| < draft-ietf-6lo-dect-ule-01.txt | draft-ietf-6lo-dect-ule-02.txt > | |||
|---|---|---|---|---|
| 6Lo Working Group P. Mariager | 6Lo Working Group P. Mariager | |||
| Internet-Draft J. Petersen, Ed. | Internet-Draft J. Petersen, Ed. | |||
| Intended status: Standards Track RTX A/S | Intended status: Standards Track RTX A/S | |||
| Expires: July 31, 2015 Z. Shelby | Expires: January 4, 2016 Z. Shelby | |||
| ARM | ARM | |||
| M. Van de Logt | M. Van de Logt | |||
| Gigaset Communications GmbH | Gigaset Communications GmbH | |||
| D. Barthel | D. Barthel | |||
| Orange Labs | Orange Labs | |||
| January 27, 2015 | July 3, 2015 | |||
| Transmission of IPv6 Packets over DECT Ultra Low Energy | Transmission of IPv6 Packets over DECT Ultra Low Energy | |||
| draft-ietf-6lo-dect-ule-01 | draft-ietf-6lo-dect-ule-02 | |||
| Abstract | Abstract | |||
| DECT Ultra Low Energy is a low power air interface technology that is | DECT Ultra Low Energy is a low power air interface technology that is | |||
| defined by the DECT Forum and specified by ETSI. | defined by the DECT Forum and specified by ETSI. | |||
| The DECT air interface technology has been used world-wide in | The DECT air interface technology has been used world-wide in | |||
| communication devices for more than 20 years, primarily carrying | communication devices for more than 20 years, primarily carrying | |||
| voice for cordless telephony but has also been deployed for data | voice for cordless telephony but has also been deployed for data | |||
| centric services. | centric services. | |||
| skipping to change at page 2, line 10 ¶ | skipping to change at page 2, line 10 ¶ | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at http://datatracker.ietf.org/drafts/current/. | Drafts is at http://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on July 31, 2015. | This Internet-Draft will expire on January 4, 2016. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2015 IETF Trust and the persons identified as the | Copyright (c) 2015 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (http://trustee.ietf.org/license-info) in effect on the date of | (http://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| skipping to change at page 2, line 41 ¶ | skipping to change at page 2, line 41 ¶ | |||
| 1.2. Terms Used . . . . . . . . . . . . . . . . . . . . . . . 3 | 1.2. Terms Used . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
| 2. DECT Ultra Low Energy . . . . . . . . . . . . . . . . . . . . 4 | 2. DECT Ultra Low Energy . . . . . . . . . . . . . . . . . . . . 4 | |||
| 2.1. The DECT ULE Protocol Stack . . . . . . . . . . . . . . . 4 | 2.1. The DECT ULE Protocol Stack . . . . . . . . . . . . . . . 4 | |||
| 2.2. Link layer roles and topology . . . . . . . . . . . . . . 6 | 2.2. Link layer roles and topology . . . . . . . . . . . . . . 6 | |||
| 2.3. Addressing Model . . . . . . . . . . . . . . . . . . . . 6 | 2.3. Addressing Model . . . . . . . . . . . . . . . . . . . . 6 | |||
| 2.4. MTU Considerations . . . . . . . . . . . . . . . . . . . 7 | 2.4. MTU Considerations . . . . . . . . . . . . . . . . . . . 7 | |||
| 2.5. Additional Considerations . . . . . . . . . . . . . . . . 7 | 2.5. Additional Considerations . . . . . . . . . . . . . . . . 7 | |||
| 3. Specification of IPv6 over DECT ULE . . . . . . . . . . . . . 7 | 3. Specification of IPv6 over DECT ULE . . . . . . . . . . . . . 7 | |||
| 3.1. Protocol stack . . . . . . . . . . . . . . . . . . . . . 8 | 3.1. Protocol stack . . . . . . . . . . . . . . . . . . . . . 8 | |||
| 3.2. Link model . . . . . . . . . . . . . . . . . . . . . . . 8 | 3.2. Link model . . . . . . . . . . . . . . . . . . . . . . . 8 | |||
| 3.3. Internet connectivity scenarios . . . . . . . . . . . . . 12 | 3.3. Subnets and Internet connectivity scenarios . . . . . . . 12 | |||
| 4. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 13 | 4. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 14 | |||
| 5. Security Considerations . . . . . . . . . . . . . . . . . . . 13 | 5. Security Considerations . . . . . . . . . . . . . . . . . . . 14 | |||
| 6. ETSI Considerations . . . . . . . . . . . . . . . . . . . . . 14 | 6. ETSI Considerations . . . . . . . . . . . . . . . . . . . . . 14 | |||
| 7. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 14 | 7. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 14 | |||
| 8. References . . . . . . . . . . . . . . . . . . . . . . . . . 14 | 8. References . . . . . . . . . . . . . . . . . . . . . . . . . 15 | |||
| 8.1. Normative References . . . . . . . . . . . . . . . . . . 14 | 8.1. Normative References . . . . . . . . . . . . . . . . . . 15 | |||
| 8.2. Informative References . . . . . . . . . . . . . . . . . 15 | 8.2. Informative References . . . . . . . . . . . . . . . . . 16 | |||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 16 | Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 17 | |||
| 1. Introduction | 1. Introduction | |||
| DECT Ultra Low Energy (DECT ULE or just ULE) is an air interface | DECT Ultra Low Energy (DECT ULE or just ULE) is an air interface | |||
| technology building on the key fundamentals of traditional DECT / | technology building on the key fundamentals of traditional DECT / | |||
| CAT-iq but with specific changes to significantly reduce the power | CAT-iq but with specific changes to significantly reduce the power | |||
| consumption on the expense of data throughput. DECT ULE devices with | consumption at the expense of data throughput. DECT ULE devices with | |||
| requirements to power consumption will operate on special power | requirements on power consumption will operate on special power | |||
| optimized silicon, but can connect to a DECT Gateway supporting | optimized silicon, but can connect to a DECT Gateway supporting | |||
| traditional DECT / CAT-iq for cordless telephony and data as well as | traditional DECT / CAT-iq for cordless telephony and data as well as | |||
| the ULE extensions. DECT terminology operates with two major role | the ULE extensions. DECT terminology operates with two major role | |||
| definitions: The Portable Part (PP) is the power constrained device, | definitions: The Portable Part (PP) is the power constrained device, | |||
| while the Fixed Part (FP) is the Gateway or base station. This FP | while the Fixed Part (FP) is the Gateway or base station. This FP | |||
| may be connected to the Internet. An example of a use case for DECT | may be connected to the Internet. An example of a use case for DECT | |||
| ULE is a home security sensor transmitting small amounts of data (few | ULE is a home security sensor transmitting small amounts of data (few | |||
| bytes) at periodic intervals through the FP, but is able to wake up | bytes) at periodic intervals through the FP, but is able to wake up | |||
| upon an external event (burglar) and communicate with the FP. | upon an external event (burglar) and communicate with the FP. | |||
| Another example incorporating both DECT ULE as well as traditional | Another example incorporating both DECT ULE as well as traditional | |||
| CAT-iq telephony is an elderly pendant (broche) which can transmit | CAT-iq telephony is an elderly pendant (broche) which can transmit | |||
| periodic status messages to a care provider using very little | periodic status messages to a care provider using very little | |||
| battery, but in the event of urgency, the elderly person can | battery, but in the event of urgency, the elderly person can | |||
| establish a voice connection through the pendant to an alarm service. | establish a voice connection through the pendant to an alarm service. | |||
| It is expected that DECT ULE will be integrated into many residential | It is expected that DECT ULE will be integrated into many residential | |||
| gateways, as many of these already implements DECT CAT-iq for | gateways, as many of these already implements DECT CAT-iq for | |||
| cordless telephony. DECT ULE can be added as a software option for | cordless telephony. DECT ULE can be added as a software option for | |||
| the FP. It is desirable to consider IPv6 for DECT ULE devices due to | the FP. It is desirable to consider IPv6 for DECT ULE devices due to | |||
| the large address space and well-known infrastructure. This document | the large address space and well-known infrastructure. This document | |||
| describes how IPv6 is used on DECT ULE links to optimize power while | describes how IPv6 is used on DECT ULE links to optimize power while | |||
| maintaining the many benefits of IPv6 transmission. [RFC4944] | maintaining the many benefits of IPv6 transmission. [RFC4944], | |||
| specifies the transmission of IPv6 over IEEE 802.15.4. DECT ULE has | [RFC6282] and [RFC6775] specify the transmission of IPv6 over IEEE | |||
| in many ways similar characteristics of IEEE 802.15.4, but also | 802.15.4. DECT ULE has many characteristics similar to those of IEEE | |||
| differences. Many of the mechanisms defined in [RFC4944] can be | 802.15.4, but also differences. Many of the mechanisms defined for | |||
| applied to the transmission of IPv6 on DECT ULE links. | transmission of IPv6 over IEEE 802.15.4 can be applied to the | |||
| transmission of IPv6 on DECT ULE links. | ||||
| This document specifies how to map IPv6 over DECT ULE inspired by | This document specifies how to map IPv6 over DECT ULE inspired by | |||
| [RFC4944]. | [RFC4944], [RFC6282], [RFC6775] and [I-D.ietf-6lo-btle]. | |||
| 1.1. Requirements Notation | 1.1. Requirements Notation | |||
| The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | |||
| "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | |||
| document are to be interpreted as described in [RFC2119]. | document are to be interpreted as described in [RFC2119]. | |||
| 1.2. Terms Used | 1.2. Terms Used | |||
| PP: DECT Portable Part, typically the sensor node | PP: DECT Portable Part, typically the sensor node | |||
| FP: DECT Fixed Part, the gateway | FP: DECT Fixed Part, the gateway | |||
| LLME: Lower Layer Management Entity | LLME: Lower Layer Management Entity | |||
| NWK: Network | RFPI: Radio Fixed Part Identity | |||
| IPEI: International Portable Equipment Identity | ||||
| TPUI: Temporary Portable User Identity | ||||
| PMID: Portable MAC Identity | ||||
| PVC: Permanent Virtual Circuit | PVC: Permanent Virtual Circuit | |||
| 6LN: DECT Portable part having a role as defined in [RFC6775] | 6LN: DECT Portable part having a role as defined in [RFC6775] | |||
| 6LBR: DECT Fixed Part having a role as defined in [RFC6775] | 6LBR: DECT Fixed Part having a role as defined in [RFC6775] | |||
| 2. DECT Ultra Low Energy | 2. DECT Ultra Low Energy | |||
| DECT ULE is a low power air interface technology that is designed to | DECT ULE is a low power air interface technology that is designed to | |||
| skipping to change at page 5, line 5 ¶ | skipping to change at page 5, line 11 ¶ | |||
| The current DECT ULE MAC layer standard supports low bandwidth data | The current DECT ULE MAC layer standard supports low bandwidth data | |||
| broadcast. However the usage of this broadcast service has not yet | broadcast. However the usage of this broadcast service has not yet | |||
| been standardized for higher layers. This document is not | been standardized for higher layers. This document is not | |||
| considering usage of this DECT ULE MAC broadcast service in current | considering usage of this DECT ULE MAC broadcast service in current | |||
| version. | version. | |||
| In general, communication sessions can be initiated from both FP and | In general, communication sessions can be initiated from both FP and | |||
| PP side. Depending on power down modes employed in the PP, latency | PP side. Depending on power down modes employed in the PP, latency | |||
| may occur when initiating sessions from FP side. MAC layer | may occur when initiating sessions from FP side. MAC layer | |||
| communication can either take place using connection oriented packet | communication can take place using either connection oriented packet | |||
| transfer with low overhead for short sessions or take place using | transfer with low overhead for short sessions or take place using | |||
| connection oriented bearers including media reservation. The MAC | connection oriented bearers including media reservation. The MAC | |||
| layer autonomously selects the radio spectrum positions that are | layer autonomously selects the radio spectrum positions that are | |||
| available within the band and can rearrange these to avoid | available within the band and can rearrange these to avoid | |||
| interference. The MAC layer has built-in retransmission procedures | interference. The MAC layer has built-in retransmission procedures | |||
| in order to improve transmission reliability. | in order to improve transmission reliability. | |||
| The DECT ULE device will typically incorporate an Application | The DECT ULE device will typically incorporate an Application | |||
| Programmers Interface (API) as well as common elements known as | Programmers Interface (API) as well as common elements known as | |||
| Generic Access Profile (GAP) for enrolling into the network. The | Generic Access Profile (GAP) for enrolling into the network. The | |||
| skipping to change at page 6, line 28 ¶ | skipping to change at page 6, line 32 ¶ | |||
| [DECT ULE PP]-------+[DECT ULE FP]+-------[DECT ULE PP] | [DECT ULE PP]-------+[DECT ULE FP]+-------[DECT ULE PP] | |||
| / \ | / \ | |||
| [DECT ULE PP]-----/ \-----[DECT ULE PP] | [DECT ULE PP]-----/ \-----[DECT ULE PP] | |||
| Figure 2: DECT ULE star topology | Figure 2: DECT ULE star topology | |||
| DECT ULE repeaters are not considered in this document. | DECT ULE repeaters are not considered in this document. | |||
| 2.3. Addressing Model | 2.3. Addressing Model | |||
| Each DECT PP is assigned an <IPEI> (International Portable Equipment | Each DECT PP is assigned an IPEI during manufacturing. This identity | |||
| Identity) during manufacturing. This identity has the size of 40 | has the size of 40 bits and is DECT globally unique for the PP and | |||
| bits and is DECT globally unique for the PP and can be used to | can be used to constitute the MAC address. However, it cannot be | |||
| constitute the MAC address. However, it cannot be used to derive a | used to derive a globally unique IID. | |||
| globally unique IID. | ||||
| When bound to a FP, a PP is assigned a 20 bit TPUI (Temporary | When bound to a FP, a PP is assigned a 20 bit TPUI which is unique | |||
| Portable User Identity) which is unique within the FP. This TPUI is | within the FP. This TPUI is used for addressing (layer 2) in | |||
| used for addressing (layer 2) in messages between FP and PP. | messages between FP and PP. | |||
| Each DECT FP is assigned a <RFPI> (Radio Fixed Part Identity) during | Each DECT FP is assigned a RFPI during manufacturing. This identity | |||
| manufacturing. This identity has the size of 40 bits and is globally | has the size of 40 bits and is globally unique for a FP and can be | |||
| unique for a FP and can be used to constitute the MAC address. | used to constitute the MAC address. However, it cannot be used to | |||
| However, it cannot be used to derive a globally unique IID. | derive a globally unique IID. | |||
| Alternatively each DECT PP and DECT FP can be assigned a unique | Alternatively each DECT PP and DECT FP can be assigned a unique | |||
| (IEEE) MAC-48 address additionally to the DECT identities to be used | (IEEE) MAC-48 address additionally to the DECT identities to be used | |||
| by the 6LoWPAN. With such an approach, the FP and PP have to | by the 6LoWPAN. With such an approach, the FP and PP have to | |||
| implement a mapping between used MAC-48 addresses and DECT | implement a mapping between used MAC-48 addresses and DECT | |||
| identities. | identities. | |||
| 2.4. MTU Considerations | 2.4. MTU Considerations | |||
| Generally the DECT ULE FP and PP may be generating data that fits | Generally the DECT ULE FP and PP may be generating data that fits | |||
| into a single MAC Layer packet (38 bytes) for periodically | into a single MAC Layer packet (38 octets) for periodically | |||
| transferred information, depending on application. IP data packets | transferred information, depending on application. IP data packets | |||
| may be much larger and hence MTU size should be the size of the IP | may be much larger and hence MTU size should be the size of the IP | |||
| data packet. The DECT ULE DLC procedures supports segmentation and | data packet. The DECT ULE DLC procedures supports segmentation and | |||
| reassembly of any MTU size below 65536 bytes, but most | reassembly of any MTU size below 65536 octets, but most | |||
| implementations do only support smaller values. The default MTU size | implementations do only support smaller values. The default MTU size | |||
| in DECT ULE is 500 octets, but it is assumed it is configured to fit | in DECT ULE is 500 octets, but it SHALL be configured to fit the | |||
| the requirements from IPv6 data packets, hence [RFC4944] | requirements from IPv6 data packets, hence [RFC4944] fragmentation/ | |||
| fragmentation/reassembly is not required. | reassembly is not required. | |||
| It is expected that the LOWPAN_IPHC packet will fulfill all the | It is expected that the LOWPAN_IPHC packet will fulfill all the | |||
| requirements for header compression without spending unnecessary | requirements for header compression without spending unnecessary | |||
| overhead for mesh addressing. | overhead for mesh addressing. | |||
| It is important to realize that the usage of larger packets will be | It is important to realize that the usage of larger packets will be | |||
| on the expense of battery life, as a large packet inside the DECT ULE | at the expense of battery life, as a large packet inside the DECT ULE | |||
| stack will be fragmented into several or many MAC layer packets, each | stack will be fragmented into several or many MAC layer packets, each | |||
| consuming power to transmit / receive. | consuming power to transmit / receive. | |||
| 2.5. Additional Considerations | 2.5. Additional Considerations | |||
| The DECT ULE standard allows PP to be registered (bind) to multiple | The DECT ULE standard allows PP to be registered (bind) to multiple | |||
| FP and roaming between these FP. This draft does not consider the | FP and roaming between these FP. This draft does not consider the | |||
| scenarios of PP roaming between multiple FP. The use of repeater | scenarios of PP roaming between multiple FP. The use of repeater | |||
| functionality is also not considered in this draft. | functionality is also not considered in this draft. | |||
| 3. Specification of IPv6 over DECT ULE | 3. Specification of IPv6 over DECT ULE | |||
| Before any IP-layer communications can take place over DECT ULE, DECT | Before any IP-layer communications can take place over DECT ULE, DECT | |||
| ULE enabled nodes such as 6LNs and 6LBRs have to find each other and | ULE enabled nodes such as 6LNs and 6LBRs have to find each other and | |||
| establish a suitable link-layer connection. The obtain-access-rights | establish a suitable link-layer connection. The obtain-access-rights | |||
| registration and location registration procedures are documented by | registration and location registration procedures are documented by | |||
| ETSI in the specifications [EN300.175-part1-7] and [TS102.939-1]. | ETSI in the specifications [EN300.175-part1-7], [TS102.939-1] and | |||
| [TS102.939-2]. | ||||
| DECT ULE technology sets strict requirements for low power | DECT ULE technology sets strict requirements for low power | |||
| consumption and thus limits the allowed protocol overhead. 6LoWPAN | consumption and thus limits the allowed protocol overhead. 6LoWPAN | |||
| standards [RFC4944], [RFC6775], and [RFC6282] provide useful | standards [RFC4944], [RFC6775], and [RFC6282] provide useful | |||
| functionality for reducing overhead which can be applied to DECT ULE. | functionality for reducing overhead which can be applied to DECT ULE. | |||
| This functionality comprises link-local IPv6 addresses and stateless | This functionality comprises link-local IPv6 addresses and stateless | |||
| IPv6 address autoconfiguration, Neighbor Discovery and header | IPv6 address autoconfiguration, Neighbor Discovery and header | |||
| compression. | compression. | |||
| The ULE 6LoWPAN adaptation layer can run directly on this U-plane DLC | The ULE 6LoWPAN adaptation layer can run directly on this U-plane DLC | |||
| skipping to change at page 9, line 5 ¶ | skipping to change at page 9, line 7 ¶ | |||
| 3.2. Link model | 3.2. Link model | |||
| The general model is that IPv6 is layer 3 and DECT ULE MAC+DLC is | The general model is that IPv6 is layer 3 and DECT ULE MAC+DLC is | |||
| layer 2. The DECT ULE implements fragmentation and reassembly | layer 2. The DECT ULE implements fragmentation and reassembly | |||
| functionality and [RFC4944] fragmentation and reassembly function | functionality and [RFC4944] fragmentation and reassembly function | |||
| MUST NOT be used. Since IPv6 requires MTU size of at least 1280 | MUST NOT be used. Since IPv6 requires MTU size of at least 1280 | |||
| octets, the DECT ULE connection (PVC) MUST be configured with | octets, the DECT ULE connection (PVC) MUST be configured with | |||
| equivalent MTU size. | equivalent MTU size. | |||
| This specification also assumes the IPv6 header compression format | Per this specification, the IPv6 header compression format specified | |||
| specified in [RFC6282]. It is also assumed that the IPv6 payload | in [RFC6282] MUST be used. The IPv6 payload length can be derived | |||
| length can be inferred from the ULE DLC packet length and the IID | from the ULE DLC packet length and the possibly elided IPv6 address | |||
| value inferred from the link-layer address. | can be reconstructed from the link-layer address, used at the time of | |||
| DECT ULE connection establishment, from the ULE MAC packet address, | ||||
| compression context if any, and from address registration information | ||||
| (see Section 3.2.2). | ||||
| Due to DECT ULE star topology, each branch of the star is considered | Due to DECT ULE star topology, each branch of the star is considered | |||
| to be an individual link and thus the PPs cannot directly hear one | to be an individual link and thus the PPs cannot directly hear one | |||
| another and cannot talk to one another with link-local addresses. | another and cannot talk to one another with link-local addresses. | |||
| However, the FP acts as a 6LBR for communication between the PPs. | However, the FP acts as a 6LBR for communication between the PPs. | |||
| After the FP and PPs have connected at the DECT ULE level, the link | After the FP and PPs have connected at the DECT ULE level, the link | |||
| can be considered up and IPv6 address configuration and transmission | can be considered up and IPv6 address configuration and transmission | |||
| can begin. The FP ensures address collisions do not occur. | can begin. The FP ensures address collisions do not occur. | |||
| 3.2.1. Stateless address autoconfiguration | 3.2.1. Stateless address autoconfiguration | |||
| A DECT ULE 6LN performs stateless address autoconfiguration as per | A DECT ULE 6LN performs stateless address autoconfiguration as per | |||
| [RFC4862]. A 64-bit Interface identifier (IID) for a DECT ULE | [RFC4862]. Following the guidance of [RFC7136], a 64-bit Interface | |||
| interface MAY be formed by utilizing a MAC-48 device address as | identifier (IID) for a DECT ULE interface MAY be formed by utilizing | |||
| defined in [RFC2464] "IPv6 over Ethernet" specification. | a MAC-48 device address as defined in [RFC2464] "IPv6 over Ethernet" | |||
| specification. | ||||
| Alternatively, the DECT device addresses IPEI, RFPI or TPUI, MAY be | Alternatively, the DECT device addresses IPEI, RFPI or TPUI, MAY be | |||
| used instead to derive the IID. | used instead to derive the IID. These DECT devices addresses | |||
| consisting of 40, 40 and 20 bits respectively, MUST be expanded with | ||||
| leading bits to form a 48 bit address. Least significant bit of this | ||||
| address is the last bit in network order. The expanded leading bits | ||||
| are all zeros except for 7th bit indicating not global unique. First | ||||
| bit is set to a one for addresses derived from the RFPI and 2nd bit | ||||
| is set to one when the address is derived from the PMID. For example | ||||
| from IPEI=01.23.45.67.89 is derived MAC address equal | ||||
| 02:01:23:45:67:89 and from PMID=0.01.23 is derived MAC address equal | ||||
| 42:00:00:00:01:23. | ||||
| As defined in [RFC4291], the IPv6 link-local address for a DECT ULE | As defined in [RFC4291], the IPv6 link-local address for a DECT ULE | |||
| node is formed by appending the IID, to the prefix FE80::/64, as | node is formed by appending the IID, to the prefix FE80::/64, as | |||
| shown in Figure 4. | shown in Figure 4. | |||
| 10 bits 54 bits 64 bits | 10 bits 54 bits 64 bits | |||
| +----------+-----------------+----------------------+ | +----------+-----------------+----------------------+ | |||
| |1111111010| zeros | Interface Identifier | | |1111111010| zeros | Interface Identifier | | |||
| +----------+-----------------+----------------------+ | +----------+-----------------+----------------------+ | |||
| Figure 4: IPv6 link-local address in DECT ULE | Figure 4: IPv6 link-local address in DECT ULE | |||
| A 6LN MUST join the all-nodes multicast address. | A 6LN MUST join the all-nodes multicast address. | |||
| After link-local address configuration, 6LN sends Router Solicitation | After link-local address configuration, 6LN sends Router Solicitation | |||
| messages as described in [RFC4861] Section 6.3.7. | messages as described in [RFC4861] Section 6.3.7. | |||
| For non-link-local addresses a 64-bit IID MAY be formed by utilizing | For non-link-local addresses a 64-bit IID MAY be formed by utilizing | |||
| a MAC-48 device address. Alternatively, a randomly generated IID | a MAC-48 device address. A 6LN can also use a randomly generated IID | |||
| (see Section 3.2.2) can be used instead, for example, as discussed in | (see Section 3.2.2), for example, as discussed in [I-D.ietf-6man- | |||
| [I-D.ietf-6man-default-iids]. The non-link-local addresses 6LN | default-iids], or use alternative schemes such as Cryptographically | |||
| generates must be registered with 6LBR as described in Section 3.2.2. | Generated Addresses (CGA) [RFC3972], privacy extensions [RFC4941], | |||
| Hash-Based Addresses (HBA, [RFC5535]), or DHCPv6 [RFC3315]. The non- | ||||
| Only if the device address is known to be a public address the | link-local addresses 6LN generates MUST be registered with 6LBR as | |||
| "Universal/Local" bit can be set to 1 [RFC4291]. | described in Section 3.2.2. | |||
| The means for a 6LBR to obtain an IPv6 prefix for numbering the DECT | The means for a 6LBR to obtain an IPv6 prefix for numbering the DECT | |||
| ULE network is out of scope of this document, but can be, for | ULE network is out of scope of this document, but can be, for | |||
| example, accomplished via DHCPv6 Prefix Delegation [RFC3633] or by | example, accomplished via DHCPv6 Prefix Delegation [RFC3633] or by | |||
| using Unique Local IPv6 Unicast Addresses (ULA) [RFC4193]. Due to | using Unique Local IPv6 Unicast Addresses (ULA) [RFC4193]. Due to | |||
| the link model of the DECT ULE the 6LBR MUST set the "on-link" flag | the link model of the DECT ULE the 6LBR MUST set the "on-link" flag | |||
| (L) to zero in the Prefix Information Option [RFC4861]. This will | (L) to zero in the Prefix Information Option [RFC4861]. This will | |||
| cause 6LNs to always send packets to the 6LBR, including the case | cause 6LNs to always send packets to the 6LBR, including the case | |||
| when the destination is another 6LN using the same prefix. | when the destination is another 6LN using the same prefix. | |||
| skipping to change at page 10, line 30 ¶ | skipping to change at page 11, line 5 ¶ | |||
| support mesh networks, hence only those aspects that apply to a star | support mesh networks, hence only those aspects that apply to a star | |||
| topology are considered. | topology are considered. | |||
| The following aspects of the Neighbor Discovery optimizations | The following aspects of the Neighbor Discovery optimizations | |||
| [RFC6775] are applicable to DECT ULE 6LNs: | [RFC6775] are applicable to DECT ULE 6LNs: | |||
| 1. For sending Router Solicitations and processing Router | 1. For sending Router Solicitations and processing Router | |||
| Advertisements the DECT ULE 6LNs MUST, respectively, follow Sections | Advertisements the DECT ULE 6LNs MUST, respectively, follow Sections | |||
| 5.3 and 5.4 of the [RFC6775]. | 5.3 and 5.4 of the [RFC6775]. | |||
| 2. A DECT ULE 6LN SHOULD NOT register its link-local address. A | 2. A DECT ULE 6LN MUST NOT register its link-local address. A DECT | |||
| DECT ULE 6LN MUST register its non-link-local addresses with the 6LBR | ULE 6LN MUST register its non-link-local addresses with the 6LBR by | |||
| by sending a Neighbor Solicitation (NS) message with the Address | sending a Neighbor Solicitation (NS) message with the Address | |||
| Registration Option (ARO) and process the Neighbor Advertisement (NA) | Registration Option (ARO) and process the Neighbor Advertisement (NA) | |||
| accordingly. The NS with the ARO option MUST be sent irrespective of | accordingly. The NS with the ARO option MUST be sent irrespective of | |||
| the method used to generate the IID. The 6LN MUST register only one | the method used to generate the IID. The 6LN MUST register only one | |||
| IPv6 address per available IPv6 prefix. | IPv6 address per available IPv6 prefix. | |||
| 3.2.3. Unicast and Multicast address mapping | 3.2.3. Unicast and Multicast address mapping | |||
| The DECT MAC layer broadcast service is considered inadequate for IP | The DECT MAC layer broadcast service is considered inadequate for IP | |||
| multicast. | multicast. | |||
| Hence traffic is always unicast between two DECT ULE nodes. Even in | Hence traffic is always unicast between two DECT ULE nodes. Even in | |||
| the case where a 6LBR is attached to multiple 6LNs, the 6LBR cannot | the case where a 6LBR is attached to multiple 6LNs, the 6LBR cannot | |||
| do a multicast to all the connected 6LNs. If the 6LBR needs to send | do a multicast to all the connected 6LNs. If the 6LBR needs to send | |||
| a multicast packet to all its 6LNs, it has to replicate the packet | a multicast packet to all its 6LNs, it has to replicate the packet | |||
| and unicast it on each link. However, this may not be energy- | and unicast it on each link. However, this may not be energy- | |||
| efficient and particular care must be taken if the FP is battery- | efficient and particular care should be taken if the FP is battery- | |||
| powered. In the opposite direction, a 6LN can only transmit data to | powered. In the opposite direction, a 6LN can only transmit data to | |||
| or through the 6LBR. Hence, when a 6LN needs to transmit an IPv6 | or through the 6LBR. Hence, when a 6LN needs to transmit an IPv6 | |||
| multicast packet, the 6LN will unicast the corresponding DECT ULE | multicast packet, the 6LN will unicast the corresponding DECT ULE | |||
| packet to the 6LBR. The 6LBR will then forward the multicast packet | packet to the 6LBR. The 6LBR will then forward the multicast packet | |||
| to other 6LNs. To avoid excess of unwanted multicast traffic being | to other 6LNs. | |||
| sent to 6LNs, the 6LBR SHOULD implement MLD Snooping feature | ||||
| [RFC4541]. | ||||
| 3.2.4. Header Compression | 3.2.4. Header Compression | |||
| Header compression as defined in [RFC6282], which specifies the | Header compression as defined in [RFC6282], which specifies the | |||
| compression format for IPv6 datagrams on top of IEEE 802.15.4, is | compression format for IPv6 datagrams on top of IEEE 802.15.4, is | |||
| REQUIRED in this document as the basis for IPv6 header compression on | REQUIRED in this document as the basis for IPv6 header compression on | |||
| top of DECT ULE. All headers MUST be compressed according to | top of DECT ULE. All headers MUST be compressed according to | |||
| [RFC6282] encoding formats. The DECT ULE's star topology structure | [RFC6282] encoding formats. The DECT ULE's star topology structure | |||
| and ARO can be exploited in order to provide a mechanism for IID | and ARO can be exploited in order to provide a mechanism for addess | |||
| compression. The following text describes the principles of IPv6 | compression. The following text describes the principles of IPv6 | |||
| address compression on top of DECT ULE. | address compression on top of DECT ULE. | |||
| 3.2.4.1. Link-local Header Compression | 3.2.4.1. Link-local Header Compression | |||
| In a link-local communication terminated at 6LN and 6LBR, both the | In a link-local communication terminated at 6LN and 6LBR, both the | |||
| IPv6 source and destination addresses MUST be elided, since the node | IPv6 source and destination addresses MUST be elided, since the node | |||
| knows that the packet is destined for it even if the packet does not | knows that the packet is destined for it even if the packet does not | |||
| have destination IPv6 address. A node SHALL learn the IID of the | have destination IPv6 address. A node SHALL learn the IID of the | |||
| other endpoint of each DECT ULE connection it participates in. By | other endpoint of each DECT ULE connection it participates in. By | |||
| skipping to change at page 12, line 26 ¶ | skipping to change at page 12, line 47 ¶ | |||
| the compressed IPv6 header, and MUST elide the IPv6 destination | the compressed IPv6 header, and MUST elide the IPv6 destination | |||
| address of the packet before forwarding it to the 6LN. For this, the | address of the packet before forwarding it to the 6LN. For this, the | |||
| 6LBR MUST set the DAM field of the IPv6 compressed header as DAM=11. | 6LBR MUST set the DAM field of the IPv6 compressed header as DAM=11. | |||
| CID and DAC MUST be set to CID=1 and DAC=1. If a context is defined | CID and DAC MUST be set to CID=1 and DAC=1. If a context is defined | |||
| for the prefix of the IPv6 source address, the 6LBR MUST indicate | for the prefix of the IPv6 source address, the 6LBR MUST indicate | |||
| this context in the source fields of the compressed IPv6 header, and | this context in the source fields of the compressed IPv6 header, and | |||
| MUST elide that prefix as well. For this, the 6LBR MUST set the SAM | MUST elide that prefix as well. For this, the 6LBR MUST set the SAM | |||
| field of the IPv6 compressed header as CID=1, SAC=1 and SAM=01 or | field of the IPv6 compressed header as CID=1, SAC=1 and SAM=01 or | |||
| SAM=11. | SAM=11. | |||
| 3.3. Internet connectivity scenarios | 3.3. Subnets and Internet connectivity scenarios | |||
| In a typical scenario, the DECT ULE network is connected to the | In a typical scenario, the DECT ULE network is connected to the | |||
| Internet as shown in the Figure 5. | Internet as shown in the Figure 5. In this scenario, the DECT ULE | |||
| network is deployed as one subnet, using one /64 IPv6 prefix. The | ||||
| 6LBR is acting as router and forwarding packets between 6LNs and to | ||||
| and from Internet. | ||||
| A degenerate scenario can be imagined where a PP is acting as 6LBR | A degenerate scenario can be imagined where a PP is acting as 6LBR | |||
| and providing Internet connectivity for the FP. How the FP could | and providing Internet connectivity for the FP. How the FP could | |||
| then further provide Internet connectivity to other PP, possibly | then further provide Internet connectivity to other PP, possibly | |||
| connected to the FP, is out of the scope of this document. | connected to the FP, is out of the scope of this document. | |||
| 6LN | 6LN | |||
| \ ____________ | \ ____________ | |||
| \ / \ | \ / \ | |||
| 6LN ---- 6LBR --- | Internet | | 6LN ---- 6LBR --- | Internet | | |||
| / \____________/ | / \____________/ | |||
| / | / | |||
| 6LN | 6LN | |||
| <-- DECT ULE --> | <-- DECT ULE --> | |||
| Figure 5: DECT ULE network connected to the Internet | Figure 5: DECT ULE network connected to the Internet | |||
| In some scenarios, the DECT ULE network may transiently or | In some scenarios, the DECT ULE network may transiently or | |||
| permanently be an isolated network as shown in the Figure 6. | permanently be an isolated network as shown in the Figure 6. In this | |||
| case the whole DECT ULE network consists of a single subnet with | ||||
| multiple links, where 6LBR is routing packets between 6LNs. | ||||
| 6LN 6LN | 6LN 6LN | |||
| \ / | \ / | |||
| \ / | \ / | |||
| 6LN --- 6LBR --- 6LN | 6LN --- 6LBR --- 6LN | |||
| / \ | / \ | |||
| / \ | / \ | |||
| 6LN 6LN | 6LN 6LN | |||
| <------ DECT ULE -----> | <------ DECT ULE -----> | |||
| skipping to change at page 14, line 6 ¶ | skipping to change at page 14, line 30 ¶ | |||
| The DECT ULE pairing procedure generates a master authentication key | The DECT ULE pairing procedure generates a master authentication key | |||
| (UAK) and during location registration procedure or when the | (UAK) and during location registration procedure or when the | |||
| permanent virtual circuit are established, the session security keys | permanent virtual circuit are established, the session security keys | |||
| are generated. Session security keys may be renewed regularly. The | are generated. Session security keys may be renewed regularly. The | |||
| generated security keys (UAK and session security keys) are | generated security keys (UAK and session security keys) are | |||
| individual for each FP-PP binding, hence all PP in a system have | individual for each FP-PP binding, hence all PP in a system have | |||
| different security keys. DECT ULE PPs do not use any shared | different security keys. DECT ULE PPs do not use any shared | |||
| encryption key. | encryption key. | |||
| The IPv6 address configuration as described in Section 3.2.1 allows | The IPv6 address configuration as described in Section 3.2.1 allows | |||
| implementations the choice to support [I-D.ietf-6man-default-iids] | implementations the choice to support, for example, [I-D.ietf-6man- | |||
| for non-link addresses. | default-iids], [RFC3972], [RFC4941] or [RFC5535] for non-link-local | |||
| addresses. | ||||
| 6. ETSI Considerations | 6. ETSI Considerations | |||
| ETSI is standardizing a list of known application layer protocols | ETSI is standardizing a list of known application layer protocols | |||
| that can use the DECT ULE permanent virtual circuit packet data | that can use the DECT ULE permanent virtual circuit packet data | |||
| service. Each protocol is identified by a unique known identifier, | service. Each protocol is identified by a unique known identifier, | |||
| which is exchanged in the service-change procedure as defined in | which is exchanged in the service-change procedure as defined in | |||
| [TS102.939-1]. The IPv6/6LoWPAN as described in this document is | [TS102.939-1]. The IPv6/6LoWPAN as described in this document is | |||
| considered as an application layer protocol on top of DECT ULE. In | considered as an application layer protocol on top of DECT ULE. In | |||
| order to provide interoperability between 6LoWPAN / DECT ULE devices | order to provide interoperability between 6LoWPAN / DECT ULE devices | |||
| a common protocol identifier for 6LoWPAN is standardized by ETSI. | a common protocol identifier for 6LoWPAN is standardized by ETSI. | |||
| The ETSI DECT ULE Application Protocol Identifier is specified to | The ETSI DECT ULE Application Protocol Identifier is specified to | |||
| 0x06 for 6LoWPAN. | 0x06 for 6LoWPAN [TS102.939-1]. | |||
| 7. Acknowledgements | 7. Acknowledgements | |||
| We are grateful to the members of the IETF 6lo working group; this | We are grateful to the members of the IETF 6lo working group; this | |||
| document borrows liberally from their work. | document borrows liberally from their work. | |||
| Ralph Droms has provided valuable feedback for this draft. | Ralph Droms has provided valuable feedback for this draft. | |||
| 8. References | 8. References | |||
| 8.1. Normative References | 8.1. Normative References | |||
| [EN300.175-part1-7] | [EN300.175-part1-7] | |||
| ETSI, "Digital Enhanced Cordless Telecommunications | ETSI, "Digital Enhanced Cordless Telecommunications | |||
| (DECT); Common Interface (CI);", August 2013. | (DECT); Common Interface (CI);", March 2015. | |||
| [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | |||
| Requirement Levels", BCP 14, RFC 2119, March 1997. | Requirement Levels", BCP 14, RFC 2119, March 1997. | |||
| [RFC2464] Crawford, M., "Transmission of IPv6 Packets over Ethernet | [RFC2464] Crawford, M., "Transmission of IPv6 Packets over Ethernet | |||
| Networks", RFC 2464, December 1998. | Networks", RFC 2464, December 1998. | |||
| [RFC3610] Whiting, D., Housley, R., and N. Ferguson, "Counter with | ||||
| CBC-MAC (CCM)", RFC 3610, September 2003. | ||||
| [RFC3633] Troan, O. and R. Droms, "IPv6 Prefix Options for Dynamic | [RFC3633] Troan, O. and R. Droms, "IPv6 Prefix Options for Dynamic | |||
| Host Configuration Protocol (DHCP) version 6", RFC 3633, | Host Configuration Protocol (DHCP) version 6", RFC 3633, | |||
| December 2003. | December 2003. | |||
| [RFC4193] Hinden, R. and B. Haberman, "Unique Local IPv6 Unicast | [RFC4193] Hinden, R. and B. Haberman, "Unique Local IPv6 Unicast | |||
| Addresses", RFC 4193, October 2005. | Addresses", RFC 4193, October 2005. | |||
| [RFC4291] Hinden, R. and S. Deering, "IP Version 6 Addressing | [RFC4291] Hinden, R. and S. Deering, "IP Version 6 Addressing | |||
| Architecture", RFC 4291, February 2006. | Architecture", RFC 4291, February 2006. | |||
| [RFC4541] Christensen, M., Kimball, K., and F. Solensky, | ||||
| "Considerations for Internet Group Management Protocol | ||||
| (IGMP) and Multicast Listener Discovery (MLD) Snooping | ||||
| Switches", RFC 4541, May 2006. | ||||
| [RFC4861] Narten, T., Nordmark, E., Simpson, W., and H. Soliman, | [RFC4861] Narten, T., Nordmark, E., Simpson, W., and H. Soliman, | |||
| "Neighbor Discovery for IP version 6 (IPv6)", RFC 4861, | "Neighbor Discovery for IP version 6 (IPv6)", RFC 4861, | |||
| September 2007. | September 2007. | |||
| [RFC4862] Thomson, S., Narten, T., and T. Jinmei, "IPv6 Stateless | [RFC4862] Thomson, S., Narten, T., and T. Jinmei, "IPv6 Stateless | |||
| Address Autoconfiguration", RFC 4862, September 2007. | Address Autoconfiguration", RFC 4862, September 2007. | |||
| [RFC4941] Narten, T., Draves, R., and S. Krishnan, "Privacy | [RFC4941] Narten, T., Draves, R., and S. Krishnan, "Privacy | |||
| Extensions for Stateless Address Autoconfiguration in | Extensions for Stateless Address Autoconfiguration in | |||
| IPv6", RFC 4941, September 2007. | IPv6", RFC 4941, September 2007. | |||
| skipping to change at page 15, line 37 ¶ | skipping to change at page 16, line 10 ¶ | |||
| [RFC6282] Hui, J. and P. Thubert, "Compression Format for IPv6 | [RFC6282] Hui, J. and P. Thubert, "Compression Format for IPv6 | |||
| Datagrams over IEEE 802.15.4-Based Networks", RFC 6282, | Datagrams over IEEE 802.15.4-Based Networks", RFC 6282, | |||
| September 2011. | September 2011. | |||
| [RFC6775] Shelby, Z., Chakrabarti, S., Nordmark, E., and C. Bormann, | [RFC6775] Shelby, Z., Chakrabarti, S., Nordmark, E., and C. Bormann, | |||
| "Neighbor Discovery Optimization for IPv6 over Low-Power | "Neighbor Discovery Optimization for IPv6 over Low-Power | |||
| Wireless Personal Area Networks (6LoWPANs)", RFC 6775, | Wireless Personal Area Networks (6LoWPANs)", RFC 6775, | |||
| November 2012. | November 2012. | |||
| [RFC7136] Carpenter, B. and S. Jiang, "Significance of IPv6 | ||||
| Interface Identifiers", RFC 7136, February 2014. | ||||
| [TS102.939-1] | [TS102.939-1] | |||
| ETSI, "Digital Enhanced Cordless Telecommunications | ETSI, "Digital Enhanced Cordless Telecommunications | |||
| (DECT); Ultra Low Energy (ULE); Machine to Machine | (DECT); Ultra Low Energy (ULE); Machine to Machine | |||
| Communications; Part 1: Home Automation Network (phase | Communications; Part 1: Home Automation Network (phase | |||
| 1)", April 2013. | 1)", March 2015. | |||
| [TS102.939-2] | ||||
| ETSI, "Digital Enhanced Cordless Telecommunications | ||||
| (DECT); Ultra Low Energy (ULE); Machine to Machine | ||||
| Communications; Part 2: Home Automation Network (phase | ||||
| 2)", March 2015. | ||||
| 8.2. Informative References | 8.2. Informative References | |||
| [I-D.ietf-6lo-btle] | ||||
| Nieminen, J., Savolainen, T., Isomaki, M., Patil, B., | ||||
| Shelby, Z., and C. Gomez, "IPv6 over BLUETOOTH(R) Low | ||||
| Energy", draft-ietf-6lo-btle-14 (work in progress), June | ||||
| 2015. | ||||
| [I-D.ietf-6man-default-iids] | [I-D.ietf-6man-default-iids] | |||
| Gont, F., Cooper, A., Thaler, D., and W. Will, | Gont, F., Cooper, A., Thaler, D., and S. LIU, | |||
| "Recommendation on Stable IPv6 Interface Identifiers", | "Recommendation on Stable IPv6 Interface Identifiers", | |||
| draft-ietf-6man-default-iids-02 (work in progress), | draft-ietf-6man-default-iids-04 (work in progress), June | |||
| January 2015. | 2015. | |||
| [RFC3315] Droms, R., Bound, J., Volz, B., Lemon, T., Perkins, C., | ||||
| and M. Carney, "Dynamic Host Configuration Protocol for | ||||
| IPv6 (DHCPv6)", RFC 3315, July 2003. | ||||
| [RFC3610] Whiting, D., Housley, R., and N. Ferguson, "Counter with | ||||
| CBC-MAC (CCM)", RFC 3610, September 2003. | ||||
| [RFC3972] Aura, T., "Cryptographically Generated Addresses (CGA)", | ||||
| RFC 3972, March 2005. | ||||
| [RFC5535] Bagnulo, M., "Hash-Based Addresses (HBA)", RFC 5535, June | ||||
| 2009. | ||||
| Authors' Addresses | Authors' Addresses | |||
| Peter B. Mariager | Peter B. Mariager | |||
| RTX A/S | RTX A/S | |||
| Stroemmen 6 | Stroemmen 6 | |||
| DK-9400 Noerresundby | DK-9400 Noerresundby | |||
| Denmark | Denmark | |||
| Email: pm@rtx.dk | Email: pm@rtx.dk | |||
| skipping to change at page 16, line 41 ¶ | skipping to change at page 17, line 41 ¶ | |||
| Marco van de Logt | Marco van de Logt | |||
| Gigaset Communications GmbH | Gigaset Communications GmbH | |||
| Frankenstrasse 2 | Frankenstrasse 2 | |||
| D-46395 Bocholt | D-46395 Bocholt | |||
| Germany | Germany | |||
| Email: marco.van-de-logt@gigaset.com | Email: marco.van-de-logt@gigaset.com | |||
| Dominique Barthel | Dominique Barthel | |||
| Orange Labs | Orange Labs | |||
| 28 chemin du Vieux Chene | ||||
| 38243 Meylan | ||||
| France | ||||
| Email: dominique.barthel@orange.com | Email: dominique.barthel@orange.com | |||
| End of changes. 41 change blocks. | ||||
| 82 lines changed or deleted | 130 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||