1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
1086
1087
1088
1089
1090
1091
1092
1093
1094
1095
1096
1097
1098
1099
1100
1101
1102
1103
1104
1105
1106
1107
1108
1109
1110
1111
1112
1113
1114
1115
1116
1117
1118
1119
1120
1121
1122
1123
1124
1125
1126
1127
1128
1129
1130
1131
1132
1133
1134
1135
1136
1137
1138
1139
1140
1141
1142
1143
1144
1145
1146
1147
1148
1149
1150
1151
1152
1153
1154
1155
1156
1157
1158
1159
1160
1161
1162
1163
1164
1165
1166
1167
1168
1169
1170
1171
1172
1173
1174
1175
1176
1177
1178
1179
1180
1181
1182
1183
1184
1185
1186
1187
1188
1189
1190
1191
1192
1193
1194
1195
1196
1197
1198
1199
1200
1201
1202
1203
1204
1205
1206
1207
1208
1209
1210
1211
1212
1213
1214
1215
1216
1217
1218
1219
1220
1221
1222
1223
1224
1225
1226
1227
1228
1229
1230
1231
1232
1233
1234
1235
1236
1237
1238
1239
1240
1241
1242
1243
1244
1245
1246
1247
1248
1249
1250
1251
1252
1253
1254
1255
1256
1257
1258
1259
1260
1261
1262
1263
1264
1265
1266
1267
1268
1269
1270
1271
1272
1273
1274
1275
1276
1277
1278
1279
1280
1281
1282
1283
1284
1285
1286
1287
1288
1289
1290
1291
1292
1293
1294
1295
1296
1297
1298
1299
1300
1301
1302
1303
1304
1305
1306
1307
1308
1309
1310
1311
1312
1313
1314
1315
1316
1317
1318
1319
1320
1321
1322
1323
1324
1325
1326
1327
1328
1329
1330
1331
1332
1333
1334
1335
1336
1337
1338
1339
1340
1341
1342
1343
1344
1345
1346
1347
1348
1349
1350
1351
1352
1353
1354
1355
1356
1357
1358
1359
1360
1361
1362
1363
1364
1365
1366
1367
1368
1369
1370
1371
1372
1373
1374
1375
1376
1377
1378
1379
1380
1381
1382
1383
1384
1385
1386
1387
1388
1389
1390
1391
1392
1393
1394
1395
1396
1397
1398
1399
1400
1401
1402
1403
1404
1405
1406
1407
1408
1409
1410
1411
1412
1413
1414
1415
1416
1417
1418
1419
1420
1421
1422
1423
1424
1425
1426
1427
1428
1429
1430
1431
1432
1433
1434
1435
1436
1437
1438
1439
1440
1441
1442
1443
1444
1445
1446
1447
1448
1449
1450
1451
1452
1453
1454
1455
1456
1457
1458
1459
1460
1461
1462
1463
1464
1465
1466
1467
1468
1469
1470
1471
1472
1473
1474
1475
1476
1477
1478
1479
1480
1481
1482
1483
1484
1485
1486
1487
1488
1489
1490
1491
1492
1493
1494
1495
1496
1497
1498
1499
1500
1501
1502
1503
1504
1505
1506
1507
1508
1509
1510
1511
1512
1513
1514
1515
1516
1517
1518
1519
1520
1521
1522
1523
1524
1525
1526
1527
1528
1529
1530
1531
1532
1533
1534
1535
1536
1537
1538
1539
1540
1541
1542
1543
1544
1545
1546
1547
1548
1549
1550
1551
1552
1553
1554
1555
1556
1557
1558
1559
1560
1561
1562
1563
1564
1565
1566
1567
1568
1569
1570
1571
1572
1573
1574
1575
1576
1577
1578
1579
1580
1581
1582
1583
1584
1585
1586
1587
1588
1589
1590
1591
1592
1593
1594
1595
1596
1597
1598
1599
1600
1601
1602
1603
1604
1605
1606
1607
1608
1609
1610
1611
1612
1613
1614
1615
1616
1617
1618
1619
1620
1621
1622
1623
1624
1625
1626
1627
1628
1629
1630
1631
1632
1633
1634
1635
1636
1637
1638
1639
1640
1641
1642
1643
1644
1645
1646
1647
1648
1649
1650
1651
1652
1653
1654
1655
1656
1657
1658
1659
1660
1661
1662
1663
1664
1665
1666
1667
1668
1669
1670
1671
1672
1673
1674
1675
1676
1677
1678
1679
1680
1681
1682
1683
1684
1685
1686
1687
1688
1689
1690
1691
1692
1693
1694
1695
1696
1697
1698
1699
1700
1701
1702
1703
1704
1705
1706
1707
1708
1709
1710
1711
1712
1713
1714
1715
1716
1717
1718
1719
1720
1721
1722
1723
1724
1725
1726
1727
1728
1729
1730
1731
1732
1733
1734
1735
1736
1737
1738
1739
1740
1741
1742
1743
1744
1745
1746
1747
1748
1749
1750
1751
1752
1753
1754
1755
1756
1757
1758
1759
1760
1761
1762
1763
1764
1765
1766
1767
1768
1769
1770
1771
1772
1773
1774
1775
1776
1777
1778
1779
1780
1781
1782
1783
1784
1785
1786
1787
1788
1789
1790
1791
1792
1793
1794
1795
1796
1797
1798
1799
1800
1801
1802
1803
1804
1805
1806
1807
1808
1809
1810
1811
1812
1813
1814
1815
1816
1817
1818
1819
1820
1821
1822
1823
1824
1825
1826
1827
1828
1829
1830
1831
1832
1833
1834
1835
1836
1837
1838
1839
1840
1841
1842
1843
1844
1845
1846
1847
1848
1849
1850
1851
1852
1853
1854
1855
1856
1857
1858
1859
1860
1861
1862
1863
1864
1865
1866
1867
1868
1869
1870
1871
1872
1873
1874
1875
1876
1877
1878
1879
1880
1881
1882
1883
1884
1885
1886
1887
1888
1889
1890
1891
1892
1893
1894
1895
1896
1897
1898
1899
1900
1901
1902
1903
1904
1905
1906
1907
1908
1909
1910
1911
1912
1913
1914
1915
1916
1917
1918
1919
1920
1921
1922
1923
1924
1925
1926
1927
1928
1929
1930
1931
1932
1933
1934
1935
1936
1937
1938
1939
1940
1941
1942
1943
1944
1945
1946
1947
1948
1949
1950
1951
1952
1953
1954
1955
1956
1957
1958
1959
1960
1961
1962
1963
1964
1965
1966
1967
1968
1969
1970
1971
1972
1973
1974
1975
1976
1977
1978
1979
1980
1981
1982
1983
1984
1985
1986
1987
1988
1989
1990
1991
1992
1993
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
2025
2026
2027
2028
2029
2030
2031
2032
2033
2034
2035
2036
2037
2038
2039
2040
2041
2042
2043
2044
2045
2046
2047
2048
2049
2050
2051
2052
2053
2054
2055
2056
2057
2058
2059
2060
2061
2062
2063
2064
2065
2066
2067
2068
2069
2070
2071
2072
2073
2074
2075
2076
2077
2078
2079
2080
2081
2082
2083
2084
2085
2086
2087
2088
2089
2090
2091
2092
2093
2094
2095
2096
2097
2098
2099
2100
2101
2102
2103
2104
2105
2106
2107
2108
2109
2110
2111
2112
2113
2114
2115
2116
2117
2118
2119
2120
2121
2122
2123
2124
2125
2126
2127
2128
2129
2130
2131
2132
2133
2134
2135
2136
2137
2138
2139
2140
2141
2142
2143
2144
2145
2146
2147
2148
2149
2150
2151
2152
2153
2154
2155
2156
2157
2158
2159
2160
2161
2162
2163
2164
2165
2166
2167
2168
2169
2170
2171
2172
2173
2174
2175
2176
2177
2178
2179
2180
2181
2182
2183
2184
2185
2186
2187
2188
2189
2190
2191
2192
2193
2194
2195
2196
2197
2198
2199
2200
2201
2202
2203
2204
2205
2206
2207
2208
2209
2210
2211
2212
2213
2214
2215
2216
2217
2218
2219
2220
2221
2222
2223
2224
2225
2226
2227
2228
2229
2230
2231
2232
2233
2234
2235
2236
2237
2238
2239
2240
2241
2242
2243
2244
2245
2246
2247
2248
2249
2250
2251
2252
2253
2254
2255
2256
2257
2258
2259
2260
2261
2262
2263
2264
2265
2266
2267
2268
2269
2270
2271
2272
2273
2274
2275
2276
2277
2278
2279
2280
2281
2282
2283
2284
2285
2286
2287
2288
2289
2290
2291
2292
2293
2294
2295
2296
2297
2298
2299
2300
2301
2302
2303
2304
2305
2306
2307
2308
2309
2310
2311
2312
2313
2314
2315
2316
2317
2318
2319
2320
2321
2322
2323
2324
2325
2326
2327
2328
2329
2330
2331
2332
2333
2334
2335
2336
2337
2338
2339
2340
2341
2342
2343
2344
2345
2346
2347
2348
2349
2350
2351
2352
2353
2354
2355
2356
2357
2358
2359
2360
2361
2362
2363
2364
2365
2366
2367
2368
2369
2370
2371
2372
2373
2374
2375
2376
2377
2378
2379
2380
2381
2382
2383
2384
2385
2386
2387
2388
2389
2390
2391
2392
2393
2394
2395
2396
2397
2398
2399
2400
2401
2402
2403
2404
2405
2406
2407
2408
2409
2410
2411
2412
2413
2414
2415
2416
2417
2418
2419
2420
2421
2422
2423
2424
2425
2426
2427
2428
2429
2430
2431
2432
2433
2434
2435
2436
2437
2438
2439
2440
2441
2442
2443
2444
2445
2446
2447
2448
2449
2450
2451
2452
2453
2454
2455
2456
2457
2458
2459
2460
2461
2462
2463
2464
2465
2466
2467
2468
2469
2470
2471
2472
2473
2474
2475
2476
2477
2478
2479
2480
2481
2482
2483
2484
2485
2486
2487
2488
2489
2490
2491
2492
2493
2494
2495
2496
2497
2498
2499
2500
2501
2502
2503
2504
2505
2506
2507
2508
2509
2510
2511
2512
2513
2514
2515
2516
2517
2518
2519
2520
2521
2522
2523
2524
2525
2526
2527
2528
2529
2530
2531
2532
2533
2534
2535
2536
2537
2538
2539
2540
2541
2542
2543
2544
2545
2546
2547
2548
2549
2550
2551
2552
2553
2554
2555
2556
2557
2558
2559
2560
2561
2562
2563
2564
2565
2566
2567
2568
2569
2570
2571
2572
2573
2574
2575
2576
2577
2578
2579
2580
2581
2582
2583
2584
2585
2586
2587
2588
2589
2590
2591
2592
2593
2594
2595
2596
2597
2598
2599
2600
2601
2602
2603
2604
2605
2606
2607
2608
2609
2610
2611
2612
2613
2614
2615
2616
2617
2618
2619
2620
2621
2622
2623
2624
2625
2626
2627
2628
2629
2630
2631
2632
2633
2634
2635
2636
2637
2638
2639
2640
2641
2642
2643
2644
2645
2646
2647
2648
2649
2650
2651
2652
2653
2654
2655
2656
2657
2658
2659
2660
2661
2662
2663
2664
2665
2666
2667
2668
2669
2670
2671
2672
2673
2674
2675
2676
2677
2678
2679
2680
2681
2682
2683
2684
2685
2686
2687
2688
2689
2690
2691
2692
2693
2694
2695
2696
2697
2698
2699
2700
2701
2702
2703
2704
2705
2706
2707
2708
2709
2710
2711
2712
2713
2714
2715
2716
2717
2718
2719
2720
2721
2722
2723
2724
2725
2726
2727
2728
2729
2730
2731
2732
2733
2734
2735
2736
2737
2738
2739
2740
2741
2742
2743
2744
2745
2746
2747
2748
2749
2750
2751
2752
2753
2754
2755
2756
2757
2758
2759
2760
2761
2762
2763
2764
2765
2766
2767
2768
2769
2770
2771
2772
2773
2774
2775
2776
2777
2778
2779
2780
2781
2782
2783
2784
2785
2786
2787
2788
2789
2790
2791
2792
2793
2794
2795
2796
2797
2798
2799
2800
2801
2802
2803
2804
2805
2806
2807
2808
2809
2810
2811
2812
2813
2814
2815
2816
2817
2818
2819
2820
2821
2822
2823
2824
2825
2826
2827
2828
2829
2830
2831
2832
2833
2834
2835
2836
2837
2838
2839
2840
2841
2842
2843
2844
2845
2846
2847
2848
2849
2850
2851
2852
2853
2854
2855
2856
2857
2858
2859
2860
2861
2862
2863
2864
2865
2866
2867
2868
2869
2870
2871
2872
2873
2874
2875
2876
2877
2878
2879
2880
2881
2882
2883
2884
2885
2886
2887
2888
2889
2890
2891
2892
2893
2894
2895
2896
2897
2898
2899
2900
2901
2902
2903
2904
2905
2906
2907
2908
2909
2910
2911
2912
2913
2914
2915
2916
2917
2918
2919
2920
2921
2922
2923
2924
2925
2926
2927
2928
2929
2930
2931
2932
2933
2934
2935
2936
2937
2938
2939
2940
2941
2942
2943
2944
2945
2946
2947
2948
2949
2950
2951
2952
2953
2954
2955
2956
2957
2958
2959
2960
2961
2962
2963
2964
2965
2966
2967
2968
2969
2970
2971
2972
2973
2974
2975
2976
2977
2978
2979
2980
2981
2982
2983
2984
2985
2986
2987
2988
2989
2990
2991
2992
2993
2994
2995
2996
2997
2998
2999
3000
3001
3002
3003
3004
3005
3006
3007
3008
3009
3010
3011
3012
3013
3014
3015
3016
3017
3018
3019
3020
3021
3022
3023
3024
3025
3026
3027
3028
3029
3030
3031
3032
3033
3034
3035
3036
3037
3038
3039
3040
3041
3042
3043
3044
3045
3046
3047
3048
3049
3050
3051
3052
3053
3054
3055
3056
3057
3058
3059
3060
3061
3062
3063
3064
3065
3066
3067
3068
3069
3070
3071
3072
3073
3074
3075
3076
3077
3078
3079
3080
3081
3082
3083
3084
3085
3086
3087
3088
3089
3090
3091
3092
3093
3094
3095
3096
3097
3098
3099
3100
3101
3102
3103
3104
3105
3106
3107
3108
3109
3110
3111
3112
3113
3114
3115
3116
3117
3118
3119
3120
3121
3122
3123
3124
3125
3126
3127
3128
3129
3130
3131
3132
3133
3134
3135
3136
3137
3138
3139
3140
3141
3142
3143
3144
3145
3146
3147
3148
3149
3150
3151
3152
3153
3154
3155
3156
3157
3158
3159
3160
3161
3162
3163
3164
3165
3166
3167
3168
3169
3170
3171
3172
3173
3174
3175
3176
3177
3178
3179
3180
3181
3182
3183
3184
3185
3186
3187
3188
3189
3190
3191
3192
3193
3194
3195
3196
3197
3198
3199
3200
3201
3202
3203
3204
3205
3206
3207
3208
3209
3210
3211
3212
3213
3214
3215
3216
3217
3218
3219
3220
3221
3222
3223
3224
3225
3226
3227
3228
3229
3230
3231
3232
3233
3234
3235
3236
3237
3238
3239
3240
3241
3242
3243
3244
3245
3246
3247
3248
3249
3250
3251
3252
3253
3254
3255
3256
3257
3258
3259
3260
3261
3262
3263
3264
3265
3266
3267
3268
3269
3270
3271
3272
3273
3274
3275
3276
3277
3278
3279
3280
3281
3282
3283
3284
3285
3286
3287
3288
3289
3290
3291
3292
3293
3294
3295
3296
3297
3298
3299
3300
3301
3302
3303
3304
3305
3306
3307
3308
3309
3310
3311
3312
3313
3314
3315
3316
3317
3318
3319
3320
3321
3322
3323
3324
3325
3326
3327
3328
3329
3330
3331
3332
3333
3334
3335
3336
3337
3338
3339
3340
3341
3342
3343
3344
3345
3346
3347
3348
3349
3350
3351
3352
3353
3354
3355
3356
3357
3358
3359
3360
3361
3362
3363
3364
3365
3366
3367
3368
3369
3370
3371
3372
3373
3374
3375
3376
3377
3378
3379
3380
3381
3382
3383
3384
3385
3386
3387
3388
3389
3390
3391
3392
3393
3394
3395
3396
3397
3398
3399
3400
3401
3402
3403
3404
3405
3406
3407
3408
3409
3410
3411
3412
3413
3414
3415
3416
3417
3418
3419
3420
3421
3422
3423
3424
3425
3426
3427
3428
3429
3430
3431
3432
3433
3434
3435
3436
3437
3438
3439
3440
3441
3442
3443
3444
3445
3446
3447
3448
3449
3450
3451
3452
3453
3454
3455
3456
3457
3458
3459
3460
3461
3462
3463
3464
3465
3466
3467
3468
3469
3470
3471
3472
3473
3474
3475
3476
3477
3478
3479
3480
3481
3482
3483
3484
3485
3486
3487
3488
3489
3490
3491
3492
3493
3494
3495
3496
3497
3498
3499
3500
3501
3502
3503
3504
3505
3506
3507
3508
3509
3510
3511
3512
3513
3514
3515
3516
3517
3518
3519
3520
3521
3522
3523
3524
3525
3526
3527
3528
3529
3530
3531
3532
3533
3534
3535
3536
3537
3538
3539
3540
3541
3542
3543
3544
3545
3546
3547
3548
3549
3550
3551
3552
3553
3554
3555
3556
3557
3558
3559
3560
3561
3562
3563
3564
3565
3566
3567
3568
3569
3570
3571
3572
3573
3574
3575
3576
3577
3578
3579
3580
3581
3582
3583
3584
3585
3586
3587
|
Network Working Group K. El Malki, Ed.
Request for Comments: 4881 Athonet
Category: Experimental June 2007
Low-Latency Handoffs in Mobile IPv4
Status of This Memo
This memo defines an Experimental Protocol for the Internet
community. It does not specify an Internet standard of any kind.
Discussion and suggestions for improvement are requested.
Distribution of this memo is unlimited.
Copyright Notice
Copyright (C) The IETF Trust (2007).
Abstract
Mobile IPv4 describes how a Mobile Node can perform IPv4-layer
handoffs between subnets served by different Foreign Agents. In
certain cases, the latency involved in these handoffs can be above
the threshold required for the support of delay-sensitive or real-
time services. The aim of this document is to present two methods to
achieve low-latency Mobile IPv4 handoffs. In addition, a combination
of these two methods is described. The described techniques allow
greater support for real-time services on a Mobile IPv4 network by
minimizing the period of time when a Mobile Node is unable to send or
receive IPv4 packets due to the delay in the Mobile IPv4 Registration
process.
Table of Contents
1. Introduction ....................................................3
1.1. Terminology ................................................4
1.2. The Techniques .............................................5
1.3. L2 Triggers ................................................7
1.4. Requirements Language ......................................9
2. Requirements ....................................................9
3. The PRE-REGISTRATION Handoff Method ............................10
3.1. Operation .................................................11
3.2. Network-Initiated Handoff .................................13
3.3. Mobile-Initiated Handoff ..................................15
3.4. Obtaining and Proxying nFA Advertisements .................17
3.4.1. Inter-FA Solicitation ..............................17
3.4.2. Tunneled nFA Advertisements ........................18
3.5. Caching Router Advertisements .............................19
El Malki, Ed. Experimental [Page 1]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
3.6. Movement Detection, MN, and FA Considerations .............19
3.7. L2 Address Considerations .................................21
3.8. Applicability of PRE-REGISTRATION Handoff .................21
4. The POST-REGISTRATION Handoff Method ...........................23
4.1. Two-Party Handoff .........................................24
4.2. Three-Party Handoff .......................................28
4.3. Renewal or Termination of Tunneling Service ...............34
4.4. When Will the MN Perform a Mobile IPv4 Registration? ......34
4.5. Handoff Request (HRqst) Message Format ....................36
4.6. Handoff Reply (HRply) Message Format ......................38
4.7. Handoff to Third (HTT) Message Format .....................40
4.8. Applicability of POST-REGISTRATION Handoff Method .........40
5. Combined Handoff Method ........................................41
6. Layer 2 and Layer 3 Handoff Timing Considerations ..............42
7. Reverse Tunneling Support ......................................42
8. Handoff Signaling Failure Recovery .............................43
8.1. PRE-REGISTRATION Signaling Failure Recovery ...............43
8.1.1. Failure of PrRtSol and PrRtAdv .....................43
8.1.2. Failure of Inter-FA Solicitation and
Advertisement ......................................44
8.2. POST-REGISTRATION Signaling Failure Recovery ..............44
8.2.1. HRqst Message Dropped ..............................44
8.2.2. HRply Message Dropped ..............................45
9. Generalized Link Layer and IPv4 Address (LLA) Extension ........46
9.1. 3GPP2 IMSI Link Layer Address and Connection ID
Extension .................................................47
9.2. 3GPP IMSI Link Layer Address Extension ....................48
9.3. Ethernet Link Layer Address Extension .....................49
9.4. IEEE 64-Bit Global Identifier (EUI-64) Address Extension ..50
9.5. Solicited IPv4 Address Extension ..........................51
9.6. Access Point Identifier Extension .........................52
9.7. FA IPv4 Address Extension .................................53
10. IANA Considerations ...........................................53
10.1. New Extension Values .....................................53
10.2. Generalized Link Layer and IP Address Identifier (LLA) ...54
10.3. New Message Type and Code ................................54
11. Security Considerations .......................................55
12. Acknowledgements ..............................................57
13. References ....................................................57
13.1. Normative References .....................................57
13.2. Informative References ...................................58
Appendix A - Gateway Foreign Agents................................59
Appendix B - Low Latency Handoffs for Multiple-Interface MNs.......60
Appendix C - PRE_REGISTRATION Message Summary......................61
El Malki, Ed. Experimental [Page 2]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
1. Introduction
Mobile IPv4 [1] describes how a Mobile Node (MN) can perform IPv4-
layer handoff between subnets served by different Foreign Agents
(FAs). In certain cases, the latency involved in handoff can be
above the threshold required for the support of delay-sensitive or
real-time services. The aim of this document is to present two
techniques to achieve low-latency Mobile IPv4 handoff during movement
between FAs. A further combination of these two techniques is also
described. The presented techniques allow greater support for real-
time services on a Mobile IPv4 network by minimizing the period of
time during which an MN is unable to send or receive IPv4 packets due
to the delay in the Mobile IPv4 Registration process. One or more of
these techniques may be required to achieve fast Mobile IPv4 handoffs
over different wireless technologies (e.g., WLAN, Cellular, WiMAX,
Flash-OFDM, etc.). Each wireless technology has different layer 2
handoff procedures, and the best low-latency technique for each
scenario should be used to optimize the handoff performance. Further
deployment and experimentation are required to determine which
technique is best suited to the wireless technologies in terms of
implementation and performance. Therefore, the authors encourage
further performance measurements and work on low-latency-over-foo
specifications in collaboration with the appropriate wireless
technology fora to describe the applicability to different wireless
layer 2s.
In the rest of this section, terminology used throughout the document
is presented, the handoff techniques are briefly described, and the
use of link-layer information is outlined. In Section 2, a brief
description of requirements is presented. Section 3 describes the
details of the PRE-REGISTRATION handoff technique, and Section 4
describes the details of the POST-REGISTRATION handoff technique. In
Section 5, a combined method using the two handoff techniques
together is presented. Section 6 discusses layer 2 and layer 3
handoff timing considerations. Section 7 discusses reverse tunneling
support, Section 8 describes mechanisms to recover from message
failures, and Section 9 describes protocol extensions required by the
handoff techniques. Sections 10 and 11 discuss IANA and security
considerations. Finally, the three appendices discuss additional
material related to the handoff techniques. Appendix A gives a short
introduction to Regional Registrations [11], which can be used
together with low-latency handoffs. Appendix B discusses low-latency
handoff when an MN has multiple wireless L2 interfaces, in which case
the techniques in this document may not be necessary. Appendix C
provides a summary of the messages used in PRE-REGISTRATION.
El Malki, Ed. Experimental [Page 3]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
1.1. Terminology
This section presents a few terms used throughout the document.
oFA - old Foreign Agent (FA), the FA involved in handling the
care-of address (CoA) of a Mobile Node (MN) prior to a layer 3
(L3) handoff.
nFA - new Foreign Agent, the FA anticipated to be handling an MN's
care-of address after completion of an L3 handoff.
aFA - anchor Foreign Agent, the FA that is currently handling the
network end of the tunnel in POST-REGISTRATION.
L2 handoff - Movement of an MN's point of layer 2 (L2) connection
from one wireless access point to another.
L3 handoff - Movement of an MN between FAs that involves changing
the care-of address at Layer 3 (L3).
L2 trigger - Information from L2 that informs L3 of particular
events before and after L2 handoff. The descriptions of L2
triggers in this document are not specific to any particular
L2, but rather represent generalizations of L2 information
available from a wide variety of L2 protocols.
L2-MT - An L2 trigger that occurs at the MN, informing of movement
to a certain nFA (Mobile Trigger).
L2-ST or source trigger - An L2 trigger that occurs at oFA,
informing the oFA that L2 handoff is about to occur.
L2-TT or target trigger - An L2 trigger that occurs at nFA,
informing the nFA that an MN is about to be handed off to nFA.
L2-LU - An L2 trigger that occurs at the MN or nFA, informing that
the L2 link between MN and nFA is established.
L2-LD - An L2 trigger that occurs at the oFA, informing the oFA
that the L2 link between MN and oFA is lost.
low-latency handoff - L3 handoff in which the period of time
during which the MN is unable to receive packets is minimized.
low-loss handoff - L3 handoff in which the number of packets
dropped or delayed is minimized. Low-loss handoff is often
called smooth handoff.
El Malki, Ed. Experimental [Page 4]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
seamless handoff - L3 handoff that is both low latency and low
loss.
bidirectional edge tunnel (BET) - A bidirectional tunnel
established between two FAs for purposes of temporarily routing
an MN's traffic to/from it on a new subnet without requiring
the MN to change CoA.
ping-pong - Rapid back-and-forth movement between two wireless
access points often due to failure of L2 handoff. Ping-pong
can occur if radio conditions for both the old and new access
points are about equivalent and less than optimal for
establishing a good, low-error L2 connection.
network-initiated handoff - L3 handoff in which oFA or nFA
initiates the handoff.
mobile-initiated handoff - L3 handoff in which the MN initiates
the handoff.
MN or FA identifier - An IPv4 address of an MN or FA, or an L2
identifier that can be resolved to the IPv4 address of an MN or
FA. If the identifier is an L2 identifier, it may be specific
to the L2 technology.
1.2. The Techniques
Mobile IPv4 was originally designed without any assumptions about the
underlying link layers over which it would operate so that it could
have the widest possible applicability. This approach has the
advantage of facilitating a clean separation between L2 and L3 of the
protocol stack, but it has negative consequences for handoff latency.
The strict separation between L2 and L3 results in the following
built-in sources of delay:
- The MN may only communicate with a directly connected FA. This
implies that an MN may only begin the registration process after
an L2 handoff to nFA (new FA) has completed.
- The registration process takes some non-zero time to complete as
the Registration Requests propagate through the network. During
this period of time, the MN is not able to send or receive IPv4
packets.
This document presents techniques for reducing these built-in delay
components of Mobile IPv4. The techniques can be divided into two
general categories, depending on which of the above problems they are
attempting to address:
El Malki, Ed. Experimental [Page 5]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
- Allow the MN to communicate with the nFA while still connected
to the oFA.
- Provide for data delivery to the MN at the nFA even before the
formal registration process has completed.
The first category of techniques allows the MN to "pre-build" its
registration state on the nFA prior to an underlying L2 handoff. The
second category of techniques allows for service to continue
uninterrupted while the handoff is being processed by the network
without requiring the MN's involvement.
Three methods are presented in this document to achieve low-latency
L3 handoff, one for each category described above and one as a
combination of the two:
- PRE-REGISTRATION handoff method,
- POST-REGISTRATION handoff method, and
- combined handoff method.
The PRE-REGISTRATION handoff method allows the MN to be involved in
an anticipated IPv4-layer handoff. The MN is assisted by the network
in performing an L3 handoff before it completes the L2 handoff. The
L3 handoff can be either network-initiated or mobile-initiated.
Accordingly, L2 triggers are used both in the MN and in the FA to
trigger particular L3 handoff events. The PRE-REGISTRATION method
coupled with L2 mobility helps to achieve seamless handoffs between
FAs. The basic Mobile IPv4 concept involving advertisement followed
by registration is supported, and the PRE-REGISTRATION handoff method
relies on Mobile IPv4 security. No new messages are proposed, except
for an extension to the Agent Solicitation message in the mobile-
initiated case.
The POST-REGISTRATION handoff method proposes extensions to the
Mobile IPv4 protocol to allow the oFA (old FA) and nFA (new FA) to
utilize L2 triggers to set up a bidirectional tunnel between oFA and
nFA that allows the MN to continue using its oFA while on nFA's
subnet. This enables a rapid establishment of service at the new
point of attachment, which minimizes the impact on real-time
applications. The MN must eventually perform a formal Mobile IPv4
Registration after L2 communication with the new FA is established,
but this can be delayed as required by the MN or FA. Until the MN
performs registration, the FAs will set up and move bidirectional
tunnels as required to give the MN continued connectivity.
El Malki, Ed. Experimental [Page 6]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
The combined method involves running a PRE-REGISTRATION and a POST-
REGISTRATION handoff in parallel. If the PRE-REGISTRATION handoff
can be performed before the L2 handoff completes, the combined method
resolves to a PRE-REGISTRATION handoff. However, if the PRE-
REGISTRATION handoff does not complete within an access technology
dependent time period, the oFA starts forwarding traffic for the MN
to the nFA as specified in the POST-REGISTRATION handoff method.
This provides for a useful backup mechanism when completion of a
PRE-REGISTRATION handoff cannot always be guaranteed before the L2
handoff completion.
It should be noted that the methods described in this document may be
applied to MNs having a single interface (e.g., Wireless LAN
interface) or multiple interfaces (e.g., one WLAN and one cellular
interface). However, the case of multiply-interfaced MNs needs
special consideration, since the handoff methods described in this
document may not be required in all cases (see Appendix B).
1.3. L2 Triggers
An L2 trigger is a signal of an L2 event. In this document, the L2
events relate to the L2 handoff process. One possible event is early
notice of an upcoming change in the L2 point of attachment of the
mobile node to the access network. Another possible event is the
completion of relocation of the mobile node's L2 point of attachment
to a new L2 access point. This information may come explicitly from
L2 in a solicited or unsolicited manner, or it may be derived from L2
messages. Although the protocols outlined in this document make use
of specific L2 information, Mobile IPv4 should be kept independent of
any specific L2. L2 triggers are an abstraction mechanism for a
technology-specific trigger. Therefore, an L2 trigger that is made
available to the Mobile IPv4 stack is assumed to be generic and
technology independent. The precise format of these triggers is not
covered in this document, but the information required to be
contained in the L2 triggers for low-latency handoffs is specified.
In order to properly abstract from the L2, it is assumed that one of
the three entities -- the MN, oFA, or nFA -- is made aware of the
need for an L2 handoff and that the nFA or MN can optionally also be
made aware that an L2 handoff has completed. A specific L2 will
often dictate when a trigger is received and which entity will
receive it. Certain L2s provide advance triggers on the network
side, while others provide advance triggers on the MN. Also, the
particular timing of the trigger with respect to the actual L2
handoff may differ from technology to technology. For example, some
wireless links may provide such a trigger well in advance of the
actual handoff. In contrast, other L2s may provide little or no
information in anticipation of the L2 handoff.
El Malki, Ed. Experimental [Page 7]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
An L2 trigger may be categorized according to whether it is received
by the MN, oFA, or nFA. Table 1 gives such a categorization along
with information contained in the trigger. The methods presented in
this document operate based on different types of L2 triggers as
shown in Table 1. Once the L2 trigger is received, the handoff
processes described hereafter are initiated. The three triggers,
L2-ST, L2-TT, and L2-MT, are independent of each other and are not
expected to occur together since each will trigger a different type
of handoff behaviour.
+-------------+----------------------+------------------------------+
| L2 Trigger | Mobile | Source |
| | Trigger | Trigger |
| | (L2-MT) | (L2-ST) |
+-------------+----------------------+------------------------------+
| Recipient | MN | oFA |
+-------------+----------------------+--------------+---------------+
| Method | PRE | PRE | POST |
| | mobile-initiated | network- | source |
| | | initiated | trigger |
+-------------+----------------------+--------------+---------------+
| When? | sufficiently before | sufficiently | sufficiently |
| | the L2 handoff | before L2 | before L2 |
| | so that MN can | handoff for | handoff for |
| | solicit PrRtAdv | FA to send | oFA & nFA to |
| | from oFA | PrRtAdv | exchange |
| | | to MN | HRqst/HRply |
+-------------+----------------------+--------------+---------------+
| Parameters | nFA identifier | nFA identifier, MN identifier|
+-------------+----------------------+------------------------------+
Table 1 - L2 Trigger
(continued on next page)
El Malki, Ed. Experimental [Page 8]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
+------------+----------------------+---------------+---------------+
| L2 Trigger | Target | Link-Up | Link-Down |
| | Trigger | (L2-LU) | (L2-LD) |
| | (L2-TT) | | |
|------------+----------------------+---------------+---------------+
| Recipient | nFA | MN or nFA | oFA |
|------------+-----------+----------+---------------+---------------+
| Method | PRE | POST | PRE & POST | POST |
| | network- | target | | |
| | initiated | trigger | | |
|------------+----------------------+---------------+---------------+
| When? | | when radio | when radio |
| | same as | link between | link between |
| | source trigger | MN & nFA is | MN and oFA |
| | | established | is lost |
|------------+----------------------+---------------+---------------+
| Parameters | oFA identifier | @MN: nFA IPv4 | MN identifier |
| | MN identifier | or L2 addr. | |
| | | @nFA: MN IPv4 | |
| | | or L2 addr. | |
+------------+----------------------+---------------+---------------+
Table 1 - L2 Trigger
1.4. Requirements Language
In this document, the key words "MAY", "MUST", "MUST NOT",
"OPTIONAL", "RECOMMENDED", "SHOULD", and "SHOULD NOT" are to be
interpreted as described in [2].
2. Requirements
The following requirements are applicable to low-latency handoff
techniques and are supported by the methods in this document:
- to provide low-latency and low-loss handoff for real-time
services,
- to have no dependence on a wireless L2 technology,
- to support inter- and intra-access technology handoffs, and
- to limit wireless bandwidth usage.
El Malki, Ed. Experimental [Page 9]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
3. The PRE-REGISTRATION Handoff Method
The PRE-REGISTRATION handoff method is based on the normal Mobile
IPv4 handoff procedure specified in [1], according to which:
- an advertisement for an FA is received by an MN,
- the advertisement allows the MN to perform movement detection,
and
- the MN registers with the FA.
The basic messages specified in [1] are extended to carry information
required to achieve fast handoffs. The PRE-REGISTRATION method
allows both the MN and FA to initiate the layer 3 handoff and it can
make use of L2 triggers on either the FA or MN side, depending on
whether network-initiated or mobile-initiated handoff occurs.
PRE-REGISTRATION supports the normal Mobile IPv4 model [1] and
optionally also the Regional Registration model [11]. There can be
advantages in implementing [11] together with low-latency handoff
mechanisms, in particular in cases where the Home Agent (HA) is at a
distance (in terms of delay) from the nFA. The time required for the
handoff procedure to complete can be reduced by using a closer local
HA, called Gateway Foreign Agent (GFA) in [11]. However,
implementation of [11] is not required by PRE-REGISTRATION. PRE-
REGISTRATION also supports movement where a new Authentication,
Authorization, and Accounting (AAA) transaction must occur to
authenticate the MN with a new domain.
El Malki, Ed. Experimental [Page 10]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
3.1. Operation
The PRE-REGISTRATION handoff mechanism is summarized in Figure 1.
+---------+
| HA (GFA)|<---------+
+---------+ | 4. (Reg)RegReq
| 5. (Reg)RegReply
v
+-----+ 1a. PrRtSol +-----+
| | -----------------> | nFA |
| oFA | 1b. PrRtAdv | |
+-----+ <----------------- +-----+
^ | ^
(2a. PrRtSol)| | 2b |
| | PrRtAdv | 3. (Reg)RegReq
| | |
| v --------------------+
+-----+ /
| MN |
+-----+ - - - - - ->
Movement
Figure 1 - PRE-REGISTRATION Handoff Protocol
The following steps provide more detail on the protocol:
1. Message 1a is a Proxy Router (Agent) Solicitation (PrRtSol)
from oFA to nFA. It is a Mobile IP agent solicitation
containing an identifier for the nFA (i.e., IP address or L2
address) in a Generalized Link Layer and IP Address Extension
(see Section 9). When message 1a is received by the nFA
containing nFA's correct identifier in the LLA extension, the
nFA MUST return the Proxy Router Advertisement (Agent
Advertisement) in message 1b. Message 1b is simply nFA's Agent
Advertisement containing the nFA layer 2 address in a
Generalized Link Layer and IP Address (LLA) Extension (see
Section 9.3). Messages 1a and 1b SHOULD occur in advance of
the PRE-REGISTRATION handoff in order not to delay the handoff.
For this to occur, oFA SHOULD solicit and cache advertisements
from neighboring nFAs using messages 1a and 1b, thus decoupling
the timing of this exchange from the rest of the PRE-
REGISTRATION handoff. When the L3 handoff is initiated by a
target L2 trigger at nFA (L2-TT), message 1b equals message 2b
and is sent unsolicited directly to MN (tunneled by nFA to MN
through oFA) instead of being relayed by oFA.
El Malki, Ed. Experimental [Page 11]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
2. Message 2a is a Proxy Router Solicitation (PrRtSol) from MN to
oFA. It is different from a normal Router (Agent) Solicitation
since it is soliciting an advertisement from a router different
from the one receiving this message. It is a Mobile IP Agent
Solicitation containing an identifier for the nFA (i.e., IP
address or L2 address) in a Generalized Link Layer and IP
Address Extension (see Section 9). The presence of message 2a
indicates that the handoff is mobile-initiated and its absence
means that the handoff is network-initiated. In mobile-
initiated handoff, message 2a occurs if there is an L2 trigger
in the MN to solicit for a Proxy Router Advertisement
(PrRtAdv). When message 2a is received by the oFA, it MUST
return the Proxy Router Advertisement (Agent Advertisement) in
message 2b. This is simply nFA's Agent Advertisement
containing the nFA layer 2 address in a Generalized Link Layer
and IP Address (LLA) Extension (see Section 9.3). In network-
initiated source-triggered handoff, the L2 trigger occurs at
oFA, and oFA MUST relay the Agent Advertisement in message 2b
without the need for the MN to solicit. Note that it is also
possible for nFA to advertise directly to the MN in the
network-initiated target-triggered case (see Section 3.2).
3. The MN performs movement detection upon receipt of a solicited
or unsolicited Agent Advertisement and, if required, it sends a
Registration Request (RegReq) message [1] in message 3 to nFA.
When a local Gateway Foreign Agent (GFA) is present, this
message can optionally be a Regional Registration Request
(RegRegReq) [11]. Message 3 is routed through oFA since the MN
is not directly connected to nFA prior to the L2 handoff.
4. Messages 4 and 5 complete the standard Mobile IPv4 Registration
[1] or optionally Regional Registration [11] initiated with
message 3. The Registration Request MUST contain the MN's
layer 2 address in a Generalized Link Layer and IP Address
Extension (see Sections 3.7 and 9). This identifier may be a
plain Ethernet address or an identifier specific to the
wireless technology. If the MN is not already connected to
nFA, the Registration Reply in message 5 MUST be buffered by
the nFA and unicast to the MN on-link as soon as the MN
connects to nFA (i.e., L2-LU trigger at nFA, which can be
implemented by the MN sending an Agent Solicitation or
optionally using special layer 2 techniques, which are outside
the scope of this document). This is necessary since the MN
may have to detach from oFA, due to the wireless L2 connection,
before it receives the reply. The MN's L2 address is obtained
using the extensions in Section 9, as described in Section 3.7.
Figures 2 and 3 illustrate this procedure.
El Malki, Ed. Experimental [Page 12]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
5. If the registration is successful, packets for the MN are
tunneled from the HA (or GFA) to the nFA and then to the MN.
PRE-REGISTRATION is not dependent on [11]. However, if the HA is at
a distance (in terms of delay) from the nFA, the use of a local GFA
may reduce the time required for the handoff procedure to complete.
The time at which the L2 trigger is received by the oFA or MN,
thereby triggering the PRE-REGISTRATION handoff, compared to the time
at which the actual L2 handoff occurs is important for the optimal
performance of the low-latency handoff. That is, in the optimal
case, the L2 trigger will be received and the four messaging steps of
PRE-REGISTRATION described above will be completed (i.e., up to when
the Registration Request is processed by HA or GFA) before the MN
moves. Optimally, the Registration Reply and the first packet
redirected by the HA (or GFA) to nFA will reach the MN at the moment
in which the MN's L2 link to nFA is fully established. The MN would
therefore not suffer any disruption due to the L3 handoff. This
cannot always be guaranteed unless particular implementation
techniques are used. To alleviate a part of this timing problem, the
MN MAY set the S bit [1] in low-latency Registration Requests sent by
the MN. This allows the MN to receive packets at both oFA and nFA
during the short layer 2 handoff time. Other techniques may be
required, such as L2 techniques or buffering, but these are outside
the scope of this document. In addition, further handoff smoothing
considerations may be required to prevent the loss of packets in-
flight between HA (or GFA) and oFA while the MN performs a PRE-
REGISTRATION handoff. These are also outside the scope of this
document.
Figures 2, 3, and 4 contain message timing diagrams for the network-
initiated and mobile-initiated PRE-REGISTRATION handoff procedures.
3.2. Network-Initiated Handoff
As described in Table 1, a PRE-REGISTRATION handoff can be initiated
at oFA by a source trigger or at nFA by a target trigger. Figures 2
and 3 contain message timing diagrams for PRE-REGISTRATION network-
initiated handoff for source and target triggers.
A source-triggered, network-initiated handoff occurs when an L2
trigger is received at the oFA informing it of a certain MN's
upcoming movement from oFA to nFA. The L2 trigger contains
information including the MN's identifier (i.e., the IPv4 address
itself or an identifier that can be resolved to the IPv4 address) and
the nFA's identifier. An identifier may be an IPv4 address or
something specific to the wireless technology (e.g., Base Station or
Access Point Identifier). A target-triggered, network-initiated
El Malki, Ed. Experimental [Page 13]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
handoff occurs when an L2 trigger is received at the nFA informing it
of a certain MN's upcoming movement from oFA. This type of trigger
is also shown in Table 1 and contains information including the MN's
and the oFA's identifier.
MN oFA nFA HA/GFA
| |<~~~~~~ L2-Source | |
| | Trigger | |
|<--------------------| | |
| PrRtAdv | | |
| | | |
|---------------------------------------->| |
| RegReq or | | |
| RegRegReq (routed via oFA) |------------------->|
| | RegReq or RegRegReq|
| | |
| Buffered ~~~~~>|<-------------------|
|---------------------------------------->| (Reg)RegReply |
| Agent Solicitation | |
| (sent when MN connects to nFA) | |
| | |
|<----------------------------------------| |
| (Reg)RegReply | |
| (sent when nFA receives Solicitation or L2-LU) |
Figure 2 - PRE-REGISTRATION Handoff Message Timing Diagram
(Network-Initiated, Source Trigger)
In a source-triggered handoff, when oFA receives the trigger (L2-ST),
it MUST send message 2b, the Proxy Router Advertisement (PrRtAdv), to
the MN. The PrRtAdv is nFA's Agent Advertisement [1] with one of the
link-layer extensions described in Section 9. The use of the
contents of this extension is described in Section 3.7. Messages 1a
and 1b SHOULD be exchanged by oFA and nFA before the L2 trigger is
received (see Section 3.4.1). Message 2a is not used.
El Malki, Ed. Experimental [Page 14]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
MN oFA nFA HA/GFA
| | L2-Target~~~~~~~~>| |
| | Trigger | |
| |...................| |
|<--------------------------------------- | |
| (PrRtAdv) |...................| |
| | Tunneled Agent Advertisement |
| | | |
|---------------------------------------->| |
| RegReq. or | | |
| RegRegReq (routed via oFA) |------------------->|
| | RegReq or RegRegReq|
| | |
| Buffered ~~~~~>|<-------------------|
|---------------------------------------->| (Reg)RegReply |
| Agent Solicitation | |
| (sent when MN connects to nFA) | |
| | |
|<----------------------------------------| |
| (Reg)RegReply | |
| (sent when nFA receives Solicitation or L2-LU) |
Figure 3 - PRE-REGISTRATION Handoff Message Timing Diagram
(Network-Initiated, Target Trigger)
In a target-triggered handoff, when nFA receives the trigger (L2-TT),
it MUST tunnel an Agent Advertisement to the MN through oFA to
initiate the L3 handoff. The inner advertisement is unicast by nFA
to MN, thus nFA treats the target trigger as a Router (Agent)
Solicitation. This advertisement is tunneled to oFA, which functions
as a normal router, decapsulating the advertisement and forwarding it
to the MN. This message MUST be authenticated to prevent attacks
(see Section 3.4.2).
3.3. Mobile-Initiated Handoff
As shown in Table 1, a mobile-initiated handoff occurs when an L2
trigger is received at the MN informing that it will shortly move to
nFA. The L2 trigger contains information such as the nFA's
identifier (i.e., nFA's IPv4 address or an identifier that can be
resolved to the nFA's IPv4 address). As an example, a Wireless LAN
MN may perform a scan to obtain the Base Station Identifier (BSSID)
of the access point that is a potential handoff target (i.e., its
signal is becoming stronger). The message timing diagram is shown in
Figure 4.
El Malki, Ed. Experimental [Page 15]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
MN oFA nFA HA/GFA
|<~~~~~ L2-Trigger | | |
| | | |
|-------------------->| | |
| PrRtSol | | |
| | | |
|<--------------------| | |
| PrRtAdv | | |
| | | |
|---------------------------------------->| |
| RegReq or | | |
| RegRegReq (routed via oFA) |------------------->|
| | RegReq or RegRegReq|
| | |
| Buffered ~~~~~>|<-------------------|
|---------------------------------------->| (Reg)RegReply |
| Agent Solicitation | |
| (sent when MN connects to nFA) | |
| | |
|<----------------------------------------| |
| (Reg)RegReply | |
| (sent when nFA receives Solicitation or L2-LU) |
Figure 4 - PRE-REGISTRATION Handoff Message Timing Diagram
(Mobile-Initiated)
As a consequence of the L2 trigger (L2-MT), the MN MUST send message
1a, the Proxy Router Solicitation (PrRtSol). This message is a
unicast Agent Solicitation to oFA for a Proxy Router Advertisement
(PrRtAdv). This solicitation MUST have a TTL=1 as in [1]. The Proxy
Router Advertisement Solicitation unicast to oFA is an Agent
Solicitation with a special extension. The solicitation MUST have an
extension containing an FA identifier (i.e., IPv4 address or L2
address contained in an LLA extension, see Section 9) because the MN
is soliciting another specific FA's advertisement from the oFA. This
specific FA will be the MN's nFA. The identifier is the IPv4 address
of the nFA or another identifier that can be used by the oFA to
resolve to nFA's IPv4 address. If the identifier is not an IPv4
address, it MAY be specific to the underlying wireless technology,
for example, an access point or Base Station Identifier (e.g., WLAN
BSSID) that can be mapped by oFA to the nFA IPv4 address as described
in Section 3.4.1. The extension containing the identifier is a sub-
type of the Generalized Link Layer Address Extension described in
Section 9.
Two extension sub-types have been defined to contain the nFA's IPv4
address and an access point identifier. They are called the
Solicited Agent IPv4 Address Extension and the Access Point
El Malki, Ed. Experimental [Page 16]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
Identifier Extension, and are described in Sections 9.5 and 9.6.
These two extensions SHOULD NOT be present in the same PrRtSol
message.
When oFA receives the PrRtSol message, it MUST reply to the MN with
the Proxy Router Advertisement (PrRtAdv, message 2b). The PrRtAdv is
simply the Agent Advertisement for the requested nFA, proxied by oFA.
In order to expedite the handoff, the actual nFA advertisement SHOULD
be cached by the oFA following a previous exchange with nFA, shown in
messages 1a and 1b, as specified in Section 3.5. The PrRtAdv message
MUST contain the nFA's L2 address (using the LLA extension in Section
9.3). This is further described in Section 3.7.
3.4. Obtaining and Proxying nFA Advertisements
Since L2 triggers are involved in initiating PRE-REGISTRATION
handoff, the trigger timing SHOULD be arranged such that a full L3
PRE-REGISTRATION handoff can complete before the L2 handoff process
completes. That is, the L2 handoff should be completed after the
MN's registration with the nFA is performed (message 3 in Figure 1).
The registration MAY be transmitted in more than one copy (default
recommendation: 2) to reduce the probability that it is lost due to
errors on the wireless link. This would not apply to reliable
wireless links where retransmissions are performed at layer 2 in case
of error to guarantee packet delivery.
A PRE-REGISTRATION handoff in this case requires the MN to receive an
Agent Advertisement from the nFA through the old wireless access
point. How to achieve this is discussed in the following
subsections. Messages exchanged between FAs MUST be authenticated to
prevent impersonation attacks. The minimal requirement is that all
FAs involved in low-latency handoffs MUST support manual pre-
configuration of security associations with other neighboring FAs,
involving shared keys and the default algorithms of [1] (see the
Security Considerations of this document).
3.4.1. Inter-FA Solicitation
This applies to the network-initiated source-triggered (L2-ST) and
mobile-initiated (L2-MT) cases only. Inter-FA solicitation assumes
that oFA has access to the IPv4 address of the nFA. The IPv4 address
of nFA is obtained by means of an L2 trigger at oFA in the network-
initiated case (see Section 3.2) or by means of the extension to the
Proxy Router Solicitation (PrRtSol) from the MN in the mobile-
initiated case (see Section 3.3). This extension to the PrRtSol may
contain an IPv4 address or another identifier, for example, an
identifier of a Wireless Base Station such as the WLAN BSSID. In the
latter case, the oFA must implement a mechanism to resolve the Base
El Malki, Ed. Experimental [Page 17]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
Station Identifier to an IPv4 address. The default mechanism is to
use a configured table of neighboring Base Station Identifiers (e.g.,
BSSID) to FA IPv4 address mappings in each FA. Other automated
discovery mechanisms may also be used.
If oFA does not cache advertisements (see Section 3.5) once it
receives an L2 trigger and obtains the address of the nFA for a
specific MN, it MUST send a unicast Agent Solicitation (PrRtSol) to
nFA. The nFA replies to the oFA by unicasting an Agent Advertisement
with appropriate extensions (PrRtAdv). This method removes the TTL
limitation of [1] for Mobile IPv4 messages (i.e., TTL=1 is not
applicable here). The TTL limitation cannot be applied since oFA and
nFA may be more than one hop away and since it is unnecessary for a
secured unicast message. The ICMP solicitations and advertisements
MUST be authenticated and integrity protected. These messages MUST
be protected using Encapsulating Security Payload (ESP) [10] to
prevent attacks (see the Security Considerations section of this
document). An FA MUST NOT accept ICMP solicitations or
advertisements from sources that are not authenticated.
As a practical matter, oFA SHOULD pre-solicit and cache
advertisements from known neighboring FAs (see section 3.5) to avoid
performing the solicitation during an actual handoff procedure.
3.4.2. Tunneled nFA Advertisements
This applies to the network-initiated target-triggered (L2-TT) case
only. Following a target trigger (L2-TT) the nFA MUST send a
tunneled Agent Advertisement to the MN through oFA. Tunneling nFA
advertisements assumes that the nFA is aware of the IPv4 address for
oFA and the MN. These IPv4 addresses are obtained by means of the FA
and MN identifiers contained in an L2 trigger received at nFA in the
network-initiated case (see Section 3.2). However, in [1] the TTL
must be 1 on Agent Advertisements from the nFA. Therefore, tunneling
advertisements is applicable if the TTL limitation of [1] is relaxed.
For this purpose, a pre-established security association between oFA
and nFA MUST be in place to authenticate this message and relax the
TTL limitation. If the implementation requires this, a tunnel SHOULD
be configured when the inter-FA security association is established.
The tunneled ICMP advertisement MUST be secured using tunnel mode ESP
[10] between nFA and oFA. An FA MUST NOT accept tunneled ICMP
packets destined to it from sources that are not authenticated.
El Malki, Ed. Experimental [Page 18]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
3.5. Caching Router Advertisements
In the mobile-initiated (L2-MT) case and the network-initiated
source-triggered (L2-ST) case, the message exchange 1 in Figure 1
could impose an additional latency on the L3 handoff process if done
as part of the handoff procedure. In order to remove this source of
latency, the inter-FA Router (Agent) Solicitation and Advertisement
exchange SHOULD be performed in advance of handoff. A process SHOULD
be in place at the oFA to solicit its neighboring nFAs at a
predefined time interval (MIN_SOLICITATION_INTERVAL). This interval
SHOULD NOT be set too small to avoid unnecessary consumption of
network bandwidth and nFA processing resources. The minimum value of
MIN_SOLICITATION_INTERVAL is 1 second. If the FA Challenge/Response
mechanism in [7] is used, then the MIN_SOLICITATION_INTERVAL MUST be
set to a value smaller then the window of time in which a challenge
remains valid so that the nFA challenge does not expire before the MN
issues the Registration Request. Therefore, the recommended default
value for the MIN_SOLICITATION_INTERVAL in oFA is (0.5 * nFA's
CHALLENGE_WINDOW * nFA's Agent Advertisement interval). The
CHALLENGE_WINDOW and Agent Advertisement interval are defined in [7]
and [1] respectively. The minimum requirement is that the
MIN_SOLICITATION_INTERVAL MUST be manually configurable, while
possible autoconfiguration mechanisms are outside the scope of this
document. To allow advertisement caching in certain implementations
and in cases where the nFA advertisement interval is very small, it
MAY be necessary for the implementation in nFA to allow different
CHALLENGE_WINDOW and Agent Advertisement interval settings for its
nFA-oFA interface.
The oFA SHOULD cache the most recent advertisement from its
neighboring nFAs. This advertisement MUST be sent to the MN in
message 2b with a TTL=1. The oFA SHOULD also have a mechanism in
place to create a list of neighboring nFAs. The minimum requirement
for each FA is that it SHOULD allow manual configuration of a list of
nFA addresses that an MN could possibly perform an L3 handoff to.
The FA addresses in this list will depend on deployment and radio
coverage. It is also possible to specify another protocol to achieve
nFA discovery, but this is outside the scope of this document.
3.6. Movement Detection, MN, and FA Considerations
When the MN receives an Agent Advertisement with a Mobility Agent
extension, it performs actions according to the following movement
detection mechanism: the MN SHOULD be "Eager" to perform new
bindings. This means that the MN SHOULD perform registrations with
any new FA from which it receives an advertisement (i.e., MN is
Eager), as long as there are no locally-defined policies in the MN
that discourage the use of the discovered FA. For example, the MN
El Malki, Ed. Experimental [Page 19]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
could have a policy based on the cost of service. The method by
which the MN determines whether the FA is a new FA is described in
[1] and MAY use an FA-NAI extension [11]. By being "Eager" to
perform registrations, the MN reduces latency times.
The MN also needs to change its default router from oFA to nFA. The
MN MUST change its default router to nFA as soon as the PRE-
REGISTRATION procedure has completed (i.e., Registration Reply is
received by MN) as described in [1].
Overall, the MN behaves as described in [1] with the following
changes: the specified movement detection mechanism mentioned above
and the ability to use the L2-MT to initiate an Agent Solicitation
with a special extension (PrRtSol). Also, when the MN receives an
L2-LU trigger (i.e., new interface or link is up), it MUST
immediately send an Agent Solicitation [1] on that interface. An nFA
that receives an Agent Solicitation [1] will use it as an L2-LU
trigger event, and according to [1] it will record the MN's
IPv4/layer 2 addresses (i.e., the Address Resolution Protocol (ARP)
entry). At that point, the nFA starts delivering data to the MN
including the previously buffered Registration Reply. The nFA MAY
also use other L2 mechanisms to detect earlier that the MN has
attached to the new link and to start forwarding data to it. The MN
SHOULD NOT attempt to retransmit a low-latency Registration Request
(i.e., Registration Request containing an LLA extension described in
Section 9.) when it does not receive the Registration Reply.
When moving from a PRE-REGISTRATION network to a normal Mobile IPv4
[1] network, the MN will no longer receive PrRtAdv messages (i.e.,
Agent Advertisements with the LLA extension). If the MN still
receives L2-MTs, it will attempt to send PrRtSol messages. The
normal FA will reply with a normal Agent Advertisement [1]. If the
MN does not receive a PrRtAdv in reply to its PrRtSol, it MAY
retransmit the PrRtSol message once after PRE_SOL_INTERVAL seconds
and then for another PRE_SOL_ATTEMPTS times with exponential backoff
of the transmission interval. If a PrRtAdv is not received within
PRE_SOL_INTERVAL seconds after the last PrRtSol attempt, the MN MUST
stop sending PrRtSol messages until after a registration with a new
FA is performed. The default value for PRE_SOL_ATTEMPTS is 2, and
for PRE_SOL_INTERVAL, it is 1 second. It should be noted that the
performance of the movement detection mechanism mandated in PRE-
REGISTRATION (i.e., eager to register) may have sub-optimal behaviour
in a standard Mobile IPv4 [1] network. Therefore, standard movement
detection mechanisms [1] should be used in plain Mobile IPv4
networks. Instead, when the MN moves from a normal Mobile IPv4 [1]
network to a PRE-REGISTRATION network, the MN starts receiving L2-MT
triggers or PrRtAdv messages. When the MN receives L2-MT triggers or
PrRtAdv messages, it SHOULD follow the PRE-REGISTRATION procedure.
El Malki, Ed. Experimental [Page 20]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
If there is uncertainty as to which mode to choose (e.g., MN receives
messages from both PRE-REGISTRATION and normal FAs), the MN decides
based on its registration status with the current FA. If the MN
already has a valid normal Mobile IPv4 Registration [1] with the
advertising FA, it SHOULD give priority to the PRE-REGISTRATION
procedure. Otherwise it SHOULD give priority to normal Mobile IPv4
[1] Registration procedure. The MN SHOULD NOT attempt to perform
PRE-REGISTRATION and standard Mobile IPv4 [1] Registrations in
parallel.
3.7. L2 Address Considerations
Some special considerations should be taken with respect to the
wireless system on which this handoff method is being implemented.
Consider an Ethernet-like system such as IEEE 802.11, for example.
In PRE-REGISTRATION, the MN is registering with an FA (nFA) that is
not its current first-hop router; therefore, the L2 address of the
Ethernet frame containing the MN's Registration Request reaching the
nFA is not the MN's address. Therefore, the FA MUST NOT use the
Ethernet address of the incoming Registration Request as the MN's L2
address as specified in [1]. This applies to the cases where the
wireless access points are bridges or routers and independently of
whether the FA is implemented in the wireless access points
themselves. In this case, the MN's Registration Request (or Regional
Registration Request) MUST use an L2 address extension to the
registration message. Such an L2 address is either the same L2
address that remains constant as the MN moves, or it is the MN's L2
address at nFA. To communicate its L2 address, the MN includes a
Generalized Link Layer and IP Address Extension (see Section 9) with
its Registration Request (or Regional Registration Request) message.
If this extension is present, the FA MUST use the L2 address
contained in the extension to communicate with the MN. If a
particular wireless L2 technology has defined a special interface to
the wireless network that allows the FA to resolve the mapping
between an MN's IPv4 address and its L2 address without the need to
use the extension, the L2 address extension contents may be
discarded. For the same reasons above, the MN MUST NOT use the
source L2 address of the Agent Advertisement message (PrRtAdv) as its
default router's L2 address. Therefore, the nFA MUST include a
Generalized Link Layer and IP Address Extension (see Section 9.3)
with its Agent Advertisement (PrRtAdv) messages.
3.8. Applicability of PRE-REGISTRATION Handoff
The PRE-REGISTRATION handoff method is applicable to scenarios where
a period of service disruption due to layer 3 is not acceptable, for
example, when performing real-time communications, and therefore
where an anticipation of the layer 3 handoff is required. Security
El Malki, Ed. Experimental [Page 21]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
for the PRE-REGISTRATION handoff method is based on the same security
model as [1] including the use of AAA. A prerequisite for PRE-
REGISTRATION is that the FA or MN is able to obtain an L2 trigger
informing it of a pending L2 handoff procedure. The target of the L2
handoff is another access point or radio network that is in the
coverage area of a new FA. The L2 trigger information may be in the
form of identifiers that need to be resolved to IPv4 addresses using
methods that may be specific to the wireless network and are not
considered here. If, for example, the oFA or MN determines that the
IPv4 address of the new FA matches oFA's address, then the PRE-
REGISTRATION handoff SHOULD NOT be initiated.
The L2 trigger must allow enough time for the PRE-REGISTRATION
handoff procedure to be performed. In many wireless L2 technologies,
the L2 handoff procedure involves a number of message exchanges
before the effective L2 handoff is performed. For such technologies,
PRE-REGISTRATION handoff can be initiated at the beginning of the L2
handoff procedure and completed before the L2 handoff is completed.
It is efficient to engineer the network such that this succession of
events is ensured.
The PRE-REGISTRATION handoff method is applicable in the following
cases:
- when the MN has locally defined policies that determine a
preference for one access over another, for example, due to
service cost within the same or different technology, and
therefore where it is necessary to allow the MN to select the
appropriate FA with which to connect.
- when L2 security between the MN and the FA is either not present
or cannot be relied upon to provide adequate security.
- when the trigger to initiate the handoff is received at the MN.
In the first case, it is necessary to involve eventual local MN
policies in the movement detection procedure as described in Section
3.6.
El Malki, Ed. Experimental [Page 22]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
4. The POST-REGISTRATION Handoff Method
The POST-REGISTRATION handoff method uses bidirectional edge tunnels
(BETs) or unidirectional tunnels to perform low-latency change in the
L2 point of attachment for the MN without requiring any involvement
by the MN. Figure 5 illustrates the basic POST-REGISTRATION handoff.
+------+
| CN |
+------+
|
...
|
+------+ BET +------+
| aFA |==========| nFA |
+------+ +------+
| wireless link
|
movement +------+
---------> | MN |
+------+
Figure 5 - POST-REGISTRATION Concept
Following a successful Mobile IPv4 Registration between MN and oFA,
the oFA becomes the mobility anchor point for the MN, called the
anchor FA (aFA). When the MN moves from oFA to nFA, rather than
performing signaling over the wireless link to register with the nFA,
the MN can defer the L3 handoff and continue to use its aFA (i.e.,
oFA in this case). If the MN moves to a third FA before registering
with the nFA, in certain cases described later, the third FA signals
aFA to move the wireless link end of the BET from nFA to it. The
network end of the BET remains anchored at aFA until the MN performs
the Mobile IPv4 Registration.
Messages between oFA/aFA and nFA MUST be authenticated. The minimal
requirement is that all FAs involved in low-latency handoffs MUST
support manual pre-configuration of security associations with other
neighboring FAs, involving shared keys and the default algorithms of
[1]. POST-REGISTRATION FAs MUST implement the inter-FA
authentication extension (FA-FA authentication extension) specified
in [11] and MAY additionally use other security mechanisms.
El Malki, Ed. Experimental [Page 23]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
4.1. Two-Party Handoff
Two-party handoff occurs when the MN moves from oFA to nFA.
Normally, this movement would result in a new Mobile IPv4
Registration at nFA. However, in POST-REGISTRATION, the MN and nFA
MAY delay this but maintain connectivity using the BET (or
alternatively unidirectional tunnel) between oFA and nFA. The
protocol is shown in Figure 6.
1a) L2-ST ~~~~> +------+ 2) HRqst +------+ <~~~ 1b) L2-TT
| oFA |<-------->| nFA |
4a) L2-LD~> +------+ 3) HRply +------+ <~~~ 4b) L2-LU
^ ^
old L2 | | new L2
+-------+ +-----+
| |
| |
V V
+------+ movement
4c) L2-LU ---> | MN | --------->
+------+
Figure 6 - Two-Party Handoff (POST-REGISTRATION)
The following describes the progress of a two-party handoff. The
numbered items refer to steps in Figure 6. The source-triggered
HRqst/HRply message for tunnel creation, the target-triggered
HRqst/HRply message for tunnel creation, and the HRqst/HRply to
extend or terminate a BET (or unidirectional tunnel) are identified
using the suffixes (s), (t), and (r), respectively.
1) Either the oFA or nFA receives an L2 trigger informing it that
a certain MN is about to move from oFA to nFA. The two cases
are:
a) The L2 trigger is a source trigger (L2-ST) at oFA. The
trigger contains the MN's L2 address and an identifier for
the nFA (the IPv4 address itself or an L2 address that can
be resolved to the IPv4 address of the nFA).
b) The L2 trigger is a target trigger (L2-TT) at nFA. The
trigger contains the MN's L2 address and an identifier for
the oFA (the IPv4 address itself or an L2 address that can
be resolved to the IPv4 address of the oFA).
2) The FA receiving the trigger sends a Handoff Request (HRqst) to
the other FA. There are two cases:
El Malki, Ed. Experimental [Page 24]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
a) If oFA is sending the HRqst, the H bit is set and the N bit
is unset, indicating it is an HRqst(s). The HRqst(s)
contains the lifetime of the tunnel the oFA is willing to
support, the MN's IPv4 home address, the MN's HA address,
and an LLA option with the MN's L2 address. If the lifetime
is zero and the T bit is not set, the oFA is not willing to
tunnel any packets for MN. A positive lifetime and a set T
bit indicate that the oFA is willing to tunnel for the
indicated time. Section 4.5 describes the HRqst(s) and
Section 9 describes the LLA option.
b) If nFA is sending the HRqst, the N bit is set and the H bit
is unset, indicating that it is an HRqst(t). If the T bit
is set, nFA has requested a reverse tunnel and the HRqst(t)
contains the lifetime of the tunnel the nFA is requesting.
The HRqst(t) also contains an LLA option with the MN's L2
address. The MN's IPv4 home address and HA address are not
sent, unless they are discovered by some means outside the
scope of this document (for example, as part of the L2-TT).
Section 4.5 describes the HRqst(t).
3) The FA receiving the HRqst sends a Handoff Reply (HRply) to the
other FA. There are two cases:
a) If oFA is sending the HRply, the N bit is set and the H and
R bits are unset, indicating that the reply is in response
to a HRqst(t), i.e., it is an HRply(t). If the T bit is
set, the HRply(t) contains the tunnel lifetime the oFA is
willing to provide; otherwise, the tunnel lifetime is set to
zero indicating that the oFA is not willing to provide
tunnel service. If both HRply(t) and HRqst(t) have the T
bit set and non-zero lifetime, a BET is established. The
HRply(t) also contains the MN's home subnet IPv4 address,
the MN's HA address, and an LLA option containing the MN's
L2 address. Section 4.6 describes the HRply(t).
b) If nFA sends the HRply, the H bit is set and the N and R
bits are unset, indicating that this is a response to
HRqst(s), i.e., it is an HRply(s). If the T bit is set, the
nFA indicates that it requests a reverse tunnel, and the
lifetime field is set with the requested tunnel lifetime.
The T bit can be set in HRply only if the oFA had set the T
bit in the corresponding HRqst or if the nFA is required to
reverse tunnel incoming packets to oFA because ingress
filtering is enabled on its network. This establishes a
BET. The tunnel lifetime requested by the nFA must be less
than or equal to the tunnel lifetime offered by oFA in the
HRqst(s). Section 4.6 describes the HRply(s).
El Malki, Ed. Experimental [Page 25]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
4) The point during the L2 handoff in which the MN is no longer
connected on a given link is signaled by an L2-LD trigger at
oFA and MN. Completion of L2 handoff is signaled by an L2-LU
trigger at nFA and MN. The trigger is handled as follows:
a) When oFA receives the L2-LD trigger, it begins forwarding
MN-bound packets through the forward tunnel to nFA.
b) When the nFA receives the L2-LU trigger, it begins
delivering packets tunneled from oFA to MN and forwards
outbound packets from MN using normal routing mechanisms or
through a reverse tunnel to oFA or HA. The nFA at this
point may not yet be the default router of the MN (see
Section 4.4); therefore, to receive all outbound packets
from the MN the nFA must send a unicast proxy ARP message
(used in [1]) to the MN upon receiving an L2-LU trigger.
This proxy ARP message is an ARP Reply [5] sent by the nFA
on behalf of oFA, therefore supplying the nFA link-layer
address in the Sender Hardware Address field and the oFA
IPv4 address in the Target Protocol Address field.
c) When the MN receives the L2-LU, it MAY initiate the Mobile
IPv4 Registration process by soliciting an Agent
Advertisement as described in [1]. If the registration is
successful, the nFA takes over the role of anchor FA (aFA)
from the oFA. Alternatively, the MN MAY defer the Mobile
IPv4 Registration (see Section 4.4).
5) The oFA becomes an aFA if the MN moves to a third FA before
having performed a Mobile IPv4 Registration with nFA.
6) Should L2 handoff fail in Step 4 (due to L2 reasons) and a
ping-pong situation arise, the oFA may be able to determine
this case through the trigger mechanism (i.e., FA sees
successive L2-ST/L2-TT followed by L2-LD and then L2-LU). The
FA that originated the HRqst can in this case cancel the tunnel
by sending an HRqst(r) to the other FA with lifetime zero. It
will then simply continue delivering packets to MN exactly as
if no handoff had been pending. Section 4.5 describes the
HRqst(r).
If the oFA sets the B bit in HRqst/HRply and the nFA has not
requested a reverse tunnel by setting the T bit, the nFA SHOULD
tunnel outgoing packets from the MN to the HA because the MN has
requested this service from the oFA. The nFA SHOULD offer this
service only if no security between the nFA and the MN's HA is
required, or if there is an existing nFA-HA security association.
El Malki, Ed. Experimental [Page 26]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
The actual timing of BET or unidirectional tunnel placement depends
on the available L2 triggers. The forward tunnel from oFA to nFA is
constructed using one of the tunneling procedures described in [1]
for the HA to FA tunnel with the difference that the ends of the
tunnel are at the oFA and nFA, respectively. The reverse tunnel from
nFA to oFA is constructed as described in [3] with the difference
that the network end of the tunnel is at the oFA instead of the HA.
If both forward and reverse tunnels are established, then a BET has
been established. With optimal L2 trigger information, as described
above, the FAs can set up the BET immediately when the L2 handoff is
initiated, start tunneling MN-bound data when the link to the MN goes
down, and the nFA can use the link-up trigger to start delivering
packets. In the absence of optimal L2 trigger information, the HRply
can act as the trigger to start tunneling MN-bound data, but in this
case, the period of packet delivery disruption to the MN could still
be present and additional measures may be required to provide
uninterrupted service. Particular implementation and deployment
scenarios could require techniques to smooth the handoff by providing
a means to convey packets arriving during the L2 handoff. The exact
techniques are outside the scope of this document.
Figures 7 and 8 show timing diagrams for source trigger (L2-ST) and
target trigger (L2-TT) two-party handoffs, respectively.
MN nFA oFA
| | |
| | HRqst(s) |<~~~ L2-ST
| |<------------------|
| | HRply(s) |
| |------------------>|
| | |
--------------------------------------------<~~~ L2-LD
L2 Handoff
--------------------------------------------<~~~ L2-LU
| | |
|<------------------->| |
| MN's traffic | |
Figure 7 - Two-Party Source Trigger Handoff Timing
El Malki, Ed. Experimental [Page 27]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
MN nFA oFA
| | |
| L2-TT ~~~>| HRqst(t) |
| |------------------>|
| | HRply(t) |
| |<------------------|
| | |
--------------------------------------------<~~~ L2-LD
L2 Handoff
--------------------------------------------<~~~ L2-LU
| | |
|<------------------->| |
| MN's traffic | |
Figure 8 - Two-Party Target Trigger Handoff Timing
Once the tunnel between aFA and the current FA is in place, it is
torn down by one of the following events:
1) The aFA decides to stop tunneling because the lifetime it sent
expires and was not renewed, or the aFA or current FA decide to
terminate tunnel service prematurely for some other reason
(refer to Section 4.3).
2) The MN completes the process by performing a Mobile IPv4
Registration with the current FA. This may be initiated by the
FA that sends an Agent Advertisement or by the MN that solicits
for an Agent Advertisement as in [1].
3) The MN moves to a third FA (see Section 4.2)
4.2. Three-Party Handoff
Three-party handoff is applicable when an MN, which has already
established an aFA and is receiving tunneled packets through its
current FA, moves to a new FA without performing a Mobile IPv4
Registration.
The need for the three-party handoff function depends on the wireless
system in which POST-REGISTRATION is being implemented. For radio L2
protocols in which it is possible for the MN to move so rapidly from
one FA to another such that a probability exists that the Mobile IPv4
Registration with nFA will not complete before the MN moves on, HTT
(Handoff to Third) SHOULD be implemented. Certain wireless systems
and implementations do not allow such fast movement between FAs and
may force the Mobile IPv4 Registration to occur soon after L2
handoff, in which case three-party handoff is not applicable. If
this three-party handoff feature is not implemented, the FA SHOULD
El Malki, Ed. Experimental [Page 28]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
send an Agent Advertisement to the MN after L2 handoff has completed
(L2-LU at nFA) and/or the MN SHOULD solicit an Agent Advertisement
after L2 handoff (L2-LU at MN).
+------+
+--->| aFA |<---+
| +------+ |
4b) HRqst(r) | | 3) HRqst(t)
HRply(r) | | HRply(t)
| |
v 2a) HRqst v
1a) L2-ST ~~~> +------+ HTT +------+ <~~~ 1b) L2-TT
| oFA |<-------->| nFA |
4a) L2-LD ~~~> +------+ 2b) HTT +------+ <~~~ 5a) L2-LU
^ HRply ^
old L2 | | new L2
+-------+ +-----+
| |
| |
V V
+------+ movement
5b) L2-LU ~~~> | MN | --------->
+------+
Figure 9 - Three-Party Handoff
The L3 handoff can be deferred either because of a decision by the
MN/FA (i.e., MN does not send Agent Solicitations and FA does not
send Agent Advertisements), or it may result from rapid movement
between oFA and nFA that does not allow enough time for the
registration to complete. This scenario is shown in Figure 9. In
this case, oFA must inform nFA (i.e., the third FA) to contact aFA
about moving the radio end of the tunnel. This is performed with the
HTT message. The general idea behind the three-party handoff
procedure is that the oFA supplies nFA with the same information it
would have obtained via an L2-TT if handoff had occurred from aFA to
nFA; then, the nFA performs an HRqst(t)/HRply(t) sequence with aFA in
order to move the BET to nFA. When the L2 handoff is complete, oFA
sends an HRqst(r) to aFA to terminate the previous BET.
The following describes the progress of a three-party handoff. The
numbered items refer to steps in Figure 9.
1) Either the oFA or nFA receives an L2 trigger informing it that
a certain MN is about to be moved. The two cases are:
El Malki, Ed. Experimental [Page 29]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
a) The L2 trigger is a source trigger (L2-ST) at oFA. The
trigger contains the MN's L2 address and an identifier for
the nFA (the IPv4 address itself or an L2 address that can
be mapped to the IPv4 address of the nFA).
b) The L2 trigger is a target trigger (L2-TT) at nFA. The
trigger contains the MN's L2 address and an identifier for
the oFA (the IPv4 address itself or an L2 address that can
be resolved to the IPv4 address of the oFA).
2) The oFA and nFA exchange an HTT/HRply or HRqst/HTT pair. HTT
is indicated by setting both the H and N bits in the HRqst or
HRply. The HTT message MUST NOT have any tunnel flag bits set,
because the tunnel is negotiated between the aFA and nFA, not
oFA and nFA. There are two cases:
a) The L2 trigger is an L2-ST. The oFA sends HTT to nFA
containing the MN's home IPv4 address, the MN's HA address,
an LLA containing the aFA's IPv4 address, and an LLA
containing the L2 address of the MN. This is enough
information for nFA to perform a target-triggered handoff
with aFA. The nFA responds with an HRply(s). Section 4.7
describes the HTT.
b) The L2 trigger is an L2-TT. The nFA sends HRqst(t) to oFA,
exactly as if a two-party handoff were occurring. The oFA
responds with HTT containing the same information as in a)
above. This is enough information for nFA to perform a
target-triggered handoff with aFA.
3) Upon receipt of the HTT, the nFA first checks its Visitor Cache
to see whether it is already tunneling for MN. If so, Step 6
is performed. If not, nFA performs a target-triggered handoff
with aFA, exactly as in Section 4.1, exchanging an
HRqst(t)/HRply(t) pair. Because aFA receives no L2 trigger
indicating when L2 handoff starts, it may start tunneling to
nFA upon transmission of the HRply(t).
4) Once the L2 handoff is under way and the MN gets disconnected
at L2, aFA and oFA exchange messages canceling tunnel service
between aFA and oFA and allowing aFA to start the tunnel with
nFA.
a) The point in the L2 handoff process where the MN gets
disconnected from oFA is signaled at oFA by L2-LD.
El Malki, Ed. Experimental [Page 30]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
b) The oFA exchanges an HRqst(r)/HRply(r) pair having lifetime
zero with aFA. This cancels tunnel service between oFA and
aFA. If aFA has not already established a tunnel to nFA, it
must do so immediately upon receipt of the HRqst(r). The
aFA provides tunneling service exactly as described in
Section 4.1, Step 4a.
5) Completion of L2 handoff is signaled by an L2-LU trigger at nFA
and/or MN. The nFA and MN handle the trigger as follows:
a) The nFA provides packet delivery service to the MN exactly
as described in Section 4.1, Step 4b.
b) The MN either defers or initiates Mobile IPv4 Registration
when it receives the L2-LU, as in Section 4.1.
6) In the special case where nFA and aFA are the same (i.e., the
MN is moving back to the original anchor FA), aFA recognizes
that it is tunneling to oFA when it checks its Visitor Cache in
Step 3. In this case, there is no need for aFA to send the
HRqst(t)/HRply(t) in Step 3. Upon receipt of the L2-LU trigger
on handoff completion, the aFA begins routing packets to MN and
the tunnel to nFA is torn down. The oFA still exchanges the
HRqst(r)/HRply(r) with aFA in Step 4b because oFA cannot know a
priori that aFA and nFA are the same, but they are redundant.
El Malki, Ed. Experimental [Page 31]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
Figures 10 and 11 show timing diagrams for source trigger (L2-ST) and
target trigger (L2-TT) three-party handoff, respectively.
MN nFA oFA aFA
| | L2-ST ~~~> | |
| | | |
| |<-------------| |
| | HTT | |
| |------------->| |
| | HRply(s) | |
| |------------------------------>|
| | HRqst(t) | |
| |<------------------------------|
| | HRply(t) | |
| | | |
----------------------------------<~~~ L2-LD |
|--------------->|
L2 Handoff | HRqst(r) |
| |
|<---------------|
| HRply(r) |
| |
----------------------------------<~~~ L2-LU |
| MN's traffic | | |
|<-------------->| | |
Figure 10 - Three-Party Source Trigger Handoff Timing
El Malki, Ed. Experimental [Page 32]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
MN nFA oFA aFA
| | | |
| |<~~~ L2-TT | |
| |------------->| |
| | HRqst(t) | |
| |<-------------| |
| | HTT | |
| |------------------------------>|
| | HRqst(t) | |
| |<------------------------------|
| | HRply(t) | |
| | | |
----------------------------------<~~~ L2-LD |
|--------------->|
L2 Handoff | HRqst(r) |
| |
|<---------------|
| HRply(r) |
| |
----------------------------------<~~~ L2-LU |
| MN's traffic | | |
|<-------------->| | |
Figure 11 - Three-Party Target Trigger Handoff Timing
Unlike two-party handoff, the timing of BET establishment between aFA
and nFA cannot fully depend on the availability of L2 trigger
information because aFA does not receive an L2 trigger signaling L2
handoff. The two timing extremes at which aFA can place the BET with
nFA are:
1) At the earliest, aFA MAY start tunneling packets using the BET
to nFA after sending the HRply(t) to nFA in response to the
request for target-triggered handoff.
2) At the latest, aFA MAY start tunneling packets using the BET to
nFA and tear down the BET with oFA when receiving the HRqst(r)
from oFA indicating that the MN has disconnected.
In addition, aFA MAY continue tunneling to oFA if 1) is selected,
until the HRqst(r) is received. In this case, the result may be
duplicated packets at the MN because the MN will receive packets
through oFA on the old L2 until it disconnects (L2-LD). If 2) is
selected, the additional latency will add to the MN's L3 service
disruption period. Of course, aFA can choose to place the BET
sometime between 1) and 2) if reliable bounds are available on the
duration of time between L2-ST/L2-TT and the MN's disconnection (L2-
LD). The exact selection of when to establish the BET is likely to
El Malki, Ed. Experimental [Page 33]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
be influenced by network engineering and implementation
considerations, including whether a handoff smoothing solution is
used, and is beyond the scope of this specification.
4.3. Renewal or Termination of Tunneling Service
To prevent a BET from expiring when its lifetime runs out, the MN's
current FA signals the aFA to either renew or terminate the BET.
This may be the case when the MN defers Mobile IPv4 Registration. If
no such signal is received, the aFA will terminate the BET when the
lifetime expires. In addition, the current FA or aFA may need to
terminate the BET prior to the lifetime expiring. In order to avoid
error conditions in which tunnels do not expire even though the MN to
which they apply is no longer reachable, FAs SHOULD set the tunnel
lifetime field to some value other that 0xffff, which indicates "good
until canceled".
Figure 12 illustrates the message exchange that occurs between the FA
needing to terminate or extend the tunnel (designated FA(1) in the
figure) and the other FA (designated FA(2) in the figure). The
HRqst(r)/HRply(r) is indicated by setting the R bit in the
HRqst/HRply messages. If the HRqst(r) is renewing a BET, then it
contains a non-zero lifetime; otherwise, if the lifetime is set to
zero, it indicates tunnel termination. The aFA has complete control
over whether a tunnel is extended or terminated, and it MAY reply to
a request for extension with a shorter lifetime than was requested.
HRqst(r)
+------+ <-------- +------+
| FA(2)| ---------> | FA(1)|
+------+ HRply(r) +------+
Figure 12 - BET Renewal or Termination
4.4. When Will the MN Perform a Mobile IPv4 Registration?
The MN/FA have control over when to perform the Mobile IPv4
Registration. Although the MN/FA may decide to defer Mobile IPv4
Registration for a certain period, three possible events can lead to
the need to terminate tunneling service. If this occurs, the MN MUST
perform the Mobile IPv4 Registration. These events are:
1) The end of life for the BET is pending and a request by the
current FA to aFA for renewal has been denied, or alternatively
the current FA or aFA needs to terminate the BET prematurely.
The FA in this case MUST initiate the Mobile IPv4 Registration
by sending an Agent Advertisement to the MN as in [1].
El Malki, Ed. Experimental [Page 34]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
2) The MN itself decides to perform a Mobile IPv4 Registration and
initiates it by sending an Agent Solicitation as in [1].
3) During a source-triggered handoff, the oFA attempts to perform
BET handoff but nFA is not capable of performing it. The FA in
this case MUST initiate the Mobile IPv4 Registration by sending
the MN an Agent Advertisement as in [1]. Note that this
situation will never arise during target-triggered handoff
because an HRqst(t) will not be sent to oFA by an nFA that
doesn't support POST-REGISTRATION.
Some detailed scenarios relating to case 2) will be described
hereafter. According to [1], when using an FA care-of address, the
MN MAY use the FA as its default router. Otherwise, it MUST choose
its default router from those advertised in the ICMP Router
Advertisement portion of the Agent Advertisement. Here we assume
that the FA router is also the MN's default router. In POST-
REGISTRATION, when a tunnel is established between oFA and nFA and
the MN has moved to nFA, the oFA MUST NOT send Agent Advertisements
to the MN. In this case, it is possible that the MN will not receive
Agent Advertisements for extended periods of time. According to [8],
hosts will remove default router entries if the lifetime of the
Router Advertisement expires and no further advertisements are
received. Note that the ICMP Router Advertisement lifetime is not
related to the Registration Lifetime in the Mobility Agent
Advertisement extension [1]. To avoid this disruption, the MN MUST
solicit the default router (i.e., FA) before the lifetime of its
active default router entry runs out, or alternatively, the FA MUST
advertise as soon as the MN-nFA link is up (L2-LU). This effectively
means that the MN will at most be able to defer Mobile IPv4
Registration for as long as the remaining lifetime of the active
default router, as configured in the ICMP Router Advertisements. The
MN MUST perform a Mobile IPv4 Registration [1] when it receives an
Agent Advertisement following a POST-REGISTRATION handoff.
El Malki, Ed. Experimental [Page 35]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
4.5. Handoff Request (HRqst) Message Format
This is a new Mobile IPv4 message carried on UDP (destination port
434) [1]. The UDP header is followed by the fields below.
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type |H|N|R|M|G|T|B| Reserved |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Lifetime | Reserved |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| MN Home Address |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| HA Address |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
+ Identification +
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Extensions ...
+-+-+-+-+-+-+-+-
Type 16 (Handoff Request)
H Source-triggered handoff request. When set and
the N bit is unset, indicates that the request
was the result of an L2-ST at oFA.
N Target triggered handoff request. When set and
the H bit is unset, indicates that the request
was the result of an L2-TT at nFA.
R Set if the request is an HRqst(r) (i.e., a
request to renew the tunnel, H and N bits must
be unset).
M The FA issuing the HRqst will use Minimal
Encapsulation as defined in [1,5] for the
tunnel.
G The FA issuing the HRqst will use Generic
Routing Encapsulation (GRE) [4] as defined in
[1,5] for the tunnel. Extensions of HRqst
containing GRE type and key Fields are outside
the scope of this document.
El Malki, Ed. Experimental [Page 36]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
T For an HRqst(s), indicates that the oFA is
willing to support both forward and reverse
tunnel service. For an HRqst(t), indicates that
the nFA is requesting reverse tunnel service.
B When sent in an HRqst(s), indicates that the MN
has requested a reverse tunnel to the HA and
that the nFA SHOULD use a reverse tunnel to the
HA if it will not be reverse tunneling to the
oFA.
Lifetime The lifetime of the tunnel in seconds. If this
is an HRqst(t), then the lifetime represents a
request by nFA for a reverse tunnel. If this is
an HRqst(s), then the lifetime represents the
maximum amount of time that oFA is willing to
maintain both forward and reverse tunnels. If
this is an HRqst(r), then the lifetime
represents a request for the amount of time to
renew the tunnel's lifetime. A value of 0 on an
HRqst(s) indicates that the oFA is unwilling to
grant tunnel service. A value of 0 on an
HRqst(t) indicates that the nFA does not require
reverse tunnel service. A value of 0 on an
HRqst(r) indicates that the tunnel should be
terminated. A value of 0xffff indicates
infinity.
MN Home Address For HRqst(s), the home address of the MN.
HA Addr For HRqst(s), the HA address of the mobile node.
Identification As defined in [1].
Extensions The message MUST include an LLA (see Section 9)
containing the MN's L2 address and an L2 address
that can be mapped to an IPv4 address for the
FA. This message MUST contain the FA-FA
Authentication Extension [11] that is used to
secure the HRqst message.
El Malki, Ed. Experimental [Page 37]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
4.6. Handoff Reply (HRply) Message Format
This is a new Mobile IPv4 message carried on UDP (destination port
434) [1]. The UDP header is followed by the fields below.
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type |H|N|R|M|G|T|B| Reserved | Code |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Lifetime | Reserved |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| MN Home Address |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| HA Address |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
+ Identification +
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Extensions ...
+-+-+-+-+-+-+-+-
Type 17 (Handoff Reply)
Code A value indicating the result of the Handoff
Request. Only two codes are currently
supported, 0, indicating success, and 1,
indicating that the handoff cannot be performed.
The remaining values are for future use.
Lifetime The lifetime, in seconds, for which the
bidirectional tunnel for the MN will be
maintained. If this is an HRply(s), then the
lifetime represents a request by nFA, and it can
be any value up to the maximum value sent in the
HRqst(s). Larger values are assumed to default
to oFA's maximum. If this is an HRply(t), then
the lifetime represents the maximum amount of
time that the oFA will grant to the nFA. If
this is an HRply(r), then the lifetime
represents the amount of time by which the
tunnel life will be extended. If the Code field
indicates that handoff failed, the Lifetime
field will be ignored and SHOULD be set to zero.
A value of 0 on an HRply(t) indicates that the
oFA is unwilling to grant service. A value of 0
on an HRply(s) indicates that the nFA does not
El Malki, Ed. Experimental [Page 38]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
require service. A value of 0 on an HRply(r)
indicates that the tunnel lifetime will be
terminated. A value of 0xffff indicates an
infinite lifetime.
H Source-triggered handoff reply. When set and
the N bit is unset, indicates that the reply is
in response to an HRqst(s).
N Target-triggered handoff reply. When set and
the H bit is unset, indicates that the reply is
in response to an HRqst(t).
R Set if the reply is an HRply(r). Neither the H
nor the N bit are set.
M The FA issuing the HRqst will use Minimal
Encapsulation as defined in [1,5] for the
tunnel.
G The FA issuing the HRqst will use GRE [4]
Encapsulation as defined in [1,5] for the
tunnel. When this flag bit is set, the HRply
may require extensions containing the GRE type
and key fields, but they are outside the scope
of this document.
T For an HRply(s), indicates that the nFA is
requesting to reverse tunnel service. For an
HRply(t), indicates that the oFA is willing to
provide both forward and reverse tunnel service.
B When sent in an HRply(t), indicates that the MN
has requested a reverse tunnel to the HA and
that the nFA SHOULD use a reverse tunnel to the
HA if it will not be reverse tunneling to the
oFA. It can be set in HRply(t) only if the T
bit was unset in the corresponding HRqst(t).
MN Home Address For HRply(t), the home IPv4 address of the MN.
HA Addr For HRply(t), the HA IPv4 address of the MN.
Identification As defined in [1].
Extensions This Message MUST contain the FA-FA
Authentication Extension [11] that is used to
secure the HRply message.
El Malki, Ed. Experimental [Page 39]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
4.7. Handoff to Third (HTT) Message Format
The Handoff to Third message has the same format as the Handoff
Request and Handoff Reply messages, except both the H and N bits are
set. If the HTT message is in response to an L2-ST and is sent to
initiate a handoff, then, with the exception of the H and N bits, the
message has the same fields set and includes the same extensions as
an HRqst(s). If the HTT message is sent in response to an HRqst(t),
then, with the exception of the H and N bits, the message has the
same fields set and includes the same extensions as an HRply(t). The
tunnel bits MUST NOT be set in the HTT message because BET
construction is not negotiated between oFA and nFA; it is negotiated
between nFA and aFA in the ensuing HRqst(t)/HRply(t).
In addition, the HTT MUST contain the following extensions in the
specified order:
Solicited IPv4 Address Option: containing aFA's Address
LLA Option: containing the L2 address of the MN.
4.8. Applicability of POST-REGISTRATION Handoff Method
The POST-REGISTRATION handoff approach allows FAs to communicate
directly about a pending handoff, and does not require any IPv4-layer
messages to be sent to or from an MN prior to the L2 handoff event.
Therefore, it eliminates a possible source of handoff latency. This
may be required when the link layer imposes hard deadlines on the
time at which a handoff must occur, such as when an MN is rapidly
moving out of a radio coverage area. Consequently, POST-REGISTRATION
is primarily of interest in handoff between FAs that support the same
radio access technology. Handoff between heterogeneous radio
technologies will, of necessity, require interaction between the MN
and the network, and so is not a domain of applicability for POST-
REGISTRATION.
Because a POST-REGISTRATION handoff is triggered by an unspecified
mechanism that informs the oFA or nFA that an L2 handoff is pending,
the POST-REGISTRATION approach is only applicable to networks where
such a mechanism is available. For example, an L2 may provide
indications of radio signal quality that cause the oFA or nFA to send
the POST-REGISTRATION handoff messages. Any such indications must
also provide each FA involved in the handoff with the identity of the
other, so that messages can be sent to the right place. This may
involve mapping L2 information onto FA IPv4 addresses. Also, the FAs
involved in a handoff must have pre-provisioned security arrangements
so that the POST-REGISTRATION messages can be authenticated. If a
handoff is to be completed as a result of the POST-REGISTRATION
El Malki, Ed. Experimental [Page 40]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
messaging, any L2 handoff indications must also be securely
authenticated so that traffic to the old point of attachment is not
improperly halted.
POST-REGISTRATION handoff is appropriate in the following cases:
- L2 triggers are available on the network to indicate that L2
handoff is pending.
- Pre-provisioned security mechanisms are in place to allow fast
and secure messaging between the FAs and between the MN and an
FA.
- Access point choice by the MN is not a concern or the choice
requires user intervention and therefore is not on the critical
path for handoff.
5. Combined Handoff Method
The combined method uses both PRE-REGISTRATION and POST-REGISTRATION
handoff. If PRE-REGISTRATION does not complete prior to the
expiration of a timer on the nFA, the POST-REGISTRATION mechanism is
used to create the tunnel between oFA and nFA. This protects the MN
from delays caused by errors such as loss of the Mobile IPv4
Registration Reply message involved in PRE-REGISTRATION for the
mobile-initiated and network-initiated source-triggered cases. It
also protects the MN from delays caused by errors or the loss of any
of the Mobile IPv4 messages involved in PRE-REGISTRATION for the
network-initiated target-triggered case.
When the nFA receives a target trigger, it will follow the PRE-
REGISTRATION procedure. When the combined method is used, the nFA
MUST also start a timer when it receives a target trigger. The timer
should be set to a small value (default for target trigger case: 1
second).
According to PRE-REGISTRATION, the nFA will receive the Registration
Request from the MN. When the combined method is used, this
Registration Request sent by the MN MUST contain the IPv4 address of
the oFA in an FA IPv4 address LLA extension (see Section 9.7). This
same Registration Request message will contain multiple LLA
extensions, since it will also contain the MN's layer 2 address in an
LLA extension as described for PRE-REGISTRATION (see Sections 3.7 and
9). When the nFA has not started the handoff procedure using a
target trigger (i.e., mobile-initiated or network-initiated target-
triggered cases), the nFA MUST start a timer as soon as it receives
the low-latency Registration Request from the MN. This timer should
be set to a small value (default: 1 second).
El Malki, Ed. Experimental [Page 41]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
In all cases, the timer MUST be reset when the Registration Reply
message is received by nFA. If the timer expires before the
Registration Reply is received, the nFA MUST initiate the POST-
REGISTRATION procedure. The nFA utilizes the oFA IPv4 address
(previously received in the extension to the Registration Request
message) as the destination of the POST-REGISTRATION HRqst message to
create the tunnel between nFA and oFA. The nFA MAY tear down this
tunnel when it receives and forwards a successful Registration Reply
for that MN.
6. Layer 2 and Layer 3 Handoff Timing Considerations
In the optimal cases considered in the PRE-REGISTRATION and POST-
REGISTRATION handoffs, it was assumed that a timely L2 trigger would
be received in such a way that packets could be delivered to the MN
via its nFA immediately upon connection. In this way, the MN does
not suffer disruption due to the L3 handoff. However, such precise
timing of the L2 trigger and handoff mechanism with respect to the
actual L2 handoff event will not be possible in all wireless systems
and may depend on particular implementation techniques. Therefore,
some uncertainty may exist at L3 as to exactly when the L2 connection
between the MN and the nFA becomes fully established and can be used
for L3 traffic. It is possible that in certain implementations
traffic will be re-routed too early or too late with respect to the
moment when the connection between the MN and the nFA becomes fully
established. The techniques that may solve this problem and allow
the MN to receive traffic independently of the timing of the L2
handoff event include buffering and simultaneous bindings (i.e.,
bicasting: setting the S bit [1] in Registration Requests). However,
these are optional and are not mandated.
7. Reverse Tunneling Support
The handoff methods all support reverse tunneling. The MN may
request reverse tunneling [3] by setting the T bit in its
Registration Request. In the case of POST-REGISTRATION, if the MN
had requested reverse tunneling previously at oFA, the handoff
message from oFA (see Section 4) includes the T bit enabled to inform
nFA to establish a BET for the visitor entry. Typically, the T bit
will always be set to ensure that any delays in the MN receiving its
new care-of address do not result in any delay in uplink packet
transmission from the MN, but local policies and particular L2
technologies may allow the reverse tunnel to be turned off.
El Malki, Ed. Experimental [Page 42]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
8. Handoff Signaling Failure Recovery
In general and to a greater extent in wireless networks, packets
carrying handoff signaling may be dropped or lost due to errors on
the link. In this section, we consider mechanisms for recovery from
handoff signaling failures.
8.1. PRE-REGISTRATION Signaling Failure Recovery
Failure of PRE-REGISTRATION signaling breaks down into three cases:
1) Loss of messages PrRtSol and PrRtAdv on the air link.
2) Loss of the solicitation by an FA to obtain another neighboring
FA's Advertisement or loss of the neighboring FA's
advertisement.
3) Failure of the standard Mobile IPv4 Registration.
Of these, case 3) is handled by standard Mobile IPv4 mechanisms
described in [1]. Case 2) is expected to be a rare event because
spontaneous packet drop rates on the fixed network are caused by
congestion or router failure. Since bit error rates on wireless
links are higher than on fixed links, case 1) is more likely to
occur. In the following subsections, cases 1) and 2) are considered.
8.1.1. Failure of PrRtSol and PrRtAdv
PRE-REGISTRATION handoff can fail in network-initiated handoff when
the PrRtAdv sent by oFA in response to the source trigger (L2-ST) or
the advertisement sent by nFA in response to the target trigger (L2-
TT) fails to reach the MN. PRE-REGISTRATION handoff can also fail in
mobile-initiated handoff when either the PrRtSol sent from the MN or
return PrRtAdv sent from the oFA is dropped. To reduce the
probability that PrRtAdv and PrRtSol are lost, the MN and FA MAY
transmit multiple copies of these messages. Should these messages
fail anyway, in both cases the MN connects to the nFA without having
received any prior signaling. In this case, the MN solicits an FA
Advertisement when it connects to nFA at L2 (L2-LU), as described in
Section 3.6, and performs a standard Mobile IPv4 Registration with
the nFA as specified in [1].
El Malki, Ed. Experimental [Page 43]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
8.1.2. Failure of Inter-FA Solicitation and Advertisement
The solicitation from an FA to another neighboring FA may fail or the
corresponding advertisement from the neighboring FA may be lost. To
reduce the probability that these messages are lost, the FAs MAY
transmit multiple copies of these messages. If a failure occurs
anyway, the FA soliciting the Agent Advertisement is unable to send a
PrRtAdv in response to a source trigger or to a mobile-initiated
PrRtSol. In these cases, when the MN does not receive a notification
or confirmation of a PRE-REGISTRATION handoff, the MN MUST perform a
standard Mobile IPv4 Registration as soon as it connects to the nFA
(L2-LU) as described in Section 8.1.1.
8.2. POST-REGISTRATION Signaling Failure Recovery
Failure occurs in POST-REGISTRATION when either the HRqst or HRply
message is dropped. The effects of the failure and the recovery
procedure depend on which message is dropped, and whether the handoff
is source or target triggered. Since all of the POST-REGISTRATION
signaling is going over the fixed network, it can be expected that
spontaneous dropping of packets in the absence of congestion and
router failure should be a relatively rare event. Nevertheless,
failure recovery mechanisms SHOULD be implemented.
8.2.1. HRqst Message Dropped
If the HRqst message is dropped, the effect is the same for both
source- and target-triggered handoffs. In either case, the FA to
which the HRqst was destined will never respond with an HRply
message. If the handoff is source triggered, then the nFA never
learns of the handoff, and the oFA never receives confirmation. If
the handoff is target-triggered, then the oFA never learns of the
handoff, and the nFA never receives confirmation.
The recovery procedure in this case is as follows: the oFA MUST NOT
construct a forward tunnel when the MN moves off-link (L2-LD) if the
handoff is source-triggered, and the nFA MUST NOT construct a reverse
tunnel if the handoff is target triggered. If the nFA was not
informed of the handoff by an HRqst message (corresponding to failure
of source-triggered handoff) or if the handoff was not confirmed by
an HRply message (corresponding to failure of target-triggered
handoff), the nFA MUST unicast an Agent Advertisement to the MN as
soon as its L2 connection is established (L2-LU at nFA).
El Malki, Ed. Experimental [Page 44]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
8.2.2. HRply Message Dropped
If the HRply message is dropped, the FA sending the HRply will assume
that the handoff has been confirmed, but the FA that is expecting to
receive the HRply does not receive confirmation. In this case, the
failure recovery procedure is different for source-triggered and
target-triggered handoffs.
In a target-triggered handoff, the oFA assumes that the handoff is
confirmed because it has sent the HRply, but the nFA has not received
it so it does not have confirmation. The oFA starts tunneling
packets to the nFA when the MN moves from its link (L2-LD). The nFA
MUST send an FA Advertisement to the MN as soon as its L2 link is up
(L2-LU at nFA) and MAY drop the tunneled packets. The nFA SHOULD
send an ICMP Destination Unreachable [9] message to the oFA. When
the oFA receives this message, it will terminate the tunnel and stop
forwarding packets. If reverse tunneling was requested, the nFA MUST
NOT reverse tunnel because it has not received handoff confirmation.
In source-triggered handoff, the nFA assumes that the handoff is
confirmed because it has sent the HRply, but the oFA has not received
it so it does not have confirmation. Without failure recovery, the
MN could move to the nFA without the oFA being able to start the
forward tunnel for the MN's packets, and the MN would not be able to
initiate a Mobile IPv4 Registration because it does not know that the
handoff has failed. In this situation, the oFA MUST send out an
HRqst message to the nFA with lifetime zero as soon as the MN leaves
its link (L2-LD). The oFA SHOULD continue to retransmit the HRqst
message, with exponential backoff for CONFIG-HFAIL seconds or until
it receives an HRply acknowledging the request to cancel the tunnel.
The default value for CONFIG-HFAIL is 10 seconds. When the nFA
receives the HRqst, it MUST immediately send an Agent Advertisement
to the MN, as is the case whenever a tunnel is canceled. In
addition, the oFA MUST also drop any packets received through the
reverse tunnel from the nFA. The oFA SHOULD NOT send the ICMP
Destination Unreachable message to the nFA because the nFA has been
informed by the HRqst message to cancel the tunnel. However, if the
nFA receives an ICMP Destination Unreachable message for the tunnel
prior to receiving the HRqst canceling the tunnel, it MUST send an FA
Advertisement to the MN and cancel the tunnel.
El Malki, Ed. Experimental [Page 45]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
9. Generalized Link Layer and IPv4 Address (LLA) Extension
This section defines the Generalized Link Layer and IPv4 Address
(LLA) Extension, used by any node that needs to communicate link
layer and IPv4 addresses. The format of the extension relies on
sub-types, where each sub-type defines its own sub-structure. This
document defines six sub-types. Future RFCs should allocate their
own sub-type and define their own address formats.
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type | Length | Sub-Type | LLA ...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Type
138 (skippable) [1] - when used in Registration Requests
140 (skippable) [1] - when used in Agent Advertisements
Length
The length of the Link Layer Address + the one-octet Sub-Type
field
Sub-Type
This field contains the Link Layer sub-type identifier
LLA
Contains the Link Layer Address
In this document, seven sub-types are defined:
1 3GPP2 International Mobile Station Identity and
Connection ID [13]
2 3GPP International Mobile Subscriber Identity [15]
3 Ethernet 48-bit MAC address [5]
4 64-bit Global ID, EUI-64 [6]
5 Solicited IPv4 Address
6 Access Point Identifier
7 FA IPv4 Address
The following subsections describe the extensions.
El Malki, Ed. Experimental [Page 46]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
9.1. 3GPP2 IMSI Link Layer Address and Connection ID Extension
The IMSI Link Layer Address Extension contains the International
Mobile Station Identity (IMSI).
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type | Length | Sub-Type | IMSI ...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Type
1 (skippable) [1]
Length
The length of the IMSI field + the one-octet Sub-Type field
Sub-Type
1
IMSI
Contains the IMSI, in the form:
<IMSI>:<Connection Id>
Where the <IMSI> is an ASCII-based representation of the
International Mobile Station Identity, most significant
digit first, ":" is ASCII 0x3a, and the Connection ID is the
ASCII representation of a small, decimal number used for
distinguishing different link-layer connections from the
same mobile device.
El Malki, Ed. Experimental [Page 47]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
9.2. 3GPP IMSI Link Layer Address Extension
The IMSI Link Layer Address Extension contains the International
Mobile Station Identity.
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type | Length | Sub-Type | IMSI ...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Type
2 (skippable) [1]
Length
The length of the IMSI field + the one-octet Sub-Type field
Sub-Type
2
IMSI
Contains the IMSI, a number composed of 15 digits or less,
coded as described in [15].
El Malki, Ed. Experimental [Page 48]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
9.3. Ethernet Link Layer Address Extension
The Ethernet Link Layer Address Extension contains the 48-bit
Ethernet MAC Address, as defined in [5].
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type | Length | Sub-Type | MAC ...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Type
3 (skippable) [1]
Length
7 (includes the Sub-Type field)
Sub-Type
3
MAC
Contains the 48-bit Ethernet MAC Address.
El Malki, Ed. Experimental [Page 49]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
9.4. IEEE 64-Bit Global Identifier (EUI-64) Address Extension
The 64-bit Global Identifier (EUI-64) Address Extension contains the
64-bit address, as defined in [6].
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type | Length | Sub-Type | MAC ...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Type
4 (skippable) [1]
Length
9 (includes the Sub-Type field)
Sub-Type
4
MAC
Contains the 64-bit Global Identifier Address.
El Malki, Ed. Experimental [Page 50]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
9.5. Solicited IPv4 Address Extension
The 32-bit Solicited IPv4 Address Extension contains the IPv4 address
of the agent (FA) being solicited. This extension MAY be present in
an ICMP Agent Solicitation as explained in Section 3.3.
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type | Length | Sub-Type | IPv4 addr ...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Type
5 (skippable) [1]
Length
5 (includes the Sub-Type field)
Sub-Type
5
IPv4 Address
Contains the 32-bit IPv4 Address of the solicited node.
El Malki, Ed. Experimental [Page 51]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
9.6. Access Point Identifier Extension
The 32-bit Access Point Identifier Extension contains an identifier
of the access point to which the MN will move. This may be a
wireless L2 identifier. The MN is able to solicit an advertisement
from the FA servicing a certain access point by using this extension
with Agent Solicitations as explained in Section 3.3.
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type | Length | Sub-Type | AP ID...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Type
6 (skippable) [1]
Length
5 (includes the Sub-Type field)
Sub-Type
6
AP ID
Contains the 32-bit Access Point Identifier.
El Malki, Ed. Experimental [Page 52]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
9.7. FA IPv4 Address Extension
The 32-bit FA IPv4 Address Extension contains the IPv4 address of the
agent (FA). This extension MAY be present in a Registration Request
message to identify the oFA as explained in Section 5.
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type | Length | Sub-Type | IPv4 addr ...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Type
7 (skippable) [1]
Length
5 (includes the Sub-Type field)
Sub-Type
7
IPv4 Address
Contains the 32-bit IPv4 Address of the FA node.
10. IANA Considerations
This document defines one new extension to Mobile IPv4 Control
messages and one new extension to Mobile IPv4 Router Discovery
messages already maintained by IANA. This document also defines a
new Mobile IPv4 Control message type to be used between FAs. To
ensure correct interoperation based on this specification, IANA must
reserve values in the Mobile IPv4 number space for two new extensions
and one new message type. IANA must also manage the numbering spaces
created by the two new extensions, the message type, and its
associated Code field.
10.1. New Extension Values
Section 9 introduces two extensions.
Generalized Link Layer and IPv4 Address (LLA) Extension for Router
Discovery messages: A new Mobile IPv4 extension that follows after
Mobile IPv4 ICMP Router Discovery messages (e.g., Mobile IP Agent
Advertisements). The type value of this extension belongs to the
El Malki, Ed. Experimental [Page 53]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
Mobile IPv4 number space for Router Discovery messages maintained by
IANA. The value assigned by IANA is 140. This new extension uses
the Link Layer and IPv4 Address Identifier (LLA) sub-type numbering
space that requires IANA management (see Section 10.2).
Generalized Link Layer and IPv4 Address (LLA) Extension for Mobile IP
Control messages: A new Mobile IPv4 extension appended to Mobile IP
Control messages (e.g., Registration Request). The type value of
this extension belongs to the Mobile IPv4 number space for extensions
to Mobile IPv4 Control messages maintained by IANA. It MUST be in
the skippable (128-255) range as defined in [1]. The value assigned
is 138 by IANA. This new extension uses the Link Layer and IP
Address Identifier (LLA) sub-type numbering space that requires IANA
management (see Section 10.2).
10.2. Generalized Link Layer and IP Address Identifier (LLA)
Sub-type Values
This section describes the sub-type values that are applicable to
both the Generalized LLA Extensions for Mobile IP Control and Router
Discovery messages. This specification makes use of the sub-type
values 1-7, and all other values other than zero (reserved) are
available for assignment via IETF consensus [14]. The seven sub-type
values defined in this specification are:
1 3GPP2 International Mobile Station Identity and
Connection ID [13]
2 3GPP International Mobile Subscriber Identity [15]
3 Ethernet 48-bit MAC address [5]
4 64-bit Global ID, EUI-64 [6]
5 Solicited IPv4 Address
6 Access Point Identifier
7 FA IPv4 Address
10.3. New Message Type and Code
Sections 4.5 and 4.6 define two new Mobile IPv4 message types:
Handoff Request and Handoff Reply. These require two type numbers to
be assigned by IANA from the Mobile IPv4 Control message type address
space. The Handoff Reply message also introduces its own Code field
that requires IANA to manage a new Code address space. This
specification makes use of the Code values 0-1, where 0 identifies a
successful handoff and 1 defines a generic handoff failure. All
other values are available for assignment via IETF consensus [14].
El Malki, Ed. Experimental [Page 54]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
Code Values for Mobile IP Handoff Reply Messages
0 Successful Handoff
1 Generic Handoff Failure
2-255 Unallocated
11. Security Considerations
For the PRE-REGISTRATION method, as discussed in Section 3.8, the oFA
and nFA MUST share a security association to authenticate and
integrity protect messages transported between them. In addition,
oFA must be authorized to solicit nFA based on the security
association. The minimal requirement to establish a security
association between FAs is that both FAs support manual pre-
configuration of security associations involving shared keys. Other
mechanisms to establish security associations using IKE [16] based on
shared secrets or public keys may also be used. The inter-FA ICMP
messages (solicitations and advertisements) MUST be authenticated and
integrity protected using ESP [10]. The default ESP authentication
algorithm for use in this specification is HMAC-SHA1-96 [12]. The
absence of this security would allow denial-of-service attacks from
malicious nodes at any distance from the FA. To secure Registration
Request and Reply messages, PRE-REGISTRATION uses the security
mechanisms already described in [1] and optionally [11].
POST-REGISTRATION introduces a new change to Mobile IPv4, which is
the possibility that an MN may receive packets from an FA with which
it has not yet performed a Mobile IPv4 Registration. It is not
recommended that the MN drop packets from unknown FAs since it would
effectively eliminate the advantages of POST-REGISTRATION. From a
security viewpoint, dropping packets from unknown FAs would not
provide significant protection for an MN from any attack. This is
because any malicious host may use the MN's home address to send
packets to the MN through its current known FA; therefore, processing
packets received from unknown FAs would not provide worse security
than with normal Mobile IPv4.
In a similar way to PRE-REGISTRATION, in POST-REGISTRATION, oFA and
nFA MUST share a security association required to protect the Handoff
Request and Reply messages. The minimal requirement to establish a
security association between FAs is that the FAs support manual pre-
configuration of security associations involving shared keys. Other
mechanisms to establish security associations using IKE [16] based on
shared secrets or public keys may also be used. The Handoff Request
and Reply messages MUST be authenticated using the FA-FA
authentication extension [11] that uses the default algorithm
specified in [7]. The absence of this security would allow
impersonation attacks and denial-of-service attacks.
El Malki, Ed. Experimental [Page 55]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
The minimal requirement is that all FAs involved in low latency
handoffs MUST support manual pre-configuration of peer-to-peer
security associations with neighboring FAs, involving shared secrets
and are already required to support the default algorithms of [1].
Other mechanisms to establish security associations using IKE [16]
based on shared or public keys may also be used.
Since the techniques outlined in this document depend on particular
L2 information (triggers) to optimize performance, some level of L2
security is assumed. Both PRE- and POST-REGISTRATION techniques
depend on L2 triggers, but the L2 security implications are different
for the two techniques.
In particular, in POST-REGISTRATION, the L2 triggers initiate the
establishment of tunnels that route IPv4 packets for the MN to its
new location. Therefore, the L2 triggers MUST be secured against any
tampering by malicious nodes, either mobile or within the wired
network. The L2 addresses or IPv4 addresses for the MN and the FAs
that appear in the L2 triggers MUST correspond to the actual nodes
that are participating in the handoff. If there is any possibility
that tampering may occur, the recipient of an L2 trigger MUST have
some way of authenticating the L2 information. Wireless networks
that do not provide such features will be subject to impersonation
attacks, where malicious nodes could cause FAs to believe that an MN
has moved to other service areas or to allow a bogus MN to obtain
unauthorized service from an FA prior to performing a Mobile IPv4
Registration. In POST-REGISTRATION, the L2 triggers would typically
be sent between a wireless base station and the FA. No standard
protocol exists at this time to communicate the L2 trigger
information, but it is important that any future protocol used for
this purpose provides adequate security. If the wireless base
station and FA were integrated, then this security threat would not
apply. Also the layer 2 control messages on the wireless link must
be secured appropriately to prevent a malicious node from running
impersonation attacks and causing unwanted L2 triggers to be
generated. Integrity and replay protection would be required to
avoid impersonation threats and resource consumption threats where a
malicious node replays old messages to cause resource consumption.
This depends on the type of L2 security of the wireless link. For
example, in cellular technologies, the control messages are secured,
although the type of security varies depending on the cellular
standard, but this is not typically the case in WLAN IEEE 802.11
networks.
In PRE-REGISTRATION, the security of L2 triggers has different
implications. The PRE-REGISTRATION technique depends on Mobile IPv4
security between MN and FA, so the same security considerations in
[1] apply. Should malicious nodes be able to generate or modify L2
El Malki, Ed. Experimental [Page 56]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
trigger information (i.e., L2-ST or L2-TT), this would cause
advertisements to be sent to the MN. They would consume wireless
resources and processing in the MN, but would not allow an
impersonation attack. In order to prevent such denial-of-service
attacks, there should be a limit on the number of advertisements that
an FA (oFA) will relay to the MN as a result of the reception of L2
triggers. This number will depend on the L2 technology, and the
default limit is 10 per second.
12. Acknowledgements
The authors want to thank Lennart Bang, Bryan Hartwell, Joel
Hortelius, Gianluca Verin, and Jonathan Wood for valuable comments
and suggestions on the whole document. The authors also thank the
Mobile IPv4 WG chairs, Phil Roberts and Basavaraj Patil, for their
input.
13. References
13.1. Normative References
[1] Perkins, C., Ed., "IP Mobility Support for IPv4", RFC 3344,
August 2002.
[2] Bradner, S., "Key words for use in RFCs to Indicate Requirement
Levels", BCP 14, RFC 2119, March 1997.
[3] Montenegro, G., Ed., "Reverse Tunneling for Mobile IP, revised",
RFC 3024, January 2001.
[4] Farinacci, D., Li, T., Hanks, S., Meyer, D., and P. Traina,
"Generic Routing Encapsulation (GRE)", RFC 2784, March 2000.
[5] Plummer, D., "Ethernet Address Resolution Protocol: Or
Converting Network Protocol Addresses to 48.bit Ethernet Address
for Transmission on Ethernet Hardware", STD 37, RFC 826,
November 1982.
[6] IEEE, "Guidelines for 64-bit Global Identifier (EUI-64)
Registration Authority",
http://standards.ieee.org/regauth/oui/tutorials/EUI64.html,
March 1997.
[7] Perkins, C., Calhoun, P., and J. Bharatia, "Mobile IPv4
Challenge/Response Extensions (Revised)", RFC 4721, January
2007.
El Malki, Ed. Experimental [Page 57]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
[8] Deering, S., Ed., "ICMP Router Discovery Messages", RFC 1256,
September 1991.
[9] Postel, J., "Internet Control Message Protocol", STD 5, RFC 792,
September 1981.
[10] Kent, S., "IP Encapsulating Security Payload (ESP)", RFC 4303,
December 2005.
[11] Fogelstroem, E., Jonsson, A., and C. Perkins, "Mobile IPv4
Regional Registration", RFC 4857, June 2007.
[12] Madson, C. and R. Glenn, "The Use of HMAC-SHA-1-96 within ESP
and AH", RFC 2404, November 1998.
13.2. Informative References
[13] TIA/EIA/IS-2000.
[14] Narten, T. and H. Alvestrand, "Guidelines for Writing an IANA
Considerations Section in RFCs", BCP 26, RFC 2434, October 1998.
[15] 3GPP TS 23.003 (www.3gpp.org).
[16] Kaufman, C., Ed., "Internet Key Exchange (IKEv2) Protocol", RFC
4306, December 2005.
El Malki, Ed. Experimental [Page 58]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
Appendix A - Gateway Foreign Agents
The Mobile IPv4 Regional Registration specification [11] introduces
the Gateway Foreign Agent (GFA), as a mobility agent that two FAs
providing service to an MN have in common. Figure A.1 provides an
example of an MN's initial registration through the GFA. If this is
the first registration message, the message MUST be forwarded to the
HA. All packets sent to the MN will be delivered to the GFA, which
in turn will forward the packets to the FA servicing the MN.
RegReq +-----+ RegReq
+----------->| oFA |--------------+
| +-----+ |
| v
+----+ +-----+ RegReq +----+
| MN | | GFA |<------->| HA |
+----+ +-----+ +----+
+-----+
| nFA |
+-----+
Figure A.1 - Initial Registrations through GFA
If the MN moves to an nFA that is serviced by a GFA common with oFA,
the MN MAY issue a Regional Registration Request (see Figure A.2).
The Regional Registration message does not need to be forwarded to
the HA, since the MN's traffic can still be delivered to the same
GFA. This optimized approach effectively reduces the latency
involved in the registration process.
+-----+
| oFA |
+-----+
+----+ +-----+ +----+
| MN | | GFA | | HA |
+----+ +-----+ +----+
| ^
| +-----+ |
+------------>| nFA |-------------+
RegRegReq +-----+ RegRegReq
Figure A.2 - Regional Registration through GFA
Note that the GFA may also be the MN's first-hop router.
El Malki, Ed. Experimental [Page 59]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
Appendix B - Low-Latency Handoffs for Multiple-Interface MNs
For MNs that have two wireless network interfaces, either on the same
wireless network or on wireless networks having different wireless L2
technologies, the techniques discussed in this document may be
unnecessary if the Mobile IPv4 stack on the MN allows switching an
IPv4 address binding between interfaces. This Appendix discusses how
multiple wireless interfaces can aid low-latency handoff.
+------+ +---------+
| HA |--------| (GFA) |
+------+ +---------+
/ \
... ...
/ \
/ \
+------+ +------+
| oFA | | nFA |
+------+ +------+
| |
+------+ +------+
| RN1 | | RN2 |
+------+ +------+
+------+
| MN | --------->
+------+
Movement
Figure B.1 - Network Model for Mobile IPv4 with Multi-Access
Figure B.1 illustrates the normal and hierarchical MIPv4 models. As
shown in the figure, assume that the MN is connected to Radio Network
1 (RN1) and is registered with oFA through which it is receiving
traffic. Suppose MN enters the coverage area of RN2 and nFA and that
it prefers connectivity to this network for reasons beyond the scope
of this document (e.g., user preferences, cost, QoS available, etc.).
The MN activates the interface to RN2 but continues communicating
through RN1. The MN may solicit advertisements from nFA through the
interface connected to RN1 to speed up the handoff process, provided
there is no TTL restriction, or it can solicit advertisements through
the interface connected to RN2 if it has been configured for IPv4
traffic.
Once the MN is registered with nFA and is successfully receiving and
transmitting through the new network, it tears down the interface to
RN1. If the MN has enough time to complete this procedure without
incurring degraded service or disconnection, the MN would experience
a seamless multi-access handoff, but it may not be possible in all
El Malki, Ed. Experimental [Page 60]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
cases, due to network coverage or for other reasons. Should multiple
interface handoff be possible, then the low-latency methods described
in this document are not necessary.
In order to support the possible failure of the connectivity with the
new network (RN2/nFA) in the short period following handoff, the MN
may use the S bit in its Mobile IPv4 Registration Request to maintain
simultaneous bindings with both its existing (HA or GFA) binding with
oFA and a new binding with nFA.
Appendix C - PRE-REGISTRATION Message Summary
This appendix contains a quick reference for IPv4 and layer 2
addresses to be used in PRE-REGISTRATION messages.
Proxy Router Advertisement (PrRtAdv)
This is a standard Router/Agent Advertisement [1] with the following
characteristics:
Source IPv4 Address: nFA IPv4 Address
Source Layer 2 Address: oFA L2 Address
Destination IPv4 Address: MN IPv4 Address (from PrRtSol)
Destination Layer 2 Address: MN L2 Address (from PrRtSol)
LLA Extension (defined in this spec): containing nFA Layer 2
Address.
Proxy Router Solicitation (PrRtSol)
This is a standard Router/Agent Solicitation [1] with the following
characteristics:
Source IPv4 Address: MN Address
Source Layer 2 Address: MN Address
Destination IPv4 Address: oFA Address (from source address of
previous Router Advertisement or PrRtAdv)
Destination Layer 2 Address: oFA Address (from source address of
previous Router Advertisement or PrRtAdv LLA)
LLA Extension (defined in this spec): depends on the layer 2
technology (e.g., typically for WLAN, this would be the BSSID of
the new WLAN Access Point)
Registration Request (as seen on MN-oFA link)
This is a Mobile IPv4 Registration Request message [1] with the
following characteristics:
Source IPv4 Address: MN Address
Source Layer 2 Address: MN Address
Destination IPv4 Address: nFA Address (from source addr of
PrRtAdv)
El Malki, Ed. Experimental [Page 61]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
Destination Layer 2 Address: Default Router (i.e., oFA Address)
LLA Extension (defined in this spec): containing the MN's L2
address that must be used by nFA. This will typically be an
Ethernet MAC address but other types can be used as specified in
Section 9 of this document.
Although this is not mandated, an MN implementation may set the S bit
(see Section 6) in Registration Request messages to improve the
handoff and avoid problems due to failed layer 2 handoffs and layer 2
ping-pong effects between two base stations.
Registration Reply (as seen on oFA-MN link)
This is a Mobile IPv4 Registration Reply message [1] with the
following characteristics:
Source IPv4 Address: nFA Address
Source Layer 2 Address: oFA Address
Destination IPv4 Address: MN Address (from source of Registration
Request)
Destination Layer 2 Address: MN Address (from source of
Registration Request)
El Malki, Ed. Experimental [Page 62]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
Contributing Authors
Pat Calhoun
Cisco Systems
EMail: pcalhoun@cisco.com
Tom Hiller
Lucent Technologies
EMail: tom.hiller@lucent.com
James Kempf
NTT DoCoMo USA Labs
EMail: kempf@docomolabs-usa.com
Peter J. McCann
Motorola Labs
EMail: pete.mccann@motorola.com
Ajoy Singh
Motorola
EMail: asingh1@email.mot.com
Hesham Soliman
Elevate Technologies
EMail: Hesham@elevatemobile.com
Sebastian Thalanany
US Cellular
EMail: Sebastian.thalanany@uscellular.com
Editor's Address
Karim El Malki
Athonet
EMail: karim@athonet.com
El Malki, Ed. Experimental [Page 63]
^L
RFC 4881 Low-Latency Mobile IPv4 Handoffs June 2007
Full Copyright Statement
Copyright (C) The IETF Trust (2007).
This document is subject to the rights, licenses and restrictions
contained in BCP 78, and except as set forth therein, the authors
retain all their rights.
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Intellectual Property
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Acknowledgement
Funding for the RFC Editor function is currently provided by the
Internet Society.
El Malki, Ed. Experimental [Page 64]
^L
|