Hi Anthony,
There is a little typo in page 11.
"opti-in or opt-out" ---> "opt-in or opt-out"
Shuai
======= 2012-06-15 17:05:10 您在来信中写道:=======
><co-chair mode>
>
>Thanks Anthony. The discussion around the requirements have
>stabilized quite a bit, which is good. This I-D is a good
>basis & candidate for the requirement document we have in our
>milestones.
>
>I encourage folks to start looking at gaps to existing (and
>deployed) technologies based on these requirements. We will
>spend time on those during the WG meeting anyway.
>
>- Jouni
>
>
>
>On Jun 15, 2012, at 5:14 AM, h chan wrote:
>
>> The draft has been updated with the recommended changes.
>> http://www.ietf.org/id/draft-chan-dmm-requirements-02.txt
>>
>> H Anthony Chan
>>
>> -----Original Message-----
>> From: jouni korhonen [mailto:[email protected]]
>> Sent: Monday, June 11, 2012 8:49 AM
>> To: h chan
>> Cc: [email protected]
>> Subject: Re: [DMM] draft requirement discussions
>>
>>
>> Anthony,
>>
>> Thanks for the update. While the requirements start shaping up
>> nicely I have few documentation related issues. First, Section 1
>> does not need to repeat DMM WG charter and milestones. Second,
>> Section 4 does not belong to this requirement document. The draft
>> already has rather lengthy intro, which is more than enough as a
>> background information.
>>
>> - Jouni
>>
>> On Jun 8, 2012, at 8:59 AM, h chan wrote:
>>
>>> A draft of the requirement capturing all the requirements so far together
>>> with the problem statements has been uploaded:
>>>
>>> http://www.ietf.org/id/draft-chan-dmm-requirements-01.txt
>>>
>>> The following is an explanation of how it is structured.
>>>
>>> Out of the large number of problem statements, Session 4 on problem
>>> statement listed 5 of them as relevant problems.
>>>
>>> In Session 5 on requirements, the first 2 requirements address all the
>>> relevant problems. They distinguish dmm from the existing centralized
>>> deployments. So I think they are the key requirements. They both use "SHALL"
>>>
>>> The remaining requirements are not owing to problem statements with
>>> existing centralized deployments. So I suggest to use the "SHALL" very
>>> sparingly. Else we may not be able to call even some existing mobility
>>> protocols a mobility management solution lest they meet all the "SHALL"
>>> requirements.
>>>
>>> H Anthony Chan
>>>
>>>
>>> -----Original Message-----
>>> From: [email protected] [mailto:[email protected]] On Behalf Of
>>> Charles E. Perkins
>>> Sent: Thursday, June 07, 2012 4:52 PM
>>> To: Peter McCann
>>> Cc: [email protected]; Behcet Sarikaya
>>> Subject: Re: [DMM] draft requirement discussions
>>>
>>>
>>> Hello Pete,
>>>
>>> Yes, I am fine with that revision and the new proposed text.
>>>
>>> I was more worried about the seeming suggestion that the DMM
>>> requirement was to interwork with any arbitrary security
>>> mechanism. But, as I mentioned, I think we are pretty close.
>>>
>>> Regards,
>>> Charlie P.
>>>
>>>
>>> On 6/7/2012 1:53 PM, Peter McCann wrote:
>>>> I thought the new text from Anthony was an attempt to answer your
>>>> comment, Charles. For instance, he removed the text that said,
>>>> "should not be considered the default." Are you ok with his new
>>>> proposed text? If not, can you propose text that you would like?
>>>>
>>>> -Pete
>>>>
>>>> Charles E. Perkins wrote:
>>>>> Hello folks,
>>>>>
>>>>> It seems to me that we may be perhaps arriving at a good point for a
>>>>> new draft.
>>>>> However, there are still some points of discussion that are perhaps
>>>>> worthy to be resolved (for example, in my email earlier this week).
>>>>>
>>>>> Maybe we should fire up the issue tracker...?
>>>>>
>>>>> Regards,
>>>>> Charlie P.
>>>>>
>>>>>
>>>>> On 6/7/2012 12:04 PM, Behcet Sarikaya wrote:
>>>>>
>>>>> Hi Jouni,
>>>>>
>>>>> What are the plans on DMM requirements? I see lots of mails and never
>>>>> ending discussions.
>>>>>
>>>>> Isn't it the time to get the draft out, thank Anthony for his hard
>>>>> work and move on?
>>>>>
>>>>> Regards,
>>>>>
>>>>> Behcet
>>>>>
>>>>>
>>>>> On Wed, Jun 6, 2012 at 11:32 AM, h chan <[email protected]>
>>>>> wrote:
>>>>>
>>>>>
>>>>> Yes, the second and third sentences are not additional
>>>>> requirements,
>>>>> but rather explanations of the requirement in the first sentence. Does
>>>>> the rewrite sound better now:
>>>>>
>>>>>
>>>>>
>>>>> REQ-2: Transparency to Upper Layers
>>>>>
>>>>> The DMM solutions SHALL provide transparency above the IP layer
>>>>> when
>>>>> needed. Such transparency is needed, when the mobile hosts or entire
>>>>> mobile networks change their point of attachment to the Internet, for
>>>>> the application flows that cannot cope with a change of IP address.
>>>>> Otherwise the support to maintain a stable home IP address or prefix
>>>>> during handover may be declined.
>>>>>
>>>>>
>>>>>
>>>>> H Anthony Chan
>>>>>
>>>>>
>>>>>
>>>>> From: [email protected] [mailto:[email protected]]
>>>>> Sent: Wednesday, June 06, 2012 12:56 AM
>>>>> To: h chan
>>>>> Cc: [email protected]; [email protected]; jouni korhonen; Peter
>>>>> McCann
>>>>> Subject: 答复: Re: [DMM] draft requirement REQ-2:
>>>>> Transparency to Upper Layers
>>>>>
>>>>>
>>>>>
>>>>>
>>>>> Hi Anthony:
>>>>>
>>>>> The last part of the sentence (i.e. but the need to maintain a
>>>>> stable home IP address or prefix SHOULD NOT be taken as
>>>>> default.) seems a littel strange to me. REQ-2 just describes under
>>>>> what circumstances the transparency is needed (i.e. when the mobile
>>>>> hosts or entire mobile networks change their point of attachment to
>>>>> the Internet, for the application flows that cannot cope with a change
>>>>> of IP address), that means automatically, otherwise the transparency
>>>>> is not needed. So why bother to write the last part of the sentence?
>>>>>
>>>>> Besides, when mobile node attaches to its home network, it will
>>>>> obviously get a home IP address/prefix from its home network. The IP
>>>>> address/prefix can be considered as stable IP, as long as the mobile
>>>>> does not change its point of attachment. The last part of the sentence
>>>>> will just exclude this scenario.
>>>>>
>>>>> If I make any mistake, please correct me.
>>>>>
>>>>> Thanks
>>>>> Luowen
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>
>>>>> h chan <[email protected]>
>>>>> 发 件人: [email protected]
>>>>>
>>>>> 2012/06/06 01:12
>>>>>
>>>>> 收件人
>>>>>
>>>>> "[email protected]" <[email protected]>, Peter McCann <[email protected]>,
>>>>> jouni korhonen <[email protected]>
>>>>>
>>>>> 抄送
>>>>>
>>>>>
>>>>>
>>>>> 主题
>>>>>
>>>>> Re: [DMM] draft requirement REQ-2: Transparency to Upper Layers
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>
>>>>> Revise as follows:
>>>>>
>>>>> REQ-2: Transparency to Upper Layers
>>>>> The DMM solutions SHALL provide transparency above the IP layer
>>>>> when
>>>>> needed. Such transparency is needed, when the mobile hosts or entire
>>>>> mobile networks change their point of attachment to the Internet, for
>>>>> the application flows that cannot cope with a change of IP address,
>>>>> but the need to maintain a stable home IP address or prefix SHOULD NOT
>>>>> be taken as default.
>>>>> REQ-2M (Motivation for REQ-2)
>>>>> The goal of this requirement is to enable more efficient use of
>>>>> network resources and more efficient routing by not maintaining a
>>>>> stable IP home IP address when there is no such need.
>>>>>
>>>>> H Anthony Chan
>>>>>
>>>>>
>>>>> -----Original Message----- From:
>>>>> [email protected]
>>>>> [mailto:[email protected]] On Behalf Of h chan Sent:
>>>>> Wednesday, May
>>>>> 23, 2012 7:51 PM To: Peter McCann; jouni korhonen
>>>>> Cc: [email protected]
>>>>> Subject: Re: [DMM] draft requirement REQ-2: Transparency to
>>>>> Upper
>>>>> Layers
>>>>>
>>>>> An attempt to clean up the text so far:
>>>>>
>>>>> REQ-2: Transparency to Upper Layers
>>>>> The DMM solutions SHALL provide transparency above the IP layer
>>>>> when
>>>>> needed. Such transparency is needed, when the mobile hosts or entire
>>>>> mobile networks change their point of attachment to the Internet, for
>>>>> the application flows that cannot cope with a change of IP address,
>>>>> but SHOULD NOT be taken as the default behavior.
>>>>>
>>>>> REQ-2M (Motivation for REQ-2)
>>>>> The goal of this requirement is to enable more efficient use of
>>>>> network resources and more efficient routing when mobility support is
>>>>> implemented by not invoking it for the application flows and nodes
>>>>> that do not need it.
>>>>>
>>>>> RELEVANT problem: PS5: Wasting resources to
>>>>> support mobile nodes not
>>>>> needing mobility support IP mobility support is not always
>>>>> required.
>>>>> For example, some applications do not need a stable IP address during
>>>>> handover, i.e. IP session continuity. Sometimes, the entire
>>>>> application session runs while the terminal does not change the point of
>>>>> attachment.
>>>>> In these situations that do not require IP mobility support, network
>>>>> resources are wasted when including additional info to the mobility
>>>>> context to support the change the point of attachment. Network
>>>>> resources are also wasted when the via routes are set up for many MNs
>>>>> that do not
>>>>> require IP mobility support. OTHER related problem
>>>>> O-PS1: Mobility
>>>>> signaling overhead with peer-to-peer communication While
>>>>> mobility
>>>>> management enables a mobile host to be reachable, the hosts may then
>>>>> communicate directly so that the mobility support is no longer needed.
>>>>> Taking the need of mobility support as the default behavior will waste
>>>>> network resources. O-PS2: Lack of user-centricity
>>>>> Centralized
>>>>> deployment compared with distributed mobility management may be less
>>>>> capable to support user-centricity. Example in the lack of
>>>>> user-centricity is to provide mobility support to all mobile nodes by
>>>>> default regardless of whether the user needs it or not.
>>>>>
>>>>> H Anthony Chan
>>>>>
>>>>> -----Original Message----- From: Peter McCann
>>>>> Sent: Friday, May
>>>>> 18, 2012 9:35 AM To: jouni korhonen; h chan Cc:
>>>>> [email protected]
>>>>> Subject: RE: [DMM] draft requirement REQ-2: Transparency to
>>>>> Upper
>>>>> Layers
>>>>>
>>>>> Hi, Jouni,
>>>>>
>>>>> jouni korhonen wrote: > > Few
>>>>> comments/questions here: > > On
>>>>> May 7, 2012, at 8:58 PM, h chan wrote: > >>
>>>>> REQ-2: Transparency to
>>>>> Upper Layers >> The DMM solutions SHALL enable transparency
>>>>> above the
>>>>> IP layer. Such >> transparency is needed for the application
>>>>> flows
>>>>> that cannot cope with >> a change of IP address and when
>>>>> mobile hosts
>>>>> or entire mobile networks >> change their point of
>>>>> attachment to the
>>>>> Internet, but SHOULD NOT be >> taken as the default
>>>>> behavior. > >
>>>>> "SHALL enable" but "SHOULD NOT be taken as the default behavior" seem
>>>>> > to conflict. So, what is really meant here? Does this mean
>>>>> something
>>>>> > like "MUST implement, SHOULD use" type of solution? Or can
>>>>> one leave
>>>>> > transparency completely away if the applications/hosts just
>>>>> don't
>>>>> care > whether IP changes or not?
>>>>>
>>>>> I think the latter. If the applications don't care about
>>>>> transparency, then we don't need to pay for it with state and
>>>>> signaling in the network.
>>>>>
>>>>> However, we know that some applications do care, so it SHALL be
>>>>> possible to provide it.
>>>>>
>>>>> >> REQ-2M (Motivation for REQ-2) >> The goal of
>>>>> this requirement is
>>>>> to >> enable more efficient use of network resources and
>>>>> more
>>>>> efficient >> routing by not invoking mobility support
>>>>> when there is no
>>>>> such need. > > Does this still mean the
>>>>> mobility support must be
>>>>> implement even if it > is not used?
>>>>>
>>>>> We need some strategy for keeping an IP address through some
>>>>> amount of
>>>>> mobility. However, we needn't optimize the network for this
>>>>> case as
>>>>> it might be rather uncommon to keep an address for a very
>>>>> long period
>>>>> of time.
>>>>>
>>>>> >> RELEVANT problem: >> PS5: Wasting resources to
>>>>> support mobile
>>>>> nodes not needing mobility >> support IP mobility support
>>>>> is not
>>>>> always required. For example, >> some >>
>>>>> applications do not need a
>>>>> stable IP address during handover, i.e. IP >> session
>>>>> continuity.
>>>>> Sometimes, the entire application session runs >> while the
>>>>> terminal
>>>>> does not change the point of attachment. In these >>
>>>>> situations that
>>>>> do not require IP mobility support, network resources >> are
>>>>> wasted
>>>>> when mobility context is set up. Network resources are also
>>>>> >> wasted
>>>>> when the via routes are set up for many MNs that do not require
>>>>> >> IP
>>>>> mobility support. >> >> OTHER related
>>>>> problem >> O-PS1: Mobility
>>>>> signaling overhead with peer-to-peer communication >>
>>>>> While mobility
>>>>> management enables a mobile host to be reachable, the >>
>>>>> hosts may
>>>>> then communicate directly so that the mobility support is no
>>>>> >> longer
>>>>> needed. Taking the need of mobility support as the default
>>>>> >> behavior
>>>>> will waste network resources. >> O-PS2: Lack of
>>>>> user-centricity >>
>>>>> Centralized deployment compared with distributed mobility management
>>>>> >> may be less capable to support user-centricity. Example in
>>>>> the lack
>>>>> of >> user-centricity is to provide mobility support to
>>>>> all mobile
>>>>> nodes by >> default regardless of whether the user needs it or
>>>>> not.
>>>>> > > I have issues to parse O-PS2.. the motivation
>>>>> makes sense though
>>>>> but > the title "lack of user-centricity" is somewhat
>>>>> confusing.. what
>>>>> does > forced/always-on mobility support has to do with user
>>>>> centricity?
>>>>>
>>>>> I think Anthony just meant that we should tailor the mobility
>>>>> management to the needs of the user. I wouldn't mind
>>>>> seeing this
>>>>> explanatory text re-worded.
>>>>>
>>>>> -Pete
>>>>>
>>>>> > > - Jouni > >
>>>>> >> >> (The above has been drafted with
>>>>> contributions, inputs and discussions >> from various people.
>>>>> Additional contributions and comments are most >> welcome.)
>>>>> >> >>
>>>>> H Anthony Chan >> >> >>
>>>>> _______________________________________________ >> dmm mailing
>>>>> list
>>>>> >> [email protected] >>
>>>>> https://www.ietf.org/mailman/listinfo/dmm > >
>>>>> _______________________________________________ > dmm mailing
>>>>> list >
>>>>> [email protected] > https://www.ietf.org/mailman/listinfo/dmm
>>>>>
>>>>>
>>>>>
>>>>> _______________________________________________
>>>>> dmm mailing list
>>>>> [email protected]
>>>>> https://www.ietf.org/mailman/listinfo/dmm
>>>>> _______________________________________________
>>>>> dmm mailing list
>>>>> [email protected]
>>>>> https://www.ietf.org/mailman/listinfo/dmm
>>>>>
>>>>>
>>>>>
>>>>>
>>>>> _______________________________________________
>>>>> dmm mailing list
>>>>> [email protected]
>>>>> https://www.ietf.org/mailman/listinfo/dmm
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>
>>>>> _______________________________________________
>>>>> dmm mailing list
>>>>> [email protected]
>>>>> https://www.ietf.org/mailman/listinfo/dmm
>>>>>
>>>>>
>>>>>
>>>>
>>>>
>>>
>>>
>>> --
>>> Regards,
>>> Charlie P.
>>>
>>> _______________________________________________
>>> dmm mailing list
>>> [email protected]
>>> https://www.ietf.org/mailman/listinfo/dmm
>>> _______________________________________________
>>> dmm mailing list
>>> [email protected]
>>> https://www.ietf.org/mailman/listinfo/dmm
>>
>
>_______________________________________________
>dmm mailing list
>[email protected]
>https://www.ietf.org/mailman/listinfo/dmm
= = = = = = = = = = = = = = = = = = = =
致
礼!
Shuai Gao
National Engineering Lab for Next Generation Internet Interconnection Devices
Beijing Jiaotong University
Beijing, China, 100044
[email protected]
2012-07-02
_______________________________________________
dmm mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dmm