August 2, 2005 IETF 63 – Paris, France Media Independent Handover Services and Interoperability Ajay Rajkumar Chair, IEEE 802.21 WG.

Slides:



Advertisements
Similar presentations
1 IEEE MEDIA INDEPENDENT HANDOVER DCN: sec Title: Security Group TR Date Submitted: 20 th January, 2009 Presented at IEEE
Advertisements

Adapted Multimedia Internet KEYing (AMIKEY): An extension of Multimedia Internet KEYing (MIKEY) Methods for Generic LLN Environments draft-alexander-roll-mikey-lln-key-mgmt-01.txt.
Doc.: Handoff_WNG_Presentation r3 Submission July David Johnston, IntelSlide Handoff Presentation to WNG David Johnston.
Doc.: 802_Handoff_EC_Opening_Plenary_Report r2 Submission November David Johnston, IntelSlide Handoff ECSG EC Opening Plenary Report David.
Omniran GPP Trusted WLAN Access to EPC Use Case Analysis Date: Authors: NameAffiliationPhone Max RiegelNSN
xxx IEEE MEDIA INDEPENDENT HANDOVER DCN: LB1c-handover-issues.ppt Title: MIH Security – What is it? Date Submitted:
xxx IEEE MEDIA INDEPENDENT HANDOVER DCN: LB1c-handover-issues.ppt Title: MIH Security – What is it? Date Submitted:
1 IEEE : Media Independent Handover: Features, Applicability, and Realization 蔡喬偉 Kenichi Taniuchi, Toshiba Corporation Yoshihiro Ohba and Victor.
Light Weight Access Point Protocol (LWAPP) IETF 57 Pat Calhoun, Airespace.
1 Multi Protocol Label Switching Presented by: Petros Ioannou Dept. of Electrical and Computer Engineering, UCY.
21-07-xxxx IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: MIH Protocol Security Date Submitted: December, 2007 Presented.
I-D: draft-rahman-mipshop-mih-transport-01.txt Transport of Media Independent Handover Messages Over IP 67 th IETF Annual Meeting MIPSHOP Working Group.
M3UA Patrick Sharp.
Doc.: _IETF_DNA_r1 Submission March David Johnston, IntelSlide L2 Services for Handover Optimization David Johnston
21-06-xxxx IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: The amendment for the MIH_Scan primitive Date Submitted: April,
Wireless Access and Terminal Mobility in CORBA Dimple Kaul, Arundhati Kogekar, Stoyan Paunov.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
DCN: March 7, 2005 IETF 62 - Minneapolis, MN Media Independent Handover Services and Interoperability Ajay Rajkumar Chair, IEEE
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: MIIS and Its Higher Layer Transport Requirements: Ad hoc Update and Discussion on.
August 1, 2005IETF63 PANA WG Pre-authentication Support for PANA (draft-ohba-pana-preauth-00.txt) Yoshihiro Ohba
Doc.: 802_Handoff_Linksec_Presentation Submission May David Johnston, IntelSlide Handoff LinkSec Handoff Issues? David Johnston
IEEE MEDIA INDEPENDENT HANDOVER DCN: srho c-requirements-and-procedures Title: c Requirements and Procedures Date Submitted:
xx-001 IEEE MEDIA INDEPENDENT HANDOVER Title: Potential Media Independent Services Date Submitted: Presented at IEEE 802 plenary Authors.
Engineering Workshops Purposes of Neighbor Solicitation.
4.1.4 multi-homing.
1 NetLMM Vidya Narayanan Jonne Soininen
Some use cases and requirements for handover Information Services Greg Daley MIPSHOP Session IETF 64.
MIPSHOP – November, 2005 Event Services and Command Services for Media Independent Handover Presentation prepared by: Srini Sreemanthula Presented by:
Requirements For Handover Information Services MIPSHOP – IETF #65 Srinivas Sreemanthula (Ed.)
ABSTRACT: This contribution introduces the inter-RAT fast handover solution. TITLE: Inter-Radio Access Technology Fast Handover TSG-A WG4 RECOMMENDATION:
Doc.: IEEE /0310r0 Submission Sept 2007 Srinivas Sreemanthula Slide 1 IEEE MEDIA INDEPENDENT HANDOVER DCN: MIH-Security-Options.ppt.
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: IE prioritization for query response size limit support Date Submitted:
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: MIH Capability Discovery Amendment Date Submitted: April 20, 2006.
Washinton D.C., November 2004 IETF 61 st – mip6 WG MIPv6 authorization and configuration based on EAP (draft-giaretta-mip6-authorization-eap-02) Gerardo.
M2M Service Layer – DM Server Security Group Name: OMA-BBF-oneM2M Adhoc Source: Timothy Carey, Meeting Date:
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
1 IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: EAP Pre-authentication Problem Statement in IETF HOKEY WG Date Submitted: September,
DHCPv4 option for PANA Authentication Agents draft-suraj-dhcpv4-paa-option-00.txt DHC/PANA WG IETF-63 France, Paris.
IEEE Wireless LAN Standard
21-07-xxxx IEEE MEDIA INDEPENDENT HANDOVER DCN: xxxx Title: MIH security issues Date Submitted: July, 02, 2007 Presented at.
Problem Statement: Media Independent Handover Signalling draft-hepworth-mipshop-mih-problem-statement-01 Ele Hepworth (*), Greg Daley, Srinivas Sreemanthula,
DOTS Requirements Andrew Mortensen November 2015 IETF 94 1.
Transport of Media Independent HO Messages over IP
4.1.5 multi-homing.
IEEE MEDIA INDEPENDENT HANDOVER DCN: xxxx
HTTP Enabled Location Delivery (HELD)
Proposal for IEEE solution
Media Independent Handover Services and Interoperability
Maryna Komarova (ENST)
IEEE MEDIA INDEPENDENT HANDOVER
IEEE MEDIA INDEPENDENT HANDOVER
IEEE MEDIA INDEPENDENT HANDOVER
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER DCN: bcst
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER DCN:
PMIP6 extensions for inter-access handovers and flow mobility
IEEE MEDIA INDEPENDENT HANDOVER
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec
Motivation L3 enable both scenarios under
Media Independent Coexistence
Media Independent Coexistence
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec
IEEE MEDIA INDEPENDENT HANDOVER
Presentation transcript:

August 2, 2005 IETF 63 – Paris, France Media Independent Handover Services and Interoperability Ajay Rajkumar Chair, IEEE WG

August 2, 2005 IETF 63 – Paris, France Scenarios considered by WG Between 802.xx and 802.yy Between 802.xx and Cellular 3GPP standards 3GPP2 standards Between ESS

August 2, 2005 IETF 63 – Paris, France What does Heterogeneous Handover Mean? Session Continuity at the IP layer Adaptation to new link at layer two Address continuity at layer three Service Continuity at the Application layer(s)

August 2, 2005 IETF 63 – Paris, France Reference Model

August 2, 2005 IETF 63 – Paris, France Information Service Link access parameters Security mechanisms Neighbor maps Location Provider and other Access information Cost of link Etc.

August 2, 2005 IETF 63 – Paris, France IS Requirements Two types of requirements: Transport requirements Architectural/protocol requirements Terminology: Network MIHF Instance (NMI) Resides in MIH-enabled network element Network element must be Layer-4 capable Mobile MIHF Instance (MMI) Resides in Mobile Node Protocol vs. interfaces: two interfaces considered (separately) to identify requirements MMI  NMI is here referred to as “access” MIIS I/F NMI  NMI is here referred to as “network” MIIS I/F

August 2, 2005 IETF 63 – Paris, France Transport Requirements for MIIS “access” MIIS I/F: Reliability: “network” MIIS I/F Reliability:

August 2, 2005 IETF 63 – Paris, France Architectural/Protocol Requirements for MIIS (1) Generic requirement for “access” and “network” interface: Protocol messages carry Information Elements specified in Protocol defines message format and message payload Protocol exchanges are query-based (request/response); scenarios where “delayed” response is provided asynchronously based on an MMI/NMI request are also considered Protocol should be independent of any specific mobility protocol

August 2, 2005 IETF 63 – Paris, France Architectural/Protocol Requirements for MIIS (2) “access” MIIS I/F: Discovery capability: The MMI must be able to discover presence of NMI for accessing IS service (discovered NMI could be the actual IS server) in either the serving network or candidate network The MMI must be able to discover address of NMI for accessing to IS service in either the serving network or candidate network to exchange L3 or above traffic It should be possible to drive discovery of NMI for accessing to IS service though information provided by MMI (e.g. MMI indicates that NMI for or is needed, if there is one) Security: As part of discovery, the MMI must be able to discover whether a security association can/shall be established with the NMI in either the serving network or candidate network, and if yes which credentials can be used to authenticate with NMI Protocol allows for authentication of NMI by MMI Protocol enables mutual authentication between MMI and NMI Payload encryption is optional. On/off decision can be made during discovery phase (e.g. mandated by MMI or NMI policies) Integrity protection is supported and required for IS Replay detection is optional for MIIS

August 2, 2005 IETF 63 – Paris, France Architectural/Protocol Requirements for MIIS (3) “network” MIIS I/F Security: Protocol enables mutual authentication between NMIs Payload encryption is optional. On/off decision can be made e.g. based on NMI policies Integrity protection is supported and required for IS Replay detection is optional