Internet DRAFT - draft-ma-netext-pmip-handover

draft-ma-netext-pmip-handover






Network Working Group                                      Zhengming. Ma
Internet-Draft                                                  Ke. Wang
Intended status: Standards Track                              Fei. Zhang
Expires: July 7, 2012                             SUN YAT-SEN UNIVERSITY
                                                         January 4, 2012


   Network-based Inter-domain handover Support for Proxy Mobile IPv6
                  draft-ma-netext-pmip-handover-02.txt

Abstract

   [RFC5213] prompts the Inner-domain handover of the MN in Proxy Mobile
   IPv6(PMIPv6).This document describes network-based Inter-domain
   handover functionality and corresponding mobility options for
   PMIPv6.This document strictly abides by the three principle describes
   in PMIPv6:

   (a)The movement of MN is transparent to CN.

   (b)MN doesn't participate in any mobility-related signaling.LMA and
   MAG are responsible for managing IP mobility on behalf of the host.

   (c)This document is compatible with RFC5213.

   The points of this document are as follows:

   (1) Concepts: The MN's Home Agent(HA) ,Home Address (HoA) and Care-of
   address(CoA) is not only for user but also for the specific
   session.MN initiating a session uses the address assigned by the LMA
   which the MN is registered at the moment as the HoA for the
   session.The user initiating a session uses the address assigned by
   the LMA which the MN moves to as the CoA for the session.

   (2) Binding Cache:Every local mobility anchor must maintain two
   Binding Cache entries for each currently registered mobile node.  One
   is Inner-domain BCE,the other is Inter-domain BCE.  Inner-domain BCE
   maintains the binding between MN's Proxy-CoA and MN's HoA.  Inter-
   domain BCE maintains the bingding between CN's HoA and CN's CoA.

   (3)Communication:For the user initiating a session or accepting a
   session,no matter how it moves,the HoA for the session is
   unchanged,the source address of the data packets is the user's own
   HoA,and the destination address of the the data packets is the HoA of
   CN.The local mobility anchor will check all the packets received from
   the mobile access gateway.If both the source address of the data
   packets is the MN's HoA recorded in Inner-domain BCE,and the CN's HoA
   and CoA recorded in Inter-domain BCE are the same,the LMA will route



Ma, et al.                Expires July 7, 2012                  [Page 1]

Internet-Draft              Abbreviated Title               January 2012


   the packets directly to CN as described in RFC5213.Otherwise,
   according to looking up the Inter-domain BCE,LMA gets the CoA of CN.
   Then ,LMA encapsulates the packets to route to CN.On receiving a
   packet from a correspondent node with the destination address
   matching a mobile node's home network prefix(es), the CN's LMA MUST
   first check the source address and the destination address of the
   data packets,if the source address of the data packets is MN's HoA
   recorded in Inter-domain BCE and the destination address is CN's HoA
   recorded in Inner-domain BCE ,the CN'LMA will forward the packets to
   the right MAG directly as described in RFC5213.Otherwise, CN'LMA will
   remove the outer header before forwarding the packet.  Then,LMA looks
   up the Inner-domain BCE to forward the packets to the right MAG.

   (4)Updates:When MN moves to visited LMA(MN-vLMA),MN-vLMA will do
   three things.

   Firstly MN-vLMA will assign a MN-CoA for MN and build up the Inner-
   domain BCE for MN.  Secondly,MN-vLMA will sends message to MN-hLMA to
   get the HoA of CN .Then,MN-vLMA builds up the binding between CN-HoA
   and CN-HoA in the Inter-domain BCE.Thirdly, MN-vLMA sends message to
   CN-LMA wiht the MN-CoA and MN-HoA included in the message to help CN-
   LMA updating the Inter-domain BCE for MN.

   Compared with "draft-ma-netext-pmip-handover-00.txt", this document
   is compatible with RFC5213 and the LMA described in this document
   should decide if it is necessary to encapsulate the packets.In other
   word,if MN and CN are both in their home domain,they will communicate
   just as the way described in RFC5213 and otherwise they will
   communicate in the way described in this document.

Status of this Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on July 7, 2012.

Copyright Notice



Ma, et al.                Expires July 7, 2012                  [Page 2]

Internet-Draft              Abbreviated Title               January 2012


   Copyright (c) 2012 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.


Table of Contents

   1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  4
   2.  Requirements and Terminology . . . . . . . . . . . . . . . . .  4
     2.1.  Requirements . . . . . . . . . . . . . . . . . . . . . . .  4
     2.2.  Terminology  . . . . . . . . . . . . . . . . . . . . . . .  4
   3.  The assumptions on the PMIPv6 domain . . . . . . . . . . . . .  5
   4.  Local Mobility Anchor Operation  . . . . . . . . . . . . . . .  6
     4.1.  Home address configuration . . . . . . . . . . . . . . . .  6
     4.2.  Binding Cache Entry Data in LMA  . . . . . . . . . . . . .  7
     4.3.  Forwarding Considerations  . . . . . . . . . . . . . . . .  7
       4.3.1.  Forwarding Packets Sent by the Mobile Node . . . . . .  7
       4.3.2.  Forwarding Packets to the Mobile Node: . . . . . . . .  7
   5.  Mobile Access Gateway Operation  . . . . . . . . . . . . . . .  8
   6.  Protocol Operation . . . . . . . . . . . . . . . . . . . . . .  8
     6.1.  Initial Binding Registration and Forwarding
           Considerations . . . . . . . . . . . . . . . . . . . . . .  9
     6.2.  MN Performs Inter-domain handover  . . . . . . . . . . . . 11
       6.2.1.  Inter-domain handover operation  . . . . . . . . . . . 11
       6.2.2.  Forwarding Consideratons . . . . . . . . . . . . . . . 13
     6.3.  CN Performs Inter-domain handover  . . . . . . . . . . . . 15
       6.3.1.  Inter-domain handover operation  . . . . . . . . . . . 15
       6.3.2.  Forwarding Consideratons . . . . . . . . . . . . . . . 17
   7.  Message Formats  . . . . . . . . . . . . . . . . . . . . . . . 19
     7.1.  rPBU . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
     7.2.  rPBA . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
     7.3.  pPBU . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
     7.4.  pPBA . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
   8.  Security Considerations  . . . . . . . . . . . . . . . . . . . 23
   9.  IANA Considerations  . . . . . . . . . . . . . . . . . . . . . 24
   10. References . . . . . . . . . . . . . . . . . . . . . . . . . . 25
     10.1. Normative References . . . . . . . . . . . . . . . . . . . 25
     10.2. Informative References . . . . . . . . . . . . . . . . . . 26
   Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 27



Ma, et al.                Expires July 7, 2012                  [Page 3]

Internet-Draft              Abbreviated Title               January 2012


1.  Introduction

   Proxy Mobile IPv6 (PMIPv6) [RFC5213] is network based mobility
   management protocol which allows IP mobility session continuity for a
   Mobile Node (MN) without its involvement in mobility management
   signaling.  In RFC5213 the inter-domain handover is not involved.This
   document describes the network-based Inter-domain handover options,
   and the corresponding functionality for Inter-domain handover for
   PMIPv6.  The Inter-domain handover takes place during MN moves from
   home LMA(hLMA) to visited LMA(vLMA).

   The network-based Inter-domain handover functionality described in
   this specification does not depend on information provisioned to
   external entities, such as the Domain Name System (DNS) or the
   Authentication,Authorization and Accounting (AAA) infrastructure.
   The trust relationship and coordination management between LMAs
   within a PMIPv6 domain is deployment specific and will be described
   in this specification.


2.  Requirements and Terminology

2.1.  Requirements

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
   NOT","SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in
   this document are to be interpreted as described in [RFC2119].

2.2.  Terminology

   In addition to the terminology defined in [RFC5213], the following
   terminology is also used:

   hLMA

   Home Local Mobility Anchor is the first LMA the MN registered and is
   the home agent for the mobile node in a Proxy Mobile IPv6 domain.  It
   is the topological anchor point for the mobile node's home network
   prefix(es) and is the entity that manages the mobile node's binding
   state.  The local mobility anchor has the functional capabilities of
   a home agent as defined in Mobile IPv6 base specification [RFC3775]
   with the additional capabilities required for supporting Proxy Mobile
   IPv6 protocol as defined in this specification.

   vLMA

   The vLMA is the LMA the MN visited.




Ma, et al.                Expires July 7, 2012                  [Page 4]

Internet-Draft              Abbreviated Title               January 2012


   rPBU

   A request message sent by a mobile access gateway to a mobile node's
   local mobility anchor for establishing a binding between the mobile
   node's home network prefix(es) assigned to a given interface of a
   mobile node and its current care-of address (Proxy-CoA).

   rPBA

   A reply message sent by a local mobility anchor in response to a
   Proxy Binding Update message that it received from a mobile access
   gateway.

   pPBU

   A request message sent from a LMA to another LMA.  There are two
   kinds of message formats:a message sent from vLMA to hLMA and a
   message sent from vLMA to CN's LMA.

   pPBA

   A reply message sent from a LMA to another LMA.  There are two kinds
   of message formats:a message sent from hLMA to vLMA and a message
   sent from CN's LMA to vLMA.

   Home AAA (hAAA):

   An Authentication, Authorization, and Accounting (AAA) server located
   in MN's home network.  In scope of this document the hAAA corresponds
   to a RADIUS server that includes the role of the PMIPv6 Policy Store.

   Visited AAA (vAAA):

   An Authentication, Authorization, and Accounting (AAA) server located
   in MN's visited network.  In this document the vAAA is the AAA server
   that acts as a RADIUS Proxy when the MN moves or attaches through the
   Visited network.  The VAAA receives an authentication (or accounting)
   request from an AAA client such as a NAS, forwards the request to the
   hAAA server, receives the reply from the hAAA, and sends that reply
   back to the AAA client potentially adding changes to reflect local
   administrative policy.


3.  The assumptions on the PMIPv6 domain

   They are discussed here as they have an impact on PMIPv6 deployment.

   Home AAA server records the user's static and dynamic information,and



Ma, et al.                Expires July 7, 2012                  [Page 5]

Internet-Draft              Abbreviated Title               January 2012


   the dynamic information includes the information of LMA which the MN
   is registered right now.

   The MN's Home Address (HoA) and Care-of address(CoA) is not only for
   user but also for the specific session.

   MN initiating a session uses the address assigned by the LMA which
   the MN is registered as the HoA for the session.The user initiating a
   session uses the address assigned by the LMA which the MN moves to as
   the CoA for the session.

   CN accepting a session uses the address assigned by the LMA which the
   CN is registered as the HoA for the session.CN accepting a session
   uses the address assigned by the LMA which the CN moves to as the CoA
   for the session.

   For the user initiating a session or accepting a session,no matter
   how it moves,the HoA for the session is unchanged,while the CoA for
   the session is changing.Then, the source address of the data packets
   sent by a user initiating a session or accepting a session is the
   user's own HoA,and the destination address of the the data packets is
   the HoA of the other end of the session.

   The network-based Inter-domain handover Management not only ensures
   the continuity in the session but also ensures that the MN will not
   detect any change with respect to CN.

   This specification diverses the PBU/PBA message into two kinds of
   message formate: pPBU/pPBA message between LMAs ,rPBU/rPBA message
   between LMA and MAG.


4.  Local Mobility Anchor Operation

   The local mobility anchor MUST support the home agent function as
   defined in [RFC3775] and the extensions defined in this
   specification.  A home agent with these modifications and enhanced
   capabilities for supporting the Proxy Mobile IPv6 protocol is
   referred to as a local mobility anchor.This section describes the
   operational details of the local mobility anchor.

4.1.  Home address configuration

   LMA not only assignes the network prefix of the home address for the
   new users , but also configures the home address for the new users.So
   that LMA can performs mobility management on behalf of a mobile node.





Ma, et al.                Expires July 7, 2012                  [Page 6]

Internet-Draft              Abbreviated Title               January 2012


4.2.  Binding Cache Entry Data in LMA

   Every local mobility anchor MUST maintain two Binding Cache entries
   for each currently registered mobile node.  One is Inner-domain
   BCE,the other is Inter-domain BCE.  Inner-domain BCE maintains the
   binding between MN's Proxy-CoA and MN's HoA.  Inter-domain BCE
   maintains the bingding between CN's HoA and CN's CoA.

4.3.   Forwarding Considerations

   LMA should intercepts the packets sent to the Mobile Node's Home
   Network:When the local mobility anchor is serving a mobile node, it
   MUST be able to receive packets that are sent to the mobile node's
   home network.  In order for it to receive those packets, it MUST
   advertise a connected route in to the Routing Infrastructure for the
   mobile node's home network prefix(es) or for an aggregated prefix
   with a larger scope.  This essentially enables IPv6 routers in that
   network to detect the local mobility anchor as the last-hop router
   for the mobile node's home network prefix(es).

4.3.1.   Forwarding Packets Sent by the Mobile Node

   The local mobility anchor will check all the packets received from
   the mobile access gateway.If both the source address of the data
   packets is the MN's HoA recorded in Inner-domain BCE,and the CN's HoA
   and CoA recorded in Inter-domain BCE are the same,the LMA will route
   the packets directly to CN as described in RFC5213.Otherwise,
   according to looking up the Inter-domain BCE,LMA gets the CoA of CN.
   Then ,LMA encapsulates the packets to route to CN.  The format of the
   tunneled packet is shown below:

   IPv6 header (src= LMAA, dst= CN's CoA) /* Tunnel Header */

   IPv6 header (src= MN's HoA, dst= CN's HoA ) /* Packet Header */

   Upper layer protocols /* Packet Content*/

4.3.2.   Forwarding Packets to the Mobile Node:

   On receiving a packet from a correspondent node with the destination
   address matching a mobile node's home network prefix(es), the LMA
   MUST first check the source address and the destination address of
   the data packets,if the source address of the data packets is CN's
   HoA recorded in Inter-domain BCE and the destination address is MN's
   HoA recorded in Inner-domain BCE ,the LMA will forward the packets to
   the right MAG directly as described in RFC5213.Otherwise, LMA will
   remove the outer header before forwarding the packet.  Then,LMA looks
   up the Inner-domain BCE to forward the packets to the right MAG.  The



Ma, et al.                Expires July 7, 2012                  [Page 7]

Internet-Draft              Abbreviated Title               January 2012


   format of the tunneled packet is shown below:

   IPv6 header (src= LMAA, dst= MN's Proxy CoA) /* Tunnel Header */

   IPv6 header (src= CN's HoA, dst= MN's HoA ) /* Packet Header */

   Upper layer protocols /* Packet Content*/


5.   Mobile Access Gateway Operation

   RFC5213 introduces a new functional entity, the mobile access gateway
   (MAG).The mobile access gateway is the entity that is responsible for
   detecting the mobile node's movements to and from the access link and
   sending the Proxy Binding Update messages to the local mobility
   anchor.  In essence, the mobile access gateway performs mobility
   management on behalf of a mobile node.

   Every mobile access gateway MUST maintain a Binding Update List.Each
   entry in the Binding Update List represents a mobile node's mobility
   binding with its local mobility anchor.  The Binding Update List is a
   conceptual data structure.

   For supporting this specification, the conceptual Binding Update List
   entry data structure needs be extended as follows:

   (a)After detecting a new mobile node on its access link, the mobile
   access gateway MUST identify the mobile node and acquire its MN-
   Identifier.  If it determines that the network-based mobility
   management service needs to be offered to the mobile node, it MUST
   send a Proxy Binding Update message to the local mobility anchor.

   (b)If the MAG detectes the MN's registration is initial binding
   registration , the MAG will maintain a binding between MN's HoA and
   hLMA when it recieves the rPBA message.

   (c)If the MAG detectes the MN is performing a inter-domain handover ,
   the MAG will maintain a binding between MN's HoA ,vLMA and CoA when
   it recieves the rPBA message from vLMA.  The CoA which is included in
   rPBA message is the address vLMA assigns for MN.


6.   Protocol Operation

   In order to improve the performance during inter-handover (when
   operations such as attachment to a new LMA and signaling between LMAs
   are involved), the PFMIPv6 protocol in this document specifies new
   message forms between the MN's hLMA and MN's vLMA and new message



Ma, et al.                Expires July 7, 2012                  [Page 8]

Internet-Draft              Abbreviated Title               January 2012


   forms between the MN's vLMA and CN's LMA.  In this specification take
   the communication between MN and CN as a example.  Both MN and CN are
   in PMIPv6 domain.

6.1.   Initial Binding Registration and Forwarding Considerations

   Both MN and CN are in PMIPv6 domain.The related signaling of Initial
   Binding Registration is described in RFC5213.  Both MN and CN has
   registered in its hLMA ,and both gets its home address (MN-HoA and
   CN-HoA).The reference network is illustrated in Figure 1.


      +---------+         +----------+
      | MN-hLMA |---------| CN-hLMA  |
      +---------+         +----------+
          |                    |
          |                    |
      +---------+         +----------+
      | MN-MAG  |         | CN-MAG   |
      +---------+         +----------+
          |                    |
          |                    |
      +---------+         +----------+
      |    MN   |         |   CN     |
      +---------+         +----------+


      Figure 1:Reference network for Initial Binding Registration and
                         Forwarding Considerations

   Forwarding Considerations:

   (a) Packets from MN to CN:

   (1).The source address is MN-HoA, and the destination address is CN-
   HoA.

   (2).The packets are forwarded from MN to MN-MAG through Link-layer.

   (3).The packets are forwarded form MN-MAG to MN-hLMA through tunnel,
   the source address of the tunnel is MN-MAG's IP address (MN-Proxy-
   CoA), and the destination address of the tunnel is MN-hLMA's address
   (MN-hLMAA).

   (4).MN-hLMA decapsulates the packets and check both the source
   address and the destination address of the data packets.If both the
   source address of the data packets is the MN's HoA recorded in Inner-
   domain BCE,and the CN's HoA and CoA recorded in Inter-domain BCE are



Ma, et al.                Expires July 7, 2012                  [Page 9]

Internet-Draft              Abbreviated Title               January 2012


   the same,the LMA will route the packets directly to CN as described
   in RFC5213.

   (5)The packets are intercepted by CN-hLMA.CN-hLMA MUST first check
   the source address and the destination address of the data packets,if
   the source address of the data packets is MN's HoA recorded in Inter-
   domain BCE and the destination address is CN's HoA recorded in Inner-
   domain BCE ,the CN-hLMA forwards the packets to the right MAG
   directly as described in RFC5213.CN-hLMA forwards them to CN-MAG
   through tunnel, the source address of the tunnel is CN-hLMA's address
   (CN-hLMAA), and the destination address of the tunnel is CN-MAG's
   address (CN-Proxy-CoA).

   (6)CN-MAG decapsulates the packets and forwards them to CN through
   Link-layer.

   (b) Packets from CN to MN:

   (1).The source address is CN-HoA , and the destination address is MN-
   HoA .

   (2).The packets are forwarded from CN to CN-MAG through Link-layer.

   (3).The packets are forwarded form CN-MAG to CN-hLMA through tunnel,
   the source address of the tunnel is CN-Proxy-CoA and the destination
   address of the tunnel is CN-hLMAA.

   (4).CN-hLMA decapsulates the packets and check both the source
   address and the destination address of the data packets.If both the
   source address of the data packets is the CN's HoA recorded in Inner-
   domain BCE,and the MN's HoA and CoA recorded in Inter-domain BCE are
   the same,the LMA will route the packets directly to CN as described
   in RFC5213.

   (5).  The packets are intercepted by MN-hLMA.The packets are
   intercepted by MN-hLMA.MN-hLMA MUST first check the source address
   and the destination address of the data packets,if the source address
   of the data packets is CN's HoA recorded in Inter-domain BCE and the
   destination address is MN's HoA recorded in Inner-domain BCE ,the MN-
   hLMA forwards the packets to the right MAG directly as described in
   RFC5213.

   (6).MN-MAG decapsulates the packets and forwards them to MN through
   Link-layer.







Ma, et al.                Expires July 7, 2012                 [Page 10]

Internet-Draft              Abbreviated Title               January 2012


6.2.   MN Performs Inter-domain handover

   On the basis of situation described in 6.1,MN roams to MN-vLMA domain
   and CN is still in its home domain.The reference network is
   illustrated in Figure 2.


          +------------------------------------------+
          |                                          |
      +---------+     +---------+               +----------+
      | MN-vLMA |-----| MN-hLMA |               | CN-hLMA  |
      +---------+     +---------+               +----------+
          |                                          |
          |                                          |
      +---------+                               +----------+
      | MN-MAG2  |                              | CN-MAG   |
      +---------+                               +----------+
          |                                          |
          |                                          |
      +---------+                               +----------+
      |    MN   |                               |   CN     |
      +---------+                               +----------+


                   Figure 2:MN roams to MN- vLMA domain

6.2.1.   Inter-domain handover operation

   In RFC5213 the inter-domain handover is not involved.This document
   describes the network-based Inter-domain handover options, and the
   corresponding functionality for Inter-domain handover for
   PMIPv6.Since the MN is not involved in IP mobility signaling in
   PMIPv6, the sequence of events illustrating the MN inter-domain
   handover are shown in Figure 3.

















Ma, et al.                Expires July 7, 2012                 [Page 11]

Internet-Draft              Abbreviated Title               January 2012


              +-------+   RADIUS   +-------+
              |MN-hAAA|<---------->|MN-vAAA|
              +-------+            +-------+
                                       |RADIUS
                                       |
          +--+ +------+ +-------+ +-------+  +-------+ +-------+
          |MN| |MN-MAG| |MN-hLMA| |MN-MAG2|  |MN-vLMA| |CN-hLMA|
          +--+ +------+ +-------+ +-------+  +-------+ +-------+
           |      |          |       |          |         |
           |      |DeReg PBU |       |          |         |
           |      |------- ->|       |          |         |
           |      | rPBA     |       |          |         |
           |      |<---------|       |          |         |
           |      |   RS     |       |          |         |
           |------------------------>|          |         |
           |      |          |       |          |         |
           |      |          |       |    rPBU  |         |
           |      |          |       |---------->         |
           |      |          |       |    rPBA  |         |
           |      |          |       <----------|         |
           |      |          |       |   pPBU   |         |
           |      |          <------------------|         |
           |      |          |       |   pPBA   |         |
           |      |          |----------------->|         |
           |      |          |       |          |   pPBU| |
           |      |          |       |          |--------->
           |      |          |       |          |   pPBA  |
           |      |    RA    |       |          |<--------|
           |<------------------------|          |         |
           |      |          |       |          |         |




                  Figure 3:signaling of MN inter-handover

   (a)MN-MAG detects that a handover is imminent and sends the DeReg PBU
   message to the MN-hLMA asking MN-hLMA to remove the binding between
   MN-MAG and MN.

   (b)The MN-hLMA sends back the rPBA message to MN-MAG.

   (c) MN roams to MN-vLMA, and sends Router Solicit(RS) message to MN-
   MAG2.  The MN-HoA and CN-HoA are included in RS message.

   (d) Upon receiving RS message ,MN-MAG2 sends request to download the
   per MN Policy Profile from the MN-vAAA.




Ma, et al.                Expires July 7, 2012                 [Page 12]

Internet-Draft              Abbreviated Title               January 2012


   (e)MN-vAAA assigns a MN-vLMA to MN -MAG2 ,and sends request to MN-
   hAAA to download the per MN Policy Profile .  MN-vLMA's address is
   included in the request message.

   (f)MN-hAAA receives the request message and sends the MN Policy
   Profile to MN-vAAA ,then MN-hAAA uses MN-vLMAA to take place of MN-
   hLMAA.

   (g)MN-vAAA sends the Accept Message which includes both MN-hLMAA and
   MN-vLMAA to MN-MAG2.

   (h) MN-MAG2 sends the rPBU message to MN-vLMA.  MN-HoA,CN-HoA and MN-
   hLMAA are included in rPBU message .

   (i) Upon receiving rPBU message, MN-vLMA firstly assigns a MN-CoA for
   MN ,builds up the inner-domain BCE for MN and sends rPBA message back
   to MN-MAG2 .The MN-CoA is included in rPBA message.In the Inner-
   domain BCE there is a binding between MN's Proxy-CoA2 and MN's CoA.

   Secondly,MN-vLMA sends pPBU message to MN-hLMA,the source address of
   the pPBU message is MN-vLMAA and the destination address of the pPBU
   message is MN-hLMAA.  CN-HoA is included in pPBU message.  Upon
   receiving the pPBU message,MN-hLMA sends back pPBA message to MN-
   vLMA with CN-HoA included .MN-vLMA builds up the binding between CN-
   HoA and CN-HoA in the Inter-domain BCE.

   Thirdly,MN-vLMA sends pPBU message to CN-hLMA, the source address of
   the pPBU message is MN-CoA and the destination address of the pPBU
   message is CN-HoA.The pPBU message includes the MN-CoA and MN-HoA.
   This pPBU message is packaged in UDP format,and by judging the format
   of the message CN-hLMA intercepts the pPBU message ,encapsulates the
   message and updates the Inter-domain BCE for MN.  That means in the
   Inter-domain BCE there is a binding between MN-CoA and MN-HoA.

   (j) After receiving rPBA message from MN-vLMA, MN-MAG2 builds up the
   binding among MN-HoA ,MN-CoA and MN-vLMA.  Then MN-MAG2 sends Router
   Advertise (RA) message to MN.  The inter-domain handover operation is
   over.

6.2.2.   Forwarding Consideratons

   Forwarding Considerations:

   (a) Packets from MN to CN:

   (1).The source address is MN-HoA, and the destination address is CN-
   HoA.




Ma, et al.                Expires July 7, 2012                 [Page 13]

Internet-Draft              Abbreviated Title               January 2012


   (2).The packets are forwarded from MN to MN-MAG2 through Link-layer.

   (3).The packets are forwarded form MN-MAG2 to MN-hLMA through tunnel,
   the source address of the tunnel is MN-MAG2's IP address, and the
   destination address of the tunnel is MN-vLMAA.

   (4).According to check both the source address and the destination
   address of the data packets.MN-vLMA detects the MN and CN are not
   both in their home domain,so MN-vLMA encapsulates the packets to
   route to CN.  The format of the tunneled packet is shown below:

   IPv6 header (src= MN-vLMAA, dst= CN's HoA) /* Tunnel Header */

   IPv6 header (src= MN's HoA, dst= CN's HoA ) /* Packet Header */

   Upper layer protocols /* Packet Content*/

   (5).The packets are intercepted by CN-hLMA.According to check both
   the source address and the destination address of the data
   packets.CN-hLMA detects the MN and CN are not both in their home
   domain,CN-hLMA decapsulates the packets and forwards them to CN-MAG
   through tunnel, the source address of the tunnel is CN-hLMAA, and the
   destination address of the tunnel is CN-Proxy-CoA .

   (6).CN-MAG decapsulates the packets and forwards them to CN through
   Link-layer.

   (b) Packets from CN to MN:

   (1).The source address is CN-HoA , and the destination address is MN-
   HoA .

   (2).The packets are forwarded from CN to CN-MAG through Link-layer.

   (3).The packets are forwarded form CN-MAG to CN-hLMA through tunnel,
   the source address of the tunnel is CN-Proxy-CoA and the destination
   address of the tunnel is CN-hLMAA.

   (4).According to check both the source address and the destination
   address of the data packets.CN-hLMA detects the MN and CN are not
   both in their home domain,so CN-hLMA encapsulates the packets to
   route to MN..The format of the tunneled packet is shown below:

   IPv6 header (src= CN-hLMAA, dst= MN's CoA) /* Tunnel Header */

   IPv6 header (src= CN's HoA, dst= MN's HoA ) /* Packet Header */

   Upper layer protocols /* Packet Content*/



Ma, et al.                Expires July 7, 2012                 [Page 14]

Internet-Draft              Abbreviated Title               January 2012


   (5).  The packets are intercepted by MN-vLMA.MN-vLMA decapsulates the
   packets and forwards them to MN-MAG2 through tunnel, the source
   address of the tunnel is MN-vLMAA, and the destination address of the
   tunnel is MN-Proxy-CoA2.

   (6).MN-MAG2 decapsulates the packets and forwards them to MN through
   Link-layer.

6.3.   CN Performs Inter-domain handover

   On the basis of situation described in 6.2,CN roams to CN-vLMA domain
   and MN is still in MN-vLMA domain.The reference network is
   illustrated in Figure 4.


          +--------------------------------------------+
          |                                            |
      +---------+   +---------+   +----------+   +----------+
      | MN-vLMA |---| MN-hLMA |   | CN-hLMA  |---| CN-vLMA  |
      +---------+   +---------+   +----------+   +----------+
          |                                           |
          |                                           |
      +---------+                                +----------+
      | MN-MAG2 |                                | CN-MAG2  |
      +---------+                                +----------+
          |                                           |
          |                                           |
      +---------+                                +----------+
      |    MN   |                                |   CN     |
      +---------+                                +----------+


                   Figure 4:CN roams to CN- vLMA domain

6.3.1.   Inter-domain handover operation

   The sequence of events illustrating the CN inter-domain handover are
   shown in Figure 5.













Ma, et al.                Expires July 7, 2012                 [Page 15]

Internet-Draft              Abbreviated Title               January 2012


              +-------+   RADIUS   +-------+
              |CN-hAAA|<---------->|CN-vAAA|
              +-------+            +-------+
                                       |RADIUS
                                       |
          +--+ +------+ +-------+ +-------+  +-------+ +-------+
          |CN| |CN-MAG| |CN-hLMA| |CN-MAG2|  |CN-vLMA| |MN-vLMA|
          +--+ +------+ +-------+ +-------+  +-------+ +-------+
           |      |          |       |          |         |
           |      |DeReg PBU |       |          |         |
           |      |------- ->|       |          |         |
           |      | rPBA     |       |          |         |
           |      |<---------|       |          |         |
           |      |   RS     |       |          |         |
           |------------------------>|          |         |
           |      |          |       |          |         |
           |      |          |       |          |         |
           |      |          |       |          |         |
           |      |          |       |    rPBU  |         |
           |      |          |       |---------->         |
           |      |          |       |    rPBA  |         |
           |      |          |       <----------|         |
           |      |          |       |   pPBU   |         |
           |      |          <------------------|         |
           |      |          |       |   pPBA   |         |
           |      |          |----------------->|         |
           |      |          |       |          |   pPBU| |
           |      |          |       |          |--------->
           |      |          |       |          |   pPBA  |
           |      |    RA    |       |          |<--------|
           |<------------------------|          |         |
           |      |          |       |          |         |









                  Figure 5:signaling of CN inter-handover

   (a)CN-MAG detects that a handover is imminent and sends the DeReg PBU
   message to the CN-hLMA asking CN-hLMA to remove the binding between
   CN-MAG and CN.

   (b)The CN-hLMA sends back the rPBA message to CN-MAG.



Ma, et al.                Expires July 7, 2012                 [Page 16]

Internet-Draft              Abbreviated Title               January 2012


   (c) CN roams to CN-vLMA, and sends RS message to CN-MAG2.  The CN-HoA
   and MN-HoA are included in RS message.

   (d) Upon receiving RS message ,CN-MAG2 sends request to download the
   per CN Policy Profile from the CN-vAAA.

   (e)CN-vAAA assigns a CN-vLMA to CN -MAG2 ,and sends request to CN-
   hAAA to download the per CN Policy Profile .  CN-vLMA's address is
   included in the request message.

   (f)CN-hAAA receives the request message and sends the CN Policy
   Profile to CN-vAAA ,then CN-hAAA uses CN-vLMAA to take place of CN-
   hLMAA.

   (g)CN-vAAA sends the Accept Message which includes both CN-hLMAA and
   CN-vLMAA to CN-MAG2.

   (h) CN-MAG2 sends the rPBU message to CN-vLMA.  MN-HoA,CN-HoA and CN-
   hLMAA are included in rPBU message .

   (i) Upon receiving rPBU message, CN-vLMA firstly assigns a CN-CoA for
   CN ,builds up the inner-domain BCE for CN and sends rPBA message back
   to CN-MAG2 .The CN-CoA is included in rPBA message.In the Inner-
   domain BCE there is a binding between CN's Proxy-CoA2 and CN's CoA.

   Secondly,CN-vLMA sends pPBU message to CN-hLMA,the source address of
   the pPBU message is CN-vLMAA and the destination address of the pPBU
   message is CN-hLMAA.  MN-HoA is included in pPBU message.  Upon
   receiving the pPBU message,CN-hLMA sends back pPBA message to CN-vLMA
   with MN-HoA and MN-CoA included .CN-vLMA updates the inter-domain BCE
   with the binding between MN-HoA and MN-CoA.

   Thirdly,CN-vLMA sends pPBU message to MN-hLMA, the source address of
   the pPBU message is CN-CoA and the destination address of the pPBU
   message is MN-CoA.The pPBU message includes the CN-CoA and CN-HoA.
   This pPBU message is packaged in UDP format,and by judging the format
   of the message MN-hLMA intercepts the pPBU message ,encapsulates the
   message and updates the Inter-domain BCE for CN.  That means in the
   Inter-domain BCE there is a binding between CN-CoA and CN-HoA.

   (j) After receiving rPBA message from CN-vLMA, CN-MAG2 builds up the
   binding among CN-HoA ,CN-CoA and CN-vLMA.  Then CN-MAG2 sends RA
   message to CN.  The inter-domain handover operation is over.

6.3.2.  Forwarding Consideratons

   Forwarding Considerations:




Ma, et al.                Expires July 7, 2012                 [Page 17]

Internet-Draft              Abbreviated Title               January 2012


   (a) Packets from MN to CN:

   (1).The source address is MN-HoA, and the destination address is CN-
   HoA.

   (2).The packets are forwarded from MN to MN-MAG2 through Link-layer.

   (3).The packets are forwarded form MN-MAG2 to MN-hLMA through tunnel,
   the source address of the tunnel is MN-MAG2's IP address, and the
   destination address of the tunnel is MN-vLMAA.

   (4).  According to check both the source address and the destination
   address of the data packets.CN-hLMA detects the MN and CN are not
   both in their home domain,so MN-vLMA encapsulates the packets to
   route to CN.  The format of the tunneled packet is shown below:

   IPv6 header (src= MN-vLMAA, dst= CN's CoA) /* Tunnel Header */

   IPv6 header (src= MN's HoA, dst= CN's HoA ) /* Packet Header */

   Upper layer protocols /* Packet Content*/

   (5).The packets are intercepted by CN-vLMA.  According to check both
   the source address and the destination address of the data
   packets.CN-hLMA detects the MN and CN are not both in their home
   domain,so CN-vLMA decapsulates the packets and forwards them to CN-
   MAG2 through tunnel, the source address of the tunnel is CN-vLMAA,
   and the destination address of the tunnel is CN-Proxy-CoA2 .

   (6).CN-MAG2 decapsulates the packets and forwards them to CN through
   Link-layer.

   (b) Packets from CN to MN:

   (1).The source address is CN-HoA , and the destination address is MN-
   HoA .

   (2).The packets are forwarded from CN to CN-MAG2 through Link-layer.

   (3).The packets are forwarded form CN-MAG2 to CN-vLMA through tunnel,
   the source address of the tunnel is CN-Proxy-CoA2 and the destination
   address of the tunnel is CN-vLMAA.

   (4).  According to check both the source address and the destination
   address of the data packets.CN-hLMA detects the MN and CN are not
   both in their home domain,so CN-vLMA encapsulates the packets to
   route to MN.  The format of the tunneled packet is shown below:




Ma, et al.                Expires July 7, 2012                 [Page 18]

Internet-Draft              Abbreviated Title               January 2012


   IPv6 header (src= CN-vLMAA, dst= MN's CoA) /* Tunnel Header */

   IPv6 header (src= CN's HoA, dst= MN's HoA ) /* Packet Header */

   Upper layer protocols /* Packet Content*/

   (5).  The packets are intercepted by MN-vLMA.  According to check
   both the source address and the destination address of the data
   packets.CN-hLMA detects the MN and CN are not both in their home
   domain,so MN-vLMA decapsulates the packets and forwards them to MN-
   MAG2 through tunnel, the source address of the tunnel is MN-vLMAA,
   and the destination address of the tunnel is MN-Proxy-CoA2.

   (6).MN-MAG2 decapsulates the packets and forwards them to MN through
   Link-layer.


7.  Message Formats

   This section defines extensions to the Proxy Mobile IPv6 [RFC5213]
   protocol messages.

7.1.  rPBU

       0               1               2               3
       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
                                      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
                                      |            Sequence #         |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |A|H|L|K|M|R|P|D|  Reserved     |            Lifetime           |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |                         MN-Identifier                         |
      |                         MN-hLMAA                              |
      |                         CN-HoA                                |
      |                         MN-HoA                                |
      |                                                               |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+




                               Figure 6:rPBU

   A Binding Update message that is sent by a mobile access gateway to a
   local mobility anchor is referred to as the "rPBU" message.A new flag
   (D) is included in the rPBU message.  The rest of the Binding Update
   message format remains the same as defined in [RFC5213] and with the
   additional (R) and (M) flags, as specified in [RFC3963] and



Ma, et al.                Expires July 7, 2012                 [Page 19]

Internet-Draft              Abbreviated Title               January 2012


   [RFC4140], respectively.

   Distinguish Flag (D)

   A new flag (D) is included in the Binding Update message to indicate
   to the local mobility anchor that the Binding Update message is a
   proxy registration sent by a mobile access gateway to a local
   mobility anchor.  The flag MUST be set to the value of 1 .

   The rPBU message sent by a mobile access gateway to a local mobility
   anchorcontains MN-Identifer , MN-hLMAA, MN-HoA and CN-HoA.

7.2.  rPBA

       0               1               2               3
       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
                                      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
                                      |    Status     |K|R|P|D|Reserved|
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |        Sequence #             |            Lifetime           |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |                         MN's IP address                       |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+



                               Figure 7:rPBA

   A Binding Acknowledgement message that is sent by a local mobility
   anchor to a mobile access gateway is referred to as the "rPBA"
   message.  A new flag (D) is included in the Binding Acknowledgement
   message.  The rest of the Binding Acknowledgement message format
   remains the same as defined in [RFC5213] and with the additional (R)
   flag as specified in [RFC3963].

   Distinguish Registration Flag (D)

   A new flag (D) is included in the Binding Acknowledgement message to
   indicate that the local mobility anchor processed the corresponding
   Proxy Binding Update message as rPBU message.  The flag is set to a
   value of 1 .  The rPBA message sent by a local mobility anchor to a
   mobile access gateway contains MN's IP address assigned by the local
   mobility anchor .








Ma, et al.                Expires July 7, 2012                 [Page 20]

Internet-Draft              Abbreviated Title               January 2012


7.3.  pPBU

       0               1               2               3
       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
                                      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
                                      |            Sequence #         |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |A|H|L|K|M|R|P|D|  Reserved     |            Lifetime           |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |                   options                                     |
      |                                                               |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+


                               Figure 8:pPBU

   A Binding Update message that is sent by a local mobility anchor to a
   local mobility anchor is referred to as the "pPBU" message.A new flag
   (D) and a new flag (M) are included in the pPBU message.  The rest of
   the Binding Update message format remains the same as defined in
   [RFC5213] and with the additional (R) and (M) flags, as specified in
   [RFC3963] and [RFC4140], respectively.

   Distinguish Flag (D)

   A new flag (D) is included in the Binding Update message to indicate
   to the local mobility anchor that the Binding Update message is a
   proxy registration sent by a local mobility anchor to a local
   mobility anchor.  The flag MUST be set to the value of 2 or 3.

       0               1               2               3
       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
                                      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
                                      |            Sequence #         |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |A|H|L|K|M|R|P|D|  Reserved     |            Lifetime           |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |                   MN-HoA                                      |
      |                   CN-HoA                                      |
      |                                                               |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+



             Figure 9:pPBU sent by a visit LMA to the home LMA

   A new flag (D) is included in the Binding Update message to indicate
   to the local mobility anchor that the Binding Update message is a PBU



Ma, et al.                Expires July 7, 2012                 [Page 21]

Internet-Draft              Abbreviated Title               January 2012


   message sent by a visit local mobility anchor to the home local
   mobility anchor.  The flag MUST be set to the value of 2.  This pPBU
   message sent by a visit local mobility anchor to the home local
   mobility anchor contains MN-HoA and CN-HoA.

       0               1               2               3
       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
                                      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
                                      |            Sequence #         |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |A|H|L|K|M|R|P|D|  Reserved     |            Lifetime           |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |                   MN-HoA                                      |
      |                   MN-CoA                                      |
      |                                                               |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+




                Figure 10:pPBU sent by MN's LMA to CN's LMA

   A new flag (D) is included in the Binding Update message to indicate
   to the local mobility anchor that the Binding Update message is a PBU
   message sent by MN's local mobility anchor to CN's local mobility
   anchor .  The flag MUST be set to the value of 3.This pPBU message
   sent by MN's local mobility anchor to CN's local mobility anchor
   contains MN-HoA and MN-HoA.

7.4.  pPBA

       0               1               2               3
       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
                                      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
                                      |    Status     |K|R|P|D|Reserved|
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |        Sequence #             |            Lifetime           |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |                         options                               |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+




                              Figure 11:pPBA

   A Binding Acknowledgement message that is sent by a local mobility
   anchor to a local mobility anchor is referred to as the "pPBA"



Ma, et al.                Expires July 7, 2012                 [Page 22]

Internet-Draft              Abbreviated Title               January 2012


   message.  A new flag (D) and a new flag (M) are included in the
   Binding Acknowledgement message.  The rest of the Binding
   Acknowledgement message format remains the same as defined in
   [RFC5213] and with the additional (R) flag as specified in [RFC3963].

   Distinguish Registration Flag (D)

   A new flag (D) is included in the Binding Acknowledgement message to
   indicate that the local mobility anchor processed the corresponding
   Proxy Binding Update message as pPBU message.  The flag is set to a
   value of 2 or 3.

   A new flag (D) is included in the Binding Acknowledgement message to
   indicate that the local mobility anchor processed the corresponding
   Proxy Binding Update message as pPBU message sent by a visit local
   mobility anchor to the home local mobility anchor.  The flag is set
   to a value of 2 .The options of the message contains the CN-CoA.

   A new flag (D) is included in the Binding Acknowledgement message to
   indicate that the local mobility anchor processed the corresponding
   Proxy Binding Update message as pPBU message sent by MN's local
   mobility anchor to CN's local mobility anchor.  The flag is set to a
   value of 3 .


8.  Security Considerations

   The potential security threats against any network-based mobility
   management protocol are described in [RFC4832].  This section
   explains how Proxy Mobile IPv6 protocol defends itself against those
   threats.

   Proxy Mobile IPv6 protocol recommends the signaling messages, Proxy
   Binding Update and Proxy Binding Acknowledgement, exchanged between
   the mobile access gateway and the local mobility anchor or between a
   local mobility anchor and a local mobility anchorto be protected
   using IPsec using the established security associationbetween them.
   This essentially eliminates the threats related to the impersonation
   of the mobile access gateway or the local mobility anchor.

   This specification allows a mobile access gateway to send binding
   registration messages on behalf of a mobile node.  If proper
   authorization checks are not in place, a malicious node may be able
   to hijack a mobile node's mobility session or may carry out a denial-
   of-service attack.  To prevent this attack, this specification
   requires the local mobility anchor to allow only authorized mobile
   access gateways that are part of that Proxy Mobile IPv6 domain to
   send Proxy Binding Update messages on behalf of a mobile node.



Ma, et al.                Expires July 7, 2012                 [Page 23]

Internet-Draft              Abbreviated Title               January 2012


   To eliminate the threats on the interface between the mobile access
   gateway and the mobile node, this specification requires an
   established trust between the mobile access gateway and the mobile
   node and to authenticate and authorize the mobile node before it is
   allowed to access the network.  Further, the established
   authentication mechanisms enabled on that access link will ensure
   that there is a secure binding between the mobile node's identity and
   its link-layer address.  The mobile access gateway will definitively
   identify the mobile node from the packets that it receives on that
   access link.

   To address the threat related to a compromised mobile access gateway,
   the local mobility anchor, before accepting a Proxy Binding Update
   message for a given mobile node, may ensure that the mobile node is
   attached to the mobile access gateway that sent the Proxy Binding
   Update message.  This may be accomplished by contacting a trusted
   entity, which is able to track the mobile node!_s current point of
   attachment.  However, the specific details of the actual mechanisms
   for achieving this is outside the scope of this document.


9.  IANA Considerations

   This document defines six new Mobility Header options, the
   HomeNetwork Prefix Option, Handoff Indicator Option, Access
   Technology Type Option, Mobile Node Link-layer Identifier Option,
   Link-local Address Option, and Timestamp Option.  The Type value for
   these options has been assigned from the same numbering space as
   allocated for the other mobility options,as defined in [RFC3775].

   The Handoff Indicator Option introduces a new Handoff Indicator (HI)
   numbering space, where the values from 0 to 5 have been reserved by
   this document.  Approval of new Handoff Indicator type values are to
   be made through IANA Expert Review.

   The Access Technology Type Option introduces a new Access Technology
   type (ATT) numbering space, where the values from 0 to 5 have been
   reserved by this document.  Approval of new Access Technology type
   values are to be made through IANA Expert Review.

   This document also defines new Binding Acknowledgement status values.
   The status values MUST be assigned from the same number space used
   for Binding Acknowledgement status values,as defined in [RFC3775].
   The allocated values for each of thesestatus values must be greater
   than 128.

   This document creates a new registry for the flags in the Binding




Ma, et al.                Expires July 7, 2012                 [Page 24]

Internet-Draft              Abbreviated Title               January 2012


   Update message called the "Distinguish Flag".

   The following flags are reserved:

   (A) 0x8000 [RFC3775]

   (H)0x4000 [RFC3775]

   (L)0x2000 [RFC3775]

   (K) 0x1000 [RFC3775]

   (M) 0x0800 [RFC4140]

   (R) 0x0400 [RFC3963]

   (P) 0x0200[RFC5213]

   This document reserves a new flag (D) as follows:

   (D) 0x0100

   The rest of the values in the 16-bit field are reserved.  New values
   can be assigned by Standards Action or IESG approval.

   This document also creates a new registry for the flags in the
   Binding Acknowledgment message called the "Distinguish Flag".  The
   following values are reserved.

   (K) 0x80 [RFC3775]

   (R) 0x40 [RFC3963]

   (P) 0x20 [RFC5213]

   This document reserves a new flag (D) as follows:

   (D) 0x10


10.  References

10.1.  Normative References

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119, March 1997.

   [RFC2473]  Conta, A. and S. Deering, "Generic Packet Tunneling in



Ma, et al.                Expires July 7, 2012                 [Page 25]

Internet-Draft              Abbreviated Title               January 2012


              IPv6 Specification", RFC 2473, December 1998.

   [RFC3168]  Ramakrishnan, K., Floyd, S., and D. Black, "The Addition
              of Explicit Congestion Notification (ECN) to IP",
              RFC 3168, September 2001.

   [RFC3315]  Droms, R., Bound, J., Volz, B., Lemon, T., Perkins, C.,
              and M. Carney, "Dynamic Host Configuration Protocol for
              IPv6 (DHCPv6)", RFC 3315, July 2003.

   [RFC3775]  Johnson, D., Perkins, C., and J. Arkko, "Mobility Support
              in IPv6", RFC 3775, June 2004.

   [RFC4282]  Aboba, B., Beadles, M., Arkko, J., and P. Eronen, "The
              Network Access Identifier", RFC 4282, December 2005.

   [RFC4283]  Patel, A., Leung, K., Khalil, M., Akhtar, H., and K.
              Chowdhury, "Mobile Node Identifier Option for Mobile IPv6
              (MIPv6)", RFC 4283, November 2005.

   [RFC4291]  Hinden, R. and S. Deering, "IP Version 6 Addressing
              Architecture", RFC 4291, February 2006.

   [RFC4301]  Kent, S. and K. Seo, "Security Architecture for the
              Internet Protocol", RFC 4301, December 2005.

   [RFC4303]  Kent, S., "IP Encapsulating Security Payload (ESP)",
              RFC 4303, December 2005.

   [RFC4861]  Narten, T., Nordmark, E., Simpson, W., and H. Soliman,
              "Neighbor Discovery for IP version 6 (IPv6)", RFC 4861,
              September 2007.

   [RFC5213]  Gundavelli, S., Leung, K., Devarapalli, V., Chowdhury, K.,
              and B. Patil, "Proxy Mobile IPv6", RFC 5213, August 2008.

10.2.  Informative References

   [RFC1981]  McCann, J., Deering, S., and J. Mogul, "Path MTU Discovery
              for IP version 6", RFC 1981, August 1996.

   [RFC2865]  Rigney, C., Willens, S., Rubens, A., and W. Simpson,
              "Remote Authentication Dial In User Service (RADIUS)",
              RFC 2865, June 2000.

   [RFC3588]  Calhoun, P., Loughney, J., Guttman, E., Zorn, G., and J.
              Arkko, "Diameter Base Protocol", RFC 3588, September 2003.




Ma, et al.                Expires July 7, 2012                 [Page 26]

Internet-Draft              Abbreviated Title               January 2012


   [RFC3963]  Devarapalli, V., Wakikawa, R., Petrescu, A., and P.
              Thubert, "Network Mobility (NEMO) Basic Support Protocol",
              RFC 3963, January 2005.

   [RFC3971]  Arkko, J., Kempf, J., Zill, B., and P. Nikander, "SEcure
              Neighbor Discovery (SEND)", RFC 3971, March 2005.

   [RFC4140]  Soliman, H., Castelluccia, C., El Malki, K., and L.
              Bellier, "Hierarchical Mobile IPv6 Mobility Management
              (HMIPv6)", RFC 4140, August 2005.

   [RFC4306]  Kaufman, C., "Internet Key Exchange (IKEv2) Protocol",
              RFC 4306, December 2005.

   [RFC4330]  Mills, D., "Simple Network Time Protocol (SNTP) Version 4
              for IPv4, IPv6 and OSI", RFC 4330, January 2006.

   [RFC4372]  Adrangi, F., Lior, A., Korhonen, J., and J. Loughney,
              "Chargeable User Identity", RFC 4372, January 2006.

   [RFC4821]  Mathis, M. and J. Heffner, "Packetization Layer Path MTU
              Discovery", RFC 4821, March 2007.

   [RFC4830]  Kempf, J., "Problem Statement for Network-Based Localized
              Mobility Management (NETLMM)", RFC 4830, April 2007.

   [RFC4831]  Kempf, J., "Goals for Network-Based Localized Mobility
              Management (NETLMM)", RFC 4831, April 2007.


Authors' Addresses

   Zhengming Ma
   SUN YAT-SEN UNIVERSITY
   Department of Electronics and Engineering,daxuecheng,313
   Zhongshan University,Guangzhou,   510006
   P.R. China

   Email: issmzm@mail.sysu.edu.cn












Ma, et al.                Expires July 7, 2012                 [Page 27]

Internet-Draft              Abbreviated Title               January 2012


   Ke Wang
   SUN YAT-SEN UNIVERSITY
   Department of Electronics and Engineering,daxuecheng,313
   Zhongshan University,Guangzhou,   510006
   P.R. China

   Email: wang923zheng@sina.com


   Fei Zhang
   SUN YAT-SEN UNIVERSITY
   Department of Electronics and Engineering,daxuecheng,313
   Zhongshan University,Guangzhou,   510006
   P.R. China

   Email: zsu05zhangfei@163.com



































Ma, et al.                Expires July 7, 2012                 [Page 28]