| < draft-chakrabarti-nordmark-6man-efficient-nd-03.txt | draft-chakrabarti-nordmark-6man-efficient-nd-04.txt > | |||
|---|---|---|---|---|
| 6man WG S. Chakrabarti | 6man WG S. Chakrabarti | |||
| Internet-Draft Ericsson | Internet-Draft Ericsson | |||
| Updates: 4861 (if approved) E. Nordmark | Updates: 4861 (if approved) E. Nordmark | |||
| Intended status: Standards Track | Intended status: Standards Track Arista Networks | |||
| Expires: April 18, 2014 P. Thubert | Expires: April 25, 2014 P. Thubert | |||
| Cisco Systems | Cisco Systems | |||
| M. Wasserman | M. Wasserman | |||
| Painless Security | Painless Security | |||
| October 15, 2013 | October 22, 2013 | |||
| Wired and Wireless IPv6 Neighbor Discovery Optimizations | Wired and Wireless IPv6 Neighbor Discovery Optimizations | |||
| draft-chakrabarti-nordmark-6man-efficient-nd-03 | draft-chakrabarti-nordmark-6man-efficient-nd-04 | |||
| Abstract | Abstract | |||
| IPv6 Neighbor Discovery (RFC 4861) protocol has been designed for | IPv6 Neighbor Discovery (RFC 4861) protocol has been designed for | |||
| neighbor's address resolution, unreachability detection, address | neighbor's address resolution, unreachability detection, address | |||
| autoconfiguration, router advertisement and solicitation. With the | autoconfiguration, router advertisement and solicitation. With the | |||
| progress of Internet adoption on various industries including home, | progress of Internet adoption on various industries including home, | |||
| wireless, M2M and cellular networks there is a desire for optimizing | wireless, M2M and cellular networks there is a desire for optimizing | |||
| the legacy IPv6 Neighbor Discovery protocol. This document describes | the legacy IPv6 Neighbor Discovery protocol. This document describes | |||
| a method of optimization by reducing multicast messages and | a method of optimization by reducing multicast messages and | |||
| skipping to change at page 1, line 46 ¶ | skipping to change at page 1, line 46 ¶ | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at http://datatracker.ietf.org/drafts/current/. | Drafts is at http://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on April 18, 2014. | This Internet-Draft will expire on April 25, 2014. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2013 IETF Trust and the persons identified as the | Copyright (c) 2013 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (http://trustee.ietf.org/license-info) in effect on the date of | (http://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| carefully, as they describe your rights and restrictions with respect | carefully, as they describe your rights and restrictions with respect | |||
| skipping to change at page 2, line 37 ¶ | skipping to change at page 2, line 37 ¶ | |||
| 7. New Neighbor Discovery Options and Messages . . . . . . . . . 10 | 7. New Neighbor Discovery Options and Messages . . . . . . . . . 10 | |||
| 7.1. Address Registration Option . . . . . . . . . . . . . . . 10 | 7.1. Address Registration Option . . . . . . . . . . . . . . . 10 | |||
| 7.2. Refresh and De-registration . . . . . . . . . . . . . . . 12 | 7.2. Refresh and De-registration . . . . . . . . . . . . . . . 12 | |||
| 7.3. A New Router Advertisement Flag . . . . . . . . . . . . . 13 | 7.3. A New Router Advertisement Flag . . . . . . . . . . . . . 13 | |||
| 7.4. The Transaction Identification(TID) . . . . . . . . . . . 13 | 7.4. The Transaction Identification(TID) . . . . . . . . . . . 13 | |||
| 8. Efficiency-aware Neighbor Discovery Messages . . . . . . . . . 14 | 8. Efficiency-aware Neighbor Discovery Messages . . . . . . . . . 14 | |||
| 9. Efficiency-aware Host Behavior . . . . . . . . . . . . . . . . 15 | 9. Efficiency-aware Host Behavior . . . . . . . . . . . . . . . . 15 | |||
| 10. The Efficiency Aware Default Router (NEAR) Behavior . . . . . 16 | 10. The Efficiency Aware Default Router (NEAR) Behavior . . . . . 16 | |||
| 10.1. Router Configuration Modes . . . . . . . . . . . . . . . . 17 | 10.1. Router Configuration Modes . . . . . . . . . . . . . . . . 17 | |||
| 10.2. Movement Detection . . . . . . . . . . . . . . . . . . . . 17 | 10.2. Movement Detection . . . . . . . . . . . . . . . . . . . . 17 | |||
| 10.2.1. Registration ownership . . . . . . . . . . . . . . . 17 | 10.2.1. Registration ownership . . . . . . . . . . . . . . . 18 | |||
| 11. NCE Management in efficiency-aware Routers . . . . . . . . . . 18 | 11. NCE Management in efficiency-aware Routers . . . . . . . . . . 18 | |||
| 11.1. Handling ND DOS Attack . . . . . . . . . . . . . . . . . . 20 | 11.1. Handling ND DOS Attack . . . . . . . . . . . . . . . . . . 20 | |||
| 12. Mixed-Mode Operations . . . . . . . . . . . . . . . . . . . . 20 | 12. Mixed-Mode Operations . . . . . . . . . . . . . . . . . . . . 21 | |||
| 13. Bootstrapping . . . . . . . . . . . . . . . . . . . . . . . . 21 | 13. Bootstrapping . . . . . . . . . . . . . . . . . . . . . . . . 22 | |||
| 14. Handling Sleepy Nodes . . . . . . . . . . . . . . . . . . . . 23 | 14. Handling Sleepy Nodes . . . . . . . . . . . . . . . . . . . . 23 | |||
| 15. Duplicate Address Detection . . . . . . . . . . . . . . . . . 23 | 15. Duplicate Address Detection . . . . . . . . . . . . . . . . . 23 | |||
| 16. Mobility Considerations . . . . . . . . . . . . . . . . . . . 23 | 16. Mobility Considerations . . . . . . . . . . . . . . . . . . . 24 | |||
| 17. Other Considerations . . . . . . . . . . . . . . . . . . . . . 24 | 17. Other Considerations . . . . . . . . . . . . . . . . . . . . . 24 | |||
| 17.1. Detecting Network Attachment(DNA) . . . . . . . . . . . . 24 | 17.1. Detecting Network Attachment(DNA) . . . . . . . . . . . . 24 | |||
| 17.2. Proxying for Efficiency-Aware hosts . . . . . . . . . . . 24 | 17.2. Proxying for Efficiency-Aware hosts . . . . . . . . . . . 25 | |||
| 17.3. DHCPv6 Interaction . . . . . . . . . . . . . . . . . . . . 25 | 17.3. DHCPv6 Interaction . . . . . . . . . . . . . . . . . . . . 25 | |||
| 18. RPL Implications . . . . . . . . . . . . . . . . . . . . . . . 25 | 18. VRRP Interaction . . . . . . . . . . . . . . . . . . . . . . . 26 | |||
| 19. Updated Neighbor Discovery Constants . . . . . . . . . . . . . 26 | 19. RPL Implications . . . . . . . . . . . . . . . . . . . . . . . 26 | |||
| 20. Security Considerations . . . . . . . . . . . . . . . . . . . 26 | 20. Updated Neighbor Discovery Constants . . . . . . . . . . . . . 26 | |||
| 21. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 26 | 21. Security Considerations . . . . . . . . . . . . . . . . . . . 27 | |||
| 22. Changelog . . . . . . . . . . . . . . . . . . . . . . . . . . 26 | 22. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 27 | |||
| 23. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 27 | 23. Changelog . . . . . . . . . . . . . . . . . . . . . . . . . . 27 | |||
| 24. References . . . . . . . . . . . . . . . . . . . . . . . . . . 27 | 24. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 27 | |||
| 24.1. Normative References . . . . . . . . . . . . . . . . . . . 27 | 25. References . . . . . . . . . . . . . . . . . . . . . . . . . . 28 | |||
| 24.2. Informative References . . . . . . . . . . . . . . . . . . 28 | 25.1. Normative References . . . . . . . . . . . . . . . . . . . 28 | |||
| Appendix A. Usecase Analysis . . . . . . . . . . . . . . . . . . 29 | 25.2. Informative References . . . . . . . . . . . . . . . . . . 28 | |||
| A.1. Data Center Routers on the link . . . . . . . . . . . . . 29 | Appendix A. Usecase Analysis . . . . . . . . . . . . . . . . . . 30 | |||
| A.2. Edge Routers and Home Networks . . . . . . . . . . . . . . 29 | A.1. Data Center Routers on the link . . . . . . . . . . . . . 30 | |||
| A.2. Edge Routers and Home Networks . . . . . . . . . . . . . . 30 | ||||
| A.3. M2M Networks . . . . . . . . . . . . . . . . . . . . . . . 30 | A.3. M2M Networks . . . . . . . . . . . . . . . . . . . . . . . 30 | |||
| A.4. Wi-fi Networks . . . . . . . . . . . . . . . . . . . . . . 30 | A.4. Wi-fi Networks . . . . . . . . . . . . . . . . . . . . . . 31 | |||
| A.5. 3GPP Networks . . . . . . . . . . . . . . . . . . . . . . 30 | A.5. 3GPP Networks . . . . . . . . . . . . . . . . . . . . . . 31 | |||
| A.6. Industrial Networks . . . . . . . . . . . . . . . . . . . 31 | A.6. Industrial Networks . . . . . . . . . . . . . . . . . . . 31 | |||
| A.7. Set and forget offline network . . . . . . . . . . . . . . 31 | A.7. Set and forget offline network . . . . . . . . . . . . . . 31 | |||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 31 | Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 31 | |||
| 1. Introduction | 1. Introduction | |||
| Conceptually, IPv6 multicast messages are supposed to avoid broadcast | Conceptually, IPv6 multicast messages are supposed to avoid broadcast | |||
| messages, but in practice, the multicast operation at the link level | messages, but in practice, the multicast operation at the link level | |||
| is that of a broadcast nevertheless. This did not matter much at the | is that of a broadcast nevertheless. This did not matter much at the | |||
| time ND [ND] was originally designed, when an Ethernet network was | time ND [ND] was originally designed, when an Ethernet network was | |||
| skipping to change at page 15, line 46 ¶ | skipping to change at page 15, line 46 ¶ | |||
| Registration Authority and RFC 2373. If this draft feature is | Registration Authority and RFC 2373. If this draft feature is | |||
| implemented and configured, the host MUST NOT re-direct Neighbor | implemented and configured, the host MUST NOT re-direct Neighbor | |||
| Discovery messages. The host is not required to join the solicited- | Discovery messages. The host is not required to join the solicited- | |||
| node multicast address but it MUST join the all-node multicast | node multicast address but it MUST join the all-node multicast | |||
| address. | address. | |||
| A host always sends packets to (one of) its default router(s). This | A host always sends packets to (one of) its default router(s). This | |||
| is accomplished by the routers never setting the 'L' flag in the | is accomplished by the routers never setting the 'L' flag in the | |||
| Prefix options. | Prefix options. | |||
| The EAH host may register with more than one default routers in a | ||||
| subnet but it SHOULD use one default primary router for a source IP- | ||||
| address at a time. | ||||
| If an EAH receives a status code 2 in response to its registration | ||||
| request from a NEAR router, the node MUST be able to choose another | ||||
| router to register with (when available). | ||||
| The host is unable to forward routes or participate in a routing | The host is unable to forward routes or participate in a routing | |||
| protocol. A legacy IPv6 Host compliant EAH SHOULD be able to fall | protocol. A legacy IPv6 Host compliant EAH SHOULD be able to fall | |||
| back to RFC 4861 host behavior if there is no efficiency-aware router | back to RFC 4861 host behavior if there is no efficiency-aware router | |||
| (NEAR) in the link. | (NEAR) in the link. | |||
| The efficiency-aware host MUST NOT send or accept re-direct messages. | The efficiency-aware host MUST NOT send or accept re-direct messages. | |||
| It does not join solicited node multicast address. | It does not join solicited node multicast address. | |||
| If the EAH is capable of generating TID and configured for this | If the EAH is capable of generating TID and configured for this | |||
| operation, the EAH MUST use the TID field and appropriate associated | operation, the EAH MUST use the TID field and appropriate associated | |||
| operation bits in the ARO message during registration and refresh. | operation bits in the ARO message during registration and refresh. | |||
| In some cases, hosts may need to send MAX_RTR_SOLICITATIONS(3) to | In some cases, hosts may need to send MAX_RTR_SOLICITATIONS(3) to | |||
| receive the reply back from the default router. In a lossy link or | receive the reply back from the default router. In a lossy link or | |||
| due to sleepy default router, the hosts may have to send more than 3 | due to sleepy default router, the hosts may have to send more than 3 | |||
| solicitations [Resilient-RS]. But this can easily increase the | solicitations [Resilient-RS]. But this can easily increase the | |||
| number of siganling traffic in the network. Thus it is RECOMMEDED | number of siganling traffic in the network. Thus it is RECOMMENDED | |||
| that the EAH nodes start with the default MAX_RTR_SOLICITATION [ND] | that the EAH nodes start with the default MAX_RTR_SOLICITATION [ND] | |||
| value in a low power network. | value in a low power network. | |||
| However, in some scenarios the packet loss resilient router | However, in some scenarios the packet loss resilient router | |||
| solicitation method may be applicable [Resilient-RS]. | solicitation method may be applicable [Resilient-RS]. | |||
| 10. The Efficiency Aware Default Router (NEAR) Behavior | 10. The Efficiency Aware Default Router (NEAR) Behavior | |||
| The main purpose of the default router in the context of this | The main purpose of the default router in the context of this | |||
| document is to receive and process the registration request, forward | document is to receive and process the registration request, forward | |||
| skipping to change at page 17, line 14 ¶ | skipping to change at page 17, line 22 ¶ | |||
| protects the router from Denial Of Service attacks. Similarly, if | protects the router from Denial Of Service attacks. Similarly, if | |||
| Neighbor Unreachability Detection on the router determines that the | Neighbor Unreachability Detection on the router determines that the | |||
| host is UNREACHABLE (based on the logic in [ND]), the Neighbor Cache | host is UNREACHABLE (based on the logic in [ND]), the Neighbor Cache | |||
| entry SHOULD NOT be deleted but be retained until the Registration | entry SHOULD NOT be deleted but be retained until the Registration | |||
| Lifetime expires. If an ARO arrives for an NCE that is in | Lifetime expires. If an ARO arrives for an NCE that is in | |||
| UNCREACHABLE state, that NCE should be marked as STALE. | UNCREACHABLE state, that NCE should be marked as STALE. | |||
| A default router keeps a cache for all the nodes' IP addresses, | A default router keeps a cache for all the nodes' IP addresses, | |||
| created from the Address Registration processing. | created from the Address Registration processing. | |||
| The NEAR router SHOULD deny registration to a new registration | ||||
| request with the status code 2 when it reaches the maximum capacity | ||||
| for handling the neighbor cache. | ||||
| 10.1. Router Configuration Modes | 10.1. Router Configuration Modes | |||
| An efficiency-aware Router(NEAR) MUST be able to configure in | An efficiency-aware Router(NEAR) MUST be able to configure in | |||
| efficiency-aware-only mode where it will expect all hosts register | efficiency-aware-only mode where it will expect all hosts register | |||
| with the router following RS; thus NEAR will not support legacy | with the router following RS; thus NEAR will not support legacy | |||
| hosts. However, it will create legacy NCE for the routers in the | hosts. However, it will create legacy NCE for the routers in the | |||
| network assuming that the routers do not register with it. This mode | network assuming that the routers do not register with it. This mode | |||
| is able to prevent ND flooding on the link. | is able to prevent ND flooding on the link. | |||
| An efficiency-aware Router(NEAR) SHOULD be able to have configuration | An efficiency-aware Router(NEAR) SHOULD be able to have configuration | |||
| skipping to change at page 18, line 14 ¶ | skipping to change at page 18, line 27 ¶ | |||
| subtracting the present time from the registration received time | subtracting the present time from the registration received time | |||
| recorded at the NCE. The NEAR router then responds with a NA with | recorded at the NCE. The NEAR router then responds with a NA with | |||
| ARO option Status being equal to 3 and replaces the 'registration | ARO option Status being equal to 3 and replaces the 'registration | |||
| lifetime' field with the 'age' of registration. Upon receiving the | lifetime' field with the 'age' of registration. Upon receiving the | |||
| NA from the neighboring routers the prospective default router | NA from the neighboring routers the prospective default router | |||
| determines its registration ownership. If the other router | determines its registration ownership. If the other router | |||
| registration age is higher than its own registration age, then the | registration age is higher than its own registration age, then the | |||
| current router is considered to have the most recent registration | current router is considered to have the most recent registration | |||
| ownership. | ownership. | |||
| If both routers registration age are zero or within a 50msec window, | If both routers registration age are zero or within | |||
| then the TID field is used to determine the ownership. The higher | MAX_REG_AGE_DIFFERENCE window, then the TID field is used to | |||
| value of TID wins. Note that the registration ownership and local | determine the ownership. The higher value of TID wins. Note that | |||
| movement detection behavior in NEAR router MUST be optionally | the registration ownership and local movement detection behavior in | |||
| configured. The NEAR routers MAY implement this feature. | NEAR router MUST be optionally configured. The NEAR routers MAY | |||
| Configuring this option is needed when the NEAR routers are used in a | implement this feature. Configuring this option is needed when the | |||
| low power and lossy network environment. | NEAR routers are used in a low power and lossy network environment. | |||
| 11. NCE Management in efficiency-aware Routers | 11. NCE Management in efficiency-aware Routers | |||
| The use of explicit registrations with lifetimes plus the desire to | The use of explicit registrations with lifetimes plus the desire to | |||
| not multicast Neighbor Solicitation messages for hosts imply that we | not multicast Neighbor Solicitation messages for hosts imply that we | |||
| manage the Neighbor Cache entries slightly differently than in [ND]. | manage the Neighbor Cache entries slightly differently than in [ND]. | |||
| This results in two different types of NCEs and the types specify how | This results in two different types of NCEs and the types specify how | |||
| those entries can be removed: | those entries can be removed: | |||
| Legacy: Entries that are subject to the normal rules in | Legacy: Entries that are subject to the normal rules in | |||
| skipping to change at page 21, line 37 ¶ | skipping to change at page 21, line 48 ¶ | |||
| available in the network during the startup. If the EAH was | available in the network during the startup. If the EAH was | |||
| operational in efficiency-aware mode and it determines that the NEAR | operational in efficiency-aware mode and it determines that the NEAR | |||
| is no longer available, then it should send a RS and find an | is no longer available, then it should send a RS and find an | |||
| alternate default router in the link. If no efficiency-aware router | alternate default router in the link. If no efficiency-aware router | |||
| is indicated from the RA, then the EAH SHOULD fall back into RFC 4861 | is indicated from the RA, then the EAH SHOULD fall back into RFC 4861 | |||
| behavior. On the other hand, in the efficiency-aware mode EAH SHOULD | behavior. On the other hand, in the efficiency-aware mode EAH SHOULD | |||
| ignore multicast Router Advertisements(RA) sent by the legacy and | ignore multicast Router Advertisements(RA) sent by the legacy and | |||
| Mixed-mode routers in the link. | Mixed-mode routers in the link. | |||
| In mixed mode operation, the Router SHOULD be able to do local | In mixed mode operation, the Router SHOULD be able to do local | |||
| movement detection based on ARO if it is configured for that | movement detection based on ARO from EAH hosts. For the legacy | |||
| operation for EAH hosts. For the legacy hosts, the mixed-mode router | hosts, the mixed-mode router MAY follow classical IPv6 methods of | |||
| MAY follow classical IPv6 methods of movement detection and MAY act | movement detection and MAY act as ND proxy by sending NA with 'O' | |||
| as ND proxy by sending NA with 'O' bit.[ Reference??] | bit.[RFC 3775] | |||
| The routers that are running on efficiency-aware mode or legacy mode | The routers that are running on efficiency-aware mode or legacy mode | |||
| SHOULD NOT dynamically switch the mode without flushing the Neighbor | SHOULD NOT dynamically switch the mode without flushing the Neighbor | |||
| Cache Entries. | Cache Entries. | |||
| In mixed mode, the NEAR SHOULD have a configurable interval for | In mixed mode, the NEAR SHOULD have a configurable interval for | |||
| periodic unsolicited router advertisements based on the media type. | periodic unsolicited router advertisements based on the media type. | |||
| 13. Bootstrapping | 13. Bootstrapping | |||
| The bootstrapping mechanism described here is applicable for the | The bootstrapping mechanism described here is applicable for the | |||
| skipping to change at page 25, line 40 ¶ | skipping to change at page 26, line 5 ¶ | |||
| MUST be notified by NEAR for its efficiency-aware service interfaces. | MUST be notified by NEAR for its efficiency-aware service interfaces. | |||
| DHCPv6 server then SHOULD inform the DHCP requestor node about the | DHCPv6 server then SHOULD inform the DHCP requestor node about the | |||
| default-rotuer capability during the address assignment period. | default-rotuer capability during the address assignment period. | |||
| Although the solution described in this document prevents unnecesary | Although the solution described in this document prevents unnecesary | |||
| multicast messages in the IPv6 ND procedure, it does not affect | multicast messages in the IPv6 ND procedure, it does not affect | |||
| normal IPv6 multicast packets and ability of nodes to join and leave | normal IPv6 multicast packets and ability of nodes to join and leave | |||
| the multicast group or forwarding multicast traffic or responding to | the multicast group or forwarding multicast traffic or responding to | |||
| multicast queries. | multicast queries. | |||
| 18. RPL Implications | 18. VRRP Interaction | |||
| TBD: This section will discuss if efficient ND mixed mode and | ||||
| efficiency mode require any special consideration with VRRP function. | ||||
| 19. RPL Implications | ||||
| RPL [RFC6550] does not provide means for duplicate address detection | RPL [RFC6550] does not provide means for duplicate address detection | |||
| and in particular does not have a concept of unique identifier. On | and in particular does not have a concept of unique identifier. On | |||
| the other hand, RPL is designed to discover and resolve conflicts | the other hand, RPL is designed to discover and resolve conflicts | |||
| that arise when a mobile device changes its point of attachment, with | that arise when a mobile device changes its point of attachment, with | |||
| a sequence counter that is owned by the device and incremented at | a sequence counter that is owned by the device and incremented at | |||
| each new registration, called a DAOSequence. As we extend 6LoWPAN ND | each new registration, called a DAOSequence. As we extend 6LoWPAN ND | |||
| operation over a backbone and scale, there is a similar need to | operation over a backbone and scale, there is a similar need to | |||
| resolve the latest point of attachment of a device, whether this | resolve the latest point of attachment of a device, whether this | |||
| device moves at layer 2 over a WIFI infrastructure, or at layer 3 | device moves at layer 2 over a WIFI infrastructure, or at layer 3 | |||
| within a RPL DODAG or from a DODAG to another one attached to the | within a RPL DODAG or from a DODAG to another one attached to the | |||
| same backbone. In order to cover all cases in a consistent fashion, | same backbone. In order to cover all cases in a consistent fashion, | |||
| this document requires that a sequence counter call TID for | this document requires that a sequence counter call TID for | |||
| Transaction ID and with the similar rules as the RPL DAOSequence is | Transaction ID and with the similar rules as the RPL DAOSequence is | |||
| added to the ND registration. This document defines the TID | added to the ND registration. This document defines the TID | |||
| operations and RPL may use the reserved fields for their purpose | operations and RPL may use the reserved fields for their purpose | |||
| inside the LLN. | inside the LLN. | |||
| 19. Updated Neighbor Discovery Constants | 20. Updated Neighbor Discovery Constants | |||
| This section discusses the updated default values of ND constants | This section discusses the updated default values of ND constants | |||
| based on [ND] section 10. New and changed constants are listed only | based on [ND] section 10. New and changed constants are listed only | |||
| for efficiency-aware-nd implementation. These values SHOULD be | for efficiency-aware-nd implementation. These values SHOULD be | |||
| configurable and tunable to fit implementations and deployment. | configurable and tunable to fit implementations and deployment. | |||
| Router Constants: | Router Constants: | |||
| MAX_RTR_ADVERTISEMENTS(NEW) 3 transmissions | MAX_RTR_ADVERTISEMENTS(NEW) 3 transmissions | |||
| MIN_DELAY_BETWEEN_RAS(CHANGED) 1 second | MIN_DELAY_BETWEEN_RAS(CHANGED) 1 second | |||
| TENTATIVE_LEGACY_NCE_LIFETIME(NEW) 30 seconds | TENTATIVE_LEGACY_NCE_LIFETIME(NEW) 30 seconds | |||
| MAX_REG_AGE_DIFFERENCE(NEW) 50 mseconds | ||||
| Host Constants: | Host Constants: | |||
| MAX_RTR_SOLICITATION_INTERVAL(NEW) 60 seconds | MAX_RTR_SOLICITATION_INTERVAL(NEW) 60 seconds | |||
| Also refer to [ENH-ND] , [IMPAT-ND] and [6LOWPAN-ND] for further | Also refer to [ENH-ND] , [IMPAT-ND] and [6LOWPAN-ND] for further | |||
| tuning of ND constants. | tuning of ND constants. | |||
| 20. Security Considerations | 21. Security Considerations | |||
| These optimizations are not known to introduce any new threats | These optimizations are not known to introduce any new threats | |||
| against Neighbor Discovery beyond what is already documented for IPv6 | against Neighbor Discovery beyond what is already documented for IPv6 | |||
| [RFC 3756]. | [RFC 3756]. | |||
| Section 11.2 of [ND] applies to this document as well. | Section 11.2 of [ND] applies to this document as well. | |||
| This mechanism minimizes the possibility of ND /64 DOS attacks in | This mechanism minimizes the possibility of ND /64 DOS attacks in | |||
| efficiency-aware mode. See Section 11.1. | efficiency-aware mode. See Section 11.1. | |||
| 21. IANA Considerations | 22. IANA Considerations | |||
| A new flag (E-bit) in RA has been introduced. IANA assignment of the | A new flag (E-bit) in RA has been introduced. IANA assignment of the | |||
| E-bit flag is required upon approval of this document. | E-bit flag is required upon approval of this document. | |||
| 22. Changelog | 23. Changelog | |||
| Changes from draft-chakrabarti-nordmark-energy-aware-nd-02: | Changes from draft-chakrabarti-nordmark-energy-aware-nd-02: | |||
| o Added clarification that SLLA is not required for ARO in a | o Added clarification that SLLA is not required for ARO in a | |||
| point-to-point link | point-to-point link | |||
| o Clarified that the document is indeed an optimization for legacy | o Clarified that the document is indeed an optimization for legacy | |||
| IPv6 ND | IPv6 ND | |||
| o Adressed editorial comments and fixed typoes. Some more | o Adressed editorial comments and fixed typoes. Some more | |||
| editorial work is needed | editorial work is needed | |||
| o Added another usecase for Z-Wave example. Clarified 3GPP | o Added another usecase for Z-Wave example. Clarified 3GPP | |||
| Networks related comments on existing ND optimizations. | Networks related comments on existing ND optimizations. | |||
| 23. Acknowledgements | 24. Acknowledgements | |||
| The primary idea of this document are from 6LoWPAN Neighbor Discovery | The primary idea of this document are from 6LoWPAN Neighbor Discovery | |||
| document [6LOWPAN-ND] and the discussions from the 6lowpan working | document [6LOWPAN-ND] and the discussions from the 6lowpan working | |||
| group members, chairs Carsten Bormann and Geoff Mulligan and through | group members, chairs Carsten Bormann and Geoff Mulligan and through | |||
| our discussions with Zach Shelby, editor of the [6LOWPAN-ND]. | our discussions with Zach Shelby, editor of the [6LOWPAN-ND]. | |||
| The inspiration of such a IPv6 generic document came from Margaret | The inspiration of such a IPv6 generic document came from Margaret | |||
| Wasserman who saw a need for such a document at the IOT workshop at | Wasserman who saw a need for such a document at the IOT workshop at | |||
| Prague IETF. | Prague IETF. | |||
| skipping to change at page 27, line 37 ¶ | skipping to change at page 28, line 10 ¶ | |||
| by Joel Halpern. Thanks to Joel Halpern for pinpointing the problems | by Joel Halpern. Thanks to Joel Halpern for pinpointing the problems | |||
| that are now addressed in the NCE management section. | that are now addressed in the NCE management section. | |||
| The authors like to thank Dave Thaler, Stuart Cheshire, Jari Arkko, | The authors like to thank Dave Thaler, Stuart Cheshire, Jari Arkko, | |||
| Ylva Jading, Niklas J. Johnsson, Reda Nedjar, Purvi Shah, Jaume Rius | Ylva Jading, Niklas J. Johnsson, Reda Nedjar, Purvi Shah, Jaume Rius | |||
| Riu, Fredrik Garneij, Andrew Yourtchenko, Jouni Korhonen, Suresh | Riu, Fredrik Garneij, Andrew Yourtchenko, Jouni Korhonen, Suresh | |||
| Krishnan, Brian Haberman, Anders Brandt, Mark Smith, Lorenzo Colitti, | Krishnan, Brian Haberman, Anders Brandt, Mark Smith, Lorenzo Colitti, | |||
| David Miles and Carsten Bormann for their useful comments and | David Miles and Carsten Bormann for their useful comments and | |||
| suggestions on this work. | suggestions on this work. | |||
| 24. References | 25. References | |||
| 24.1. Normative References | 25.1. Normative References | |||
| [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | |||
| Requirement Levels", BCP 14, RFC 2119, March 1997. | Requirement Levels", BCP 14, RFC 2119, March 1997. | |||
| [RFC2434] Narten, T. and H. Alvestrand, "Guidelines for Writing an | [RFC2434] Narten, T. and H. Alvestrand, "Guidelines for Writing an | |||
| IANA Considerations Section in RFCs", BCP 26, RFC 2434, | IANA Considerations Section in RFCs", BCP 26, RFC 2434, | |||
| October 1998. | October 1998. | |||
| [6LOWPAN-ND] | [6LOWPAN-ND] | |||
| Shelby, Z., Chakrabarti, S., Nordmark, E., and C. Bormann, | Shelby, Z., Chakrabarti, S., Nordmark, E., and C. Bormann, | |||
| skipping to change at page 28, line 17 ¶ | skipping to change at page 28, line 37 ¶ | |||
| September 2007. | September 2007. | |||
| [LOWPAN] Montenegro, G. and N. Kushalnagar, "Transmission of IPv6 | [LOWPAN] Montenegro, G. and N. Kushalnagar, "Transmission of IPv6 | |||
| Packets over IEEE 802.15.4 networks", RFC 4944, | Packets over IEEE 802.15.4 networks", RFC 4944, | |||
| September 2007. | September 2007. | |||
| [LOWPANG] Kushalnagar, N. and G. Montenegro, "6LoWPAN: Overview, | [LOWPANG] Kushalnagar, N. and G. Montenegro, "6LoWPAN: Overview, | |||
| Assumptions, Problem Statement and Goals", RFC 4919, | Assumptions, Problem Statement and Goals", RFC 4919, | |||
| August 2007. | August 2007. | |||
| 24.2. Informative References | 25.2. Informative References | |||
| [IPV6] Deering, S. and R. Hinden, "Internet Protocol, Version 6 | [IPV6] Deering, S. and R. Hinden, "Internet Protocol, Version 6 | |||
| (IPv6), Specification", RFC 2460, December 1998. | (IPv6), Specification", RFC 2460, December 1998. | |||
| [DNA] Krishnan, S. and G. Daley, "Simple Procedures for | [DNA] Krishnan, S. and G. Daley, "Simple Procedures for | |||
| Detecting Network Attachments in IPv6", RFC 6059, | Detecting Network Attachments in IPv6", RFC 6059, | |||
| November 2010. | November 2010. | |||
| [RFC6550] "RPL: IPv6 Routing Protocol for Low-Power and Lossy | [RFC6550] "RPL: IPv6 Routing Protocol for Low-Power and Lossy | |||
| Networks", RFC 6550, March 2012. | Networks", RFC 6550, March 2012. | |||
| skipping to change at page 31, line 33 ¶ | skipping to change at page 32, line 15 ¶ | |||
| Authors' Addresses | Authors' Addresses | |||
| Samita Chakrabarti | Samita Chakrabarti | |||
| Ericsson | Ericsson | |||
| San Jose, CA | San Jose, CA | |||
| USA | USA | |||
| Email: samita.chakrabarti@ericsson.com | Email: samita.chakrabarti@ericsson.com | |||
| Erik Nordmark | Erik Nordmark | |||
| Arista Networks | ||||
| San Jose, CA | San Jose, CA | |||
| USA | USA | |||
| Email: nordmark@sonic.net | Email: nordmark@sonic.net | |||
| Pascal Thubert | Pascal Thubert | |||
| Cisco Systems | Cisco Systems | |||
| Email: pthubert@cisco.com | Email: pthubert@cisco.com | |||
| Margaret Wasserman | Margaret Wasserman | |||
| Painless Security | Painless Security | |||
| Email: mrw@lilacglade.org | Email: mrw@lilacglade.org | |||
| End of changes. 29 change blocks. | ||||
| 48 lines changed or deleted | 66 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||