throbber

`
`Exhibit 1017Exhibit 1017
`
`
`
`ZTE Corporation and ZTE (USA) Inc.ZTE Corporation and ZTE (USA) Inc.
`
`

`

`ing Group
`Ne:wor Wor
`Request for Comments: 2002
`Category: Standards Track
`
`Status of
`
`ihis Memo
`
`IP Mobility Support
`
`This document specifies an Internet standards track protocol for the
`Interne: community, and requests discussion and suggestions for
`improvements.
`Please refer to the current edijion of the "Internet
`Official Protocol Standards" (STD l)
`for the siandardization state
`
`and sta:us of this protocol. Distribution of :his memo is unlimited.
`
`Abstract
`
`This document specifies protocol enhancements that allow transparent
`routing of IP datagrams to mobi_e nodes in the Lnternet.
`Each mobile
`node is always identified by its home address,
`regard_ess of its
`current point of attachment
`to the Lnternet. While situated away
`from its home,
`a mobile node is also associated with a care—of
`
`address, which provides information about its current point of
`attachment
`to the Internet.
`The pro:oco_ provides for registering
`the care—of address with a home agen:.
`The home agent sends
`datagrams destined for the mobile node through a tunnel
`to the care-
`of address. After arriving at
`the end of the tunnel, each datagram
`Ls
`then delivered to the mobile node.
`
`_e of Contents
`
`>—4 t oduction
`
`Protocol Requirements
`Goa_s
`
`Assumptions
`App"cability
`New Architectural Entities
`
`Term no ogy
`Protoco_ Overview
`
`.
`
`[\Ji—‘COO‘vU‘|>J>»J>»J>L,«J(.«.)
`
`P—‘l—‘>—‘
`
`11
`
`O\»J>»J>
`
`CO
`C
`
`KOKO
`I—‘l—‘
`l\.) G
`
`ZTE Corporation and ZTE (USA) Inc.
`
`Exhibit 1017-00001
`
`r l 2 3 4
`
`.
`5.
`
`6 7 8 9
`
`is[\)LQ>—‘>—‘I—‘I—‘>—‘>—‘}—‘I—‘I—‘5
`
`l\)
`
`Specification Language
`Message Format and Protocol Extensibili
`e t
`Discovery
`»—| Agent Advertisement
`.
`.
`.
`.
`.
`.
`.
`.
`2.l.l. Mobility Agent Adver:isement
`2.l.2. Prefix—Lengths Extension
`2.l.3. One-byte Padding Extension
`Agent Solicitation
`2.3. Foreign Agent and Home Agent Considerations
`2.3.l. Advertised Router Addresses
`
`

`

`Perkins
`
`RFC 2002
`
`Standards Track
`
`[Page 1]
`
`IP Mobility Support
`
`October 1996
`
`2.3.2. Sequence Numbers and Rollover Handling
`2.4. Mobile Node Considerations
`
`Registration Required
`ove Detection
`
`Returning Home
`Sequence Numbers and Rollover Handling
`
`3. Registra"
`3.1. Registra:ion Overview
`Authentication
`
`Registration Request
`Registration Reply
`Registration Extensions
`0
`3.r.1. Computing Authentication Rxtension Values
`. Mobile—Home Authentication Extension
`
`. Mobile—Poreign Authentication Extension
`. Foreign—Home Authentication Extension
`Node Considerations
`
`2 3 4 e 1 2 3 9 1 2
`
`LULULAJ
`
`Z o CT
`
`'l
`
`“'1LAJLOOLUUJLAJ ti\l\1(DO“.O‘\OWl—‘U'|U'|L)7
`
`Sending Registration Requests
`Receiving Registration Replies
`Registration Retransmission
`i n Agent Considerations
`Configuration and Registration Tables
`Receiving Registration Requests
`3.7.3. Receiving Registration Replies
`Home Agent Considerations
`3.8.1. Contiguration and Registration Tables
`3.8.2. Receiving Registration Requests
`3.8.3. Sending Registration Replies
`4. Routing Considerations
`4.1. Encapsulation Types
`4.2. Jnicast Datagram Routing
`4.2.1.
`obile Node Considerations
`
`4.2.2. Foreign Agent Considerations
`4.2.3.
`{ome Agent Considerations
`Broadcast Datagrams
`ulticast Datagram Routing
`obile Routers
`.
`.
`.
`.
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`ARP, Proxy ARP, and Gratuitous ARP
`rity Considerations
`Wessage Authentication Codes
`Areas of Security Concern in this Protocol
`<ey Management
`?icking Good Random Numbers
`?rivacy
`Replay Protection for Registration Requests
`5.6.1. Replay Protection using Timestamps
`5.6.2. Replay Protection using Nonces
`6. Acknowledgments
`
`(_;‘\U‘IU'I(D»J>»J>»J>»J>
`
`U'|L)7(_J“
`
`o\Ln»J>LuM>—\CowU‘Iu>oo
`
`ZTE Corporation and ZTE (USA) Inc.
`
`Exhibit 1017-00002
`
`

`

`Perkins
`
`RFC 2002
`
`Standards Track
`
`[Page 2]
`
`IP Mobility Support
`
`October 1996
`
`Patent Issues
`
`A.1.
`A.2.
`
`"RM Pat nt
`IBM Patcnt
`
`5,159,592
`5,148,479
`
`Link—Layer Considerations
`TCP Considerations
`C.1. TCP Timers
`
`C.2. TCP Congestion Management
`Example Scenarios
`D.1. Registering with a Foreign Agent Care-of Address
`D.2. Registering with a Co—socated Care—of Address
`D.3. Deregistration
`.
`3. Applicability of Prefix Lengths Extension
`Editor's Address
`
`1. Introduction
`
`IP version 4 assumes that a node's IP address uniquely identifies the
`node's point of attachment
`to the Internet. Therefore,
`a node must
`be located on the network indicated by its IP address in order to
`receive datagrams destined to it; otherwise, datagrams destined to
`the node wouid be undeliverable.
`For a node to change its point of
`attachment without
`losing its ability to communicate, currently one
`of the two following mechanisms must typically be employed:
`
`a)
`
`b)
`
`the node must change its IP address whenever it changes its
`point of attachment, or
`
`1OSt—Sp€Clf1C routes must be propagated throughout much of
`the Internet routing fabric.
`
`The first makes
`Both of these alternatives are often unacceptable.
`it impossible for a node to maintain transport and higher—layer
`connections when the node changes location.
`The second has obvious
`and severe scaling problems, especially relevant considering the
`exp_osive growth in sales of notebook (mobile) computers.
`
`7‘
`A new, scalable, mechanism is required for accommodating node
`mobility within the Internet. This document defines such a
`mechanism, which enables nodes to change their point of attachment
`the Internet without changing their LP address.
`
`to
`
`1.1. Protocol Requirements
`
`A mobile node must be able to communicate with other nodes after
`
`changing its iink-layer point of attachment to the Internet, yet
`without changing its IP address.
`
`Perkins
`
`Standards Track
`
`

`

`RFC 2002
`
`TP Mobility Support
`
`.tober 1996
`
`A mobile node must be ab_e to communicate with other nodes that do
`
`No protocol enhancements are
`implement these mobiiity functions.
`not
`required in hosts or routers that are not acting as any of the new
`architectural entities introduced in Section l.5.
`
`All messages used to update another node as to the location of a
`mobiie node must be authenticated in order to protect against remote
`redirection attacks.
`
`l.2. Goals
`
`The link by which a mobile node is directly attached to the Internet
`may often be a wireless link. This link may thus have a
`substantially lower bandwidth and higher error rate than traditional
`wired networks. Moreover, mobile nodes are likely to be battery
`powered, and minimizing power consumption is important. Therefore,
`the number of administrativ m ssag s s nt ov r th
`‘ink by which a
`mobiie node is directly attached to the Internet should be minimized,
`and the size of these messages should be kept as sma" as is
`reasonably possible.
`
`1.3. Assumptions
`
`The protocols defined in this document place no additional
`constraints on the assignment of IP addresses.
`That is,
`a mobile
`node can be assigned an IP address by the organization that owns the
`machine.
`
`This protocol assumes that mobile nodes will generally not change
`their point of attachment
`to th
`Int rn t mor
`fr gu ntly than once
`per second.
`
`IP unicast datagrams are routed based on
`This protocol assumes that
`the destination address in the datagram header
`(and not,
`for example,
`by source address).
`
`1.4. Applicability
`
`Mobile T? is int nd d to nabl
`
`nod s
`
`to move from one TP subnet
`
`to
`
`It is just as suitab_e for mobility across homogeneous
`another.
`media as it is for mobility across heterogeneous media. That is,
`Mobile T? fac"itates node movement
`from one Ethernet segment to
`another as well as it accommodates node movement
`from an Ethernet
`
`to a wireless LAN, as _ong as the mobile node's I? address
`segment
`remains the same after such a movement.
`
`One can think of Mobile IP as solving the "macro" mobility managemen
`problem.
`It is less well suited for more "micro" mobility managemen
`
`Standards Track
`
`ZTE Corporation and ZTE (USA) Inc.
`
`Exhibit 1017-00004
`
`

`

`IP Mobility Support
`
`October 1996
`
`applications —— for example, handoff amongst wireless transceivers,
`each of which covers oniy a very small geographic area. As
`long as
`node movement does not occur between points of attachment on
`different IP subnets,
`link-layer mechanisms for mobility (i.e.,
`link-layer handoff) may offer faster convergence and far less
`overhead than Mobile IP.
`
`1.5. New Architectural Entities
`
`Mobile TP introduces the following new functional entities:
`
`Mobile Node
`
`from one
`A host or router that changes its point of attachment
`network or subnetwork to another.
`A mobile node may change its
`location without changing its IP address; it may continue to
`communicate with other Internet nodes at any location using its
`(constant) TP address, assuming link—layer connectivity to a
`point of attachment is available.
`
`Home Agent
`
`A router on a mobile node's home network which tunnels
`
`datagrams for delivery to the mobile node when it is away from
`home, and maintains current location information for the mobile
`node.
`
`Foreign Agent
`
`A router on a mobile node's visited network which provides
`routing services to the mobil
`nod whil
`r gist r d.
`The
`foreign agent detunnels and delivers datagrams to the mobile
`node that were tunneled by the mobile node's home agent.
`For
`datagrams sent by a mobile node,
`the foreign agent may serve as
`a default router for registered mobile nodes.
`
`A mobile node is given a long—term IP address on a home network.
`This home address is administered in the same way as a "permanent" IP
`address is provided to a stationary host. When away from its home
`networ<,
`a "care-of address“ is associated with the mobile node and
`
`The mobile
`reflects the mobile node's current point of attachment.
`IP datagrams
`node uses its home address as the source address of a_l
`that it sends, except wh r
`oth rwis
`d scrib d in this document for
`datagrams sent for certain mobility management functions (e.g., as in
`Section 3.6.l.l].
`
`Perkins
`
`RFC 2002
`
`Standards Track
`
`[Page 5]
`
`IP Mobility Support
`
`October 1996
`
`ZTE Corporation and ZTE (USA) Inc.
`
`Exhibit 1017-00005
`
`

`

`.o. Termino ogy
`
`This document frequently uses the following terms:
`
`Agent Advertisement
`An advertisement message constructed by attaching a
`special Extension to a router advertisement
`[4] message.
`
`Care—of Address
`
`toward a mobile node,
`The termination point of a tunnel
`for datagrams forwarded to the mobile node while it is
`away from home.
`The protocol can use two different types
`of care—of address:
`a "foreign agent care—of address" is
`an address of a foreign agent with which the mobile node
`is registered, and a "co-located care-of address" is an
`externally obtained local address which the mobile node
`has associated with one of its own network interfaces.
`
`Correspondent Node
`A
`A peer with which a mobile node is communicating.
`correspondent node may be either mobile or stationary.
`
`Foreign Network
`Any network other than the mobile node's Home Network.
`
`Home Address
`
`An IP address that is assigned for an extended period of
`time to a mobile node.
`Lt remains unchanged regardless
`of where the node is attached to the internet.
`
`Home Network
`
`A network, possibly virtual, having a networ< prefix
`matching that of a mobile node's home address. Note that
`standard TP routing mecqanisms will deliver datagrams
`destined to a mobile node's Home Address to the mobile
`node's Home Network.
`
`A facility or medium over which nodes can communicate at
`the link layer.
`A link underlies the network layer.
`
`Link—Layer Address
`The address used to identify an endpoint of some
`the
`communication over a physical link. Typically,
`Link—Layer address is an interface‘s Media Access Control
`(MAC) address.
`
`Mobility Agent
`Either a home agent or a foreign agent.
`
`Perkins
`
`RFC 2002
`
`Standards Track
`
`[Page 6]
`
`IF Mobility Support
`
`October l996
`
`ZTE Corporation and ZTE (USA) Inc.
`
`Exhibit 1017-00006
`
`

`

`Mobility Rinding
`The association of a home address wit? a care-of address,
`
`along wi_h _he remaining lifetime of that association.
`
`Mobility Security Association
`A collection of security contexts, between a pair
`of nodes, which may be applied to obile IP protocol
`messages exchanged between them. Eaci context indicates
`an authentication algorithm and mode
`(Section 5.l),
`a
`secret
`(a shared key, or appropriate public/private
`key pair], and a style of replay protection in use
`(Section 5.6).
`
`A host or a router.
`
`A randomly chosen value, different from previous choices,
`inserted in a message to protect against replays.
`
`Security Parameter Index (SPI)
`An index identifying a security context between a pair
`of nodes among the contexts available in the Mobility
`Security Association.
`SP1 values 0
`through 255 are
`reserved and MUST NOT be used in any Mobility Security
`Association.
`
`r
`
`‘he path followed by a datagram while it is encapsulated.
`The model
`is that, while it is encapsulated,
`a datagram
`is routed to a knowledgeable decapsulating agent, which
`decapsilates the datagram and then correctly delivers it
`to its ultimate destination.
`
`Virtual Network
`
`A network witq no physical instantiation beyond a router
`(with a physical network interface on another network).
`The router (e.g.,
`a home agent) generally advertises
`reacfiability to the virtual network using conventional
`routing protocols.
`
`Visited Network
`
`A network other than a mobile node's Home Network,
`which the mobile node is currently connected.
`
`to
`
`Visitor List
`
`The list of mobile nodes visiting a foreign agent.
`
`Perkins
`
`RFC 2002
`
`Standards Track
`
`[Page 7]
`
`IP Mobility Support
`
`October 1996
`
`ZTE Corporation and ZTE (USA) Inc.
`
`Exhibit 1017-00007
`
`

`

`1.7. Protocol Overview
`
`The following support services are defined for Mobile IP:
`
`Agent Discovery
`Home agents and foreign agents may advertise their
`availability on each link for which they provide service.
`A newly arrived mobile node can send a solicitation on
`tie link to learn if any prospective agents are present.
`
`Registration
`is away from home, it registers
`Wqen the mobi
`ith its home agent. Depending on
`its care-of
`its method of attachment,
`the mobile node will register
`either direcely with ies home agent, or through a foreign
`agent which forwards tie registration to the home agent.
`
`The following steps provide a IOUQT outline of operation of the
`Mobile IP protocol:
`
`foreign agents and home agents) advertise
`Mobility agents (i.e.,
`their presence via Agent Adv rtis m nt m ssag s
`(S ction 2).
`A
`mobile node may optionally solicit an Agent Advertisement message
`from any locally attached mobility agents through an Agent
`Solicitation message.
`
`node rec ives thes Agent Advertisements and determines
`A mobil
`whether it is on its home network or a foreign network.
`
`When the mobile node detects that it is located on its home
`
`If returning
`network, it operates without mobility services.
`to its home network from b ing regist red elsewhere,
`tie mobile
`node deregisters with i:s home agen:,
`through exchange of a
`Registration Request and Registration Reply message with it.
`
`When a mobile node detects that it Has moved to a foreign
`network, it obtains a care—of address on the foreign network.
`The care-of address can either be determined from a foreign
`agent's advertisements (a foreign agent care-of address), or by
`some external assignment mechanism such as DHCP [6]
`(a co—located
`care—of address).
`
`The mobile node operating away from home then registers its
`new care-of address with its home agent
`through exchange of a
`Registration Request and Registration Reply message with it,
`possibly via a foreign agent
`(Section 3).
`
`Perkins
`
`RFC 2002
`
`Standards Track
`
`[Page 8]
`
`IR Mobility Support
`
`tober 1996
`
`— Datagrams sent
`
`to the mobile node's home address are intercepted
`
`ZTE Corporation and ZTE (USA) Inc.
`
`Exhibit 1017-00008
`
`

`

`to the mobile
`tunneled by the home agent
`by its home agent,
`node's care—of address,
`received at the tunnel endpoint
`(either
`at a foreign agent or at the mobile node itself), and finally
`delivered to the mobile node (Section 4.2.3].
`
`In the reverse direction, datagrams sent by the mobile node
`are generally delivered to their destination using standard IP
`routing mechanisms, not necessarily passing through the home
`agent.
`
`tunneling to hide a
`When away from home, Mobile IP uses protocol
`mobile node's home address from intervening routers between its home
`network and its current location.
`The tunnel
`terminates at the
`mobile node's care-of address.
`"he care-of address must be an
`
`IP
`address to which datagrams can be delivered via conventional
`routing. At the care—of address,
`the original datagram is removed
`from the tunnel and delivered to the mobile node.
`
`Mobi’e "P provides two alternative modes for the acquisition of a
`care—of address:
`
`— A "foreign agent care—of address" is a care-of address provided
`by a foreign agent
`through its Agent Advertisement messages.
`In
`this case,
`the care-of address is an IP address of the foreign
`agent.
`In this mode,
`the foreign agent is the endpoint of the
`tunnel and, upon receiving tanneled datagrams, decapsulates them
`and delivers the inner datagram to the mobile node. This mode
`of acquisition is preferred because it allows many mobile nodes
`to share the same care-of address and therefore does not place
`unnecessary demands on the already limited IPv4 address space.
`
`A “co-located care—of address“ is a care—of address acquired
`by the mobile node as a local
`IP address through some external
`means, which the mobile node then associates with one of its own
`
`The address may be dynamically acquired as
`network interfaces.
`a temporary address by the mobile node such as through DHCP
`[6],
`or may be owned by the mobile node as a long-term address for its
`use only while visiting some foreign network. Specific external
`methods of acquiring a local
`IP address for use as a co-located
`care—of address are beyond the scope of this document. When
`using a co-located care—of address,
`the mobile node serves as the
`endpoint of the tunnel and itself performs decapsulation of the
`datagrams tunneled to it.
`
`‘he mode of using a co-located care—of address has the advantage that
`it allows a mobile node to function without a foreign agent,
`for
`example,
`in networks that have not yet deployed a foreign agent.
`
`Perkins
`
`RFC 2002
`
`Standards Track
`
`[Page 9]
`
`IP Mobility Support
`
`October l996
`
`It does, however, place additional burden on the IPv4 address space
`because it requires a pool of addresses within the foreign network to
`
`ZTE Corporation and ZTE (USA) Inc.
`
`Exhibit 1017-00009
`
`

`

`ft is difficul
`be made available to visiting mobile nodes.
`efficiently maintain poo's of addresses for each subnet tha
`permit mobiie nodes to visit.
`
`to understand the distinction between the care—of
`It is important
`address and the foreign agent functions.
`The care—of address is
`simpiy the endpoint of the tunnel.
`it might
`indeed be an address of
`a foreign agent
`(a foreign agent care-of address), but it might
`instead be an address temporarily acquired by the mobile node (a co-
`iocated care—of address .
`A foreign agent, on the other hand,
`is a
`mobiiity agent that provides services to mobile nodes.
`See Sections
`3.7 and 4.2.2 for additional details.
`
`A home agent MUST be abie to attract and intercept datagrams that are
`destined to the home address of any of its registered mobile nodes.
`Using the proxy and gratuitous ARP mechanisms described in Section
`4.6,
`this requirement can be satisfied if tie home agent has a
`network interface on the link indicated by the mob"e node's home
`address. Other placements of th hom ag nt r lativ to the mobile
`node's home iocation MAY also be possible using other mechanisms for
`intercepting datagrams destined to the mobile node's home address.
`Such placements are beyond the scope of this document.
`
`a mobile node and a prospective or current foreign agent
`Sim"arly,
`MUS" be able to exchange datagrams without relying on standard IP
`routing mechanisms;
`that is,
`those mecianisms which make forwarding
`decisions based upon the network—prefix of the destination address in
`the :P header. This requirement can be satisfied if the foreign
`agen'
`and the visiting mobile node Have an interface on the same
`link.
`in this case,
`the mobile node and foreign agent simply bypass
`thei
`normai TP roiting mechanism wqen sending datagrams to each
`othe , addressing the underlying link—layer packets to tneir
`respect ve "ink-layer addresses. Other placements of the foreign
`agent relative to the mobile node MAY also be possible using other
`mechanisms to exchange datagrams between these nodes, but such
`placements are beyond the scope of this document.
`
`If a mobile node is using a co-located care-of address (as described
`in (b) above),
`the mobile node MUST be located on the link identified
`
`by the network prefix of this care—of address. Otherwise, datagrams
`destined to the care—of address would be undeliverabie.
`
`the figure below illustrates the routing of datagrams to
`For example,
`and from a mobile node away from home, once the mobiie node has
`registered with its home agent.
`In the figure below,
`the mobile node
`is using a foreign agent care—of address:
`
`Perkins
`
`RFC 2002
`
`Standards Track
`
`[Page l0]
`
`IP Mobility Support
`
`October 1996
`
`2) Datagram is intercepted
`by home agent and
`is tunneled to the
`
`3) Datagram is
`detunneled and
`delivered to the
`
`ZTE Corporation and ZTE (USA) Inc.
`
`Exhibit 1017-00010
`
`

`

`care—of address.
`
`mobile node.
`
`+ _ _ _ _ _ _ __
`
`lforeign
`
`_ _ _ _ _ _ __
`
`\+
`
`For datagrams sent by’
`mobile node, standard KP
`
`routing delivers each to its
`destination.
`In this figure,
`the foreign agent is tie
`mobile node's default router.
`
`l) Datagram to
`mobile node
`arrives on
`
`home network
`via standard
`LP routing.
`
`.8. Specification Language
`
`In this document, several words are used to signify the requirements
`of the specification.
`These words are often capitalized.
`
`MUST
`
`This word, or th adj ctiv "r guir d", m ans that
`the definition is an absolute requirement of the
`specification.
`
`MUST NOT
`
`This phrase means that the definition is an absolute
`prohibition of the specification.
`
`SHOULD
`
`“his word, or th adj ciiv "r comm nd d", means
`that,
`in some circumstances, valid reasons may exist
`to ignore this item, but
`the full implications must
`be understood and carefully weighed before choosing
`a different course. Unexpected results may result
`otherwise.
`
`‘his word, or the adjective "optional", means that this
`item is one of an allowed set of alternatives.
`An
`
`include this option MUST
`implementation which does not
`be prepared to interoperate with another implementation
`wqich does include the option.
`
`Perkins
`
`RFC 2002
`
`Standards Track
`
`[Page ll]
`
`IP Mobility Support
`
`October 1996
`
`silently discard
`The implementation discards the datagram without
`further processing, and without indicating an error
`to the sender.
`The implementation SHOUQD provide the
`
`ZTE Corporation and ZTE (USA) Inc.
`
`Exhibit 1017-00011
`
`

`

`including the conten
`capability of logging the error,
`of the discarded datagram, and SHOULD record the even
`in a statistics counter.
`
`1.9. Message Format and Protocol Extensibility
`
`Mobile IR defines a set of new control messages, sent with UDR [17]
`using well-known port number 434. Currently,
`the following two
`m ssag
`typ s ar
`d fin d:
`
`1 Registration Request
`3 Registration Reply
`
`Jp-to-date values for the message types for Mobile IR control
`n ssag s ar
`sp cifi d in the most recent "Assigned Numbers"
`
`[20].
`
`for Agent Discovery, Mobile IR makes use of the existing
`In addition,
`Router Advertisement and Router Solicitation messages defined for
`ICMR Router Discovery [4].
`
`Mobile IR defines a general Extension mechanism to allow optional
`information to be carried by Mobile IR control messages or by ICMR
`Router Discovery messages.
`Each of these Extensions (with one
`exception)
`is encoded in the following Type-Length-Value format:
`
`0
`0
`
`1 2 3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`l
`0
`
`1
`
`2 3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`2
`0
`
`1 2
`
`\
`
`Length
`
`Indicates the particular type of
`
`tension.
`
`Indicates the length (in bytes)
`this Extension.
`The length does
`Lengti bytes.
`
`o
`
`the data field within
`OT inclade the Type and
`
`The particular data associated with this Extension. This
`field may be zero or more bytes in length.
`The format
`and length of the data field is determined by the type
`and length fields.
`
`Rerkins
`
`RFC 2002
`
`Standards Track
`
`[Rage 12]
`
`IR Mobility Support
`
`October 1996
`
`Extensions allow variable amounts of information to be carried within
`
`The end of the list of Extensions is indicated by the
`each datagram.
`total length of the IR datagram.
`
`Two separately maintained sets of numbering spaces,
`
`from which
`
`ZTE Corporation and ZTE (USA) Inc.
`
`Exhibit 1017-00012
`
`

`

`Extension Type values are allocated, are used in Mobile LP:
`
`The first set consists of those Extensions which may appear only
`in Mobile IP control messages
`(tqose sent
`to and from UDP port
`number 434). Currently,
`the following Types are defined for
`Extensions appearing in Mobile i? controi messages:
`
`32 Mobile-Home Authentication
`
`33 Mobile—Foreign Autientication
`34
`Foreign—Home Authentication
`
`‘he second set consists of those extensions which may appear only
`in TCMP Router Discovery messages
`[4]. Currently, Mobile IP
`defines the following Types for Extensions appearing in ICMP
`Router Discovery messages:
`
`0 One-byte Padding (encoded with no Length nor Data field)
`16 Mobility Agent Advertisement
`19 Prefix-Eengths
`
`Each indiv’dua" Extension is described in detail in a separate
`section later in tqis document. Up—to—date values for these
`Extension Type numbers are specified in the most recent "Assigned
`umbers"
`[20].
`
`Due to the separation (orthogonality) of these sets, it is
`conceivable that two Extensions tnat are defined at a later date
`
`so long as one of the Extensions
`could have identical Type values,
`may be used only in Mobile LP control messages and the other may be
`used only in ICMP Router Discovery messages.
`
`When an Extension numbered in eitner of these sets within the range 0
`through 127 is encountered but not recognized,
`the message containing
`that Extension MUST be silently discarded. When an Extension
`numbered in the range l28 through 255 is encountered which is not
`recognized,
`twat particular Extension is ignored, but
`the rest of the
`—:E
`Extensions and message data
`UST still be processed.
`The Length
`-—a
`field of the ixiension is used to skip the Data field in searching
`for the next
`xtension.
`
`4_
`
`Perkins
`
`RFC 2002
`
`Standards Track
`
`[Page 13]
`
`IP Mobility Support
`
`October 1996
`
`Agent Discovery
`
`Agent Discovery is the method by which a mobile node determines
`whether it is currently connected to its home network or to a foreign
`network, and by which a mobile node can detect when it qas moved from
`one network to another. When connected to a foreign network,
`the
`
`ZTE Corporation and ZTE (USA) Inc.
`
`Exhibit 1017-00013
`
`

`

`methods specified in this section also allow the mobile node to
`determine the foreign agent care-of address being offered by each
`foreign agent on that network.
`
`e “P extends ICMP Router Discovery [4] as its primary mechanism
`Mobi
`for Agent Discovery.
`An Agent Advertisement is formed by including a
`Mob‘
`ity Agent Advertisement Extension in an LCM? Qouter
`A
`Advcrtiscm nt mcssag
`(Section 2.i).
`An Agent Solicitation message
`is 'dentica’
`to an iCMP Router Soiicitation, except that its IP "TL
`MUST be set to 1
`(Section 2.2). This section describes the message
`formats and procedires by wqich mobile nodes,
`foreign agents, and
`home agents coop rat
`to r aliz Ag nt Discovery.
`
`Agent Advertisement and Agent Solicitation may not be necessary for
`iink layers that already provide this functionality.
`The method by
`which mobile nodes establish lin<—layer connections with prospective
`agents is outside the scope of this document
`(but see Appendix 3).
`r
`‘he procedures described below assume that such link-iayer
`connectivity has already been establisqed.
`
`No authentication is required for Agent Advertisement and Agent
`Solicitation messages.
`They MAY be authenticated using the IP
`Authentication Header
`[1], which is unrelated to the messages
`described in this document.
`Further specification of the way in
`which Advertisement and Solicitation messages may be authenticated is
`outside of the scope of this dociment.
`
`2.l. Agent Advertisement
`
`to advertise
`Agent Advertisements are transmitted by a mobility agent
`its services on a link. Mobil
`nod s us
`th s
`adv rtis m nts to
`
`An
`determine their current point of attachment to the Internet.
`Agent Advertisement is an TCMP Router Advertisement that was been
`extended to aiso carry an Mobility Agent Advertisement Extension
`(Section 2.l.i) and, optionally,
`a Prefix-Lengths Extension (Section
`2.l.2), One—byte Padding Extension (Section 2.1.3), or otier
`Extensions that might be defined in the future.
`
`iCMP Router Advertisement
`Within an Agent Advertisement message,
`fieids of th m ssag
`ar
`r quir d to conform to the following
`additional specifications:
`
`Perkins
`
`RFC 2002
`
`Standards Track
`
`[Page 14]
`
`IP Mobility Support
`
`October l996
`
`— Link—Layer Fields
`
`Destination Address
`
`The link-layer destination address of a unicast
`Agent Advertisement MUST be the same as the source
`link—iayer address of the Agent Solicitation which
`prompted the Advertisement.
`
`ZTE Corporation and ZTE (USA) Inc.
`
`Exhibit 1017-00014
`
`

`

`-
`
`IP Fields
`
`TTL
`
`The TTL for all Agent Advertisements MUST be set
`to 1.
`
`Destination Address
`
`the IP
`As specified for TCMP Router Discovery [4],
`destination address of an Agen: Advertisement MUST
`be either the "all systems on :his link" multicast
`address (224.0.0.1)
`[5] or the "limited broadcast"
`address (255.255.255.255].
`The subnet—directed
`
`broadcast address of the form <prefix>.<—l> cannot be
`used since mobile nodes will not generally know the
`prefix of the foreign network.
`
`-
`
`ICMP Fields
`
`Code
`
`The Code field of the agent advertisement is
`interpreted as follows:
`
`The mobility agent handles common traffic —— that
`is, i: acts as a router for IR datagrams not
`necessarily related to mobile nodes.
`The mobility agent does not route common traffic.
`However, all foreign agents MUST (minimally)
`forward to a default router any datagrams received
`from a registered mobile node (Section 4.2.2).
`
`Lifetime
`
`The maximum length of time that the Advertisement
`is considered valid in the absence of further
`Advertisements.
`
`Router Address(es)
`See Section 2.3.; for a discussion of the addresses
`
`that may appear in this portion of the Agent
`Advertisement.
`
`Perkins
`
`RFC 2002
`
`Standards Track
`
`[Page 15]
`
`IR Mobility Support
`
`October 1996
`
`Num Addrs
`
`The number of Router Addresses advertised in this
`
`message. Note that in an Agent Advertisement
`message,
`the number of router addresses specified in
`the ICMP Rou:er Advertisement portion of the message
`MAY be set to 0.
`See Section 2.3.1 for details.
`
`If sent periodically,
`
`the nominal interval at which Agent
`
`ZTE Corporation and ZTE (USA) Inc.
`
`Exhibit 1017-00015
`
`

`

`Advertisements are sent SHOU;D be l 3 of the advertisement Lifetime
`
`given in the ICMP header. This allows a mobile node to miss three
`successive advcrtiscm nts bctor deleting the agent
`from its list of
`valid ageqts.
`The actual
`transmission time for each advertisement
`SHOULD be slightly randomized [4]
`in order to avoid synchronization
`and subsequent collisions with otqer Agent Advertisements that may be
`sent by other agents (or witi other Router Advertisements sent by
`other routers). Note that tiis field has no relation to tie
`
`"Registration Lifetime” field witdin the Mobility Agent Advertisement
`Extension defined below.
`
`2.l.l. Mobility Agent Advertisement Extension
`
`The Mobility Agent Advertisement Extension follows the ICMP Router
`Advertisement fields.
`It is used to indicate that an ICMP Router
`
`Advertisement message is also an Agent Advertisement being sent by a
`mobility agent.
`The Mobility Agent Advertisement Extension is
`defined as follows:
`
`0
`O
`
`l 2 3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`l
`O
`
`l 2 3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`2
`O
`
`l 2 3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`Length
`——+—— ——~—+—+—~—~—~—+—+——
`
`Sequence Number
`——~—+—+—~—~—~—+—+——
`
`Registration Lifetime
`
`M G V}
`
`reserved
`
`zero or more Cafe—o’
`
`l6
`
`Length
`
`(6 + 4*N], where N is the number of care—of addresses
`advertised.
`
`Sequence Number
`The count of Agent Adv rtis m nt m ssag s
`agent was initialized (Section 2.3.2).
`
`s nt since the
`
`Perkins
`
`RFC 2002
`
`Standards Track
`
`[Page l6]
`
`IR Mobility Support
`
`October l996
`
`Registration Lifetime
`that this
`"he longest _ifetime {measured in seconds)
`agent is willing to accept
`in any Registration Request.
`A value of Oxffft indicates infinity. Tnis field has no
`relation to ;
`.ifetime" field within the ICM? Router
`
`Advertisemen'
`
`tion of the Agent Advertisement.
`
`Registration required. Registration witfi this foreign
`agent
`(or another foreign agent on this link)
`is required
`
`ZTE Corporation and ZTE (USA) Inc.
`
`Exhibit 1017-00016
`
`

`

`rather than using a co—located care—of address.
`
`The foreign agent will not accept registrations
`Busy.
`from additional mobil

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket