6MAN P. Thubert, Ed. Internet-Draft Cisco Systems Intended status:Informational September 26, 2019 Expires:Standards Track 31 March29,2020 Expires: 2 October 2020 IPv6 Neighbor Discovery on Wireless Networksdraft-thubert-6man-ipv6-over-wireless-04draft-thubert-6man-ipv6-over-wireless-05 Abstract This document describes how the original IPv6 Neighbor Discovery and Wireless ND (WiND) can be applied on various abstractions of wireless media. Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at https://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire onMarch 29,2 October 2020. Copyright Notice Copyright (c)20192020 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents(https://trustee.ietf.org/license-info)(https://trustee.ietf.org/ license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 2. Acronyms . . . . . . . . . . . . . . . . . . . . . . . . . .54 3. IPv6 ND, Wireless ND and ND-Proxies . . . . . . . . . . . . . 4 4. IP Models . . . . . . . . . . . . . . . . . . . . . . . . . . 63.1.4.1. Physical Broadcast Domain . . . . . . . . . . . . . . . . 63.2. MAC-Layer4.2. Link-Layer Broadcast Emulations . . . . . . . . . . . . . 73.3.4.3. Mapping the IPv6Linklink Abstraction . . . . . . . . . . . . 83.4.4.4. Mapping the IPv6Subnetsubnet Abstraction . . . . . . . . . . . 94.5. WirelessND . . . . . . . .Neighbor Discovery . . . . . . . . . . . . . . . . . 104.1.5.1. Introduction toWiND . . .Wireless ND . . . . . . . . . . . . . . . 104.2. Links5.2. links and Link-Local Addresses . . . . . . . . . . . . . 114.3. Subnets5.3. subnets and Global Addresses . . . . . . . . . . . . . .12 5.11 6. WiND Applicability . . . . . . . . . . . . . . . . . . . . . 125.1.6.1. Case of LPWANs . . . . . . . . . . . . . . . . . . . . . 135.2.6.2. Case of Infrastructure BSS and ESS . . . . . . . . . . . 135.3.6.3. Case of Mesh Under Technologies . . . . . . . . . . . . .14 5.4.15 6.4. Case ofDMCDMB radios . . . . . . . . . . . . . . . . . . . 155.4.1.6.4.1. Using IPv6 ND only . . . . . . . . . . . . . . . . . 155.4.2.6.4.2. Using Wireless ND . . . . . . . . . . . . . . . . . . 156.7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 177.8. Security Considerations . . . . . . . . . . . . . . . . . . . 188.9. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 189.10. Normative References . . . . . . . . . . . . . . . . . . . .. . . . .189.1. Normative11. Informative References . . . . . . . . . . . . . . . . . .18 9.2. Informative References . . . . . . . . . . . . . . . .. 19 Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 21 1. Introduction IEEE STD. 802.1 [IEEEstd8021] Ethernet Bridging provides an efficient and reliable broadcast service for wired networks; applications and protocols have been built that heavily depend on that feature for their core operation. Unfortunately, Low-Power Lossy Networks (LLNs) andlocal wireless networksWireless Local Area Networks (WLANs) generally do notprovidebenefit from the same reliable and cheap broadcast capabilitiesofas EthernetBridging in an economical fashion.links. As opposed to unicast transmissions, the broadcast transmissions over wireless links are not subject to automatic retries (ARQ) and can be very unreliable. Reducing the speed at the PHY layer for broadcast transmissions can increase the reliability, at the expense of a higher relative cost of broadcast on the overall available bandwidth. As a result, protocols designed for bridged networks that rely onmulticast andbroadcast transmissions often exhibit disappointing behaviours when employed unmodified on a local wireless medium (see[I-D.ietf-mboned-ieee802-mcast-problems]).[MCAST-PROBLEMS]). Wi-Fi [IEEEstd80211] Access Points (APs) deployed in an Extended Service Set (ESS) act as Ethernet Bridges[IEEEstd8021], with[IEEEstd8021] between thepropertywireless stations (STA) and the wired backbone. As opposed to the classical Transparent (aka Learning) Bridge operation that installs the forwarding state reactively to traffic, the bridging state in the AP is established proactively, at the time of association. Thisensures connectivity to the node (STA) andprotects the wireless medium against broadcast-intensive Transparent Bridgingreactive Lookups.lookups. In other words, the association processis used to registerregisters theMACLink-Layer (MAC) Address of the STA to the AP. The APsubsequently proxiesmaintains thebridging operationfull list of associated addresses and does notneed toforward over the radio the broadcastLookups overlookups for destinations that are not there. In the case of Ethernet LANs as well as most WLANs and Low-Power Personal Area Networks (LoWPANs), the Network-Layer multicast operation is typically implemented as a Link-Layer broadcast for the lack of an adapted Link-Layer multicast operation. That Link-Layer multicast operation would need to handle a possibly very large number of groups and it was easier to simply broadcast all theradio.Network-Layer multicast packets. Like Transparent Bridging, the IPv6 [RFC8200] Neighbor Discovery [RFC4861] [RFC4862] Protocol (IPv6 ND) isa reactive protocol,reactive, based on on- demand multicast transmissions to locate an on-link correspondent and ensure the uniqueness of an IPv6 address.The mechanismOn wireless, the packets are broadcasted, meaning that they are both expensive and unreliable. On paper, a Wi-Fi station must keep its radio turned on to listen to the periodic series of broadcast frames, which forDuplicate Address Detection (DAD) [RFC4862]the most part will be dropped when they reach Network-Layer. In order to avoid this waste of energy and increase its battery life, a typical battery- operated device such as an IoT sensor or a smartphone will blindly ignore a ratio of the broadcasts, making IPv6 ND operations even less reliable. It results that an IPv6 ND multicast message is processed by many of the wireless nodes over the whole subnet (e.g., the ESS fabric) though there are very few nodes subscribed to the multicast group, and at most one intended target. Yet, the packet may be missed by the intended target. Though IPv6 ND was the state of the art when designed for an Ethernet wire at theefficient broadcast operationend ofEthernet Bridging. Since broadcast canthe twentieth century, it must beunreliablereevaluated for the new technologies, such as wireless and overlays, that evolved since then. This document discusses the applicability of IPv6 ND over wirelessmedia, DAD often failslinks, as compared with routing-based alternatives such as prefix-per node and multi-link subnets (MLSN), and with Wireless ND (WiND), that is similar todiscover duplications [I-D.yourtchenko-6man-dad-issues]. In practice, IPv6 addresses very rarely conflict because oftheentropy ofWi-Fi association and reduces the64-bit Interface IDs, not because address duplications are detectedneed for Network-Layer multicast. 2. Acronyms This document uses the following abbreviations: 6BBR: 6LoWPAN Backbone Router 6LN: 6LoWPAN Node 6LR: 6LoWPAN Router ARO: Address Registration Option DAC: Duplicate Address Confirmation DAD: Duplicate Address Detection DAR: Duplicate Address Request EDAC: Extended Duplicate Address Confirmation EDAR: Extended Duplicate Address Request MLSN: Multi-link subnet LLN: Low-Power and Lossy Network LoWPAN: Low-Power Wireless Personal Area Network NA: Neighbor Advertisement NBMA: Non-Broadcast Multi-Access NCE: Neighbor Cache Entry ND: Neighbor Discovery NDP: Neighbor Discovery Protocol NS: Neighbor Solicitation RPL: IPv6 Routing Protocol for LLNs RA: Router Advertisement RS: Router Solicitation VLAN: Virtual Local Area Network WiND: Wireless Neighbor Discovery WLAN: Wireless Local Area Network WPAN: Wireless Personal Area Network 3. IPv6 ND, Wireless ND andresolved.ND-Proxies The IPv6 ND Neighbor Solicitation (NS) [RFC4861] message is used as a multicast IP packet forDAD andAddress Resolution (AR)when a node moves, or wakes upandreconnects toDuplicate Address Setection (DAD) [RFC4862]. In those cases, thewireless network. TheNS message istargetedsent at the Network Layer to a Solicited-Node Multicast Address (SNMA) [RFC4291] and should in theory only reach a very small group of nodes.It must be noted that in theThose messages are generated individually for each address, and may occur when a node joins thecase of Ethernet LANs as well as most WLANsnetwork, moves, or wakes up andLPWANs,reconnects to theLayer-3 multicast operation becomes a MAC_Layer broadcastnetwork. DAD was designed for thelack of a Layer-2 multicastefficient broadcast operationthat could handle a possibly very large numberofgroups in orderEthernet. Experiments show that DAD often fails tomakediscover theunicast efficient. It results thatduplication of IPv6ND messagesaddresses in large wireless access networks [DAD-ISSUES]. In practice, IPv6 addresses very rarely conflict, not because the address duplications areprocesseddetected and resolved bymost of the wireless nodes overthesubnet (e.g.,DAD operation, but thanks to theESS fabric) regardless of how fewentropy of thenodes are subscribed to the SNMA.64-bit Interface IDs (IIDs) that makes a collision quasi-impossible for randomized IIDs. IPv6 NDaddressAddress Lookups and DADs over a very large fabric can generatehnudredshundreds of broadcasts per second. If the broadcasts were blindly copied overWi-Fi and/or over a LowPower Lossy Network (LLN),Wi-Fi, theND- relatedND-related multicast traffic could consume enough bandwidth to cause a substantial degradation to the unicasttrafficservice[I-D.vyncke-6man-mcast-not-efficient].[MCAST-EFFICIENCY]. To protect their bandwidth, some networks throttle ND-related broadcasts, which reduces the capabilityoffor the ND protocol toperformoperate as expected.Conversely, a Wi-Fi station must keep its radio turned on to listen to the periodic series of broadcast frames, which for the most part will be dropped when they reach Layer-3. In order to avoid this waste of energy and increase its battery life, a typical battery- operated device such as an IoT sensor or a smartphone will blindly ignore a ratio of the broadcasts, making IPv6 ND operations even less reliable. These problemsThis problem can be alleviated by reducing theIPv6 ND broadcasts oversize of the broadcast domain that encompasses wireless access links. This has been done in the art of IP subnetting bysplittingpartitioning thebroadcast domainssubnets and by routing betweensubnets,them, at the extreme by assigning a /64 prefix to each wireless node (see [RFC8273]). Another way to split the broadcast domain within a subnet is to proxy at the boundary of the wired and wireless domains theLayer-3Network-Layer protocols that rely onMAC LayerLink-Layer broadcast operations. For instance, IEEE 802.11 [IEEEstd80211]situates proxy- ARPrecommends to deploy proxy-ARP (IPv4) and proxy-ND (IPv6) functions at the Access Points (APs). But proxying ND requiresa perfect knowledgethe full list of thepeerIPv6 addresses for which proxying is provided.In a generic fashion, radio connectivity changes with movements and variations in the environment, which makes formingForming and maintaining that knowledge a hard problem in the generalcase. Discovering peercase of radio connectivity, which keeps changing with movements and other variations in the environment. [SAVI] suggests to discover the addresses by snooping the IPV6 NDprotocol as proposed for SAVI [I-D.bi-savi-wlan] was found toprotocol, but that can also be unreliable. An IPv6 address may not be discovered immediately due to a packetloss, or ifloss. It may never be discovered in the case of a "silent" node that is not currently using one of its addresses, e.g., anodeprinter that waits in wake-on-lan state. A change ofstate,anchor, e.g. due to a movement, may be missed or misordered, leading to unreliable connectivity and an incompleteknowledge of the setlist ofpeers.IPv6 addresses to be proxied for. Wireless ND (WiND) introduces a new approach to IPv6 ND that is designed to apply to the WLANs andWPANsLoWPANs types of networks. On the one hand, WiND avoids the use of broadcast operation for DAD and AR, and on the other hand, WiND supports use cases whereSubnetsubnet andMAC- levelLink- Layer domains are not congruent, which is common in those types of networks unless a specificMAC-LevelLink-Layer emulation is provided. WiND applies routing inside theSubnets,subnets, which enablesMultiLink Subnets.Multilink subnets. Hosts register their addresses to their serving routers with [RFC8505]. With the registration, routers have a complete knowledge of the hosts they serve and in return, hosts obtain routing services for their registered addresses. The registration is abstract to the routing protocol, and it can be protected to prevent impersonation attacks with[I-D.ietf-6lo-ap-nd].[ADDR-PROTECT]. The routing service can be a simple reflexion in a Hub-and-SpokeSubnetsubnet that emulates an IEEEStdStd. 802.11 Infrastructure BSS atLayer 3.the Network Layer. It can also be a full-fledge routing protocol, in particular RPL [RFC6550] that was designed to adapt to various LLNs such as WLAN and WPAN radio meshes with the concept of Objective Function. Finally, the routing service can also be ND proxy that emulates an IEEEStdStd. 802.11 Infrastructure ESS atLayer 3. WiND specifiesthe Network Layer, as specified in the IPv6 Backbone Routerfor that purpose in [I-D.ietf-6lo-backbone-router].[BB-ROUTER]. More details on WiND can be found in Section4.1. 2. Acronyms This document uses the following abbreviations: 6BBR: 6LoWPAN Backbone Router 6LBR: 6LoWPAN Border Router 6LN: 6LoWPAN Node 6LR: 6LoWPAN Router ARO: Address Registration Option DAC: Duplicate Address Confirmation DAD: Duplicate Address Detection DAR: Duplicate Address Request EDAC: Extended Duplicate Address Confirmation EDAR: Extended Duplicate Address Request MLSN: Multi-Link Subnet LLN: Low-Power and Lossy Network NA: Neighbor Advertisement NBMA: Non-Broadcast Multi-Access NCE: Neighbor Cache Entry ND: Neighbor Discovery NDP: Neighbor Discovery Protocol NS: Neighbor Solicitation RPL: IPv6 Routing Protocol for LLNs RA: Router Advertisement RS: Router Solicitation WiND: Wireless Neighbor Discovery WLAN: Wireless Local Area Network WPAN: Wireless Personal Area Network 3.5.1. 4. IP Models3.1.4.1. Physical Broadcast Domain At the physical (PHY) Layer, a broadcast domain is the set of nodes that may receive a datagram that one sends over an interface, in other words the set of nodes in range of radio transmission. This set can comprise a single peer on a serial cable used as point-to- point (P2P) link. It may also comprise multiple peer nodes on a broadcast radio or a shared physical resource such as the legacy Ethernetshared wire.yellow wire for which IPv6 ND was initially designed. On WLAN andWPANLoWPAN radios, the physical broadcast domain is defined by a particular transmitter, as the set of nodes that can receive what this transmitter is sending. Literally every datagram defines its own broadcast domain since the chances of reception of a given datagram are statistical. In average and in stable conditions, the broadcast domain of a particular node can be still be seen as mostly constant and can be used to define a closure of nodes on which an upper-layer abstraction can be built. A PHY-layer communication can be established between 2 nodes if their physical broadcast domains overlap. On WLAN andWPANLoWPAN radios,thisMC property is usually reflexive, meaning that if B can receive a datagram from A, then A can receive a datagram from B. But there can be asymmetries due to power levels, interferers near one of the receivers, or differences in the quality of the hardware (e.g., crystals, PAs and antennas) that may affect the balance to the point that the connectivity becomes mostlyuni- directional,uni-directional, e.g., A to B but practically not B to A. It takes a particular effort to place a set of devices in a fashion that all their physical broadcast domains fully overlap, anditthat situation can not be assumed in the general case. In other words, the property of radio connectivity is generally not transitive, meaning that Amay bein range with B and Bmay bein range with C does not necessarily imply that A is in range with C. 4.2. Link-Layer Broadcast Emulations Wedefinecall DirectMAC-LayerMAC Broadcast(DMC) a(DMB) the transmission mode where the broadcast domain that is usable at the MAC layer is directly the physical broadcast domain. IEEE Std. 802.15.4 [IEEE802154] and IEEE Std. 802.11 OCB [IEEEstd80211] (for Out of the Context of a BSS) are examples ofDMCDMB radios. This contrasts with a number ofMAC-layerLink-Layer Broadcast Emulation (LLBE) schemes that are described inthe nextthis section.3.2. MAC-Layer Broadcast EmulationsWhile a physical broadcast domain is constrained to a single shared wire, Ethernet Bridging emulates the broadcast properties of that wire over a whole physical mesh of Ethernet links. For the upper layer, the qualities of the shared wire are essentially conserved, with a reliable and cheap broadcast operation over a closure of nodes defined by their connectivity to the emulated wire. In large switched fabrics, overlay techniques enable a limited connectivity between nodes that are known to amapping server.Map Resolver. The emulated broadcast domain is configured to the system, e.g., with a VXLAN network identifier (VNID). Broadcast operations on the overlay can be emulated but can become very expensive, and it makes sense to proactively install the relevant state in the mapping server as opposed to rely on reactive broadcast lookups. An IEEEStdStd. 802.11 Infrastructure Basic Service Set (BSS) also provides a closure of nodes as defined by the broadcast domain of a centralAccess Point (AP).AP. The AP relays both unicast and broadcast packets and ensures a reflexive and transitive emulation of the shared wire between the associated nodes, with the capability to signallink-up/link-downlink-up/ link-down to the upper layer. Within an Infrastructure BSS, the physical broadcast domain of the AP serves as emulated broadcast domain for all the nodes that are associated to the AP. Broadcast packets are relayed by the AP and are not acknowledged. Toensureincrease the chances that all nodes in the BSS receive the broadcast transmission, AP transmits at the slowest PHY speed. This translates into maximum co-channel interferences for others and the longest occupancy of the medium, for a duration that can be100a hundred times that of the unicast transmission of aunicast.frame of the same size. For that reason, upper layer protocols should tend to avoid the use of broadcast when operating over Wi-Fi. In an IEEEStdStd. 802.11 Infrastructure Extended Service Set (ESS), infrastructure BSSes are interconnected by a bridged network, typically running Transparent Bridging and the Spanning tree Protocol. In the original model of learning bridges, the forwarding statein the Transparent Bridgeis set by observing the source MAC address of the frames. When a state is missing for a destination MAC address, the frame is broadcasted with the expectation that the response will populate thestate.state on the reverse path. This is a reactive operation, meaning that the state is populated reactively toathe need forforwarding.to reach a destination. It is also possible in the original model tosendbroadcast a gratuitous frame to advertise self throughout the bridged network, and that is also a broadcast.In contrast, theThe process of the Wi-Fi association prepares a bridging state proactively at the AP, which avoids the need for a reactive broadcast lookup over the wireless access.TheIn an ESS, the AP may also generate a gratuitous broadcast sourced at the MAC address of the STA to prepare or update the state in the learning bridges so they point towards the AP for the MAC address of the STA.With WiND, IPv6 ND evolves towards similarWiND emulates that proactivemethodsmethod atLayer-3the Network-Layer forits operationthe operations ofaddress discovery (AD)AR, DAD andduplicate address detection (DAD).IPv6 ND proxy. In somecasesinstances ofWLANWLANs andWPAN radios,LoWPANs, amesh-underMesh-Under technology (e.g., a IEEE Std. 802.11s or IEEE Std. 802.15.10) provides meshing services that are similar to bridging, and the broadcast domain iswell definedwell-defined by the membership of the mesh. Mesh-Under emulates a broadcast domain by flooding the broadcast packets atLayer-2.the Link-Layer. When operating on a single frequency, this operation is known to interfere with itself,forcing deploymentand requires inter-frame gaps tointroduce delays thatdampen thecollisions. All in all,collisions, which reduces further themechanism is slow, inefficient and expensive.amount of available bandwidth. Going down the list of cases above, the cost of a broadcast transmissions becomes increasingly expensive, and there is a push to rethink the upper-layer protocols so as to reduce the depency on broadcast operations. There again, aMAC-layerLink-Layer communication can be established between 2 nodes if theirMAC-layerLink-Layer broadcast domains overlap. In the absence of aMAC-layerLink-Layer emulation such as amesh-underMesh-Under or an Infrastructure BSS, theMAC-layerLink-Layer broadcast domain is congruent with that of the PHY-layer and inherits its properties for reflexivity and transitivity. The IEEE Std. 802.11 OCB, which operatesOut of the Context ofwithout aBSS (DMC radios)BSS, is an example of a network that does not have aMAC-LayerLink-Layer broadcast domain emulation, which means that it will exhibit mostly reflexive and mostly non-transitive transmission properties.3.3.4.3. Mapping the IPv6Linklink Abstraction IPv6 defines a concept of Link,Linklink Scope and Link-Local Addresses (LLA), an LLA being unique and usable only within the Scope of a Link. The IPv6Neighbor Discovery (ND) [RFC4861][RFC4862] Duplicate Adress Detection (DAD)ND [RFC4861] DAD [RFC4862] processleveragesuses a multicast transmission toensuredetect a duplicate address, which requires thatan IPv6 address is unique as long asthe owner of the address is connected to the Link-Layer broadcastdomain. It must be noted that in all the cases in this specification, the Layer-3 multicast operation is always a MAC_Layer broadcast for the lack of a Layer-2 multicast operation that could handle a possibly very large number of groups in order to make the unicast efficient. This means that for every multicast packet regardlessdomain of thedestination group, all nodes will receive the packet and process it all the way to Layer-3.sender. On wired media, theLinklink is often confused with the physical broadcast domain because both are determined by the serial cable or the Ethernet shared wire. Ethernet Bridging reinforces that illusionby provisingwith aMAC-LayerLink-Layer broadcast domain that emulates a physical broadcast domain over the mesh of wires. But the difference shows on legacy Non-Broadcast Multi-Access (NBMA) networks such as ATM andFrame-Relay,Frame- Relay, on shared links and on newer types of NBMA networks such as radio and composite radio-wires networks. It also shows when private VLANs orLayer-2Link-Layer cryptography restrict the capability to read a frame to a subset of the connected nodes. Inmesh-underMesh-Under and Infrastructure BSS, the IPLinklink extends beyond the physical broadcast domain to the emulatedMAC-LayerLink-Layer broadcast domain. Relying on Multicast for the ND operation remains feasible but becomes highly detrimental to the unicast traffic,energy-inefficientandunreliable,more energy-inefficient andits use is discouraged.unreliable as the network grows. OnDMCDMB radios, IPLinkslinks between peers come and go as the individual physical broadcast domains of the transmitters meet and overlap. The DAD operation cannot provide once and for all guarantees on the broadcast domain defined by one radio transmitter if that transmitter keeps meeting new peers on the go. The nodes may need to form newLLAsLink-Local Addresses (LLAs) to talk to one another and the scopewhere LLAon which the uniquenesscanof an LLA must bedynamicallychecked is that pair of nodes. As long as there's noconflictconflict, a node may use the same LLA with multiple peers but it has torevalidateperform DAD witheveryeach new peer node. In practice, each pair of nodes defines a temporary P2P link, which can be modeled as asub- interfacesub-interface of the radio interface.3.4.4.4. Mapping the IPv6Subnetsubnet Abstraction IPv6 also definesathe concept ofSubneta subnet for Glocal and Unique Local Addresses.AddressesAll the addresses in asame Subnetsubnet shareathe sameprefixprefix, and by extension, a node belongs to aSubnetsubnet if it hasan interfacewith an addressonin thatSubnet.subnet. ASubnetsubnet prefix is Globally Unique so it is sufficient to validate that an address that is formed from aSubnetsubnet prefix is unique within thatSubnetsubnet to guarantee that it is globally unique. The IPv6 aggregation model relies on the property that a packet from the outside of aSubnetsubnet can be routed to any router that belongs to theSubnet,subnet, and that this router will be able to either resolve the destinationMACLink-Layer address and deliver the packet, or route the packet to the destination within theSubnet.subnet. If theSubnetsubnet is known asonlink,on-link, then any node may also resolve the destinationMACLink-Layer address and deliver the packet, but if theSubnetsubnet is notonlink,on-link, then a host in the subnet that does not havean NCEa Neighbor Cache Entry (NCE) for the destination will also need to pass the packet to a router. On IEEE Std. 802.3, aSubnetsubnet is often congruent with an IPLinklink because both are determined by the physical attachment to an Ethernet shared wire or an IEEE Std. 802.1 bridged broadcast domain. In that case, the connectivity over theLinklink is transitive, theSubnetsubnet can appear asonlink,on-link, and any node can resolve a destination MAC address of any other node directly using IPv6 Neighbor Discovery. But an IPLinklink and an IPSubnetsubnet are not always congruent. In the case of ashared Link situation, a SubnetShared Link, individual subnets may each encompass only a subset of the nodes connected to theLink.link. In Route-OverMulti-Link SubnetsMulti-link subnets (MLSN) [RFC4903], routers federate theLinkslinks between nodes that belong to theSubnet,subnet, theSubnetsubnet is notonlinkon-link and it extends beyond any of the federatedLinks.links. 5. Wireless Neighbor Discovery 5.1. Introduction to Wireless ND The DAD andlookupAR procedures in IPv6 NDexpectsexpect that a node in aSubnetsubnet is reachable within the broadcast domain of any other node in theSubnetsubnet when that other node attempts to form an address that would be a duplicate or attempts to resolve the MAC address of this node. This is why ND is only applicable for P2P and transit links, and requires extensions for other topologies.4. Wireless ND 4.1. Introduction toWiNDWireless Neighbor Discovery (WiND) [RFC6775][RFC8505][I-D.ietf-6lo-backbone-router][I-D.ietf-6lo-ap-nd][RFC6775][RFC8505][BB-ROUTER][ADDR-PROTECT] defines a newNDoperation for Neighbor Discovery that is based on 2 major paradigm changes, proactive address registration by hosts to their attachment routers and routing to host routes (/128) within the subnet. This allows WiND to avoid theclassical NDexpectations of transit links andSubnet-widesubnet- wide broadcast domains. WiND is agnostic to the method used for Address Assignment, e.g., Stateless Address Autoconfiguration (SLAAC) [RFC4862] or DHCPv6 [RFC8415]. It does not change the IPv6 addressing [RFC4291] or the current practices of assigning prefixes, typically a /64, to a subnet. But the DAD operation is performed as a unicast exchange with a central registrar, using new ND Extended Duplicate Address messages (EDAR and EDAC) [RFC6775][RFC8505]. This operation modernizes ND for application in overlays with Map Resolvers and enables unicast lookups [UNICAST-AR] for addresses registered to the resolver. The proactive address registration is performed with a new option in NS/NA messages, the Extended Address Registration Option (EARO)defienddefined in [RFC8505]. This method allows to prepare and maintain the host routes in the routers and avoids the reactiveNS(Lookup) foundAddress Resolution in IPv6ND. This is a direct benefit for wireless Links since it avoidsND and theMAC level broadcasts that areassociatedto NS(Lookup).Link-Layer broadcasts transmissions. The EARO provides information to the router that is independent to the routing protocol and routing can take multiple forms, from a traditional IGP to a collapsedub-and-SpokeHub-and-Spoke model where only one router owns and advertises the prefix. [RFC8505] is already referencedfor RIFT [I-D.ietf-rift-rift], RPL [RFC6550] with [I-D.thubert-roll-unaware-leaves] and IPv6 ND proxy [I-D.ietf-6lo-backbone-router]. WiND does not change IPv6 addressing [RFC4291] oras thecurrent practices of assigning prefixes to subnets. It is still typical to assign a /64 to a subnet and to useregistrtaion interfaceIDs of 64 bits. Duplicate Address detection within the Subnet is performed with a central registrar, using new ND Extended Duplicate Address messages (EDAR and EDAC) [RFC8505]. This operation modernizes ND for applicationto "RIFT: Routing inoverlays with Map ResolversFat Trees" [I-D.ietf-rift-rift] andenables unicast lookups [I-D.thubert-6lo-unicast-lookup]"RPL: IPv6 Routing Protocol foraddresses registered to the resolver.Low-Power and Lossy Networks" [RFC6550] with [RPL-UNAWARE-LEAVES]. WiND also enables toextendspan alegacy /64 on Ethernet with ND proxysubnet overthe wireless.an MLSN that federates edge wireless links with a high-speed, typically Ethernet, backbone. Thiswayway, nodes can form any addressthethey want and move freely froman L3-AP (that is reallyabackbone router in bridging mode, more in [I-D.ietf-6lo-backbone-router])wireless edge link to another, without renumbering. Backbone Routersfederate multiple LLNs over a Backbone Link to form a MultiLink Subnet (MLSN). Backbone Routers(6BBRs) placed along theLLNwireless edge of the Backbone handle IPv6 NeighborDiscovery,Discovery and forward packetson behalf of registered nodes. An LLN node (6LN) registers all its IPv6 Addresses using an NS(EARO) as specified in [RFC8505] toover the6BBR. The 6BBR is also a Border Router that performs IPv6 Neighbor Discovery (IPv6 ND) operations on its Backbone interfacebackbone on behalf of the6LNs that haveregisteredaddressesnodes onits LLN interfaces without the need of a broadcast overthe wirelessmedium. WiND is also compatible with DHCPv6 and other forms of address assignmentedge. For instance, a 6BBR inwhich case itbridging proxy mode (more in [BB-ROUTER]) canstill be usedoperate as a Layer-3 AP to serve wireless IPv6 hosts that are Wi-Fi STAs and maintain the reachability forDAD. 4.2. LinksGlobal Unicast and Link-LOcal Addresses within the federated MLSN. 5.2. links and Link-Local Addresses For Link-Local Addresses, DAD is typically performed between communicating pairs ofnodes. It is carried out as part of a registration process that is based on a NS/NA exchange that transports an EARO. During that process, the DAD is validatednodes anda Neighbor Cache Entry (NCE) isan NCE can be populated with a single unicast exchange. In the case of a bridging proxies, though, the Link-Local traffic is bridged over the backbone and the DAD must proxied there as well. For instance, in the case ofaBluetooth Low Energy (BLE)[RFC7668][IEEEstd802151] Hub-and Spoke configuration, Uniqueness[RFC7668][IEEEstd802151], the uniqueness ofLink localLink-Local Addressesneedneeds only to be verified between thepairspair of communicating nodes,athe central router andathe peripheral host. In that example, 2 peripheral hosts connected to the same central router can not have the sameLink LocalLink-Local Address because theBinding Cache Entries (BCEs)addresses wouldcollidecollision at the central router which could not talk to both over the same interface. TheWiNDDAD operation from WiND is appropriate for thatDAD operation,use case, but the one from ND is not, because the peripheral hosts are not on the same broadcast domain. On the other hand, the uniqueness of Global andULA DADUnique-Local Addresses is validated at theSubnetsubnet Level, using a logical registrarhosted bythat is global to thecentral router. 4.3. Subnetssubnet. 5.3. subnets and Global Addresses WiND extends IPv6 ND for Hub-and-Spoke (e.g., BLE) and Route-Over (e.g., RPL)Multi-Link SubnetsMulti-link subnets (MLSNs). In the Hub-and-Spoke case, each Hub-Spoke pair is a distinct IP Link, and aSubnetsubnet can be mapped on a collection ofLinkslinks that are connected to the Hub. TheSubnetsubnet prefix is associated to the Hub. Acting as6LR,routers, the Hub advertises the prefix asnot-onlinknot-on-link to the spokes in RA messages Prefix Information Options (PIO). Acting as6LNs,hosts, the Spokes autoconfigure addresses from that prefix and register them to the Hub with a corresponding lifetime. Acting as a6LBR,registrar, the Hub maintains a binding table of all the registered IP addresses and rejects duplicate registrations, thus ensuring a DAD protection for a registered address even if the registering node is sleeping.Acting as 6LR, theThe Hub also maintains an NCE for the registered addresses and can deliver a packet to any of themforduring their respective lifetimes. It can be observed that this design builds a form ofLayer-3Network-Layer Infrastructure BSS. A Route-Over MLSN is considered as a collection of Hub-and-Spoke where the Hubs form a connected dominating set of the member nodes of theSubnet,subnet, and IPv6 routing takes place between the Hubs within theSubnet.subnet. A single logical6LBRregistrar is deployed to serve the whole mesh. The registration in [RFC8505] is abstract to the routing protocol and provides enough information to feed a routing protocol such as RPL as specified in[I-D.thubert-roll-unaware-leaves].[RPL-UNAWARE-LEAVES]. In a degraded mode, all the Hubs are connected to a same high speed backbone such as an Ethernet bridging domain where IPv6 ND is operated. In that case, it is possible to federate the Hub, Spoke and Backbone nodes as a singleSubnet,subnet, operating IPv6 ND proxy operations[I-D.ietf-6lo-backbone-router][BB-ROUTER] at the Hubs, acting as 6BBRs. It can be observed that this latter design builds a form ofLayer-3Network-Layer Infrastructure ESS.5.6. WiND Applicability WiNDallows P2P,applies equally to P2P links, P2MPhub-and spoke, MAC-level broadcast domain emulationHub-and-Spoke, Link-Layer Broadcast Domain Emulation such asmesh-underMesh-Under and Wi-Fi BSS, and Route-Over meshes. There is an intersection whereLinklink andSubnetsubnet are congruent and where both ND and WiND could apply. These includes P2P, the MAC emulation of a PHY broadcast domain, and the particular case of always on, fully overlapping physical radio broadcast domain. But even in those cases where both are possible, WiND is preferable vs. ND because it reduces the need ofbroadcast ( thisbroadcast. This is discussed in more details in the introduction of[I-D.ietf-6lo-backbone-router]).[BB-ROUTER]. There are alsonumerousa number of practical use cases in the wireless world whereLinkslinks andSubnetssubnets are notP2P and notcongruent:o* The IEEEstdStd. 802.11 infrastructure BSS enables one subnet per AP, and emulates a broadcast domain atL2. Infrathe Link-Layer. The Infrastructure ESS extends that model over a backbone and recommendstothe use of an IPv6 ND proxy [IEEEstd80211] tocoexistinteroperate withEthernet connectedEthernet-connected nodes. WiND incorporates an ND proxy to serve thatneed and thatneed, which was missing so far.o* BlueTooth is Hub-and-Spoke at theMAC layer.Link-Layer. It would make little sense to configure a different subnet between the central and each individual peripheral node (e.g., sensor). Rather, [RFC7668] allocates a prefix to the central node acting asrouter (6LR),router, and each peripheral host (acting as ahost (6LR)host) forms one or more address(es) from that same prefix and registers it.o* A typical Smartgrid networks puts together Route-Over MLSNs that comprise thousands of IPv6 nodes. The 6TiSCH architecture [I-D.ietf-6tisch-architecture] presents the Route-Over model overa [IEEEstd802154]an IEEE Std. 802.15.4 Time-Slotted Channel-Hopping (TSCH) [IEEEstd802154] mesh, and generalizes it for multiple other applications. Each node in a Smartgrid network may have tens to a hundred others nodes in range. A key problem for the routing protocol is which other node(s) should this node peer with, because most of the possible peers do not provide added routing value. When both energy and bandwidth areconstrained,talkingconstrained, talking to them is abad ideawaste of resources and most of the possible P2P links are not even used. Peerings that are actually used come and go with the dynamics of radio signal propagation. It results that allocating prefixes to all the possible P2PLinkslinks and maintain as many addresses in all nodes is not even considered.5.1.6.1. Case of LPWANs LPWANs are by nature so constrained that the addresses andSubnetssubnets are fully pre-configured and operate as P2P or Hub-and-Spoke. This saves the steps of neighbor Discovery and enables a very efficient stateful compression of the IPv6 header.5.2.6.2. Case of Infrastructure BSS and ESS In contrast to IPv4, IPv6 enables a node to form multiple addresses, some of them temporary to elusive, and with a particular attention paid to privacy. Addresses may be formed and deprecated asynchronously to the association.Even if the knowledge of IPv6 addresses used by a STA can be obtained by snoopingSnooping protocols such as IPv6 ND andDHCPv6, or byDHCPv6 and observing data traffic sourced at theSTA, such methods provide onlySTA provides an imperfect knowledge of the state of the STA at the AP.ThisMissing a state or a transition may result inathe loss of connectivity for someIPv6of the addresses, in particular foraddressesan address that is rarelyused andused, belongs to a sleeping node, or one in a situation of mobility. This may also result in undesirable remanent state in the AP whenathe STA ceases to use an IPv6address.address while remaining associated. It results that snooping protocols is not a recommended technique and that it should only be used as lastresort.resort, when the WiND registration is not available to populate the state. The recommendedalternatealternative method is to use theIPv6WiND Registrationmethod speficied in p. By that method,for IPv6 Addresses. This way, the AP exposes its capability to proxy ND to the STA in Router Advertisement messages. In turn, the STA may request proxy ND services from the AP forone or moreall of its IPv6 addresses, usinganthe Extended Address RegistrationOption.Option, which provides the following elements: * TheRegistrationregistration state has a lifetime that limits unwanted state remanence in the network. * The registration is optionally secured using[I-D.ietf-6lo-ap-nd][ADDR-PROTECT] to prevent address theft and impersonation. * The registration carries a sequence number, which enables to figure the order of events in a fast mobility scenario withoutaloss of connectivity. The ESS mode requires a proxy ND operation at the AP. The proxy ND operation must cover Duplicate Address Detection, Neighbor Unreachability Detection, Address Resolution and Address Mobility to transfer a role of ND proxy to the AP where a STA is associated following the mobility of the STA. The WiND proxy ND specification that associated to theaddress registrationAddress Registration is[I-D.ietf-6lo-backbone-router].[BB-ROUTER]. With that specification, the AP participates to the protocol as a Backbone Router, typically operating as a bridging proxy though the routing proxy operation is also possible. As a bridging proxy, theproxybackbone router either replies to NS lookups with the MAC address of the STA, or preferably forwards the lookups to the STA as Link-Layer unicast frames to let the STA answer. For the data plane, the backbone router acts as a normal AP andthenbridges the packets to the STAnormally;as usual. As a routing proxy,itthe backbone router replies with its own MAC address and then routes to the STA at the IP layer. The routing proxy reduces the need to expose the MAC address of the STA on the wired side, for a better stability and scalability of the bridged fabric.5.3.6.3. Case of Mesh Under Technologies The Mesh-Under provides a broadcast domain emulation with reflexive and Transitive properties and defines a transitLinklink for IPv6 operations. It results that the model for IPv6 operation is similar to that of a BSS, with the root of the mesh operating as an Access Point does in a BSS/ESS. While it is still possible to operate IPv6 ND, the inefficiencies of the flooding operation make the IPv6 ND operations even less desirable than in a BSS, and the use of WiND is highly recommended.5.4.6.4. Case ofDMCDMB radios IPv6 overDMCDMB radios uses P2PLinkslinks that can be formed and maintained when a pair ofDMCDMB radios transmitters are in range from one another.5.4.1.6.4.1. Using IPv6 ND onlyDMCDMB radios do not provide MAC level broadcast emulation. An example of that is IEEE Std. 802.11 OCB which uses IEEE Std. 802.11 MAC/PHYs but does not provide the BSS functions. It is possible to form P2P IPLinkslinks between each individual pairs of nodes and operate IPv6 ND over thoseLinkslinks withLink LocalLink-Local addresses. DAD must be performed for all addresses on all P2P IPLinks.links. If special deployment care is taken so that the physical broadcast domains of a collection of the nodes fully overlap, then it is also possible to build an IPSubnetsubnet within that collection of nodes and operate IPv6 ND.The model can be stretched beyond the scope of IPv6 ND ifIf an external mechanism avoids duplicate addresses and if the deployment ensures the connectivity betweenpeers. This can be achieved for instance inpeers, aHub-and-Spokenon-transit Hub- and-Spoke deploymentifis also possible where the Hub is the only router in theSubnetsubnet and the Prefix is advertised as notonlink. 5.4.2.on-link. 6.4.2. Using Wireless ND Though this can be achieved with IPv6 ND, WiND is the recommended approach since it usesmoreunicast communications which are more reliable and less impacting for other users of the medium.Router and Hosts respectivelyThe routers senda compressed RA/NARAs with a SLLAO at a regular period. The period can be indicated ina RA as in an RA- Intervalthe RA-Interval Option [RFC6275]. If available, the message can be transported in a compressed form in a beacon, e.g., in OCB Basic Safety Messages (BSM) that are nominally sent every 100ms. An active beaconing mode is possible whereby the Host sends broadcast RS messages to which a router can answer with a unicast RA. A router that has Internet connectivity and is willing to serve as an Internet Access may advertise itself as a default router [RFC4191] in itsRA.RA messages. TheNA/RARA is sent over anUnspecified Linkunspecified link where it does not conflict to anyone, so DAD is not necessary at that stage. Thereceiverhost instantiates aLinklink where thesender'srouter's address is not a duplicate. To achieve this, it forms an LLA that does not conflict with that of thesenderrouter and registers to thesenderrouter using [RFC8505]. If thesenderrouter sent anRA(PIO)RA(PIO), thereceiverhost can also autoconfigure an address from the advertised prefix and register it.6LoWPAN Node 6LR (RPL leaf)(host) (router) | | |LLNDMB link | | | | IPv6 ND RS | |-------------->| |-----------> | |------------------> | IPv6 ND RA | |<--------------| | | | NS(EARO) | |-------------->| | | | NA(EARO) | |<--------------| | | Figure 1: Initial Registration Flow The lifetime in the registration should start with a small value (X=RMin, TBD), and exponentially grow with eachreregistrationre-registration to amlargerlarger value (X=Rmax, TBD). The IPLinklink is considered down when (X=NbBeacons, TDB) expected messages are not received in a row. It must be noted that theLinklink flapping does not affect the state of the registration and when aLinklink comes back up, the active-lifetime not elapsed-registrations (i.e., registrations for which lifetime is not elapsed) are still usable. Packets should be held or destroyed when theLinklink is down. P2PLinkslinks may be federated in Hub-and-Spoke and then in Route-Over MLSNs asdescribed above.illustrated in Figure 2. More details on the operation of WiND and RPL over the MLSN can be found in section 3.1, 3.2, 4.1 and 4.2.2 of [I-D.ietf-6tisch-architecture]. 6LoWPAN Node 6LR 6LBR 6BBR (RPL leaf) (router) (root) | | | | | 6LoWPAN ND |6LoWPAN ND+RPL | 6LoWPAN ND | IPv6 ND | LLN link |Route-Over mesh|Ethernet/serial| Backbone | | | | | IPv6 ND RS | | | |-------------->| | | |-----------> | | | |------------------> | | | IPv6 ND RA | | | |<--------------| | | | | <once> | | | NS(EARO) | | | |-------------->| | | | 6LoWPAN ND | Extended DAR | | | |-------------->| | | | | NS(EARO) | | | |-------------->| | | | | NS-DAD | | | |------> | | | | (EARO) | | | | | | | NA(EARO) |<timeout> | | |<--------------| | | Extended DAC | | | |<--------------| | | NA(EARO) | | | |<--------------| | | | | | | Figure 2: Initial Registration Flow overMulti-Link SubnetMulti-link subnet An example Hub-and-Spoke is an OCB Road-Side Unit (RSU) that owns a prefix, provides Internet connectivity using that prefix to On-Board Units (OBUs) within its physical broadcast domain. An example of Route-Over MLSN is a collection of cars in a parking lot operating RPL to extend the connectivity provided by the RSU beyond its physical broadcast domain. Cars may then operate NEMO [RFC3963] for their own prefix using their address derived from the prefix of the RSU as CareOf Address.6.7. IANA Considerations This specification does not require IANA action.7.8. Security Considerations This specification refers to the security sections of IPv6 ND and WiND, respectively.8.9. Acknowledgments Many thanks to the participants of the 6lo WG where a lot of the work discussed here happened. Also ROLL, 6TiSCH, and 6LoWPAN.9. References 9.1.10. Normative References[I-D.ietf-6lo-ap-nd] Thubert, P., Sarikaya, B., Sethi, M., and R. Struik, "Address Protected Neighbor Discovery for Low-power and Lossy Networks", draft-ietf-6lo-ap-nd-12 (work in progress), April 2019. [I-D.ietf-6lo-backbone-router] Thubert, P., Perkins, C., and E. Levy-Abegnoli, "IPv6 Backbone Router", draft-ietf-6lo-backbone-router-13 (work in progress), September 2019.[RFC3963] Devarapalli, V., Wakikawa, R., Petrescu, A., and P. Thubert, "Network Mobility (NEMO) Basic Support Protocol", RFC 3963, DOI 10.17487/RFC3963, January 2005, <https://www.rfc-editor.org/info/rfc3963>. [RFC4191] Draves, R. and D. Thaler, "Default Router Preferences and More-Specific Routes", RFC 4191, DOI 10.17487/RFC4191, November 2005, <https://www.rfc-editor.org/info/rfc4191>. [RFC4861] Narten, T., Nordmark, E., Simpson, W., and H. Soliman, "Neighbor Discovery for IP version 6 (IPv6)", RFC 4861, DOI 10.17487/RFC4861, September 2007, <https://www.rfc-editor.org/info/rfc4861>. [RFC4862] Thomson, S., Narten, T., and T. Jinmei, "IPv6 Stateless Address Autoconfiguration", RFC 4862, DOI 10.17487/RFC4862, September 2007, <https://www.rfc-editor.org/info/rfc4862>. [RFC6275] Perkins, C., Ed., Johnson, D., and J. Arkko, "Mobility Support in IPv6", RFC 6275, DOI 10.17487/RFC6275, July 2011, <https://www.rfc-editor.org/info/rfc6275>. [RFC8200] Deering, S. and R. Hinden, "Internet Protocol, Version 6 (IPv6) Specification", STD 86, RFC 8200, DOI 10.17487/RFC8200, July 2017, <https://www.rfc-editor.org/info/rfc8200>. [RFC8505] Thubert, P., Ed., Nordmark, E., Chakrabarti, S., and C. Perkins, "Registration Extensions for IPv6 over Low-Power Wireless Personal Area Network (6LoWPAN) Neighbor Discovery", RFC 8505, DOI 10.17487/RFC8505, November 2018, <https://www.rfc-editor.org/info/rfc8505>.9.2. Informative References [I-D.bi-savi-wlan] Bi, J., Wu, J., Wang, Y.,[ADDR-PROTECT] Thubert, P., Sarikaya, B., Sethi, M., andT. Lin, "A SAVI SolutionR. Struik, "Address Protected Neighbor Discovery forWLAN", draft-bi-savi-wlan-17 (workLow-power and Lossy Networks", Work inprogress), May 2019. [I-D.ietf-6tisch-architecture]Progress, Internet-Draft, draft- ietf-6lo-ap-nd-20, 9 March 2020, <https://tools.ietf.org/html/draft-ietf-6lo-ap-nd-20>. [BB-ROUTER] Thubert, P.,"An Architecture for IPv6 over the TSCH mode of IEEE 802.15.4", draft-ietf-6tisch-architecture-26 (work in progress), August 2019. [I-D.ietf-mboned-ieee802-mcast-problems]Perkins, C.,McBride, M., Stanley,and E. Levy-Abegnoli, "IPv6 Backbone Router", Work in Progress, Internet-Draft, draft- ietf-6lo-backbone-router-20, 23 March 2020, <https://tools.ietf.org/html/draft-ietf-6lo-backbone- router-20>. 11. Informative References [RFC4291] Hinden, R. and S. Deering, "IP Version 6 Addressing Architecture", RFC 4291, DOI 10.17487/RFC4291, February 2006, <https://www.rfc-editor.org/info/rfc4291>. [RFC4903] Thaler, D.,Kumari, W.,"Multi-Link Subnet Issues", RFC 4903, DOI 10.17487/RFC4903, June 2007, <https://www.rfc-editor.org/info/rfc4903>. [RFC6550] Winter, T., Ed., Thubert, P., Ed., Brandt, A., Hui, J., Kelsey, R., Levis, P., Pister, K., Struik, R., Vasseur, JP., andJ. Zuniga, "Multicast ConsiderationsR. Alexander, "RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks", RFC 6550, DOI 10.17487/RFC6550, March 2012, <https://www.rfc-editor.org/info/rfc6550>. [RFC6775] Shelby, Z., Ed., Chakrabarti, S., Nordmark, E., and C. Bormann, "Neighbor Discovery Optimization for IPv6 overIEEE 802Low-Power WirelessMedia", draft-ietf-mboned-ieee802-mcast-problems-08 (work in progress), August 2019.Personal Area Networks (6LoWPANs)", RFC 6775, DOI 10.17487/RFC6775, November 2012, <https://www.rfc-editor.org/info/rfc6775>. [RFC7668] Nieminen, J., Savolainen, T., Isomaki, M., Patil, B., Shelby, Z., and C. Gomez, "IPv6 over BLUETOOTH(R) Low Energy", RFC 7668, DOI 10.17487/RFC7668, October 2015, <https://www.rfc-editor.org/info/rfc7668>. [RFC8273] Brzozowski, J. and G. Van de Velde, "Unique IPv6 Prefix per Host", RFC 8273, DOI 10.17487/RFC8273, December 2017, <https://www.rfc-editor.org/info/rfc8273>. [RFC8415] Mrugalski, T., Siodelski, M., Volz, B., Yourtchenko, A., Richardson, M., Jiang, S., Lemon, T., and T. Winters, "Dynamic Host Configuration Protocol for IPv6 (DHCPv6)", RFC 8415, DOI 10.17487/RFC8415, November 2018, <https://www.rfc-editor.org/info/rfc8415>. [I-D.ietf-rift-rift] Przygienda, T., Sharma, A., Thubert, P., Rijsman, B., and D. Afanasiev, "RIFT: Routing in Fat Trees",draft-ietf-rift-rift-08 (workWork inprogress), September 2019. [I-D.thubert-6lo-unicast-lookup]Progress, Internet-Draft, draft-ietf-rift-rift-11, 10 March 2020, <https://tools.ietf.org/html/draft-ietf-rift-rift-11>. [RPL-UNAWARE-LEAVES] Thubert, P. andE. Levy-Abegnoli, "IPv6 Neighbor Discovery Unicast Lookup", draft-thubert-6lo-unicast-lookup-00 (work in progress), January 2019. [I-D.thubert-roll-unaware-leaves] Thubert, P.,M. Richardson, "Routing for RPL Leaves",draft-thubert-roll- unaware-leaves-07 (work in progress), April 2019. [I-D.vyncke-6man-mcast-not-efficient]Work in Progress, Internet-Draft, draft-ietf-roll-unaware- leaves-13, 17 March 2020, <https://tools.ietf.org/html/ draft-ietf-roll-unaware-leaves-13>. [DAD-ISSUES] Yourtchenko, A. and E. Nordmark, "A survey of issues related to IPv6 Duplicate Address Detection", Work in Progress, Internet-Draft, draft-yourtchenko-6man-dad- issues-01, 3 March 2015, <https://tools.ietf.org/html/ draft-yourtchenko-6man-dad-issues-01>. [MCAST-EFFICIENCY] Vyncke, E., Thubert, P., Levy-Abegnoli, E., and A. Yourtchenko, "Why Network-Layer Multicast is Not Always Efficient At Datalink Layer",draft-vyncke-6man-mcast-not- efficient-01 (workWork inprogress),Progress, Internet- Draft, draft-vyncke-6man-mcast-not-efficient-01, 14 February2014. [I-D.yourtchenko-6man-dad-issues] Yourtchenko, A.2014, <https://tools.ietf.org/html/draft-vyncke- 6man-mcast-not-efficient-01>. [I-D.ietf-6tisch-architecture] Thubert, P., "An Architecture for IPv6 over the TSCH mode of IEEE 802.15.4", Work in Progress, Internet-Draft, draft-ietf-6tisch-architecture-28, 29 October 2019, <https://tools.ietf.org/html/draft-ietf-6tisch- architecture-28>. [MCAST-PROBLEMS] Perkins, C., McBride, M., Stanley, D., Kumari, W., andE. Nordmark,J. Zuniga, "Multicast Considerations over IEEE 802 Wireless Media", Work in Progress, Internet-Draft, draft-ietf- mboned-ieee802-mcast-problems-11, 11 December 2019, <https://tools.ietf.org/html/draft-ietf-mboned-ieee802- mcast-problems-11>. [SAVI] Bi, J., Wu, J., Wang, Y., and T. Lin, "Asurvey of issues related to IPv6 Duplicate Address Detection", draft- yourtchenko-6man-dad-issues-01 (workSAVI Solution for WLAN", Work inprogress), March 2015.Progress, Internet-Draft, draft-bi-savi- wlan-18, 17 November 2019, <https://tools.ietf.org/html/draft-bi-savi-wlan-18>. [UNICAST-AR] Thubert, P. and E. Levy-Abegnoli, "IPv6 Neighbor Discovery Unicast Lookup", Work in Progress, Internet-Draft, draft- thubert-6lo-unicast-lookup-00, 25 January 2019, <https://tools.ietf.org/html/draft-thubert-6lo-unicast- lookup-00>. [IEEE802154] IEEE standard for Information Technology, "IEEE Std. 802.15.4, Part. 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks".[IEEEstd8021] IEEE standard for Information Technology, "IEEE Standard for Information technology -- Telecommunications and information exchange between systems Local and metropolitan area networks Part 1: Bridging and Architecture".[IEEEstd80211] IEEE standard for Information Technology, "IEEE Standard for Information technology -- Telecommunications and information exchange between systems Local and metropolitan area networks-- Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications". [IEEEstd802151] IEEE standard for Information Technology, "IEEE Standard for Information Technology - Telecommunications and Information Exchange Between Systems - Local and Metropolitan Area Networks - Specific Requirements. - Part 15.1: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Wireless Personal Area Networks (WPANs)". [IEEEstd802154] IEEE standard for Information Technology, "IEEE Standard for Local and metropolitan area networks -- Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs)".[RFC4291] Hinden, R. and S. Deering, "IP Version 6 Addressing Architecture", RFC 4291, DOI 10.17487/RFC4291, February 2006, <https://www.rfc-editor.org/info/rfc4291>. [RFC4903] Thaler, D., "Multi-Link Subnet Issues", RFC 4903, DOI 10.17487/RFC4903, June 2007, <https://www.rfc-editor.org/info/rfc4903>. [RFC6550] Winter, T., Ed., Thubert, P., Ed., Brandt, A., Hui, J., Kelsey, R., Levis, P., Pister, K., Struik, R., Vasseur, JP., and R. Alexander, "RPL: IPv6 Routing Protocol[IEEEstd8021] IEEE standard forLow-Power and Lossy Networks", RFC 6550, DOI 10.17487/RFC6550, March 2012, <https://www.rfc-editor.org/info/rfc6550>. [RFC6775] Shelby, Z., Ed., Chakrabarti, S., Nordmark, E., and C. Bormann, "Neighbor Discovery OptimizationInformation Technology, "IEEE Standard forIPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs)", RFC 6775, DOI 10.17487/RFC6775, November 2012, <https://www.rfc-editor.org/info/rfc6775>. [RFC7668] Nieminen, J., Savolainen, T., Isomaki, M., Patil, B., Shelby, Z.,Information technology -- Telecommunications andC. Gomez, "IPv6 over BLUETOOTH(R) Low Energy", RFC 7668, DOI 10.17487/RFC7668, October 2015, <https://www.rfc-editor.org/info/rfc7668>. [RFC8273] Brzozowski, J.information exchange between systems Local andG. Van de Velde, "Unique IPv6 Prefix per Host", RFC 8273, DOI 10.17487/RFC8273, December 2017, <https://www.rfc-editor.org/info/rfc8273>.metropolitan area networks Part 1: Bridging and Architecture". Author's Address Pascal Thubert (editor) Cisco Systems, Inc Building D 45 Allee des Ormes - BP1200MOUGINS06254 Mougins - Sophia Antipolis06254 FRANCEFrance Phone: +33 497 23 26 34 Email: pthubert@cisco.com