A Framework of Media-Independent Pre-Authentication (MPA) for Inter-Domain Handover Optimization
RFC 6252
Internet Research Task Force (IRTF) A. Dutta, Ed.
Request for Comments: 6252 V. Fajardo
Category: Informational NIKSUN
ISSN: 2070-1721 Y. Ohba
K. Taniuchi
Toshiba
H. Schulzrinne
Columbia Univ.
June 2011
A Framework of Media-Independent Pre-Authentication (MPA) for
Inter-Domain Handover Optimization
Abstract
This document describes Media-independent Pre-Authentication (MPA), a
new handover optimization mechanism that addresses the issues on
existing mobility management protocols and mobility optimization
mechanisms to support inter-domain handover. MPA is a mobile-
assisted, secure handover optimization scheme that works over any
link layer and with any mobility management protocol, and is most
applicable to supporting optimization during inter-domain handover.
MPA's pre-authentication, pre-configuration, and proactive handover
techniques allow many of the handoff-related operations to take place
before the mobile node has moved to the new network. We describe the
details of all the associated techniques and their applicability for
different scenarios involving various mobility protocols during
inter-domain handover. We have implemented the MPA mechanism for
various network-layer and application-layer mobility protocols, and
we report a summary of experimental performance results in this
document.
This document is a product of the IP Mobility Optimizations (MOBOPTS)
Research Group.
Status of This Memo
This document is not an Internet Standards Track specification; it is
published for informational purposes.
This document is a product of the Internet Research Task Force
(IRTF). The IRTF publishes the results of Internet-related research
and development activities. These results might not be suitable for
deployment. This RFC represents the consensus of the MOBOPTS
Research Group of the Internet Research Task Force (IRTF). Documents
approved for publication by the IRSG are not a candidate for any
level of Internet Standard; see Section 2 of RFC 5741.
Dutta, et al. Informational [Page 1]
RFC 6252 MPA Framework June 2011
Information about the current status of this document, any errata,
and how to provide feedback on it may be obtained at
http://www.rfc-editor.org/info/rfc6252.
Copyright Notice
Copyright (c) 2011 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document.
Table of Contents
1. Introduction ....................................................3
1.1. Specification of Requirements ..............................5
1.2. Performance Requirements ...................................5
2. Terminology .....................................................7
3. Handover Taxonomy ...............................................7
4. Related Work ...................................................11
5. Applicability of MPA ...........................................12
6. MPA Framework ..................................................13
6.1. Overview ..................................................13
6.2. Functional Elements .......................................14
6.3. Basic Communication Flow ..................................16
7. MPA Operations .................................................20
7.1. Discovery .................................................21
7.2. Pre-Authentication in Multiple-CTN Environment ............22
7.3. Proactive IP Address Acquisition ..........................23
7.3.1. PANA-Assisted Proactive IP Address Acquisition .....24
7.3.2. IKEv2-Assisted Proactive IP Address Acquisition ....24
7.3.3. Proactive IP Address Acquisition Using
DHCPv4 Only ........................................24
7.3.4. Proactive IP Address Acquisition Using Stateless
Autoconfiguration ..................................26
7.4. Tunnel Management .........................................26
7.5. Binding Update ............................................28
Show full document text