Thread Links Date Links
Thread Prev Thread Next Thread Index Date Prev Date Next Date Index

[Fwd: Tomorrow's Telecon Details]



Here is the agenda:

-- Final review of  options for IETF Involvement  -- 30 mins
    (21-06-0408-02-0000-IETFInvolvement.ppt) 
--  Preparation for an IETF draft on Higher Layer Information Service  
-- 1 hr 30 mins
    (draft-IS-requirements-00.txt)

Regards,
-Subir

Telecon Details:

Date & Time:  Tuesday, January 10, 2006,  9 - 11 AM

# of Ports:  25

PIN:   1898

Dial-in:  732-336-6000 


Will send out the agenda and relevant documents 
later on.

Regards, 
-Subir 




21-06-0408-02-0000-IETFInvolvment.ppt


     Media independent Information Service (MIIS) and Its Higher
     Layer Transport Requirements   
                 

Status of this Memo

   By submitting this Internet-Draft, each author represents that any applicable 
   patent or other IPR claims of which he or she is aware
   have been or will be disclosed, and any of which he or she becomes
   aware will be disclosed, in accordance with Section 6 of BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt.

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

   This Internet-Draft will expire on xx, 2006.

Copyright Notice

   Copyright (C) The Internet Society (2006).




Abstract

   Media Independent Information Service (MIS) Information Services provides a framework by which a MIH (Media Independent Handover) function both in the mobile node and in the network can discover and obtain network information (both homogeneous and heterogeneous) within a geographical region to facilitate handovers. MIS includes support for various Information Elements (IEs). These IEs provide information that is essential for a handover function to make intelligent handover decision.  The MIH function in a mobile node or network can obtain such network information (e.g.. IEs)  via  both lower as well as  higher layers.  

   This document is an effort to describe use cases and requirements for  higher layers Information Service while the information is  transported over IP and above layers.







1.  Introduction
   

   Media Independent Handover Services are a class of network services, 
   which    aim to improve the quality of handovers available to mobile 
   devices.   In order to support more intelligent handover services it 
   is often necessary to be able to exchange information between mobile 
   and fixed nodes within the network.

   IEEE 802.21 working group is currently defining three broad classes of 
   such services to facilitate the handover.  They require passing of 
   information within hosts, as well as between them:

* Media Independent Event Services (MIES) provide indications from 
lower layers about changes in the connectivity state [802.21 draft]. 
Events are of two kinds: local and remote. In case of local events,
information typically propagate upwards from L2 to MIH 
function and MIH function to upper layers within a local stack. In 
case of remote events, however, information may propagate from MIH 
or upper layers in one stack to MIH or upper layers in another stack. 
     

* Media Independent Command Services (MICS) provide mechanisms for
Controlling handovers [802.21 draft]. It includes the commands from 
upper layer to MIH and from MIH to lower layer. These commands mainly carry the upper layer decisions to the lower layers. 

* Media Independent Information Service (MIIS) Information Services 
provides a framework by which a MIH (Media Independent Handover) 
function both in the mobile node and in the network can discover and
obtain network information (both homogeneous and heterogeneous) within 
a geographical region to facilitate handovers [802.21 draft]. MIS 
includes support for various Information Elements (IEs). These IEs
provide information that is essential for a handover function to make
intelligent handover decision. The information can be made available 
via both lower as well as higher layers. 

   



1.1  Information Services

   Higher layer Information Services are considered to be an important 
   component of handover services, for providing local network information 
   to mobile devices in a non-real-time fashion [802.21 draft].

   Information services provide additional information about the
   environment a mobile device is operating in.  These services
   are typically provided by information servers that are either 
   available locally or can be contacted remotely. 


   Information provided varies dependent on the purpose and operation of the information service, but may consist of:  list of neighboring access networks, network operator list, roaming partners, wireless channel information (e.g., data rate, MAC type) etc. It is important to note that the  information services covered in this document assume a set of models compatible with IEEE 802.21's descriptions of a Handover Information Service [802.21 Draft].  In 
this context, a system would need to provide discovery, security association bootstrap and transport of information services over IP, in a variety of deployment scenarios.  However, this document only addresses the transport requirements of information services over IP. Several such scenarios are described below. 


   

2.  Scenarios for IS Transported over IP


   The models described above for information services allow deployment
   of IS Information Servers anywhere within the visited or home network 
   domain. In this section example scenarios are described indicating where
   information services are likely to be deployed.  Descriptions of
   particular characteristics of these deployments are made, especially
   where the deployments place requirements on any information service
   transportation deployed over IP.

   In each of the figures (Figure1, Figure 2 and Figure 3) below, a
   mobile device is currently connected to a particular wireless cell,
   serviced by an Access Point.  In order to gain information about
   other wireless cells (homogeneous or heterogeneous) in the vicinity, 
   it contacts an information server within the fixed network.

   In Figure 1, the information service has been deployed on a wireless
   Access Point.  This is considered to be a likely scenario, as
   wireless devices themselves may be aware of local information and also 
   may have information about administratively adjacent devices
   (such as first-hop routers) and base stations within the same subnet.

   In this scenario, transport of information services over IP isn't
   strictly necessary, as the IS-Server is the MAC peer of the wireless
   host.  If information services over IP are deployed though, no
   changes to the link-layer protocol are required.

   Conversely, if transport of information services over IP is required,
   the host is still has to discover the server's IP address and
   presence.  This discovery requires transmission IS discovery queries
   to a known address, group, or directory service.










                                                  /--------\
    I                                            /          \
   -----          --------     --------    /----/            \----\
   |[ ]|          | ---- |--+--|      |---/                        \
   |ooo|<---------->|IS| |  |  |      |  /                          \
   |ooo|          | ---- |  |  |      |  \                          /
   -----          --------  |  --------   \                        /
   Host            Access   |   Router     \----\            /----/
                   Point    |                    \          /
                            |  --------         / \--------/
                            +--|      |        / Distribution
                               |      |-------/    Network
                               |      |
                               --------
                                Router


                    Figure 1: IS-Server on Access Point

   When an IS-Server is placed within the access network, once again it
   may be possible to run information services without using IP.  

   
   If IP is used for information services transport, For example, in
   (Figure 2), the server is co-located in the router.  There the router
   has access to the upper layer information required to assist
   handovers [xx].

  

                                                  /--------\
    I                                            /          \
   -----          --------     --------    /----/            \----\
   |[ ]|          |      |--+--| ---- |---/                        \
   |ooo|<----------------------->|IS| |  /                          \
   |ooo|          |      |  |  | ---- |  \                          /
   -----          --------  |  --------   \                        /
   Host            Access   |   Router     \----\            /----/
                   Point    |                    \          /
                            |  --------         / \--------/
                            +--| ---- |        / Distribution
                               | |IS| |-------/    Network
                               | ---- |
                               --------
                                Router


                   Figure 2: IS-Server on Subnet Router

   Figure 3 and 4 present the scenarios whereby Information Servers are 
   deployed outside the mobile node's subnet. It presents both advantages 
   and challenges. For example, the server is in a position to serve 
   many access subnets simultaneously, which reduces administrative 
   overheads. Conversely, network support for discovering the IS-Server 
   becomes critically important.  Since a mobile device may roam within 
   a domain though, it may not be necessary to discover the server each 
   time it changes subnet, so long as the mobile remains in the set of 
   networks covered by the server.  For other cases, discovery mechanisms 
   are important, however, it is currently outside the scope of this document. 

   
                                                  /--------\
    I                                            /          \
   -----          --------     --------    /----/  --------  \----\
   |[ ]|          |      |-----|      |---/        | ---- |        \
   |ooo|<----------------------------------------->| |IS| |         \
   |ooo|          |      |     |      |  \         | ---- |         /
   -----          --------     --------   \        --------        /
   Host            Access       Router     \----\ Information/----/
                   Point                         \ Server   /
                  --------     --------         / \--------/
                  |      |-----|      |        / Distribution
                  |      |     |      |-------/    Network
                  |      |     |      |
                  --------     --------
                   Access       Router
                   Point


                      Figure 3: IS-Server In the Network  




                                                  /--------\
    I                                            /          \
   -----          --------     --------    /----/  --------  \----\
   |[ ]|          |      |-----|      |---/        | ---- |        \
   |ooo|<----------------------------------------->| |IS| |         \
   |ooo|          |      |     |      |  \         | ---- |         /
   -----          --------     --------   \        --------        /
   Host \           Access       Router    \----\ Information/----/
         \          Point                        \ Server   /
          \                                       \--------/
           \                                          |
            \                                         |
             \                                        |
              \                                       |
               \                                 /--------\
                \                               /          \
                 \--------     --------    /---/            \----\
                  |      |-----|      |---/       |-------|       \ 
                  |      |     |      |           | ----  |        \
                  |      |     |      |---\       | |IS | |        /
                  --------     --------    \      | ----  |       /
                   Access       Router      \---\Information/----/
                   Point                         \ Server  / 
                                                  \-------/
                             
                                               Distribution 
                                                  Network             

                      Figure 4: IS-Server In the Network 


   

3.  Information Service Reference Model and Interfaces

   Entities involved with handover information services perform the
   roles of an Information Services client (IS client), Information 
   Services Proxy and an Information Services server (IS-Server).  
   Relative positions of client and server, and the interfaces between 
   them may produce different requirements, depending on the type of
   communication.

   Figure 5 presents a  reference model for both for single and mutihop
   Communication. The reference model shows both client-server and 
   client-proxy- server models. In the client-server model, an IS client
   is communicating with the IS server via an interface Ia which is either 
   R1 or R3 as defined in Section 5.3.1 (MIH communication model)
   [802.21 draft]. In case of client-proxy-server model, the interface Ia`
   is similar to R5 in section 5.3.1. Both the models cover all the above
   scenarios including the case where a server requires additional 
   information, it may contact another IS-Server by becoming a proxy   
   itself. This new IS-Server may reside either within its administrative 
   domain, or in another domain.   



      ------------                 -----------         
      |  IS-client|<-------|------>|IS-Server|   
      ------------    Ia(R1/R3)    -----------  





      ------------                 -----------             -----------    
      |  IS-Client|<-------|------>|IS-Proxy | <-----|------> | IS-Server| 
      ------------     Ia(R1/R3)   -----------    Ia`(R5)  -----------


         Figure 5: Information Service Reference Model and Interfaces 


To realize the above information service reference model and corresponding interfaces, following issues are identified:  
   

3.1  Transport-Layer Issues

   The existing ready use of IETF developed transport layer protocols is
   a compelling reason to develop information services transported over
   IP.  Particularly, it is valuable to determine if IS requirements
   match existing transport models and protocols.

   While higher layer information services are non-real time, in some 
   scenarios (IS-Server within a subnet), the lifetimes of communications 
   with a particular server are very short.  As such, the sequenced delivery of
   packets using TCP may be too complicated for this application heavy
   handed [2].  TCP fast recovery relies upon delivery of additional
   packets to stimulate additional transmissions of acknowledgements
   from a receiver back to a transmitter.  Where packet exchanges are
   short and sporadic, loss of a packet may not be detected except using
   long retransmission timeouts [xx].



3.2 Information Service Discovery Issues 

   Discovery by the mobile device of the IS-Server either requires
   Information Server participation in a discovery protocol, network
   entity discovery support or use of a directory service.  The
   directory service can then refer mobiles to an appropriate server for
   their location.
	
   Discovery mechanisms need to provide IP layer contact information for
   the IS-Server.  Such a discovery system should provide protection
   against spoofing, to prevent attackers substituting bogus information
   servers.

   In IP networks, numerous directory and configuration services already
   exist.  Use of these services either requires support from locally
   discoverable resources within the same IP hop [xx], or rely on
   prior configuration of the unicast address of the directory service
   [xx].  Prior configuration itself may be performed dynamically, along 
   with other host services [4][15].

   Network entity discovery, such as Router Discovery [9] could allow
   discovery of an IS server during routing configuration operations.
   If server discovery can be achieved through existing configuration
   discovery procedures, no additional packet exchanges would be
   required to perform discovery.  

   As mentioned earlier, discovery of IS server is outside the scope of 
   this document and therefore no requirements on discovery will be 
   discussed. 


3.3 Reliability Issues

   Reliability IS message exchanges is important and should be supported. 
   For example, if the messages exchanged for the information service
   are assumed to be processed in-order for particular exchanges,
   reordering of packets over the Internet may cause problems for IS
   function.  In that case, transport-layer reliability services may be
   required.

   Alternatively, where message sequence numbers are incorporated into
   the Information Service messages, ordering of packets may be possible
   using application-layer information.  In this case, it may also be
   possible to provide message reliability, on top of a datagram
   oriented transport service.

   Therefore, reliability may be assumed to be supported either by 
   the IS protocol or by the user application 


3.4 Congestion Control Issues 

Transport protocol like TCP has congestion control mechanism and therefore in such cases this is a non issue. Where existing transport protocols do not incorporate their own congestion control and rate limitation, basic mechanisms for network protection and congestion recovery may need to be added to the IS application protocols. 


3.5 Security Issues 
     
     Security is important in IP networks, since there is a danger that
   attacking devices can attempt to adopt roles as information service
   devices.  Such bogus devices could cause service degradation through
   spurious message exchanges, or by providing false information to
   mobile devices.

   IS-Servers need both to protect themselves from attack, and to
   provide mobile clients provable trust, in order that they can 
   exchange the information securely and make their  handover 
   decisions without fear of malicious inaccuracies or mischief. 

    

4. Requirements for Transport over IP

Following are the very high level requirements for IS transport over IP and higher layers. 

? The IS transport shall work both for IPv4 and IPv6 networks 

? The IS transport shall support the transport of MIH protocol message preserving the message boundaries 

? The IS transport shall support the NAT traversal 
 
? The IS protocol requires that security shall be provided at least at the transport layer 

?  Individual security mechanisms and requirements at the transport layer are left to the underlying protocol 

?  Changes to the header fields, IEs and structure messages should not affect the security mechanisms defined for underlying transmission


*** This section needs to be expanded more *** 



   5. Security Considerations

   
   
6. Acknowledgement 

A major part of this document is taken from draft-faccin-mih-infoserv-01.txt.
We acknowledge their contributions to this document as well.