Internet DRAFT - draft-zhang-dmm-rpmipdmm
draft-zhang-dmm-rpmipdmm
DMM Working Group Hong-Ke Zhang
Internet Draft Li-Li Wang
Expires: September 2012 Bo-Hao Feng
Shuai Gao
Beijing Jiaotong University
March 26, 2012
A Robust Solution for PMIPv6-based Distributed Mobility Management
draft-zhang-dmm-rpmipdmm-00.txt
Abstract
Proxy Mobile IPv6 (PMIPv6) is a network-based centralized mobility
management protocol, which has many disadvantages for utilizing the
centralized anchor LMA. As networks are moving towards flat
architectures, a distributed approach is needed to PMIPv6. This
document defines a robust solution for PMIPv6-based distributed
mobility management which ensures the robustness by organizing the
distributed anchors (MAARs) into a Chord ring.
Requirements Language
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119].
Status of this Memo
This Internet-Draft is submitted to IETF in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress".
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html
This Internet-Draft will expire on September, 2012.
Zhang et al. Expires September,2012 [Page 1]
Internet-Draft A Robust solution for PMIPv6-based DMM March 2012
Copyright Notice
Copyright (c) 2012 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1. Introduction ................................................ 2
2. Terminology ................................................. 3
3. Description of the solution ................................. 4
4. Format of signaling messages ................................ 7
4.1. M-PBU .................................................. 7
4.2. M-PBA .................................................. 8
5. Security Considerations ..................................... 9
6. References .................................................. 9
Acknowledgment ................................................ 10
1. Introduction
The current IP mobility protocols, which are either host-based like
Mobile IPv6 [1] or network-based like Proxy Mobile IPv6 [2], support
the mobility management via centralized anchors. In order to maintain
the IP session when MNs handover, the anchors are mainly responsible
for allocating home network prefixes to MNs, managing their locations
and intercepting as well as forwarding packets that are from or to
MNs. However, such centralized anchors lead to some obvious
shortcomings like sub-optimal routing, scalability problem,
considerable signaling cost and delay and so on.
As the networks are moving towards flat architecture, a distributed
approach is needed to avoid those disadvantages of centralized
mobility protocols. In this distributed scheme, there is no need for
any centralized anchors in the network while only distributed anchors
are deployed. Besides, it is not necessary to identify MNs by the
fixed home addresses or home network prefixes. Some related drafts
have been proposed, but there are not any schemes to guarantee the
Zhang et al. Expires September,2012 [Page 2]
Internet-Draft A Robust solution for PMIPv6-based DMM March 2012
robustness for the distributed mobility management. In this document,
we propose a robust solution for PMIPv6-based distributed mobility
management. This solution ensures the robustness by organizing the
distributed anchors (MAARs) into a Chord ring.
2. Terminology
The following terms used in this document are defined in the Proxy
Mobile IPv6 specification [RFC5213]:
Local Mobility Anchor (LMA)
Mobile Access Gateway (MAG)
Mobile Node (MN)
Corresponding Node (CN)
Proxy Binding Update (PBU)
Proxy Binding Acknowledgment (PBA)
The following terms are defined and/or used in this document:
MAAR (Mobility Anchor and Access Router). First IP hop routers
where the mobile nodes attach to. They provide an IPv6 prefix
(topologically anchored at the MAAR) to each attaching mobile node.
They also play the role of mobility managers for the IPv6 prefixes
they anchor.
M-MAAR (Managed Mobility Anchor and Access Router). The MAAR that
manages all the path of the MN which is distributed assigned in the
Chord ring.
M-PBU (Managed PBU). The signaling message sent by MAAR to the M-MAAR.
It is used to register to M-MAAR for MN recording the MN's path.
M-PBA (Managed PBA). The signaling message sent back by M-MAAR to the
MAAR. It is used to register to M-MAAR for MN recording the MN's path.
Zhang et al. Expires September,2012 [Page 3]
Internet-Draft A Robust solution for PMIPv6-based DMM March 2012
3. Description of the solution
The purpose of this solution is to provide robust distributed
mobility management based on PMIPv6. For this, it is assumed that
there are many MAARs in the management domain and that every MAAR has
a MAAR identifier that is similar to an MN-identifier specified in
RFC 4283 [3]. And every MAAR in this solution functions as both an
LMA for those MNs that are attached to it at the first hop, and a MAG
for those MNs that are connected to it while not attached at the
first hop. Therefore, there are not any centralized anchors in the
architecture of this solution. In addition, all MAARs in this
distributed management domain are organized into a Chord circle using
consistent hashing over MAAR identifiers [4][5]. Given the fact that
the Chord system distributes the information of value among nodes on
the ring, the failure of a MAAR only affects a very limited number of
MAARs in the Chord system, which indicate that this solution for
distributed mobility management based on PMIPv6 is robust. Moreover,
for a given MN, the M-MAAR that manages all the path of this MN in
the distributed management domain is configured by the network
administrator of the domain or by some algorithm and does not change
as long as the MN roams within the domain. The architecture of this
solution is shown in Figure 1.
o @ N1(MAAR)
o o
@ @ N8
o o
@ @ N14
@ o
o @ N21
@ o
o o
@ @ N32
N38 o o
Figure 1: Architecture of the distributed mobility management based
on PMIPv6 using Chord ring
Zhang et al. Expires September,2012 [Page 4]
Internet-Draft A Robust solution for PMIPv6-based DMM March 2012
As stated above, which M-MAAR is configured and responsible for an MN
is unknown to other MAARs when this MN attaches to them. In order to
deal with this issue, we store (key, value) pairs at the MAARs by
using consistent hashing algorithm, where the key is the hash value
of an MN-identifier and the value is the IPv6 address of the M-MAAR
serving the corresponding MN. For a given MN, the IPv6 address of its
M-MAAR should be stored at the MAAR that is the successor of the MN-
identifier. For ease of description, we define QServer(MN) as the
MAAR that stores the (key, value) pair for an MN. Also for simplicity,
we will use MN-id and M-MAAR or the tuple (MN-id, M-MAAR) to
represent both the original and hash value of the MN-identifier and
the IPv6 address of its M-MAAR.
Whenever a new MAAR detects the attachment of an MN, it may not know
the MN's M-MAAR. In this case, it sends a query message including the
MN-identifier, the new MAAR's identifier and IPv6 address to the
Chord system in order to find the MN's M-MAAR. The other MAARs in the
Chord system forward the query message according to their finger
tables until it reaches QServer(MN). When the MAAR that serves as the
QServer of the MN receives the query message, it sends the IPv6
address of the MN's M-MAAR which is defined in the tuple (MN-id, M-
MAAR) back to the new MAAR. When the new MAAR receives the IPv6
address of the MN's M-MAAR, it stores the M-MAAR's IPv6 address into
a table for the attached MN locally.
After knowing the M-MAAR's IPv6 address, the new MAAR (MAAR1) sends
an M-PBU message to the M-MAAR. If the cache about the MN in M-MAAR
is empty, this MAAR1 will also serve as LMA assigning HNP1 for MN as
specified in PMIPv6. And also, the M-MAAR should record one item
including MN-identifier, HNP1 and the IPv6 address of the MAAR1.
However, if there is one item (MN-id, HNP0, the MAAR0's IPv6 address)
in the cache about the MN in M-MAAR, the M-MAAR will return an M-PBA
message containing the corresponding information to the MAAR1 after
receiving the M-PBU message. That is, MAAR1 is not the first hop
router to which the MN accesses. And then MAAR1 sends a register
message (PBU) to the MAAR0 and establishes the bi-directional tunnel
between the MAAR0 and the MAAR1 after receiving the PBA message from
the MAAR0. Besides, in this case the MN could also use the HNP1
allocated by MAAR1 to start a new IP session.
As shown in Figure 2, the paths among the MAARs and the M-MAAR
represented by lines ("/" and "\") indicate registrations between
MAARs and the M-MAAR, while the path depicted with stars ("*")
denotes the query procedure of MAARs for the address of the M-MAAR of
the MN-id in chord ring, and the path pictured with circles ("o" and
"#") shows the data flow from CN1 and CN2 respectively. In Figure 2,
the MN moves from the MAAR1 to the MAAR2. And the MN starts a new
Zhang et al. Expires September,2012 [Page 5]
Internet-Draft A Robust solution for PMIPv6-based DMM March 2012
session with the CN2 when it moves to the MAAR2 and also continues
the session with the CN1 through the MAAR1. The detailed procedure is
described in Figure 3.
+---+ +------+ +----------+ +---+
|CN1| |M-MAAR| |Chord Ring| |CN2|
+---+ +------+ +----------+ +---+
o | * #
o / \ * * #
o / \ * * #
o / \ * * #
o / \ * * #
o / \ * * #
o / * \ * #
o / * \ * #
o / * \ * #
o / * \ * #
o | * | * #
o +-----+ +-----+ #
oooo|MAAR1|(oooooooooo) |MAAR2|#######################
+-----+ tunnel +-----+
o| o|#
+---+ +---+
|MN |-------------->|MN |
+---+ +---+
Figure 2: Scenario after a handover and the data flow
MN MAAR1 MAAR2 M-MAAR MAARs(Chord ring) CN1 CN2
| | | | | | |
|-L2 Attachment->| | | | | |
| |----------------------------->| | |
| (Query for the address of M-MAAR of the MN-id) | |
| | | | | | |
| |<-Reply the address of M-MAAR-| | |
|<-Allocate HNP1-| | | | | |
|(Configure IP address) | | | | |
| | | | | | |
| |-------M-PBU------>| | | |
| (Register to the M-MAAR with address of MAAR1, HNP1 and MN-id) |
| | | | | | |
| |<-------M-PBA------| | | |
Zhang et al. Expires September,2012 [Page 6]
Internet-Draft A Robust solution for PMIPv6-based DMM March 2012
| | | | | | |
|<---------------|<-----------IP Packets with HNP1-----------| |
| | | | | | |
|--------Handover-------->| | | | |
| | | | | | |
|-----L2 Attachment------>| | | | |
| | |-------------------->| | |
| (Query for the address of M-MAAR of the MN-id) | |
| | | | | | |
| | |<-Reply the address--| | |
|<-----Allocate HNP2------| | | | |
| (Configure IP address) | | | | |
| | | | | | |
| | |--------M-PBU------->| | |
| (Register to the M-MAAR with address of MAAR2, HNP2 and MN-id) |
| | | | | | |
| | |<--------M-PBA-------| | |
| | (Reply the address of MAAR1 and HNP1) | |
| | | | | | |
| |<--PBU--| | | | |
| |--PBA-->| | | | |
| (Establish the Tunnel) | | | |
| | | | | | |
| |<------------IP Packets with HNP1----------| |
| |=======>| | | | |
|<------------------------| | | | |
| | | | | | |
|<------------------------|<---------IP Packets with HNP2---------|
| | | | | | |
Figure 3: The detailed procedure of the solution
4. Format of signaling messages
4.1. M-PBU
The format of the M-PBU message is shown in Figure 4.
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Sequence # |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Zhang et al. Expires September,2012 [Page 7]
Internet-Draft A Robust solution for PMIPv6-based DMM March 2012
|A|H|L|K|M|R|P|D| Reserved | Lifetime |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
| Mobility options |
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
D flag
1-bit "Distributed" flag is used to identify whether this PBU is from
the MAAR to the M-MAAR. When this flag is set to "0", this message is
the PBU message in the [RFC5213]. If the flag is set to "1", this
message is the M-PBU. The flag MUST be set to the value of 1 in this
draft.
4.2. M-PBA
The format of the M-PBA message is shown in Figure 5.
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Status |K|R|P|D|Reserved|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Sequence # | Lifetime |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
| Mobility options |
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
D flag
1-bit "Distributed" flag is used to identify whether this PBA is from
the M-MAAR to the MAAR. When this flag is set to "0", this message is
the PBA message in the [RFC5213]. If the flag is set to "1", this
message is the M-PBA. The flag MUST be set to the value of 1 in this
draft.
Zhang et al. Expires September,2012 [Page 8]
Internet-Draft A Robust solution for PMIPv6-based DMM March 2012
5. Security Considerations
This document does not introduce any security considerations.
6. References
[1] C.Perkins, D.Johnson, and J. Arkko, "Mobility Support
in IPv6", RFC 6275, July 2011.
[2] S. Gundavelli, K. Leung, V. Devarapalli, K. Chowdhury, and B.
Patil, "Proxy Mobile IPv6", RFC 5213, August 2008.
[3] A. Patel, K. Leung, M. Khalil, H. Akhtar, and K. Chowdhury,
"Mobile node identifier option for mobile IPv6 (MIPv6)", RFC
4283, November 2005.
[4] I. Stoica, R. Morris, D. Liben-Nowell, D. Karger, M. Kaashoek,
F.Dabek, and H. Balakrishnan, "Chord: a scalable peer-to-peer
lookup protocol for Internet applications," IEEE/ACM
Transactions on Networking, vol.11, no.1, pp: 17-32, February
2003.
[5] D. R. Karger, E. Lehman, F. Leighton, M. Levine, D. Lewin, and
R. Panigrahy, "Consistent hashing and random trees: distributed
caching protocols for relieving hot spots on theWorldWideWeb,"
in Proc. 29th Annu. ACM Symp. Theory of Computing, May 1997, pp.
654-663.
Zhang et al. Expires September,2012 [Page 9]
Internet-Draft A Robust solution for PMIPv6-based DMM March 2012
Authors' Addresses
Hong-Ke Zhang, Li-Li Wang, Bo-Hao Feng, Shuai-Gao
National Engineering Lab for NGI Interconnection Devices
Beijing Jiaotong University, China
Phone: +861051684274
Email:hkzhang@bjtu.edu.cn
liliwang@bjtu.edu.cn
11111021@bjtu.edu.cn
shgao@bjtu.edu.cn
Acknowledgment
Funding for the RFC Editor function is currently provided by the
Internet Society.
Zhang et al. Expires September,2012 [Page 10]