacks. Desire is to + perform mutual authentication and securing of the network. This is a + difficult problem with additional issues remaining to be solved; + however the statement was made that relying on IP and open standards + is more likely to produce a provably secure network than former + reliance on SS7 protocols and obscurity. + + Completing support for the security requirements of the 3GPP/3GPP2 + network seems to require resolving issues in two primary areas, AAA + services and mobile IP. AAA is required for authentication, + authorization, and billing. Remaining issues center around cross + domain AAA, authentication using PKI, and there was considerable + aversion to use of IPsec and IKE protocols due to perceived overhead + and delay. Mobile IP issues revolve around solutions to reduce the + security associations required between mobile node and home agent, + mobile node and foreign agent, and the home and foreign agent. An + interim solution being investigated involves use of a RADIUS server + [56]; however, there are concerns with repeated dynamic key + generation on each handoff or hiding some details of handoffs, which + may violate assumptions in mobile IP protocol [48]. Evaluating + requirements and addressing all of these open issues appears to be an + excellent opportunity for mutual cooperation on open standardization + and review. + +3.4 Discussion on Transports + + Discussion on transport protocols touched on a broad range of issues. + Concerns ranged from the effects of wireless link characteristics and + mobility effect on TCP, to development of new transport protocols + such as WAP Wireless Transaction Protocol (WTP). In addition, a + significant amount of time was spent reviewing ongoing efforts within + the IETF on TCP transport enhancements and investigation of new + transports. + +3.4.1 Discussion on Link Characteristics and Mobility Effect on + Transport + + TCP makes assumptions on loss as congestion indication. The + statement was made that TCP was designed for links with about 1% + corruption loss, and provided that constraint is met then TCP should + function properly. Presentation on IS-95 CDMA-based data service + showed that it conditions line to provide 1--2% error rate with + little correlation between loss. Similar conditioning and Forward + Error Correction (FEC) mechanisms may be appropriate for other + wireless and satellite systems [4]. This may not be true for all + wireless media, but it was interesting in the fact that it indicates + + + +Mitzel Informational [Page 14] + +RFC 3002 IAB Wireless Workshop December 2000 + + + TCP should work properly on many wireless media. However, the amount + of discussion and suggestions on TCP performance optimizations showed + that there can be a considerable gap between merely working and + working well. + + One issue raised several times was related to the effects of non- + congestive loss on TCP performance. In the wireless environment + non-congestive loss may be more prevalent due to corruption loss + (especially if the wireless link cannot be conditioned to properly + control error rate) or an effect of mobility (e.g., temporary outage + while roaming through an area of poor coverage). These losses can + have great detrimental effect on TCP performance, reducing the + transmission window and halving the congestion window size. Much of + the discussion focused on proposing mechanisms to explicitly indicate + a non-congestive loss to the TCP source. Suggestions included a + Non-Congestive Loss Indication (NCLI) sent for instance when packet + corruption loss is detected, or sending a Source Encourage (SE) to + stimulate source transmission at the end of an outage. In addition + to data corruption, wireless links can also experience dropouts. In + this situation any active TCP sessions will commence periodic + retransmissions, using an exponentially increasing back-off timer + between each attempt. When the link becomes available it may be many + seconds before the TCP sessions resume transmission. Mechanisms to + alleviate this problem, including packet caching and triggered + retransmission were discussed. The more generic form of all of these + mechanisms is one that allows the state of the layer two (datalink) + system to signal to the TCP session its current operating mode. + Developing a robust form of such a signaling mechanism, and + integrating these signals into the end-to-end TCP control loop may + present opportunities to improve TCP transport efficiency for + wireless environments. + + TCP improvements have been incorporated to support "long" links + (i.e., those with large delay and bandwidth characteristics) [36], + however considerable expertise may still be required to tune socket + buffers for maximum performance. Some work has been done on auto- + tuning buffers, which shows promise [58]. An additional problem with + large windows and auto-tuning is the added header overheads. This + may exasperate the problems of running TCP over low bandwidth links. + Suggestions included to explore dynamic negotiation of large window + extensions in the middle of a connection to alleviate these issues. + A final issue raised with regardport (see discussion below in section + 3.4.3). + + There was also concern regarding mobility effects on TCP performance. + TCP has implicit assumptions on bounding propagation delay. If delay + exceeds the smoothed round trip time plus four times the round trip + variance then the segment is considered lost, triggering the normal + + + +Mitzel Informational [Page 15] + +RFC 3002 IAB Wireless Workshop December 2000 + + + backoff procedures. Could these assumptions be violated by segment + loss or duplication during handoff? Work on D-SACK [25] may alleviate + these worries, detecting reordering and allowing for adaptive DUP-ACK + threshold. Finally, there was suggestion it might be appropriate to + adapt (i.e., trigger slow start) immediately after mobile handoff on + the assumption that path characteristics may differ. + +3.4.2. Discussion on WAP Transport + + WAPF considered TCP connection setup and teardown too expensive in + terms of bit overhead and latency when required for every + transaction. WAPF developed the Wireless Transaction Protocol (WTP), + with some inspiration from T/TCP [12]. WTP offers several classes of + service ranging from unconfirmed request to single request with + single reply transaction. Data is carried in the first packet and + 3-way handshake eliminated to reduce latencies. In addition + acknowledgments, retransmission, and flow control are provided. + + Discussion on WTP centered on assessing details on its operation. + Although it incorporates mechanisms for reliability and flow control + there was concern that it may miss critical or subtle transport + issues learned through years of Internet research and deployment + experience. One potential area for disaster appeared to be the use + of fixed retransmission timers and lack of congestion control. This + gave rise to suggestions that the IETF write up more details on the + history and tradeoffs in transport design to aid others doing + transport design work, and secondly that the IETF advocate that the + congestion control is not optional when using rate adaptive transport + protocols. + + The remaining discussion on WAP transport primarily focused on ways + to share information. It was suggested that any result from WAPF + study of TCP shortcomings that led to its rejection might be useful + for IETF review as inputs for TCP modifications. Similar comments + were raised on study of T/TCP shortcomings and its potential exposure + to Denial of Service (DoS) attacks. It was also encouraged that the + WAPF members participate in the IETF directly contribute requirements + and remain abreast of current efforts on evolving TCP operation and + introduction of new transport (see discussion below in section + 3.4.3.). + +3.4.3 Discussion on IETF Transport Activities + + Discussion on transport work in the IETF presented a large array of + activities. Recent work on transport improvement includes path MTU, + Forward Error Correction (FEC), large windows, SACK, NewReno Fast + Recovery, ACK congestion control, segment byte counting, Explicit + Congestion Notification (ECN), larger initial transmit windows, and + + + +Mitzel Informational [Page 16] + +RFC 3002 IAB Wireless Workshop December 2000 + + + sharing of related TCP connection state [3,4,5,6,24,25,43,53,63]. + Work on new transports includes SCTP [61] in the IETF Signaling + Transport (sigtran) working group and TCP-Friendly Rate Control + (TFRC) [1] by researchers at ACIRI. SCTP provides a reliable UDP- + like protocol supporting persistent associations and in-order + delivery with congestion control. TFRC is targeted at unreliable, + unicast streaming media. Finally, work in the IETF End-point + Congestion Management (ecm) working group is looking at standardizing + congestion control algorithms, and work in the Performance + Implications of Link Characteristics (pilc) working group is + characterizing performance impacts of various link technologies and + investigating performance improvements. + + This vast array of ongoing research and standards development seemed + a bit overwhelming, and there was considerable disagreement on the + performance and applicability of several TCP extensions. However, + this discussion did raise a couple of key points. First, transport + work within the Internet community is not stagnant, there is a + significant amount of interest and activity in improvement to + existing protocols and exploration of new protocols. Secondly, the + work with researchers in satellite networking has demonstrated the + tremendous success possible in close collaboration. The satellite + networking community was dissatisfied with initial TCP performance on + long delay links. Through submission of requirements and + collaborative investigation a broad range of improvements have been + proposed and standardized to address unique characteristics of this + environment. This should hopefully set a very positive precedent to + encourage those in the wireless sector to pursue similar + collaboration in adoption of Internet protocols to their environment. + +3.5 Discussion on Aeronautical Telecommunication Network (ATN) Routing + Policy + + The Aeronautical Telecommunication Network (ATN) has goals to improve + and standardize communications in the aviation industry. This ranges + across air traffic management and control, navigation and + surveillance, all the way up to passenger telephone service and + entertainment. This also involves integration of both fixed ground + segments and mobile aircraft. Supporting the ATN architecture using + Internet protocols may introduce additional requirements on the + routing infrastructure. + + Current ATN views each aircraft as an autonomous network (AS) with + changing point of attachment as it "roams" through different + airspace. Addressing information associated with the aircraft is + fixed, which makes route aggregation difficult since they're not + related to topology, and also increases the frequency of updates. + Additionally, the aircraft may be multiply attached (within coverage + + + +Mitzel Informational [Page 17] + +RFC 3002 IAB Wireless Workshop December 2000 + + + of multiple ground and space-based access networks), requiring + routing policy support for path selection. Finally, QoS path + selection capabilities may be beneficial to arbitrate shared access + or partition real-time control traffic from other data traffic. + + Initial prototype of ATN capabilities have been based on ISO IDRP + [33] path selection and QoS routing policy. There was some + discussion whether IDRP could be adopted for use in an IP + environment. There was quick agreement that the preferred solution + within the IETF would be to advance BGP4++ [8,54] as an IDRP-like + replacement. This transitioned discussion to evaluation of ATN use + of IDRP features and their equivalent to support in BGP. Several + issues with BGP were raised for further investigation. For example, + whether BGP AS space is sufficient to accommodate each aircraft as an + AS? Also issues with mobility support; can BGP provide for + dynamically changing peering as point of attachment changes, and + alternative path selection policies based on current peerings? A + significant amount of additional investigation is required to fully + assess ATN usage of IDRP features, especially in the QoS area. These + could lead to additional BGP requirements, for instance to effect + different prioritization or path selection for aircraft control vs. + passenger entertainment traffic. + +3.6 Discussion on QoS Services + + Enabling support for voice and other realtime services along with + data capabilities requires Quality of Service (QoS) features to + arbitrate access to the limited transmission resources in wireless + environment. The wireless and mobile environment requires QoS + support for the last leg between the mobile device and network access + point, accommodating roaming and unique characteristics of the + wireless link. + + In addition to the discussion presented below, it was felt quite + strongly that it is critical any QoS facility be provided as an + underlying service independent of payload type. That is, there + should be no built in knowledge of voice or other application + semantics. This results in a feature that can be leveraged and + easily extended to support new applications. + +3.6.1 Discussion on "Last Leg" QoS + + Discussion on voice over IP (VoIP) emphasized that (wireless) access + link is typically the most constrained resource, and while contention + access (CSMA) provides good utilization for data it is not ideal for + voice. Two models were identified as potential solution in VoIP + architecture. The first is to have the wireless device directly + signal the local access router. A second alternative is to have the + + + +Mitzel Informational [Page 18] + +RFC 3002 IAB Wireless Workshop December 2000 + + + call control element (SIP agent [30]) "program" the edge router. + This tradeoff seemed to be an area open for additional investigation, + especially given the complications that may be introduced in the face + of mobility and roaming handoffs. This appears a key component to + solve for success in VoIP adoption. + + Work within the IEEE 802.11 WLAN group identified similar + requirements for QoS support. That group is investigating a model + employing two transmission queues, one for realtime and one for + best-effort traffic. Additional plans include mapping between IP + DiffServ markings [14,46] and IEEE 802 priorities. + + The statement was also made that QoS over the wireless link is not + the fundamental problem, rather it is handling mobility aspects and + seamless adaptation across handoffs without service disruption. + There were concerns about mechanisms establishing per-flow state + (RSVP [13]). Issues include scaling of state, and signaling overhead + and setup delays on roaming events. DiffServ [9] approach allows + allocating QoS for aggregate traffic class, which simplifies roaming. + However, DiffServ requires measurement and allocation adjustment over + time, and policing to limit amount of QoS traffic injected. + +3.6.2 Discussion on Path QoS Discovery + + The HDR high speed wireless packet data system under development at + Qualcomm highlights unique characteristics of some wireless media. + This system provides users a channel rate between 38.4Kb/s and + 2.4Mb/s, with throughput dependent on channel loading and distance + from network access point. This gave rise to considerable discussion + on whether it might be possible to discover and provide feedback to + the application regarding current link or path QoS being received. + This might enable some form of application adaptation. + + In the case of the HDR system it was indicated that no such feedback + is currently available. Additionally, it was argued that this is in + accord with the current Internet stack model, which does not provide + any mechanisms to expose this type of information. Counter arguments + stated that there are growing demands in Internet QoS working groups + requesting exposure of this type of information via standardized + APIs. Members working on GPRS protocols also indicated frustration + in deploying QoS capabilities without exposure of this information. + This clearly seemed a topic for further investigations. + + A final area of discussion on QoS discovery focused on the question + of how a server application might find out the capabilities of a + receiver. This could allow for application adaptation to client + device and path characteristics. One suggestion proposed use of RSVP + payload, which is able to transport QoS information. A second + + + +Mitzel Informational [Page 19] + +RFC 3002 IAB Wireless Workshop December 2000 + + + alternative is to push capability exchange and negotiation to the + application layer. Discussion on this topic was brief, as + application issues were deemed outside the workshop charter, however + this also seems an area open for future investigation. + +3.7 Discussion on Header Compression + + A critical deterrent to Internet protocol adoption in the highly + band-width constrained wireless cellular environment is the bit + overhead of the protocol encoding. Examples presented highlighted + how a voice application (layered over IP [52,19], UDP [51], and RTP + [57]) requires a minimum of 40 bytes of headers for IPv4 or 60 bytes + for IPv6 before any application payload (e.g., 24 byte voice sample). + This overhead was also presented as a contributing factor for the + creation of WAP Wireless Datagram Protocol (WDP) rather than IP for + very low datarate bearers. + + Discussion on header compression techniques to alleviate these + concerns focused on work being performed within the IETF Robust + Header Compression (rohc) working group. This working group has + established goals for wireless environment, to conserve radio + spectrum, to accommodate mobility, and to be robust to packet loss + both before the point where compression is applied and between + compressor and decompressor. Additional requirements established + were that the technique be transparent, does not introduce additional + errors, and that it is compatible with common protocol layerings + (e.g., IPv4, IPv6, RTP/UDP/IP, TCP/IP). + + The primary observation was that this problem is now largely solved! + The working group is currently evaluating the ROCCO [38] and ACE [42] + protocols, and expects to finalize its recommendations in the near + future. It was reported that these encodings have a minimum header + of 1 byte and result in average overhead of less than 2 bytes for an + RTP/UDP/IP packet. There is some extra overhead required if + transport checksum is required and some issues still to be analyzed + related to interoperation with encryption and tunneling. + + A detriment to IPv6 adoption often cited is its additional header + overhead, primarily attributed to its larger address size. A + secondary observation made was that it's believed that IPv6 + accommodates greater header compression than IPv4. This was + attributed to the elimination of the checksum and identification + fields from the header. + + Discussion on use of WWW protocols over wireless highlighted protocol + encodings as another potential detriment to their adoption. A number + of alternatives were mentioned for investigation, including use of a + "deflate" Content-Encoding, using compression with TLS [20], or + + + +Mitzel Informational [Page 20] + +RFC 3002 IAB Wireless Workshop December 2000 + + + Bellovin's TCP filters. Observation was made that it could be + beneficial to investigate more compact alternative encoding of the + WWW protocols. + +3.8 Discussion on Applications Protocols + + IETF protocol developments have traditionally taken the approach of + preferring simple encode/decode and word alignment at the cost of + some extra bit transmissions. It was stated that optimizing protocol + encoding for bit savings often leads to shortcomings or limitations + on protocol evolution. However, it was also argued that environments + where physical limitations have an effect on transmission capacity + and system performance may present exceptions where optimized + encodings are beneficial. Cellular wireless and near-space satellite + may fall into this category. + + The WAP protocols exhibit several examples where existing Internet + protocols were felt to be too inefficient for adoption with very low + datarate bearer services and limited capability devices. The WAP + Wireless Session Protocol (WSP) is based on HTTPv1.1 [23], however + WSP incorporates several changes to address perceived inefficiencies. + WSP uses a more compact binary header encoding and optimizations for + efficient connection and capability negotiation. Similarly, the WAP + Wireless Application Environment (WAE) uses tokenized WML and a tag- + based browser environment for more efficient operation. + + Additional requests for more efficient and compact protocol + encodings, and especially improved capability negotiation were raised + during discussion on usage of WWW protocols with wireless handheld + devices. + + Finally, work within the near-space satellite environment has pointed + out other physical limitations that can affect performance. In this + case the long propagation delays can make "chatty" protocols highly + inefficient and unbearable for interactive use. This environment + could benefit from protocols that support some form of "pipelining" + operation. + + There seemed broad agreement that many of these observations + represent valid reasons to pursue optimization of protocol + operations. Investigation of compact protocol encoding, capability + negotiation, and minimizing or overlapping round trips to complete a + transaction could all lead to improved application performance across + a wide range of environments. + + + + + + + +Mitzel Informational [Page 21] + +RFC 3002 IAB Wireless Workshop December 2000 + + +3.9 Discussion on Proxy Agents + + Proxy agents are present in a number of the wireless and mobile + architectures. They're often required to gateway between + communication domains; terminate tunnel and translate between + telephony system and Internet protocols (GPRS), or to escape the + "walled garden" (WAP). In conjunction with limited capability + handheld devices a proxy might be deployed to offload expensive + processing such as public key operations, perform content filtering, + or provide access to "backend" applications (e.g., email, calendar, + database). In other cases the proxy may be required to work around + protocol deployment limitations (e.g., NAT with limited IPv4 + addresses). + + The discussion on proxy agents primarily recognized that there are a + range of proxy agent types. Proxies may operate by intercepting and + interpreting protocol packets, or by hijacking or redirecting + connections. Some types of proxy break the Internet end-to-end + communication and security models. Other proxy architectures may + limit system scalability due to state or performance constraints. + There was some desire to conduct further study of proxy agent models + to evaluate their effect on system operation. + +3.10 Discussion on Adoption of IPv6 + + Projections were presented claiming 1200 million cellular (voice) + subscribers, 600 million wired stations on the Internet, and over 600 + million wireless data ("web handset") users by the year 2004. Right + up front there was caution about these projections, especially the + wireless data since it is highly speculative with little history. + Secondly, there was some doubt regarding potential for significant + revenues from user base over 1 billion subscribers; this may be + pushing the limits of world population with sufficient disposable + income to afford these devices. However, there was broad consensus + that cellular and Internet services are going to continue rapid + growth and that wireless data terminals have potential to form a + significant component of the total Internet. These conclusions + seemed to form the basis for many additional recommendations to push + for adoption of IPv6 protocols in emerging (3G) markets. + + In nearly all the presentations on 3G cellular network technologies + discussion on scaling to support the projected large number of + wireless data users resulted in strong advocacy by the Internet + representatives for adoption of IPv6 protocols. There were some + positive signs that groups have begun investigation into IPv6. For + example, 3GPP has already defined IPv6 as an option in their 1998 and + 1999 specifications (release R98 and R99), and are considering + + + + +Mitzel Informational [Page 22] + +RFC 3002 IAB Wireless Workshop December 2000 + + + specifying IPv6 as mandatory in the release 2000. The MWIF effort is + also cognizant of IPv4 and IPv6 issues and is currently wrestling + with their recommendations in this area. + + Although there was limited positive signs on IPv6 awareness, + indication is that there are long fights ahead to gain consensus for + IPv6 adoption in any of the 3G standards efforts. There was + considerable feedback that the telephony carriers perceive IPv6 as + more difficult to deploy, results in higher infrastructure equipment + expenses, and adds difficulty in interoperation and gatewaying to the + current (IPv4) Internet. Arguments for sticking with IPv4 primarily + came down to the abundance and lower pricing of IPv4-based products, + and secondary argument of risk aversion; there is currently minimal + IPv6 deployment or operational experience and expertise, and the + carriers do not want to drive development of this expertise. + Finally, some groups argue IPv4 is sufficient for "walled garden" + use, using IPv4 private address space (i.e., the "net 10" solution). + + One other area of concern regarding IPv6 usage is perceived memory + and processing overhead and its effect on small, limited capability + devices. This was primarily directed at IPv6 requirement for IPsec + implementation to claim conformance. Arguments that continued + increase in device capacity will obviate these concerns were + rejected. It was stated that power constraints on these low-end + devices will continue to force concerns on memory and processing + overhead, and impact introduction of other features. There was no + conclusion on whether IPsec could be made optional for these devices, + or the effect if these devices were "non-compliant". + + Emerging 3G cellular networks appear ideal environment for IPv6 + introduction. IPv6 addresses scaling requirements of wireless data + user projections and eliminates continued cobbling of systems + employing (IPv4) private address space and NAT. This appears an area + for IAB and Internet community to take a strong stance advocating + adoption of IPv6 as the various 3G forums wrestle with their + recommendations. + +3.11 Discussion on Signaling + + Discussion on signaling focused on call setup and control functions, + and the effects of mobility. The 3G.IP group has investigated + standardizing on either H.323 [32] or SIP [30]. Currently support + seems to be split between the protocols, and neither seemed ideal + without support for mobility. During discussion on VoIP it was + presented that SIP does support mobility, with graceful handling of + mobile handoff, updating location information with remote peer, and + even simultaneous handoff of both endpoints. The problem with SIP + adoption seems to be its slow standardization brought about by + + + +Mitzel Informational [Page 23] + +RFC 3002 IAB Wireless Workshop December 2000 + + + focusing on the harder multicast model rather than expediting + definition of a unicast "profile". There seems great need for IETF + to expedite finalization of SIP, however some argued at this point + it's likely many products will need to develop support for both SIP + and H.323, and for their interoperation. + + A short discussion was also raised on whether it is the correct model + to incorporate the additional protocol mechanisms to accommodate + mobility into the SIP signaling. An alternative model might be to + build on top of the existing mobile IP handoff facilities. There was + no conclusion reached, however it seemed an area for further + investigation. + +3.12 Discussion on Interactions Between IETF and Other Standards + Organizations + + There were many examples where non-IETF standards organizations would + like to directly adopt IETF standards to enable Internet (or similar) + services. For example IEEE 802.11 WLAN relies on adoption of IETF + standards for mobile IP, end-to-end security, and AAA services. 3GPP + is looking into the IETF work on header compression. WAPF derived + its transport, security, and application environment from Internet + protocols. At first glance these would seem successes for adoption + of Internet technologies, however the decision to rely on IETF + standards often introduced frustrations too. + + One common theme for frustration is differences in standardization + procedures. For instance, 3GPP follows a strict model of publishing + recommendations yearly; any feature that cannot be finalized must be + dropped. On the other hand the IETF working groups have much less + formalized schedules, and in fact often seem to ignore published + milestone dates. This has led to a common perception within other + standards organizations that the IETF cannot deliver [on time]. + + A second area identified where IETF differs from other organizations + is in publication of "system profile". For example defining + interoperation of IPsec, QoS for VoIP and video conferencing, and + billing as a "service". Wading through all the protocol + specifications, deciding on optional features and piecing together + the components to deliver a commercial quality service takes + considerable expertise. + + Thirdly, there was often confusion about how to get involved in IETF + standards effort, submit requirements, and get delivery commitments. + Many people seem unaware and surprised at how open and simple it is + to join in IETF standardization via working group meetings and + mailing list. + + + + +Mitzel Informational [Page 24] + +RFC 3002 IAB Wireless Workshop December 2000 + + + There wasn't really a large amount of discussions on ways to address + these differences in standards practices. However, it did seem + beneficial to understand these concerns and frustrations. It seemed + clear there can be some benefits in improving communication with + other standards organizations and encouraging their participation in + IETF activities. + +4 Recommendations + + The IAB wireless workshop provided a forum for those in the Internet + research community and in the wireless and telephony community to + meet, exchange information, and discuss current activities on using + Internet technology in wireless environments. However the primary + goal from the perspective of the IAB was to reach some understanding + on any problems, both technical or perceived deficiencies, deterring + the adoption of Internet protocols in this arena. This section + documents recommendations of the workshop on actions by the IAB and + IESG, IRTF research efforts, and protocol development actions for the + IETF to address these current deficiencies and foster wider + acceptance of Internet technologies. + +4.1 Recommendations on Fostering Interaction with Non-Internet Standards + Organizations + + A clear consensus of the workshop is that dialog needs to be + improved. The Internet community should attempt to foster + communication with other standards bodies, including WAPF, MWIF, + 3GPP, 3G.IP, etc. The goal is to "understand each others problems", + provide for requirements input, and greater visibility into the + standardization process. + +4.1.1 + + It was recommended to take a pragmatic approach rather than + formalizing liaison agreements. The formalized liaison model is + counter to the established Internet standards process, is difficult + to manage, and has met with very limited success in previous trials. + Instead, any relevant IETF working group should be strongly + encouraged to consider and recommend potential liaison requirements + within their charter. + +4.1.2 + + It was recommended to avoid formation of jointly sponsored working + groups and standards. Once again this has shown limited success in + the past. The preferred mode of operation is to maintain separate + standards organizations but to encourage attendance and participation + of external experts within IETF proceedings and to avoid overlap. + + + +Mitzel Informational [Page 25] + +RFC 3002 IAB Wireless Workshop December 2000 + + + An exception to this style of partitioning meeting sponsorship is + less formal activities, such as BOFs. It was recommended that + sponsoring joint BOF could be beneficial. These could enable + assembly of experts from multiple domains early in the process of + exploring new topics for future standards activities. + +4.1.3 + + A principle goal of fostering communication with other standards + organizations is mutual education. To help in achieving this goal + recommendations were made related to documenting more of the history + behind Internet standards and also in coordinating document reviews. + + It was recommended that IETF standards groups be encouraged to create + or more formally document the reasons behind algorithm selection and + design choices. Currently much of the protocol design history is + difficult to extract, in the form of working group mail archives or + presentations. Creation of these documents could form the basis to + educate newcomers into the "history" and wisdom behind the protocols. + + It was recommended that mutual document reviews should be encouraged. + This helps to disseminate information on current standards activities + and provides an opportunity for external expert feedback. A critical + hurdle that could severely limit the effectiveness of this type of + activity is the intellectual property and distribution restrictions + some groups place on their standards and working documents. + +4.2 Recommendations for Dealing with "Walled Garden" Model + + There are several perceived benefits to the "walled garden" (captive + customer) model, similar to current deployment of "intranets". These + range from simplified user security to "captive customer" economic + models. There was disagreement on the extent this deployment model + might be perpetuated in the future. However it is important to + recognize this model exists and to make a conscious decision on how + to accommodate it and how it will affect protocol design. + +4.2.1 + + It was strongly recommended that independent of the ubiquity of the + "walled garden" deployment scenario that protocols and architectural + decisions should not target this model. To continue the success of + Internet protocols at operating across a highly diverse and + heterogeneous environment the IETF must continue to foster the + adoption of an "open model". IETF protocol design must address + seamless, secure, and scalable access. + + + + + +Mitzel Informational [Page 26] + +RFC 3002 IAB Wireless Workshop December 2000 + + +4.2.2 + + Recognition that the "walled garden" model has some perceived + benefits led to recommendations to better integrate it into the + Internet architecture. These focused on service location and escape + from the "walled garden". + + It was recommended to investigate standard protocols for service and + proxy discovery within the "walled garden" domain. There are already + a number of candidate mechanisms, including static preconfiguration, + DNS [22,27,44,45], BOOTP [18], DHCP [21], SLP [28], and others. + Specific recommendations on use of these protocols in this + environment can help foster common discovery methods across a range + of access devices and ease configuration complexity. + + It was recommended to investigate standard methods to transport + through the garden wall (e.g., escape to the Internet). It seemed + clear that a better model is required than trying to map all access + over a HTTP [23] transport connection gateway. One suggestion was to + propose use of IP! + +4.3 Recommendations on IPv4 and IPv6 Scaling + + Wireless operators are projecting supporting on the order of 10's to + 100's million users on their Internet-based services. Supporting + this magnitude of users could have severe scaling implications on use + of the dwindling IPv4 address space. + +4.3.1 + + There was clear consensus that any IPv4-based model relying on + traditional stateless NAT technology [60] is to be strongly + discouraged. NAT has several inherent faults, including breaking the + Internet peer-to-peer communication model, breaking end-to-end + security, and stifling deployment of new services [16,29,31]. In + addition, the state and performance implications of supporting 10's + to 100's million users is cost and technologically prohibitive. + +4.3.2 + + Realm specific IP (RSIP) [10,11] has potential to restore the end- + to-end communication model in the IPv4 Internet, broken by + traditional NAT. However there was considerable reluctance to + formally recommend this as the long term solution. Detriments to its + adoption include that the protocol is still being researched and + defined, and potential interactions with applications, QoS features, + and security remain. In addition, added signaling, state, and + tunneling has cost and may be technologically prohibitive scaling. + + + +Mitzel Informational [Page 27] + +RFC 3002 IAB Wireless Workshop December 2000 + + +4.3.3 + + The clear consensus of the workshop was to recommend adoption of an + IPv6-based solution to support these services requiring large + scaling. Adoption of IPv6 will aid in restoring the Internet end- + to-end communication model and eliminates some roaming issues. + Adoption of IPv6 in this marketspace could also help spur development + of IPv6 products and applications, and hasten transition of the + Internet. It was recognized that some application gateways are + required during transition of the IPv4 Internet, however it was felt + that the scaling and roaming benefits outweighed these issues. + +4.3.4 + + It was recommended that an effort be made to eliminate any + requirement for NAT in an IPv6 Internet. The IAB believes that the + IPv6 address space is large enough to preclude any requirement for + private address allocation [55] or address translation due to address + space shortage [15]. Therefore, accomplishing this should primarily + require installing and enforcing proper address allocation policy on + registry and service providers. It was recommended to establish + policies requiring service providers to allocate a sufficient + quantity of global addresses for a sites use. The feeling was that + NAT should be easily eliminated provided efficient strategies are + defined to address renumbering [17,62] and mobility [37] issues. + +4.4 Recommendations on IPv4 and IPv6 Mobility + + An inherent characteristic of wireless systems is their potential for + accommodating device roaming and mobility. Scalable and efficient + support of this mobility within Internet protocols can aid in pushing + native IP services out to the mobile devices. + +4.4.1 + + Several limitations were identified relating to current specification + of mobile IPv4 [48]. Primary among these limitations is that + mechanisms to support redundant home agents and failover are not + currently defined. Redundant home agents are required to avoid + single point of failure, which would require (proprietary) + extensions. Additional deficiencies related to lack of route + optimization, and tunneling and path MTU issues were also identified. + Due to these limitations there was reluctance to recommend this as a + solution. + + + + + + + +Mitzel Informational [Page 28] + +RFC 3002 IAB Wireless Workshop December 2000 + + +4.4.2 + + It was recommended to encourage adoption of IPv6 mobility extensions + [37] to support roaming capabilities in the wireless environment. IP + mobility over IPv6 incorporates improvements to address several + limitations of the IPv4-based mobility. The ability to use + autoconfiguration for "care of" address improves robustness and + efficiency. Additionally, path MTU is more easily adapted when a + router forwards to a new "care of" address. + + Building wireless roaming atop IPv6-based mobility may introduce + IPv4/IPv6 transition issues unique to the mobile environment. It was + recommended to add investigation of these issues to the charter of + the existing IETF Next Generation Transition (ngtrans) working group, + provided any mobile IP interoperation issues be identified. + +4.4.3 + + Scalable and widespread authentication, authorization, and accounting + (AAA) services are critical to the deployment of commercial services + based on (wireless) mobile IP. Some work is progressing on + definition of these standards for IP mobility [26,49]. However, due + to the pivotal role of these protocols on the ability to deploy + commercial services, it was recommended to make finalization of these + AAA standards and investigation of AAA scalability as high + priorities. + +4.5 Recommendations on TCP and Transport Protocols + + The wireless environment and applications place additional + requirements on transport protocol. Unique link error and + performance characteristics, and application sensitivity to + connection setup and transaction semantics has led to "optimized" + transports specific to each environment. These new transports often + lack robustness found in Internet transport and place barriers to + seamless gatewaying to the Internet. It was felt that better + education on transport design and cooperation on Internet transport + evolution could lead to significant improvements. + +4.5.1 + + It was recommended that the IETF Transport Area (tsv) working group + document why Internet transport protocols are the way they are. The + focus should be on generic transport issues and mechanisms, rather + than TCP specifics. This should capture usage and tradeoffs in + design of specific transport mechanisms (e.g., connection + + + + + +Mitzel Informational [Page 29] + +RFC 3002 IAB Wireless Workshop December 2000 + + + establishment, congestion control, loss recovery strategies, etc.), + and document some of the history behind transport research in the + Internet. + + This "entry point" document into transport design is in direct + support of the recommendations in section 4.1 to foster communication + and mutual education. In addition it was deemed critical that the + Internet community make it very clear that congestion control is not + optional. Internet researchers have learned that optimizing for a + single link or homogeneous environment does not scale. Early work by + Jacobson [34,35], standardization of TCP congestion control [5], and + continuing work within the IETF Endpoint Congestion Management (ecm) + working group could provide excellent basis for education of wireless + transport designers. + +4.5.2 + + It was recommended that the IETF actively solicit input from external + standards bodies on identifying explicit requirements and in + assessing inefficiencies in existing transports in support of + cellular and wireless environments. This has proven highly effective + in identifying research topics and in guiding protocol evolution to + address new operational environments, for instance in cooperation + with groups doing satellite-based internetworking [4,6]. + +4.5.3 + + It was recommended that the IAB make wireless standards bodies aware + of the existence, and get them active in, the IETF Transport Area + (tsv) working group. This transport "catch all" could provide an + excellent forum for workers outside the Internet community to propose + ideas and requirements, and engage in dialog with IESG members prior + to contributing any formal proposal into the IETF or incurring + overhead of working group formation. + +4.5.4 + + Mobile radio environments may often be subject to frequent temporary + outages. For example, roaming through an area that is out of range + of any base station, or disruptions due to base station handoffs. + This violation of the congestive loss assumption of TCP can have + severe detrimental effect on transport performance. It was + recommended to investigate mechanisms for improving transport + performance when these non-congestive loss can be detected. Areas + for potential research identified include incorporation of "hints" to + the sender providing Non-Congestive Loss Indication (NCLI) or + stimulating transmission after link recovery via Source Encourage + + + + +Mitzel Informational [Page 30] + +RFC 3002 IAB Wireless Workshop December 2000 + + + (SE) message [39]. This likely falls to the auspice of the IETF + Performance Implications of Link Characteristics (pilc) working + group. + +4.5.5 + + Many wireless applications require transaction semantics and are + highly sensitive to connection establishment delays (e.g., WAP). + However, it is still desirable to efficiently support streaming of + large bulk transfers too. It was recommended to investigate + tradeoffs in supporting these transaction and streaming connections. + Potential areas for investigation include tradeoffs between minimal + transaction transport and potential security and denial of service + (DoS) attacks, mechanisms to piggyback data during connection + establishment to eliminate round trip delays, or ways for endpoints + to cooperate in eliminating setup handshake for simple transactions + while providing switch-over to reliable streaming for bulk transfers. + +4.5.6 + + It was recommended to look at (TCP) transport improvements specific + to the wireless and mobile environment. An example is to investigate + reattachable transport endpoints. This could allow for graceful + recovery of a transport connection after a roaming or mobility event + results in changes to one or both endpoint identifiers. Another area + for potential investigation is to develop targeted uses of D-SACK + [25]. D-SACK provides additional robustness to reordered packets, + which may prove beneficial in wireless environment where packets are + occasionally corrupted. Higher performance may be attainable by + eliminating requirements on link-level retransmission maintaining + in-order delivery within a flow. + +4.6 Recommendations on Routing + + Unique routing requirements may be introduced in support of wireless + systems, especially when viewing the mobile component as an + autonomous system (AS). + +4.6.1 + + It was recommended that the IETF Routing Area commence investigation + of extensions to the BGP protocol [54] to support additional policy + features available within the ISO IDRP protocol [33]. The range of + policy control desired includes adopting different identity or + policies based on current point of attachment, and providing + flexibility in path selection based on local policy and/or current + + + + + +Mitzel Informational [Page 31] + +RFC 3002 IAB Wireless Workshop December 2000 + + + peer policy. These features could be used for instance in support of + requirements established in the Aeronautical Telecommunication + Network (ATN). + +4.6.2 + + It was recommended that the IETF Routing Area commence investigation + of extensions to the BGP protocol [54] to support additional QoS/TOS + path selection features available within the ISO IDRP protocol [33]. + The range of policies include differentiating service level or path + selection based on traffic classes. An example, based on + Aeronautical Telecommunication Network (ATN) requirements, might be + differentiating path selection and service between airline control + and passenger entertainment traffic. + +4.7 Recommendations on Mobile Host QoS Support + + Wireless link bandwidth is often scarce (e.g., cellular) and/or + shared (e.g., IEEE 802.11 WLAN). Meeting application QoS needs + requires accommodating these link characteristic, in addition to the + roaming nature of mobile host. Specialized support may be required + from the network layer to meet both link and end-to-end performance + constraints. + +4.7.1 + + It was recommended that the IETF Transport Area undertake + investigation into providing QoS in the last leg of mobile systems. + That is, between the mobile device and the network access point. + This type of QoS support might be appropriate where the wireless link + is the most constrained resource. A potential solution to + investigate is to employ an explicit reservation mechanism between + the mobile host and the access point (e.g., RSVP [13]), while relying + on resource provisioning or more scalable DiffServ [9] technologies + within the core. + +4.7.2 + + It was recommended that the IETF Transport Area undertake + investigation into end-to-end QoS when the path includes a mixture of + wireless and wired technologies. This investigation could focus on + mechanism to communicate QoS characteristics in cellular network to + the core network to establish end-to-end QoS guarantees. An + alternative investigation is to look into discovery problem of + assessing current end-to-end performance characteristics, enabling + for dynamic adaptation by mobile host. + + + + + +Mitzel Informational [Page 32] + +RFC 3002 IAB Wireless Workshop December 2000 + + +4.8 Recommendations on Application Mobility + + In a mobile environment with roaming, and mobile host disconnect and + reconnect at different attachment point it may be desirable to + recover an incomplete application session. It was recommended that + the IRTF investigate application mobility at this level. The goal is + to achieve a smooth recovery after a disconnect period; something + more graceful than a "redial". Currently there does not appear to be + sufficient information available within the network stack, this may + require instantiation of some form of "session" layer. + +4.9 Recommendations on TCP/IP Performance Characterization in WAP-like + Environment + + WAPF has gone to considerable effort to develop unique transport + protocol and optimizations due to perception that TCP/IP protocol + stack is too expensive. Much of this was predicated on WAP + requirements to support very low datarate bearer services. It was + recommended that members of the IRTF evaluate TCP/IP stack + performance in WAP-like environment to quantify its behavior and + applicability. The focus should include investigation of code and + memory space requirements, as well as link usage to complete a single + transaction for current WAP protocols and for both IPv4 and IPv6. + This work should result in better characterization of TCP/IP + performance in highly constrained devices and network, + recommendations to the IETF on protocol enhancements to optimize + performance in this environment, and recommendations to WAPF on + suitability of deploying native IP protocols. + +4.10 Recommendations on Protocol Encoding + + IETF protocol developments have traditionally taken the approach of + preferring simple encode/decode and word alignment at the cost of + some extra bit transmissions. This overhead may prove too burdensome + in some bandwidth constrained environments, such as cellular wireless + and WAP. Work within the IETF Robust Header Compression (rohc) + working group may go a long way to reducing some of these detriments + to Internet protocols deployment. However, there may be potential + for additional savings from investigation of alternative encoding of + common Internet protocols. It was recommended that members of the + IRTF evaluate general techniques that can be used to reduce protocol + "verbiage". Examples might include payload compression techniques or + tokenized protocol encoding. + + + + + + + + +Mitzel Informational [Page 33] + +RFC 3002 IAB Wireless Workshop December 2000 + + +4.11 Recommendations on Inter-Domain AAA Services + + Commercial roaming and mobility services are likely to require + exchange of authentication, authorization, and billing services + spanning multiple domains (service providers). This introduces + requirements related to establishing a web or hierarchy of trust + across multiple autonomous domains. Standard protocols to specify + and exchange usage policies and billing information must also be + established. Some work is progressing on scoping out the issues and + a framework [7,64]. However, there are significant issues to be + solved to enable a scalable, Internet-wide solution. Due to the + pivotal role of these protocols on the ability to deploy commercial + services, it was recommended to make finalization of scalable inter- + domain AAA as high priority within the IETF. + +4.12 Recommendations on Bluetooth + + Bluetooth protocols and devices were originally optimized for a + narrow application space. However, there is interest in exploring + the breadth to which protocol and device access can be extended. One + particular area of interest is exploring integration into, or + gatewaying access to, the Internet. It was recommended that the IETF + pursue formation of a joint BOF to assemble experts from the IETF and + Bluetooth communities to begin exploration of this problem. This is + in direct support of the recommendations in section 4.1 to foster + communication and mutual education. + +4.13 Recommendations on Proxy Architecture + + Proxy agents are often deployed to intercept and evaluate protocol + requests (e.g., web cache, HTTP redirector, filtering firewall) or to + gateway access between communication domains (e.g., traversing + bastion host between private network and Internet or gatewaying + between a cellular service and the Internet). There are a number of + potential architectures when contemplating development and deployment + of one of these proxy agent. It was recommended that members of the + IRTF investigate taxonomy of proxy architectures and evaluate their + characteristics and applicability. Each type of proxy should be + characterized, for example, by its effect on Internet end-to-end + model, and security, scaling, and performance implications. The + results of this study can help educate developers and network + operators on the range of proxy available and recommend solutions + that are least disruptive to Internet protocols. + + + + + + + + +Mitzel Informational [Page 34] + +RFC 3002 IAB Wireless Workshop December 2000 + + +4.14 Recommendations on Justifying IPv6-based Solutions for Mobile / + Wireless Internet + + IPv6 was strongly recommended to address scaling (see section 4.3) + and mobility (see section 4.4) issues in the future Internet + dominated by large numbers of wireless and mobile devices. It was + recommended that the IAB draft a formalized justification for these + recommendations for adoption of IPv6-based solution. It was believed + that the "The Case for IPv6" [40] document should form an excellent + basis for this justification. In addition, documents highlighting + architectural and operational pitfalls of continued reliance on IPv4 + and NAT also provide excellent justification [29,31,59]. It was + deemed urgent to submit these informational documents as inputs to + other standards bodies (MWIF, 3GPP, 3G.IP), as many decisions are + being made on Internet protocol adoption and this data could be + highly influential. + +5 Security Considerations + + This workshop did not focus on security. However, mobility and + wireless environment introduces additional complexities for security + and potential attacks to user authentication and privacy. The + presentations by Asokan and by Calhoun referenced in section 2 + focused on security mechanisms in currently deployed cellular + networks and evolution toward 3G cellular and IP networks. + Discussion on the "walled garden" service model (see section 3.1) + briefly mentions effects on simplifying security requirements. + Section 3.3 raises a number of security issues related to wireless + devices and mobility. These include alternatives for establishing + user identity and capabilities, securing network infrastructure from + attacks, and security associations required for mobile IP and AAA + operation. Section 3.7 mentions interoperation issues between + compression and encryption or tunneling, and finally section 3.9 + highlight potential for proxy agent to be used to offload expensive + crypto operations. + +6 Acknowledgments + + The author would like to thank all of the workshop participants for + their feedback, encouragement, and patience during the writeup of + this document. I would especially like to thank Brian Carpenter for + prompt responses to questions on the document organization and + content. Similarly, Charlie Perkins provided extensive feedback that + dramatically improved and corrected statements throughout the report. + Finally, Mikael Degermark, Sally Floyd, Heikki Hammainen, Geoff + Huston, and Gabriel Montenegro contributed comments and responses to + questions. + + + + +Mitzel Informational [Page 35] + +RFC 3002 IAB Wireless Workshop December 2000 + + +7 Bibliography + + [1] ACIRI. TCP-Friendly Rate Control. http://www.aciri.org/tfrc. + + [2] A. Aggarwal, S. Savage, and T. Anderson. Understanding the + Performance of TCP Pacing. Proceedings of IEEE Infocom 2000, + March 2000. + + [3] Allman, M., Floyd, S. and C. Partridge, "Increasing TCP's + Initial Window", RFC 2414, September 1998. + + [4] Allman, M., Glover, D. and L. Sanchez, "Enhancing TCP Over + Satellite Channels using Standard Mechanisms", RFC 2488, + January 1999. + + [5] Allman, M., Paxson, V. and W. Stevens, "TCP Congestion Control", + RFC 2581, April 1999. + + [6] Allman, M., Dawkins, S., Glover, D., Griner, J., Tran, D., + Henderson, T., Heidemann, J., Touch, J., Kruse, H., Ostermann, + S., Scott, K. and J. Semke, "Ongoing TCP Research Related to + Satellites", RFC 2760, February 2000. + + [7] Arkko, J., "Requirements for Internet-Scale Accounting + Management", Work in Progress. + + [8] Bates, T., Chandra, R., Katz, D. and Y. Rekhter, "Multiprotocol + Extensions for BGP-4", RFC 2283, February 1998. + + [9] Blake, S., Black, D., Carlson, M., Davies, E., Wang, Z. and W. + Weiss, "An Architecture for Differentiated Services" RFC 2475, + December 1998. + + [10] Borella, M., et al., "Realm Specific IP: Framework", Work in + Progress. + + [11] Borella, M., et al., "Realm Specific IP: Protocol + Specification", Work in Progress. + + [12] Braden, R., "T/TCP -- TCP Extensions for Transactions Functional + Specification", RFC 1644, July 1994. + + [13] Braden, R., Zhang, L., Berson, S., Herzog, S. and S. Jamin, + "Resource ReSerVation Protocol (RSVP) -- Version 1 Functional + Specification", RFC 2205, September 1997. + + [14] Brim, S., Carpenter, B. and F. Le Faucheur, "Per Hop Behavior + Identification Codes", RFC 2836, May 2000. + + + +Mitzel Informational [Page 36] + +RFC 3002 IAB Wireless Workshop December 2000 + + + [15] Carpenter, B., Crowcroft, J. and Y. Rekhter, "IPv4 Address + Behaviour Today", RFC 2101, February 1997. + + [16] Carpenter, B., "Internet Transparency", RFC 2775, February 2000. + + [17] Crawford, M., "Router Renumbering for IPv6", RFC 2894, August + 2000. + + [18] Croft, B. and J. Gilmore, "Bootstrap Protocol (BOOTP)", RFC 951, + September 1985. + + [19] Deering, S. and R. Hinden, "Internet Protocol, Version 6 (IPv6) + Specification", RFC 2460, December 1998. + + [20] Dierks, T. and C. Allen, "The TLS Protocol Version 1.0", RFC + 2246, January 1999. + + [21] Droms, R., "Dynamic Host Configuration Protocol", RFC 2131, + March 1997. + + [22] Everhart, C., Mamakos, L., Ullman, R. and P. Mockapetris, "New + DNS RR Definitions", RFC 1183, October 1990. + + [23] Fielding, R., Gettys, J., Mogul, J., Frystyk, H., Masinter, L., + Leach, P. and T. Berners-Lee, "Hypertext Transfer Protocol -- + HTTP/1.1", RFC 2616, June 1999. + + [24] Floyd, S. and T. Henderson, "The NewReno Modification to TCP's + Fast Recovery Algorithm", RFC 2582, April 1999. + + [25] Floyd, S., Mahdavi, J., Mathis, M. and M. Podolsky, "An + Extension to the Selective Acknowledgment (SACK) Option for + TCP", RFC 2883, July 2000. + + [26] Glass, S., Hiller, T., Jacobs, S. and C. Perkins, "Mobile IP + Authentication, Authorization, and Accounting Requirements", RFC + 2977, October 2000. + + [27] Gulbrandsen, A. and P. Vixie, "A DNS RR for specifying the + location of services (DNS SRV)", RFC 2052, October 1996. + + [28] Guttman, E., Perkins, C., Veizades, J. and M. Day, "Service + Location Protocol, Version 2", RFC 2608, June 1999. + + [29] Hain, T., "Architectural Implications of NAT", RFC 2993, + November 2000. + + + + + +Mitzel Informational [Page 37] + +RFC 3002 IAB Wireless Workshop December 2000 + + + [30] Handley, M., Schulzrinne, H., Schooler, E., and J. Rosenberg, + "SIP: Session Initiation Protocol", RFC 2543, March 1999. + + [31] Holdrege, M. and P. Srisuresh, "Protocol Complications with the + IP Network Address Translator (NAT)", Work in Progress. + + [32] International Telecommunication Union. Visual Telephone Systems + and Equipment for Local Area Networks which provide a Non- + guaranteed Quality of Service. Recommendation H.323, May 1996. + + [33] ISO/IEC. Protocol for Exchange of Inter-Domain Routeing + Information among Intermediate Systems to support Forwarding of + ISO 8473 PDUs. ISO/IEC IS10747, 1993. + + [34] V. Jacobson. Congestion Avoidance and Control. Computer + Communication Review, vol. 18, no. 4 August 1988. + ftp://ftp.ee.lbl.gov/papers/congavoid.ps.Z. + + [35] V. Jacobson. Modified TCP Congestion Avoidance Algorithm. + end2end-interest mailing list, April 30, 1990. + ftp://ftp.isi.edu/end2end/end2end-interest-1990.mail. + + [36] Jacobson, V., Braden, R. and D. Borman, "TCP Extensions for High + Performance", RFC 1323, May 1992. + + [37] Johnson, D. and C. Perkins, "Mobility Support in IPv6", Work in + Progress. + + [38] Jonsson, L., et al., "RObust Checksum-based header COmpression + (ROCCO)", Work in Progress. + + [39] Karn, P., et al., "Advice for Internet Subnetwork Designers", + Work in Progress. + + [40] King, S., et al., "The Case for IPv6", Work in Progress. + + [41] J. Kulik, R. Coulter, D. Rockwell, and C. Partridge. Paced TCP + for High Delay-Bandwidth Networks. Proceedings of IEEE Globecom + '99, December 1999. + + [42] Le, K., et al., "Adaptive Header ComprEssion (ACE) for Real-Time + Multimedia", Work in Progress. + + [43] Mathis, M., Mahdavi, J., Floyd, S. and A. Romanow, "TCP + Selective Acknowledgment Options", RFC 2018, October 1996. + + + + + + +Mitzel Informational [Page 38] + +RFC 3002 IAB Wireless Workshop December 2000 + + + [44] Mockapetris, P., "Domain Names -- Concepts and Facilities", STD + 13, RFC 1034, November 1987. + + [45] Mockapetris, P., "Domain Names -- Implementation and + Specification", STD 13, RFC 1035, November 1987. + + [46] Nichols, K., Blake, S., Baker, F. and D. Black, "Definition of + the Differentiated Services Field (DS Field) in the IPv4 and + IPv6 Headers", RFC 2474, December 1998. + + [47] Partridge, C., Mendez, T. and W. Milliken, "Host Anycasting + Service", RFC 1546, November 1993. + + [48] Perkins, C., "IP Mobility Support", RFC 2002, October 1996. + + [49] Perkins, C. and P. Calhoun, "AAA Registration Keys for Mobile + IP", Work in Progress. + + [50] Perkins, C. and D. Johnson, "Route Optimization in Mobile IP", + Work in Progress. + + [51] Postel, J., "User Datagram Protocol", STD 6, RFC 768, August + 1980. + + [52] Postel, J., "Internet Protocol", STD 5, RFC 791, September 1981. + + [53] Ramakrishnan, K. and S. Floyd, "A Proposal to add Explicit + Congestion Notification (ECN) to IP", RFC 2481, January 1999. + + [54] Rekhter, Y. and T. Li, "A Border Gateway Protocol 4 (BGP-4)", + RFC 1771, March 1995. + + [55] Rekhter, Y., Moskowitz, B., Karrenberg, D., de Groot, G. and E. + Lear, "Address Allocation for Private Internets", BCP 5, RFC + 1918, February 1996. + + [56] Rigney, C., Rubens, A., Simpson, W. and S. Willens, "Remote + Authentication Dial In User Service (RADIUS)", RFC 2138, April + 1997. + + [57] Schulzrinne, H., Casner, S., Fredrick, R. and V. Jacobson, "RTP: + A Transport Protocol for Real-Time Applications", RFC 1889, + January 1996. + + [58] J. Semke, J. Mahdavi, and M. Mathis. Automatic TCP Buffer + Tuning. Proceedings of ACM SIGCOMM '98, September 1998. + + + + + +Mitzel Informational [Page 39] + +RFC 3002 IAB Wireless Workshop December 2000 + + + [59] Srisuresh, P. and M. Holdrege, "IP Network Address Translator + (NAT) Terminology and Considerations", RFC 2663, August 1999. + + [60] Srisuresh, P. and K. Egevang, "Traditional IP Network Address + Translator (Traditional NAT)", Work in Progress. + + [61] Stewart, R., Xie, Q., Morneault, K., Sharp, C., Schwarzbauer, + H., Taylor, T., Rytina, I., Kalla, M., Zhang, L. and V. Paxson, + "Stream Control Transmission Protocol", RFC 2960, October 2000. + + [62] Thomson, S. and T. Narten, "IPv6 Stateless Address + Autoconfiguration", RFC 2462, December 1998. + + [63] Touch, J., "TCP Control Block Interdependence", RFC 2140, April + 1997. + + [64] Vollbrecht, J., et al., "AAA Authorization Framework", Work in + Progress. + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Mitzel Informational [Page 40] + +RFC 3002 IAB Wireless Workshop December 2000 + + +A Participants + + Juha Ala-Laurila JUHA.ALA-LAURILA@nokia.com + Mark Allman mallman@grc.nasa.gov + Alastair Angwin angwin@uk.ibm.com + N. Asokan n.asokan@nokia.com + Victor Bahl bahl@microsoft.com + Fred Baker fred@cisco.com + Pravin Bhagwat pravinb@us.ibm.com + Scott Bradner sob@harvard.edu + Randy Bush randy@psg.com + Pat Calhoun Pcalhoun@eng.sun.com + Brian Carpenter brian@icair.org + Mikael Degermark micke@cs.arizona.edu + Sally Floyd floyd@aciri.org + Heikki Hammainen HEIKKI.HAMMAINEN@NOKIA.COM + Mark Handley mjh@aciri.org + Bob Hinden hinden@iprg.nokia.com + Christian Huitema huitema@microsoft.com + Chih-Lin I ci@att.com + Van Jacobson van@packetdesign.com + Phil Karn Karn@qualcomm.com + John Klensin Klensin@JCK.com + Jerry Lahti jerry.lahti@nokia.com + Allison Mankin mankin@isi.edu + Danny J. Mitzel mitzel@iprg.nokia.com + Gabriel Montenegro gab@sun.com + Keith Moore moore@cs.utk.edu + Eric Nordmark nordmark@sun.com + Charles E. Perkins charliep@iprg.nokia.com + Jonne Soininen jonna.Soininen@nokia.com + Chris A. Wargo cwargo@cnsw.com + Lars Westberg Lars.Westberg@era.ericsson.se + Lixia Zhang lixia@cs.ucla.edu + +B Author's Address + + Danny J. Mitzel + Nokia + 313 Fairchild Drive + Mountain View, CA 94043 + USA + + Phone: +1 650 625 2037 + EMail: mitzel@iprg.nokia.com + + + + + + +Mitzel Informational [Page 41] + +RFC 3002 IAB Wireless Workshop December 2000 + + +Full Copyright Statement + + Copyright (C) The Internet Society (2000). All Rights Reserved. + + This document and translations of it may be copied and furnished to + others, and derivative works that comment on or otherwise explain it + or assist in its implementation may be prepared, copied, published + and distributed, in whole or in part, without restriction of any + kind, provided that the above copyright notice and this paragraph are + included on all such copies and derivative works. However, this + document itself may not be modified in any way, such as by removing + the copyright notice or references to the Internet Society or other + Internet organizations, except as needed for the purpose of + developing Internet standards in which case the procedures for + copyrights defined in the Internet Standards process must be + followed, or as required to translate it into languages other than + English. + + The limited permissions granted above are perpetual and will not be + revoked by the Internet Society or its successors or assigns. + + This document and the information contained herein is provided on an + "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING + TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING + BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION + HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF + MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. + +Acknowledgement + + Funding for the RFC Editor function is currently provided by the + Internet Society. + + + + + + + + + + + + + + + + + + + +Mitzel Informational [Page 42] + |