Hi,
My WGLC comments of the I-D as a chair, not the document co-author. I will
also put them one by one into the issue tracker.
- Jouni
1) Abstract
Management (DMM) in IPv6 deployments. The traditionally hierarchical
structure of cellular networks has led to deployment models which are
in practice centralized. Mobility management with logically
Why are we only concerned about cellular networks? Could this be generalized?
Next sentences then start talking about mobile networks. Use consistent
language.
2) Abstract
when needed, and so on. Distributed mobility management must be
secure and compatible with existing network deployments and end
hosts.
I would argue a DMM mechanisms, unless completely done on the network side,
cannot be compatible with existing end host.. It can be backward
compatible, which means there is a way to allow mixing DMM aware and
legacy hosts in a case the DMM solution would require even a configuration
change in the end host.
3) Warnings from automated IDnits (parsed):
== Unused Reference: 'I-D.ietf-netext-pd-pmip' is defined on line 580, but
no explicit reference was found in the text
== Unused Reference: 'RFC3963' is defined on line 648, but no explicit
reference was found in the text
== Unused Reference: 'RFC6224' is defined on line 663, but no explicit
reference was found in the text
== The document seems to lack the recommended RFC 2119 boilerplate, even if
it appears to use RFC 2119 keywords -- however, there's a paragraph with
a matching beginning. Boilerplate error?
(ED: maybe putting RFC2119 language into 'front' section using
<note title="Requirements"> ... </note>)
== The copyright year in the IETF Trust and authors Copyright Line does not
match the current year
4) Section 1
a centralized mobility anchor providing global reachability and an
always-on experience to the user;
extensions to the base protocols to optimize handover performance
while users roam across wireless cells; and
extensions to enable the use of heterogeneous wireless interfaces
for multi-mode terminals (e.g. smartphones).
o Make this to a bulleted list.
5) Section 1
The presence of the centralized mobility anchor allows a mobile node
to remain reachable when it is not connected to its home domain. The
o "home domain" strikes out, which might not be obvious unless you are
familiar with mobile (cellular) lingo. Give a reference to a document
that a reader can read & get familiar with "home domains" and such.
6) Section 1
and scalability, which require costly network dimensioning and
o Ins't distribution dimensioning as well?
7) Section 1
Moreover, the availability of multi-mode devices and the possibility
of using several network interfaces simultaneously have motivated the
development of even more protocol extensions to add more capabilities
and to combine IP multicasting to the base protocol. In the end,
deployment is further complicated with the multitude of extensions.
o While "multi-mode" is correct, within IETF I would say "multiple
interface host" is better.
o I do not understand how "to combine IP multicasting to the base protocol"
relates to the paragraph.
o What is the "base protocol" here?
8) Section 1
mobile/fixed Internet Service Providers network requires taking into
o Service Providers network (ISP)
9) Section 1
strategies such as selective traffic offload (e.g. 3GPP work items
LIPA/SIPTO [TS.23829]) through alternative access networks (e.g.
o I would replace [TS.23829] with [TS.23.401] since both LIPA/SIPTO are
part of those document these days and the TR is just a technical
report.
8) Section 1
in a truly flat mobile architecture would anchor the traffic closer
to the point of attachment of the user, overcoming the suboptimal
route stretch of a centralized mobility scheme.
o This statement is more or less from the IP layer point of view. The
actual layer-2 aggregation can make the claim of "overcoming route
stretch" more challenging than it sounds.
9) Section 1
considerable periods of time [Paper-Locating.User] . Therefore it is
o misplaced '.'
10) Section 1
with application intelligence suggest that mobility can be provided
selectively, thus simplifying the context maintained in the different
nodes of the mobile network.
o "..mobility could be provided.."
o I would argue that having "simple IP" and "Mobile IP" selectively does
not simplify the context in the network, it actually makes the network
side more complex to implement. However, I would agree that it would
_reduce_ the amount of context maintained in the network.
11) Section 1
The DMM charter addresses two complementary aspects of mobility
management procedures: the distribution of mobility anchors towards a
more flat network and the dynamic activation/deactivation of mobility
protocol support as an enabler to distributed mobility management.
The former aims at positioning mobility anchors (HA, LMA) closer to
the user; ideally, mobility agents could be collocated with the
management support -- thus reducing the amount of state information
that must be maintained in various mobility agents of the mobile
network. The key idea is that dynamic mobility management relaxes
some of the constraints of previously-standardized mobility
management solutions and, by doing so, it can avoid the establishment
of non-optimal tunnels between two topologically distant anchors.
o expand DMM on the first use (excluding the abstract expansion here).
o "..anchors (HA, LMA).." -> "..anchors (e.g., HA, LMA).."
o The last sentence start discussion about tunnels. They are now mentioned
for the first time. Where the use of tunnels originated at this point?
It should be clarified at least with a reference.
o The last sentence states "non-optimal tunnels between two topologically
distant anchors". Where does that originates? Which protocols we are
implicitly referring to?
12) Section 2.1
(3GPP) UMTS networks, CDMA networks, and 3GPP Evolved Packet System
(EPS) networks employ centralized mobility management too. In
particular, Gateway GPRS Support Node (GGSN) and Serving GPRS Support
Node (SGSN) in the 3GPP UMTS hierarchical network, and the Packet
data network Gateway (P-GW) and Serving Gateway (S-GW) in the 3GPP
EPS network, respectively, act as anchors in a hierarchy.
o It is not really UMTS networks, .. rather say GPRS networks.
o Packet Data Network Gateway (P-GW)
o Since in 3GPP example SGSNs and SGWs are taken into anchoring
discussion, then in GPRS case the text should also discuss RNC, which
like SGW is the L2 anchor point for base stations.
o The text should be more clear when talking about anchoring that it
concerns IP layer and specifically user plane traffic. For example,
3GPP GPRS is rather hierarchical at L2 and mobility is handled at
every level of hierarchy rather independently.
o Figure 1 is incomplete in case of GPRS. RNC should be in the picture
as well.
o Figure 1 should change UMTS -> 3G GPRS if RNC is in picture, otherwise
GPRS is just fine.
13) Section 3.2
former case only the data plane is distributed. Fully distributed
mobility management implies that both the data plane and the control
plane are distributed. These different approaches are described in
o Data and control plane separation is not really something we have
practiced so far in IETF, at least not with the mobility protocols
developed within IETF. I would give a pointer to further reading to
architectures that have that separation and mention also IETF developed
mobility protocols do not have similar concept so far.
14) Section 4.1
REQ1: Distributed deployment
o This requirement must imho state why route optimization (MIPv6) or
localized routing (PMIPv6) as of today are not adequate/enough. The
requirement text itself is OK but the question above needs an answer.
15) Section 4.2
example, when, upon change of point of attachment to the
Internet, an application flow cannot cope with a change in the
o s/Internet/network
PS5: Wasting resources to provide mobility support to nodes that do
not need such support
o s/Wasting/Unnecessarily reserving
the tunnel, keep alive, etc.) is not turned off for peer-to-
o s/keep alive/keep alive signaling
keep alives, etc.) wastes network resources for no application
o s/keep alives/keep alive signaling
16) Section 4.5
o Earlier lists were indexed using (a), (b) etc.. here different style
(1), (2) is used. Choose one style.
17) Section 4.5
PS7: (Related problem) Complicated deployment with too many MIP
variants and extensions
Deployment is complicated with many variants and extensions of
MIP. When introducing new functions which may add to the
complexity, existing solutions are more vulnerable to break.
o I would argue this "related problem" could be removed. I see REQ5 as
a requirement for backward compatibility, not a MIP flavour complexity
issue.
18) Section 4.6
the mobility support provided by the DMM solution; signaling
message protection in terms of authentication, encryption,
etc.; data integrity and confidentiality; opt-in or opt-out
data confidentiality to signaling messages depending on
network environments or user requirements.
o Get rid of "etc". It does not really fit in a middle of a list.
o Some rewording needed. The use of semicolon is confusing.
19) Section 4.6
o The security discussed in "motivation" part seems to be mostly about
the first hop / on-link security. Why not saying that then instead
of listing a job lot of different threats..
their traffic. As signaling messages may travel over the
Internet, end-to-end security could be required.
o "could" is rather weak.. I would say MUST. Also, e2e security
between what? That needs to be stated as well.
20) Section 4.7
4.7. Flexible multicast distribution
REQ7: DMM should enable multicast solutions in flexible distribution
scenario. This flexibility enables different IP multicast
flows with respect to a mobile host to be managed (e.g.,
subscribed, received and/or transmitted) using multiple
endpoints.
o What is "flexible distribution scenario"? That is not mentioned earlier
or defined.
o I would reword the section title to something else like plain
"Multicast" or "Multicast considerations".
o "..using multiple endpoint." is supposed to mean what? I kind of
understand that as an aggregation or what does it intend to say?
21) Section 4.7
problems described in PS1 and PS6.
o For readability I would add references to relevant Sections as
well e.g. "..describer in Section 4.1 PS1 and in Section .."
22) Section 5
legitimate mobile host/router to access the DMM service; Second, end-
to-end security that protects signaling messages for the DMM service.
o e2e security between what? Between nodes that participate in the DMM
protocol as a whole or bilaterally between the end host and some xyz
functional entity?
23) Section 5
It is necessary to provide sufficient defense against possible
security attacks, or to adopt existing security mechanisms and
protocols to provide sufficient security protections. For instance,
EAP-based authentication can be used for access network security,
while IPsec can be used for end-to-end security.
o EAP-based security does not necessarily address on-link / first
hop threats. You gain access, and then can fool around.. does not
sound too promising, unless the security considerations can scope
the used link type better i.e. in p2p links this might be sufficient
but not in all.
On Apr 10, 2013, at 10:19 AM, Jouni Korhonen <[email protected]> wrote:
> Folks,
>
> This mail starts a two week WGLC #2 for draft-ietf-dmm-requirements-03.
> The issues, even editorials, must be recorded into the Issue Tracker,
> otherwise they are likely to be neglected. We require minimum three
> reviews (that are more than one liners). The more the better, though.
>
> The WGLC ends on Wednesday 24rd April.
>
> - Jouni & Julien
_______________________________________________
dmm mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dmm