< draft-ietf-lpwan-schc-over-lorawan-06.txt   draft-ietf-lpwan-schc-over-lorawan-07.txt >
lpwan Working Group O. Gimenez, Ed. lpwan Working Group O. Gimenez, Ed.
Internet-Draft Semtech Internet-Draft Semtech
Intended status: Informational I. Petrov, Ed. Intended status: Informational I. Petrov, Ed.
Expires: October 2, 2020 Acklio Expires: October 19, 2020 Acklio
March 31, 2020 April 17, 2020
Static Context Header Compression (SCHC) over LoRaWAN Static Context Header Compression (SCHC) over LoRaWAN
draft-ietf-lpwan-schc-over-lorawan-06 draft-ietf-lpwan-schc-over-lorawan-07
Abstract Abstract
The Static Context Header Compression (SCHC) specification describes The Static Context Header Compression (SCHC) specification describes
generic header compression and fragmentation techniques for LPWAN generic header compression and fragmentation techniques for LPWAN
(Low Power Wide Area Networks) technologies. SCHC is a generic (Low Power Wide Area Networks) technologies. SCHC is a generic
mechanism designed for great flexibility so that it can be adapted mechanism designed for great flexibility so that it can be adapted
for any of the LPWAN technologies. for any of the LPWAN technologies.
This document provides the adaptation of SCHC for use in LoRaWAN This document provides the adaptation of SCHC for use in LoRaWAN
skipping to change at page 1, line 39 skipping to change at page 1, line 39
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet- working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/. Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
This Internet-Draft will expire on October 2, 2020. This Internet-Draft will expire on October 19, 2020.
Copyright Notice Copyright Notice
Copyright (c) 2020 IETF Trust and the persons identified as the Copyright (c) 2020 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info) in effect on the date of (https://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
skipping to change at page 2, line 33 skipping to change at page 2, line 33
5.2. Rule ID management . . . . . . . . . . . . . . . . . . . 9 5.2. Rule ID management . . . . . . . . . . . . . . . . . . . 9
5.3. IID computation . . . . . . . . . . . . . . . . . . . . . 10 5.3. IID computation . . . . . . . . . . . . . . . . . . . . . 10
5.4. Padding . . . . . . . . . . . . . . . . . . . . . . . . . 11 5.4. Padding . . . . . . . . . . . . . . . . . . . . . . . . . 11
5.5. Decompression . . . . . . . . . . . . . . . . . . . . . . 11 5.5. Decompression . . . . . . . . . . . . . . . . . . . . . . 11
5.6. Fragmentation . . . . . . . . . . . . . . . . . . . . . . 11 5.6. Fragmentation . . . . . . . . . . . . . . . . . . . . . . 11
5.6.1. DTag . . . . . . . . . . . . . . . . . . . . . . . . 11 5.6.1. DTag . . . . . . . . . . . . . . . . . . . . . . . . 11
5.6.2. Uplink fragmentation: From device to SCHC gateway . . 12 5.6.2. Uplink fragmentation: From device to SCHC gateway . . 12
5.6.3. Downlink fragmentation: From SCHC gateway to a device 15 5.6.3. Downlink fragmentation: From SCHC gateway to a device 15
6. Security considerations . . . . . . . . . . . . . . . . . . . 18 6. Security considerations . . . . . . . . . . . . . . . . . . . 18
Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . . 18 Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . . 18
Contributors . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Contributors . . . . . . . . . . . . . . . . . . . . . . . . . . 18
9. References . . . . . . . . . . . . . . . . . . . . . . . . . 19 9. References . . . . . . . . . . . . . . . . . . . . . . . . . 19
9.1. Normative References . . . . . . . . . . . . . . . . . . 19 9.1. Normative References . . . . . . . . . . . . . . . . . . 19
9.2. Informative References . . . . . . . . . . . . . . . . . 21 9.2. Informative References . . . . . . . . . . . . . . . . . 20
Appendix A. Examples . . . . . . . . . . . . . . . . . . . . . . 21 Appendix A. Examples . . . . . . . . . . . . . . . . . . . . . . 21
A.1. Uplink - Compression example - No fragmentation . . . . . 21 A.1. Uplink - Compression example - No fragmentation . . . . . 21
A.2. Uplink - Compression and fragmentation example . . . . . 22 A.2. Uplink - Compression and fragmentation example . . . . . 21
A.3. Downlink . . . . . . . . . . . . . . . . . . . . . . . . 23 A.3. Downlink . . . . . . . . . . . . . . . . . . . . . . . . 23
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 25 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 25
1. Introduction 1. Introduction
The Static Context Header Compression (SCHC) specification The Static Context Header Compression (SCHC) specification [RFC8724]
[I-D.ietf-lpwan-ipv6-static-context-hc] describes generic header describes generic header compression and fragmentation techniques
compression and fragmentation techniques that can be used on all that can be used on all LPWAN (Low Power Wide Area Networks)
LPWAN (Low Power Wide Area Networks) technologies defined in technologies defined in [RFC8376]. Even though those technologies
[RFC8376]. Even though those technologies share a great number of share a great number of common features like star-oriented
common features like star-oriented topologies, network architecture, topologies, network architecture, devices with mostly quite
devices with mostly quite predictable communications, etc; they do predictable communications, etc; they do have some slight differences
have some slight differences in respect of payload sizes, in respect of payload sizes, reactiveness, etc.
reactiveness, etc.
SCHC gives a generic framework that enables those devices to SCHC gives a generic framework that enables those devices to
communicate with other Internet networks. However, for efficient communicate with other Internet networks. However, for efficient
performance, some parameters and modes of operation need to be set performance, some parameters and modes of operation need to be set
appropriately for each of the LPWAN technologies. appropriately for each of the LPWAN technologies.
This document describes the efficient parameters and modes of This document describes the efficient parameters and modes of
operation when SCHC is used over LoRaWAN networks. operation when SCHC is used over LoRaWAN networks.
2. Terminology 2. Terminology
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in BCP "OPTIONAL" in this document are to be interpreted as described in BCP
14 [RFC2119] [RFC8174] when, and only when, they appear in all 14 [RFC2119] [RFC8174] when, and only when, they appear in all
capitals, as shown here. capitals, as shown here.
This section defines the terminology and acronyms used in this This section defines the terminology and acronyms used in this
document. For all other definitions, please look up the SCHC document. For all other definitions, please look up the SCHC
specification [I-D.ietf-lpwan-ipv6-static-context-hc]. specification [RFC8724].
o DevEUI: an IEEE EUI-64 identifier used to identify the end-device o DevEUI: an IEEE EUI-64 identifier used to identify the end-device
during the procedure while joining the network (Join Procedure) during the procedure while joining the network (Join Procedure)
o DevAddr: a 32-bit non-unique identifier assigned to an end-device o DevAddr: a 32-bit non-unique identifier assigned to an end-device
statically or dynamically after a Join Procedure (depending on the statically or dynamically after a Join Procedure (depending on the
activation mode) activation mode)
o RCS: Reassembly Check Sequence. Used to verify the integrity of o RCS: Reassembly Check Sequence. Used to verify the integrity of
the fragmentation-reassembly process the fragmentation-reassembly process
o TBD: all significant LoRaWAN-related terms. o TBD: all significant LoRaWAN-related terms.
o OUI: Organisation Unique Identifier. IEEE assigned prefix for EUI o OUI: Organisation Unique Identifier. IEEE assigned prefix for EUI
3. Static Context Header Compression Overview 3. Static Context Header Compression Overview
This section contains a short overview of Static Context Header This section contains a short overview of Static Context Header
Compression (SCHC). For a detailed description, refer to the full Compression (SCHC). For a detailed description, refer to the full
specification [I-D.ietf-lpwan-ipv6-static-context-hc]. specification [RFC8724].
It defines: It defines:
1. Compression mechanisms to avoid transport of known data by both 1. Compression mechanisms to avoid transport of known data by both
sender and receiver over the air. Known data are part of the sender and receiver over the air. Known data are part of the
"context" "context"
2. Fragmentation mechanisms to allow SCHC Packet transportation on 2. Fragmentation mechanisms to allow SCHC Packet transportation on
small, and potentially variable, MTU small, and potentially variable, MTU
skipping to change at page 5, line 26 skipping to change at page 5, line 26
+-------+ |server | |server | +-------+ |server | |server |
+-------+ | F/R - C/D | +-------+ | F/R - C/D |
+-----------+ +-----------+
Figure 2: SCHC Architecture mapped to LoRaWAN Figure 2: SCHC Architecture mapped to LoRaWAN
4. LoRaWAN Architecture 4. LoRaWAN Architecture
An overview of LoRaWAN [lora-alliance-spec] protocol and architecture An overview of LoRaWAN [lora-alliance-spec] protocol and architecture
is described in [RFC8376]. The mapping between the LPWAN is described in [RFC8376]. The mapping between the LPWAN
architecture entities as described in architecture entities as described in [RFC8724] and the ones in
[I-D.ietf-lpwan-ipv6-static-context-hc] and the ones in
[lora-alliance-spec] is as follows: [lora-alliance-spec] is as follows:
o Devices (Dev) are the end-devices or hosts (e.g. sensors, o Devices (Dev) are the end-devices or hosts (e.g. sensors,
actuators, etc.). There can be a very high density of devices per actuators, etc.). There can be a very high density of devices per
radio gateway (LoRaWAN gateway). This entity maps to the LoRaWAN radio gateway (LoRaWAN gateway). This entity maps to the LoRaWAN
End-Device. End-Device.
o The Radio Gateway (RGW), which is the endpoint of the constrained o The Radio Gateway (RGW), which is the endpoint of the constrained
link. This entity maps to the LoRaWAN Gateway. link. This entity maps to the LoRaWAN Gateway.
skipping to change at page 8, line 12 skipping to change at page 8, line 12
As SCHC defines its own acknowledgment mechanisms, SCHC does not As SCHC defines its own acknowledgment mechanisms, SCHC does not
require to use confirmed messages. require to use confirmed messages.
4.4. LoRaWAN MAC Frames 4.4. LoRaWAN MAC Frames
o JoinRequest: This message is used by an end-device to join a o JoinRequest: This message is used by an end-device to join a
network. It contains the end-device's unique identifier devEUI network. It contains the end-device's unique identifier devEUI
and a random nonce that will be used for session key derivation. and a random nonce that will be used for session key derivation.
o JoinAccept: To on-board an end-device, the Network Server responds o JoinAccept: To on-board an end-device, the Network Server responds
to the JoinRequest issued by end-device's message with a to the JoinRequest issued by an end-device with a JoinAccept
JoinAccept message. That message is encrypted with the end- message. That message is encrypted with the end-device's AppKey
device's AppKey and contains (amongst other fields) the major and contains (amongst other fields) the major network's settings
network's settings and a network random nonce used to derive the and a network random nonce used to derive the session keys.
session keys.
o Data: MAC and application data. Application data are protected o Data: MAC and application data. Application data are protected
with AES-128 encryption, MAC related data are AES-128 encrypted with AES-128 encryption, MAC related data are AES-128 encrypted
with another key. with another key.
4.5. Unicast and multicast technology 4.5. Unicast and multicast technology
LoRaWAN technology supports unicast downlinks, but also multicast: a LoRaWAN technology supports unicast downlinks, but also multicast: a
packet send over LoRaWAN radio link can be received by several packet send over LoRaWAN radio link can be received by several
devices. It is useful to address many end-devices with same content, devices. It is useful to address many end-devices with same content,
skipping to change at page 10, line 28 skipping to change at page 10, line 28
In order to mitigate risks described in [RFC8064] and [RFC8065] IID In order to mitigate risks described in [RFC8064] and [RFC8065] IID
MUST be created regarding the following algorithm: MUST be created regarding the following algorithm:
1. key = LoRaWAN AppSKey 1. key = LoRaWAN AppSKey
2. cmac = aes128_cmac(key, devEui) 2. cmac = aes128_cmac(key, devEui)
3. IID = cmac[0..7] 3. IID = cmac[0..7]
aes128_cmac algorithm is described in [RFC4493]. It has been chosen aes128_cmac algorithm is described in [RFC4493]. It has been chosen
as it is already used by devices for LoRaWAN procotol. as it is already used by devices for LoRaWAN protocol.
As AppSKey is renewed each time a device joins or rejoins a network, As AppSKey is renewed each time a device joins or rejoins a network,
the IID will change over time; this mitigates privacy, location the IID will change over time; this mitigates privacy, location
tracking and correlation over time risks. Join periodicity is tracking and correlation over time risks. Join periodicity is
defined at the application level. defined at the application level.
Address scan risk is mitigated thanks to AES-128, which provides Address scan risk is mitigated thanks to AES-128, which provides
enough entropy bits of the IID. enough entropy bits of the IID.
Using this algorithm will also ensure that there is no correlation Using this algorithm will also ensure that there is no correlation
skipping to change at page 12, line 26 skipping to change at page 12, line 26
o SCHC fragmentation reliability mode: "ACK-on-Error" o SCHC fragmentation reliability mode: "ACK-on-Error"
o DTag: Size is 0 bit, not used o DTag: Size is 0 bit, not used
o FCN: The FCN field is encoded on N = 6 bits, so WINDOW_SIZE = 63 o FCN: The FCN field is encoded on N = 6 bits, so WINDOW_SIZE = 63
tiles are allowed in a window tiles are allowed in a window
o Window index: encoded on W = 2 bits. So 4 windows are available. o Window index: encoded on W = 2 bits. So 4 windows are available.
o RCS: Use recommended calculation algorithm in o RCS: Use recommended calculation algorithm in [RFC8724].
[I-D.ietf-lpwan-ipv6-static-context-hc].
o MAX_ACK_REQUESTS: 8 o MAX_ACK_REQUESTS: 8
o Tile: size is 10 bytes o Tile: size is 10 bytes
o Retransmission timer: LoRaWAN end-devices MUST NOT implement a o Retransmission timer: LoRaWAN end-devices MUST NOT implement a
"retransmission timer", this changes the specification of "retransmission timer", this changes the specification of
[I-D.ietf-lpwan-ipv6-static-context-hc], see Section 5.6.3.5. It [RFC8724], see Section 5.6.3.5. It must transmit MAX_ACK_REQUESTS
must transmit MAX_ACK_REQUESTS time the SCHC ACK REQ at it own time the SCHC ACK REQ at it own timing; ie the periodicity between
timing; ie the periodicity between retransmission of SCHC ACK REQs retransmission of SCHC ACK REQs is device specific and can vary
is device specific and can vary depending on other application depending on other application uplinks and regulations.
uplinks and regulations.
o Inactivity timer: The SCHC gateway implements an "inactivity o Inactivity timer: The SCHC gateway implements an "inactivity
timer". The default RECOMMENDED duration of this timer is 12 timer". The default RECOMMENDED duration of this timer is 12
hours; this value is mainly driven by application requirements and hours; this value is mainly driven by application requirements and
MAY be changed by the application. MAY be changed by the application.
o Penultimate tile MUST be equal to the regular size. o Penultimate tile MUST be equal to the regular size.
o Last tile: it can be carried in a Regular SCHC Fragment, alone in o Last tile: it can be carried in a Regular SCHC Fragment, alone in
an All-1 SCHC Fragment or with any of these two methods: an All-1 SCHC Fragment or with any of these two methods:
skipping to change at page 13, line 17 skipping to change at page 13, line 13
SCHC Fragment. SCHC Fragment.
* If last tile is in All-1 message: current L2 MTU MUST be big * If last tile is in All-1 message: current L2 MTU MUST be big
enough to fit the All-1 and the last tile. enough to fit the All-1 and the last tile.
With this set of parameters, the SCHC fragment header is 16 bits, With this set of parameters, the SCHC fragment header is 16 bits,
including FPort; payload overhead will be 8 bits as FPort is already including FPort; payload overhead will be 8 bits as FPort is already
a part of LoRaWAN payload. MTU is: _4 windows * 63 tiles * 10 bytes a part of LoRaWAN payload. MTU is: _4 windows * 63 tiles * 10 bytes
per tile = 2520 bytes_ per tile = 2520 bytes_
_Note_: As LoRaWAN is a radio communication, it is RECOMMENDED for an For battery powered SCHC sender, it is RECOMMENDED to use ACK
implementation to use ACK mechanism at the end of each window: mechanism at the end of each window instead of waiting the end of all
windows:
o SCHC receiver sends an SCHC ACK after every window even if there o SCHC receiver SHOULD send a SCHC ACK after every window even if
is no missing tiles. there is no missing tiles.
o SCHC sender waits for the SCHC ACK from the SCHC receiver before o SCHC sender SHOULD wait for the SCHC ACK from the SCHC receiver
sending tiles from next window. If the SCHC ACK is not received, before sending tiles from next window. If the SCHC ACK is not
it should send an SCHC ACK REQ up to MAX_ACK_REQUESTS time as received, it SHOULD send an SCHC ACK REQ up to MAX_ACK_REQUESTS
described previously. time as described previously.
This OPTIONAL feature allows the implementation to select between: * For non-battery powered devices, SCHC receiver MAY also choose to
SCHC ACK after every window: Save battery life by preventing a device send a SCHC ACK only at the end of all windows. It will reduce
to transmit full payload if the network cannot be reached * downlink load on the network, by reducing the number of downlinks.
Otherwise: Reduce downlink load on the network by reducing the number
of downlinks SCHC implementations MUST be compatible with both behavior, and
selection is a part of the rule context.
5.6.2.1. Regular fragments 5.6.2.1. Regular fragments
| FPort | LoRaWAN payload | | FPort | LoRaWAN payload |
+ ------ + ------------------------- + + ------ + ------------------------- +
| RuleID | W | FCN | Payload | | RuleID | W | FCN | Payload |
+ ------ + ------ + ------ + ------- + + ------ + ------ + ------ + ------- +
| 8 bits | 2 bits | 6 bits | | | 8 bits | 2 bits | 6 bits | |
Figure 7: All fragments except the last one. SCHC header size is 16 Figure 7: All fragments except the last one. SCHC header size is 16
skipping to change at page 15, line 22 skipping to change at page 15, line 22
o SCHC fragmentation reliability mode: o SCHC fragmentation reliability mode:
* Unicast downlinks: ACK-Always. * Unicast downlinks: ACK-Always.
* Multicast downlinks: No-ACK, reliability has to be ensured by * Multicast downlinks: No-ACK, reliability has to be ensured by
the upper layer. This feature is OPTIONAL and may not be the upper layer. This feature is OPTIONAL and may not be
implemented by SCHC gateway. implemented by SCHC gateway.
o RuleID: 8 bits stored in LoRaWAN FPort. o RuleID: 8 bits stored in LoRaWAN FPort.
o Window index (unicast only): encoded on W=1 bit, as per o Window index (unicast only): encoded on W=1 bit, as per [RFC8724].
[I-D.ietf-lpwan-ipv6-static-context-hc].
o DTag: Size is 0 bit, not used o DTag: Size is 0 bit, not used
o FCN: The FCN field is encoded on N=1 bit, so WINDOW_SIZE = 1 tile o FCN: The FCN field is encoded on N=1 bit, so WINDOW_SIZE = 1 tile
(FCN=All-1 is reserved for SCHC). (FCN=All-1 is reserved for SCHC).
o RCS: Use recommended calculation algorithm in o RCS: Use recommended calculation algorithm in [RFC8724].
[I-D.ietf-lpwan-ipv6-static-context-hc].
o MAX_ACK_REQUESTS: 8 o MAX_ACK_REQUESTS: 8
As only 1 tile is used, its size can change for each downlink, and As only 1 tile is used, its size can change for each downlink, and
will be maximum available MTU. will be maximum available MTU.
_Note_: The Fpending bit included in LoRaWAN protocol SHOULD NOT be _Note_: The Fpending bit included in LoRaWAN protocol SHOULD NOT be
used for SCHC-over-LoRaWAN protocol. It might be set by the Network used for SCHC-over-LoRaWAN protocol. It might be set by the Network
Server for other purposes but not SCHC needs. Server for other purposes but not SCHC needs.
skipping to change at page 18, line 31 skipping to change at page 18, line 31
receiving, the RECOMMENDED value is 30 seconds. This means that the receiving, the RECOMMENDED value is 30 seconds. This means that the
end-device shall try to transmit the ACK within 30 seconds of the end-device shall try to transmit the ACK within 30 seconds of the
reception of each fragment. The inactivity timer is implemented by reception of each fragment. The inactivity timer is implemented by
the end-device to flush the context in case it receives nothing from the end-device to flush the context in case it receives nothing from
the SCHC gateway over an extended period of time. The RECOMMENDED the SCHC gateway over an extended period of time. The RECOMMENDED
value is 12 hours for both Class B and Class C end-devices. value is 12 hours for both Class B and Class C end-devices.
6. Security considerations 6. Security considerations
This document is only providing parameters that are expected to be This document is only providing parameters that are expected to be
better suited for LoRaWAN networks for better suited for LoRaWAN networks for [RFC8724]. IID security is
[I-D.ietf-lpwan-ipv6-static-context-hc]. IID security is discussed discussed in Section 5.3. As such, this document does not contribute
in Section 5.3. As such, this document does not contribute to any to any new security issues in addition to those identified in
new security issues in addition to those identified in [RFC8724]. Moreover SCHC data (LoRaWAN payload) are protected on
[I-D.ietf-lpwan-ipv6-static-context-hc]. Moreover SCHC data (LoRaWAN LoRaWAN level by an AES-128 encryption with key shared by device and
payload) are protected on LoRaWAN level by an AES-128 encryption with SCHC gateway. Those keys are renew each LoRaWAN session (ie: each
key shared by device and SCHC gateway. Those keys are renew each join or rejoin to the network)
LoRaWAN session (ie: each join or rejoin to the network)
Acknowledgements Acknowledgements
Thanks to all those listed in the Contributors section for the Thanks to all those listed in the Contributors section for the
excellent text, insightful discussions, reviews and suggestions, and excellent text, insightful discussions, reviews and suggestions, and
also to (in alphabetical order) Dominique Barthel, Arunprabhu also to (in alphabetical order) Dominique Barthel, Arunprabhu
Kandasamy, Rodrigo Munoz, Alexander Pelov, Pascal Thubert, Laurent Kandasamy, Rodrigo Munoz, Alexander Pelov, Pascal Thubert, Laurent
Toutain for useful design considerations, reviews and comments. Toutain for useful design considerations, reviews and comments.
Contributors Contributors
skipping to change at page 19, line 37 skipping to change at page 19, line 31
Email: nsornin@semtech.com Email: nsornin@semtech.com
Alper Yegin Alper Yegin
Actility Actility
Email: alper.yegin@actility.com Email: alper.yegin@actility.com
9. References 9. References
9.1. Normative References 9.1. Normative References
[I-D.ietf-lpwan-ipv6-static-context-hc]
Minaburo, A., Toutain, L., Gomez, C., Barthel, D., and J.
Zuniga, "Static Context Header Compression (SCHC) and
fragmentation for LPWAN, application to UDP/IPv6", draft-
ietf-lpwan-ipv6-static-context-hc-24 (work in progress),
December 2019.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997, DOI 10.17487/RFC2119, March 1997,
<https://www.rfc-editor.org/info/rfc2119>. <https://www.rfc-editor.org/info/rfc2119>.
[RFC3385] Sheinwald, D., Satran, J., Thaler, P., and V. Cavanna, [RFC3385] Sheinwald, D., Satran, J., Thaler, P., and V. Cavanna,
"Internet Protocol Small Computer System Interface (iSCSI) "Internet Protocol Small Computer System Interface (iSCSI)
Cyclic Redundancy Check (CRC)/Checksum Considerations", Cyclic Redundancy Check (CRC)/Checksum Considerations",
RFC 3385, DOI 10.17487/RFC3385, September 2002, RFC 3385, DOI 10.17487/RFC3385, September 2002,
<https://www.rfc-editor.org/info/rfc3385>. <https://www.rfc-editor.org/info/rfc3385>.
skipping to change at page 21, line 5 skipping to change at page 20, line 36
February 2017, <https://www.rfc-editor.org/info/rfc8065>. February 2017, <https://www.rfc-editor.org/info/rfc8065>.
[RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
May 2017, <https://www.rfc-editor.org/info/rfc8174>. May 2017, <https://www.rfc-editor.org/info/rfc8174>.
[RFC8376] Farrell, S., Ed., "Low-Power Wide Area Network (LPWAN) [RFC8376] Farrell, S., Ed., "Low-Power Wide Area Network (LPWAN)
Overview", RFC 8376, DOI 10.17487/RFC8376, May 2018, Overview", RFC 8376, DOI 10.17487/RFC8376, May 2018,
<https://www.rfc-editor.org/info/rfc8376>. <https://www.rfc-editor.org/info/rfc8376>.
[RFC8724] Minaburo, A., Toutain, L., Gomez, C., Barthel, D., and JC.
Zuniga, "SCHC: Generic Framework for Static Context Header
Compression and Fragmentation", RFC 8724,
DOI 10.17487/RFC8724, April 2020,
<https://www.rfc-editor.org/info/rfc8724>.
9.2. Informative References 9.2. Informative References
[lora-alliance-remote-multicast-set] [lora-alliance-remote-multicast-set]
Alliance, L., "LoRaWAN Remote Multicast Setup Alliance, L., "LoRaWAN Remote Multicast Setup
Specification Version 1.0.0", <https://lora- Specification Version 1.0.0", <https://lora-
alliance.org/sites/default/files/2018-09/ alliance.org/sites/default/files/2018-09/
remote_multicast_setup_v1.0.0.pdf>. remote_multicast_setup_v1.0.0.pdf>.
[lora-alliance-spec] [lora-alliance-spec]
Alliance, L., "LoRaWAN Specification Version V1.0.3", Alliance, L., "LoRaWAN Specification Version V1.0.3",
 End of changes. 23 change blocks. 
65 lines changed or deleted 58 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/