Thread Links Date Links
Thread Prev Thread Next Thread Index Date Prev Date Next Date Index

RE: [802.21] Ad-hoc on ES/CS discussion



Title:
Hello participants, 
 Sorry for the delay in conf information. But, here is the adhoc telecon information for tomorrow ( 3/ 2) regarding ES/CS information.  
 
Tentative Agenda:
1. Agree on the registration contribution for March meeting.
2. Go over ES/CS v2 draft for comments
3. Discussion on session-id, to resolve open issues
 
Regards, 
Srini 
 
PS: I have also enclosed minutes from last meeting.
 

Name of the conference: IEEE 802.21 ES/CS Discussions

Time: 8-10am CT

Conference ID: 59976, PIN: 387105

US Phone Number: 972-894-6500

EU Phone Number: +358 7180 71870

Type of reservation: Single reservation:  02 .0.2006

(GMT-06:00) Central Time (US & Canada)

Number of participants: 20

Instructions language: English

Features: participant's identification

21-05-xxx-00-0000-Feb16_2006_Telecon_Meeting_Minutes.doc





MIPSHOP Working Group                                    S. Sreemanthula
Internet-Draft                                                 S. Faccin
Expires: September 7, 2006                                         Nokia
                                                             E. Hepworth
                                                      Siemens Roke Manor
                                                                G. Daley
                                                               Panasonic
                                                          march 06, 2006


 A Problem Statement for Event Services and Command Services for Media
                         Independent Handovers
                draft-sreemanthula-es-cs-problem-02.txt

Status of this Memo

   By submitting this Internet-Draft, each author represents that any
   applicable patent or other IPR claims of which he or she is aware
   have been or will be disclosed, and any of which he or she becomes
   aware will be disclosed, in accordance with Section 6 of BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt.

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

   This Internet-Draft will expire on September 7, 2006.

Copyright Notice

   Copyright (C) The Internet Society (2006).

Abstract

   This document discusses the usage scenarios and usage models of event
   services and command services involving inter-system IP mobility,
   specifically media independent handovers.  The discussion is intended



Sreemanthula, et al.    Expires September 7, 2006               [Page 1]

Internet-Draft                ES/CS for MIH                   march 2006


   to aid the MIPSHOP WG in understanding the problem domain of the
   event and command services in the Internet.

















































Sreemanthula, et al.    Expires September 7, 2006               [Page 2]

Internet-Draft                ES/CS for MIH                   march 2006


Table of Contents

   1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  4
   2.  Terminology and Definitions  . . . . . . . . . . . . . . . . .  5
     2.1.  Remote Command Service (CS)  . . . . . . . . . . . . . . .  5
     2.2.  Local Command Service  . . . . . . . . . . . . . . . . . .  6
     2.3.  Remote Event Service (ES)  . . . . . . . . . . . . . . . .  6
     2.4.  Local Event Service  . . . . . . . . . . . . . . . . . . .  6
     2.5.  Information Service (IS) . . . . . . . . . . . . . . . . .  6
     2.6.  Inter-technology Handover  . . . . . . . . . . . . . . . .  6
     2.7.  Media Independent Handover Function (MIHF) . . . . . . . .  7
     2.8.  Mobility Management Entity (MME) . . . . . . . . . . . . .  7
     2.9.  Network node . . . . . . . . . . . . . . . . . . . . . . .  7
     2.10. Access Network Node  . . . . . . . . . . . . . . . . . . .  7
     2.11. Core Network Node  . . . . . . . . . . . . . . . . . . . .  7
     2.12. Proxy Network Node . . . . . . . . . . . . . . . . . . . .  7
     2.13. Network-Controlled Handover  . . . . . . . . . . . . . . .  7
     2.14. Station (STA)  . . . . . . . . . . . . . . . . . . . . . .  8
   3.  Architectural Issues . . . . . . . . . . . . . . . . . . . . .  8
     3.1.  Network Controlled Mobility Scenarios  . . . . . . . . . .  8
     3.2.  Remote Event Services  . . . . . . . . . . . . . . . . . .  9
       3.2.1.  Event Services Classification  . . . . . . . . . . . . 10
     3.3.  Remote Command Services  . . . . . . . . . . . . . . . . . 11
     3.4.  Information Services . . . . . . . . . . . . . . . . . . . 12
   4.  Usage Models for Event Services  . . . . . . . . . . . . . . . 12
   5.  Usage Models for Command Services  . . . . . . . . . . . . . . 14
   6.  Usage Scenarios for Remote Events and Commands . . . . . . . . 15
     6.1.  Network-Controlled Handover Scenarios  . . . . . . . . . . 15
     6.2.  Network Selection  . . . . . . . . . . . . . . . . . . . . 16
     6.3.  Handover Control . . . . . . . . . . . . . . . . . . . . . 18
   7.  Enabling Event and Command Services  . . . . . . . . . . . . . 20
     7.1.  Feasibility of Remote Events and Commands  . . . . . . . . 21
       7.1.1.  Explicit Signaling for Remote Event/Command
               Services . . . . . . . . . . . . . . . . . . . . . . . 21
       7.1.2.  Mitigation of Security Issues and Validation of
               Transported Indications  . . . . . . . . . . . . . . . 21
       7.1.3.  Mapping of Identifiers . . . . . . . . . . . . . . . . 23
     7.2.  Transport Selection Requirements . . . . . . . . . . . . . 24
   8.  Security Considerations  . . . . . . . . . . . . . . . . . . . 25
     8.1.  Event Service Considerations . . . . . . . . . . . . . . . 26
     8.2.  Command Service Considerations . . . . . . . . . . . . . . 26
     8.3.  Security Considerations for Transport  . . . . . . . . . . 27
   9.  IANA Considerations  . . . . . . . . . . . . . . . . . . . . . 27
   10. Conclusions  . . . . . . . . . . . . . . . . . . . . . . . . . 27
   11. Acknowledgments  . . . . . . . . . . . . . . . . . . . . . . . 28
   12. References . . . . . . . . . . . . . . . . . . . . . . . . . . 28
   Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 29
   Intellectual Property and Copyright Statements . . . . . . . . . . 30



Sreemanthula, et al.    Expires September 7, 2006               [Page 3]

Internet-Draft                ES/CS for MIH                   march 2006


1.  Introduction

   Handover services are a class of network services, which aim at
   providing service continuity and transparency to users during changes
   in network point of attachments and assist the quality of handovers
   available to wireless devices.  In order to support more intelligent
   handover services it is often necessary to be able to exchange
   information between mobile and fixed nodes within the network.  Such
   information include reporting events by a mobile node to the network
   and vice versa, as well as issuing inter-technology handover commands
   by the network to the mobile node.

   Performing inter-technology handover management requires homogeneity
   in information exchange mechanisms between mobile node and network
   for all of the involved systems.  In most 3GPP systems, such
   information exchange happens using existing protocols on the
   signaling plane that are specific to 3GPP.  In IEEE 802 systems, and
   especially in WLAN, appropriate information exchange between the
   mobile nodes and the network for handover control by the network does
   not exist.  In general, there is currently no mechanism that can be
   applied to various technologies (e.g. 3GPP wireless links, IEEE 802
   wireless links, etc.) to enable the exchange of information between
   mobile nodes and the network to support management and control of
   inter-technology handover.

   Potentially, standardization fora (e.g. 3GPP) may define solutions to
   support the exchange of information between mobile nodes and the
   network to support management and control of inter-technology
   handover in a way that is applicable to 3GPP systems for various
   access technologies.  However, several parties believe that an
   alternative that shall be considered is to adopt solutions being
   developed in IEEE 802.21 and enable the use of IP transport
   mechanisms for such solutions, since this would facilitate the
   deployment of seamless mobility services in networks where access-
   technology specific solutions do not exist or the equipment has not
   been updated to include such solutions.  It is certain that
   performances considerations will have to be well understood.  It is
   also worthwhile mentioning that not all seamless mobility scenarios
   require extremely high performance in terms of latency reduction, as
   described in this draft.

   At this time, three broad classes of services for handover
   assistance, particularly aiming at improving the inter-technology,
   are under consideration within the IEEE 802.21 Working Group.  They
   require passing of information within hosts, locally and between
   different hosts, remotely.  The services are Event Services (ES),
   Command Services (CS), and Information Services (IS).  Specifically:




Sreemanthula, et al.    Expires September 7, 2006               [Page 4]

Internet-Draft                ES/CS for MIH                   march 2006


   o  Event Services (ES) provide indications from one layer or
      functionality to another about changes in the connectivity state.
      This is particularly relevant to wireless interfaces.

   o  Command Services (CS) provide mechanisms for controlling handovers
      or functions aiding handovers.  They provide mechanisms to
      establish, redirect, or remove state in either the network or
      mobile node, so that handovers occur smoothly.

   For details on the IS, [1] contains a detailed description.

   Each service carry L2-specific information that may be processed
   locally or require communication with peer services on other nodes,
   and this communication may be transported over IP, to communicate
   with peer services on other nodes.  The main relevance of ES and CS
   to IETF and the MIPSHOP WG is the exchange of information related to
   ES and CS between peer nodes.  This is referred to as Remote ES and
   Remote CS.

   The IETF has been working on how handover services can be used to
   assist mobility signaling protocols, and has been analyzing
   interactions between handover services and network/transport layers.
   At the same time, other groups (e.g.  IEEE 802.21) have been taking a
   more generally applicable view.

   This document provides a view of the authors, and does not represent
   the official view of either IEEE 802.21 or an IETF WG.  Assistance is
   sought to improve this document, in order to reflect consensus
   viewpoints from the appropriate groups.


2.  Terminology and Definitions

   This section defines terminology used in this draft.  Where not
   defined, refer to [6] for Mobility Related Terminology - RFC 3753.

2.1.  Remote Command Service (CS)

   Remote command service is a protocol exchange mechanism between
   network nodes to instruct the recipient network nodes to execute a
   specific function.  Execution of a command service at the mobile node
   or a node in the network may result in loss of current link
   connectivity and/or change in the network point of attachment.
   Receipt and processing of a command belonging to the CS generates an
   expected response in the receiving node (e.g. create a new link layer
   connection, disconnect a link layer connection, etc).





Sreemanthula, et al.    Expires September 7, 2006               [Page 5]

Internet-Draft                ES/CS for MIH                   march 2006


2.2.  Local Command Service

   Local command service is a communication facility within a host
   enabling one functionality to request execution of certain commands
   in certain other functionality (e.g. the IP function may request to
   establish a connection over a link layer).

2.3.  Remote Event Service (ES)

   Remote event service is a protocol exchange mechanism between network
   nodes to inform of recently happened or impending change in link or
   network status information.  The event notification can originate
   either from a mobile node or a node in the network.  Receipt and
   processing of an event belonging to the ES may generate a reaction in
   the receiving node (e.g. trigger IP layer mobility).

2.4.  Local Event Service

   Local event service is a communication facility within a host for one
   functionality to provide indications or notifications of certain
   state changes pertaining to the network to a certain other
   functionality (e.g.  IEEE 802.11 MAC layer may inform the IP function
   that the wireless signal is lost).  In [2], indication of local event
   services is referred to as link indications.  In this document, local
   event services include indications generated at other layers than
   link layer (e.g.  IP layer or layers above the IP layer).

2.5.  Information Service (IS)

   Information service is a protocol exchange mechanism between network
   nodes to provide or query information related to specific networks.
   For more information see [1].

2.6.  Inter-technology Handover

   In this document the term Inter-Technology Handover refers to
   handover of communications between different wireless technologies.
   Specifically, the following cases are considered:

   o  Handover between 3GPP wireless links and IEEE 802.11

   o  Handover between 3GPP wireless links and IEEE 802.16

   o  Handover between IEEE 802.11 and and IEEE 802.16

   Other scenarios involving IEEE 802 technology may also be considered.
   Handover between different wireless technologies defined in 3GPP and
   with GSM are defined in 3GPP and are not considered to be inter-



Sreemanthula, et al.    Expires September 7, 2006               [Page 6]

Internet-Draft                ES/CS for MIH                   march 2006


   technology handover in this document.  Similarly, 3GPP inter-GGSN
   handover is out of scope.

2.7.  Media Independent Handover Function (MIHF)

   Media independent handover function is a shim layer in the mobility
   management protocol stack of the mobile nodes or network element that
   provide media independent or inter-technology mobility, specifically
   handovers (e.g. as defined in IEEE 802.21).  MIHF utilizes the event
   services and command services.  "MIHF(CS)" and "MIHF(ES)" refer to
   command services and event services part of the MIHF, respectively.

2.8.  Mobility Management Entity (MME)

   A mobility management entity implements network selection and
   handover decision algorithms and utilizes mobility signaling
   protocols and other protocols that aid in mobility functions.  MME
   functionality utilizes MIHF.

2.9.  Network node

   It is any node that is part of the network.  It includes mobile
   nodes, link layer nodes (e.g IEEE 802.11 AP, IEEE 802.16 BS) and IP
   or higher layer nodes (e.g. routers, servers, etc.).

2.10.  Access Network Node

   Access network node is a Network Node that provides link layer
   services to the mobile nodes (e.g.  AP or base station).

2.11.  Core Network Node

   A core network node is node in the network beyond an/the access
   network that is reachable by mobile nodes only by IP based protocols.
   The core network node can only originate or terminate protocol
   messages.

2.12.  Proxy Network Node

   A proxy network node is node in the network in or beyond an/the
   access network that can neither originate nor terminate protocol
   messages, but can only pass or proxy protocol messages to a different
   network node.

2.13.  Network-Controlled Handover

   In this document the term Network-Controlled Handover refers to an
   Inter-Technology Handover where a function in the network makes the



Sreemanthula, et al.    Expires September 7, 2006               [Page 7]

Internet-Draft                ES/CS for MIH                   march 2006


   handover decision (e.g. based on information from the mobile node,
   network policies, etc.)

2.14.  Station (STA)

   See the definition of mobile node in [6].  This is a specific term
   used in IEEE 802.11 wireless technologies.


3.  Architectural Issues

   This section covers several architectural issues involved with Media
   Independent Handovers.  These issues are not all tightly coupled
   together, but form parts of the overall problem space for Media
   Independent Handovers.

3.1.  Network Controlled Mobility Scenarios

   Several operators or network service providers, including those
   deploying multiple access technologies, view their network resources
   as a single resource pool.  These resources are used to maximize
   their network efficiency and improve the performance, thus providing
   a better user experience.  This can be viewed as something analogous
   to a network pool of multiple routers for network balance and
   redundancy and increased capacity to reroute traffic and relieve
   congestion under heavy loads in their network.

   For access involving radio technologies, the available network
   bandwidth is directly related to the available frequency spectrum.
   For a given cost, radio technologies provide varied degrees of QoS
   affecting the user experience.  This is due to the varied cost of
   spectrum acquisition and network deployment of various radio
   technologies.  Also at any given instant, the service providers,
   including those with multiple access technologies, would like to see
   that no specific part their network, is operating under heavy loads
   and prefer to balance the traffic across all the available network
   paths for optimum performance.  Generally speaking, the network
   wishes to exercise control over the mobile nodes to make use of a
   certain network path for mutual benefit of the users and the service
   providers themselves.

   The network, therefore, reserves the right to make handover decisions
   at the MME, for mobile nodes to utilize a more optimized network
   path.  When multiple link technologies are involved, this could also
   mean that the network may instruct the mobile nodes to handover from
   current link technology to handover to another link technology.  MME
   may make use of several parameters like subscription agreement, user
   device capabilities, network policies, roaming agreements, network



Sreemanthula, et al.    Expires September 7, 2006               [Page 8]

Internet-Draft                ES/CS for MIH                   march 2006


   load conditions, overall cost to the user and of course, the user
   experience to arrive at a certain handover decision.

3.2.  Remote Event Services

   Remote event services are the exchange of notification or indication
   messages of certain network status changes between peer network nodes
   at the same layer (above IP in this draft context).  The state change
   refers to either the conditions of the existing link (e.g. a link
   layer connectivity is lost) or of the newly detected links (e.g. the
   mobile node can detect the presence of a new link technology, e.g. it
   receives beacons from an IEEE 802.11 AP that was previously not
   visible).  Remote event services are different from link indications
   as defined in [2] in that link indications are defined to carry
   information from the link layer to the upper layer like local event
   services.  However, the remote event services can utilize link
   indications as one triggering mechanism to send event information to
   the same layer on a peer network node.  There can be other triggering
   mechanisms, perhaps from other layers in the node that may also
   result in event notifications.

   Remote event services can be originated by a mobile node and
   transported to a peer network node and vice versa.  It is also
   possible for remote event services to be exchanged between two nodes
   in the network.  In the same capacity, the events originated by a
   network node can be proxied by another node and terminated at a
   different node.  It should be highlighted that the remote event
   services are envisioned to be used as an opt-in feature, meaning that
   a requesting entity would register for specific event types that it
   is interested in and provide the appropriate filter rules when that
   specific event type must be matched.  These features will ensure that
   the protocol does not result in excessive load on either the network
   or the network node processing the event notification reports from
   multiple event generating nodes.

   Figure 1 shows a high-level usage model for the event services.  Link
   layers at any network node can provide triggers or link indications
   to notify the state change to the upper layers.  The triggers can
   also be originated from other sources at various layers or
   functionality within the same host.  These trigger indications are
   checked and scoped based on the filters set by the requesting entity.
   Trigger indications that do not match the existing filter sets are
   discarded and for those that match, a corresponding event indication
   is sent to the requesting node.







Sreemanthula, et al.    Expires September 7, 2006               [Page 9]

Internet-Draft                ES/CS for MIH                   march 2006


   |-------------------------|            |---------------------------|
   +-------+ Other  +--------+Remote Event+--------+ Other  +-------+
   | Other |------->|  MIHF  |<---------->|  MIHF  |<-------|Other  |
   |Sources|triggers|  (ES)  |  Services  |  (ES)  |triggers|Sources|
   +-------+        +--------+            +--------+        +-------+
                        ^                     ^
               Link     |                     |    Link
            Indications |                     | Indications
                        |                     |
                    +-------+             +-------+
                    | Link  |             | Link  |
                    | Layer |             | Layer |
                    +-------+             +-------+
   |-------------------------|            |----------------------------|
             Network                                Network
              Node                                   Node

   Fig.1 Event Service Model.


3.2.1.  Event Services Classification

   Event services can be broadly classified to incorporate two different
   types of network notifications, Micro and Macro.  While the event
   services discussed in this draft include both of these types, it
   mainly details those to be used specifically for macro network
   events.  This is based on the view from earlier studies compiled by
   [2] which show that some link indications can result in unreliable
   information and also that the transport of such micro events would
   result in a higher network load.

3.2.1.1.  Micro Network Events

   Micro network events refer to event notifications corresponding to
   microscopic changes in the network state information.  The reporting
   of events between two nodes can be scoped or filtered to provide
   minute changes in the network state information.  Examples of such
   events are Link-Parameters-Change, Link-Going-Down, Link-Threshold-
   Exceeded etc.  Perhaps, within an example implementation, Link-Up and
   Link-Down could also be considered as micro network events with
   varying degrees, if the event reporting is scoped for state changes
   within the same AP, same subnet or same access technology.
   Generally, these network events may be characterized by frequent
   exchange of messages between the peer nodes to report minute changes
   in the state information.






Sreemanthula, et al.    Expires September 7, 2006              [Page 10]

Internet-Draft                ES/CS for MIH                   march 2006


3.2.1.2.  Macro Network Events

   Macro network events refer to macroscopic changes in the network
   state information.  Here, the reporting of events between two nodes
   is scoped or filtered to provide only macroscopic changes in the
   network.  These can be triggered due to link indications such as
   Link-Detect, Link-Up, Link-Down involving subnet changes across same
   or multiple access networks.  As explained before, it is also
   possible for other sources to generate the triggers.  Generally,
   these network notifications may be characterized by an infrequent
   exchange of messages between the peer nodes, depending on the nature
   of the mobility of the mobile node itself.

   The choice of triggering indications in combination with the filters
   (e.g. a set of parameter and/or measurements), set by the requesting
   nodes, can be used to unambiguously trigger the macro network events.
   E.g. only a new link-detect indication with a filter for strong
   signal strength would result in an event notification for
   Link_Detect.

3.3.  Remote Command Services

   Remote command services form a request-response mechanism utilized by
   the nodes in the network to instruct other network nodes to carry out
   or execute a specific function affecting the current link or a
   different link.  Commands can also impact other layers, e.g.  IP
   layer.  The result of the command execution is provided in a response
   back to the originating node.  The nodes receiving and executing the
   commands can either be a node in the network or a mobile node.  In
   the same capacity, it is possible for one node to originate the
   service and another node to pass or proxy the service to a different
   node that terminates and executes the command.  The remote command
   services are utilized as part of the MIHF which is in turn employed
   by the MME that implements handover decision algorithms for various
   mobile nodes.  The functionality of MME or the handover decision
   algorithms are outside the scope of this draft.

   As compared to remote event services, the remote command services do
   not use opt-in features, meaning there is no registration needed to
   receive commands.  However, the command services may use filtering
   information to scope the extent of execution of commands.  E.g. the
   MME may command the mobile node to scan for specific access
   technologies in its vicinity.

   Some basic examples for remote command service are listed below:

   1.  Link-switch to switch from one link to another link




Sreemanthula, et al.    Expires September 7, 2006              [Page 11]

Internet-Draft                ES/CS for MIH                   march 2006


   2.  Link-scan to scan for specific links in the vicinity

   Figure 2 shows a high level usage model for the remote command
   services.  MME may initiate command requests based on certain
   handover decision algorithms addressing a specific mobile node to the
   MIHF(CS).  The request is translated to a CS request and forwarded to
   the MIHF(CS) in the target node where the c ommand will be executed.
   Depending on the type of the command, the execution may affect the
   link layer or other functionality in the same host.  After the
   command is executed the result of command is carried back in a CS
   response to the originating node and finally to the MME.

   |------------------------------|               |--------|
   +---------+ Commands +--------+ Remote Command +--------+
   | Other   |<-------->|  MIHF  |<-------------->|  MIHF  |
   | Layers/ | req/resp |  (CS)  |    Service     |  (CS)  |
   |Functions|          +--------+                +--------+
   +---------+              |                         |
                       Link |                         |Commands
                   Commands |                         |req/resp
                            V                         V
                       +-------+                  +-------+
                       | Link  |                  |  MME  |
                       | Layer |                  |       |
                       +-------+                  +-------+
   |------------------------------|               |-------|
             Network                               Network
              Node                                  Node

   Fig.2 Command Service Model.


3.4.  Information Services

   Information services are covered in detail in [1].  Information
   services, in a nut shell, provide a information query mechanism for
   network nodes to obtain information about specific networks and their
   capabilities.  The event and command services covered in this draft
   work in conjunction with the information services.  The information
   service plays a critical role in the network selection at the mobile
   node or in the network.  Section 9 on usage scenarios will show the
   extent of their interworking and how they complement each other to
   achieve a common goal of enabling such scenarios.


4.  Usage Models for Event Services

   The following usage models are shown as examples of possible models



Sreemanthula, et al.    Expires September 7, 2006              [Page 12]

Internet-Draft                ES/CS for MIH                   march 2006


   that the event services are expected to enable.  The list is not
   exhaustive and furthermore it is possible to derive new models using
   a combination of these models.

                            -----> wireless link
                           /
    +-------+   Remote ES / +-------+
    | MIHF  |-------------->| MIHF  |
    | (ES)  |   Services    | (ES)  |
    +-------+               +-------+
      Mobile              Access, Proxy or Core
       Node                 Network Node


   Fig.3 ES: Mobile Node to Access, Proxy or Core Network Node.




                            -----> wireless link
                           /
    +-------+   Remote ES / +-------+
    | MIHF  |-------------->| MIHF  |
    | (ES)  |   Services    | (ES)  |
    +-------+               +-------+
      Mobile               Access or Core
       Node                 Network Node

   Fig.4 ES: Mobile Node to Access or Core Network Node.



    +-------+   Remote ES / +-------+
    | MIHF  |-------------->| MIHF  |
    | (ES)  |   Services    | (ES)  |
    +-------+               +-------+
   Access Network           Core Network
      Node                    Node

   Fig.5 ES: Access Network Node to Core Network Node.



     +-------+Remote ES+-------+Remote ES+-------+
     | MIHF  |-------->| MIHF  |-------->| MIHF  |
     | (ES)  |Services | (ES)  | Services| (ES)  |
     +-------+         +-------+         +-------+
    Access Network      Proxy          Core Network



Sreemanthula, et al.    Expires September 7, 2006              [Page 13]

Internet-Draft                ES/CS for MIH                   march 2006


    or Mobile Node   Network Node         Node

   Fig.6 ES: Network Node to Proxy Network Node to Core Network Node.



5.  Usage Models for Command Services

   The following usage models are shown as some of the possible models
   that the command services are expected to enable.  The list is not
   exhaustive and further, it is possible to derive new models using a
   combination of these models.

                            -----> wireless link
                           /
    +-------+   Remote CS / +-------+
    | MIHF  |<--------------| MIHF  |
    | (CS)  |   Services    | (CS)  |
    +-------+               +-------+
     Mobile              Access, Proxy or Core
      Node                 Network Node

   Fig.7 CS: Access or Core Network Node to Mobile Node.



    +-------+   Remote CS / +-------+
    | MIHF  |<--------------| MIHF  |
    | (CS)  |    Services   | (CS)  |
    +-------+               +-------+
   Access Network           Core Network
      Node                    Node

   Fig.8 CS: Core Network Node to Access Network Node.



    +-------+Remote CS+-------+Remote CS+-------+
    | MIHF  |<--------| MIHF  |<--------| MIHF  |
    | (CS)  |Services | (CS)  | Services| (CS)  |
    +-------+         +-------+         +-------+
   Access Network      Proxy          Core Network
   or Mobile Node   Network Node         Node

   Fig.9 CS: Network Node to Proxy Network Node to Network Node.






Sreemanthula, et al.    Expires September 7, 2006              [Page 14]

Internet-Draft                ES/CS for MIH                   march 2006


6.  Usage Scenarios for Remote Events and Commands

   While the authors of this draft agree with most of the comments
   raised in [2], the authors believe that remote transport of events
   for ES is feasible under specific conditions.

   The intention behind ES and CS is not to cater for every possible
   scenario, but to target specific scenarios.  In particular, the focus
   is on network architectures deploying multiple access technologies,
   where inter-technology handover is required.

6.1.  Network-Controlled Handover Scenarios

   Remote ES and CS can be used as enablers for network-controlled
   handover scenarios between different access technologies.  The
   discussion of network-controlled can easily raise a long list of
   questions regarding the feasibility of e.g. sending information in
   real-time between the mobile node and the MME, and of sending
   commands between the MME and the mobile node.  The issue considered
   in these cases is typically the delay that can be introduced by the
   transport and that may make the overall handover delay quite
   considerable.  This document does not discuss these specific issues,
   and does not argue in favor or against such issues.  However, in
   order to identify some of the scenarios of applicability for Remote
   ES and CS for network-controlled handover, we need to consider the
   following classification of handovers.  There are two main reasons to
   perform an handover:

   1.  degradation of current link/connection quality: the quality of
       the link is degrading and it is necessary to perform an handover
       to avoid losing the current connection;

   2.  "opportunistic" handover: due to a set of events and based on
       specific policies, it is preferable to move the communication to
       another link.

   In order to support inter-technology network-controlled handovers the
   first case, the delay between the moment the handover decision is
   made and the moment the command to perform the handover is received
   by the mobile node needs to be considered carefully.  However, for
   "opportunistic" handover the impact of such delay is less
   significant, since the mobile node is not having any degradation over
   the current link, and the handover will be performed because the
   network has policies indicating that it is preferable to move to the
   new link.

   One motivation for performing opportunistic network-controlled
   handover is load sharing, in scenarios where a network exercises



Sreemanthula, et al.    Expires September 7, 2006              [Page 15]

Internet-Draft                ES/CS for MIH                   march 2006


   tight control of various wireless link technologies to distribute the
   load of communications according to network policies.

   The network may perform a network-controlled handover decision in at
   least two steps.

   1.  Network selection, and

   2.  Handover control.

   The two steps are described in the following sections

6.2.  Network Selection

   Network selection is a process of selecting a favorable network for a
   mobile node to transfer or handover the ongoing services to the
   selected network.  The selected network may be a different link
   technology from the previous one.  It may also be possible that the
   mobile node, after handover, may not experience exactly the same
   level of QoS as the current link due to this network selection.  But,
   in general, it may result in some user benefit in one way or another
   e.g. cost savings, higher bandwidth etc.  MME in the network may have
   access to subscriber profile, contracts, and device capabilities to
   make use of the network selection algorithms for a certain subscriber
   or mobile node.

   Figure 10 shows a simple network selection procedure with the help of
   the mobile node.  This example call flow diagram employs remote event
   services and information services.  Remote command services are not
   used in this particular example, however, they can also be useful in
   the network selection mechanisms under certain scenarios.  E.g.
   depending on user geographical location, the network may command the
   mobile node to perform a scan for a specific 802.11 network and
   report the results that can be used in the network selection process.

   In the scenario shown, the mobile node initially performs a
   registration or attachment to the network on any link, e.g. 3GPP
   network.  The MME and the mobile node are able to discover each other
   in the same or following step.  MME may then register for specific
   remote event services, e.g.  ES-link-detect by sending a registration
   request and filter information for both 802.16 and 802.11 networks.
   The mobile node accepts the request with a positive reply.  From time
   to time, the mobile node may receive broadcast information from
   802.11 and 802.16 networks.  In this scenario, the 802.16 broadcast
   is received and a link-detect is sent by the 802.16 MAC layer to the
   MIHF(ES).  The MIHF(ES) translates this to an ES-link-detect message
   to the MIHF(ES) in the network (collocated in the MME) with the basic
   network information received in the broadcast.



Sreemanthula, et al.    Expires September 7, 2006              [Page 16]

Internet-Draft                ES/CS for MIH                   march 2006


   The MME requests for more information about the network via the IS
   query to an IS server to check the suitability of the detected
   network due to roaming agreements [1].  The MME decides that this
   particular 802.16 network is not a favorable network and takes no
   action.  The mobile node also takes no action and does not report the
   detection of same network more than once.  At a later time, the
   mobile node may receive beacon information from 802.11 AP and the MAC
   layer in the mobile node reports the to the MIHF(ES) along with the
   SSID information.  The MIHF(ES) provides this information to the MME
   in the network.  The MME may perform an IS query based on the SSID
   information and determines that this SSID belongs to a favorable
   network.  The network selection process, thereby, is completed.







































Sreemanthula, et al.    Expires September 7, 2006              [Page 17]

Internet-Draft                ES/CS for MIH                   march 2006


         Mobile Node
   |----------------------|
   +--------+     +-------+  +-------+   +------+   +------+   +------+
   |MIHF(ES)|     |  Link |  |  MME  |   |  IS  |   |802.16|   |802.11|
   |        |     | Layers|  |       |   |      |   |      |   |      |
   +--------+     +-------+  +-------+   +------+   +------+   +------+
       |              |          |          |           |          |
   +------------------------------+         |           |          |
   |  Discovery & Registration    |         |           |          |
   +------------------------------+         |           |          |
       |     1.ES-reg-req        |          |           |          |
       |<========================|          |           |          |
       |        2.ES-reg-resp    |          |           |          |
       |========================>|          |           |          |
       ~                         ~          ~           ~          ~
       |              |3.DL-burst|          |           |          |
       | 4.link-detect|<--------------------------------|          |
       |<-------------|          |          |           |          |
       |    5.ES-link-detect     |          |           |          |
       |========================>|6.IS-query|           |          |
       |              |          |--------->|           |          |
       |              |   +-------------+   |           |          |
       |              |   |not favorable|   |           |          |
       |              |   +-------------+   |           |          |
       ~              ~          ~          ~           ~          ~
       |              |7.Beacon  |          |           |          |
       |8.link-detect |<-------------------------------------------|
       |<-------------|          |          |           |          |
       |    9.ES-link-detect     |          |           |          |
       |========================>|10.IS-query           |          |
       |              |          |--------->|           |          |
       |              |      +-----------+  |           |          |
       |              |      | favorable |  |           |          |
       |              |      +-----------+  |           |          |
       |              |          |          |           |          |
   +--------+     +-------+  +-------+   +------+   +------+   +------+
   |----------------------|
       Legend: ===== Remote ES over current link

   Fig.10 Network Selection in Network.


6.3.  Handover Control

   Handover control procedure follows a network selection process as
   explained in the previous section.  The following scenario in Figure
   11 shows a network-controlled handover procedure with fast MIP
   handover signaling [3].  Here, the MME in the network utilizes



Sreemanthula, et al.    Expires September 7, 2006              [Page 18]

Internet-Draft                ES/CS for MIH                   march 2006


   MIHF(CS) and generates a link switch command with CS-switch-reg to
   the mobile node.  The parameters in the message may include that a
   make-before-break mechanism is to be performed along with the target
   link information e.g. 802.11 network as shown from the network
   selection procedure earlier.

   The MICH(CS) indicates the Mobile IP function of the impending link
   switch along with new link information.  The Mobile IP functionality,
   If necessary, i.e., it does not have a valid Access Router Tuple-Info
   [3], it sends a Proxy Router Solicitation (PrRtrSol) with the new
   link information (e.g.  MAC address of AP) and the Proxy Router
   Advertisement (PrRtrAdv) provides the relevant L3 information for the
   mobile node to use on the new link.  The MIHF(CS) in the mobile node
   executes the command by sending an "associate" request to the 802.11
   MAC which will perform all necessary L2 association and
   authentication procedures for the new link.  For completeness, steps
   3 and 4 in figure 11 can take place in parallel to steps 3 and 4.

   A link-up indication is sent to the interested parties including
   Mobile-IP functionality.  Mobile-IP sends a Fast Binding Update (FBU)
   to the old FA over the old link so that old FA could switch (tunnel)
   the packets to the new FA.  The mobile node now is able to receive
   packets from new FA that are tunneled from old FA.  At a later time,
   the mobile node performs an Mobile IP update procedure to update the
   binding in the HA and reroute the tunnels directly from HA to the new
   FA in the new network corresponding to the 802.11 link.  Once the
   traffic uses the new link, the MIHF(CS) releases the old link by
   sending a request to that MAC layer, here the 3GPP radio link.  A CS-
   switch-resp is sent back to the MME upon completion of the command.

   The following signaling flow shows how the network controlled handoff
   can work with fast MIP handover signaling [3].  It shows a make-
   before-break mechanism, so that the mobile node sends the FBU on the
   old link after the setup of the new link to minize the latency due to
   L2 association and authentication procedures.  For completeness,
   steps 3 and 4 in figure 11 can take place in parallel to steps 2 and
   3.














Sreemanthula, et al.    Expires September 7, 2006              [Page 19]

Internet-Draft                ES/CS for MIH                   march 2006


          Mobile Node
   |--------------------------------|
   +--------+   +--------+   +-------+   +-----+   +------+   +------+   +-----+
   |MobileIP|   |MIHF(CS)|   |  Link |   | MME |   |802.11|   |  FA  |   |  HA |
   |        |   |        |   | Layers|   |     |   |      |   |      |   |     |
   +--------+   +--------+   +-------+   +-----+   +------+   +------+   +-----+
       |            |           |           |          |          |         |
       |            |           |    +-----------+     |          |         |
       |            |           |    | Network   |     |          |         |
       |            |           |    | Selection |     |          |         |
       |            |           |    |(sect. 9.1)|     |          |         |
       |            |           |    +-----------+     |          |         |
       |            | 1.CS-switch-req       |          |          |         |
       |2.switch-ind|<======================|          |          |         |
       |<-----------|          3. PrRtrSol  |          |          |         |
       |=========================================================>|         |
       |            |         4. PrRtrAdv   |          |          |         |
       |<=========================================================|         |
       |            |3.associate|           |          |          |         |
       |            |---------->|  4.L2 Association    |          |         |
       | 5.link-up  |           |<-------------------->|          |         |
       |<-----------------------|           |          |          |         |
       |            |          6. FBU       |          |          |         |
       |=========================================================>|         |
   +---------------------------------------------------------------------------+
   |                Mobile IP update procedure over new link                   |
   +---------------------------------------------------------------------------+
       |            |7.release  |           |          |          |         |
       |            |---------->|           |          |          |         |
       |            | 8.CS-switch-resp      |          |          |         |
       |            |>>>>>>>>>>>>>>>>>>>>>>>|         |          |          |
       |            |           |           |          |          |         |
   +-------+    +-------+   +------+     +-----+    +------+   +------+  +-----+
   |-------------------------------|
          Legend: ===== over current link, >>>>>> over new link

   Fig.11 Network-Controlled Handover Procedure.



7.  Enabling Event and Command Services

   This section analyzes the feasibility of remote events and commands,
   and describes a set of requirements to enable remote ES and CS.  The
   section discusses some potential solutions to solve some issues
   typically associated with remote events and explicit signaling.
   However, such solutions are discussed just to provide example of how
   drawbacks and limitations identified e.g. in [2] can be overcome.



Sreemanthula, et al.    Expires September 7, 2006              [Page 20]

Internet-Draft                ES/CS for MIH                   march 2006


   This draft does not propose any specific solutions.

7.1.  Feasibility of Remote Events and Commands

   [2] contains a set of observations on requirements that solutions
   need to fulfill to justify and enable transport of events between
   peer entities over the media (e.g. wireless link).  This section
   addresses these observations in order to assess the feasibility of
   remote ES and CS.

7.1.1.  Explicit Signaling for Remote Event/Command Services

   [2] indicates that alternatives not requiring explicit signaling are
   preferred, and that explicit signaling proposals must prove that
   existing explicit signaling mechanisms are inadequate.

   Implicit signaling (e.g. path change processing and link-aware
   routing metrics) has been considered for the scenarios described in
   this draft.  However, implicit signaling may not work in several
   cases of inter-technology handover.  As an example, in certain
   scenarios the handover is executed but the mobile node does not move
   between subnets (e.g. in 3GPP networks where the GGSN and the PDG are
   located in the same subnet).  In other scenarios, explicit signaling
   is required between the mobile node and a network node to report
   events related to an access link different from the one currently
   being used by the mobile node (e.g. a mobile node using a 3GPP link
   detects the availability of a WLAN link).  Such events would not be
   visible to the network node without explicit signaling.

   Various wireless technologies already have defined mobility
   management solutions that deploy explicit signaling to support
   handover (e.g. 3GPP, 3GPP2, IEEE 802.16, etc.), or are at present
   developing new solutions (e.g.  IEEE 802.11 Fast BSS Transition).
   However, such solutions are clearly defined for intra-technology
   handover (e.g. 3GPP solutions apply to handover between 3GPP
   technologies).  However, none of these wireless technologies has
   defined a solution that is applicable to inter-technology handover
   (e.g. between different IEEE 802 access links, or between a 3GPP
   access link and an IEEE 802 access link).

7.1.2.  Mitigation of Security Issues and Validation of  Transported
        Indications

   The validity of the information delivered through explicit signaling
   in the Remote Event Service and the Remote Command Service is
   essential to guarantee that the mobile node or the network node make
   handover decision and perform handover based on valid conditions.  In
   [2] the issue of validity of the indications is correctly raised,



Sreemanthula, et al.    Expires September 7, 2006              [Page 21]

Internet-Draft                ES/CS for MIH                   march 2006


   since in a generic model the receiver of the indication (e.g. the
   mobile node) may not have the ability to verify if the indication has
   e.g. been sent by a host off the actual path in use, and therefore
   possibly not capable of providing accurate indications.

   With the specific model for Remote Event Services and Remote Command
   Services described in this document, as described in section 9 a
   "relationship" is generated between the mobile node and an MME
   through a process of discovery and registration.  Authentication can
   be part of such process (possibly mutual authentication), as
   described in the security considerations.  Considering this specific
   model, information in Remote Event Service and Remote Command Service
   a re generated by a node with which the recipient of the Remote Event
   Service and Remote Command Service has setup a relationship before
   hand.  It is up to the recipient to ensure during the discovery and
   registration process that the source of Remote Event Service and
   Remote Command Service is reputable and can provide accurate
   information.  An example of how this can be achieved is based on
   authentication mechanisms and the adoption of a trust model similar
   to those adopted in current networks for authentication of roaming
   users.  The mobile node can authenticate with a home domain/network
   based on a subscription with such domain/network.  If the MME is
   located e.g. in the home network, the MME can authenticate with the
   MME based on credentials the mobile node possesses as a result of the
   subscription.  If the MME is e.g. in the visited domain, a transitive
   trust model can be adopted, where the mobile node authenticates with
   the home domain/network based on a subcription and through the
   visited domain.  As a result, a security association is established
   between the mobile node and the MME.  A model similar to the one
   adopted in AAA can be adopted.





















Sreemanthula, et al.    Expires September 7, 2006              [Page 22]

Internet-Draft                ES/CS for MIH                   march 2006


         Mobile Node                                Network
   |-------------------------------------|         |---------|
   +----------+   +--------+    +--------+          +-------+
   | Appl./   |   |        |    |        |          |       |
   | Trasnp./ |   |MIHF(ES/|    |  Link  |          |  MME  |
   | Network  |   |  CS)   |    | Layers |          |       |
   |  Layers  |   |        |    |        |          |       |
   +----------+   +--------+    +--------+          +-------+
       |              |             |                   |
     +---------------------------------+                |
     |        +-----------------+      |                |
     |        |   Mapping of    |      |                |
     |        |Local Identifiers|      |                |
     |        +-----------------+      |                |
     +---------------------------------+                |
       |              |             |                   |
   +--------------------------------------------------------+
   |                      Discovery                         |
   +--------------------------------------------------------+
       |              |             |                   |
   +--------------------------------------------------------+
   |                     Registration                       |
   | +----------------------------------------------------+ |
   | |                  Authentication                    | |
   | +----------------------------------------------------+ |
   |                                                        |
   +--------------------------------------------------------+
       |              |             |                   |
       |             Security Association               |
       |<==============================================>|
       |              |             |                   |
       |           Media Independent Host ID            |
       |<==============================================>|
       |              |             |                   |
   +----------+   +--------+    +--------+          +-------+
   |-------------------------------------|         |---------|
       Legend: ===== shared between

   Fig.12 Mobile Node - MME Relationship and Mapping of Identifiers.


7.1.3.  Mapping of Identifiers

   [2] raises a legitimate issue regarding the fact that typically the
   IP layer, the link layer, the transport layer and the application
   layer use different identifiers, and therefore reporting of
   information regarding these layers to a remote node may require
   matching the various identifiers.



Sreemanthula, et al.    Expires September 7, 2006              [Page 23]

Internet-Draft                ES/CS for MIH                   march 2006


   When local event services generate indications within a host (e.g.
   the mobile node), the host has detailed knowledge of the various
   identifiers used at the different layers (e.g. the IP address, the
   MAC addresses for the various IEEE 802 accesses, etc.).  As depicted
   in figure 12, an MIHF located in the mobile node can maintain a local
   mapping of the various identifiers.  When the mobile node discovers
   and registers with another network node (e.g. an MME), an identifier
   specific to Remote Event Services and Remote Command Services can be
   adopted to uniquely identify the mobile node , e.g. a Media
   Independent Host Identifier.  The Media Independent Host Identifier
   can be e.g. assigned to the mobile node by the home network as part
   of a set of subcription credentials.  The Media Independent Host
   Identifier could be a new identifier, or an existing identifier could
   be reused (e.g.  NAI).  Subsequently, all the remote even
   notifications and remote command exchanges can be based on the Media
   Independent Host Identifier, therefore limiting the need to maintain
   the mapping between different identifiers at different layers local
   to the host.

7.2.  Transport Selection Requirements

   A transport MUST be selected for the event and command services based
   on general protocol requirements discussed in this draft.

   o  Provide a remote ES/CS service transport mechanism which works
      with both IPv6 and IPv4.

   o  Enable efficient, optimized and timely delivery of ES/CS
      information.

   o  Distinguish between the packet source and query source (allow
      proxies).

   o  Enable NAT traversal for IPv4 networks.

   o  Enable Firewall traversal for IPv4 and IPv6 networks.

   o  Optionally allow for multiple queries per transport session.

   o  Optionally ensure compatability between the ES/CS transport and
      those required for information services transport.

   o  Describe an ES/CS discovery mechansism for IPv4 and IPv6 hosts.

   o  Provide a common discovery method regardless of whether the ES/
      CS-Server is on the same subnet, or deep within the network.





Sreemanthula, et al.    Expires September 7, 2006              [Page 24]

Internet-Draft                ES/CS for MIH                   march 2006


   o  Optionally ensure compatability between the Event and Command
      Services over IP, and those required for information services
      discovery mechansisms.

   o  Allow for more than one ES or CS Server to be discovered at a
      time.

   o  Provide a common SA negotiation method regardless of whether the
      ES/CS-Server is on the same subnet, or deep within the network.

   o  Protect against ES/CS-Server and wireless device impersonation
      (with authentication).

   o  Protect against data insertion and modification (provide message
      authentication).

   o  Protect against replay attacks.

   o  Provide confidentiality of query and response contents.

   o  Protect the identity of a querier against eavesdroppers.

   o  Protect ES/CS-Server and discovery resources against denial of
      service.

   o  Minimize computational and transmission resources for mobile
      clients.

   o  Provide compatability with Address or Security Association
      Mobility management, to allow use of an ES/CS server after host
      movements without renegotiating an SA.

   o  Allow for security services to be diabled.

   o  Changes to the ES/CS payload should not affect the security
      mechanisms defined in the underlying transport mechanism to ensure
      protocol modifications and evolutions defined in payload.


8.  Security Considerations

   When exchanging events and commands between hosts, extreme caution
   needs to be exercised in establishing communications securely.

   Unless endpoints are identified and authorized for communications,
   one or more service entities may be affected by state changes as a
   result of inappropriate registration, event or command reception.




Sreemanthula, et al.    Expires September 7, 2006              [Page 25]

Internet-Draft                ES/CS for MIH                   march 2006


8.1.  Event Service Considerations

   When receiving events, their impact on entities in their target layer
   (for example the link-layer for link-indications) may be well
   defined.  Their effect on other protocol layers may be unclear
   though.  This may be the case because changes to protocol entities at
   one layer do not cause changes in another, or because the event is
   not considered trustable or authoritative [2].

   Event indications are therefore likely to be interpreted as hints by
   other protocol layers, without necessarily modifying protocol state.

   Where unauthorized third parties impersonating legitimate ES entities
   can generate hints, attackers can cause damage to communications to
   or from a mobile node.  Such bogus hints can potentially cause
   additional packet transmissions at other layers, cause a host to be
   denied service or cause non-preferred services to be selected.

   Unless appropriate security mechanism and a security model are
   adopted, attacks may be particularly simple on a wireless medium,
   where even valid event messages may be replayed at a later stage by
   an attacker.

   As event services allow events to be delivered across multiple IP
   forwarding hops, spoofed ES messages potentially may arrive from
   anywhere on the Internet.  In order to mitigate this issue, where
   signaling is constrained to be within an IP subnet, link-local
   signaling may be appropriate [4][5].

   For event services generated beyond the local link, security
   mechanisms need to be in place to ensure that the node receiving an
   ES message can verify the source of the message and the validity of
   the message (e.g. to avoid tampering or injection of bogus ES
   messages).

   Events sent to network side ES entities may cause changes to services
   provided to a wireless terminal.  Such events could then generate
   further events and commands to be generated.  Also, the mobile node
   to which the bogus events referred may be unaware of the event
   delivery, or indeed of any reaction to the event within the network.

8.2.  Command Service Considerations

   Command services experience most of the same attacks as event
   services, although their effects may be even more severe.  CS deal
   with impending, typically mandatory, state changes which control the
   association and allocated resources of the network or mobile node.
   Therefore, a recipient of a command may feel compelled to comply with



Sreemanthula, et al.    Expires September 7, 2006              [Page 26]

Internet-Draft                ES/CS for MIH                   march 2006


   a requested state change, even if the change is not legitimate or
   useful.  This can be used to force disconnection or poor service
   selection.  This level of control over remote services requires very
   careful monitoring and access control.

8.3.  Security Considerations for Transport

   Remote Command and Event services using a transport at IP level or
   above need in several cases to traverse network boundaries.
   Considering that transport for Remote Command and Event services
   should not be restricted to IPv4-only or IPv6-only, crossing
   boundaries implies that the messages for Remote Command and Event
   services need to traverse both firewall and NATs.  It is essential
   for Remote Command and Event services to maintain the security of
   existing networks and not create new threats when crossing
   boundaries.  At the same time, it must be ensured that Remote Command
   and Event services using a transport at IP level can cross NATs and
   firewalls.


9.  IANA Considerations

   The IANA provide registry services for a large number of protocol
   identifiers used within IETF-related protocols.

   The IEEE standards association maintains its own registries for
   organizationally unique identifiers, ethertypes, and logical link
   control identifiers.

   This document does not in itself cause changes or demands to be
   placed upon the IANA or IEEE registries.

   Subsequent development of standards which may reference or create
   IANA or IEEE registries have the potential induce changes of loads
   particular registries.

   Proposals for Remote Event Services and Remote Command Services need
   to ensure that any envisaged use development of registries are
   compatible with the registry operation's charter and resources.


10.  Conclusions

   The scenarios describing the problem in the draft show the possible
   usage extent of event and command services in aiding the inter-system
   mobility.  Event and command services can serve inter-system
   handovers by providing an interface between the multi-access handover
   logic to the functional entities that executes mobility signaling in



Sreemanthula, et al.    Expires September 7, 2006              [Page 27]

Internet-Draft                ES/CS for MIH                   march 2006


   the mobile node or in the network.


11.  Acknowledgments

   The author would like to acknowledge and thank the participants of
   this working group and IEEE 802.21 community for openly discussing
   the problem and showing interest to solve it.

12.  References

   [1]  Daley, G. and S. Faccin, "Requirements for a Media Independent
        Handover Information Service draft-faccin-mih-infoserv-00.txt",
        June 2005.

   [2]  Adoba, B., "Architectural Implications of Link Indications
        draft-iab-link-indications-03.txt", June 2005.

   [3]  Koodli, R., "RFC4068: Fast Handovers for Mobile IPv6",
        July 2005.

   [4]  Deering, S. and R. Hinden, "RFC2460: Internet Protocol, Version
        6 (IPv6) Specification", December 1998.

   [5]  Hinden, R. and S. Deering, "RFC3513: Internet Protocol Version 6
        (IPv6) Addressing Architecture", April 2003.

   [6]  Manner, J. and M. Kojo, "RFC3753: Mobility Related Terminology",
        June 2004.






















Sreemanthula, et al.    Expires September 7, 2006              [Page 28]

Internet-Draft                ES/CS for MIH                   march 2006


Authors' Addresses

   Srinivas Sreemanthula
   Nokia
   NH3:400
   6000 Connection Dr.
   Irving, TX  75039
   USA

   Phone: +1 9728945000
   Email: srinivas.sreemanthula@nokia.com


   Stefano Faccin
   Nokia
   NH3:400
   6000 Connection Dr.
   Irving, TX  75039
   USA

   Phone: +1 9728945000
   Email: stefano.faccin@nokia.com


   Eleanor Hepworth
   Siemens Roke Manor
   Romsey
   Hants  S051 0ZN
   UK

   Phone:
   Email: eleanor.hepworth@roke.co.uk


   Greg Daley
   Panasonic Digital Networking Laboratory
   2 Research Way
   Princeton, New Jersey  08540
   USA

   Phone: +1 609 734 7334
   Email: greg.daley@research.panasonic.com









Sreemanthula, et al.    Expires September 7, 2006              [Page 29]

Internet-Draft                ES/CS for MIH                   march 2006


Intellectual Property Statement

   The IETF takes no position regarding the validity or scope of any
   Intellectual Property Rights or other rights that might be claimed to
   pertain to the implementation or use of the technology described in
   this document or the extent to which any license under such rights
   might or might not be available; nor does it represent that it has
   made any independent effort to identify any such rights.  Information
   on the procedures with respect to rights in RFC documents can be
   found in BCP 78 and BCP 79.

   Copies of IPR disclosures made to the IETF Secretariat and any
   assurances of licenses to be made available, or the result of an
   attempt made to obtain a general license or permission for the use of
   such proprietary rights by implementers or users of this
   specification can be obtained from the IETF on-line IPR repository at
   http://www.ietf.org/ipr.

   The IETF invites any interested party to bring to its attention any
   copyrights, patents or patent applications, or other proprietary
   rights that may cover technology that may be required to implement
   this standard.  Please address the information to the IETF at
   ietf-ipr@ietf.org.


Disclaimer of Validity

   This document and the information contained herein are provided on an
   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
   ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
   INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
   INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.


Copyright Statement

   Copyright (C) The Internet Society (2006).  This document is subject
   to the rights, licenses and restrictions contained in BCP 78, and
   except as set forth therein, the authors retain all their rights.


Acknowledgment

   Funding for the RFC Editor function is currently provided by the
   Internet Society.




Sreemanthula, et al.    Expires September 7, 2006              [Page 30]


21-06-0503-03-0000-es-cs-hl-reqs.doc