Seamoby Working Group J. Kempf,
Internet Draft Editor
draft-ietf-seamoby-paging-protocol-assessment-01.txt P. Chitrapu
Expires: August, 2002 T. Pagtzis
S.
Sreemanthula
H. Wei
Dormant Mode Host Alerting (DMHA) Protocol Assessment
Status of this Memo
This document is an Internet-Draft and is in full conformance
with all provisions of Section 10 of RFC2026.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six
months and may be updated, replaced, or obsoleted by other documents
at any time. It is inappropriate to use Internet-Drafts as
reference material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
Abstract
The Seamoby Working Group has been working toward specification of
an IP-level protocol for Dormant Mode Host Alerting (DMHA),
sometimes known as IP-paging or simply paging (the terms IP-DMHA,
DMHA, IP Paging, and Paging will be used interchangeably in this
document). A problem statement and requirements have been developed,
and in response to a request for protocol submissions, five
protocols were submitted. The submitted proposals were assessed by
comparing them to the requirements by a team of four volunteers from
the Seamoby Working Group. This document presents the results of
that assessment, describes the procedure by which a recommendation
for Working Group draft was selected after the assessment failed to
come up with a recommendation.
Table of Contents
1.0 Introduction
Kempf,Editor Informational - Expires August, 2002 [Page 1]
DMHA Protocol Assessment Feburary 2002
As part of its quest to foster standards for seamless mobility, the
Seamoby Working Group has been working toward specifying a Dormant
Mode Host Alerting (DMHA), or paging, protocol. A call for protocol
designs, based on a problem statement [1] and requirements [1]
resulted in five protocol submissions [3][4][5][6][7]. Of these, [6]
and [7] were from the same team and were treated as one contribution
for purposes of assessment. This document presents an assessment of
the protocols.
2.0 Assessment Procedure
A panel of four volunteers from the Seamoby Working Group was
recruited to perform the assessment. Three of the four panel members
were assigned one protocol, one panel member was assigned two
protocols because we did not get enough volunteers. Input for the
assessment was the requirements document, the protocol design
itself, and a comparison between the protocol and the requirements
which the authors of the protocol themselves were requested to
write.
The team members were asked to use a rating system to compare the
protocol they were assigned against the requirements. Each team
member wrote up the results of their assessment, and submitted it to
the assessment draft editor for assembly into this draft. A
teleconference was held to discuss the assessments and normalize
assessments between different team members. The assessment team did
not make a recommendation about which draft to pick; however, the
team did recommend that the next step should be to either go through
another round of design in which the authors would attempt to refine
their proposals, or to immediately begin the process of harmonizing
the protocols to come up with a working group draft.
The next section contains comments from the assessment team members
about where the protocols either under- or overspecified a
requirement, and a list of requirements which the protocols were
judged to unacceptably specify.
3.0 Comments on Requirements Match
3.1 draft-koodli-paging-00.txt
Unacceptable Requirements Match:
4.21, 4.22
Under- or Overspecification:
Requirement 4.2: Scalability
Location of the PF is ambiguous. A centralized PF is a hot spot for
contention and will not scale well. A distributed PF was mentioned,
but there is no indication on how they will interact and communicate
Kempf, Editor Informational - Expires August, 2002 [Page 2]
DMHA Protocol Assessment Feburary 2002
with each other. It may not scale well because of signaling
messages.
Requirement 4.4: Efficient Signaling for Inactive Mode
The ideas of explicit and implicit dormancy are good. However, in
the implicit mode the PF still has to page the MN after the
inactivity timer expires. If during that time, the MN has moved to a
different paging area, under a different PF, the draft does not
state how such cases should be handled. Need more detailed
information.
Requirement 4.6: Multiple Dormant Modes
Need more explicit information.
Requirement 4.11: Efficient Utilization of L2
The draft did not specify how exactly it will utilize L2, let alone
the efficient utilization.
Requirement 4.14: Robustness Against Failure of Network Elements
The protocol does not address how PF and MN learn about failure and
how to recover from network element failure. Since there is only one
centralized PF for one Paging area, once a PF or a critical link to
PF fail, paging areas need to rearranged. How is the rearrangement
achieved?
Requirement 4.17: Flexibility of Administration
This requirement is fulfilled since the centralized paging function,
thus the topology of paging function can be very flexible. However,
the down side is it is impossible to separate Tracking Agent,
Dormant Monitoring Agent and Paging Agent. The three functional
entities should be in charge of the same set of hosts. This reduces
the flexibility of administration.
Requirement 4.19: Availability of Security Support
For example, the protocol does not describe Public Key Cryptography
techniques.
Requirement 4.20: Authentication of Paging Location Registration
This proposal provides procedures for the Paging Function
(PF=PA+DMA+TA) to authenticate the MN before accepting the Paging
Area Update message from the MN.
However the procedures do not address authenticating the PF by the
MN. In this respect, the protocol is underspecifed, as it is an
incomplete solution. Thus, the rating is 2 in this regard.
Kempf, Editor Informational - Expires August, 2002 [Page 3]
DMHA Protocol Assessment Feburary 2002
Secondly, the procedure for the PF to authenticate the MN prior to
accepting a paging update message is overspecified in that a number
of options are described and may prevent interoperability depending
upon which option is implemented by a particular vendor. Thus the
rating is 3 in this regard.
Requirement 4.21: Authentication of Paging Area Information
The protocol does not explicitly provide for authentication of
Paging Area information. However, the self-evaluation refers to PAU
and PAR authentication as providing Paging Area Information
authentication. It is not clear as to how this is true. For, PAU
(not explained in the document / assumed to be Paging Area Update)
only enables the PF to authenticate the MN and does not enable the
MN to authenticate the PA information. Similarly, PAR (not explained
in the document / assumed to be Paging Request) authentication only
authenticates the sender of the Paging Request message and does not
authenticate the Paging Area Information.
Requirement 4.22: Authentication of Paging Messages
The Paging Messages sent by the Paging Agent (i.e. Paging Function)
to dormant mode Hosts are: Paging Area Information advertisement,
Paging request. (Paging response and Paging Area update are sent in
the opposite direction (MN -> PF) and hence not covered by this
requirement.) Paging Area Information advertisement is already
covered in 4.21. Therefore, this requirement only covers Paging
Request message.
The protocol provides an authentication procedure for the Paging
Request message and thus meets the requirement. However, the
document further talks about the use of sequence numbers etc to
prevent replay attacks. This is overspecification, leading to a
rating of 3.
The protocol does not address the use of L2 security mechanisms.
Rating is 1.
3.2 draft-renker-paging-ipv6-01.txt
Unacceptable Requirements Match:
4.4, 4.6, 4.19, 4.20, 4.21
Under- or Overspecification:
Requirement 4.2: Scalability
Several signaling messages are needed for in and out of idle
(dormant) state transitions, and this may lead to unacceptable
overhead in the network and over expensive low bandwidth acees
links. In addition, when used with paging strategies there may be
large amount of information stored for each host.
Kempf, Editor Informational - Expires August, 2002 [Page 4]
DMHA Protocol Assessment Feburary 2002
Requirement 4.4: Efficient Signaling While Inactive
There is no mechanism to inform the Paging Agent that the host will
be inactive or unreachable.
Requirement 4.6: Multiple Dormant Modes
Although, there is a discussion of "implicit" and "explicit" dormant
modes, they both involve signaling exchanges between the MN and the
network, in one case using with Mobile IPv6 and the other with new
messages. So, in conclusion, there is no support for multiple
dormant modes.
Requirement 4.7: Independence of Mobility Protocol
The independence of mobility protocol is valid for "explicit" case
only. The design specifies two separate protocols, one for Mobile IP
and one without Mobile IP.
Requirement 4.9: Dormant Mode Termination
The proposal does not completely define the dormant mode
termination. It explains how to de-register from the dormant mode
with BU(0) or Idle-Mode-Req(0) but when does the host perform BU
with a nCoA to HA and CN? When and how does the PA forward all the
packets to host, is it after receiving BU(0)? There must be some
correlation in order for this to work well. The signaling messages
and the entity's behavior after the paging request is sent are
missing in the draft.
Requirement 4.10: Network Updates
In Section 9.2.1, it is briefly mentioned that when host is roaming
into a new PA, it must send a Idle-State-Request to the Paging Agent
to update the new PA-id. But more description is needed. How does
it work with "implicit" case using BU.
Requirement 4.11: Efficient Utilization of L2
In some systems, th mobile hosts may go dormant at L2 based on some
L2-timers. But according to this proposal, since there is no support
for dormancy based on timeouts where the host can go dormant without
having to send any signaling to the network, the MN needs to wake up
from L2 dormancy to begin the L3 dormancy. This leads to inefficient
usage of L2 dormancy and paging mechanisms, worsening the power
saving with respect to L2 only dormancy.
Requirement 4.12: Orthogonality of PA and Subnets
In cellular technology, however, the TMSI (not the IMSI) is used to
page a particular host and the TMSI is assigned by the Access
Network upon registration (or updated during the Routing Area
Update). The host will not know the TMSI in advance. So in the
Kempf, Editor Informational - Expires August, 2002 [Page 5]
DMHA Protocol Assessment Feburary 2002
proposed draft, a host can not move from non-cellular to cellular
system except if the non cellular and the cellular system
(WCDMA/cdma2000) are in different paging areas where upon moving to
a new paging area, the host has to send a new BU and the sub-option
contain the TMSI.
Requirement 4.14: Robustness against Failures
The proposal recommends agent replication but does not specify the
details.
Requirement 4.15: Reliability of Packet Delivery
The proposal does not describe how the buffered packets at paging
agent are sent to host.
Requirement 4.20: Authentication of PA registration
The authentication of the registration messages is not described.
When relying on MIPv6 messages, the protocol relies on the
authentication data of the binding update, but is not mobility
protocol independent anymore.
Requirement 4.21: Authentication of PA Information
There is no mechanism described for authentication PA information
from the paging agent. It is left to the Access Routers in RtAdv,
but they are traditionally not authenticated.
Requirement 4.22: Authentication of PA Messages
There is no authentication mechanism described for paging requests.
There are probably several solutions possible.
Requirement 4.23: Paging Volume
After host receives paging request, it sends a high volume of L3
messages to de-register from idle state. This may introduce high
overhead in the network and hinder the ability of other MNs to
access to services, in particular over low bandwidth links.
Requirement 4.24: Parsimonious Security Messaging
There is no security definition in the Idle-State-Rqst/Rply
messages. Therefore, this is not applicable.
Requirement 4.25: Non-interference of Host's Security
Since the proposal does not describe how the messages are secured
(e.g. how the authentication data are sent - using AH, or a new
security sub-option), we can not know if this IP paging protocol
impose any limitations on a Host security policies.
Requirement 4.26: Non-interference of End-to-End Security
Kempf, Editor Informational - Expires August, 2002 [Page 6]
DMHA Protocol Assessment Feburary 2002
Same as above.
In addition, the following general concerns were expressed about the
protocol design:
1) How is the PA update performed when the host is in the idle
state and moving?
2) There is no description of how the mobility management is
completed after the paging request is received. There must be
some coordination on when the deregistration is sent to PA.
3) The proposal provides a solution independent of the mobile
protocols. A large number of L3 messages needs to be exchanged
in the following cases:
i) BU/BA to PA, all HA and CN when transitioning into the
idle state,
ii) BU/BA to PA, all HA and CN when transitioning out of the
idle state (entering active state),
iii) Registering with a new CoA for the idle state may be
undesirable, this forces BU to all CN.
4) Excessive signaling in the above cases could lead to too much
power consumption on host.
5) When Paging Area strategies are used, it is not clear how the
dynamic paging areas are defined for each user. This mode also
requires storage of a lot of state information leading to a
not-so scalable network.
6) Optimization with RH described in section 5.2.2 may not work
for security reasons. Binding update are authenticated thanks
to AH; but the authentication data carried in AH corresponds
to the one between the MN and the HA. How would the
authentication data between the MN and the PA be carried?
7) Unclear use of "implicit" and "explicit" terms. Both involve
messaging to indicate the idle state transition.
8) Use of paging-id to page the host in inter-system is not
clear. For exaample, when the host idle-registers in WLAN
coverage and then moves to a cellular system, how does the
paging agent know the L2 id of the cellular system?
3.3 draft-sarikaya-seamoby-mipv6hp-00.txt
Unacceptable Requirements Match:
4.4, 4.7, 4.22
Under- or Overspecification:
Kempf, Editor Informational - Expires August, 2002 [Page 7]
DMHA Protocol Assessment Feburary 2002
Requirement 4.2: Scalability
This proposal is heavily dependent on HMIPv6 for scalability. The
MAP is a bottleneck that could lead to scalability problems.
Requirement 4.4: Efficient Signaling for Inactive Mode
No comment.
Requirement 4.6: Multiple Dormant Modes
The protocol can support multiple dormant modes. It will become more
complete if more descriptions about operation with multiple nodes
are added
Requirement 4.7: Independence of Mobility Protocol
Basically, the protocol assumes Hierarchical MIPv6 as the underlying
mobility protocol. Extra efforts could be made to eliminate the
dependence of HMIPv6 and this protocol.
Requirement 4.8: Support for Existing Mobility Protocols
Support MIPv6. However, does not claim any support on MIPv4.
Requirement 4.10: Network Updates
Key aspects are missing for network update.
Requirement 4.14: Robustness against Failures
The proposal depends on MAP replication, which is, as yet not well
specified.
Requirement 4.18: Flexibility of Paging Area Design
No special limitation on paging area design. Support both L2 and L3
paging area. However, mechanism to support adaptive paging area
assignment needs to be further specified.
Requirement 4.19: Availability of Security Support
The protocol conducts a security analysis, but it is not clear that
it is deep enough.
Requirement 4.21: Authentication of Paging Area Information
Does not solve 'Bogus Paging Area' problem
Requirement 4.22: Authentication of PA Messages
No authentication is specified in HMIPv6, upon which this protocol
depends.
Kempf, Editor Informational - Expires August, 2002 [Page 8]
DMHA Protocol Assessment Feburary 2002
Requirement 4.23: Paging Volume
Currently handle paging request in per host basis. Future revision
about handling several request together is in progress.
Requirement 4.25: Non-interference of Host's Security
In the evaluator's judgement, there seems to be no interference, but
further analysis is necessary in case some interaction with IPSEC
may turn up.
Requirement 4.26: Non-interference with End to End Security
Same as 4.25.
3.4 draft-guri-seamoby-lahap-00.txt
Unacceptable Requirements Match:
4.6, 4.8, 4.14, 4.17, 4.27
Under- or Overspecification:
Requirement 4.2: Scalability
Not clearly stated.
Requirement 4.6: Multiple Dormant Modes
Is not specified.
Requirement 4.8: Support for Existing Mobility Protocols
Interaction with MIPv4 and MIPv6 are not specified
Requirement 4.14: Robustness Against Failure of Network Elements
No comment.
Requirement 4.17: Flexibility of Administration
Not specified.
Requirement 4.18: Flexibility of Paging Area Design
No special limitation on paging area design. Support both L2 and L3
paging area. However, mechanism to support adaptive paging area
assignment needs to be further specified.
Requirement 4.21: Authentication of Paging Area Information
Does not solve 'Bogus Paging Area' problem.
Requirement 4.25: Non-interference of Host's Security
Kempf, Editor Informational - Expires August, 2002 [Page 9]
DMHA Protocol Assessment Feburary 2002
In the evaluator's judgement, there seems to be no interference, but
further analysis is necessary in case some interaction with IPSEC
may turn up.
Requirement 4.26: Non-interference with End to End Security
Same as 4.25.
Requirement 4.27: Detection of Bogus Correspondent Nodes
No specification about authentication of CN.
3.5 draft-ohba-seamoby-last-hop-dmha-02.txt
Unacceptable Requirements Match:
4.18
Under- or Overspecification:
_
Requirement 4.1: Power Consumption
Registration to the TA through the DMA may not be optimal in terms
of power consumption, since a DMA Reg-ACK cannot be returned to the
host until the TA acknowledges the proxy registration request.
However, since the author also specified the direct communication of
the host with the TA, this requirement is overspecified to the
degree that can detract from efficiency.
_
Requirement 4.2: Scalability
The protocol tends to describe its operation with one DMA per link,
one TA (primarily) and multiple PAs, as shown in Figure 3. When the
protocol suggests that more than one TA can be present and each one
manages a specific set of hosts, it fails to specify how this is
achieved.
Requirement 4.4: Efficient Signaling Inactive Mode
The protocol underspecifies the requirement because it suggests that
successive paging operations are to follow a paging interval that
increases exponentially, but does not specify an initial and final
value that the exponential figure is allowed to reach. Is it
persistent in the paging retry? Does it time-out at all?
_
Requirement 4.6: Multiple Dormant Modes
The type of dormant modes that the protocol attempts to support is
based on a particular technology, while the protocol does not affect
the operation of the MAC layer at all. While one can claim that the
protocol combines L2 power saving features that contribute to power
conservation, this is not owed to or couple with the proposed
protocol. It is simply a manifestation of power savings through
Kempf, Editor Informational - Expires August, 2002 [Page 10]
DMHA Protocol Assessment Feburary 2002
special forms of MPDU scheduling. Any protocol can claim such
cooperation. Important aspect of dormancy like slotted dormant for
non-L2 layer has not been considered by the protocol.
Requirement 4.12: Orthogonality of PA and Subnets
The description of the protocol, although it mentions paging areas,
does not specify clearly how this is achieved since there is no
specific description of how the page message diffuses over an
topology of multiple subnets that are controlled by a single PA.
_
_
Requirement 4.14: Robustness against Failures
While the protocol specifies keep-alive signals between the peer
agents, it does not specify a scheme that allows recovery from
failure.
_
Requirement 4.15: Reliability of Packet Delivery
The transport used in this protocol is UDP. The protocol does not
describe how the packet is forwarded to the host. In particular, it
does not describe what is the situation when the packet received at
the DMA is TCP.
_
Requirement 4.17: Administrative Flexibility
The configuration of the paging areas is not quite automatic as
claimed. In particular the protocol does not specify how the page
area identifiers are assigned/allocated such that they can be
distributed to the individual paging agents.
_
Requirement 4.18: Flexibility of PA Design
With respect to the claimed flexibility, the design is not clear in
Fig. 3. The TA propagates paging requests, why?
_
Requirement 4.19: Availability of Security Support
The protocol does not support encryption services. It only supports
authentication. For ESP security, it relies on mechanisms such as
IPsec.
In addition, the following general concerns were expressed about the
protocol design:
1) The protocol utilizes the DMA like the TA in the functional
architecture draft, but does not specify a method for the DMA
to discover an appropriate TA. The assumption seems to be that
there will be a single TA per administrative domain or multiple
TAs with the TA to DMA mapping manually configured.
2) The protocol assumes the dormant host can detect a paging area
change, which implies that time-slotted paging must be used if
Kempf, Editor Informational - Expires August, 2002 [Page 11]
DMHA Protocol Assessment Feburary 2002
there is no L2 paging channel support. However, the protocol
does not explicitly mention how it would support time-slotted
paging.
3) The proxy interactions between the DMA and TA on behalf of the
dormant host incur extraneous signaling and may lead to
inefficient power consumption.
4) The assumption that the DMA is located on the last hop subnet,
which is the foundation of the design, means that the PA is
unnecessary, and links the paging area directly to the subnet.
5) The protocol specifies heartbeat messages between agent peers.
This method can identify a failed agent, but it cannot specify
how to recover from failure.
6) The protocol does not specify how a host chooses between DMAs
nor how a DMA chooses between TAs.
4.0 Decision Process
Given that the assessment team's recommendation about which draft to
accept was indeterminate, a decision team was formed by the two
Working Group co-chairs, with the Area Director providing advice.
The decision team decided to proceed toward selecting a draft for
recommendation to the Working Group as the basis of a harmonized
protocol, in order to avoid further delay in starting on the process
of designing the Seamoby paging protocol. This procedure is entirely
consistent with RFC 2418 [8], since the Working Group co-chairs'
decision is subject to working group concensus, so the Working Group
has the final say on whether the selected draft actually becomes the
working group draft.
The decision about which draft to select was difficult, because each
draft had particular aspects that were well thought out and
recommended themselves for inclusion in the final result, but none
of the drafts exhibited the maturity of implementation and design
that immediately suggested it as the only possible candidate for
selection. Some drafts had particular aspects that mitigated
strongly against selection. A good example of this difficulty is
Requirement 4.6, Multiple Dormant Modes. This requirement was
intended to foster support for hosts that have no explicit L2 paging
support, basically time-slotted paging. Draft-sarikaya has an
excellent discussion of time-slotted paging mode, but the basis of
that draft is a protocol (HMIPv6) that has been proposed in another
working group for a problem that is still in the requirements
phase, and the proposed paging protocol supports only Mobile IPv6.
The other proposals had varying degrees of support for time-slotted
paging, but none was sufficient to recommend itself on this
particular requirement.
Kempf, Editor Informational - Expires August, 2002 [Page 12]
DMHA Protocol Assessment Feburary 2002
The assessment team's work allowed the decision team to reduce the
number of drafts under consideration from five to two. The decision
team quickly decided to rule out draft-koodli because the draft is
lacking in specifics and is vague on many requirements, as mentioned
in the assessment team's report. Draft-sarikaya was ruled out
because it is based on a protocol that is currently under evaluation
in another working group, setting up an unacceptable dependency
between the Seamoby paging protocol design and the other working
group's process. Also, draft-sarikaya exclusively supports Mobile
IPv6, and a primary requirement of all Seamoby work is that the
protocols be independent of mobility protocol. While the assessment
of draft-guri was positive, draft-guri is explicitly concerned with
utilizing Layer 2 support for paging, and was therefore not
sufficiently broad enough as a base for IP paging. However, the
ideas expressed in draft-guri were felt to be valuable and necessary
for including in the final Seamoby paging protocol for those cases
where Layer 2 paging support is available.
The decision between the remaining two drafts, draft-renker and
draft-ohba, was especially difficult because they were judged to be
about of equal quality. The decision team decided to focus on three
primary requirements that were thought to be crucial to the
successful acceptance of IP paging: independence of mobility
protocol, support for existing mobility protocols, and independence
of paging area from subnet topology.
Of these, both draft-renker and draft-ohba provided adequate support
for the first two, independence of mobility protocol and support for
existing mobility protocols. Draft-renker was judged by the
assessment team to be overspecific in these areas, in the sense that
it contained two modes, explicit mode and implicit mode, depending
on whether Mobile IP was supported or not. However, considering the
relatively immature state of the paging protocol design, the
decision team felt that providing the working group with choices,
where the benefits and drawbacks of each choice could be clearly
weighed, was preferable to providing a fixed decision, so draft-
renker was judged to be better in this regard.
On the requirement for independence of paging area from subnet
topology, the support described in draft-ohba was very sketchy and
did not provide the decision team with a clear idea about how this
could be achieved, particularly with regard to the movement of a
mobile host while the host is in dormant mode. Draft-renker has a
much clearer description of how this could be achieved, and was
judged to be better in this regard.
Additional aspects of draft-renker that recommended it as the
selection were attention to details of interaction with existing IP
routing, and a survey of paging strategies. While probably not
essential to the final protocol design, the material on paging
strategies showed that the authors had given some thought to
separating policy from mechanism, and were familiar with the
somewhat extensive academic literature on paging, and IP paging in
particular.
Kempf, Editor Informational - Expires August, 2002 [Page 13]
DMHA Protocol Assessment Feburary 2002
While draft-renker was selected by the decision team as the basis
for continued Seamoby paging protocol work, the decision team feels
that it is important to incorporate the outstanding contributions of
the other authors into the final protocol design, in particular, the
time-slotted paging discussion in draft-sarikaya, the Layer 2
interface work in draft-guri, the paging state machine discussion in
draft-koodli, and the security protocol work in draft-ohba.
Additional aspects of the other drafts that address issues which
were weakly addressed or not addressed at all in draft-renker should
also be incorporated, as well as ideas from other working group
members that address requirement which none of the draft addressed
particularly well.
5.0 Acknowledgements
The Working Group Chairs would like to thank Prabhakar Chitrapu, of
InterDigital, Theo Pagtzis, of UCL, Hung-yu Wei, of Columbia
University, and Sirinivas Sreemanthula, of the Nokia Dallas Research
Center, for helping perform the protocol assessment.
6.0 References
[1] Kempf, J., Editor, "Dormant Mode Host Alerting ("IP Paging")
Problem Statement," RFC 3132, June, 2001.
[2] Kempf, J., et. al. "Requirements and Functional Architecture
for an IP Host Alerting Protocol," RFC 3154, August, 2001.
[3] Faccin, S., et. al., "Dormant Mode Handover Support in Mobile
Networks," draft-koodli-paging-00.txt, a work in progress.
[4] Liebsch, M., Renker, G., and Schmitz, R., "Paging Concept for
IP based Networks," draft-renker-paging-ipv6-01.txt, a work in
progress.
[5] Ohba, Y., Nakajima, N., and Zhang, T., "LH-DMHA - Last Hop DMHA
(Dormant Mode Host Alerting) Protocol," draft-ohba-seamoby-
last-hop-dmha-02.txt, a work in progress.
[6] Sarikaya, B., et. al., "Mobile IPv6 Hierarchical Paging,"
draft-sarikaya-seamoby-mipv6hp-00.txt, a work in progress.
[7] Gurivireddy, S., et. al., "Layer-2 aided mobility independent
dormant host alerting protocol," draft-guri-seamoby-lahap-
00.txt, a work in progress.
[8] Bradner, S., "IETF Working Group Guidelines and Procedures,"
RFC 2418, September, 1998.
7.0 Authors' Address
James Kempf
DoCoMo Communications Labs USA
181 Metro Drive, Suite 300
San Jose, CA, 95110
USA
Phone: +1 408 451 4711
Email: kempf@docomolabs-usa.com
Kempf, Editor Informational - Expires August, 2002 [Page 14]
DMHA Protocol Assessment Feburary 2002
Prabhakar Chitrapu
InterDigital Communications Corp.
781 Third Avenue
King of Prussia, PA, 19406
USA
Phone: +1 610 878 5730
Email: Prabhakar.Chitrapu@InterDigital.com
Theo Pagtzis
Dept. of Computer Science
University College London
Gower Street
WC1E 6BT, London
UK
Phone: +44 (0) 20 7679 3666
Email: t.pagtzis@cs.ucl.ac.uk
Sirinivas Sreemanthula
Nokia Research Center
6000 Connection Drive
Irving, TX, 75039
USA
Phone: +1 972 894 4356
Fax: +1 972 894 4589
Email: srinivas.sreemanthula@nokia.com
Hung-yu Wei
Columbia University
Room 710, Schapiro Res
530 West 120th Street
New York, NY, 10027
USA
Phone: +1 212 854 7477
Email: hywei@ctr.columbia.edu
Kempf, Editor Informational - Expires August, 2002 [Page 15]