applicability statement of nsis protocols in mobile environments...

7
Applicability Statement of NSIS Protocols in Mobile Environments draft-ietf-nsis-applicability- mobility-signaling-06.txt Takako Sanda, Xiaoming Fu, Seong-Ho Jeong, Jukka Manner and Hannes Tsch ofenig IETF #68 in Prague 20 Mar. 2007

Upload: blake-porter

Post on 20-Jan-2018

212 views

Category:

Documents


0 download

DESCRIPTION

3 Changes Between -05 and -06 (2/2) Similar operation details and figures were removed from ‘Interaction with MIP tunneling’ section Problem Statement section is cleaned up  Re-structured  ‘NSIS approach’ for each problem are added

TRANSCRIPT

Page 1: Applicability Statement of NSIS Protocols in Mobile Environments draft-ietf-nsis-applicability-mobility-signaling-06.txt…

Applicability Statement of NSIS Protocols in Mobile Environments

draft-ietf-nsis-applicability-mobility-signaling-06.txt

Takako Sanda, Xiaoming Fu, Seong-Ho Jeong, Jukka Manner and Hannes Tschofenig

IETF #68 in Prague20 Mar. 2007

Page 2: Applicability Statement of NSIS Protocols in Mobile Environments draft-ietf-nsis-applicability-mobility-signaling-06.txt…

2

Changes Between -05 and -06 (1/2)

• Chapters/Sections are re-structuredTopics were divided into two categories, ‘Main’ and

‘Further Study’ ‘Main’ part explains how NSIS protocols handle basic

mobility mechanisms, i.e., route change management and interaction with MIPv4/v6

- No ‘specific parameters’ or ‘specific operations’ are here ‘Further Study’ part introduces “enhancements” of

mobility management in NSIS - Potential issues and possible approaches (which contains

specific operations) are introduced here- However detailed discussions are out-of-scope of this draft

Page 3: Applicability Statement of NSIS Protocols in Mobile Environments draft-ietf-nsis-applicability-mobility-signaling-06.txt…

3

Changes Between -05 and -06 (2/2)

• Similar operation details and figures were removed from ‘Interaction with MIP tunneling’ section

• Problem Statement section is cleaned upRe-structured‘NSIS approach’ for each problem are added

Page 4: Applicability Statement of NSIS Protocols in Mobile Environments draft-ietf-nsis-applicability-mobility-signaling-06.txt…

4

Open Issues

• Simple handling for ‘Invalid NSIS responder issue’

• NAT/FW InteractionWhen MN moves, IP address and routing are

changed. In this case, new NAT/FW pinhole need to be opened and old one should be torn. When and how should NSIS tear old pinhole?

Page 5: Applicability Statement of NSIS Protocols in Mobile Environments draft-ietf-nsis-applicability-mobility-signaling-06.txt…

5

Open Issues-- Invalid NSIS responder --

• An old AR may trigger for tearing down whole path before RESERVE from new location reaches to CRN

• NSIS approach is that GIST is conservative and careful in indicating peer failure to the NSLP in mobile networkHow GIST differentiates

between mobility and dead peer is an implementation issue

OARNAR

CRN

CN

Teardown RESERVE

Page 6: Applicability Statement of NSIS Protocols in Mobile Environments draft-ietf-nsis-applicability-mobility-signaling-06.txt…

6

Future Work

• Cleaning up Security Consideration sectionCurrently, the section just outlines a number of

options and their pros/cons• Cleaning up Terminology section• Cleaning up Further Study section

Page 7: Applicability Statement of NSIS Protocols in Mobile Environments draft-ietf-nsis-applicability-mobility-signaling-06.txt…

7

Schedule

• End March - End May: Discuss open issues and ‘Future Work’

• Mid. June: Submitting -07

• Early July (before IETF#69):Discuss WGLC comments at IETF69