TOC 
GeoprivJ. Winterbottom
Internet-DraftM. Thomson
Intended status: BCPAndrew Corporation
Expires: May 12, 2008November 09, 2007


Using HELD for Inter-LIS Communication
draft-winterbottom-geopriv-held-lis2lis-bcp-00.txt

Status of this Memo

By submitting this Internet-Draft, each author represents that any applicable patent or other IPR claims of which he or she is aware have been or will be disclosed, and any of which he or she becomes aware will be disclosed, in accordance with Section 6 of BCP 79.

Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts.

Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as “work in progress.”

The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt.

The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html.

This Internet-Draft will expire on May 12, 2008.

Abstract

This document describes how HELD can be used to support LIS to LIS communication.



Table of Contents

1.  Introduction
2.  Terminology
3.  Overview
4.  Detailed Description
5.  Examples
6.  Security Considerations
7.  IANA Considerations
8.  References
    8.1.  Normative references
    8.2.  Informative references
§  Authors' Addresses
§  Intellectual Property and Copyright Statements




 TOC 

1.  Introduction

The LIS to LIS communication requirements [I‑D.winterbottom‑geopriv‑lis2lis‑req] (Winterbottom, J. and S. Norreys, “LIS to LIS Protocol Requirements,” November 2007.) describe the need in some network environements for one LIS to consult another LIS in order to determine the location of a Device. This document describes how HELD [I‑D.ietf‑geopriv‑http‑location‑delivery] (Barnes, M., Winterbottom, J., Thomson, M., and B. Stark, “HTTP Enabled Location Delivery (HELD),” August 2009.) in conjunction with the HELD identity extensions [I‑D.winterbottom‑geopriv‑held‑identity‑extensions] (Thomson, M., Tschofenig, H., Barnes, R., and J. Winterbottom, “Use of Target Identity in HTTP-Enabled Location Delivery (HELD),” August 2009.) and the HELD measurements specification [I‑D.thomson‑geopriv‑held‑measurements] (Thomson, M. and J. Winterbottom, “Using Device-provided Location-Related Measurements in Location Configuration Protocols,” October 2009.) can be used to satisfy these requirements. No new schema is introduced by this document, recipes using existing specifications are described.



 TOC 

2.  Terminology

The key conventions and terminology used in this document are defined as follows:

This document reuses the terms Target, as defined in [RFC3693] (Cuellar, J., Morris, J., Mulligan, D., Peterson, J., and J. Polk, “Geopriv Requirements,” February 2004.).

This document uses the term Location Information Server, LIS, is used as defined in [I‑D.ietf‑geopriv‑l7‑lcp‑ps] (Tschofenig, H. and H. Schulzrinne, “GEOPRIV Layer 7 Location Configuration Protocol; Problem Statement and Requirements,” July 2009.).

Basic terms from the HELD specification [I‑D.ietf‑geopriv‑http‑location‑delivery] (Barnes, M., Winterbottom, J., Thomson, M., and B. Stark, “HTTP Enabled Location Delivery (HELD),” August 2009.) are also reused.

The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119] (Bradner, S., “Key words for use in RFCs to Indicate Requirement Levels,” March 1997.).



 TOC 

3.  Overview

The network scenario described in [I‑D.winterbottom‑geopriv‑lis2lis‑req] (Winterbottom, J. and S. Norreys, “LIS to LIS Protocol Requirements,” November 2007.) shows that in some environments the LIS publically associated with a Device cannot, on its own, determine the location of the Device. HELD provides a specification allowing a Device to obtain location information from a Location Information Server (LIS). This specification extends HELD by chaining a location request from the publically accessible LIS to a LIS controlled by a regional access provider. The publically accessible LIS can also add measured and identity parameters relating to the Device in the HELD locationRequest made to the access provider LIS. Resuing HELD in this manner reduces the number of protocols that need to be supported on a LIS, it simplfies development, reduces complexity, and improves interoperability.



 TOC 

4.  Detailed Description

In a typical environment using HELD, the Target discovers the LIS using one of the methods described in [I‑D.thomson‑geopriv‑lis‑discovery] (Thomson, M. and J. Winterbottom, “Discovering the Local Location Information Server (LIS),” September 2007.), and makes a request for location information. The ISP LIS receives the location request from the Target, adds additional information, and then sends the location request on to the regional access provider LIS. The regional access provider LIS uses the extra information provided in the ISP LIS to determine the location of the Device and provide the PIDF-LO [RFC4119] (Peterson, J., “A Presence-based GEOPRIV Location Object Format,” December 2005.) in the requested form.

The ISP LIS will, in many cases creates the identity used in the pres field of the PIDF-LO. This value needs to be conveyed from the ISP LIS to the regional access provider LIS. HELD can convey this value using a URI identity extension as described in [I‑D.winterbottom‑geopriv‑held‑identity‑extensions] (Thomson, M., Tschofenig, H., Barnes, R., and J. Winterbottom, “Use of Target Identity in HTTP-Enabled Location Delivery (HELD),” August 2009.).

The ISP LIS may need to provide Device network attachment information, in the form of measurements, to the regional access provider LIS to aid it in determing the Device's location. A comprehensive set of measurements and how they are used is provided in [I‑D.thomson‑geopriv‑held‑measurements] (Thomson, M. and J. Winterbottom, “Using Device-provided Location-Related Measurements in Location Configuration Protocols,” October 2009.). HELD supports the inclusion of these additional elements without modification.

The ISP LIS should not send a request for a location URI to the regional access provider LIS. This is because the regional access provider LIS is, in most cases, invisible to entities other than the ISP LIS. A location URI contains the hostname of the LIS that will service a location request, which is the ISP LIS and not the regional access provider LIS. Consequently only the ISP LIS should create location URIs for the Device. A regional access provider LIS receiving a request for a location URI from an ISP LIS should respond with a "cannotProvideLiType" error.

The ISP LIS should pass all elements included in the Device's location request to the regional access provider LIS, with the exception of a request for a location URI which was described in the previous paragraph. This behaviour ensures that any new options made available to the LIS through HELD can be supported without necessarily requiring changes to the ISP LIS.

The ISP LIS should provide usage in any returned location object that match the user's desired settings, or in the absence of these, the default settings for <retransmission-allowed> and <retension-expiry> as applied by the ISP LIS.

Basic HELD is provided with an HTTP binding, which is suitable for the application of a Device requesting its own location. Where a nailed up connection between two entities and continual transaction streaming is required, HTTP may be less appropriate. In this configuration an alternative transport, such as BEEP [I‑D.thomson‑geopriv‑held‑beep] (Thomson, M. and J. Winterbottom, “A BEEP Binding for the HELD Protocol,” July 2009.), may be used.



 TOC 

5.  Examples

In this example a DSL service is provided with an L2TP tunnel forming the link between the BRAS in the regional access provider's network, and the NAS in the ISP. The Device has requested a civic location. The resulting location request sent from the ISP LIS to the regional access provider LIS is shown in Figure 1 (LIS to LIS Location Request with L2TP Measurements).



<locationRequest
       xmlns="urn:ietf:params:xml:ns:geopriv:held" responseTime="8">
  <locationType>civic</locationType>
  <heldDevice  xmlns="urn:ietf:params:xml:ns:geopriv:held:id">
    <uri type="presentity">pres:3sijsskcknckj@ls.example.com</uri>
  </heldDevice>
  <measurements xmlns="urn:ietf:params:xml:ns:geopriv:held:lm">
    <dsl>
      <l2tp>
        <src>192.0.2.10</src>
        <dest>192.0.2.61</dest>
        <session>528</session>
      </l2tp>
    </dsl>
  </measurements>
</locationRequest>

 Figure 1: LIS to LIS Location Request with L2TP Measurements 

The regional access provider LIS would use the L2TP tunnel information to establish the location of the Device. It would then create a PIDF-LO using the URI specified as a <heldDevice> as the presentity value. The resulting location response from the access provider LIS to the ISP LIS may look something similar to Figure 2 (Regional Access Provider LIS Response). On receiving this response the ISP LIS will need to add the usage rules specified by the Device or use local defaults if no Device instructions are available.



<locationResponse xmlns="urn:ietf:params:xml:ns:geopriv:held">
  <presence xmlns="urn:ietf:params:xml:ns:pidf"
            entity="pres:3sijsskcknckj@ls.example.com">
   <tuple id="3b650sf789nd">
    <status>
      <geopriv xmlns="urn:ietf:params:xml:ns:pidf:geopriv10">
        <location-info>
          <ca:civicAddress
            xmlns:ca="urn:ietf:params:xml:ns:pidf:geopriv10:civicAddr"
            xml:lang="en-au">
            <ca:country>AU</ca:country>
            <ca:A1>NSW</ca:A1>
            <ca:A3>Wollongong</ca:A3>
            <ca:A4>Gwynneville</ca:A4>
            <ca:STS>Northfield Avenue</ca:STS>
            <ca:LMK>University of Wollongong</ca:LMK>
            <ca:FLR>2</ca:FLR>
            <ca:NAM>Andrew Corporation</ca:NAM>
            <ca:PC>2500</ca:PC>
            <ca:BLD>39</ca:BLD>
            <ca:SEAT>WS-183</ca:SEAT>
            <ca:POBOX>U40</ca:POBOX>
          </ca:civicAddress>
        </location-info>
        </usage-rules>
      </geopriv>
    </status>
    <timestamp>2007-10-31T03:42:28+00:00</timestamp>
   </tuple>
  </presence>
</locationResponse>

 Figure 2: Regional Access Provider LIS Response 



 TOC 

6.  Security Considerations

A strong trust relationship needs to exist between the ISP and the regional access provider in order for this type of access network to operate successfully. Since this document describes the exchange of Device location information between two trusted parties it does not mandate the use of any specific crypto techniques but recommends the use of TLS with client-side and server-side certificates for authentication.



 TOC 

7.  IANA Considerations

There are no IANA considerations for this document.



 TOC 

8.  References



 TOC 

8.1. Normative references

[RFC2119] Bradner, S., “Key words for use in RFCs to Indicate Requirement Levels,” BCP 14, RFC 2119, March 1997 (TXT, HTML, XML).
[RFC2818] Rescorla, E., “HTTP Over TLS,” RFC 2818, May 2000 (TXT).
[I-D.ietf-geopriv-http-location-delivery] Barnes, M., Winterbottom, J., Thomson, M., and B. Stark, “HTTP Enabled Location Delivery (HELD),” draft-ietf-geopriv-http-location-delivery-16 (work in progress), August 2009 (TXT).
[I-D.winterbottom-geopriv-lis2lis-req] Winterbottom, J. and S. Norreys, “LIS to LIS Protocol Requirements,” draft-winterbottom-geopriv-lis2lis-req-01 (work in progress), November 2007 (TXT).
[I-D.winterbottom-geopriv-held-identity-extensions] Thomson, M., Tschofenig, H., Barnes, R., and J. Winterbottom, “Use of Target Identity in HTTP-Enabled Location Delivery (HELD),” draft-winterbottom-geopriv-held-identity-extensions-10 (work in progress), August 2009 (TXT).
[I-D.thomson-geopriv-held-measurements] Thomson, M. and J. Winterbottom, “Using Device-provided Location-Related Measurements in Location Configuration Protocols,” draft-thomson-geopriv-held-measurements-05 (work in progress), October 2009 (TXT).


 TOC 

8.2. Informative references

[RFC4119] Peterson, J., “A Presence-based GEOPRIV Location Object Format,” RFC 4119, December 2005 (TXT).
[RFC3693] Cuellar, J., Morris, J., Mulligan, D., Peterson, J., and J. Polk, “Geopriv Requirements,” RFC 3693, February 2004 (TXT).
[I-D.thomson-geopriv-held-beep] Thomson, M. and J. Winterbottom, “A BEEP Binding for the HELD Protocol,” draft-thomson-geopriv-held-beep-05 (work in progress), July 2009 (TXT).
[I-D.thomson-geopriv-lis-discovery] Thomson, M. and J. Winterbottom, “Discovering the Local Location Information Server (LIS),” draft-thomson-geopriv-lis-discovery-03 (work in progress), September 2007 (TXT).
[I-D.ietf-geopriv-l7-lcp-ps] Tschofenig, H. and H. Schulzrinne, “GEOPRIV Layer 7 Location Configuration Protocol; Problem Statement and Requirements,” draft-ietf-geopriv-l7-lcp-ps-10 (work in progress), July 2009 (TXT).


 TOC 

Authors' Addresses

  James Winterbottom
  Andrew Corporation
  PO Box U40
  University of Wollongong, NSW 2500
  AU
Email:  james.winterbottom@andrew.com
  
  Martin Thomson
  Andrew Corporation
  PO Box U40
  University of Wollongong, NSW 2500
  AU
Email:  martin.thomson@andrew.com


 TOC 

Full Copyright Statement

Intellectual Property