This paper incorporates editorial changes from to the output from Subgroup N1 to Working Group N.
Considering the dominant position of the Internet Protocol Suite (IPS) in the commercial networking environment, the Air Navigation Commission concluded that consideration should be given to whether it was viable for aeronautical applications to make direct use of IPS in the aeronautical environment and gave the Aeronautical Communications Panel (ACP) Working Group N (Networking) the task to, “consider the use of TCP/IP protocols in the provision of aeronautical internetworking”. ACP Working Group N produced an initial report which was presented at the June 2005 ACP Working Group of the Whole Meeting. The report concluded that use of the IPS in the ground environment appeared to be straightforward and further consideration was to be given with the aim of development of a minimum set of SARPs and Guidance Material necessary to support global interoperability. However for air-ground communications the report noted that technical issues, mainly related to mobility and security aspects associated with the introduction of the IPS in air-ground data link systems, need to be resolved. This report presents an initial analysis of a number of candidate ATN IPS mobility solutions.
During the November 2005 meeting Sub-Group N1 also identified a set of Technical and Implementation Characteristics which are used for analysis of each candidate approach. Note that the characteristics have not been identified to select a particular approach but rather to determine if IPS mobility is feasible generally to support the needs of the aviation community.
IDRP would also work; however, the community would still be left with an aviation-specific solution.
OSPF applied on a single routing domain perspective could be employed to alleviate the convergence issues but there may be administrative issues since it is expected that the ATN will be operated by multiple service providers and administrations.
SCTP is a standard that was not designed for mobility. Many instances of experimentation have demonstrated that SCTP is capable of supporting mobility, and even has some desirable features not found in network-layer solutions, but this type of use is not directly supported by the standards documents or available vendor implementations.
Neither of the two Instant Messaging approaches: XMPP and SIMPLE is directly designed to provide the type of smooth mobility that is under consideration here, although they could be used to provide an ACARS-like service.
1. Background 8
2. Introduction 10
2.1 Summary of Candidate Approaches for IPS Mobility 10
2.2 Technical Implementation Characteristics of Candidate Approaches for IPS Mobility 10
2.2.1 Technical Characteristics 10
2.2.2 Implementation Characteristics 11
3. Detailed Analysis 12
3.1 Approach N1 – Mobile IPv6 (MIPv6) 12
3.1.1 Approach N1 Description 12
3.1.1.1 Basic Provisions of MIPv6 12
3.1.1.2 Extensions to MIPv6 14
3.1.1.2.1 Mobile Nodes And Multiple Interfaces in IPv6 (MONAMI6) 14
3.1.1.2.2 Fast Handovers for Mobile IPv6 (FMIPv6) 17
3.1.1.2.3 Heirarchical Mobile IPv6 (HMIPv6) 17
3.1.1.2.4 Security Extensions to Mobile IPv6 18
3.1.1.2.4.1 Mobile Node-Home Agent Protection Extensions 18
3.1.1.2.4.2 Mobile Node-Correspondent Node Protection Extensions 20
3.1.2 Approach N1 Analysis 20
3.1.2.1 TC1 - Support Authorized Traffic Type and Category 20
3.1.2.2 TC2 - Multiple Independent Air/ground Sub-Networks 21
3.1.2.3 TC3 - Minimal Latency 22
3.1.2.4 TC4 - High Availability 23
3.1.2.5 TC5 - End-to-End Data Integrity 23
3.1.2.6 TC6 – Scaleable 24
3.1.2.7 TC7 - Throughput 24
3.1.2.8 TC8 – Secure 24
3.1.2.9 IC1 - Addition of Service Providers (SP) 26
3.1.2.10 IC2 - Independence of SP or Administration 26
3.1.2.11 IC3 - Open Industry Standard 26
3.1.2.12 IC4 - Mature and Commercially Available 26
3.1.2.13 IC5 - Permit Closed Network 27
3.1.2.14 IC6 - Authentication to Join Network 27
3.2 Approach N2 - Network Mobility (NEMO) 29
3.2.1 Approach N2 Description 29
3.2.2 Approach N2 Analysis 31
3.2.2.1 TC1 - Support Authorized Traffic Type and Category 31
3.2.2.2 TC2 - Multiple Independent Air/ground Sub-Networks 31
3.2.2.3 TC3 - Minimal Latency 31
3.2.2.4 TC4 - High Availability 31
3.2.2.5 TC5 - End-to-End Data Integrity 32
3.2.2.6 TC6 – Scaleable 32
3.2.2.7 TC7 - Throughput 32
3.2.2.8 TC8 - Secure 32
3.2.2.9 IC1 - Addition of Service Providers (SP) 33
3.2.2.10 IC2 - Independence of SP or Administration 33
3.2.2.11 IC3 - Open Industry Standard 33
3.2.2.12 IC4 - Mature and Commercially Available 34
3.2.2.13 IC5 - Permit Closed Network 34
3.2.2.14 IC6 - Authentication to Join Network 34
3.3 Approach R1 – Border Gateway Protocol (BGP) 35
3.3.1 Approach R1 Description 35
3.3.2 Approach R1 Analysis 36
3.3.2.1 TC1 - Support Authorized Traffic Type and Category 36
3.3.2.2 TC2 - Multiple Independent Air/ground Sub-Networks 36
3.3.2.3 TC3 - Minimal Latency 37
3.3.2.4 TC4 - High Availability 37
3.3.2.5 TC5 - End-to-End Data Integrity 37
3.3.2.6 TC6 – Scaleable 37
3.3.2.7 TC7 - Throughput 37
3.3.2.8 TC8 - Secure 37
3.3.2.9 IC1 - Addition of Service Providers (SP) 37
3.3.2.10 IC2 - Independence of SP or Administration 37
3.3.2.11 IC3 - Open Industry Standard 38
3.3.2.12 IC4 - Mature and Commercially Available 38
3.3.2.13 IC5 - Permit Closed Network 38
3.3.2.14 IC6 - Authentication to Join Network 38
3.4 Approach R2 – Inter-Domain Routing Protocol (IDRP) 39
3.4.1 Approach R2 Description 39
3.4.2 Approach R2 Analysis 39
3.4.2.1 TC1 - Support Authorized Traffic Type and Category 39
3.4.2.2 TC2 - Multiple Independent Air/ground Sub-Networks 39
3.4.2.3 TC3 - Minimal Latency 40
3.4.2.4 TC4 - High Availability 40
3.4.2.5 TC5 - End-to-End Data Integrity 40
3.4.2.6 TC6 – Scaleable 40
3.4.2.7 TC7 - Throughput 40
3.4.2.8 TC8 - Secure 40
3.4.2.9 IC1 - Addition of Service Providers (SP) 40
3.4.2.10 IC2 - Independence of SP or Administration 40
3.4.2.11 IC3 - Open Industry Standard 40
3.4.2.12 IC4 - Mature and Commercially Available 41
3.4.2.13 IC5 - Permit Closed Network 41
3.4.2.14 IC6 - Authentication to Join Network 41
3.5 Approach R3 OSPF in a Single Routing Domain 42
3.5.1 Approach R3 Description 42
3.5.2 Approach R3 Analysis 43
3.5.2.1 TC1 - Support Authorized Traffic Type and Category 43
3.5.2.2 TC2 - Multiple Independent Air/ground Sub-Networks 43
3.5.2.3 TC3 - Minimal Latency 44
3.5.2.4 TC4 - High Availability 44
3.5.2.5 TC5 - End-to-End Data Integrity 44
3.5.2.6 TC6 – Scaleable 44
3.5.2.7 TC7 - Throughput 45
3.5.2.8 TC8 - Secure 45
3.5.2.9 IC1 - Addition of Service Providers (SP) 45
3.5.2.10 IC2 - Independence of SP or Administration 45
3.5.2.11 IC3 - Open Industry Standard 45
3.5.2.12 IC4 - Mature and Commercially Available 45
3.5.2.13 IC5 - Permit Closed Network 46
3.5.2.14 IC6 - Authentication to Join Network 46
3.6 Approach T1 – Stream Control Transmission Protocol (SCTP) 46
3.6.1 Approach T1 Description 46
3.6.2 Approach T1 Analysis 47
3.6.2.1 TC1 – Support Authorized Traffic Type and Category 47
3.6.2.2 TC2 – Multiple Independent Air/ground Sub-Networks 47
3.6.2.3 TC3 – Minimal Latency 47
3.6.2.4 TC4 – High Availability 47
3.6.2.5 TC5 – End-to-End Data Integrity 47
3.6.2.6 TC6 – Scaleable 48
3.6.2.7 TC7 – Throughput 48
3.6.2.8 TC8 – Secure 48
3.6.2.9 IC1 – Addition of Service Providers (SP) 48
3.6.2.10 IC2 – Independence of SP or Administration 48
3.6.2.11 IC3 – Open Industry Standard 48
3.6.2.12 IC4 – Mature and Commercially Available 48
3.6.2.13 IC5 – Permit Closed Network 48
3.6.2.14 IC6 – Authentication to Join Network 49
3.7 Approach A1 – Instant Messaging (IM) Protocols 50
3.7.2 Approach A1 Analysis 51
3.7.2.1 TC1 – Support Authorized Traffic Type and Category 51
3.7.2.2 TC2 – Multiple Independent Air/ground Sub-Networks 51
3.7.2.3 TC3 – Minimal Latency 51
3.7.2.4 TC4 – High Availability 51
3.7.2.5 TC5 – End-to-End Data Integrity 51
3.7.2.6 TC6 – Scaleable 51
3.7.2.7 TC7 – Throughput 52
3.7.2.8 TC8 – Secure 52
3.7.2.9 IC1 – Addition of Service Providers (SP) 52
3.7.2.10 IC2 – Independence of SP or Administration 52
3.7.2.11 IC3 – Open Industry Standard 52
3.7.2.12 IC4 – Mature and Commercially Available 52
3.7.2.13 IC5 – Permit Closed Network 52
3.7.2.14 IC6 – Authentication to Join Network 52
3.8 Approach A2 – ATN Application Mobility 53
3.8.2 Approach A1 Analysis 53
3.8.2.1 TC1 – Support Authorized Traffic Type and Category 53
3.8.2.2 TC2 – Multiple Independent Air/ground Sub-Networks 53
3.8.2.3 TC3 – Minimal Latency 54
3.8.2.4 TC4 – High Availability 54
3.8.2.5 TC5 – End-to-End Data Integrity 54
3.8.2.6 TC6 – Scaleable 54
3.8.2.7 TC7 – Throughput 54
3.8.2.8 TC8 – Secure 54
3.8.2.9 IC1 – Addition of Service Providers (SP) 55
3.8.2.10 IC2 – Independence of SP or Administration 55
3.8.2.11 IC3 – Open Industry Standard 55
3.8.2.12 IC4 – Mature and Commercially Available 55
3.8.2.13 IC5 – Permit Closed Network 55
3.8.2.14 IC6 – Authentication to Join Network 56
4. Summary 57
5. Conclusion 57
6. References 58
6.1 ICAO Aeronautical Communications Panel (ACP) References 58
6.2 Internet Engineering Task Force (IETF) References 58
6.3 Other References 60
APPENDIX A – ATN Inter-Domain Routing Approach to Mobility 61
APPENDIX B – Mobile IP 63