| < draft-ietf-6lo-nfc-14.txt | draft-ietf-6lo-nfc-15.txt > | |||
|---|---|---|---|---|
| skipping to change at page 1, line 15 ¶ | skipping to change at page 1, line 15 ¶ | |||
| Intended status: Standards Track ETRI | Intended status: Standards Track ETRI | |||
| Expires: January 9, 2020 J-S. Youn | Expires: January 9, 2020 J-S. Youn | |||
| Dongeui Univ | Dongeui Univ | |||
| D-K. Kim | D-K. Kim | |||
| KNU | KNU | |||
| J-H. Choi | J-H. Choi | |||
| Samsung Electronics Co., | Samsung Electronics Co., | |||
| July 8, 2019 | July 8, 2019 | |||
| Transmission of IPv6 Packets over Near Field Communication | Transmission of IPv6 Packets over Near Field Communication | |||
| draft-ietf-6lo-nfc-14 | draft-ietf-6lo-nfc-15 | |||
| Abstract | Abstract | |||
| Near field communication (NFC) is a set of standards for smartphones | Near field communication (NFC) is a set of standards for smartphones | |||
| and portable devices to establish radio communication with each other | and portable devices to establish radio communication with each other | |||
| by touching them together or bringing them into proximity, usually no | by touching them together or bringing them into proximity, usually no | |||
| more than 10 cm. NFC standards cover communications protocols and | more than 10 cm apart. NFC standards cover communications protocols | |||
| data exchange formats, and are based on existing radio-frequency | and data exchange formats, and are based on existing radio-frequency | |||
| identification (RFID) standards including ISO/IEC 14443 and FeliCa. | identification (RFID) standards including ISO/IEC 14443 and FeliCa. | |||
| The standards include ISO/IEC 18092 and those defined by the NFC | The standards include ISO/IEC 18092 and those defined by the NFC | |||
| Forum. The NFC technology has been widely implemented and available | Forum. The NFC technology has been widely implemented and available | |||
| in mobile phones, laptop computers, and many other devices. This | in mobile phones, laptop computers, and many other devices. This | |||
| document describes how IPv6 is transmitted over NFC using 6LowPAN | document describes how IPv6 is transmitted over NFC using 6LoWPAN | |||
| techniques. | techniques. | |||
| Status of This Memo | Status of This Memo | |||
| This Internet-Draft is submitted in full conformance with the | This Internet-Draft is submitted in full conformance with the | |||
| provisions of BCP 78 and BCP 79. | provisions of BCP 78 and BCP 79. | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| skipping to change at page 3, line 11 ¶ | skipping to change at page 3, line 11 ¶ | |||
| NFC is a set of short-range wireless technologies, typically | NFC is a set of short-range wireless technologies, typically | |||
| requiring a distance of 10 cm or less. NFC operates at 13.56 MHz on | requiring a distance of 10 cm or less. NFC operates at 13.56 MHz on | |||
| ISO/IEC 18000-3 air interface and at rates ranging from 106 kbit/s to | ISO/IEC 18000-3 air interface and at rates ranging from 106 kbit/s to | |||
| 424 kbit/s [ECMA-340]. NFC always involves an initiator and a | 424 kbit/s [ECMA-340]. NFC always involves an initiator and a | |||
| target; the initiator actively generates an RF field that can power a | target; the initiator actively generates an RF field that can power a | |||
| passive target. This enables NFC targets to take very simple form | passive target. This enables NFC targets to take very simple form | |||
| factors such as tags, stickers, key fobs, or cards that do not | factors such as tags, stickers, key fobs, or cards that do not | |||
| require batteries. NFC peer-to-peer communication is possible, | require batteries. NFC peer-to-peer communication is possible, | |||
| provided both devices are powered. NFC builds upon RFID systems by | provided both devices are powered. NFC builds upon RFID systems by | |||
| allowing two-way communication between endpoints. At the time of | allowing two-way communication between endpoints. At the time of | |||
| this writing, it had been used in devices such as mobile phones, | this writing, it has been used in devices such as mobile phones, | |||
| running Android operating system, named with a feature called | running Android operating system, named with a feature called | |||
| "Android Beam". It was expected for the other mobile phones, running | "Android Beam". It is expected for the other mobile phones, running | |||
| the other operating systems (e.g., iOS, etc.) to be equipped with NFC | other operating systems (e.g., iOS, etc.) to be equipped with NFC | |||
| technology in the near future. | technology in the near future. | |||
| Considering the potential for exponential growth in the number of | Considering exponential growth in the number of heterogeneous air | |||
| heterogeneous air interface technologies, NFC has been widely used | interface technologies, NFC has been widely used like Bluetooth Low | |||
| like Bluetooth Low Energy (BT-LE), Wi-Fi, and so on. Each of the | Energy (BT-LE), Wi-Fi, and so on. Each of the heterogeneous air | |||
| heterogeneous air interface technologies has its own characteristics, | interface technologies has its own characteristics, which cannot be | |||
| which cannot be covered by the other technologies, so various kinds | covered by the other technologies, so various kinds of air interface | |||
| of air interface technologies would co-exist together. NFC can | technologies would co-exist together. NFC can provide secured | |||
| provide secured communications with its short transmission range. | communications with its short transmission range. | |||
| When the number of devices and things having different air interface | When the number of devices and things having different air interface | |||
| technologies communicate with each other, IPv6 is an ideal internet | technologies communicate with each other, IPv6 is an ideal internet | |||
| protocol owing to its large address space. Also, NFC would be one of | protocol owing to its large address space. Also, NFC would be one of | |||
| the endpoints using IPv6. Therefore, this document describes how | the endpoints using IPv6. Therefore, this document describes how | |||
| IPv6 is transmitted over NFC using 6LoWPAN techniques. | IPv6 is transmitted over NFC using 6LoWPAN techniques. | |||
| [RFC4944] specifies the transmission of IPv6 over IEEE 802.15.4. The | [RFC4944] specifies the transmission of IPv6 over IEEE 802.15.4. The | |||
| NFC link also has similar characteristics to that of IEEE 802.15.4. | NFC link also has similar characteristics to that of IEEE 802.15.4. | |||
| Many of the mechanisms defined in [RFC4944] can be applied to the | Many of the mechanisms defined in [RFC4944] can be applied to the | |||
| skipping to change at page 13, line 18 ¶ | skipping to change at page 13, line 18 ¶ | |||
| transmitting IPv6 packets because the RF distance between 6LN and | transmitting IPv6 packets because the RF distance between 6LN and | |||
| 6LBR is typically within 10 cm. If any third party wants to hack | 6LBR is typically within 10 cm. If any third party wants to hack | |||
| into the RF between them, it must come to nearly touch them. | into the RF between them, it must come to nearly touch them. | |||
| Applications can choose which kinds of air interfaces (e.g., BT-LE, | Applications can choose which kinds of air interfaces (e.g., BT-LE, | |||
| Wi-Fi, NFC, etc.) to send data depending on the characteristics of | Wi-Fi, NFC, etc.) to send data depending on the characteristics of | |||
| the data. | the data. | |||
| Figure 10 illustrates an example of an NFC-enabled device network | Figure 10 illustrates an example of an NFC-enabled device network | |||
| connected to the Internet. The distance between 6LN and 6LBR is | connected to the Internet. The distance between 6LN and 6LBR is | |||
| typically 10 cm or less. If there is any laptop computers close to a | typically 10 cm or less. If there is any laptop computers close to a | |||
| user, it will become the a 6LBR. Additionally, when the user mounts | user, it will become a 6LBR. Additionally, when the user mounts an | |||
| an NFC-enabled air interface adapter (e.g., portable NFC dongle) on | NFC-enabled air interface adapter (e.g., portable NFC dongle) on the | |||
| the close laptop PC, the user's NFC-enabled device (6LN) can | close laptop PC, the user's NFC-enabled device (6LN) can communicate | |||
| communicate with the laptop PC (6LBR) within 10 cm distance. | with the laptop PC (6LBR) within 10 cm distance. | |||
| ************ | ************ | |||
| 6LN ------------------- 6LBR -----* Internet *------- CN | 6LN ------------------- 6LBR -----* Internet *------- CN | |||
| | (dis. 10 cm or less) | ************ | | | (dis. 10 cm or less) | ************ | | |||
| | | | | | | | | |||
| | <-------- NFC -------> | <----- IPv6 packet ------> | | | <-------- NFC -------> | <----- IPv6 packet ------> | | |||
| | (IPv6 over NFC packet) | | | | (IPv6 over NFC packet) | | | |||
| Figure 10: NFC-enabled device network connected to the Internet | Figure 10: NFC-enabled device network connected to the Internet | |||
| Two or more LNs are connected with a 6LBR, but each connection uses a | Two or more 6LNs are connected with a 6LBR, but each connection uses | |||
| different subnet. The 6LBR is acting as a router and forwarding | a different subnet. The 6LBR is acting as a router and forwarding | |||
| packets between 6LNs and the Internet. Also, the 6LBR MUST ensure | packets between 6LNs and the Internet. Also, the 6LBR MUST ensure | |||
| address collisions do not occur and forwards packets sent by one 6LN | address collisions do not occur and forwards packets sent by one 6LN | |||
| to another. | to another. | |||
| 5.2. Isolated NFC-enabled Device Network | 5.2. Isolated NFC-enabled Device Network | |||
| In some scenarios, the NFC-enabled device network may transiently be | In some scenarios, the NFC-enabled device network may transiently be | |||
| a simple isolated network as shown in the Figure 11. | a simple isolated network as shown in the Figure 11. | |||
| 6LN ---------------------- 6LR ---------------------- 6LN | 6LN ---------------------- 6LR ---------------------- 6LN | |||
| | (10 cm or less) | (10 cm or less) | | | (10 cm or less) | (10 cm or less) | | |||
| | | | | | | | | |||
| | <--------- NFC --------> | <--------- NFC --------> | | | <--------- NFC --------> | <--------- NFC --------> | | |||
| | (IPv6 over NFC packet) | (IPv6 over NFC packet) | | | (IPv6 over NFC packet) | (IPv6 over NFC packet) | | |||
| Figure 11: Isolated NFC-enabled device network | Figure 11: Isolated NFC-enabled device network | |||
| In mobile phone markets, applications are designed and made by user | In mobile phone markets, applications are designed and made by user | |||
| developers. They may image interesting applications, where three or | developers. They may image interesting applications, where three or | |||
| more mobile phones touch or attach each other to accomplish | more mobile phones touch or attach each other to work achieve a | |||
| performance. In an isolated NFC-enabled device network, when two or | common objective. In an isolated NFC-enabled device network, when | |||
| more LRs are connected with each other, and then they are acting like | two or more 6LRs are connected with each other, and then they are | |||
| routers, the 6LR MUST ensure address collisions do not occur. | acting like routers, the 6LR MUST ensure address collisions do not | |||
| occur. | ||||
| 6. IANA Considerations | 6. IANA Considerations | |||
| There are no IANA considerations related to this document. | There are no IANA considerations related to this document. | |||
| 7. Security Considerations | 7. Security Considerations | |||
| This document does not RECOMMEND sending NFC packets over the | This document does not RECOMMEND sending NFC packets over the | |||
| Internet or any unsecured network. | Internet or any unsecured network. | |||
| End of changes. 9 change blocks. | ||||
| 24 lines changed or deleted | 25 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||