Movatterモバイル変換


[0]ホーム

URL:


[RFC Home] [TEXT|PDF|HTML] [Tracker] [IPR] [Info page]

EXPERIMENTAL
Network Working Group                                         F. TeraokaRequest for Comments: 5184                                       K. GogoCategory: Experimental                                        K. Mitsuya                                                               R. Shibui                                                               K. Mitani                                                         KEIO University                                                                May 2008Unified Layer 2 (L2) Abstractionsfor Layer 3 (L3)-Driven Fast HandoverStatus of This Memo   This memo defines an Experimental Protocol for the Internet   community.  It does not specify an Internet standard of any kind.   Discussion and suggestions for improvement are requested.   Distribution of this memo is unlimited.IESG Note   This document is not an IETF Internet Standard.  It represents the   consensus of the MOBOPTS Research Group of the Internet Research Task   Force.  It may be considered for standardization by the IETF in the   future.Abstract   This document proposes unified Layer 2 (L2) abstractions for Layer 3   (L3)-driven fast handovers.  For efficient network communication, it   is vital for a protocol layer to know or utilize other layers'   information, such as the form of L2 triggers.  However, each protocol   layer is basically designed independently.  Since each protocol layer   is also implemented independently in current operating systems, it is   very hard to exchange control information between protocol layers.   This document defines nine kinds of L2 abstractions in the form of   "primitives" to achieve fast handovers in the network layer as a   means of solving the problem.  This mechanism is called "L3-driven   fast handovers" because the network layer initiates L2 and L3   handovers by using the primitives.  This document is a product of the   IP Mobility Optimizations (MobOpts) Research Group.Teraoka, et al.               Experimental                      [Page 1]

RFC 5184      L2 Abstractions for L3-Driven Fast Handover       May 2008Table of Contents1. Introduction ....................................................32. Terminology .....................................................33. Primitives for L2 Abstractions ..................................44. Definitions of Primitives .......................................64.1. L2-LinkStatus (Type 1) .....................................64.2. L2-PoAList (Type 1) ........................................64.3. L2-PoAFound (Type 2) .......................................64.4. L2-PoALost (Type 2) ........................................64.5. L2-LinkUp (Type 2) .........................................74.6. L2-LinkDown (Type 2) .......................................74.7. L2-LinkStatusChanged (Type 2) ..............................74.8. L2-LinkConnect (Type 3) ....................................74.9. L2-LinkDisconnect (Type 3) .................................85. Definitions of Static Parameters ................................85.1. Network Interface ID .......................................86. Definitions of Dynamic Parameters ...............................86.1. PoA (Point of Attachment) ..................................86.2. Condition ..................................................86.3. PoA List ...................................................96.4. Enable/Disable .............................................96.5. Ack/Error ..................................................97. Architectural Considerations ....................................98. Security Considerations ........................................139. Acknowledgements ...............................................1410. References ....................................................1410.1. Normative References .....................................1410.2. Informative References ...................................14Appendix A.  Example Scenario  ....................................16Appendix B.  Example Operation for FMIPv6  ........................17B.1.  Example Operation-1 for FMIPv6 ............................18B.2.  Example Operation-2 for FMIPv6 ............................20B.3.  Experiment ................................................21Appendix C.  Example Mapping between L2 Primitives and                Primitives in IEEE 802.11 and IEEE 802.16e  ..........22Appendix D.  Example Mapping of Primitives and IEEE 802.11  .......24D.1.  L2-LinkStatus  ............................................24D.2.  L2-PoAList ................................................24D.3.  L2-PoAFound  ..............................................24D.4.  L2-PoALost ................................................25D.5.  L2-LinkUp  ................................................25D.6.  L2-LinkDown  ..............................................25D.7.  L2-LinkStatusChanged ......................................25D.8.  L2-LinkConnect ............................................26D.9.  L2-LinkDisconnect  ........................................26Appendix E.  Implementation and Evaluation of the Proposed                Model ................................................26Teraoka, et al.               Experimental                      [Page 2]

RFC 5184      L2 Abstractions for L3-Driven Fast Handover       May 20081.  Introduction   Recent years have witnessed the rapid proliferation of wireless   networks as well as mobile devices accessing them.  Unlike wired   network environments, wireless networks are characterized by   dynamically changing radio conditions, connectivity, and available   bandwidth.  For efficient network communication, it is vital for a   protocol layer to know or utilize other layers' control information.   Mobile IPv4 [2] and Mobile IPv6 [3] have been standardized to support   communication with mobile nodes.  There are several proposals for   seamless handovers in IPv6 networks, such as Fast Handovers for   Mobile IPv6 (FMIPv6) [4] and Hierarchical Mobile IPv6 (HMIPv6) [5].   In FMIPv6, the network layer must know in advance the indication of a   handover from the link layer to achieve seamless handovers.  However,   control information exchange between protocol layers is typically not   available because each protocol layer is designed independently.   To solve the problem, this document defines nine kinds of L2   abstractions in the form of "primitives" to achieve fast handovers in   the network layer.  This mechanism is called "L3-driven fast   handovers" because the network layer initiates L2 and L3 handovers by   using the primitives.   IEEE 802.21 [6] also defines several services that make use of L2   information.  For the sake of ease of implementation and deployment,   the primitives defined in this document make use of only the   information available in the mobile node, while IEEE 802.21 [6]   introduces the information server in the network to provide the   mobile node with network-related information, such as a global   network map.   This document represents the consensus of the MobOpts Research Group.   It has been reviewed by Research Group members active in the specific   area of work.2.  Terminology   This document uses the following terms:   L3-Driven Fast Handover      The handover mechanism that is initiated by the network layer on a      mobile node.  Since this mechanism allows handover preparation in      L3 before the start of an L2 handover on the mobile node, it can      reduce packet loss during a handover.  The L3-driven fast handover      mechanism requires L2 information as a trigger for a handover      procedure.Teraoka, et al.               Experimental                      [Page 3]

RFC 5184      L2 Abstractions for L3-Driven Fast Handover       May 2008   PoA      The point of attachment of a mobile node (e.g., an access point in      IEEE 802.11 networks [7]).   Primitive      A unit of information that is sent from one layer to another.      There are four classes of primitives: Request, Confirm,      Indication, and Response.  One or more classes of a primitive are      exchanged, depending on the type of primitive.   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this   document are to be interpreted as described inRFC 2119 [1].3.  Primitives for L2 Abstractions   Each layer offers its services in the form of primitives.  Four   classes of primitives are defined, as shown in Figure 1.  Request is   issued by the layer that wants to get the services or information   from another layer, and Confirm is the acknowledgment of the request.   Indication is the notification of the information to the layer that   requested the service, and Response is the acknowledgment of the   indication.  In this architecture, communication between layers is   symmetrical.      -------------------------   -----------------------------                Request                       Response                  ||      /\             /\      ||      Layer N     ||      ||             ||      ||      ------------||------||---   -------||------||------------                  ||      ||             ||      ||                  \/      ||             ||      \/      Layer N-m        Confirm       Indication      -------------------------   -----------------------------      Figure 1: Interaction Model between Layers   The primitive consists of five fields: protocol layer ID, protocol   ID, primitive class (Request, Response, Indication, or Confirm),   primitive name, and parameters.  The protocol layer ID specifies to   which layer this primitive should be sent, e.g., Layer 2 or Layer 3.   The protocol ID specifies to which protocol entity this primitive   should be sent, e.g., IEEE 802.11 [7] or IEEE 802.3 [8].Teraoka, et al.               Experimental                      [Page 4]

RFC 5184      L2 Abstractions for L3-Driven Fast Handover       May 2008   For unified L2 abstractions for L3-driven fast handovers, three   different usages of primitives are defined, as described below:   Type 1.  To provide L2 information to upper layers immediately      This type of primitive is used to provide the L2 information to      upper layers immediately.  The Request and Confirm classes of      primitives MUST be exchanged for the interaction.  The Request      primitive is for an acquisition request for the L2 information.      The Confirm primitive is for the answer.   Type 2.  To notify upper layers of L2 events asynchronously      This type of primitive is used to notify upper layers of L2 events      asynchronously.  The Request, Confirm, and Indication classes of      primitive MUST be exchanged, and the Response class MAY be      exchanged for the interaction.  The Request and Confirm primitives      are used just for registration.  When an event occurs, the      Indication primitive is asynchronously delivered to the upper      layer.   Type 3.  To control L2 actions from upper layers      This type of primitive is used to control L2 actions from upper      layers.  The Request and Confirm classes of primitives MUST be      exchanged for the interaction.  The Request primitive is a request      for operation.  Ack or Nack returns immediately as the Confirm      primitive.   A protocol entity can register primitives anytime by exchanging the   Request and Confirm messages that include the fields defined above.   When the registered event occurs, the Indication and Response   messages are exchanged as well.   The way to exchange a message between protocol entities is beyond the   scope of this document.  Any information-exchange method between   layers, such as the work in [10], can be used.   The timing for sending an Indication primitive is also beyond the   scope of this document.  For example, a layer 2 event is generated   when layer 2 status has been changed, and this depends upon how   scanning algorithms, for example, are implemented.Teraoka, et al.               Experimental                      [Page 5]

RFC 5184      L2 Abstractions for L3-Driven Fast Handover       May 20084.  Definitions of Primitives   To obtain and exchange L2 information, the following primitives are   defined.Appendix C shows example mapping between the L2 primitives   and the primitives in IEEE 802.11 [7] and IEEE 802.16e [9].4.1.  L2-LinkStatus (Type 1)   The L2-LinkStatus.request primitive is sent to the link layer when an   upper layer requires the current information of a link.  The   L2-LinkStatus.request primitive contains the "Network Interface ID"   parameter (seeSection 5.1).  In response, the L2-LinkStatus.confirm   primitive returns.  The L2-LinkStatus.confirm primitive contains   three parameters: "Network Interface ID", "PoA", and "Condition".   "PoA" and "Condition" indicate the current status of the link between   the mobile node and a PoA.4.2.  L2-PoAList (Type 1)   The L2-PoAList.request primitive is sent to the link layer when an   upper layer requires a list of the candidate PoAs.  The   L2-PoAList.request primitive contains the "Network Interface ID"   parameter.  In response, the L2-PoAList.confirm primitive returns the   "Network Interface ID" parameter and the "PoA List" parameter.  The   "PoA List" parameter is a list of the candidate PoAs.4.3.  L2-PoAFound (Type 2)   The L2-PoAFound.indication primitive is asynchronously provided to an   upper layer when new PoAs are detected.  This primitive carries the   "Network Interface ID" parameter and the "PoA List" parameter.  The   "PoA List" parameter contains information on new PoAs detected by the   mobile node.  In order to use this notification, the registration   process using the L2-PoAFound.request primitive and the   L2-PoAFound.confirm primitive is needed in advance.  The   L2-PoAFound.request primitive has two parameters: "Network Interface   ID" and "Enable/Disable".  The "Enable/Disable" parameter shows   whether this notification function is turned on.  When this   registration succeeds, the L2-PoAFound.confirm primitive returns with   the "Network Interface ID" parameter and the "Ack" parameter in   response.4.4.  L2-PoALost (Type 2)   The L2-PoALost.indication primitive is asynchronously provided to an   upper layer when a PoA included in the list of candidate PoAs   disappears.  This primitive carries the "Network Interface ID"   parameter and the "PoA List" parameter.  The "PoA List" parameterTeraoka, et al.               Experimental                      [Page 6]

RFC 5184      L2 Abstractions for L3-Driven Fast Handover       May 2008   contains information on the PoAs that disappeared from the list of   candidates.  The registration process using the L2-PoALost.request   primitive and the L2-PoALost.confirm primitive is similar to the   L2-PoAFound primitive described above.4.5.  L2-LinkUp (Type 2)   The L2-LinkUp.indication primitive is asynchronously provided to an   upper layer when a new link is connected and IP packets can be   transmitted through the new link.  As described inRFC 4957 [12],   what "link is connected" means depends on link types.  For example,   in case of the infrastructure mode in IEEE 802.11 [7] (WiFi), this   primitive is provided when an association to an access point is   established.  This primitive carries the "Network Interface ID"   parameter and the "PoA" parameter.  The L2-LinkUp.request primitive   contains the "Network Interface ID" parameter and the   "Enable/Disable" parameter for registration.  When the registration   succeeds, the L2-LinkUp.confirm primitive with the "Network Interface   ID" parameter and the "Ack" parameter returns.4.6.  L2-LinkDown (Type 2)   The L2-LinkDown.indication primitive is asynchronously provided to an   upper layer when an existing link is disconnected and IP packets   cannot be transmitted through the link.  The registration processing   is the same as the L2-LinkUp primitive described above.4.7.  L2-LinkStatusChanged (Type 2)   The L2-LinkStatusChanged.indication primitive is asynchronously   provided to an upper layer when the status of a link has changed.   This notification contains three parameters: "Network Interface ID",   "PoA", and "Condition".  The "PoA" parameter indicates the attachment   point at which the link quality changed.  In the registration   processing, the L2-LinkStatusChanged.request primitive carries the   "Network Interface ID" parameter, the "Enable/Disable" parameter, and   the "Condition" parameter.  "Condition" indicates the event type and   the threshold for the Indication.4.8.  L2-LinkConnect (Type 3)   The L2-LinkConnect.request primitive is sent to the link layer when   an upper layer has to establish a new link to the specific "PoA".   This primitive carries the "Network Interface ID" parameter and the   "PoA" parameter.  This operation begins after the link layer returns   the L2-LinkConnect.confirm primitive with "Ack".Teraoka, et al.               Experimental                      [Page 7]

RFC 5184      L2 Abstractions for L3-Driven Fast Handover       May 20084.9.  L2-LinkDisconnect (Type 3)   The L2-LinkDisconnect.request primitive is sent to the link layer   when an upper layer has to tear down an existing link to the specific   "PoA".  This primitive carries the "Network Interface ID" parameter   and the "PoA" parameter.  This operation begins after the link layer   returns the L2-LinkDisconnect.confirm primitive with "Ack".5.  Definitions of Static Parameters   This section lists static parameters.  Once the values of static   parameters are configured, they basically remain unchanged during   communication.  The following parameters are transferred as a part of   primitives.5.1.  Network Interface ID   The "Network Interface ID" parameter uniquely identifies the network   interface in the node.  The syntax of the identifier is   implementation-specific (e.g., name, index, or unique address   assigned to each interface).  This parameter also contains the   network interface type that indicates the kind of technology of the   network interface (e.g., IEEE 802.11a/b/g [7], Third Generation   Partnership Project (3GPP), etc.).  This parameter is required in all   primitives.6.  Definitions of Dynamic Parameters   This section lists dynamic parameters.  The values of dynamic   parameters change frequently during communication.  The following   parameters are transferred as a part of primitives.6.1.  PoA (Point of Attachment)   The "PoA" parameter uniquely identifies the PoA.6.2.  Condition   The "Condition" parameter consists of the following sub-parameters:   available bandwidth and link quality level.  These sub-parameters are   the abstracted information that indicates the current quality of   service.  The abstraction algorithms of sub-parameters depend on   hardware devices and software implementation.  The useful range of   link quality is divided into five levels: EXCELLENT, GOOD, FAIR, BAD,   and NONE, in descending order.  The quality levels of an L2 deviceTeraoka, et al.               Experimental                      [Page 8]

RFC 5184      L2 Abstractions for L3-Driven Fast Handover       May 2008   are independent of those of other devices.  However, making decisions   based on these metrics is error prone and not guaranteed to result in   an optimal choice of links.  An example of the thresholds among the   five levels in IEEE 802.11 [7] is described inAppendix E.6.3.  PoA List   The "PoA List" parameter consists of arbitrary couples of two   sub-parameters: "PoA" and "Condition".  This parameter shows a list   of PoAs and their conditions.6.4.  Enable/Disable   The "Enable/Disable" flag is used for turning event notification on/   off.  When an upper layer needs notifications, the Request primitive   with "Enable" is sent to the link layer as registration.  When an   upper layer needs no more notifications, the Request primitive with   "Disable" is sent.6.5.  Ack/Error   When an upper layer requests some notifications, the link layer   receives and confirms this Request.  If the Request is valid, the   Confirm primitive with "Ack" is sent to the upper layer.  If it is   invalid, the Confirm with "Error" is sent to the upper layer.7.  Architectural ConsiderationsRFC 4907 [11] discusses the role and the issues of link indications   within the Internet Architecture.  This section discusses the   architectural considerations mentioned inSection 2 of RFC 4907.   1.    Proposals should avoid use of simplified link models in         circumstances where they do not apply.         The information in each layer should be abstracted before it is         sent to another layer.  For example, in IEEE 802.11 [7], the         Received Signal Strength Indicator (RSSI), the number of         retransmissions, and the existence of association between the         mobile node and the access point are used so that the link         layer indications can adjust themselves to various environments         or situations.  The thresholds needed for some link indications         are defined from empirical study.         In the conventional protocol-layering model, the Protocol         Entity (PE) is defined as the entity that processes a specific         protocol.  Our proposal introduced the Abstract Entity (AE) toTeraoka, et al.               Experimental                      [Page 9]

RFC 5184      L2 Abstractions for L3-Driven Fast Handover       May 2008         achieve link independency of the link indications.  An AE and a         PE make a pair.  An AE abstracts the PE-dependent information         to the PE-independent information.         Figure 2 shows AEs and PEs using primitives.   2.    Link indications should be clearly defined, so that it is         understood when they are generated on different link layers.         To make the link information/indications clear, our proposal         defines the 4 types of primitives: Request/Confirm and         Indication/Response, as described inSection 3.  The Request is         used to obtain the information of another layer.  The Confirm         is the reply to the request and it includes the requested         information.  The Indication is generated when a particular         event occurs.  The Response is the reply to the indication.         In our proposal on IEEE 802.11b [7], L2-LinkUp is defined as         the status in which an association to the Access Point (AP) is         established, and L2-LinkDown is defined as the status in which         an association to the AP is not established.         L2-LinkStatusChanged is generated when the link quality goes         below the predefined threshold.  Since the Received Signal         Strength Indicator (RSSI) and the number of retransmissions are         used to abstract and evaluate the link quality, L2-         LinkStatusChanged represents the link quality in both         directions.  It should use an average of the RSSI or the number         of retransmissions damped for one second or more to cope with         transient link conditions.   3.    Proposals must demonstrate robustness against misleading         indications.         Since RSSI changes significantly even when the mobile node         stands still according to the measurements in our experiments,         our proposal uses the RSSI, the number of retransmissions, and         the existence of an association to calculate the link status,         as described above.  In our experiments, there were some         "ping-pong" handovers between two APs.  Such ping-pong         handovers could be reduced by detecting the most suitable AP by         L2-LinkStatus when L2-LinkStatusChanged is notified.  The use         of L2 indications is related to parameter thresholds that         trigger handover.  These thresholds vary based on the         deployment scenario and, if not configured properly, could lead         to misleading indications.Teraoka, et al.               Experimental                     [Page 10]

RFC 5184      L2 Abstractions for L3-Driven Fast Handover       May 2008   4.    Upper layers should utilize a timely recovery step so as to         limit the potential damage from link indications determined to         be invalid after they have been acted on.         The proposed L3-driven handover described inAppendix E uses         the L2-LinkStatusChanged indication as the trigger for starting         handover.  L2-LinkStatusChanged is indicated when the link         quality goes below a specific threshold.  This indication is         not canceled even if the link quality goes up soon.  As         described above, L2-LinkStatus can be used to detect the most         suitable AP.  The IP layer can cancel a handover if it finds         that the current AP is the most suitable one by using         L2-LinkStatus when L2-LinkStatusChanged is notified.   5.    Proposals must demonstrate that effective congestion control is         maintained.         Since this mechanism is coupled to the IP layer, and not         directly to the transport layer, the proposed mechanism does         not directly affect congestion control.   6.    Proposals must demonstrate the effectiveness of proposed         optimizations.         In IPv6 mobility, the L3-driven handover mechanism using link         indications can dramatically reduce gap time due to handover.         The L3-driven handover mechanism needs the L2-LinkStatusChanged         indication to predict disconnection.  But L2-LinkStatusChanged         is not trusted sometimes because it is difficult to abstract         the link quality.  Invalid L2-LinkStatusChanged may cause         redundant handover.  A handover mechanism using only L2-LinkUp/         L2-LinkDown can also reduce gap time modestly.  An example of         an implementation and evaluation of the L3-driven handover         mechanism is described inAppendix E.   7.    Link indications should not be required by upper layers in         order to maintain link independence.         Our proposal does not require any modifications to the         transport and upper layers.   8.    Proposals should avoid race conditions, which can occur where         link indications are utilized directly by multiple layers of         the stack.         Since our proposal defines the link indications only to the IP         layer, race conditions between multiple layers never occur.Teraoka, et al.               Experimental                     [Page 11]

RFC 5184      L2 Abstractions for L3-Driven Fast Handover       May 2008   9.    Proposals should avoid inconsistencies between link and routing         layer metrics.         Our proposal does not deal with routing metrics.   10.   Overhead reduction schemes must avoid compromising         interoperability and introducing link-layer dependencies into         the Internet and transport layers.         As described above, the link indications in our proposal are         abstracted to the information independent of link types to         reduce the gap time due to a handover, and the ordinary host         can execute handover without using the link indications defined         in our proposal.   11.   Proposals advocating the transport of link indications beyond         the local host need to carefully consider the layering,         security, and transport implications.  In general, implicit         signals are preferred to explicit transport of link indications         since they add no new packets in times of network distress,         operate more reliably in the presence of middle boxes, such as         NA(P)Ts (Network Address (Port) Translations), are more likely         to be backward compatible, and are less likely to result in         security vulnerabilities.         Our proposal does not define the exchange of link indications         between nodes.Teraoka, et al.               Experimental                     [Page 12]

RFC 5184      L2 Abstractions for L3-Driven Fast Handover       May 2008      ---------------------------------------------------------      ----------===========     ----------===========      |         |[        ]     |         |[        ]      |   PE    |[   AE   ]     |   PE    |[   AE   ]      |         |[        ]     |         |[        ]      ----------===========     ----------===========      Layer N     ||   /\                   ||   /\      ------------||---||-------------------||---||------------           Request||   ||           Response||   ||                  ||   ||                   ||   ||                  ||   ||                   ||   ||                  ||   ||Confirm            ||   ||Indication      ------------||---||-------------------||---||------------                  \/   ||                   \/   ||      ----------===========     ----------===========      |         |[        ]     |         |[        ]      |   PE    |[   AE   ]     |   PE    |[   AE   ]      |         |[        ]     |         |[        ]      ----------===========     ----------===========      Layer N-m      ---------------------------------------------------------      Figure 2: AE and PE with Primitives8.  Security ConsiderationsRFC 4907 [11] discusses the role and issues of link indications   within the Internet Architecture.  This section discusses the   security considerations mentioned inSection 4 of RFC 4907.   1.  Spoofing         The proposed primitives suffer from spoofed link-layer control         frames.  For example, if a malicious access point is set up and         spoofed beacon frames are transmitted, L2-PoAFound.indication         is generated in the mobile node.  As a result, the mobile node         may establish an association with the malicious access point by         an L2-LinkConnect.request.   2.  Indication validation         Transportation of the link indications between nodes is not         assumed; hence, this consideration is beyond the scope of our         proposal.Teraoka, et al.               Experimental                     [Page 13]

RFC 5184      L2 Abstractions for L3-Driven Fast Handover       May 2008   3.  Denial of service         Since this proposal does not change link-layer protocols, no         more insecurity is added to a particular link-layer protocol.         However, the proposed primitives suffer from denial-of-service         attacks by spoofed link-layer frames.  For example, L2-         PoAFound.indication and L2-PoALost.indication may frequently be         generated alternately if a malicious access point frequently         transmits control frames that indicate strong RSSI and weak         RSSI alternately.9.  Acknowledgements   The authors gratefully acknowledge the contributions of Jukka Manner,   Christian Vogt, and John Levine for their review.10.  References10.1.  Normative References   [1]  Bradner, S., "Key words for use in RFCs to Indicate Requirement        Levels",BCP 14,RFC 2119, March 1997.10.2.  Informative References   [2]  Perkins, C., Ed., "IP Mobility Support for IPv4",RFC 3344,        August 2002.   [3]  Johnson, D., Perkins, C., and J. Arkko, "Mobility Support in        IPv6",RFC 3775, June 2004.   [4]  Koodli, R., Ed., "Fast Handovers for Mobile IPv6",RFC 4068,        July 2005.   [5]  Soliman, H., Castelluccia, C., El Malki, K., and L. Bellier,        "Hierarchical Mobile IPv6 Mobility Management (HMIPv6)",RFC4140, August 2005.   [6]  "Draft IEEE Standard for Local and Metropolitan Area Networks:        Media Independent Handover Services", IEEE P802.21/D02.00,        September 2006.   [7]  IEEE, "802.11-2007 IEEE Standard for LAN/MAN - Specific        requirements Part 11: Wireless LAN Medium Access Control (MAC)        and Physical Layer (PHY) Specifications", 2007.Teraoka, et al.               Experimental                     [Page 14]

RFC 5184      L2 Abstractions for L3-Driven Fast Handover       May 2008   [8]  IEEE, "802.3, 2000 EDITION ISO/IEC 8802-3:2000 (E) Information        Technology - LAN/MAN - Part 3: Carrier Sense Multiple Access        with Collision Detection (CSMA/CD) Access Method and Physical        Layer Specifications", 2000.   [9]  IEEE, "802.16e-2005 & 802.16/COR1 Part 16: Amendment for        Physical & Medium Access Control Layers for Combined Fixed &        Mobile Operation", 2006.   [10] Gogo, K., Shibu, R., and F. Teraoka, "An L3-Driven Fast Handover        Mechanism in IPv6 Mobility", In Proc. of International Symposium        on Applications and the Internet (SAINT2006) Workshop in IPv6,        February 2006.   [11] Aboba, B., Ed., "Architectural Implications of Link        Indications",RFC 4907, June 2007.   [12] Krishnan, S., Ed., Montavont, N., Njedjou, E., Veerepalli, S.,        and A. Yegin, Ed., "Link-Layer Event Notifications for Detecting        Network Attachments",RFC 4957, August 2007.   [13] Ishiyama, M., Kunishi, M., Uehara, K., Esaki, H., and F.        Teraoka, "LINA: A New Approach to Mobility Support in Wide Area        Networks", IEICE Transactions on Communication vol. E84-B, no.        8, pp. 2076-2086, August 2001.Teraoka, et al.               Experimental                     [Page 15]

RFC 5184      L2 Abstractions for L3-Driven Fast Handover       May 2008Appendix A.  Example Scenario   For example, the picture below shows L3-driven fast handover   mechanism using the L2 triggers on a mobile node (MN).          L2                               L3           |                                |           |<----------LinkUP.req-----------|           |-----------LinkUP.cnf---------->|           |<-----LinkStatusChanged.req-----|           |------LinkStatusChanged.cnf---->|           =                                =           |                                |          Low                               |         Signal---LinkStatusChanged.ind---->|           |                                |           |<----------PoAList.req----------|           |-----------PoAList.cnf------>Handover           |                            Preparation           |<-------LinkConnect.req---------|       L2 Handover--LinkConnect.cnf-------->:           :                                :           :                                :           finish---------LinkUp.ind----->L3 Handover           |                             finish           |                                |        L2: Link Layer on MN        L3: Network Layer on MN       req: Request       cnf: Confirm       ind: Indication      Figure 3: L3-Driven Fast Handover Mechanism   First, L3 issues LinkUp.request to receive LinkUp.indication when the   link becomes available.  L3 also issues LinkStatusChanged.request to   receive LinkStatusChanged.indication when the link quality goes below   the threshold.   In the beginning of the L3-driven handover procedure, L2 detects that   the radio signal strength is going down.  Then, L2 sends   L2-LinkStatusChanged.indication to L3.  L3 prepares for handover   (e.g., Care-of Address (CoA) generation, Duplicate Address Detection   (DAD), Neighbor Discovery (ND) cache creation, and routing table   setting) and sends L2-PoAList.request to L2 if the list of access   points is needed.Teraoka, et al.               Experimental                     [Page 16]

RFC 5184      L2 Abstractions for L3-Driven Fast Handover       May 2008   If L3 decides to perform handover according to some rules, L3 sends   L2-LinkConnect.request with some parameters about candidate access   points to request L2 handover.  L2 handover begins after L2 sends   L2-LinkConnect.confirm to L3.  When the L2 handover finishes, L2   sends L2-LinkUp.indication to notify L3.  Finally, L3 performs   handover (e.g., sending a Binding Update (BU)).   One of the important features of L3-driven fast handover using   primitives is that L3 handover preparation can be done during   communication.  So, it can reduce disruption time during handover.Appendix B.  Example Operation for FMIPv6   There are two scenarios of L3-driven fast handover for FMIPv6.   Scenario 2 is different from scenario 1 for the timing of sending   some messages.Teraoka, et al.               Experimental                     [Page 17]

RFC 5184      L2 Abstractions for L3-Driven Fast Handover       May 2008B.1.  Example Operation-1 for FMIPv6   Figure 4 shows the predictive mode of FMIPv6 operation with an   L3-driven link-switching mechanism.      MN-L2                            MN-L3        PAR-L3        |                                |             |       AP<----------PoAList.req----------|             |      Scan----------PoAList.cnf--------->|             |        |                                |---RtSolPr-->|        |                                |<--PrRtAdv---|        |----------PoAFound.ind--------->|             |        |                                |---RtSolPr-->|        |                                |<--PrRtAdv---|        |                                |             |        ~                                ~             ~        |                                |             |       Low                               |             |      Signal---LinkStatusChanged.ind---->|             |        NAR-L3        |                                |-----FBU---->|           |        |                                |             |----HI---->|        |                                |             |<--HAck----|        |                                |<----FBack---|           |        |<-------LinkConnect.req---L3 Handover         |           |    L2 Handover--LinkConnect.cnf-------->:                         |        :                                :                         |        :                                :                         |     finish---------LinkUp.ind---------->:                         |        |                                :-----------FNA---------->|        |                             finish<======packets=========|        |                                |                         |   MN-L2   : Link Layer on Mobile Node   MN-L3   : Network Layer on Mobile Node   PAR-L3  : Network Layer on Previous Access Router   NAR-L3  : Network Layer on New Access Router   req     : Request   cnf     : Confirm   ind     : Indication   RtSolPr : Router Solicitation for Proxy   PrRtAdv : Proxy Router Advertisement   FBU     : Fast Binding Update   FBack   : Fast Binding Acknowledgment   FNA     : Fast Neighbor Advertisement   HI      : Handover Initiate   HAck    : Handover Acknowledge   Figure 4: L3-Driven Fast Handover Mechanism with FMIPv6 Scenario 1Teraoka, et al.               Experimental                     [Page 18]

RFC 5184      L2 Abstractions for L3-Driven Fast Handover       May 2008   When MN establishes link connectivity to PAR, it performs router   discovery.  MN sends an RtSolPr message to PAR to resolve the access   point identifiers to the subnet router information.  To send RtSolPr,   MN discovers one or more access points by sending L2-PoAList.request   to the link layer.  As a response to L2-PoAList.request,   L2-PoAList.confirm returns with "PoA List" parameter that contains   identifiers and conditions of nearby access points.  After initial AP   discovery, L2-PoAFound.indication with "PoA List" is also sent from   the link layer when one or more access points are discovered.   When the link layer of MN detects that radio signal strength is   dropping, it sends L2-LinkStatusChanged.indication to the network   layer.  Then, MN sends the FBU message to PAR as the beginning of the   L3 handover procedure.  The NCoA required for the FBU message is   determined according to the MN's policy database and the received   PrRtAdv message.  As a response to the FBU message, MN receives the   FBack message and then immediately switches its link by   L2-LinkConnect.request with the specific "PoA" parameter.  The   handover policy of the MN is outside the scope of this document.   After L2 handover, the link layer of the MN sends   L2-LinkUp.indication to the network layer.  MN immediately sends the   FNA message to the New Access Router (NAR).  The NAR will send   tunneled and buffered packets to MN.Teraoka, et al.               Experimental                     [Page 19]

RFC 5184      L2 Abstractions for L3-Driven Fast Handover       May 2008B.2.  Example Operation-2 for FMIPv6   Figure 5 shows the predictive mode of FMIPv6 operation with an   L3-driven link-switching mechanism.      MN-L2                            MN-L3        PAR-L3        |                                |             |       AP<----------PoAList.req----------|             |      Scan----------PoAList.cnf--------->|             |        |                                |---RtSolPr-->|        |                                |<--PrRtAdv---|        |----------PoAFound.ind--------->|             |        |                                |---RtSolPr-->|        |                                |<--PrRtAdv---|        |                                |             |        ~                                ~             ~        |                                |             |       Low                               |             |      Signal---LinkStatusChanged.ind---->|             |        NAR-L3        |                                |-----FBU---->|           |        |<-------LinkConnect.req---L3 Handover         |           |    L2 Handover--LinkConnect.cnf-------->:             |           |        |                                |             |----HI---->|        |                                |             |<--HAck----|        |                                |     <-FBack-|---FBack-->|        |                                |<----FBack---------------|        :                                :                         |     finish---------LinkUp.ind---------->:                         |        |                                :-----------FNA---------->|        |                             finish<======packets=========|        |                                |                         |   MN-L2   : Link Layer on Mobile Node   MN-L3   : Network Layer on Mobile Node   PAR-L3  : Network Layer on Previous Access Router   NAR-L3  : Network Layer on New Access Router   req     : Request   cnf     : Confirm   ind     : Indication   RtSolPr : Router Solicitation for Proxy   PrRtAdv : Proxy Router Advertisement   FBU     : Fast Binding Update   FBack   : Fast Binding Acknowledgment   FNA     : Fast Neighbor Advertisement   HI      : Handover Initiate   HAck    : Handover Acknowledge   Figure 5: L3-Driven Fast Handover Mechanism with FMIPv6 Scenario 2Teraoka, et al.               Experimental                     [Page 20]

RFC 5184      L2 Abstractions for L3-Driven Fast Handover       May 2008   Unlike scenario 1, MN in scenario 2 sends LinkConnect.req from the   network layer to the link layer after MN sends the FBU message.  As   PAR sends the FBack messages not only to PAR's subnet but also to   NAR's subnet, MN can get the FBack message sent by PAR through NAR,   and then it moves to NAR.B.3.  Experiment   We implemented FMIPv6 and the proposed L2 primitives on FreeBSD-5.4.   Figure 6 shows our test network.  MN is connected to access routers   by using IEEE802.11a wireless LAN.  MN moves from PAR to NAR.                  |               +--+---+               |Router|               +--+---+                  |                                 100BaseTX      ---+--------+---------+---------+---------+------------         |                  |         |         |      +--+--+            +--+--+   +--+--+   +--+--+      | PAR |            | NAR |   | HA  |   | CN  |      +-----+            +-----+   +-----+   +-----+         |                  |          IEEE802.11a        IEEE802.11a         PAR, NAR: nexcom EBC         |Channel 7         |Channel7            MN: ThinkPad X31                                                 OS: FreeBSD-5.4         |                  |                        KAME/SHISA/TARZAN      +-----+            +-----+      | MN  |  ------->  | MN  |      +-----+            +-----+      Figure 6: Test Network   Scenario 1 was used in this experiment since it was more stable than   scenario 2.  Upon receiving L2-LinkStatusChanged.indication, L3 of MN   sent the FBU message and then received the FBack message.  It took   20ms from the transmission of the FBU message to the reception of the   FBack message.  After receiving the FBack message, L3 of MN issued   L2-LinkConnect.request to L2.  When L2 handover finished, L3 received   L2-LinkUp.indication from L2.  It took 1ms for an L2 handover.  Next,   MN sent the FNA message to NAR.  Upon receiving the FNA message, NAR   started forwarding packets to NM.  ICMP echo request packets were   sent at 10ms intervals.  It was observed that zero or one ICMP echo   reply packet was lost during a handover.Teraoka, et al.               Experimental                     [Page 21]

RFC 5184      L2 Abstractions for L3-Driven Fast Handover       May 2008                  MN                PAR                NAR                  |                  |                  |                  |----- RtSolPr --->|                  |                  |<---- PrRtAdv ----|                  |                  |                  |                  |            +---  |------ FBU ------>|                  |            |     |                  |------- HI ------>|        20ms|     |                  |                  |            |     |                  |<----- HAck ------|            |     |                  |                  |            +---  |<-------------- FBack -------------->|                  |                  |                  |            +-- disconnect           |                  |            |  1ms|                  |                  |            |   connect              |                  |      8-10ms|     |                  |                  |            |  7ms|                  |                  |            |     |                  |                  |            |     +----- FNA -------------------------->|            +--   |<------------------------ deliver packets                  |                  |                  |                   Figure 7: Measured ResultsAppendix C.  Example Mapping between L2 Primitives and the Primitives in             IEEE 802.11 and IEEE 802.16e   This section shows example mapping between the L2 primitives and the   primitives in IEEE 802.11 [7] and IEEE 802.16e [9] in Table 1.Teraoka, et al.               Experimental                     [Page 22]

RFC 5184      L2 Abstractions for L3-Driven Fast Handover       May 2008      +-------------------+----------------------+------------------+      | L2 Primitive      | IEEE802.11           | IEEE802.16e      |      +-------------------+----------------------+------------------+      | L2-LinkStatus     | PMD_RSSI             | Available        |      |                   |                      |                  |      |                   | PMD_RATE             |                  |      |                   |                      |                  |      | L2-PoAList        | MLME-SCAN            | M_ScanScheduling |      |                   |                      |                  |      |                   |                      | M_Scanning       |      |                   |                      |                  |      | L2-PoAFound       | MLME-SCAN            | M_Neighbor       |      |                   |                      |                  |      |                   |                      | M_Scanning       |      |                   |                      |                  |      | L2-PoALost        | MLME-SCAN            | M_Neighbor       |      |                   |                      |                  |      |                   |                      | M_Scanning       |      |                   |                      |                  |      | L2-LinkUp         | MLME-ASSOCIATE       | M_Registration   |      |                   |                      |                  |      |                   | MLME-AUTHENTICATE    |                  |      |                   |                      |                  |      | L2-LinkDown       | MLME-DEASSOCIATE     | M_Ranging        |      |                   |                      |                  |      |                   | MLME-DISAUTHENTICATE |                  |      |                   |                      |                  |      | L2-StatusChanged  | PMD_RSSI             | M_Ranging        |      |                   |                      |                  |      |                   |                      | M_ScanReport     |      |                   |                      |                  |      |                   |                      | M_Scanning       |      |                   |                      |                  |      | L2-LinkConnect    | MLME-JOIN            | M_MACHandover    |      |                   |                      |                  |      |                   | MLME-ASSOCIATE       | M_HOIND          |      |                   |                      |                  |      |                   | MLME-REASSOCIATE     |                  |      |                   |                      |                  |      |                   | MLME-AUTHENTICATE    |                  |      |                   |                      |                  |      | L2-LinkDisconnect | MLME-DISASSOCIATE    | M_Management     |      |                   |                      |                  |      |                   | MLME-DEASSOCIATE     | (Deregistration) |      +-------------------+----------------------+------------------+      Table 1: Mapping between L2 Primitives and the Primitives in               IEEE 802.11 and IEEE 802.16eTeraoka, et al.               Experimental                     [Page 23]

RFC 5184      L2 Abstractions for L3-Driven Fast Handover       May 2008Appendix D.  Example Mapping of Primitives and IEEE 802.11   This section shows examples of the mapping between primitives and   IEEE 802.11 [7] parameters.D.1.  L2-LinkStatus   Most parameters of L2-LinkStatus are related to the configuration of   network-interface hardware.  The operating system and the   device-driver module can easily collect such information.  However,   to create the "Condition" parameter, the MN should maintain   statistics and parameters related to the current wireless   environment.   There are two sub-parameters of the "Condition" parameter: available   bandwidth and link quality level.  The available bandwidth of the   current PoA can be obtained by maintaining the transmission rate   indication and the statistics of frame transmission every time a   frame is sent.  A link quality level can be updated by maintaining   the following parameters and statistics every time a frame is   received: Received Signal Strength Indicator (RSSI), transmission/   reception rate indication, transmit/receive latency, bit-error rate,   frame-error rate, and noise level.  Link quality level is divided   into five levels: EXCELLENT, GOOD, FAIR, BAD, and NONE, in descending   order.  Some parameters can be managed by setting thresholds from   software.  When the parameters cross the threshold, an interrupt is   generated for the software.D.2.  L2-PoAList   In IEEE 802.11 networks, L2-PoAList returns the detected APs whose   quality level exceeds the specified threshold for PoA candidates (by   the "PoA List" parameter).  Therefore, an MN should always maintain   the database of available access points according to reception of   beacon frame, probe response frame, and all frames.  This AP database   is managed in consideration of time, number of frames, and signal   strength.  There are some kinds of network-interface hardware that   can notify events to operating system only when the desired event   occurs by setting a threshold from software.  Moreover, MN can   transmit the probe request frame for access point discovery, if   needed.D.3.  L2-PoAFound   In IEEE 802.11 networks, L2-PoAFound is notified when new PoAs whose   link quality level exceeds the specified threshold are detected by   listening beacons or scanning APs.  If the received frame (mainly theTeraoka, et al.               Experimental                     [Page 24]

RFC 5184      L2 Abstractions for L3-Driven Fast Handover       May 2008   beacon or the probe response) is not in the AP database described inAppendix D.2, then the link layer creates L2-PoAFound.indication.   For example, if the threshold of link quality level specified by   L2-PoAFound.request is GOOD, L2-PoAFound.indication is created and   sent to the upper layer when PoA's link quality becomes better than   GOOD.D.4.  L2-PoALost   In IEEE 802.11 networks, L2-PoALost is notified when an AP included   in the list of candidate APs is lost by listening beacons or scanning   APs.  If the entry in the AP database described inAppendix D.2   expires, or link quality level goes under the threshold, then the   link layer creates L2-PoALost.indication.  To calculate the link   quality level, the signal strength of the received frame (mainly the   beacon or the probe response) can be used.  For example, if the   threshold of the link quality specified by L2-PoALost is BAD,   L2-PoALost.indication is created and sent to the upper layer when   PoA's link quality becomes worse than BAD.D.5.  L2-LinkUp   In IEEE 802.11 networks, L2-LinkUp is notified when association or   reassociation event occurs.  When such an event occurs, MN receives   the association response frame or the reassociation response frame.   Immediately after receiving it, the link layer creates   L2-LinkUp.indication.D.6.  L2-LinkDown   In IEEE 802.11 networks, L2-LinkDown is notified when a   disassociation event occurs or when no beacon is received during a   certain time.  When such an event occurs, MN sends the disassociation   frame to AP, or the entry of the specific AP is deleted from the AP   database described inAppendix D.2.  By detecting such events, the   link layer creates an L2-LinkDown.indication.D.7.  L2-LinkStatusChanged   In IEEE 802.11 networks, L2-LinkStatusChanged is notified when the   radio signal strength of the connected AP drops below the specified   threshold.Teraoka, et al.               Experimental                     [Page 25]

RFC 5184      L2 Abstractions for L3-Driven Fast Handover       May 2008D.8.  L2-LinkConnect   In IEEE 802.11 networks, each AP is identified by the BSSID and the   service set of several APs is identified by the SSID.  When   L2-LinkConnect is used to connect a specific AP or a service set, the   link layer should set the Basic Service Set Identifier (BSSID) or the   Service Set Identifier (SSID).  Also, the channel should be set   appropriately at the same time by searching the database described inAppendix D.2.  To connect to AP, MN should be authenticated by AP.   MN sends the authentication message to AP, and then MN sends the   association message to associate with AP.D.9.  L2-LinkDisconnect   In IEEE 802.11 networks, MN sends the disassociation message to AP   for disconnection.  When L2-LinkDisconnect is used for disconnection   from the current AP, the link layer should send the disassociation   message to the appropriate AP, and stop data transmission.Appendix E.  Implementation and Evaluation of the Proposed Model   This section describes an implementation of the proposed link   indication architecture and its evaluation.   An IEEE 802.11a wireless LAN device driver was modified to provide   abstract link-layer information in the form of primitives defined inSection 4.  The modified driver has two AP lists.  One contains the   device-dependent information such as RSSI, retransmission count,   various AP parameters, and various statistics.  The device-dependent   information, except for the AP parameters, is updated whenever the   device receives a frame.  If the received frame is the management   frame, the AP parameters are also updated according to the parameters   in the frame.   Another AP list contains the abstract information.  The abstract   information is updated periodically by using the device-dependent   information.  In the abstraction processing, for example, RSSI or the   retransmission count is converted to the common indicator "link   quality".  In our outdoor testbed described below, the thresholds of   the RSSI value between the link quality levels were defined as   follows:   o  EXCELLENT -- 34 -- GOOD   o  GOOD -- 27 -- FAIR   o  FIAR -- 22 -- BADTeraoka, et al.               Experimental                     [Page 26]

RFC 5184      L2 Abstractions for L3-Driven Fast Handover       May 2008   o  BAD -- 15 -- NONE   L2-PoAList and L2-LinkStatus were implemented by using only the   abstract information.  Thus, the upper layers can use information of   the current AP and the adjacent APs without depending on the devices.   L2-PoAFound or L2-PoALost is notified if the link quality rises or   falls beyond the thresholds when the abstract information is updated.   If the link quality of the current AP goes below the specific   threshold, L2-LinkStatusChanged is notified.  L2-LinkUp or   L2-LinkDown is notified when an association with an AP is established   or destroyed.  To realize L2-LinkConnect and L2-LinkDisconnect,   functions to connect or disconnect to the specified AP were   implemented.  In these functions, since only abstract information is   needed to specify the AP, other layers need not know the   device-dependent information.   In our outdoor testbed, there are eight Access Routers (ARs) located   at 80-100m intervals.  AP is collocated at AR.  IEEE 802.11a was used   as the link layer.  The same wireless channel was used at all APs.   Thus, there are eight wireless IPv6 subnets in the testbed.  The   mobile node was in a car moving at a speed of 30-40 km/h.  When link   quality of the current AP goes down, the mobile node executes   L3-driven handover, described inAppendix A.  An application called   Digital Video Transport System (DVTS) was running on the mobile node   and sent digital video data at a data rate of about 15Mbps through   the wireless IPv6 subnet to the correspondent node, which replayed   received digital video data.  In this environment, the L2 handover   required less than 1 msec, and the mobility protocol Location   Independent Networking in IPv6 (LIN6) [13] required a few msecs for   location registration.  Thus, the total gap time due to the handover   was 3-4 msec.  In most cases, there was no effect on the replayed   pictures due to handover.Authors' Addresses   Fumio Teraoka   Faculty of Science and Technology, KEIO University   3-14-1 Hiyoshi, Kohoku-ku   Yokohama, Kanagawa  223-8522   Japan   Phone: +81-45-566-1425   EMail: tera@ics.keio.ac.jp   URI:http://www.tera.ics.keio.ac.jp/Teraoka, et al.               Experimental                     [Page 27]

RFC 5184      L2 Abstractions for L3-Driven Fast Handover       May 2008   Kazutaka Gogo   Graduate School of Science and Technology, KEIO University   3-14-1 Hiyoshi, Kohoku-ku   Yokohama, Kanagawa  223-8522   Japan   Phone: +81-45-566-1425   EMail: gogo@tera.ics.keio.ac.jp   URI:http://www.tera.ics.keio.ac.jp/   Koshiro Mitsuya   Jun Murai Lab, Shonan Fujisawa Campus, KEIO University   5322 Endo   Fujisawa, Kanagawa  252-8520   Japan   Phone: +81-466-49-1100   EMail: mitsuya@sfc.wide.ad.jp   Rie Shibui   Graduate School of Science and Technology, KEIO University   3-14-1 Hiyoshi, Kohoku-ku   Yokohama, Kanagawa  223-8522   Japan   Phone: +81-45-566-1425   EMail: shibrie@tera.ics.keio.ac.jp   URI:http://www.tera.ics.keio.ac.jp/   Koki Mitani   Graduate School of Science and Technology, KEIO University   3-14-1 Hiyoshi, Kohoku-ku   Yokohama, Kanagawa  223-8522   Japan   Phone: +81-45-566-1425   EMail: koki@tera.ics.keio.ac.jp   URI:http://www.tera.ics.keio.ac.jp/Teraoka, et al.               Experimental                     [Page 28]

RFC 5184      L2 Abstractions for L3-Driven Fast Handover       May 2008Full Copyright Statement   Copyright (C) The IETF Trust (2008).   This document is subject to the rights, licenses and restrictions   contained inBCP 78 and athttp://www.rfc-editor.org/copyright.html,   and except as set forth therein, the authors retain all their rights.   This document and the information contained herein are provided on an   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND   THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS   OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF   THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.Intellectual Property   The IETF takes no position regarding the validity or scope of any   Intellectual Property Rights or other rights that might be claimed to   pertain to the implementation or use of the technology described in   this document or the extent to which any license under such rights   might or might not be available; nor does it represent that it has   made any independent effort to identify any such rights.  Information   on the procedures with respect to rights in RFC documents can be   found inBCP 78 andBCP 79.   Copies of IPR disclosures made to the IETF Secretariat and any   assurances of licenses to be made available, or the result of an   attempt made to obtain a general license or permission for the use of   such proprietary rights by implementers or users of this   specification can be obtained from the IETF on-line IPR repository athttp://www.ietf.org/ipr.   The IETF invites any interested party to bring to its attention any   copyrights, patents or patent applications, or other proprietary   rights that may cover technology that may be required to implement   this standard.  Please address the information to the IETF at   ietf-ipr@ietf.org.Teraoka, et al.               Experimental                     [Page 29]

[8]ページ先頭

©2009-2026 Movatter.jp