Internet DRAFT - draft-ietf-mobileip-vip
draft-ietf-mobileip-vip
Internet Engineering Task Force Fumio Teraoka
INTERNET-DRAFT SonyCSL
Keisuke Uehara
University of Electro-Comm.
July 1993
The Virtual Network Protocol for Host Mobility
Status of this Memo
This document is an Internet Draft. Internet Drafts are working
documents of the Internet Engineering Task Force (IETF), its Areas,
and its Working Groups. Note that other groups may also distribute
working documents as Internet Drafts.
Internet Drafts are draft documents valid for a maximum of six
months. Internet Drafts may be updated, replaced, or obsoleted by
other documents at any time. It is not appropriate to use Internet
Drafts as reference material or to cite them other than as a
``working draft'' or ``work in progress.''
This document has been presented to, and is being evaluated by,
the "Mobile IP" working group of the IETF. This document is being
published as an Internet Draft in order to allow the general IETF
community the opportunity to gain a wider understanding of the issues
involved in mobile IP routing, as well as to understand the specific
solution proposed in this document. This document has not received
any formal endorsement from the Mobile IP working group.
Abstract
This memo describes the general virtual network protocol that
provides the transport layer with host migration transparency. This
protocol is based on the concept of a `virtual network' and the
`propagating cache method'[1]. Basically, this protocol can be
applied to any connectionless network layer protocol. This memo also
describes two virtual network protocols: `VIP' (Virtual Internet
Protocol) and `ISO-VIP'. The former is derived from IP, the network
layer protocol of Internet, while the latter is derived from CLNP,
the connectionless-mode network layer protocol of ISO.
1. Overview of the Protocol
Host migration transparency can be defined as an environment in
Expires: January 1994 [Page 1]
INTERNET-DRAFT VIP July 1993
which a user is unaware of physical migration of hosts, or an
application program is unaware of physical migration of its peers.
According to the protocol layering based on the OSI reference model,
the network layer should provide host migration transparency. There
are two key services in the network layer for host migration
transparency: `migration transparent host addressing' and `migration
transparent connectionless-mode communication'[1]. The `concept of a
virtual network' was introduced to provide the former, while the
`propagating cache method' was proposed to achieve the latter.
According to the virtual network concept, each host is logically
connected to the same virtual network called the `home network' even
if it physically moves. Therefore, each host has an immutable
network address, which can be thought of as a `host identifier'.
Such addresses are called `virtual network addresses' or `VN-
addresses'. Since the network layer provides the transport layer
with VN-addresses, host migration becomes transparent to transport
and higher layers.
To deliver packets, a host must have another network address
which indicates physical location of the host. Such addresses are
called `physical network addresses' or `PN-addresses'. Since the
transport layer specifies hosts by their VN-addresses, the network
layer must resolve VN-addresses into corresponding PN-addresses. To
incorporate the function for such address resolution in the OSI
reference model, the network layer is divided into two sublayers: the
`virtual network sublayer' (VN-sublayer) and the `physical network
sublayer' (PN-sublayer). The VN-sublayer resolves VN-addresses into
PN-addresses, and then the PN-sublayer delivers packets by using PN-
addresses.
The VN-sublayer employs the `propagating cache method' for
efficient address resolution. In this method, each host/router has a
cache called the `Address Mapping Table (AMT)' to store the relation
between VN-addresses and PN-addresses. When a host/router receives a
packet, it caches the relation between the VN/PN-addresses into its
AMT. Upon transmission, the source host specifies the VN-address of
the destination host as the destination PN-address if it has no AMT
entry for the destination host. Such a packet heads for the home
network of the destination host and address resolution is executed by
either an intermediate router or a router in the home network of the
destination host. Once this source host receives a reply packet from
the destination host, it creates the AMT entry for the destination
host and it can execute address resolution at the next transmission
time.
Expires: January 1994 [Page 2]
INTERNET-DRAFT VIP July 1993
2. Terminology
In this memo, the following terms are used.
o virtual network addresses (VN-addresses): migration independent
host identifiers in the network layer. Each host has a VN-
address. Transport and higher layers use VN-addresses to
specify hosts. Since VN-addresses are immutable, transport and
higher layers can indicate mobile hosts no matter where they
are connected.
o physical network addresses (PN-addresses): migration dependent
host identifiers indicating host location. The PN-address of a
mobile host may change in compliance with host's location. In
other words, when a host moves, it must be assigned a temporary
PN-address by a certain mechanism such as DHCP[2] in IP
networks and the extended ES-IS protocol[3] in CLNP networks.
o home network: the subnetwork indicated by the VN-address of a
mobile host.
o address mapping table (AMT): a table held at each host or
router in the network. An AMT consists of entries, each of
which holds the relation between a VN-address and a PN-address
of a mobile host. There are two types of AMT entries:
- home AMT entries: AMT entries that are created in the home
network of a mobile host.
- cache AMT entries: AMT entries that are created in the
subnetworks other than the home network of a mobile host.
o address resolution: processing in which a VN-address is
resolved into the corresponding PN-address with the assistance
of an AMT.
o address resolver: a router that executes address resolution.
Address resolvers are classified into three types:
- primary address resolver (for a mobile host): an address
resolver that is connected to the home network of the mobile
host. A primary resolver advertises the reachability to the
mobile hosts. All primary resolvers for the mobile host
always hold its most recent AMT entry unless errors such as
network partitioning occur in the network.
- secondary address resolver (for a mobile host): an address
resolver that is connected to a subnetwork other than the
Expires: January 1994 [Page 3]
INTERNET-DRAFT VIP July 1993
home network of the mobile host. Secondary resolvers may
hold the most recent AMT entry for the host.
- temporary proxy (for a mobile host): secondary address
resolvers in the subnetwork to which the mobile host was
previously connected. A temporary proxy holds the most
recent AMT entry for the mobile host until the entry times
out unless errors occur in the network.
o family hosts (for an address resolver): hosts for which an
address resolver is a primary address resolver.
o foreign hosts (for an address resolver): hosts for which an
address resolver is not a primary address resolver.
3. The General Virtual Network Protocol
This section defines the general `virtual network protocol (VN-
protocol)' to support host mobility, which is basically applicable to
any connectionless-mode network protocol.
3.1. Packet Headers
There are two types of packet header formats, the data packet
and the control packet. The header of the data packet consists of
ten fields as follows:
o flags:
- control/data = data
- authentication: if this flag is on, this packet has
authentication data.
- address resolution only at primary: if this flag is on, only
primary resolvers for the destination host execute address
resolution.
- AMT update only at primary: if this flag is on, only primary
resolvers for the source host create or update its AMT
entry.
o source VN-address, PN-address, and address pair version number
o destination VN-address, PN-address, and address pair version
number
o holding time: the initial value of the holding time field of an
Expires: January 1994 [Page 4]
INTERNET-DRAFT VIP July 1993
AMT entry when it is created or updated by this packet.
o resolver PN-address: the PN-address of the address resolver
that executed address resolution.
o (option) authentication data
The header of the control packet consists of ten fields as
follows:
o flags:
- control/data = control
- authentication: if this flag is on, this packet has
authentication data.
- AMT update only at primary: if this flag is on, only primary
resolvers for the target system update the AMT entry.
- AMT entry creation/invalidation (CAmt/InvAmt): this flag
specifies the type of AMT entry manipulation, i.e.
creation/update (CAmt) or invalidation (InvAmt).
- broadcast InvAmt: if this flag is on, when a router has an
obsolete AMT entry, it broadcast an `InvAmt' packet to all
the subnetworks to which it is connected.
o source VN-address, PN-address, and address version number
o destination PN-address
o target system VN-address, PN-address, address version number,
and holding time
o (option) authentication data
3.2. AMT Entry
A general AMT entry consists of five fields as follows:
o VN-address: the key of this entry.
o PN-address: the requested value.
o address version number: the version number of the VN-
address/PN-address pair of this entry.
Expires: January 1994 [Page 5]
INTERNET-DRAFT VIP July 1993
o flags:
- use/free: the entry is in use or free.
- valid/invalid: the entry holds valid information or invalid
information.
- home/cache: the entry is a home AMT entry or a cache AMT
entry.
- local/not-local: the mobile host indicated by this entry is
connected to the same segment or not.
o holding time: the value of this field is decremented by one for
a certain time interval. When the value becomes zero, this
entry is deleted.
An AMT entry has one of three states: `free', `valid', or
`invalid'. In the `free' state, an AMT entry is not allocated to any
mobile host. In the `valid' state, when a router relays a packet
having older destination address information than this AMT entry, it
executes address resolution for the destination host. In the
`invalid' state, when a system receives a packet having older
destination address information than this AMT entry, it transmits an
`InvAmt' packet to the host specified by the resolver PN-address
field or the target system PN-address field of the packet. Figure 1
shows the state transition diagram of an AMT entry.
Expires: January 1994 [Page 6]
INTERNET-DRAFT VIP July 1993
receive CAmt +---------+
or data packet| |
+----------| Free |
| +------->| |<--------+
| | +---------+ |
| | | time out
| | time out |
| | | receive old data packet
V | receive new CAmt or | -----------------------
+---------+ new data packet +---------+ send InvAmt
| |<--------------------| |<--+
| Valid | | Invalid | |
| |-------------------->| |---+
+---------+ receive new InvAmt +---------+
| ^ | ^
| | | |
+-----+ +-----+
receive CAmt or receive old CAmt or
data packet InvAmt
Figure 1: AMT entry state transition diagram
+--------------+ <PR> primary
| home network | resolver
CAmt | | CAmt
(3)+--------|---- <PR> <---|-------+ <SR> secondary
| +--------------+ | resolver
InvAmt| InvAmt InvAmt | InvAmt
<-----<SR>----->(4) (2)<----<SR>----> <TP> temporary
| | proxy
| |(1) (secondary
+---------V--------+ move +--------|--------+ resolver)
| <TP> - -|- - - - - - -|- - > <MH> |
| | | | <MH> mobile
| previous network | | current network | host
+------------------+ +-----------------+
Figure 2: Host connection
3.3. Host Migration
Figure 2 depicts a packet flow when a mobile host is connected
to a subnetwork.
1. The mobile host transmits a `CAmt' packet to its home network.
On the transmission path of this `CAmt' packet, intermediate
routers create or update the AMT entry for the mobile host
Expires: January 1994 [Page 7]
INTERNET-DRAFT VIP July 1993
unless the flags field of the `CAmt' packet prohibits caching,
i.e. such intermediate routers become secondary address
resolver for the mobile host. During connecting to a
subnetwork, the mobile host continues to transmit a `CAmt'
packet for a certain time interval.
2. If an intermediate router holds an obsolete AMT entry for the
mobile host and the flags field of the `CAmt' packet indicates
`broadcast InvAmt', it broadcasts an `InvAmt' packet to all
the subnetworks to which the router is connected in order to
invalidate obsolete entries which might remain on other
routers. When a router receives such an `InvAmt' packet, if
it holds an obsolete AMT entry, it invalidates the entry and
also broadcasts the `InvAmt' packet. If it holds a newer AMT
entry or does not have the corresponding entry, it discards
the `InvAmt' packet.
3. When a primary address resolver for the mobile host receives
this `CAmt' packet, it also creates or updates the AMT entry
for the mobile host. If it holds an obsolete AMT entry for
the mobile host, it transmits another `CAmt' packet to the
network specified by the obsolete AMT entry. After routers in
the previous network receive this `CAmt' packet, they hold the
most recent AMT entry for the mobile host until it times out,
i.e. each router in the previous subnetwork becomes a
`temporary proxy' for the mobile host.
4. On the path of the `CAmt' packet transmitted by a primary
address resolver, intermediate routers create or update the
AMT entry for the mobile host unless the flags field of the
`CAmt' packet prohibits caching, i.e. they become secondary
address resolvers for the mobile host. If a router holds an
obsolete AMT entry for the mobile host and the flags field of
the `CAmt' packet indicates `broadcast InvAmt', the router
broadcasts an `InvAmt' packet to all the subnetworks to which
the router is connected in order to invalidate obsolete AMT
entries which might remain on other routers.
Figure 3 depicts a packet flow when a mobile host disconnects
from a subnetwork or is powered off.
1. The mobile host may transmit an `InvAmt' packet to its home
network.
2. On the path of the `InvAmt' packet, if an intermediate router
has an obsolete AMT entry for the mobile host and the flags
field of the `InvAmt' packet indicates `broadcast InvAmt', the
Expires: January 1994 [Page 8]
INTERNET-DRAFT VIP July 1993
router broadcasts another `InvAmt' packet to all the
subnetworks to which it is connected.
3. When a primary address resolver for the mobile host receives
the `InvAmt' packet, if it has an obsolete AMT entry for the
host and the flags field of the `InvAmt' packet indicates
`broadcast InvAmt', the primary address resolver broadcasts
another `InvAmt' packet to all the subnetworks to which it is
connected.
^ ^ ^ <PR> primary
(1)|disconnect or | | resolver
power off |InvAmt (3)|InvAmt
+--------|--------+ | +------|-------+ <SR> secondary
| <MH> -----|-----<SR>-----|---> <PR> --->| resolver
| InvAmt| |Inv | |InvAmt |
| | (2)| Amt | V | <MH> mobile
| current network | V | home network | host
+-----------------+ +--------------+
Figure 3: Host disconnection or power off
+--------------+ <PR> primary
| home network | resolver
| |
+----------|-----<PR> | <SR> secondary
| +------^-------+ resolver
| |
| +--<SR> | <TP> temporary
+---|-----+ | | | +----------+ proxy
| v | V | | | |
| <MH> <--|---+----------------|----+ | <OR> obsolete
| | ^ | | | | | AMT entry
| current | | | | <OR>--|-> <TP> |
| network | | | | | | | <S> source
+---------+ <S> <S> <S> <S> | previous | host
(a) (b) (c) (d) | network |
+----------+
Figure 4: Data communication
3.4. Data Communication
Figure 4 depicts four types of packet flows for data
communication.
Expires: January 1994 [Page 9]
INTERNET-DRAFT VIP July 1993
(a) If the source host has the AMT entry for the destination host,
it executes address resolution at transmission time. The
packet will traverse the optimal route.
(b) If the source host does not have the AMT entry for the
destination host, it sets the VN-address of the destination
host to the destination PN-address field. The packet heads
for the home network of the destination host. If an
intermediate router holds an AMT entry for the destination
host, it executes address resolution and forwards the packet.
(c) A primary address resolver ultimately receives the packet
heading for the home network of the destination host. When it
receives the packet, it executes address resolution and
forwards the packet.
(d) A router which holds an obsolete AMT entry for the destination
host executes address resolution for the packet heading for
the home network of the destination host. The packet is
forwarded to the previous network of the destination host. A
temporary proxy of the destination host in the previous
network executes address resolution and forwards the packet to
the correct location. Since the packet holds the PN-address
of the address resolver that executed incorrect address
resolution, the temporary proxy transmits an `InvAmt' packet
to it in order to invalidate the obsolete AMT entry.
When the source host receives a reply packet from the
destination host, it creates or updates the AMT entry for the
destination host. Therefore, the source host can hereafter execute
address resolution at transmission time.
3.5. Packet Conversion
If a host does not have the functions for the VN-protocol, it
transmits conventional network layer packets. When a router relays
such a packet, if it has the AMT entry for the destination host of
the packet, it converts the packet into a VN-protocol packet and
forwards it. In the worst case, such a packet reaches a primary
address resolver for the destination host and is converted into a
VN-protocol packet. When such a host receives a VN-protocol packet,
although it will ignore the header of the VN-sublayer, it correctly
recognizes the VN-address of the source host.
4. VIP: Virtual Internet Protocol
VIP (Virtual Internet Protocol) is derived from IP by applying
Expires: January 1994 [Page 10]
INTERNET-DRAFT VIP July 1993
the general VN-protocol defined in Section 3. `VIP addresses' are
introduced as VN-addresses in the VN-protocol, while IP addresses are
thought of as PN-addresses. The IP option fields of the IP header is
used for the VIP header. The size of the VIP header is 28 octets if
authentication data is not included. Table 1 shows the
correspondence of the VN-protocol to VIP. Figures 5-(a), 5-(b), and
6 depict the packet formats of VIP and the format of an AMT entry for
VIP respectively. In Figure 5-(a) and 5-(b), the beginning 20 octets
indicate the IP header and the remaining octets are the VIP header as
an IP option. Note that the IP header includes the source `VIP'
address and the VIP header includes the source `IP' address.
Table 1:Correspondence of the VN-protocol to VIP
VN-protocol | VIP
------------------|--------------------------------------------------
VN-address | VIP address
|
PN-address | IP address
|
home network | the subnetwork indicated by the network number
| of the VIP address
|
primary address | routers connected to the home network of a mobile
resolvers | host
|
secondary address | routers connected to the subnetworks other than
resolvers | the home network of a mobile host
|
temporary proxy | routers connected to the previous network of a
| mobile host
Expires: January 1994 [Page 11]
INTERNET-DRAFT VIP July 1993
0 0 0 0 0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 3 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Ver. | IHL | TOS | Total Length |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Identification |Flags| Fragment Offset |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| TTL | Protocol | Header Checksum |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Source VIP Address |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Destination IP Address |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Option Type | Option Length | Ver. |unused | Flags |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Source IP Address |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Destination VIP Address |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Source Address Version |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Destination Address Version |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Holding Time |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Resolving System IP Address |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Authentication Data |
= =
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 5-(a): Data packet
Expires: January 1994 [Page 12]
INTERNET-DRAFT VIP July 1993
0 0 0 0 0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 3 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Ver. | IHL | TOS | Total Length |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Identification |Flags| Fragment Offset |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| TTL | Protocol | Header Checksum |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Source VIP Address |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Destination IP Address |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Option Type | Option Length | Ver. |unused | Flags |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Source IP Address |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Source Address Version |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Target System VIP Address |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Target System IP Address |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Target System Address Version |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Target System Holding Time |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Authentication Data |
= =
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 5-(b): Control packet header
Expires: January 1994 [Page 13]
INTERNET-DRAFT VIP July 1993
0 0 0 0 0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 3 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| VIP Address |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| IP Address |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Address Version |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Flags | reserved |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| | | |
| | | +-- use(1)/free(0)
| | +---- valid(1)/invalid(0)
| +------ home(1)/not-home(0)
+-------- local(1)/not-local(0)
Figure 6: AMT entry for VIP
Figure 7 shows a packet flow when a host is connected to a
subnetwork. The differences between the packet flow in the VN-
protocol and VIP are:
o when a primary address resolver receives a `CAmt' packet from a
family host, it broadcasts another `CAmt' packet in the home
network in order to update the AMT entry on the other primary
address resolvers in the home network.
o when a router receives a `CAmt' from a foreign host that was
previously connected to the same subnetwork, it broadcasts the
`CAmt' in the subnetwork in order to update the AMT entry on
the other routers in the subnetwork.
Expires: January 1994 [Page 14]
INTERNET-DRAFT VIP July 1993
+-----------------+ <HR> home
|<HR> ^ <HR>| router
| (3)|CAmt |
(4) | | | <R> router
+--------|----- <HR> <-----|-------+
(5) | +-----------------+ (2) | <MH> mobile
<----<R>----> home network <----<R>----> host
InvAmt| InvAmt|
|CAmt (1)|CAmt
+-------|--------+ +-------|-------+
| <--<R>--> | | <R> |
| CAmt|(6) | move | | |
| V - -|- - - - - - - - -|- - > <MH> |
|<R> <R>| |<R> <R>|
+----------------+ +---------------+
previous network current network
Figure 7: Packet flow upon host migration in VIP
5. ISO-VIP: Extended CLNP for Mobile Host
ISO-VIP is derived from CLNP (Connectionless-mode Network
Protocol)[4] by applying the VN-protocol defined in Section 3. It is
assumed that ES-IS[5] and IS-IS[6] are used as routing information
exchange protocols. In IS-IS, an NSAP address consists of three
portions: area address, ID, and SEL. An area address is unique in a
routing domain, an ID is unique in an area, and a SEL indicates the
entity which is to receive the PDU. Although NSAP addresses remain
unchanged when an ES moves within an area according to the IS-IS
model, a temporary PN-address is assigned to an ES when it migrates
to another subnetwork even within an area in ISO-VIP. Table 2 shows
the correspondence of the VN-protocol to ISO-VIP. Figures 8 and 9
show the header formats of PDU and the AMT entry formats for ISO-VIP
respectively.
Expires: January 1994 [Page 15]
INTERNET-DRAFT VIP July 1993
Table 2: Correspondence of the VN-protocol to ISO-VIP
VN-protocol | ISO-VIP
------------------|-------------------------------------------------
VN-address | V-NSAP address (virtual NSAP address) or
| V-NET (virtual network entity title)
|
PN-address | NSAP address of NET
|
home network | the subnetwork to which the designated level1-IS
| that advertises the connectivity to the ES
| is connected
|
primary address | the level1-IS that advertises the connectivity
resolver | to the ES
|
secondary address | ISs other than primary address resolver
resolver |
|
temporary proxy | the designated level1-IS in the previous
| subnetwork of an ES
octets
+--------------------------------------+
| Destination Address Length Indicator | 1
+--------------------------------------+
| Destination Address | dst addr len
+--------------------------------------+
| Source Address Length Indicator | 1
+--------------------------------------+
| Source Virtual Address | src addr len
+--------------------------------------+
(a) Address Part
Figure 8-(a): ISO-VIP packet header: Address Part
Expires: January 1994 [Page 16]
INTERNET-DRAFT VIP July 1993
octets
+--------------------------------------+
| Param Code = ISO-VIP | 1
+--------------------------------------+
| Param Len = variable | 1
+--------------------------------------+
| Flags | 1
+--------------------------------------+
| Destination Virtual Address | dst addr len
+--------------------------------------+
| Destination Address Version | 4
+--------------------------------------+
| Source Address | src addr len
+--------------------------------------+
| Source Address Version | 4
+--------------------------------------+
| Holding Time | 4
+--------------------------------------+
| Resolver Address Length | 1
+--------------------------------------+
| Resolver Address | addr len
+--------------------------------------+
| Authentication | n
+--------------------------------------+
(b) Option part: ISO-VIP Data
Figure 8-(b): ISO-VIP packet header: Option Part: ISO-VIP Data
Expires: January 1994 [Page 17]
INTERNET-DRAFT VIP July 1993
octets
+--------------------------------------+
| Param Code = ISO-VIP | 1
+--------------------------------------+
| Param Len = variable | 1
+--------------------------------------+
| Flags | 1
+--------------------------------------+
| Source Address | src addr len
+--------------------------------------+
| Source Address Version | 4
+--------------------------------------+
| Target System Address Length | 1
+--------------------------------------+
| Target System Virtual Address | addr len
+--------------------------------------+
| Target System Address | addr len
+--------------------------------------+
| Target System Address Version | 4
+--------------------------------------+
| Target System Holding Time | 4
+--------------------------------------+
| Authentication | n
+--------------------------------------+
(c) Option part: ISO-VIP Control
Figure 8-(c): ISO-VIP packet header: Option Part: ISO-VIP Control
Expires: January 1994 [Page 18]
INTERNET-DRAFT VIP July 1993
octets
+--------------------------+
| Flags | 1
+--------------------------+
| Holding Time | 4
+--------------------------+
| Address Version Number | 4
+--------------------------+
| ID Length Indicator | 1
+--------------------------+
| ID | id len
+--------------------------+
| Address Length Indicator | 1
+--------------------------+
| Address | addr len
+--------------------------+
(a) AMT entry
+-+-+-+-+-+-+-+-+
| Flags |
+-+-+-+-+-+-+-+-+
| | |
| | +- use(1)/free(0)
| +--- valid(1)/invalid(0)
+----- home(1)/not-home(0)
(b) Flags
Figure 9: AMT entry for ISO-VIP
Author's Address:
o Fumio Teraoka
Sony Computer Science Laboratory Inc.
3-14-13 Higashigotanda, Shinagawa-ku, Tokyo 141, Japan.
Phone: +81-3-5448-4380
Email: tera@csl.sony.co.jp
o Keisuke Uehara
University of Electro-Communications.
1-5-1 Chofugaoka, Chofu, Tokyo 182, Japan.
Phone: +81-424-83-2161, ext. 4122
Email: kei@cs.uec.ac.jp
References
[1] F. Teraoka, Y. Yokote, and M. Tokoro. "A Network Architecture
Providing Host Migration Transparency," in Proc. of SIGCOMM'91,
Sep. 1991.
Expires: January 1994 [Page 19]
INTERNET-DRAFT VIP July 1993
[2] R. Droms. "Dynamic Host Configuration Protocol," Internet Draft,
Dec. 1992.
[3] ISO. "Information processing systems - Telecommunications and
information exchange between systems - End system to Intermediate
system routeing exchange protocol for use in conjunction with the
Protocol for providing the connectionless-mode network service
(ISO 8473) - Amendment 1: Dynamic discovery of OSI NSAP Addresses
by End System," ISO 9542, 1988.
[4] ISO. "Information processing systems - Data communications -
Protocol for providing the connectionless-mode network service,"
ISO 8473, 1988.
[5] ISO. "Information processing systems - Telecommunications and
information exchange between systems - End system to Intermediate
system routeing exchange protocol for use in conjunction with the
Protocol for providing the connectionless-mode network service
(ISO 8473)," ISO 9542, 1988.
[6] ISO. "Information processing systems - Telecommunications and
information exchange between systems - Intermediate system to
Intermediate system intra-domain routeing exchange protocol for
use in conjunction with the Protocol for providing the
connectionless-mode network service (ISO 8473)," ISO 10589, 1992.
Expires: January 1994 [Page 20]