| < draft-ietf-6lo-use-cases-07.txt | draft-ietf-6lo-use-cases-08.txt > | |||
|---|---|---|---|---|
| 6Lo Working Group Y-G. Hong | 6Lo Working Group Y-G. Hong | |||
| Internet-Draft ETRI | Internet-Draft ETRI | |||
| Intended status: Informational C. Gomez | Intended status: Informational C. Gomez | |||
| Expires: March 13, 2020 UPC | Expires: May 7, 2020 UPC | |||
| Y-H. Choi | Y-H. Choi | |||
| ETRI | ETRI | |||
| AR. Sangi | AR. Sangi | |||
| Huaiyin Institute of Technology | Huaiyin Institute of Technology | |||
| T. Aanstoot | T. Aanstoot | |||
| Modio AB | Modio AB | |||
| S. Chakrabarti | S. Chakrabarti | |||
| September 10, 2019 | November 4, 2019 | |||
| IPv6 over Constrained Node Networks (6lo) Applicability & Use cases | IPv6 over Constrained Node Networks (6lo) Applicability & Use cases | |||
| draft-ietf-6lo-use-cases-07 | draft-ietf-6lo-use-cases-08 | |||
| Abstract | Abstract | |||
| This document describes the applicability of IPv6 over constrained | This document describes the applicability of IPv6 over constrained | |||
| node networks (6lo) and provides practical deployment examples. In | node networks (6lo) and provides practical deployment examples. In | |||
| addition to IEEE 802.15.4, various link layer technologies such as | addition to IEEE 802.15.4, various link layer technologies such as | |||
| ITU-T G.9959 (Z-Wave), BLE, DECT-ULE, MS/TP, NFC, and PLC (IEEE | ITU-T G.9959 (Z-Wave), BLE, DECT-ULE, MS/TP, NFC, and PLC (IEEE | |||
| 1901.2) are used as examples. The document targets an audience who | 1901.2) are used as examples. The document targets an audience who | |||
| like to understand and evaluate running end-to-end IPv6 over the | like to understand and evaluate running end-to-end IPv6 over the | |||
| constrained node networks connecting devices to each other or to | constrained node networks connecting devices to each other or to | |||
| skipping to change at page 1, line 45 ¶ | skipping to change at page 1, line 45 ¶ | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at https://datatracker.ietf.org/drafts/current/. | Drafts is at https://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on March 13, 2020. | This Internet-Draft will expire on May 7, 2020. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2019 IETF Trust and the persons identified as the | Copyright (c) 2019 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (https://trustee.ietf.org/license-info) in effect on the date of | (https://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| skipping to change at page 2, line 39 ¶ | skipping to change at page 2, line 39 ¶ | |||
| 3.5. NFC . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 | 3.5. NFC . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 | |||
| 3.6. PLC . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 | 3.6. PLC . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 | |||
| 3.7. Comparison between 6lo Link layer technologies . . . . . 7 | 3.7. Comparison between 6lo Link layer technologies . . . . . 7 | |||
| 4. 6lo Deployment Scenarios . . . . . . . . . . . . . . . . . . 8 | 4. 6lo Deployment Scenarios . . . . . . . . . . . . . . . . . . 8 | |||
| 4.1. G3-PLC usage of 6lo in network layer . . . . . . . . . . 8 | 4.1. G3-PLC usage of 6lo in network layer . . . . . . . . . . 8 | |||
| 4.2. Netricity usage of 6lo in network layer . . . . . . . . . 9 | 4.2. Netricity usage of 6lo in network layer . . . . . . . . . 9 | |||
| 5. Guidelines for adopting IPv6 stack (6lo/6LoWPAN) . . . . . . 10 | 5. Guidelines for adopting IPv6 stack (6lo/6LoWPAN) . . . . . . 10 | |||
| 6. 6lo Use Case Examples . . . . . . . . . . . . . . . . . . . . 12 | 6. 6lo Use Case Examples . . . . . . . . . . . . . . . . . . . . 12 | |||
| 6.1. Use case of ITU-T G.9959: Smart Home . . . . . . . . . . 12 | 6.1. Use case of ITU-T G.9959: Smart Home . . . . . . . . . . 12 | |||
| 6.2. Use case of Bluetooth LE: Smartphone-based Interaction . 13 | 6.2. Use case of Bluetooth LE: Smartphone-based Interaction . 13 | |||
| 6.3. Use case of DECT-ULE: Smart Home . . . . . . . . . . . . 13 | 6.3. Use case of DECT-ULE: Smart Home . . . . . . . . . . . . 14 | |||
| 6.4. Use case of MS/TP: Building Automation Networks . . . . . 14 | 6.4. Use case of MS/TP: Building Automation Networks . . . . . 14 | |||
| 6.5. Use case of NFC: Alternative Secure Transfer . . . . . . 15 | 6.5. Use case of NFC: Alternative Secure Transfer . . . . . . 15 | |||
| 6.6. Use case of PLC: Smart Grid . . . . . . . . . . . . . . . 15 | 6.6. Use case of PLC: Smart Grid . . . . . . . . . . . . . . . 15 | |||
| 7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 16 | 7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 16 | |||
| 8. Security Considerations . . . . . . . . . . . . . . . . . . . 16 | 8. Security Considerations . . . . . . . . . . . . . . . . . . . 17 | |||
| 9. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 16 | 9. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 17 | |||
| 10. References . . . . . . . . . . . . . . . . . . . . . . . . . 17 | 10. References . . . . . . . . . . . . . . . . . . . . . . . . . 17 | |||
| 10.1. Normative References . . . . . . . . . . . . . . . . . . 17 | 10.1. Normative References . . . . . . . . . . . . . . . . . . 17 | |||
| 10.2. Informative References . . . . . . . . . . . . . . . . . 19 | 10.2. Informative References . . . . . . . . . . . . . . . . . 19 | |||
| Appendix A. Design Space Dimensions for 6lo Deployment . . . . . 20 | Appendix A. Design Space Dimensions for 6lo Deployment . . . . . 22 | |||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 22 | Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 23 | |||
| 1. Introduction | 1. Introduction | |||
| Running IPv6 on constrained node networks has different features from | Running IPv6 on constrained node networks has different features from | |||
| general node networks due to the characteristics of constrained node | general node networks due to the characteristics of constrained node | |||
| networks such as small packet size, short link-layer address, low | networks such as small packet size, short link-layer address, low | |||
| bandwidth, network topology, low power, low cost, and large number of | bandwidth, network topology, low power, low cost, and large number of | |||
| devices [RFC4919][RFC7228]. For example, some IEEE 802.15.4 link | devices [RFC4919][RFC7228]. For example, some IEEE 802.15.4 link | |||
| layers have a frame size of 127 octets and IPv6 requires the layer | layers[IEEE802154] have a frame size of 127 octets and IPv6 requires | |||
| below to support an MTU of 1280 bytes, therefore an appropriate | the layer below to support an MTU of 1280 bytes, therefore an | |||
| fragmentation and reassembly adaptation layer must be provided at the | appropriate fragmentation and reassembly adaptation layer must be | |||
| layer below IPv6. Also, the limited size of IEEE 802.15.4 frame and | provided at the layer below IPv6. Also, the limited size of IEEE | |||
| low energy consumption requirements make the need for header | 802.15.4 frame and low energy consumption requirements make the need | |||
| compression. The IETF 6LoPWAN (IPv6 over Low powerWPAN) working | for header compression. The IETF 6LoPWAN (IPv6 over Low powerWPAN) | |||
| group published an adaptation layer for sending IPv6 packets over | working group published an adaptation layer for sending IPv6 packets | |||
| IEEE 802.15.4 [RFC4944], which includes a compression format for IPv6 | over IEEE 802.15.4 [RFC4944], which includes a compression format for | |||
| datagrams over IEEE 802.15.4-based networks [RFC6282], and Neighbor | IPv6 datagrams over IEEE 802.15.4-based networks [RFC6282], and | |||
| Discovery Optimization for 6LoPWAN [RFC6775]. | Neighbor Discovery Optimization for 6LoPWAN [RFC6775]. | |||
| As IoT (Internet of Things) services become more popular, IPv6 over | As IoT (Internet of Things) services become more popular, IPv6 over | |||
| various link layer technologies such as Bluetooth Low Energy | various link layer technologies such as Bluetooth Low Energy | |||
| (Bluetooth LE), ITU-T G.9959 (Z-Wave), Digital Enhanced Cordless | (Bluetooth LE), ITU-T G.9959 (Z-Wave), Digital Enhanced Cordless | |||
| Telecommunications - Ultra Low Energy (DECT-ULE), Master-Slave/Token | Telecommunications - Ultra Low Energy (DECT-ULE), Master-Slave/Token | |||
| Passing (MS/TP), Near Field Communication (NFC), and Power Line | Passing (MS/TP), Near Field Communication (NFC), and Power Line | |||
| Communication (PLC) have been defined at [IETF_6lo] working group. | Communication (PLC) have been defined at IETF 6lo working | |||
| IPv6 stacks for constrained node networks use a variation of the | group[IETF_6lo]. IPv6 stacks for constrained node networks use a | |||
| 6LoWPAN stack applied to each particular link layer technology. | variation of the 6LoWPAN stack applied to each particular link layer | |||
| technology. | ||||
| In the 6LoPWAN working group, the [RFC6568], "Design and Application | In the 6LoPWAN working group, the [RFC6568], "Design and Application | |||
| Spaces for 6LoWPANs" was published and it describes potential | Spaces for 6LoWPANs" was published and it describes potential | |||
| application scenarios and use cases for low-power wireless personal | application scenarios and use cases for low-power wireless personal | |||
| area networks. Hence, this 6lo applicability document aims to | area networks. Hence, this 6lo applicability document aims to | |||
| provide guidance to an audience who are new to IPv6-over-low-power | provide guidance to an audience who are new to IPv6-over-low-power | |||
| networks concept and want to assess if variance of 6LoWPAN stack | networks concept and want to assess if variance of 6LoWPAN stack | |||
| [6lo] can be applied to the constrained layer two (L2) network of | (6lo) can be applied to the constrained layer two (L2) network of | |||
| their interest. This 6lo applicability document puts together | their interest. This 6lo applicability document puts together | |||
| various design space dimensions such as deployment, network size, | various design space dimensions such as deployment, network size, | |||
| power source, connectivity, multi-hop communication, traffic pattern, | power source, connectivity, multi-hop communication, traffic pattern, | |||
| security level, mobility, and QoS requirements etc. In addition, it | security level, mobility, and QoS requirements etc. In addition, it | |||
| describes a few set of 6LoPWAN application scenarios and practical | describes a few set of 6LoPWAN application scenarios and practical | |||
| deployment as examples. | deployment as examples. | |||
| This document provides the applicability and use cases of 6lo, | This document provides the applicability and use cases of 6lo, | |||
| considering the following aspects: | considering the following aspects: | |||
| skipping to change at page 9, line 28 ¶ | skipping to change at page 9, line 28 ¶ | |||
| o Distribution Automation | o Distribution Automation | |||
| o Home/Building Energy Management Systems | o Home/Building Energy Management Systems | |||
| o Smart Street Lighting | o Smart Street Lighting | |||
| o Advanced Metering Infrastructure (AMI) backbone network | o Advanced Metering Infrastructure (AMI) backbone network | |||
| o Wind/Solar Farm Monitoring | o Wind/Solar Farm Monitoring | |||
| In the G3-PLC specification, the 6lo adaptation layer utilizes the | In the G3-PLC specification, the 6lo adaption layer utilizes the | |||
| 6LoWPAN functions (e.g. header compression, fragmentation and | 6LoWPAN functions (e.g. header compression, fragmentation and | |||
| reassembly) so as to enable IPv6 packet transmission. LOADng, which | reassembly). However, due to the different characteristics of the | |||
| is a lightweight variant of AODV, is applied as the mesh-under | PLC media, the 6LoWPAN adaptation layer cannot perfectly fulfill the | |||
| routing protocol in G3-PLC networks. Address assignment and network | requirements[I-D.ietf-6lo-plc]. The ESC dispatch type is used in the | |||
| configuration are based on the bootstrapping protocol specified in | G3-PLC to provide native mesh routing and bootstrapping | |||
| ITU-T G.9903. The network layer consists of IPv6 and ICMPv6 while | functionalities[RFC8066]. | |||
| the transport protocol UDP is used for data transmission. | ||||
| 4.2. Netricity usage of 6lo in network layer | 4.2. Netricity usage of 6lo in network layer | |||
| The Netricity program in HomePlug Powerline Alliance [NETRICITY] | The Netricity program in HomePlug Powerline Alliance [NETRICITY] | |||
| promotes the adoption of products built on the IEEE 1901.2 Low- | promotes the adoption of products built on the IEEE 1901.2 Low- | |||
| Frequency Narrow-Band PLC standard, which provides for urban and long | Frequency Narrow-Band PLC standard, which provides for urban and long | |||
| distance communications and propagation through transformers of the | distance communications and propagation through transformers of the | |||
| distribution network using frequencies below 500 kHz. The technology | distribution network using frequencies below 500 kHz. The technology | |||
| also addresses requirements that assure communication privacy and | also addresses requirements that assure communication privacy and | |||
| secure networks. | secure networks. | |||
| The main application domains targeted by Netricity are smart grid and | The main application domains targeted by Netricity are smart grid and | |||
| smart cities. This includes, but is not limited to the following | smart cities. This includes, but is not limited to the following | |||
| applications: | applications: | |||
| o Utility grid modernization | o Utility grid modernization | |||
| o Distribution automation | ||||
| o Distribution automation | ||||
| o Meter-to-Grid connectivity | o Meter-to-Grid connectivity | |||
| o Micro-grids | o Micro-grids | |||
| o Grid sensor communications | o Grid sensor communications | |||
| o Load control | o Load control | |||
| o Demand response | o Demand response | |||
| skipping to change at page 11, line 22 ¶ | skipping to change at page 11, line 22 ¶ | |||
| unfragmented application packets would be optimum for packet | unfragmented application packets would be optimum for packet | |||
| transmission if the deployment can afford it. Please refer to 6lo | transmission if the deployment can afford it. Please refer to 6lo | |||
| RFCs [RFC7668], [RFC8163], [RFC8105] for example guidance. | RFCs [RFC7668], [RFC8163], [RFC8105] for example guidance. | |||
| o Mesh or L3-Routing: 6LoWPAN specifications do provide mechanisms | o Mesh or L3-Routing: 6LoWPAN specifications do provide mechanisms | |||
| to support for mesh routing at L2. [RFC6550] defines layer three | to support for mesh routing at L2. [RFC6550] defines layer three | |||
| (L3) routing for low power lossy networks using directed graphs. | (L3) routing for low power lossy networks using directed graphs. | |||
| 6LoWPAN is routing protocol agnostic and other L2 or L3 routing | 6LoWPAN is routing protocol agnostic and other L2 or L3 routing | |||
| protocols can be run using a 6LoWPAN stack. | protocols can be run using a 6LoWPAN stack. | |||
| o Address Assignment: 6LoWPAN requires that IPv6 Neighbor Discovery | o Address Assignment: 6LoWPAN developed a new version of IPv6 | |||
| for low power networks [RFC6775] be used for autoconfiguration of | Neighbor Discovery[RFC4861][RFC4862] that relies on a proactive | |||
| stateless IPv6 address assignment. Considering the energy | registration to avoid the use of multicast. 6LoWPAN Neighbor | |||
| sensitive networks [RFC6775] makes optimization from classical | Discovery[RFC6775][RFC8505] inherits from IPv6 Neighbor Discovery | |||
| IPv6 ND [RFC4861] protocol. It is the responsibility of the | for mechanisms such as Stateless Address Autoconfiguration(SLAAC) | |||
| deployment to ensure unique global IPv6 addresses for the Internet | and Neighbor Unreachability Detection(NUD), but uses a unicast | |||
| connectivity. For local-only connectivity IPv6 ULA may be used. | method for Duplicate Address Detection(DAD), and avoids multicast | |||
| [RFC6775] specifies the 6LoWPAN border router(6LBR) which is | lookups from all nodes by using non-onlink prefixes. A 6LoWPAN | |||
| responsible for prefix assignment to the 6lo/6LoWPAN network. 6LBR | Node is also expected to be an IPv6 host per[RFC8200] which means | |||
| can be connected to the Internet or Enterprise network via its one | it should ignore consumed routing headers and Hop-by-Hop options; | |||
| of the interfaces. Please refer to [RFC7668] and [RFC8105] for | when operating in a RPL network[RFC6550], it is also beneficial to | |||
| examples of address assignment considerations. In addition, | support IP-in-IP encapsulation [I-D.ietf-roll-useofrplinfo]. The | |||
| privacy considerations [RFC8065] must be consulted for | 6LoWPWAN Node should also support [RFC8505] and use it as the | |||
| applicability. In certain scenarios, the deployment may not | default Neighbor Discovery method. It is the responsibility of | |||
| the deployment to ensure unique global IPv6 addresses for the | ||||
| Internet connectivity. For local-only connectivity IPv6 ULA may | ||||
| be used. [RFC6775] specifies the 6LoWPAN border router(6LBR) | ||||
| which is responsible for prefix assignment to the 6lo/6LoWPAN | ||||
| network. 6LBR can be connected to the Internet or Enterprise | ||||
| network via its one of the interfaces. Please refer to [RFC7668] | ||||
| and [RFC8105] for examples of address assignment considerations. | ||||
| In addition, privacy considerations [RFC8065] must be consulted | ||||
| for applicability. In certain scenarios, the deployment may not | ||||
| support autoconfiguration of IPv6 addressing due to regulatory and | support autoconfiguration of IPv6 addressing due to regulatory and | |||
| business reasons and may choose to offer a separate address | business reasons and may choose to offer a separate address | |||
| assignment service. | assignment service. | |||
| o Header Compression: IPv6 header compression [RFC6282] is a vital | o Header Compression: IPv6 header compression [RFC6282] is a vital | |||
| part of IPv6 over low power communication. Examples of header | part of IPv6 over low power communication. Examples of header | |||
| compression for different link-layers specifications are found in | compression for different link-layers specifications are found in | |||
| [RFC7668], [RFC8163], [RFC8105]. A generic header compression | [RFC7668], [RFC8163], [RFC8105]. A generic header compression | |||
| technique is specified in [RFC7400]. | technique is specified in [RFC7400]. | |||
| o Security and Encryption: Though 6LoWPAN basic specifications do | o Security and Encryption: Though 6LoWPAN basic specifications do | |||
| not address security at the network layer, the assumption is that | not address security at the network layer, the assumption is that | |||
| L2 security must be present. In addition, application level | L2 security must be present. In addition, application level | |||
| security is highly desirable. The working groups [ace] and [core] | security is highly desirable. The working groups [IETF_ace] and | |||
| should be consulted for application and transport level security. | [IETF_core] should be consulted for application and transport | |||
| 6lo working group is working on address authentication [6lo-ap-nd] | level security. 6lo working group is working on address | |||
| and secure bootstrapping is also being discussed at IETF. | authentication [I-D.ietf-6lo-ap-nd] and secure bootstrapping is | |||
| also being discussed at IETF. However, there may be different | ||||
| However, there may be different levels of security available in a | levels of security available in a deployment through other | |||
| deployment through other standards such as hardware level security | standards such as hardware level security or certificates for | |||
| or certificates for initial booting process. Encryption is | initial booting process. Encryption is important if the | |||
| important if the implementation can afford it. | implementation can afford it. | |||
| o Additional processing: [RFC8066] defines guidelines for ESC | o Additional processing: [RFC8066] defines guidelines for ESC | |||
| dispatch octets use in the 6LoWPAN header. An implementation may | dispatch octets use in the 6LoWPAN header. An implementation may | |||
| take advantage of ESC header to offer a deployment specific | take advantage of ESC header to offer a deployment specific | |||
| processing of 6LoWPAN packets. | processing of 6LoWPAN packets. | |||
| 6. 6lo Use Case Examples | 6. 6lo Use Case Examples | |||
| As IPv6 stacks for constrained node networks use a variation of the | As IPv6 stacks for constrained node networks use a variation of the | |||
| 6LoWPAN stack applied to each particular link layer technology, | 6LoWPAN stack applied to each particular link layer technology, | |||
| skipping to change at page 19, line 21 ¶ | skipping to change at page 19, line 37 ¶ | |||
| [RFC8163] Lynn, K., Ed., Martocci, J., Neilson, C., and S. | [RFC8163] Lynn, K., Ed., Martocci, J., Neilson, C., and S. | |||
| Donaldson, "Transmission of IPv6 over Master-Slave/Token- | Donaldson, "Transmission of IPv6 over Master-Slave/Token- | |||
| Passing (MS/TP) Networks", RFC 8163, DOI 10.17487/RFC8163, | Passing (MS/TP) Networks", RFC 8163, DOI 10.17487/RFC8163, | |||
| May 2017, <https://www.rfc-editor.org/info/rfc8163>. | May 2017, <https://www.rfc-editor.org/info/rfc8163>. | |||
| [RFC8352] Gomez, C., Kovatsch, M., Tian, H., and Z. Cao, Ed., | [RFC8352] Gomez, C., Kovatsch, M., Tian, H., and Z. Cao, Ed., | |||
| "Energy-Efficient Features of Internet of Things | "Energy-Efficient Features of Internet of Things | |||
| Protocols", RFC 8352, DOI 10.17487/RFC8352, April 2018, | Protocols", RFC 8352, DOI 10.17487/RFC8352, April 2018, | |||
| <https://www.rfc-editor.org/info/rfc8352>. | <https://www.rfc-editor.org/info/rfc8352>. | |||
| [RFC8505] Thubert, P., Ed., Nordmark, E., Chakrabarti, S., and C. | ||||
| Perkins, "Registration Extensions for IPv6 over Low-Power | ||||
| Wireless Personal Area Network (6LoWPAN) Neighbor | ||||
| Discovery", RFC 8505, DOI 10.17487/RFC8505, November 2018, | ||||
| <https://www.rfc-editor.org/info/rfc8505>. | ||||
| 10.2. Informative References | 10.2. Informative References | |||
| [RFC4861] Narten, T., Nordmark, E., Simpson, W., and H. Soliman, | [RFC4861] Narten, T., Nordmark, E., Simpson, W., and H. Soliman, | |||
| "Neighbor Discovery for IP version 6 (IPv6)", RFC 4861, | "Neighbor Discovery for IP version 6 (IPv6)", RFC 4861, | |||
| DOI 10.17487/RFC4861, September 2007, | DOI 10.17487/RFC4861, September 2007, | |||
| <https://www.rfc-editor.org/info/rfc4861>. | <https://www.rfc-editor.org/info/rfc4861>. | |||
| [RFC4862] Thomson, S., Narten, T., and T. Jinmei, "IPv6 Stateless | ||||
| Address Autoconfiguration", RFC 4862, | ||||
| DOI 10.17487/RFC4862, September 2007, | ||||
| <https://www.rfc-editor.org/info/rfc4862>. | ||||
| [RFC8200] Deering, S. and R. Hinden, "Internet Protocol, Version 6 | ||||
| (IPv6) Specification", STD 86, RFC 8200, | ||||
| DOI 10.17487/RFC8200, July 2017, | ||||
| <https://www.rfc-editor.org/info/rfc8200>. | ||||
| [I-D.ietf-6lo-nfc] | [I-D.ietf-6lo-nfc] | |||
| Choi, Y., Hong, Y., Youn, J., Kim, D., and J. Choi, | Choi, Y., Hong, Y., Youn, J., Kim, D., and J. Choi, | |||
| "Transmission of IPv6 Packets over Near Field | "Transmission of IPv6 Packets over Near Field | |||
| Communication", draft-ietf-6lo-nfc-15 (work in progress), | Communication", draft-ietf-6lo-nfc-15 (work in progress), | |||
| July 2019. | July 2019. | |||
| [I-D.ietf-6lo-blemesh] | [I-D.ietf-6lo-blemesh] | |||
| Gomez, C., Darroudi, S., Savolainen, T., and M. Spoerk, | Gomez, C., Darroudi, S., Savolainen, T., and M. Spoerk, | |||
| "IPv6 Mesh over BLUETOOTH(R) Low Energy using IPSP", | "IPv6 Mesh over BLUETOOTH(R) Low Energy using IPSP", | |||
| draft-ietf-6lo-blemesh-05 (work in progress), March 2019. | draft-ietf-6lo-blemesh-06 (work in progress), September | |||
| 2019. | ||||
| [I-D.ietf-6lo-plc] | [I-D.ietf-6lo-plc] | |||
| Hou, J., Liu, B., Hong, Y., Tang, X., and C. Perkins, | Hou, J., Liu, B., Hong, Y., Tang, X., and C. Perkins, | |||
| "Transmission of IPv6 Packets over PLC Networks", draft- | "Transmission of IPv6 Packets over PLC Networks", draft- | |||
| ietf-6lo-plc-00 (work in progress), February 2019. | ietf-6lo-plc-00 (work in progress), February 2019. | |||
| [I-D.ietf-roll-useofrplinfo] | ||||
| Robles, I., Richardson, M., and P. Thubert, "Using RPL | ||||
| Option Type, Routing Header for Source Routes and IPv6-in- | ||||
| IPv6 encapsulation in the RPL Data Plane", draft-ietf- | ||||
| roll-useofrplinfo-31 (work in progress), August 2019. | ||||
| [I-D.ietf-6lo-ap-nd] | ||||
| Thubert, P., Sarikaya, B., Sethi, M., and R. Struik, | ||||
| "Address Protected Neighbor Discovery for Low-power and | ||||
| Lossy Networks", draft-ietf-6lo-ap-nd-12 (work in | ||||
| progress), April 2019. | ||||
| [IETF_6lo] | [IETF_6lo] | |||
| "IETF IPv6 over Networks of Resource-constrained Nodes | "IETF IPv6 over Networks of Resource-constrained Nodes | |||
| (6lo) working group", | (6lo) working group", | |||
| <https://datatracker.ietf.org/wg/6lo/charter/>. | <https://datatracker.ietf.org/wg/6lo/charter/>. | |||
| [IETF_ace] | ||||
| "IETF Authentication and Authorization for Constrained | ||||
| Environments (ace) working group", | ||||
| <https://datatracker.ietf.org/wg/ace/charter/>. | ||||
| [IETF_core] | ||||
| "IETF Constrained RESTful Environments (core) working | ||||
| group", <https://datatracker.ietf.org/wg/core/charter/>. | ||||
| [IEEE802154] | ||||
| IEEE standard for Information Technology, "IEEE Std. | ||||
| 802.15.4, Part. 15.4: Wireless Medium Access Control (MAC) | ||||
| and Physical Layer (PHY) Specifications for Low-Rate | ||||
| Wireless Personal Area Networks". | ||||
| [TIA-485-A] | [TIA-485-A] | |||
| "TIA, "Electrical Characteristics of Generators and | "TIA, "Electrical Characteristics of Generators and | |||
| Receivers for Use in Balanced Digital Multipoint Systems", | Receivers for Use in Balanced Digital Multipoint Systems", | |||
| TIA-485-A (Revision of TIA-485)", March 2003, | TIA-485-A (Revision of TIA-485)", March 2003, | |||
| <https://global.ihs.com/ | <https://global.ihs.com/ | |||
| doc_detail.cfm?item_s_key=00032964>. | doc_detail.cfm?item_s_key=00032964>. | |||
| [G3-PLC] "G3-PLC Alliance", <http://www.g3-plc.com/home/>. | [G3-PLC] "G3-PLC Alliance", <http://www.g3-plc.com/home/>. | |||
| [NETRICITY] | [NETRICITY] | |||
| End of changes. 22 change blocks. | ||||
| 55 lines changed or deleted | 109 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||