Network Working Group                                       T-W. You
                  Internet Draft                                                  ETRI
                  Expires: April 2006                                        I-D. Jang
                                                                                  ETRI
                                                                              S-Y. Lee
                                                                                  ETRI
                                                                          October 2005
               
               
                       L3Shim state management using Vertical layered Communication
                                draft-you-shim6-L3Shim-state-management-01
               
               
               
               Status of this Memo
               
                  By submitting this Internet-Draft, each author represents that any
                  applicable patent or other IPR claims of which he or she is aware
                  have been or will be disclosed, and any of which he or she becomes
                  aware will be disclosed, in accordance with Section 6 of BCP 79.
               
                  Internet-Drafts are working documents of the Internet Engineering
                  Task Force (IETF), its areas, and its working groups.  Note that
                  other groups may also distribute working documents as Internet-Drafts.
               
                  Internet-Drafts are draft documents valid for a maximum of six months
                  and may be updated, replaced, or obsoleted by other documents at any
                  time.  It is inappropriate to use Internet-Drafts as reference
                  material or to cite them other than as "work in progress."
               
                  The list of current Internet-Drafts can be accessed at
                  http://www.ietf.org/ietf/1id-abstracts.txt.
               
                  The list of Internet-Draft Shadow Directories can be accessed at
                  http://www.ietf.org/shadow.html.
               
                  This Internet-Draft will expire on April 24, 2006.
               
               Copyright Notice
               
                  Copyright (C) The Internet Society (2005).
               
               Abstract
               
               
                  This draft proposed vertical layered communication method; especially
                  it is mechanism to notify locator changing from L3Shim to TCP layer.
                  In this draft, it is called indirect TCP congestion control. This
                  mechanism make TCP congestion situation using behavior of L3Shim
               
               
               You et al.              Expires - April 2006                  [Page 1]


                                      L3Shim state management           October 2005
               
               
                  layer without correcting conventional TCP. And then we describe
                  L3Shim state through the event. These kinds of events and progress
                  state are presented in a single system view. And it will be help to
                  implement L3Shim functionality through understanding L3Shim process.
               
               
               Table of Contents
               
                  1. Introduction...................................................2
                  2. Vertical layered Communications................................3
                     2.1 Interaction between L3Shim and TCP or Upper layer..........4
                     2.2 Interaction between L3Shim and IP or Lower layer...........5
                  3. L3Shim Events process..........................................6
                     3.1 The Events happened by timeline............................6
                     3.2 The L3Shim Events..........................................6
                        3.2.1 Bootstrap.............................................6
                        3.2.2 Connect Communication Session ........................7
                        3.2.3 Shim Context Establishment ...........................7
                        3.2.4 Doubt Primary Address Pair Failure  ..................7
                        3.2.5 Explicit Test  .......................................8
                        3.2.6 Address change trigger  ..............................8
                  4. L3Shim states process..........................................8
                     4.1 L3Shim states.............................................10
                     4.2 Node Behavior.............................................11
                  5. Future works..................................................12
                  6. Security Considerations.......................................12
                  7. IANA Considerations...........................................12
                  8. References....................................................12
                     8.1 Normative References......................................12
                     8.2 Informative References....................................13
                  Author's Addresses...............................................13
                  Intellectual Property Statement..................................14
                  Disclaimer of Validity...........................................14
                  Copyright Statement..............................................14
                  Acknowledgment...................................................14
               
               
               1. Introduction
               
                  In approach the L3Shim protocol, changes in the addresses that are
                  used below the shim will be invisible to the upper layers [ID.L3Shim].
                  However, upon changing to a new address pair, transport layer
                  protocol should be notified so that it can perform a slow start, or
                  some other form of adaptation to the possibly changed conditions.
                  This is necessary, for instance, when switching from a high-bandwidth
                  LAN interface to a low bandwidth cellular interface [ID.ARCH]. Also
                  L3Shim should decide whether have to notify changed locator based on
                  requirement for application such as guaranteed bandwidth and delay or
                  not
               
               
               You et. al               Expires April 2006                   [Page 2]


                                      L3Shim state management           October 2005
               
               
               
                  In this draft, we propose the methods to inform locator change from
                  L3Shim layer to TCP using indirect TCP congestion control. This
                  mechanism make TCP congestion situation using behavior of L3Shim
                  layer without correcting conventional TCP.
               
                  Next, we describe L3Shim state process by happened the events
                  referencing [RFC 2960], [ID.HIP]. These kinds of events and progress
                  state are presented in a single system view. And it will be help to
                  implement L3Shim functionalities through understanding L3Shim process.
               
               
               2. Vertical layered Communications
               
                  The goal of vertical layered communications achieves optimal network
                  performance to inform cross layers information. In approach L3Shim,
                  Vertical layered Communications need to notify possible triggers
                  include failure of upper level keepalive signal to the SHIM layer,
                  explicit trigger from upper level, ICMP error, and explicit SHIM
                  level reachability failure [ID.FAIL].
               
                  Vertical layered Communications can be divided by two categorization
                  based on L3Shim as depict Figure 1.
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               You et. al               Expires April 2006                   [Page 3]


                                      L3Shim state management           October 2005
               
               
               
                                 +-------------------------+
                                 |                         |
                                 |   TCP or Upper layer    |
                                 |                         |
                                 +-------------------------+
                                        ^          |
                     Notification       |          | Notification
                     Locator change     |          | TCP congestion or App. Requirement
                                        |          V
                                 +-------------------------+
                                 |                         |
                                 |       L3Shim layer      |
                                 |                         |
                                 +-------------------------+
                                        ^          |
                     Notification       |          | Sending
                     Local connectivity |          | Active probe message
                                        |          V
                                 +-------------------------+
                                 |                         |
                                 |    IP or Lower layer    |
                                 |                         |
                                 +-------------------------+
               
                  Figure 1. Classification of Vertical layered Communications
               
               2.1 Interaction between L3Shim and TCP or Upper layer
               
                  - Signaling from L3Shim to TCP or application
               
                  In this categorization, there is consideration that any locator
                  change in the L3Shim should trigger a notification to the transport
                  layer protocol. This notification would be used to trigger a
                  resetting of the TCP congestion state to slow start, corresponding to
                  the selection of a new network path. However, note that this
                  notification can not be done in protocol designs where the end points
                  are not the final hosts, such as where a gateway is used.
               
                  Therefore we proposed method to notify to TCP changing locator using
                  indirect TCP congestion control. The indirect TCP congestion control
                  triggers TCP congestion control mechanism through L3Shim's action
                  basically.
               
                  At first, the goal of notification to TCP changed any locator is used
                  to trigger a resetting of the TCP congestion state to slow start.
                  Therefore we proposed indirect TCP congestion control that is method
                  to achieve such purpose without notify locator change to TCP directly.
               
               
               
               You et. al               Expires April 2006                   [Page 4]


                                      L3Shim state management           October 2005
               
               
                  When any locator change was occurred, L3Shim should discard the
                  entire packets from correspondent node during TCP-Congestion-
                  Triggering-Time. Consequently the TCP congestion control mechanism
                  triggers naturally by this one. The main key point is that how to set
                  up the time of TCP-Congestion-Triggering-Time enhancing performance.
                  It can be heuristic setting up the value.
               
                  Also, the VALID state, which is one of L3Shim state and is explained
                  in next chapter, keep up the situation expecting error for
                  operational primary address pair during Probably-Active-Duration-Time
                  with indirect TCP Congestion control separately, TCP Congestion
                  control mechanism should be achieved automatically.
               
                  At last, If we can also envision that application would be able to
                  tell the L3Shim layer that the current connection in unsatisfactory.
                  This would require an API to be developed. Therefore indirect TCP
                  congestion control should be running only in case of occurring
                  unsatisfactory situation.
               
                  - Signaling from TCP or Application and Shim
               
                  This communication is used to monitor available address pairs?
                  rechability. As following protocols exist [ID.FAIL].
                   O Positive Feedback from upper layer protocols. TCP can indicate to
                      the L3Shim layer that it is making progress.
                   O Negative Feedback from upper layer protocols. It is conceivable
                      that upper layer protocols five an indication of a problem to the
                      either congestion or lack of connectivity using ECN (Explicit
                      Congestion Notification) protocol [RFC 3168].
               
                  And as mentioned before, there is a signaling from Application to
                  Shim to confirm whether current connection is satisfaction or not.
               
               2.2 Interaction between L3Shim and IP or Lower layer
               
                  - Signaling from L3Shim to IP
               
                  This interaction signaling is used to send explicit test message by
                  L3Shim directly.
                   O Explicit reachability tests. IKEv2 keepalive mechanism can be
                      categorized one
               
                  - Signaling from IP to L3Shim
               
                  This signaling is used to inform local information from lower layer
                  such as Neighbor Discovery and available addresses such as Route
                  Advertisement.
               
               
               
               
               You et. al               Expires April 2006                   [Page 5]


                                      L3Shim state management           October 2005
               
               
               3. L3Shim state process
               
                  L3Shim Protocol can be divided by some states through several events
                  to support IPv6 site Multihoming. During the lifetime of an L3Shim
                  enabled end node, the endpoint's L3Shim state changed from one stat
                  to another in response to various events.
               
                  In this draft, first we have arranged the events happened lifetime
                  interval based on timeline. Each of the events are represented by
                  situations that can happened at endpoint node supported Shim.
               
                  These kinds of events and progress state are presented in a single
                  system view. And it will be help to implement L3Shim functionality
                  through understanding L3Shim process.
               
               3.1 The Events happened by timeline
               
                  We firstly put in order several events from start point of time that
                  the node communicate with other peer since the node did boot up to
                  close communication including other situation between this such as
                  shim context establishment complete and address change trigger cause
                  to happened operational primary address pair outage.
               
                                              Active-Working-Time
                                                     |
                                                     V
                                             Doubt Primary Address    Address
                                             Pair Failure             Change Trigger
               
                 +-+        +-+         +-+         +-+        +-+        +-+   Time
                 | |--------| |---------| |---------| |--------| |--------| |------>
                 +-+        +-+         +-+         +-+        +-+        +-+
               Bootstrap Connect       Shim                Explicit Test
                         Communication Context               ^
                         Session       Establishment         |
                                                    Probably-Active-Duration-Time
               
                  Figure 2. The Events happened by timeline
               
               3.2 The L3Shim Events
               
               3.2.1Bootstrap
               
                  The L3Shim enabled node manages locally operational addressees
                  basically for failure detection. The addresses are discovered and
                  monitored through IPv6 Neighbor Discovery and link layer specific
                  mechanisms. Therefore when the L3Shim enabled node does boot up,
               
               
               
               
               You et. al               Expires April 2006                   [Page 6]


                                      L3Shim state management           October 2005
               
               
                  firstly set memory to operate L3Shim functionalities, and then it
                  collect and manage available addresses' information.
               
                  As mentioned the [ID.FAIL], two different granularity levels are
                  needed for failure detection in address managements. In other words,
                  a phase of bootstrap only cares for locally operational addresses.
                  Other functionalities can be operated after establishment L3Shim
                  association
               
               3.2.2Connect Communication Session
               
                  The event is speaking for beginning communication through connection
                  request between Shim enabled node and correspondent peer. In this
                  Shim6 approach the endpoint identities and the locators are both IP
                  addresses.  The intention of this approach is to minimize the amount
                  of change and backward compatibility with L3Shim ?disabled node.
                  That is to say when communication session is established for the
                  first time, there is no L3Shim association.
               
                  In accordance with beginning communication, the node enables
                  functionalities for L3Shim, which are loaded memory in the bootstrap.
                  These functionalities are kept in clearly state. But we do not know
                  whether the remote peer can support L3Shim or not, other
                  functionalities can not be operating exception locally operational
                  addresses administration.
               
               3.2.3Shim Context Establishment
               
                  The L3Shim enabled node determines the ability of the remote peer to
                  support the Shim6 protocol via explicit negotiation after complete
                  communication session.
               
                  O If the capability negotiation fails for Shim6 supported.
                  The Shim6 protocol will continue to operate in a conventional.
                  Therefore L3Shim functionality ready to operate is lain in the idle
                  state continuously.
               
                  O If the remote host can support L3Shim
                  [ID.FUNC] notes that once the initial capability exchange has
                  completed "both ends know a set of locators for the peer that are
                  acceptable as the source in received packets." The end node makes an
                  operational address pair, and managed this information. The initial
                  state of the Shim6 mapping between ULID and locator is a null mapping.
               
               3.2.4Doubt Primary Address Pair Failure
               
                  L3Shim should check an operational primary address pair's state
                  through receiving various kinds of feedback or message.
               
               
               You et. al               Expires April 2006                   [Page 7]


                                      L3Shim state management           October 2005
               
               
               
                  Firstly, the L3Shim is receiving Upper level positive indication in
                  determinate period representing Active-Working-Time. Whenever receive
                  this feedback, Active-Working-Time do to reset. But when occurred
                  timeout since the last positive feedback was received, the Doubt
                  primary address pair failure event happened.
               
                  Secondly, when receive TCP negative feedback using such as ECN (The
                  Addition of Explicit Congestion Notification to IP), this event
                  happened. Finally, enter upon the state if receive ICMP error message.
               
                  Available address pairs are probed connectivity for address change
                  trigger after this event occurred. But there is no action about
                  currently operational primary address pair until decided time
                  (Probably-Active-Duration-Time) passed.
               
                  One of the reasons that put off a term of validity as like Probably-
                  Active-Duration-Time is that give upper layer protocols additional
                  time to provide reachability confirmation in those cases where
                  Active-Working-Time have passed since the last positive indication
                  due to lack of recent traffic. And the other is mentioned before at
                  Section 2.1; the case of Signaling from L3Shim to TCP.
               
               3.2.5Explicit Test
               
                  More than Probably-Active-Duration-Time has elapsed since the last
                  positive indication was received, Explicit Test event occurs. L3Shim
                  should attempt Rechability test about operational primary address
                  pair immediately.
               
               3.2.6Address change trigger
               
                  If rechabilility test fails, select one of managing available address
                  pairs and trigger address change. In case of that changed address
                  pair's bandwidth is bad than previous one, Indirect TCP Congestion
                  Control mechanism is operated as like mentioned before
               
               4. State transition diagram
               
                  The L3Shim state diagram is illustrates state change progress. There
                  is not a complete overlap of processing logic here. Especially this
                  diagram did not present detailed state about Shim context
                  establishment and address change mechanism. This state diagram
                  focuses on the situation between complete Shim context establishment
                  and occurred address change trigger.
               
                  The state diagram in the figures below shows the major state
                  transitions, together with the causing events and resulting actions.
               
               
               You et. al               Expires April 2006                   [Page 8]


                                      L3Shim state management           October 2005
               
               
               
                                           +-------------+
                                    ------>|    START    |
                                   Boot UP +-------------+
                                               |     ^
                      Request Connection:      |     |      Request Connection:
                      Success                  |     |      Fail
                                               v     |
                                           +-------------+
                                           |     IDLE    |
                                           +-------------+
                      Establish L3Sim          |     ^      Establish L3Shim
                      Success ->               |     |      Fail
                      Establishment            |     |
                      Association L3Shim       V     |
                                           +-------------+
                      +------------------->|    ACTIVE   |<-+
               ULP Positive Feedback  +--->|             |  |
               Active-working-Time:   |    +-------------+  |
               Reset  |               |      | |     ^      |
                                      |      | |     |      |
                      |               +------+ |     | Receive ULP Positive indication
                      | Active-working-        |     | before elapse Probably-Active-
                      | Time: Timeout or       |     | Duration-Time
                      | Receive ICMP error     |     | Active-working-Time: Reset
                      | message or ECN message V     |      |
                      |                    +-------------+  |
                      |                    |    VALID    |  |
                      |                    +-------------+  |
                      | Elapse Probably-       |            |  Probe Test: OK
                      | Active-Duration-       |            |  Active-working-
                      | Time                   V            |  Timer: Reset
                      |                    +-------------+  |
                      |                    |    PROBE    |  |
                      |                    +-------------+  |
                      | Explicit Test - Send   |     |      |
                      | Keepalive Message      |     +------+
                      | :Fail                  V
                      |                    +-------------+
                      +--------------------|    CHANGE   |<-+  Until Succeed Address
                                           +-------------+  |  pair changes using
               Complete Change address pair          |      |  available address pairs
               Active-working-Time: Reset            +------+
               
               
                  Figure 3. L3Shim state transition diagram
               
               
               
               
               
               You et. al               Expires April 2006                   [Page 9]


                                      L3Shim state management           October 2005
               
               
               4.1 L3Shim states
               
                  O STRAT
               
                  When L3Shim enabled node does boot up, initialized L3Shim.
                  Specifically, Initialized work such as loading L3Shim in memory, is
                  achieved
               
                  O IDLE
                  The IDLE state is entered upon that the application send packet to a
                  new peer or indication from a peer wishing to connect to us. But
                  L3Shim association did not complete yet. Therefore, L3Shim is
                  operated in idle state that does own all functions so that do clear
                  until L3Shim association exchanged.
               
                  O ACTIVE
                  This state is completed L3Shim association through L3Shim context
                  exchange. All of L3Shims?functions operate in this state. In this
                  Shim6 approach the endpoint identities and the locators are both IP
                  addresses basically. The initial state of the Shim6 mapping between
                  ULID and locator is a null mapping.
               
                  The end node makes an operational address pair, and managed this
                  information. We make timer called Active-Working-Time to manage
                  ACTIVE state continuously. If positive indication from an upper layer
                  protocol was received within the last Active-working-time, we can
                  confirm that L3shim operate well.
               
                  O VALID
                  More than Active-working-time has elapsed since the last positive
                  confirmation was received. Or if node received ICMP error message or
                  ECN from TCP, L3Shim was entered the VALID state. However receipt of
                  such a message does not confirm that address pair’s rechability is
                  cut off. The means entering the VALID state insures address pair’s
                  rechability is verified quickly if the primary address pair is
                  actually being used. But there is no action about currently
                  operational primary address pair until decided time (Probably-Active-
                  Duration-Time) passed.
               
                  Within this state, L3Shim only manages available address pairs
                  through probe message to ready to occur address change trigger.
                  Available address pairs are check and managed through RTT so on.
               
                  O PROBE
                  The Probably-Active-Duration-Time has no sooner elapsed than L3Shim
                  attempt explicit rechability test about an operational primary
                  address pair. A rechability confirmation is actively sought by such
                  as IKEv2 Keepalive mechanism [ID.MOBIKE]. Note that due to
               
               
               
               You et. al               Expires April 2006                  [Page 10]


                                      L3Shim state management           October 2005
               
               
                  potentially asymmetric connectivity, both sides have to perform their
                  own tests.
               
                  O CHANGE
                  The CHANGE state is entered upon to unsuccessful recahbility
                  confirmation about operational primary address pair. Then L3Shim
                  should select preferred address pair for operational primary one
                  because to verify other available address pairs validity in VALID
                  state. If Address change is completely, Active-working-Time does
                  reset, enter ACTIVE state.
               
               4.2 Node Behavior
               
                  When L3shim enabled node does boot up, entered upon START state. The
                  node does load L3Shim in memory preparing L3Shim use. If Connect
                  Communication Session event is happened, L3Shim is operated in IDLE
                  state that the entire functionalities are clearing until L3Shim
                  association will be exchanged. If connection request becomes fail,
                  return by START state again.
               
                  The node in IDLE state monitors ICMP error message or Link layer
                  specific mechanism to gather locally information for failure
                  detection.
               
                  After Connection establishment is completed, L3Shim tries Shim
                  context exchange to know that remote note have capability L3Shim. If
                  the remote host can support L3Shim, L3Shim context is exchanged, and
                  then own full functionalities of L3Shim are actively operating for
                  the first time. The other side, if the capability negotiation fails
                  for Shim6 supported, L3Shim functionalities are ready to operate in
                  IDLE state continuously.
               
                  When L3Shim receive Upper level positive indication within Active-
                  Working-Time, it keeps this ACTIVE state resetting Active-Working-
                  Time. While Active-Working-Time have elapsed, positive indication was
                  not received, enter upon the VALID state. Also the VALID state is
                  entered upon receiving either ICMP error message or Upper level
                  negative indication using such as ECN.
               
                  However, receipt of such messages does not confirm address pair's
                  rechability. But there is no action about current operational primary
                  address pair until decided time (Probably-Active-Duration-Time)
                  passed. If positive confirmation was received before timeout happened,
                  return to ACTIVE state.
               
                  During VALID state, L3Shim should verify other available address
                  pairs?rechability through probe message to prepare address change
                  triggering situation. In the case of SCTP protocol, other available
                  address pairs are managed through sending heart-beat chunk
               
               
               You et. al               Expires April 2006                  [Page 11]


                                      L3Shim state management           October 2005
               
               
                  periodically [RFC 2960]. But L3Shim can verify other available
                  address pairs?rechability in VALID state only. Consequently
                  performance degradation by sending frequently test message is reduced.
               
                  More than Probably-Active-Duration-Time has elapsed since the last
                  positive indication was received performed explicit rechability test
                  immediately. If the explicit rechability test is succeeded, return to
                  ACTIVE state. On the contrary, if this test is failed, it should be
                  occurring address change trigger entering CHANGE state.
               
                  In the CHANGE state, L3Shim should change an operational primary
                  address pair to select preferred one of set of available address
                  pairs. If we will exhaust available address pairs, keep CHANGE sate
                  until succeed an operational primary pair change. I would think that
                  this point is related with Pair selection state mechanism in
                  [ID.FAIL]. The correlations between proposed L3Shim state and Pair
                  selection state mechanism will be remain to future works.
               
               
               5. Future works
               
                  As mentioned before, our proposed L3Shim state process should have a
                  few collision points with Pair selection state mechanism referred to
                  [ID.FAIL]. The states from IDLE to CHANGE sate may be seem to be
                  related with the Pair selection mechanism. Therefore we are going to
                  look for a way to cooperate with two mechanisms or to clear off
                  mutual relationship about two mechanisms for future works.
               
               
               6. Security Considerations
               
                  This document has no direct impact on Internet infrastructure
                  security.
               
               
               7. IANA Considerations
               
                  This document has no IANA considerations.
               
               
               8. References
               
               8.1 Normative References
               
                  [ID.L3SHIM] E. Nordmark, M. Bagnulo, "Multihoming L3 Shim Approach",
                               draft-ietf-multi6-l3shom-00.txt, February 2005
               
               
               
               
               
               You et. al               Expires April 2006                  [Page 12]


                                      L3Shim state management           October 2005
               
               
                  [ID.ARCH]   G. Huston, "Architectural Commnetary on Site Multi-homing
                               using Level 3 Shim", draft-huston-l3shim-arch-00.txt,
                               February 2005
               
                  [ID.FAIL]   J. Arkko, "Failure Detection and Locator Selection in
                               Multi6", draft-ietf-multi6-failure-detection-00.txt,
                               January 2005
               
                  [ID.FUNC]   M. Bagnulo, J. Arkko, "Functional decomposition of the M6
                               protocol", draft-ietf-multi6-functional-dec-00, Febrary
                               2005.
               
               8.2 Informative References
               
                  [RFC 2960]  R. Stewart, etc, "Stream Control Transmission Protocol",
                               RFC 2960, October 2000
                  [ID.HIP]    R. Moskowitz, etc, "Host Identity Protocol", draft-ietf
                               hip-base-03, June 2005
                  [RFC 3168]  K. Ramakrishnan, etc, "The Addition of Explicit
                               Congestion Notification (ECN) to IP", RFC 3168,
                               September 2001
                  [ID.MOBIKE] T. Kivinen, etc, "Design of the MOBIKE Protocol", draft-
                               ietf-mobike-design-02.txt, February 2005
               
               
               Author's Addresses
               
                  Taewan You
                  ETRI/PEC
                  161 Gajeong-Dong, Yuseong-Gu, Daejeon 305-350, Korea
                  Tel : +82 42 860 4996
                  Fax : +82 42 861 5404
                  E-mail : twyou@pec.etri.re.kr
               
                  Indong Jang
                  ETRI/PEC
                  161 Gajeong-Dong, Yuseong-Gu, Daejeon 305-350, Korea
                  Tel : +82 42 860 4978
                  Fax : +82 42 861 5404
                  E-mail : indoi@pec.etri.re.kr
               
                  Seungyun Lee
                  ETRI/PEC
                  161 Gajeong-Dong, Yuseong-Gu, Daejeon 305-350, Korea
                  Tel : +82 42 860 5508
                  Fax : +82 42 861 5404
                  E-mail : syl@etri.re.kr
               
               
               
               
               You et. al               Expires April 2006                  [Page 13]


                                      L3Shim state management           October 2005
               
               
               Intellectual Property Statement
               
                  The IETF takes no position regarding the validity or scope of any
                  Intellectual Property Rights or other rights that might be claimed to
                  pertain to the implementation or use of the technology described in
                  this document or the extent to which any license under such rights
                  might or might not be available; nor does it represent that it has
                  made any independent effort to identify any such rights. Information
                  on the procedures with respect to rights in RFC documents can be
                  found in BCP 78 and BCP 79.
               
                  Copies of IPR disclosures made to the IETF Secretariat and any
                  assurances of licenses to be made available, or the result of an
                  attempt made to obtain a general license or permission for the use of
                  such proprietary rights by implementers or users of this
                  specification can be obtained from the IETF on-line IPR repository at
                  http://www.ietf.org/ipr.
               
                  The IETF invites any interested party to bring to its attention any
                  copyrights, patents or patent applications, or other proprietary
                  rights that may cover technology that may be required to implement
                  this standard.  Please address the information to the IETF at ietf-
                  ipr@ietf.org.
               
               
               Disclaimer of Validity
               
                  This document and the information contained herein are provided on an
                  "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
                  OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
                  ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
                  INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
                  INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
                  WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
               
               
               Copyright Statement
               
                  Copyright (C) The Internet Society (2005).  This document is subject
                  to the rights, licenses and restrictions contained in BCP 78, and
                  except as set forth therein, the authors retain all their rights.
               
               
               Acknowledgment
               
                  Funding for the RFC Editor function is currently provided by the
                  Internet Society.
               
               
               
               
               You et. al               Expires April 2006                  [Page 14]