IETF DMM WG Mobility Exposure and Selection WT Call#1 Oct 23, 2014.

Slides:



Advertisements
Similar presentations
Mobile IP How Mobile IP Works? Agenda What problems does Mobile IP solve? Mobile IP: protocol overview Scope Requirements Design goals.
Advertisements

1 IEEE Media Independent Handoff Overview of services and scenarios for 3GPP2 Stefano M. Faccin Liaison officer to 3GPP2.
Draft-ietf-mptcp-api-01 Michael Scharf, Alan Ford March 31, 2011.
MIF API Extension Discussion MIF IETF 78 Dapeng Liu Yuri Ismailov.
3G WLAN handover Gabor Bajko Nokia. Experiment Upstream-router DSMIP6-HA V6 V4 V6 Internet WiFi HSPA DSMIP6 Home Agent.
Deployment of Existing Mobility Protocols in DMM Scenario draft-liu-dmm-practice-of-deployment-00 draft-chan-dmm-framework-gap-analysis-05.
Distributed mobility management in the context of the MEDIEVAL project MEVICO Final Seminar, part 2 23 rd November 2012 Carlos J. Bernardos, UC3M
VoIP EE 548 Ashish Kapoor. Characteristics – Centralized and Distributed Control H.323 pushes call control functionality to the endpoint, while still.
Chapter 7: Transport Layer
Lecture 7 Transport Layer
Netext issues Julien Laganier, IETF-80. Logical Interface (I) #1: Replication of ND multicast messages across physical interfaces – What is in the source.
IETF DMM WG Mobility Exposure and Selection WT Report Alper Yegin, on behalf of the WT IETF 92.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Application Layer – Lecture.
Introduction to Transport Layer. Transport Layer: Motivation A B R1 R2 r Recall that NL is responsible for forwarding a packet from one HOST to another.
1 Application Layer. 2 Writing Networked Applications TCP UDP IP LL PL TCP UDP IP LL PL TCP UDP IP LL PL Web Browser Web Server Ftp Server Ftp Client.
Transport Layer3-1 Transport Layer Our goals: r understand principles behind transport layer services: m multiplexing/demultipl exing m reliable data transfer.
1 Computer Networks Transport Layer Protocols. 2 Application-layer Protocols Application-layer protocols –one “piece” of an app –define messages exchanged.
Introduction 1 Lecture 5 Application Layer slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science & Engineering Department.
Network-based, Localized Mobility Management – the Problem James Kempf DoCoMo Labs USA
Omniran IEEE 802 Scope of OmniRAN Date: Authors: NameAffiliationPhone Max RiegelNSN
DMM Framework based on Functional Elements draft-liebsch-dmm-framework-analysis-02 M. Liebsch, P. Seite, G. Karagiannis IETF88, Vancouver DMM WG 08 th.
Chapter 2 Application Layer Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April A note on the use.
SIP Authorization Framework Use Cases Rifaat Shekh-Yusef, Jon Peterson IETF 91, SIPCore WG Honolulu, Hawaii, USA November 13,
2: Application Layer1 Chapter 2 Application Layer These slides derived from Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross.
IETF DMM WG Mobility Exposure and Selection WT Call#2 Nov 6, 2014.
Communications Recap Duncan Smeed. Introduction 1-2 Chapter 1: Introduction Our goal: get “feel” and terminology more depth, detail later in course.
Use Cases and API Extension for Source IP Address Selection draft-sijeon-dmm-use-cases-api-source-00.txt Presenter: Alper Yegin Authors: Seil Jeon, Sergio.
HIP API issues in base spec Tom Henderson IETF-59, March 3, 2004.
Throughput: Internet scenario
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
Network Layer4-1 DHCP: Dynamic Host Configuration Protocol Goal: allow host to dynamically obtain its IP address from network server when it joins network.
IETF DMM WG Mobility Exposure and Selection WT Call#4 Feb 24, 2015.
What makes a network good? Ch 2.1: Principles of Network Apps 2: Application Layer1.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 23 How Web Host Servers Work.
Transport Layer Layer #4 (OSI-RM). Transport Layer Main function of OSI Transport layer: Accept data from the Application layer and prepare it for addressing.
Multimob possible future work I’: dmm multicast D. von Hugo Contributions from S. Figueiredo, S. Jeon, D. Liu IETF-83, Paris 1.
2: Application Layer 1 Chapter 2: Application layer r 2.1 Principles of network applications r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail  SMTP,
CS 1652 The slides are adapted from the publisher’s material All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Jack Lange.
Dynamic Host Configuration Protocol Engr. Mehran Mamonai.
Unrestricted Connection Manager MIF WG IETF 79, Beijing Gaétan Feige - Cisco Pierrick Seïté, France Telecom - Orange
Transport Layer and UDP Tahir Azim Ref:
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 OSI Transport Layer Network Fundamentals – Chapter 4.
Geneva, Switzerland, 11 June 2012 Switching and routing in Future Network John Grant Nine Tiles
Logical Interface Overview Date: [ ] Authors: NameAffiliationPhone Juan Carlos ZúñigaInterDigital Notice:
BAI513 - PROTOCOLS DHCP BAIST – Network Management.
Exposing Source IP Address Type Requirements with DHCPv6 D. Moses, A. Yegin draft-moses-dmm-dhcp-ondemand-mobility-00.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
Transport Layer 3-1 Chapter 3 Outline r 3.1 Transport-layer services r 3.2 Multiplexing and demultiplexing r 3.3 Connectionless transport: UDP.
1 NetLMM Vidya Narayanan Jonne Soininen
Some use cases and requirements for handover Information Services Greg Daley MIPSHOP Session IETF 64.
An Update on Multihoming in IPv6 Report on IETF Activity RIPE IPv6 Working Group 22 Sept 2004 RIPE 49 Geoff Huston, APNIC.
Approaches to Multi6 An Architectural View of Multi6 proposals Geoff Huston March 2004.
Wireless and mobility support issues Georgios Karagiannis Ericsson.
IETF#83 Multimob DMM Proposal Summary Dapeng Liu China Mobile 1.
Computer Network Architecture Lecture 6: OSI Model Layers Examples 1 20/12/2012.
IETF DMM WG Mobility Exposure and Selection WT Status and Next Steps Danny Moses/Alper Yegin, on behalf of the WT IETF 94.
F2F April 7, Enumeration & Connection Management presented by Chris Pane.
Transport Layer3-1 Chapter 3: Transport Layer Our goals: r understand principles behind transport layer services: m multiplexing/demultipl exing m reliable.
NSIS Terminology Issues Robert Hancock IETF #55 - Atlanta November 2002.
Multiple Interfaces (MIF) WG documents status MIF WG IETF 80, Prague Problem statement and current practices documents.
3GPP CSIPTO Alper Yegin Samsung Electronics IETF 90.
2: Transport Layer 11 Transport Layer 1. 2: Transport Layer 12 Part 2: Transport Layer Chapter goals: r understand principles behind transport layer services:
A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their original slides that accompany the.
IPv6-based Multihoming Standardization Activities April, 2008
S. Gundavelli, J. Korhonen, M. Liebsch, P. Seite, H. Yokota,
IETF67 B. Patil, Gopal D., S. Gundavelli, K. Chowdhury
H. Anthony Chan, Unified framework and DMM gap analysis draft-chan-dmm-framework-gapanalysis H. Anthony Chan,
Network-based and Client-based DMM solutions using Mobile IP mechanisms draft-bernardos-dmm-cmip-07 draft-bernardos-dmm-pmip-08 draft-bernardos-dmm-distributed-anchoring-09.
Presentation transcript:

IETF DMM WG Mobility Exposure and Selection WT Call#1 Oct 23, 2014

Basic Principles E2e data flow continuity can be accomplished at various layers: – IP-layer (e.g., MIP, PMIP) – Transport-layer (e.g., SCTP, MPTCP) – Application-layer (e.g., SIP, or proprietary) Mobility protocols at different layers may be applied to each data flow, depending on applicability/availability. – “Selection” needed for determining which protocol to apply on a given e2e data flow. – This selection is outside the scope of DMM. DMM only cares about IP-layer mobility. DMM handles IP-layer mobility support, any other layer mobility is outside the scope of DMM. Regardless of/in addition to other layer mobility, IP layer mobility may be used. 2

Basic Principles Selection between client-based vs network- based IP mobility is needed. – This is a per-node selection (not per-flow). [This point is OPEN to further discussion] – Can be based on configuration (e.g., SIM) – Dynamic negotiation/selection also allowed (e.g., ANDSF, other). 3

Basic Principles Source address for a data flow may be 1) A stable IP address that does not change until the flow terminates E.g., Skype call, VPN, live video streaming. 2) A stable IP address that does not change (practically) at all E.g., mobile server app using a (DNS/other) published IP address 3) An IP address that can change at each handover E.g., DNS client, IM client, apps using MPTCP IP addresses have a mobility attributes with following types: 1) Stable when in use 2) Always stable 3) Not stable (lost upon handover) IP address attributes will be “exposed” by the network to the MN’s IP stack – MN can explicitly request (negotiate) an IP address with specific type IP address attributes will be “exposed” by the IP stack to the applications on the MN – Apps can explicitly request (negotiate) a source IP address with specific type Each data flow needs to be bound to an IP address according to its mobility characteristic – Source address “selection” 4

Work Describe how MN decides between IP-layer and other layer-based mobility support (e.g., MPTCP, SIP, app-layer) to apply on a given flow Describe how mobility attributes of IP addresses are conveyed from network to MN. Describe how a required type of IP address is configured, when one is not already available on the MN. Describe how IP address type is communicated between the apps and IP stack on the MN. – Source address selection based on IP address type 5

Opens Do we want to expose the location of the IP anchor to the apps? Backward compatibility – Legacy host operating in new network – New host operating in legacy network 6

Next Steps 2nd call, before IETF Meetup in IETF 7

Related Documents mobility/ mobility/