Internet DRAFT - draft-melia-mipshop-niho-ps
draft-melia-mipshop-niho-ps
MIPSHOP Working Group T. Melia
Internet-Draft NEC
Expires: December 20, 2006 J. Korhonen
TeliaSonera
R. Aguiar
IT
S. Sreemanthula
Nokia
V. Gupta
Intel
June 18, 2006
Network initiated handovers problem statement
draft-melia-mipshop-niho-ps-00
Status of this Memo
By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on December 20, 2006.
Copyright Notice
Copyright (C) The Internet Society (2006).
Abstract
This is a first document describing the rational about network
Melia, et al. Expires December 20, 2006 [Page 1]
Internet-Draft Network Initiated Handovers June 2006
support for decision making and execution of handovers. Starting
from existing technologies and considering new trends from mobile
operators, we draw potential deployment scenarios and derive a set of
associated functionalities. These functionalities and associated
assumptions are listed in the document. Application areas for
network initiated handovers are then illustrated specifying a set of
goals and non-goals to be addressed in a future version.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1. Overview of the problem . . . . . . . . . . . . . . . . . 4
1.2. Definition of Network Initiated Handover . . . . . . . . . 6
1.3. Terminology . . . . . . . . . . . . . . . . . . . . . . . 6
2. Assumptions . . . . . . . . . . . . . . . . . . . . . . . . . 8
3. Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . 10
3.1. Administrative domain wise considerations . . . . . . . . 10
3.2. Technology wise considerations . . . . . . . . . . . . . . 13
3.3. NIHO Application Areas . . . . . . . . . . . . . . . . . . 13
4. General Requirements . . . . . . . . . . . . . . . . . . . . . 14
4.1. Network assistance with global mobility management . . . . 14
4.2. Network assistance with local mobility management . . . . 15
4.3. Inter-domain handovers . . . . . . . . . . . . . . . . . . 15
5. Framework and Functional Components . . . . . . . . . . . . . 16
6. NIHO with IEEE 802.21 . . . . . . . . . . . . . . . . . . . . 17
6.1. Network Selection . . . . . . . . . . . . . . . . . . . . 18
6.2. Handover Control . . . . . . . . . . . . . . . . . . . . . 20
7. Design considerations . . . . . . . . . . . . . . . . . . . . 22
7.1. Goals . . . . . . . . . . . . . . . . . . . . . . . . . . 22
7.2. Non-goals . . . . . . . . . . . . . . . . . . . . . . . . 23
8. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 23
9. Security Considerations . . . . . . . . . . . . . . . . . . . 23
10. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 24
11. References . . . . . . . . . . . . . . . . . . . . . . . . . . 24
11.1. Normative References . . . . . . . . . . . . . . . . . . . 24
11.2. Informative References . . . . . . . . . . . . . . . . . . 24
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 26
Intellectual Property and Copyright Statements . . . . . . . . . . 28
Melia, et al. Expires December 20, 2006 [Page 2]
Internet-Draft Network Initiated Handovers June 2006
1. Introduction
Standards based IP mobility enabling protocols such as Mobile IP
[RFC3344] [RFC3775], HIP [RFC4423], MOBIKE [RFC4555] and SCTP with
address management support [I-D.ietf-tsvwg-addip-sctp] [mSCTP] are
all mobile node centric: the handover related decision making is
mostly done in the mobile node only.
Public mobile network access is gaining increased diversity, both in
terms of the types of access technologies, in terms of the diversity
of the offer (with clear separation of roles between access and
service providers), and in terms of the size of that offer. This
diversity has been compounded by increasing number of multi-access
capable terminals equipped with IP technologies, and of operator-
provided multi-technology mobile connection software. Overall, this
creates a complex environment, where the mobile terminal might not
have enough information or even the possibility to make an
intelligent handover decision (as is often the case of operator-
provided software). In fact, handover decisions and inherent target
network selection is not necessarily anymore based on access
availability but further depends on policies and commercial roaming
arrangements on access network level, access provider level and
service provider level. Furthermore, the information required for an
intelligent target network selection might change periodically with
such a frequency that maintaining all knowledge (and intelligence) in
the mobile node might not be viable anymore. Some of this
information is only available for network elements. However, none of
the mobility protocols above referred have capabilities or procedures
to significantly involve network side entities in intelligent
handover decision making.
A good example of the type of information only available at network
entities is radio resource usage. It is expected that radio resource
usage optimization will be a task of major relevance in future
wireless network environments, with millions of users roaming between
access routers across multiple technologies (i.e. 802.11, 802.16,
e.g. [draft-cui-mobopts-hcf-wlan-00]). This task can resort to
mechanisms and algorithms able to gather measurements and force
terminal handovers between cells. The handover can be issued
according to predefined mobility patterns, mechanisms for intelligent
flow balancing, mechanisms for optimized resource re-allocation,
mechanisms for user-traffic performance optimization, or mechanisms
for user profiling (e.g. access rights) - all of them ultimately
leading to better service to be provided to the users, with
additional increased resource usage for the network operator. For
these expectations to be realized, network control capabilities are
required to instruct specific terminals to perform handovers, either
between access points or between different technologies.
Melia, et al. Expires December 20, 2006 [Page 3]
Internet-Draft Network Initiated Handovers June 2006
Going even further, handovers over administrative domains i.e. inter-
domain handovers are not explicitly prohibited with the existing IP
mobility enabling protocols, but at the same time these protocols are
not designed or optimized for such cases in any way. Also a general
network controlled triggering mechanism for a handover from an
administrative domain to another does not currently exists. Some
initial work in this direction is introduced in [I-D.nakhjiri-aaa-
hokey-ps]. The document describes how EAP keying material combined
with hierarchical schemes could enhance roaming scenarios.
This problem statement document describes various scenarios where
handovers could be network initiated, even over administrative
domains, presenting some ideas on functional components and protocol
operations required to fulfill the above requirements. This,
however, will further require a new handover triggering mechanism
that originates from entities located in the network side, and is
acted upon by entities on the mobile node. These network side
entities may also be located in other administrative domains than the
one the mobile node is currently visiting. In Section 6 an example
is provided on how IEEE 802.21 can implement the required signalling.
Finally, this document also discusses and lists a set of goals and
non-goals for further work that aims at enabling network initiated
and assisted handovers, even over administrative domains.
1.1. Overview of the problem
Current standard mobility protocols provide Internet connectivity to
mobile nodes roaming from one access router to another. To reduce
handover latency, extensions to mobility protocols are available
(e.g. [RFC4068], [RFC4140]). Although some of the approaches
support network initiation of the handover procedure, none of them
takes into consideration the existence of a backend combining
mobility, resource management and roaming scenarios. In this
document we present a list of requirements according to which this
characteristic is not adequate, and the protocols need to be extended
with handover initiation by the network.
In [I-D.mohan-nflm-proto] a network based fast handoff based
mechanism is proposed. The scenario considers a mobility anchor
point controlling several access routers. On behalf of the mobile
node the serving access routers updates routes and binding caches
allowing the traffic to be routed to the new location. The trigger
comes from the mobile node.
There has been work started in the last months to split local
mobility from global mobility. Local mobility in the access network
mainly optimizes control signaling by reducing the need to update the
home/visited network about user mobility. Local mobility can be
Melia, et al. Expires December 20, 2006 [Page 4]
Internet-Draft Network Initiated Handovers June 2006
handled independently of the global mobility. As an example, in
[I-D.ietf-netlmm-nohost-ps] a list of requirements is given in order
to identify desired functionalities. In the proposed document mobile
devices are able to move across an access network by reducing to the
minimum the complexity in the terminal itself. Therefore the network
is requested to handle user mobility by means of appropriate schemes.
In this last proposal the trigger for host route update executed by
the network (which is actually an handover execution) is originating
in the terminal. By means of layer two mechanisms (e.g. link up or
link down in IEEE 802.11) or layer three mechanisms (e.g. Neighbor
discovery) the terminal is detected on the new link and the route to
the host updated for packet delivery. Thus, the whole network
intervention is simply the support of route update. The real
trigger/decision comes, once again, from the terminal.
Following the split between global mobility domain and local mobility
domain, [3GPP.23.882] provides additional scenarios where the network
controlled and initiated handovers are also considered. The key
point is that is the initiator of the handover procedure is mainly
the serving radio access network, in contrast to the above explained
methods.
More short term deployable solutions have also been proposed. In
[draft-cui-mobopts-hcf-wlan-00] a WLAN scenario is presented and
extensions to Mobile IPv6 messages are introduced to support an
handover control function for handover decision. [I-D.melia-mobopts-
niho-fmip] proposes a fast mobile IP based approach where both mobile
terminal and network initiated handovers are possible. Network
initiated handovers are combined with advanced admission control
mechanisms and potential race conditions are solved by appropriate
protocol operations.
Additional ways of providing information to the network enabling
handover decisions are presented in [I-D.korhonen-mobopts-link-
characteristics-ps]. Methods are provided to enable Mobile IPv6 and
Mobile IPv4 capable nodes to exchange link information with the HA
and any CN. However, to generalize the approach, the link
characteristics exchange should happen during the handover process,
since the Binding Update handshake conclude the handover process,
when (bicasted) packets are already routed to the new Care-of Address
(nCoA). For instance, specialized traffic shapers could be installed
in the ARs to adapt a selected MT-CN flow to the specific underlying
wireless/wire line access technology. Or (re)INVITE messages could
be issued, in 3GPP multimedia communications.
In the above mentioned examples we note an increasing involvement of
the network in the mobility management problem. The aim of this
Melia, et al. Expires December 20, 2006 [Page 5]
Internet-Draft Network Initiated Handovers June 2006
document is to identify common lines to existing solutions and to
derive the set of functionalities required to perform this kind of
handovers.
1.2. Definition of Network Initiated Handover
As mentioned above, available solutions rely on the existence of
triggers generated in the mobile terminal and conveyed to respective
network components which then will take adequate actions. However,
recently we have been assisting to new different trends [3GPP.23.882]
where the serving radio access network issue handover preparation/
execution by means of different events gathered at different levels
(e.g. radio conditions, QoS requirements). We therefore are required
to define use cases in which the network takes active decisions
without requiring the terminal to perform expensive operations.
In this document by network initiated handover we identify the action
taken in the network to initiate the handover based on:
o Link events originated in the mobile node. In this case the
terminal sends link events to the network. The event might be
generated because of radio variations, powering on of new network
devices or new service requirements. In all cases the measurement
action is required to be performed also in critical conditions.
For instance speed dynamic effects on terminal mobility have to be
taken into account as well as variable round trip time.
Positioning of the decision function is a critical issue.
o Events generated in the network for e.g. resource management
reasons. It should be noted that the Mobile Operator can initiate
an handover procedure also based on location and current services.
Multihoming scenarios can also be considered as part of the
overall optimization problem.
The action described is similar to exiting behavior of current GSM/3G
systems. Measurements are requested by the network and performed by
the mobile terminal. The results of these measurements, combined
with current QoS conditions and other user profile requirements,
could result in the execution of an handover. Measurements are a key
issue, for instance, in indoor wireless LANs environments, affected
also by different user mobility patterns.
1.3. Terminology
In this document, several words are used to signify the requirements
of the specification. These words are often capitalized.
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
Melia, et al. Expires December 20, 2006 [Page 6]
Internet-Draft Network Initiated Handovers June 2006
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119].
This document frequently uses the following terms:
NAP
Network Access Provider. A network operator that provides direct
IP packet forwarding to and from the end host.
MRMH
Mobility and Roaming Manager, usually located at home network.
The Roaming Manager part is aware of administrative relationships
between the home network, various ISPs and possibly with various
NAPs as well.
MRMV
Mobility and Roaming Manager located at visited network. MRMV is
generally a local representative of MRMH in the visited network.
MSP
Mobility Service provider. A service provider that provides IP
mobility services. In order to obtain such service, the mobile
node must be authenticated and prove authorization to obtain the
service.
NIHO
Network initiated and assisted handover.
AN
Access Network composed of several access routers. Identified as
well as local mobility domain.
IS
Information services provide an information query mechanism for
mobile or network nodes to obtain information about specific
networks and their capabilities, as explained in IEEE 802.21. The
information service plays a critical role in the network selection
at the mobile node or in the network.
Melia, et al. Expires December 20, 2006 [Page 7]
Internet-Draft Network Initiated Handovers June 2006
ES
Event service is a protocol exchange mechanism between network
nodes to inform of recently happened or impending change in link
or network status information, as explained in IEEE 802.21. The
event notification can originate either from a mobile node or a
node in the network. Receipt and processing of an event belonging
to the ES may generate a reaction in the receiving node (e.g.
trigger IP layer mobility).
CS
Command service is a protocol exchange mechanism between network
nodes to instruct the recipient network nodes to execute a
specific function, as explained in IEEE 802.21. Execution of a
command service at the mobile node or a node in the network may
result in loss of current link connectivity and/or change in the
network point of attachment. Receipt and processing of a command
belonging to the CS generates an expected response in the
receiving node (e.g. create a new link layer connection,
disconnect a link layer connection, etc).
MIHF
Media independent handover function (MIHF)is a shim layer in the
mobility management protocol stack of the mobile nodes or network
element that provide media independent or inter-technology
mobility, specifically handovers (e.g. as defined in IEEE 802.21).
MIHF can implement one or more of IS, ES and CS.
MM
A mobility management entity (MM) implements network selection and
handover decision algorithms and utilizes mobility signaling
protocols and other protocols that aid in mobility functions. MM
functionality should utilize MIHF.
2. Assumptions
This document has some few fundamental assumptions concerning the
general networking environment and network initiated handovers. The
rest of the document makes use of the following assumptions:
Melia, et al. Expires December 20, 2006 [Page 8]
Internet-Draft Network Initiated Handovers June 2006
o Reusing existing security mechanisms -- The mobile node should
reuse the existing security associations it created while
establishing the initial access to the network and its mobility
service provider (MSP). Applicable scenarios are identified in
[I-D.nakhjiri-aaa-hokey-ps].
o All mobile nodes within the scope of this document are expected to
support at least one (potentially modified) existing or future IP
mobility enabling protocol. However, if a MN does not support
network initiated handover functionality, the network might refuse
to give service to that MN.
o All mobile nodes, correspondent nodes and mobility management
nodes are not expected to understand or support network initiated
and assisted handovers. When either peer lacks support for
network initiated and assisted handover triggering and signaling
the peer supporting these features must fall back to the base IP
mobility protocol mechanisms.
o The network initiated handover concept relies on the presence of a
centralized functional entity. This entity controls the network
side and implement the intelligence to select nodes and targets
access routers. It is not in the scope of this document to
specify the policies that will be implemented.
o To provide adequate scalable support, distributed functions are
required to support the above functional entity. This gives more
flexibility to the overall architecture and protocol operation.
o It is envisioned the presence of multi wireless access, such as
802.11, 802.16, UMTS, forming an heterogeneous composition of
macro and micro cells. The network support SHOULD leverage user
mobility focusing on vertical handovers. Hence, the terminal does
not need to apply filtering criteria to select a target network
(which could be an expensive operation in heterogeneous
environments). Solutions similar to the 3GPP interface between
the Home Subscriber Server (HSS) and any application server, for
downloading of filtering criteria at registration time, could be
applied here - being the HSS a AAA backend, and the application
server the MRMV/MRMH.
o Performing network initiated handover has the main implication
that the network has first to assess the terminal view of the
network. Signal level evaluation is a important matter when
considering user mobility. This is typically very well handled
with terminal initiated handovers and automatic evaluation of
signal level. Different methods apply to different technologies.
Melia, et al. Expires December 20, 2006 [Page 9]
Internet-Draft Network Initiated Handovers June 2006
o Neighborhood discovery relates to the above assumption when
neighborhood scanning is requested from the network. It is
expected these functions to be available on the terminal side.
3. Scenarios
This section describes few usage scenarios where the network
initiated and assisted handover could be justified and deployed.
Also we list here initial requirements for the general network
initiated and assisted handover functionality.
3.1. Administrative domain wise considerations
Figure 1 and Figure 2 introduce two different possible scenarios. In
the first case one single administrative scenario is described. The
Mobile Operator (MO) owns both the ISPs and the NAPs. It provides as
well mobility services. This is the simplest case where security
restrictions are less relevant. The MO has therefore full control.
Figure 2 illustrates another example architecture, where the
signaling and triggering relationship between home network domain,
ISP domain, NAP domain and the mobile node domain are shown. Each of
previously mentioned technical domains may belong to a different
administrative domain.
Melia, et al. Expires December 20, 2006 [Page 10]
Internet-Draft Network Initiated Handovers June 2006
.--. <-++
Mobile Operator _( `. |S
Home Network ( MRMH ) |i
( ` . ) ) |n
`--(___.-' |g
^ |l
NIHO / triggers signaling |e
/ |
.--. V |a
_( `. |d
( ISP ) |m
( ` . ) ) |i
`--(___.-' |n
^ ^ |i
/ NIHO \ triggers signaling |s
/ \ |t
V V |r
.--. .--. |a
_( `. _( `. |t
( NAP ) ( NAP ) |i
( ` . ) ) ( ` . ) ) |v
`--(___.-' `--(___.-' |e
| |
| ) |d
V ) ) NIHO trigger & signaling |o
____ ) ) ) |m
|____|_Y |a
/_____/ |i
|n
<--+
Figure 1: An overall architecture for network initiated and assisted
handover. Single Administrative domain
Melia, et al. Expires December 20, 2006 [Page 11]
Internet-Draft Network Initiated Handovers June 2006
.--. <-+
_( `. |
Home Network ( MRMH ) |
( ` . ) ) |
`--(___.-' | D
^ ^ | o
NIHO / triggers \ signaling | m
/ \ | a
.--. V V .--. | i
_( `. NIHO triggers _( `. | n
<--- ( ISP A ) <---------------> ( ISP B ) ---> |
( ` . ) ) signaling ( ` . ) ) |
`--(___.-' `--(___.-' | 1
^ ^ ^ ^ ^ |
/ NIHO \ \ triggers / \ signaling |
/ \ \ / \ <-+
V V \ V V | D
.--. .--. \ .--. .--. | o
_( `. _( `. V _( `. _( `. | m
( NAP A ) ( NAP A ) ( NAP B ) ( NAP C ) | a
( ` . ) ) ( ` . ) ) ( ` . ) ) ( ` . ) ) | i
`--(___.-' `--(___.-' `--(___.-' `--(___.-' | n
| 2
| ) <-+
V ) ) NIHO trigger & signaling | D
____ ) ) ) | o
|____|_Y | m
/_____/ | 3
<-+
Figure 2: An overall architecture for network initiated and assisted
handovers over multiple administrative domains
The architecture in Figure 2 has been divided into three different
domains. Domain 1 represents the home network or the services
provider that owns and manages user's subscription. It eventually
contains Internet Service Providers (ISPs) as well.
Domain 2 contains Network Access Providers (NAPs). A NAP provides
access services for one or more Home Networks.
Domain 3 is the mobile node and may also represent the end user. The
end user does not need to have any relationship with NAPs or ISPs in
order the gain access to the services accessible through the home
network.
Along these lines [I-D.nakhjiri-aaa-hokey-ps] proposes a distributed
Melia, et al. Expires December 20, 2006 [Page 12]
Internet-Draft Network Initiated Handovers June 2006
system interacting with a AAA backend. The introduced key Holder
element acting as a AAA client for the AAA server COULD -- in this
scenario -- be implemented at the boundaries of each single cloud,
belonging either to a NAP or to an ISP. SAs presented in the
document can be mapped to the mechanisms depicted in Figure 2.
3.2. Technology wise considerations
In the previous section we provided an high level view of network
relationships between the different entities involved. Figure 1 and
Figure 2 describes a general network view without describing which
technologies are supported and where optimizations take place. It is
clear MO will have different environment deployments. In the
following we give some examples on how technologies can be mapped to
NAP implementing several Access Networks and creating potentially
complex overlapping of macro and micro cells scenarios.
+=====================================+
= UMTS MACROCELL =
= =
= =
= +--------------------------+ =
= | 802.16 CELL | =
= | | =
= | 802.11 | =
= | oo xx @@ | =
= | o o x x @ @ | =
= | o ox x@ @ | =
= | o xo @x @ | =
= | o ox x@ @ | =
= | o o x x @ @ | =
= | oo xx @@ | =
= +--------------------------+ =
= =
+=====================================+
Figure 3: An example of overlapping Micro and Micro cells
These cells can be actually owned by the same or by different NAPs.
In any case, the MRMH will collect information about all these cells
(as visible from the terminal) across the different domains.
3.3. NIHO Application Areas
We foresee three possible application areas that are listed and
briefly described in the following section. Each application area
uses the NIHO triggering and signaling as part of their tasks.
Melia, et al. Expires December 20, 2006 [Page 13]
Internet-Draft Network Initiated Handovers June 2006
o Application for Mobility Reasons
In this context user mobility is handled from the network side
assisted by the mobile terminal. This particular application
requires network capabilities to request measurements and evaluate
technologies specific link conditions. The approach can be
considered similar to what current mobile networks do. The most
challenging aspect is the freshness of the reported information.
Particular scenarios, such as WLAN, could impose stringent
requirements.
o Application for Resource Optimization Reasons
As mentioned before, network optimization is a delicate issue when
resources are scarce, especially in the wireless access network.
Standards that able to support natively quality of services
capabilities are becoming mature to be sold on the market
(802.11e). A cross layer design is therefore required to convey
link layer specific information to decision points located in the
access network.
These decision points can combine standard admission control
mechanisms with advanced NIHO functionalities, resulting in a new
dimension of mobility management (i.e. more terminals can be
granted with network access).
o Application for inter-domain handover
Handovers that cause the mobile to cross administrative domain
borders involve inter-domain signaling. One example of this kind
of scenario is when the mobile node moves between different NAPs
under the same ISP or when even the ISP changes as a result of the
movement. In both of these scenarios the NIHO signaling could be
used to prepare the new target domain (either ISP and/or NAP) for
the arriving mobile node. Especially if the handover was
initiated from the network side, the handover initiating network
could help distributing all security, policies, billing and
service related material cross administrative domains before the
mobile node arrives.
4. General Requirements
4.1. Network assistance with global mobility management
This aspect is particularly important for inter-domain handovers.
The network will provide information required for speeding the
handover. This information is related with two types of data: i)
Melia, et al. Expires December 20, 2006 [Page 14]
Internet-Draft Network Initiated Handovers June 2006
operator related data, such as billing information, policies, etc..;
ii) terminal related data, such as security associations.
4.2. Network assistance with local mobility management
This aspect is particularly important for resource optimization and
intra-domain handovers. The network will provide information to lead
(or impose) the mobile terminal to associate to specific access
points.
4.3. Inter-domain handovers
Inter-domain handovers and inter-domain handover preparations require
entities involved in the triggering and signaling to have security
relationships in place between them. For example the MRMH located at
the home network (service provider) must have a security relationship
between all ISPs the end user can use for accessing services. Also
ISPs must have security relationship between all NAPs the end user
can use for accessing services. However, NAPs do no necessarily need
to have any relationship with the actual service provider. And going
even further the end user does not need to have any relationship
between NAPs and ISPs, only with the service provider. It is service
provider's duty to grant access to services via any NAP and ISP the
service provider has a direct or indirect pre-setup relationship.
In addition to obvious security and AAA related challenges between
the service operator, ISPs and NAPs, the general when and why to
trigger a handover towards the mobile node is not a trivial task.
The service provider's home network needs to have rather exact and up
to date knowledge of the mobile node's current topological location
and surrounding network conditions before it should trigger a
handover on the mobile node due same policy decision at the home
network. Example of such policy decisions is when a mobile node
roams (after a handover) to a target network the home network does
not want the end user to use for the active service set the end user
has requested. As a consequence the home network MRMH triggers a new
handover suggestion towards the mobile node indicating a more
feasible target network (based on the information the mobile node has
previously signaled to the home network MRMH). Another home network
policy decision could be distributing roaming end users in visited
networks based on some distribution criteria. Such criteria could,
for example, be directing voice users to ISP A network, where as data
service users to ISP B network. A simpler rationale can be simply
redirecting the user to the mobile network whose charges are lower at
that time. The IEEE 802.21 Information service, for instance, could
help in this process.
The whole policy mechanism in the home network MRMH is a complex
Melia, et al. Expires December 20, 2006 [Page 15]
Internet-Draft Network Initiated Handovers June 2006
issue and out of scope of this document. However, the home network
MRMH needs information of its end users from dedicated NAP and ISP
entities. These information aggregating entities are discussed in
more detail in Section 5.
5. Framework and Functional Components
In the previous sections the need to implement decision points in the
network as well as measurements and aggregation functions has been
justified. We can draw on the previous considerations to derive a
framework view.
o Policy Decision Point
This could be on the MRMH or MRML depending on the case. In the
IEEE 802.21 draft event and command services for network initiated
handovers are associated with the Point of Services (PoS). In
[3GPP.23.882]the access nnetwork takes decision about initiating
the handover. Generalizing the approach we call this functional
entity Policy Decision Point. It is envisioned to place the PDP
at the edge of a localized mobility domain or in the home network.
In case of a ISP or NAP the PDP needs to have in place a SA with
the home domain of the mobile user as specified in [I-D.nakhjiri-
aaa-hokey-ps].
The PDP can trigger/enforce a horizontal or vertical handover,
depending on the user device. It is also envisioned the
possibility to detect multihomed devices as part of the resource
management process.
o Policy Enforcement Point
Enforcement points participating to the signalling, and
contributing to the scalable approach, are necessary. PEP are
mainly access routers terminating different kind of transport
protocols (e.g. ICMPv6 over the last hop and SCTP between network
components).
o Measurements Functions
Measurements functions are critical components considering the
overall procedure, being collectively distributed between the
access routers and the mobile terminals. As mentioned before, the
network, prior to any action, needs to assess the terminal view
(i.e. link signal quality) of the access network. Currently none
of the available protocols can support such feature. Options
could be specified, though scalability and security have to be
Melia, et al. Expires December 20, 2006 [Page 16]
Internet-Draft Network Initiated Handovers June 2006
deeply studied. It is well understood measurements are requested
from the network to the mobile terminal.
o Aggregators Components
To increase the overall scalability of the procedure aggregation
points could be installed in different places in the access
networks. Aggregated reports to PDP about QoS conditions, service
availability, network load help in the decision process
contributing to build an overall picture of the access network
conditions. reports could be periodic or event based. In either
cases information of several hundreds of mobile terminals could be
carried.
Generally, the PDP acts upon events and combines required actions
with user profiles. Depending on billing rates, user preferences
action A instead of action B can be issued. The transfer and
definition of such profiles is not in scope of this document.
6. NIHO with IEEE 802.21
IS, ES and CS as defined in IEEE 802.21 WG can be used as enablers
for network initiated and assisted handover scenarios between
different access technologies. The discussion of such scenarios in
IP networks can easily raise a long list of questions regarding the
feasibility of e.g. sending information in real-time between the
mobile node and the MM, and of sending commands between the MM and
the mobile node. The issue considered in these cases is typically
the delay that can be introduced by the transport and that may make
the overall handover delay quite considerable. This document does
not discuss these specific issues, and does not argue in favor or
against such issues. However, in order to identify some of the
scenarios of applicability for IS, ES and CS for network-controlled
handover, we need to consider the following classification of
handovers. There are two main reasons to perform a handover:
1. degradation of current link/connection quality: the quality of
the link is degrading and it is necessary to perform a handover
to avoid losing the current connection;
2. "opportunistic" handover: due to a set of events and based on
specific policies, it is preferable to move the communication to
another link.
In order to support inter-technology network-controlled handovers the
first case, the delay between the moment the handover decision is
made and the moment the command to perform the handover is received
Melia, et al. Expires December 20, 2006 [Page 17]
Internet-Draft Network Initiated Handovers June 2006
by the mobile node needs to be considered carefully. However, for
"opportunistic" handover the impact of such delay is less
significant, since the mobile node is not having any degradation over
the current link, and the handover will be performed because the
network has policies indicating that it is preferable to move to the
new link.
One motivation for performing opportunistic network-controlled
handover is load sharing, in scenarios where a network exercises
tight control of various wireless link technologies to distribute the
load of communications according to network policies.
The network may perform a network-controlled handover decision in at
least two steps.
1. Network selection, and
2. Handover control.
The two steps are described in the following sections
6.1. Network Selection
Network selection is a process of selecting a favorable network for a
mobile node to transfer or handover the ongoing services to the
selected network. The selected network may be a different link
technology from the previous one. It may also be possible that the
mobile node, after handover, may not experience exactly the same
level of QoS as the current link due to this network selection. But,
in general, it may result in some user benefit in one way or another
e.g. cost savings, higher bandwidth etc. MM in the network may have
access to subscriber profile, contracts, and device capabilities to
make use of the network selection algorithms for a certain subscriber
or mobile node.
Figure 4 shows a simple network selection procedure with the help of
the mobile node. This example call flow diagram employs remote event
services and information services. Remote command services are not
used in this particular example, however, they can also be useful in
the network selection mechanisms under certain scenarios. E.g.
depending on user geographical location, the network may command the
mobile node to perform a scan for a specific 802.11 network and
report the results that can be used in the network selection process.
In the scenario shown, the mobile node initially performs a
registration or attachment to the network on any link, e.g. 3GPP
network. The MM and the mobile node are able to discover each other
in the same or following step. MM may then register for specific
Melia, et al. Expires December 20, 2006 [Page 18]
Internet-Draft Network Initiated Handovers June 2006
remote event services, e.g. ES-link-detect by sending a registration
request and filter information for both 802.16 and 802.11 networks.
The mobile node accepts the request with a positive reply. From time
to time, the mobile node may receive broadcast information from
802.11 and 802.16 networks. In this scenario, the 802.16 broadcast
is received and a link-detect is sent by the 802.16 MAC layer to the
MIHF. The MIHF translates this to an ES-link-detect message to the
MIHF implementing ES in the network (collocated in the MM) with the
basic network information received in the broadcast.
The MM requests for more information about the network via the IS
query to another MIHF implementing IS to check the suitability of the
detected network due to roaming agreements. The MM decides that this
particular 802.16 network is not a favorable network and takes no
action. The mobile node also takes no action and does not report the
detection of same network more than once. At a later time, the
mobile node may receive beacon information from 802.11 AP and the MAC
layer in the mobile node reports the to the MIHF along with the SSID
information. The MIHF provides this information to the MM in the
network. The MM may perform an IS query based on the SSID
information and determines that this SSID belongs to a favorable
network. The network selection process, thereby, is completed.
Melia, et al. Expires December 20, 2006 [Page 19]
Internet-Draft Network Initiated Handovers June 2006
Mobile Node
|----------------------|
+--------+ +-------+ +-------+ +------+ +------+ +------+
|MIHF(ES)| | Link | | MM | | IS | |802.16| |802.11|
| | | Layers| | | | | | | | |
+--------+ +-------+ +-------+ +------+ +------+ +------+
| | | | | |
+------------------------------+ | | |
| Discovery & Registration| | | |
+------------------------------+ | | |
| 1.ES-reg-req | | | |
|<========================| | | |
| 2.ES-reg-resp | | | |
|========================>| | | |
~ ~ ~ ~ ~
| |3.DL-burst| | | |
| 4.link-detect|<--------------------------------| |
|<-------------| | | | |
| 5.ES-link-detect | | | |
|========================>|6.IS-query| | |
| | |--------->| | |
| | +-------------+ | | |
| | |not favorable| | | |
| | +-------------+ | | |
~ ~ ~ ~ ~ ~
| |7.Beacon | | | |
|8.link-detect |<-------------------------------------------|
|<-------------| | | | |
| 9.ES-link-detect | | | |
|========================>|10.IS-query | |
| | |--------->| | |
| | +-----------+ | | |
| | | favorable | | | |
| | +-----------+ | | |
| | | | | |
+--------+ +-------+ +-------+ +------+ +------+ +------+
|----------------------|
Legend: ===== ES over current link
Figure 4: Network Selection in Network
6.2. Handover Control
Handover control procedure follows a network selection process as
explained in the previous section. The following scenario in
Figure 5 shows a network-controlled handover procedure with fast MIP
handover signaling [RFC4068]. Here, the MM in the network utilizes
MIHF implementing CS and generates a link switch command with CS-
Melia, et al. Expires December 20, 2006 [Page 20]
Internet-Draft Network Initiated Handovers June 2006
switch-req to the mobile node. The parameters in the message may
include that a make-before-break mechanism is to be performed along
with the target link information e.g. 802.11 network as shown from
the network selection procedure earlier.
The MIHF indicates the Mobile IP function of the impending link
switch along with new link information. The Mobile IP functionality,
If necessary, i.e., it does not have a valid Access Router Tuple-Info
[RFC4068], it sends a Proxy Router Solicitation (PrRtrSol) with the
new link information (e.g. MAC address of AP) and the Proxy Router
Advertisement (PrRtrAdv) provides the relevant L3 information for the
mobile node to use on the new link. The MIHF in the mobile node
executes the command by sending an "associate" request to the 802.11
MAC which will perform all necessary L2 association and
authentication procedures for the new link. For completeness, steps
3 and 4 in Figure 5 can take place in parallel to steps 3 and 4.
A link-up indication is sent to the interested parties including
Mobile IP functionality. Mobile IP sends a Fast Binding Update (FBU)
to the old FA over the old link so that old FA could switch (tunnel)
the packets to the new FA. The mobile node now is able to receive
packets from new FA that are tunneled from old FA. At a later time,
the mobile node performs an Mobile IP update procedure to update the
binding in the HA and reroute the tunnels directly from HA to the new
FA in the new network corresponding to the 802.11 link. Once the
traffic uses the new link, the MIHF releases the old link by sending
a request to that MAC layer, here the 3GPP radio link. A CS-switch-
resp is sent back to the MM upon completion of the command.
The following signaling flow shows how the network controlled handoff
can work with fast MIP handover signaling [RFC4068]. It shows a
make-before-break mechanism, so that the mobile node sends the FBU on
the old link after the setup of the new link to minimize the latency
due to L2 association and authentication procedures. For
completeness, steps 3 and 4 in Figure 5 can take place in parallel to
steps 2 and 3.
Melia, et al. Expires December 20, 2006 [Page 21]
Internet-Draft Network Initiated Handovers June 2006
Mobile Node
|--------------------------|
+----+ +-----+ +-------+ +----+ +------+ +----+ +----+
|MIP | |MIHF | | Link | | MM | |802.11| | AR | | HA |
| | |(CS) | | Layers| | | | | | | | |
+----+ +-----+ +-------+ +----+ +------+ +----+ +----+
| | | | | | |
| | | +-----------+ | | |
| | | | Network | | | |
| | | | Selection | | | |
| | | +-----------+ | | |
| | 1.CS-switch-req | | | |
2.switch-ind|<====================| | | |
|<-------| 3. PrRtrSol | | | |
|=================================================>| |
| | 4. PrRtrAdv | | |
|<=================================================| |
| |3.associate| | | | |
| |---------->| 4.L2 Association | | |
5.link-up | |<---------------->| | |
|<--------| | | | | |
| | 6. FBU | | | |
|=================================================>| |
+----------------------------------------------------------------+
| Mobile IP update procedure over new link |
+----------------------------------------------------------------+
| 7.release | | | | |
| |---------->| | | | |
| | 8.CS-switch-resp | | | |
| |>>>>>>>>>>>>>>>>>>>>| | | |
| | | | | | |
+----+ +-----+ +-----+ +-----+ +----+ +------+ +---+
|------------------------------|
Legend: ===== over current link, >>>>over new link
Figure 5: Network-Controlled Handover Procedure
7. Design considerations
7.1. Goals
This section lists the general goals for the network initiated and
assisted handovers framework design. The network initiated and
assisted handover framework solution MUST fulfill all the goals
listed below:
Melia, et al. Expires December 20, 2006 [Page 22]
Internet-Draft Network Initiated Handovers June 2006
G1 Independent of the IP mobility management mechanism -- The network
initiated and assisted handover triggering mechanism must be
independent of any particular IP mobility management protocol.
However, there might be mappings/implementations of the triggering
mechanism to a specific IP mobility protocol such as Mobile IP.
G2 Work over administrative domains e.g. in inter-domain handover
cases or when a multi-homed host is attached to multiple ISPs.
G3 Provide similar degree of security as existing with the current
security protocols.
7.2. Non-goals
This section lists issues that are considered as strictly out of
scope of this problem statement and requirements document.
o Designing a new security framework in order to enable network
initiated and assisted handover triggering.
o Initial bootstrapping problem -- The mechanism to gain the initial
access to some network is out of scope of.
8. IANA Considerations
This document does not define any new name spaces to be managed by
IANA. This document does not either reserve any new numbers or names
under any existing name space managed by IANA.
9. Security Considerations
At the time of writing this document, the threats to network
initiated and assisted IP handovers in general, and signaling and
triggering between the mobile node and corresponding network entities
are not widely understood, particularly in the inter-domain handover
case when the signaling and triggering takes place across
administrative domains. Part of the experimental task in preparing
network initiated and assisted handovers (even across administrative
domains) for eventual standards track will be to better characterize
threats to network initiated and assisted handovers, inter-domain
triggering and signaling, and design specific mechanisms to counter
them.
Work along these lines already started. [I-D.nakhjiri-aaa-hokey-ps]
presents initial ideas how the problems described in this document
could be solved.
Melia, et al. Expires December 20, 2006 [Page 23]
Internet-Draft Network Initiated Handovers June 2006
10. Acknowledgments
The authors would like to thank Rajeev Koodli for his valuable
comments and suggestions.
11. References
11.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
11.2. Informative References
[RFC3344] Perkins, C., "IP Mobility Support for IPv4", RFC 3344,
August 2002.
[RFC4423] Moskowitz, R. and P. Nikander, "Host Identity Protocol
(HIP) Architecture", RFC 4423, May 2006.
[RFC4555] Eronen, P., "IKEv2 Mobility and Multihoming Protocol
(MOBIKE)", RFC 4555, June 2006.
[I-D.ietf-mobike-design]
Kivinen, T. and H. Tschofenig, "Design of the MOBIKE
Protocol", draft-ietf-mobike-design-03 (work in progress),
July 2005.
[I-D.ietf-tsvwg-addip-sctp]
Stewart, R., "Stream Control Transmission Protocol (SCTP)
Dynamic Address Reconfiguration",
draft-ietf-tsvwg-addip-sctp-12 (work in progress),
June 2005.
[mSCTP] Xing, W., Karl, H., and A. Wolisz, "M-SCTP: Design and
prototypical implementation of an end-to-end mobility
concept", October 2002.
[RFC3775] Johnson, D., Perkins, C., and J. Arkko, "Mobility Support
in IPv6", RFC 3775, June 2004.
[draft-cui-mobopts-hcf-wlan-00]
Cui, Y., "Handover Control Function Based Handover for
Mobile IPv6", draft-cui-mobopts-hcf-wlan-00 (work in
progress), July 2005.
[draft-daniel-mip-link-characteristic-02]
Melia, et al. Expires December 20, 2006 [Page 24]
Internet-Draft Network Initiated Handovers June 2006
Park, S., "Link Characteristics Information for Mobile
IP", draft-daniel-mip-link-characteristic-02 (work in
progress), June 2005.
[3GPP.23.882]
3GPP, "3GPP system architecture evolution (SAE): Report on
technical options and conclusions", 3GPP TR 23.882 0.10.1,
February 2006.
[I-D.nakhjiri-aaa-hokey-ps]
Nakhjiri, M., "AAA based Keying for Wireless Handovers:
Problem Statement", draft-nakhjiri-aaa-hokey-ps-01 (work
in progress), January 2006.
[I-D.vidya-mipshop-handover-keys-aaa]
Narayanan, V., "Handover Keys Using AAA",
draft-vidya-mipshop-handover-keys-aaa-01 (work in
progress), October 2005.
[I-D.ietf-netlmm-nohost-ps]
Kempf, J., "Problem Statement for IP Local Mobility",
draft-ietf-netlmm-nohost-ps-00 (work in progress),
February 2006.
[I-D.mohan-nflm-proto]
Parthasarathy, M., "Network-based Fast Handovers for Local
Mobility (NFLM)", draft-mohan-nflm-proto-00 (work in
progress), October 2005.
[RFC4140] Soliman, H., Castelluccia, C., El Malki, K., and L.
Bellier, "Hierarchical Mobile IPv6 Mobility Management
(HMIPv6)", RFC 4140, August 2005.
[RFC4068] Koodli, R., "Fast Handovers for Mobile IPv6", RFC 4068,
July 2005.
[I-D.melia-mobopts-niho-fmip]
Melia, T., "Network initiated handover in fast mobile
IPv6", draft-melia-mobopts-niho-fmip-01 (work in
progress), July 2005.
[I-D.korhonen-mobopts-link-characteristics-ps]
Korhonen, J., "Link Characteristic Information for IP
Mobility Problem Statement",
draft-korhonen-mobopts-link-characteristics-ps-00 (work in
progress), October 2005.
Melia, et al. Expires December 20, 2006 [Page 25]
Internet-Draft Network Initiated Handovers June 2006
Authors' Addresses
Telemaco Melia
NEC Europe Network Laboratories
Kufuerstenanlage 36
Heidelberg 69115
Germany
Phone: +49 6221 90511 42
Email: telemaco.melia@netlab.nec.de
Jouni Korhonen
TeliaSonera Corporation.
P.O.Box 970
FIN-00051 Sonera
FINLAND
Phone: +358 40 534 4455
Email: jouni.korhonen@teliasonera.com
Rui L.A. Aguiar
Instituto de Telecomunicacoes Universidade de Aveiro
Aveiro 3810
Portugal
Phone: +351 234 377900
Email: ruilaa@det.ua.pt
Srinivas Sreemanthula
Nokia
6000 Connection Dr.
Irving, Texas 75039
USA
Phone: +1 972 894 4356
Email: Srinivas.Sreemanthula@nokia.com
Melia, et al. Expires December 20, 2006 [Page 26]
Internet-Draft Network Initiated Handovers June 2006
Vivek Gupta
Intel Corporation
2111, NE 25 Avenue
Hillsboro, OR 97124
USA
Phone: +1 503 712 1754
Email: vivek.g.gupta@intel.com
Melia, et al. Expires December 20, 2006 [Page 27]
Internet-Draft Network Initiated Handovers June 2006
Intellectual Property Statement
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Disclaimer of Validity
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Copyright Statement
Copyright (C) The Internet Society (2006). This document is subject
to the rights, licenses and restrictions contained in BCP 78, and
except as set forth therein, the authors retain all their rights.
Acknowledgment
Funding for the RFC Editor function is currently provided by the
Internet Society.
Melia, et al. Expires December 20, 2006 [Page 28]