draft-ietf-dmm-requirements-11.txt   draft-ietf-dmm-requirements-12.txt 
Network Working Group H. Chan (Ed.) Network Working Group H. Chan (Ed.)
Internet-Draft Huawei Technologies (more Internet-Draft Huawei Technologies (more
Intended status: Informational co-authors on P. 17) Intended status: Informational co-authors on P. 17)
Expires: May 25, 2014 D. Liu Expires: June 5, 2014 D. Liu
China Mobile China Mobile
P. Seite P. Seite
Orange Orange
H. Yokota H. Yokota
KDDI Lab KDDI Lab
J. Korhonen J. Korhonen
Broadcom Communications Broadcom Communications
November 21, 2013 December 2, 2013
Requirements for Distributed Mobility Management Requirements for Distributed Mobility Management
draft-ietf-dmm-requirements-11 draft-ietf-dmm-requirements-12
Abstract Abstract
This document defines the requirements for Distributed Mobility This document defines the requirements for Distributed Mobility
Management (DMM). The hierarchical structure in traditional wireless Management (DMM). The hierarchical structure in traditional wireless
networks has led primarily to centralized deployment models. As some networks has led primarily to centralized deployment models. As some
wireless networks are evolving away from the hierarchical structure, wireless networks are evolving away from the hierarchical structure,
a distributed model for mobility management can be useful to them. a distributed model for mobility management can be useful to them.
Requirements Language Requirements Language
skipping to change at page 1, line 49 skipping to change at page 1, line 49
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet- working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/. Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
This Internet-Draft will expire on May 25, 2014. This Internet-Draft will expire on June 5, 2014.
Copyright Notice Copyright Notice
Copyright (c) 2013 IETF Trust and the persons identified as the Copyright (c) 2013 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of (http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
skipping to change at page 7, line 48 skipping to change at page 7, line 48
| |
+----+ +----+
| MN | | MN |
+----+ +----+
Figure 2. Distributed mobility management. Figure 2. Distributed mobility management.
Mobility management may be partially or fully distributed Mobility management may be partially or fully distributed
[I-D.yokota-dmm-scenario]. In the former case only the data plane is [I-D.yokota-dmm-scenario]. In the former case only the data plane is
distributed, implicitly assuming separation of data and control distributed, implicitly assuming separation of data and control
planes as described in [I-D.wakikawa-netext-pmip-cp-up-separtion]. planes as described in [I-D.wakikawa-netext-pmip-cp-up-separation].
Fully distributed mobility management implies that both the data Fully distributed mobility management implies that both the data
plane and the control plane are distributed. While mobility plane and the control plane are distributed. While mobility
management can be distributed, it is not necessary for other management can be distributed, it is not necessary for other
functions such as subscription management, subscription database, and functions such as subscription management, subscription database, and
network access authentication to be similarly distributed. network access authentication to be similarly distributed.
A distributed mobility management scheme for a flat mobile network of A distributed mobility management scheme for a flat mobile network of
access nodes is proposed in [Paper-Distributed.Dynamic.Mobility]. access nodes is proposed in [Paper-Distributed.Dynamic.Mobility].
Its benefits over centralized mobility management have been shown Its benefits over centralized mobility management have been shown
through simulations [Paper-Distributed.Centralized.Mobility]. through simulations [Paper-Distributed.Centralized.Mobility].
skipping to change at page 12, line 23 skipping to change at page 12, line 23
function as usual, and (b) enable inter-domain operation if function as usual, and (b) enable inter-domain operation if
desired. desired.
This requirement addresses the related problem PS7 described in This requirement addresses the related problem PS7 described in
Section 4. Section 4.
5.6. Security considerations 5.6. Security considerations
REQ6: Security considerations REQ6: Security considerations
A DMM solution MUST not introduce new security risks or A DMM solution MUST NOT introduce new security risks or
amplify existing security risks against which the existing amplify existing security risks against which the existing
security mechanisms/protocols cannot offer sufficient security mechanisms/protocols cannot offer sufficient
protection. protection.
Motivation: Various attacks such as impersonation, denial of Motivation: Various attacks such as impersonation, denial of
service, man-in-the-middle attacks, and so on, may be launched service, man-in-the-middle attacks, and so on, may be launched
in a DMM deployment. For instance, an illegitimate node may in a DMM deployment. For instance, an illegitimate node may
attempt to access a network providing DMM. Another example is attempt to access a network providing DMM. Another example is
that a malicious node can forge a number of signaling messages that a malicious node can forge a number of signaling messages
thus redirecting traffic from its legitimate path. thus redirecting traffic from its legitimate path.
skipping to change at page 14, line 27 skipping to change at page 14, line 27
progress), July 2013. progress), July 2013.
[I-D.wakikawa-netext-pmip-cp-up-separation] [I-D.wakikawa-netext-pmip-cp-up-separation]
Wakikawa, R., Pazhyannur, R., and S. Gundavelli, Wakikawa, R., Pazhyannur, R., and S. Gundavelli,
"Separation of Control and User Plane for Proxy Mobile "Separation of Control and User Plane for Proxy Mobile
IPv6", draft-wakikawa-netext-pmip-cp-up-separation-00 IPv6", draft-wakikawa-netext-pmip-cp-up-separation-00
(work in progress), July 2013. (work in progress), July 2013.
[I-D.yokota-dmm-scenario] [I-D.yokota-dmm-scenario]
Yokota, H., Seite, P., Demaria, E., and Z. Cao, "Use case Yokota, H., Seite, P., Demaria, E., and Z. Cao, "Use case
scenarios for Distributed Mobility Management", scenarios for Distributed Mobility Management",
draft-yokota-dmm-scenario-00 (work in progress), draft-yokota-dmm-scenario-00 (work in progress),
October 2010. October 2010.
[Paper-Distributed.Centralized.Mobility] [Paper-Distributed.Centralized.Mobility]
Bertin, P., Bonjour, S., and J-M. Bonnin, "A Distributed Bertin, P., Bonjour, S., and J-M. Bonnin, "A Distributed
or Centralized Mobility", Proceedings of Global or Centralized Mobility", Proceedings of Global
Communications Conference (GlobeCom), December 2009. Communications Conference (GlobeCom), December 2009.
[Paper-Distributed.Dynamic.Mobility] [Paper-Distributed.Dynamic.Mobility]
Bertin, P., Bonjour, S., and J-M. Bonnin, "A Distributed Bertin, P., Bonjour, S., and J-M. Bonnin, "A Distributed
Dynamic Mobility Management Scheme Designed for Flat IP Dynamic Mobility Management Scheme Designed for Flat IP
Architectures", Proceedings of 3rd International Architectures", Proceedings of 3rd International
Conference on New Technologies, Mobility and Security Conference on New Technologies, Mobility and Security
(NTMS), 2008. (NTMS), 2008.
[Paper-Distributed.Mobility.MIP] [Paper-Distributed.Mobility.MIP]
Chan, H., "Distributed Mobility Management with Mobile Chan, H., "Distributed Mobility Management with Mobile
IP", Proceedings of IEEE International Communication IP", Proceedings of IEEE International Communication
Conference (ICC) Workshop on Telecommunications: from Conference (ICC) Workshop on Telecommunications: from
Research to Standards, June 2012. Research to Standards, June 2012.
[Paper-Distributed.Mobility.PMIP] [Paper-Distributed.Mobility.PMIP]
Chan, H., "Proxy Mobile IP with Distributed Mobility Chan, H., "Proxy Mobile IP with Distributed Mobility
Anchors", Proceedings of GlobeCom Workshop on Seamless Anchors", Proceedings of GlobeCom Workshop on Seamless
Wireless Mobility, December 2010. Wireless Mobility, December 2010.
[Paper-Distributed.Mobility.Review] [Paper-Distributed.Mobility.Review]
Chan, H., Yokota, H., Xie, J., Seite, P., and D. Liu, Chan, H., Yokota, H., Xie, J., Seite, P., and D. Liu,
"Distributed and Dynamic Mobility Management in Mobile "Distributed and Dynamic Mobility Management in Mobile
Internet: Current Approaches and Issues, Journal of Internet: Current Approaches and Issues", Journal of
Communications, vol. 6, no. 1, pp. 4-15, Feb 2011.", Communications, vol. 6, no. 1, pp. 4-15, February 2011.
Proceedings of GlobeCom Workshop on Seamless Wireless
Mobility, February 2011.
[Paper-Distributed.Mobility.SAE] [Paper-Distributed.Mobility.SAE]
Fisher, M., Anderson, F., Kopsel, A., Schafer, G., and M. Fisher, M., Anderson, F., Kopsel, A., Schafer, G., and M.
Schlager, "A Distributed IP Mobility Approach for 3G SAE", Schlager, "A Distributed IP Mobility Approach for 3G SAE",
Proceedings of the 19th International Symposium on Proceedings of the 19th International Symposium on
Personal, Indoor and Mobile Radio Communications (PIMRC), Personal, Indoor and Mobile Radio Communications (PIMRC),
2008. 2008.
[Paper-Locating.User] [Paper-Locating.User]
Kirby, G., "Locating the User", Communication Kirby, G., "Locating the User", Communication
International, 1995. International, 1995.
[Paper-Migrating.Home.Agents] [Paper-Migrating.Home.Agents]
Wakikawa, R., Valadon, G., and J. Murai, "Migrating Home Wakikawa, R., Valadon, G., and J. Murai, "Migrating Home
Agents Towards Internet-scale Mobility Deployments", Agents Towards Internet-scale Mobility Deployments",
Proceedings of the ACM 2nd CoNEXT Conference on Future Proceedings of the ACM 2nd CoNEXT Conference on Future
Networking Technologies, December 2006. Networking Technologies, December 2006.
[Paper-Mobile.Data.Offloading] [Paper-Mobile.Data.Offloading]
Lee, K., Lee, J., Yi, Y., Rhee, I., and S. Chong, "Mobile Lee, K., Lee, J., Yi, Y., Rhee, I., and S. Chong, "Mobile
Data Offloading: How Much Can WiFi Deliver?", SIGCOMM Data Offloading: How Much Can WiFi Deliver?", SIGCOMM
2010, 2010. 2010, 2010.
[RFC3753] Manner, J. and M. Kojo, "Mobility Related Terminology", [RFC3753] Manner, J. and M. Kojo, "Mobility Related Terminology",
RFC 3753, June 2004. RFC 3753, June 2004.
skipping to change at page 17, line 46 skipping to change at page 17, line 40
ZTE ZTE
Email: tso@zteusa.com Email: tso@zteusa.com
- -
Carlos J. Bernardos Carlos J. Bernardos
Universidad Carlos III de Madrid Universidad Carlos III de Madrid
Av. Universidad, 30, Leganes, Madrid 28911, Spain Av. Universidad, 30, Leganes, Madrid 28911, Spain
Email: cjbc@it.uc3m.es Email: cjbc@it.uc3m.es
- -
Peter McCann Peter McCann
Huawei Technologies Huawei Technologies
Email: PeterMcCann@huawei.com Email: Peter.McCann@huawei.com
- -
Seok Joo Koh Seok Joo Koh
Kyungpook National University, Korea Kyungpook National University, Korea
Email: sjkoh@knu.ac.kr Email: sjkoh@knu.ac.kr
- -
Wen Luo Wen Luo
ZTE ZTE
No.68, Zijinhua RD,Yuhuatai District, Nanjing, Jiangsu 210012, China No.68, Zijinhua RD,Yuhuatai District, Nanjing, Jiangsu 210012, China
Email: luo.wen@zte.com.cn Email: luo.wen@zte.com.cn
- -
 End of changes. 15 change blocks. 
20 lines changed or deleted 18 lines changed or added

This html diff was produced by rfcdiff 1.41. The latest version is available from http://tools.ietf.org/tools/rfcdiff/