| < draft-minaburo-lpwan-nbiot-hc-01.txt | draft-minaburo-lpwan-nbiot-hc-02.txt > | |||
|---|---|---|---|---|
| lpwan Working Group A. Minaburo | lpwan Working Group A. Minaburo | |||
| Internet-Draft Acklio | Internet-Draft Acklio | |||
| Intended status: Informational E. Ramos | Intended status: Informational E. Ramos | |||
| Expires: March 8, 2019 Ericsson | Expires: September 8, 2019 Ericsson | |||
| S. Shanmugalingam | S. Shanmugalingam | |||
| Acklio | Acklio | |||
| September 04, 2018 | March 07, 2019 | |||
| LPWAN Static Context Header Compression (SCHC) over NB-IoT | LPWAN Static Context Header Compression (SCHC) over NB-IoT | |||
| draft-minaburo-lpwan-nbiot-hc-01 | draft-minaburo-lpwan-nbiot-hc-02 | |||
| Abstract | Abstract | |||
| The Static Context Header Compression (SCHC) specification describes | The Static Context Header Compression (SCHC) specification describes | |||
| a header compression and fragmentation functionalities for LPWAN (Low | a header compression and fragmentation functionalities for LPWAN (Low | |||
| Power Wide Area Networks) technologies. SCHC was designed to be | Power Wide Area Networks) technologies. SCHC was designed to be | |||
| adapted over any of the LPWAN technologies. | adapted over any of the LPWAN technologies. | |||
| This document describes the use of SCHC over the NB-IoT wireless | This document describes the use of SCHC over the NB-IoT wireless | |||
| access, and provides elements for an efficient parameterization. | access, and provides elements for an efficient parameterization. | |||
| skipping to change at page 1, line 39 ¶ | skipping to change at page 1, line 39 ¶ | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at https://datatracker.ietf.org/drafts/current/. | Drafts is at https://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on March 8, 2019. | This Internet-Draft will expire on September 8, 2019. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2018 IETF Trust and the persons identified as the | Copyright (c) 2019 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (https://trustee.ietf.org/license-info) in effect on the date of | (https://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| carefully, as they describe your rights and restrictions with respect | carefully, as they describe your rights and restrictions with respect | |||
| to this document. Code Components extracted from this document must | to this document. Code Components extracted from this document must | |||
| include Simplified BSD License text as described in Section 4.e of | include Simplified BSD License text as described in Section 4.e of | |||
| the Trust Legal Provisions and are provided without warranty as | the Trust Legal Provisions and are provided without warranty as | |||
| described in the Simplified BSD License. | described in the Simplified BSD License. | |||
| Table of Contents | Table of Contents | |||
| 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 | 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
| 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3 | 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
| 3. Architecture . . . . . . . . . . . . . . . . . . . . . . . . 4 | 3. Architecture . . . . . . . . . . . . . . . . . . . . . . . . 4 | |||
| 3.1. Data Transmission . . . . . . . . . . . . . . . . . . . . 5 | 4. Data Transmission . . . . . . . . . . . . . . . . . . . . . . 6 | |||
| 3.2. Data Transmission over User Plane . . . . . . . . . . . . 6 | 5. IP based Data Transmission . . . . . . . . . . . . . . . . . 7 | |||
| 3.2.1. Packet Data Convergence Protocol (PDCP) . . . . . . . 7 | 5.1. SCHC over User Plane transmissions . . . . . . . . . . . 8 | |||
| 3.2.2. Radio Link Protocol (RLC) . . . . . . . . . . . . . . 7 | 5.1.1. SCHC Entities Placing . . . . . . . . . . . . . . . . 8 | |||
| 3.2.3. Medium Access Control (MAC) . . . . . . . . . . . . . 8 | 5.2. Data Over Control Plane . . . . . . . . . . . . . . . . . 9 | |||
| 3.3. Data Over Control Plane . . . . . . . . . . . . . . . . . 9 | 5.2.1. SCHC Entities Placing . . . . . . . . . . . . . . . . 10 | |||
| 3.4. SCHC entities . . . . . . . . . . . . . . . . . . . . . . 13 | 5.3. Parameters for Static Context Header Compression (SCHC) . 10 | |||
| 4. Static Context Header Compression . . . . . . . . . . . . . . 13 | 5.3.1. SCHC Context initialization . . . . . . . . . . . . . 11 | |||
| 4.1. SCHC Rules . . . . . . . . . . . . . . . . . . . . . . . 13 | 5.3.2. SCHC Rules . . . . . . . . . . . . . . . . . . . . . 11 | |||
| 4.2. Packet processing . . . . . . . . . . . . . . . . . . . . 13 | 5.3.3. Rule ID . . . . . . . . . . . . . . . . . . . . . . . 11 | |||
| 4.3. SCHC Context . . . . . . . . . . . . . . . . . . . . . . 13 | 5.3.4. SCHC MAX_PACKET_SIZE . . . . . . . . . . . . . . . . 12 | |||
| 5. Fragmentation . . . . . . . . . . . . . . . . . . . . . . . . 13 | 5.3.5. Fragmentation . . . . . . . . . . . . . . . . . . . . 12 | |||
| 5.1. Fragmentation modes . . . . . . . . . . . . . . . . . . . 14 | 6. Non-IP based Data Transmission . . . . . . . . . . . . . . . 13 | |||
| 5.2. Fragmentation Parameters . . . . . . . . . . . . . . . . 14 | 6.1. SCHC Entities Placing . . . . . . . . . . . . . . . . . . 13 | |||
| 6. Padding . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 | 6.2. Parameters for Static Context Header Compression . . . . 14 | |||
| 7. Security considerations . . . . . . . . . . . . . . . . . . . 14 | 6.2.1. SCHC Context initialization . . . . . . . . . . . . . 14 | |||
| 8. Appendix . . . . . . . . . . . . . . . . . . . . . . . . . . 14 | 6.2.2. SCHC Rules . . . . . . . . . . . . . . . . . . . . . 14 | |||
| 8.1. NB-IoT example with mobility . . . . . . . . . . . . . . 15 | 6.2.3. Rule ID . . . . . . . . . . . . . . . . . . . . . . . 14 | |||
| 9. Informative References . . . . . . . . . . . . . . . . . . . 15 | 6.2.4. SCHC MAX_PACKET_SIZE . . . . . . . . . . . . . . . . 14 | |||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 16 | 6.3. Fragmentation . . . . . . . . . . . . . . . . . . . . . . 14 | |||
| 6.3.1. Fragmentation modes . . . . . . . . . . . . . . . . . 15 | ||||
| 6.3.2. Fragmentation Parameters(TBD) . . . . . . . . . . . . 15 | ||||
| 7. Padding . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 | ||||
| 8. Security considerations . . . . . . . . . . . . . . . . . . . 16 | ||||
| 9. 3GPP References . . . . . . . . . . . . . . . . . . . . . . . 16 | ||||
| 10. Appendix . . . . . . . . . . . . . . . . . . . . . . . . . . 16 | ||||
| 10.1. NB-IoT User Plane protocol architecture . . . . . . . . 16 | ||||
| 10.1.1. Packet Data Convergence Protocol (PDCP) . . . . . . 16 | ||||
| 10.1.2. Radio Link Protocol (RLC) . . . . . . . . . . . . . 17 | ||||
| 10.1.3. Medium Access Control (MAC) . . . . . . . . . . . . 18 | ||||
| 10.2. NB-IoT Data over NAS (DoNAS) . . . . . . . . . . . . . . 19 | ||||
| 11. Informative References . . . . . . . . . . . . . . . . . . . 22 | ||||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 23 | ||||
| 1. Introduction | 1. Introduction | |||
| The Static Context Header Compression (SCHC) | The Static Context Header Compression (SCHC) | |||
| [I-D.ietf-lpwan-ipv6-static-context-hc] defines a header compression | [I-D.ietf-lpwan-ipv6-static-context-hc] defines a header compression | |||
| scheme and fragmentation functionality, both specially tailored for | scheme and fragmentation functionality, both specially tailored for | |||
| Low Power Wide Area Networks (LPWAN) networks defined in | Low Power Wide Area Networks (LPWAN) networks defined in [RFC8376]. | |||
| [I-D.ietf-lpwan-overview]. | ||||
| Header compression is needed to efficiently bring Internet | Header compression is needed to efficiently bring Internet | |||
| connectivity to the node within an NB-IoT network. SCHC uses an | connectivity to the node within an NB-IoT network. SCHC uses a | |||
| static context to performs header compression with specific | static context to performs header compression with specific | |||
| parameters that need to be adapted into the NB-IoT wireless access. | parameters that need to be adapted into the NB-IoT wireless access. | |||
| This document assumes functionality for NB-IoT of 3GPP release 15 | This document assumes functionality for NB-IoT of 3GPP release 15 | |||
| otherwise other versions functionality is explicitly mentioned in the | otherwise other versions functionality is explicitly mentioned in the | |||
| text. | text. | |||
| This document describes the use of SCHC and its parameterizing over | This document describes the use of SCHC and its parameterizing over | |||
| the NB-IoT wireless access. | the NB-IoT wireless access. | |||
| 2. Terminology | 2. Terminology | |||
| This document will follow the terms defined in | This document will follow the terms defined in | |||
| [I-D.ietf-lpwan-ipv6-static-context-hc], in | [I-D.ietf-lpwan-ipv6-static-context-hc], in [RFC8376], and the | |||
| [I-D.ietf-lpwan-overview], and the TGPP23720. | [TGPP23720]. | |||
| o CIoT. Cellular IoT | o CIoT. Cellular IoT | |||
| o C-SGN. CIoT Serving Gateway Node | o C-SGN. CIoT Serving Gateway Node | |||
| o UE. User Equipment | o UE. User Equipment | |||
| o eNB. Node B. Base Station that controls the UE | o eNB. Node B. Base Station that controls the UE | |||
| o EPC. Evolved Packet Connectivity. Core network of 3GPP LTE | o EPC. Evolved Packet Connectivity. Core network of 3GPP LTE | |||
| systems. | systems. | |||
| o EUTRAN. Evolved Universal Terrestrial Radio Access Network. | o EUTRAN. Evolved Universal Terrestrial Radio Access Network. | |||
| Radio network from LTE based systems. | Radio network from LTE based systems. | |||
| o MME. Mobility Management Entity. Handle mobility of the UE | o MME. Mobility Management Entity. Handle mobility of the UE | |||
| o NB-IoT. Narrow Band IoT. Referring to 3GPP LPWAN technology | o NB-IoT. Narrow Band IoT. Referring to 3GPP LPWAN technology | |||
| based in LTE architecture but with additional optmization for IoT | based in LTE architecture but with additional optimization for IoT | |||
| and using a Narrow Band spectrum frequency. | and using a Narrow Band spectrum frequency. | |||
| o SGW. Serving Gateway. Routes and forwards the user data packets | o SGW. Serving Gateway. Routes and forwards the user data packets | |||
| through the access network | through the access network | |||
| o HSS. Home Subscriber Server. It is a database that performs | o HSS. Home Subscriber Server. It is a database that performs | |||
| mobility management | mobility management | |||
| o PGW. Packet Data Node Gateway. Interface between the internal | o PGW. Packet Data Node Gateway. An interface between the internal | |||
| with the external network | with the external network | |||
| o PDU. Protocol Data Unit. Data packets including headers that are | o PDU. Protocol Data Unit. Data packets including headers that are | |||
| transmitted between entities through a protocol. | transmitted between entities through a protocol. | |||
| o SDU. Service Data Unit. Data packets (PDUs) from higher layers | o SDU. Service Data Unit. Data packets (PDUs) from higher layers | |||
| protocols used by lower layer protocols as payload of their own | protocols used by lower layer protocols as a payload of their own | |||
| PDUs that has not yet been encapsulated. | PDUs that has not yet been encapsulated. | |||
| o IWK-SCEF. InterWorking Service Capabilities Exposure Function. | o IWK-SCEF. InterWorking Service Capabilities Exposure Function. | |||
| Used in roaming scenarios and serves for interconnection with the | Used in roaming scenarios and serves for interconnection with the | |||
| SCEF of the Home PLMN and is located in the Visited PLMN | SCEF of the Home PLMN and is located in the Visited PLMN | |||
| o SCEF. Service Capability Exposure Function. EPC node for | o SCEF. Service Capability Exposure Function. EPC node for | |||
| exposure of 3GPP network service capabilities to 3rd party | exposure of 3GPP network service capabilities to 3rd party | |||
| applications. | applications. | |||
| 3. Architecture | 3. Architecture | |||
| ## NB-IoT entities | ||||
| +--+ | +--+ | |||
| |UE| \ +------+ +------+ | |UE| \ +-----+ +------+ | |||
| +--+ \ | MME |------| HSS | | +--+ \ | MME |-----| HSS | | |||
| \ / +------+ +------+ | \ / +-----+ +------+ | |||
| +--+ \+-----+ / | | +--+ \+-----+ / | | |||
| |UE| ----| eNB |- | | |UE| ----| eNB |- | | |||
| +--+ /+-----+ \ | | +--+ /+-----+ \ | | |||
| / \ +--------+ | / \ +------+ | |||
| / \| | +------+ Service PDN | / \| | +------+ Service PDN | |||
| +--+ / | S-GW |----| P-GW |---- e.g. Internet | +--+ / | S-GW |--| P-GW |-- e.g. Internet | |||
| |UE| | | +------+ | |UE| | | +------+ | |||
| +--+ +--------+ | +--+ +------+ | |||
| Figure 1: 3GPP network architecture | Figure 1: 3GPP network architecture | |||
| The architecture for 3GPP LTE network has been reused for NB-IoT with | The architecture for 3GPP LTE network has been reused for NB-IoT with | |||
| some optimizations and simplifications known as Cellular IoT (CIoT). | some optimizations and simplifications known as Cellular IoT (CIoT). | |||
| Considering the typical use cases for CIoT devices here are described | Considering the typical use cases for CIoT devices here are described | |||
| some of the additions to the LTE architecture specific for CIoT. | some of the additions to the LTE architecture specific for CIoT. | |||
| C-SGN(CIoT Serving Gateway Node) is a deployment option co-locating | C-SGN(CIoT Serving Gateway Node) is a deployment option co-locating | |||
| EPS entities in the control plane and user plane paths (for example, | EPS entities in the control plane and user plane paths (for example, | |||
| MME + SGW + P-GW) and the external interfaces of the entities | MME + SGW + P-GW) and the external interfaces of the entities | |||
| supported. The C-SGN also supports at least some of the following | supported. The C-SGN also supports at least some of the following | |||
| CIoT EPS Optimizations: * Control Plane CIoT EPS Optimization for | CIoT EPS Optimizations: | |||
| small data transmission. * User Plane CIoT EPS Optimization for | ||||
| small data transmission. * Necessary security procedures for | o Control Plane CIoT EPS Optimization for small data transmission. | |||
| efficient small data transmission. * SMS without combined attach for | ||||
| NB-IoT only UEs. * Paging optimizations for coverage enhancements. | o User Plane CIoT EPS Optimization for small data transmission. | |||
| * Support for non-IP data transmission via SGi tunneling and/or SCEF. | ||||
| * Support for Attach without PDN (Packet Data Network) connectivity. | o Necessary security procedures for efficient small data | |||
| transmission. | ||||
| o SMS without combined attach for NB-IoT only UEs. | ||||
| o Paging optimizations for coverage enhancements. | ||||
| o Support for non-IP data transmission via SGi tunneling and/or | ||||
| SCEF. | ||||
| o Support for Attach without PDN (Packet Data Network) connectivity. | ||||
| Another node introduced in the CIOT architecture is the SCEF (Service | Another node introduced in the CIOT architecture is the SCEF (Service | |||
| Capability Exposure Function) that provide means to securely expose | Capability Exposure Function) that provide means to securely expose | |||
| service and network capabilities to entities external to the network | service and network capabilities to entities external to the network | |||
| operator. The northbound APIS are defined by OMA and OneM2M. The | operator. The northbound APIS are defined by OMA and OneM2M. The | |||
| main functions of a SCEF are: * Non-IP Data Delivery (NIDD) | main functions of a SCEF are: | |||
| established through the SCEF. * Monitoring and exposure of event | ||||
| related to UE reachability, loss of connectivity, location reporting, | ||||
| roaming status, communication failure and change of IMEI-IMSI | ||||
| association. | ||||
| +---------+ | o Non-IP Data Delivery (NIDD) established through the SCEF. | |||
| | HSS | | ||||
| +---------+ | o Monitoring and exposure of event related to UE reachability, loss | |||
| of connectivity, location reporting, roaming status, communication | ||||
| failure and change of IMEI-IMSI association. | ||||
| +-------+ | ||||
| | HSS | | ||||
| +-+-----+ | ||||
| / | / | |||
| +-----------+ /S6a | +---------+ __/S6a | |||
| +--------+ | |/ | +--------+ | +-----+ +_/ | |||
| +----+ C-Uu | +----+ | T6i +--------+ T7 +----+ | +----+ C-Uu | +---+-+ MME | | T6i+--------+ T7 +----+ | |||
| |CIOT+--------+ eNB | S1 | +------+IWK-SCEF+----+SCEF| | |CIOT+--------+ eNB |S1 | | +-+----+IWK-SCEF+----+SCEF| | |||
| |UE | |(NB-IoT)| | | +--------+ +----+ | |UE | |(NB-IoT)| | +---+-+ | +--------+ +----+ | |||
| +----+ +--------+ | | +------------+ | +----+ +--------+ | | | | |||
| | C-SGN |SGd | SMS-GMSC/ | | |C-SGN| | | |||
| | +------+ IWMSC/SMS | | | |S11| | |||
| +--------+ | | | router | | +------+ | | | | |||
| +----+ LTE-Uu | | | | +------------+ | +--------+LTE-Uu| | | +--+-+ | | |||
| |LTE | (eMTC) | eNB +---+ | S8 +---+ +------+ | |LTE eMTC|(eMTC)|eNB +---+--+SGW | | S8+---+ +-----------+ | |||
| |eMTC+---------+(eMTC) | S1| +------+PGW|SGi |Appli.| | | UE +------+(eMTC)|S1 | | +-+---+PGW|SGi |Application| | |||
| | UE | +--------+ | | | +----+Server| | +--------+ +------+ | +----+ | | +----+Server (AS)| | |||
| +----+ +-----------+ +---+ | (AS) | | +---------+ +---+ +-----------+ | |||
| +------+ | ||||
| Figure 2: 3GPP optimized CIOT network architecture | Figure 2: 3GPP optimized CIOT network architecture | |||
| 3.1. Data Transmission | 4. Data Transmission | |||
| 3GPP networks deals not only with data transmitted end-to-end but | 3GPP networks deal not only with data transmitted end-to-end but also | |||
| also with in-band signaling that is used between the nodes and | with in-band signaling that is used between the nodes and functions | |||
| functions to configure, control and monitor the system functions and | to configure, control and monitor the system functions and behaviors. | |||
| behaviors. The control data is handled using a Control Plane which | The control data is handled using a Control Plane which has a | |||
| has an specific set of protocols, handling processes and entities. | specific set of protocols, handling processes and entities. In | |||
| In contrast the end-to-end or user data utilize a User Plane with | contrast, the end-to-end or user data utilize a User Plane with | |||
| characteristics of its own separated from the Control Plane. The | characteristics of its own separated from the Control Plane. The | |||
| handling and setup of the Control Plane and User Plane spans over the | handling and setup of the Control Plane and User Plane spans over the | |||
| whole 3GPP network and it has particular implications in the radio | whole 3GPP network and it has particular implications in the radio | |||
| network (i.e., EUTRAN) and in the packet core (ex., EPC). | network (i.e., EUTRAN) and in the packet core (ex., EPC). | |||
| For the CIOT cases, additionally to transmissions of data over User | For the CIOT cases, additionally to transmissions of data over User | |||
| Plane, 3GPP has specified optimizations for small data transmissions | Plane, 3GPP has specified optimizations for small data transmissions, | |||
| that allows to transport user data (IP, Non-IP) within signaling on | allowing to transport user data (IP, Non-IP) within signaling on the | |||
| the access network (Data transmission over Control Plane or Data Over | access network (Data transmission over Control Plane or Data Over | |||
| NAS). | NAS). | |||
| The maximum recommended MTU size is 1358 Bytes. The radio network | The maximum recommended MTU size is 1358 Bytes. The radio network | |||
| protocols limits the packet sizes to be transmitted over the air | protocols limit the packet sizes to be transmitted over the air | |||
| including radio protocol overhead to 1600 Octets. But the value is | including radio protocol overhead to 1600 Octets. But the value is | |||
| reduced further to avoid fragmentation in the backbone of the network | reduced further to avoid fragmentation in the backbone of the network | |||
| due to the payload encryption size (multiple of 16) and handling of | due to the payload encryption size (multiple of 16) and handling of | |||
| the additional core transport overhead. | the additional core transport overhead. | |||
| 3.2. Data Transmission over User Plane | NB-IoT and in general the cellular technologies interfaces and | |||
| functions are standardized by 3GPP. Therefore the introduction of | ||||
| The User Plane utilizes the protocol stack of the Access Stratum (AS) | SCHC entities to UE, eNB and C-SGN does need to be specified in the | |||
| for data transfer. AS (Access Stratum) is the functional layer | NB-IoT standard. This implies that standard specified SCHC support | |||
| responsible for transporting data over wireless connection and | would not be backwards compatible. A terminal or a network | |||
| managing radio resources. The user plane AS has support for features | supporting a version of the standard without support of SCHC or | |||
| such as reliability, segmentation and concatenation. The | without capability implementation (in case of not being standardized | |||
| transmissions of the AS utilize link adaptation, meaning that the | as mandatory capability) is not able to utilize the compression | |||
| transport format utilized for the transmissions are optimized | services with this approach. | |||
| according to the radio conditions, the number of bits to transmit and | ||||
| the power and interference constrains. That means that the number of | ||||
| bits transmitted over the air depends of the Modulation and Coding | ||||
| Schemes (MCS) selected. The transmissions in the physical layer | ||||
| happens at network synchronized intervals of times called TTI | ||||
| (Transmission Time Interval). The transmission of a Transport Block | ||||
| (TB) is completed during, at least, one TTI. Each Transport Block | ||||
| has a different MCS and number of bits available to transmit. The | ||||
| Transport Blocks characteristics are defined by the MAC technical | ||||
| specification {TGPP36321}. The Access Stratum for User Plane is | ||||
| comprised by Packet Data Convergence Protocol (PDCP) {TGPP36323}, | ||||
| Radio Link Protocol (RLC){TGPP36322}, Medium Access Control protocol | ||||
| (MAC){TGPP36321} and the Physical Layer {TGPP36201}. | ||||
| +---------+ +---------+ | | SCHC could be deployed differently depending on where the header | |||
| |IP/non-IP+--------------------------------+IP/non-IP+->+ | compression and the fragmentation are applied. The SCHC | |||
| +---------+ | +----------------+ | +---------+ | | functionalities could be applied to the packets about to be | |||
| | PDCP +-------+ PDCP | GTP|U +-------+ GTP-U |->+ | transmitted over the air, or to the whole end-to-end link. To | |||
| +---------+ | +----------------+ | +---------+ | | accomplish the first, it is required to place SCHC compression and | |||
| | RLC +-------+ RLC |UDP/IP +-------+ UDP/IP +->+ | decompression entities in the eNB and in the UE for transmissions | |||
| +---------+ | +----------------+ | +---------+ | | over the User Plane. Additionally, to handle the case of the | |||
| | MAC +-------+ MAC | L2 +-------+ L2 +->+ | transmissions over Control Plane or Data Over NAS, the network SCHC | |||
| +---------+ | +----------------+ | +---------+ | | entity has to be placed in the C-SGN as well. For these two cases, | |||
| | PHY +-------+ PHY | PHY +-------+ PHY +->+ | the functions are to be standardized by 3GPP. | |||
| +---------+ +----------------+ +---------+ | | ||||
| C-Uu/ S1-U SGi | ||||
| CIOT/ LTE+Uu C-BS/eNB C-SGN | ||||
| LTE eMTC | ||||
| UE | ||||
| Figure 3: 3GPP CIOT radio protocol architecture for data over user | Another possibility is to apply SCHC functionalities to the end-to- | |||
| plane | end connection or at least up to the operator network edge. In that | |||
| case, the SCHC entities would be placed in the application layer of | ||||
| the terminal in one end, and either in the application servers or in | ||||
| a broker function in the edge of the operator network in the other | ||||
| end. For the radio network, the packets are transmitted as non-IP | ||||
| traffic, which can be currently served utilizing IP tunneling or SCEF | ||||
| services. Since this option does not necessarily require 3GPP | ||||
| standardization, it is possible to also benefit legacy devices with | ||||
| SCHC by utilizing the non-IP transmission features of the operator | ||||
| network. | ||||
| 3.2.1. Packet Data Convergence Protocol (PDCP) | Accordingly, there are four different scenarios where SCHC can be | |||
| used in the NB-IoT architecture. IP header compression on the data | ||||
| transmission over User Plane, IP header compression on the optimized | ||||
| transmissions over Control Plane (i.e.,DoNAS), non-IP transmissions | ||||
| of SCHC packets by IP tunneling, and non-IP transmissions of SCHC | ||||
| packets by SCEF forwarding. The following sections describe each of | ||||
| them in more detail. The first two scenarios refer to transmissions | ||||
| using the 3GPP IP transmission capabilities and the last two refers | ||||
| to transmission using the Non-IP capabilities. | ||||
| Each of the Radio Bearers (RB) are associated with one PDCP entity. | 5. IP based Data Transmission | |||
| And a PDCP entity is associated with one or two RLC entities | 5.1. SCHC over User Plane transmissions | |||
| depending of the unidirectional or bi-directional characteristics of | ||||
| the RB and RLC mode used. A PDCP entity is associated either control | ||||
| plane or user plane which independent configuration and functions. | ||||
| The maximum supported size for NB-IoT of a PDCP SDU is 1600 octets. | ||||
| The main services and functions of the PDCP sublayer for NB-IoT for | ||||
| the user plane include: * Header compression and decompression by | ||||
| means of ROHC (Robust Header Compression) * Transfer of user and | ||||
| control data to higher and lower layers * Duplicate detection of | ||||
| lower layer SDUs when re-establishing connection (when RLC with | ||||
| Acknowledge Mode in use for User Plane only) * Ciphering and | ||||
| deciphering * Timer-based SDU discard in uplink | ||||
| 3.2.2. Radio Link Protocol (RLC) | Deploying SCHC only over the radio link would require to place it as | |||
| part of the User Plane data transmission. The User Plane utilizes | ||||
| the protocol stack of the Access Stratum (AS) for data transfer. AS | ||||
| (Access Stratum) is the functional layer responsible for transporting | ||||
| data over wireless connection and managing radio resources. The user | ||||
| plane AS has support for features such as reliability, segmentation | ||||
| and concatenation. The transmissions of the AS make use of link | ||||
| adaptation, meaning that the transport format utilized for the | ||||
| transmissions are optimized according to the radio conditions, the | ||||
| number of bits to transmit and the power and interference constrains. | ||||
| That means that the number of bits transmitted over the air depends | ||||
| of the Modulation and Coding Schemes (MCS) selected. The | ||||
| transmissions in the physical layer happens at network synchronized | ||||
| intervals of times called TTI (Transmission Time Interval). The | ||||
| transmission of a Transport Block (TB) is completed during, at least, | ||||
| one TTI. Each Transport Block has a different MCS and number of bits | ||||
| available to transmit. The Transport Blocks characteristics are | ||||
| defined by the MAC technical specification [TGPP36321]. The Access | ||||
| Stratum for User Plane is comprised by Packet Data Convergence | ||||
| Protocol (PDCP) [TGPP36323], Radio Link Protocol (RLC)[TGPP36322], | ||||
| Medium Access Control protocol (MAC)[TGPP36321] and the Physical | ||||
| Layer [TGPP36201]. More details of this protocols are given in the | ||||
| Appendix. | ||||
| RLC is a layer-2 protocol that operates between the UE and the base | 5.1.1. SCHC Entities Placing | |||
| station (eNB). It supports the packet delivery from higher layers to | ||||
| MAC creating packets that are transmitted over the air optimizing the | ||||
| Transport Block utilization. RLC flow of data packets is | ||||
| unidirectional and it is composed of a transmitter located in the | ||||
| transmission device and a receiver located in the destination device. | ||||
| Therefore to configure bi-directional flows, two set of entities, one | ||||
| in each direction (downlink and uplink) must be configured and they | ||||
| are effectively peered to each other. The peering allows the | ||||
| transmission of control packets (ex., status reports) between | ||||
| entities. RLC can be configured for data transfer in one of the | ||||
| following modes: * Transparent Mode (TM). In this mode RLC do not | ||||
| segment or concatenate SDUs from higher layers and do not include any | ||||
| header to the payload. When acting as a transmitter, RLC receives | ||||
| SDUs from upper layers and transmit directly to its flow RLC receiver | ||||
| via lower layers. Similarly, an TM RLC receiver would only deliver | ||||
| without additional processing the packets to higher layers upon | ||||
| reception. * Unacknowledged Mode (UM). This mode provides support | ||||
| for segmentation and concatenation of payload. The size of the RLC | ||||
| packet depends of the indication given at a particular transmission | ||||
| opportunity by the lower layer (MAC) and are octets aligned. The | ||||
| packet delivery to the receiver do not include support for | ||||
| reliability and the lost of a segment from a packet means a whole | ||||
| packet loss. Also in case of lower layer retransmissions there is no | ||||
| support for re-segmentation in case of change of the radio conditions | ||||
| triggring the selection of a smaller transport block. Additionally | ||||
| it provides PDU duplication detection and discard, reordering of out | ||||
| of sequence and loss detection. * Acknowledged Mode (AM). | ||||
| Additional to the same functions supported from UM, this mode also | ||||
| adds a moving windows based reliability service on top of the lower | ||||
| layer services. It also provides support for re-segmentation and it | ||||
| requires bidirectional communication to exchange acknowledgment | ||||
| reports called RLC Status Report and trigger retransmissions is | ||||
| needed. Protocol error detection is also supported by this mode. | ||||
| The mode uses depends of the operator configuration for the type of | ||||
| data to be transmitted. For example, data transmissions supporting | ||||
| mobility or requiring high reliability would be most likely | ||||
| configured using AM, meanwhile streaming and real time data would be | ||||
| map to a UM configuration. | ||||
| 3.2.3. Medium Access Control (MAC) | The current architecture provides support for header compression in | |||
| PDCP utilizing RoHC [RFC5795]. Therefore SCHC entities can be | ||||
| deployed in similar fashion without need for major changes in the | ||||
| 3GPP specifications. | ||||
| MAC provides a mapping between the higher layers abstraction called | In this scenario, RLC takes care of the handling of fragmentation (if | |||
| Logical Channels comprised by the previously described protocols to | transparent mode is not configured) when packets exceeds the | |||
| the Physical layer channels (transport channels). Additionally, MAC | transport block size at the time of transmission. Therefore SCHC | |||
| may multiplex packets from different Logical Channels and prioritize | fragmentation is not needed and should not be used to avoid | |||
| what to fit into one Transport Block if there is data and space | additional protocol overhead. It is not common to configure RLC in | |||
| available to maximize the efficiency of data transmission. MAC also | Transparent Mode for IP based user plane data. But given the case in | |||
| provides error correction and reliability support by means of HARQ, | the future, SCHC fragmentation may be used. In that case, a SCHC | |||
| transport format selection and scheduling information reporting from | tile would match the minimum transport block size minus the PDCP and | |||
| the terminal to the network. MAC also adds the necessary padding and | MAC headers. | |||
| piggyback control elements when possible additional to the higher | ||||
| layers data. | ||||
| <Max. 1600 bytes> | +---------+ +---------+ | | |||
| +-----+ +---+ +---------+ | |IP/non-IP+------------------------------+IP/non-IP+->+ | |||
| Application | AP1 | |AP1| | AP2 | | +---------+ | +---------------+ | +---------+ | | |||
| (IP/non-IP) | PDU | |PDU| | PDU | | | PDCP +-------+ PDCP | GTP|U +------+ GTP-U |->+ | |||
| +-----+ +---+ +---------+ | | (SCHC) + + (SCHC)| + + | | | |||
| | | | | | | | +---------+ | +---------------+ | +---------+ | | |||
| PDCP +----------+ +--------+ +--------------+ | | RLC +-------+ RLC |UDP/IP +------+ UDP/IP +->+ | |||
| |PDCP| AP1 | |PDCP|AP1| |PDCP| AP2 | | +---------+ | +---------------+ | +---------+ | | |||
| |Head| PDU | |Head|PDU| |Head| PDU | | | MAC +-------+ MAC | L2 +------+ L2 +->+ | |||
| +----------+ +--------+ +---------+----\ | +---------+ | +---------------+ | +---------+ | | |||
| | | | | | | | | |\ \_____ | | PHY +-------+ PHY | PHY +------+ PHY +->+ | |||
| | | | | | | | | | \ \ | +---------+ +---------------+ +---------+ | | |||
| +----------------------------+ | | (1)| \_____(2) \ | C-Uu/ S1-U SGi | |||
| RLC |RLC|PDCP| AP1 |RLC |PDCP|AP1| +--------------+ +----|----+ | CIOT/ LTE+Uu C-BS/eNB C-SGN | |||
| |Head|Head|PDU |Head|Head|PDU| |RLC |PDCP| AP2| |RLC | AP2| | LTE eMTC | |||
| +--------------|-------------+ |Head|Head| PDU| |Head| PDU| | UE | |||
| | | | | | +---------|----+ +---------+ | ||||
| | | | LCID1 | | / / / | | | ||||
| | | | | |/ / /LCID2| | | ||||
| | | | | | | | | | | ||||
| | | | | | | | | | | ||||
| +----------------------------------------------+ +---------+------+ | ||||
| M |MAC|RLC|PDCP| AP1 |RLC |PDCP|AP1|RLC |PDCP|AP2| |MAC |RLC | AP2|P| | ||||
| A |Hea|Hea|Hea-| PDU |Hea-|Hea-|PDU|Hea-|Hea-|PDU| |Hea-|Hea-| PDU|a| | ||||
| C |der|der| der| |der |der | |der |der |PDU| |der |der | |d| | ||||
| +----------------------------------------------+ +--------------+-+ | ||||
| TB1 TB2 | ||||
| Figure 4: Example of User Plane packet encapsulation for two | Figure 3: SCHC entities placement in the 3GPP CIOT radio protocol | |||
| transport blocks | architecture for data over user plane | |||
| 3.3. Data Over Control Plane | 5.2. Data Over Control Plane | |||
| The Non-Access Stratum (NAS), conveys mainly control signaling | The Non-Access Stratum (NAS), conveys mainly control signaling | |||
| between the UE and the cellular network {TGPP24301}. NAS is | between the UE and the cellular network [TGPP24301]. NAS is | |||
| transported on top of the Access Stratum (AS) already presented in | transported on top of the Access Stratum (AS) already mentioned in | |||
| the previous sections. | the previous section. | |||
| +---------+ +---------+---------+ | | ||||
| |IP/non-IP|---|-----------------------|---|IP/non-IP|IP/non-IP|->| | ||||
| +---------+ | | +---------+---------+ >| | ||||
| | NAS |---|-----------------------|---| NAS | GTP-C/U |->| | ||||
| +---------+ | +------+------+ | +---------+---------+ | | ||||
| | RRC |---|----| RRC | S1-AP|----|---| S1-AP | | | | ||||
| +---------+ | +------+------+ | +---------+ UDP |->| | ||||
| | PDCP* |---|----| PDCP*| SCTP |----|---| SCTP | | | | ||||
| +---------+ | +------+------+ | +---------+---------+ | | ||||
| | RLC |---|----| RLC | IP |----|---| IP | IP |->| | ||||
| +---------+ | +------+------+ | +---------+---------+ | | ||||
| | MAC |---|----| MAC | L2 |----|---| L2 | L2 |->| | ||||
| +---------+ | +------+------+ | +---------+---------+ | | ||||
| | PHY |---|----| PHY | PHY |----|---| PHY | PHY |->| | ||||
| +--------- +------+------+ +---------+---------+ | | ||||
| C-Uu/ S1-lite SGi | ||||
| CIOT/ LTE-Uu C-BS/eNB C-SGN | ||||
| LTE eMTC | ||||
| UE | ||||
| *PDCP is bypassed until AS security is activated TGPP36300. | ||||
| Figure 5: 3GPP CIOT radio protocol architecture for DoNAS | ||||
| transmissions | ||||
| NAS has been adapted to provide support for user plane data | NAS has been adapted to provide support for user plane data | |||
| transmissions to reduce the overhead when transmitting infrequent | transmissions to reduce the overhead when transmitting infrequent | |||
| small quantities of data. This is known as Data over NAS (DoNAS) or | small quantities of data. This is known as Data over NAS (DoNAS) or | |||
| Control Plane CIoT EPS optimization. In DoNAS the UE makes use of | Control Plane CIoT EPS optimization. In DoNAS the UE makes use of | |||
| the pre-established NAS security and piggyback uplink small data into | the pre-established NAS security and piggyback uplink small data into | |||
| the initial NAS uplink message, and uses an additional NAS message to | the initial NAS uplink message, and uses an additional NAS message to | |||
| receive downlink small data response. The data encryption from the | receive downlink small data response. | |||
| network side is performed by the C-SGN in a NAS PDU. The AS protocol | ||||
| stack used by DoNAS is somehow special. Since the security | ||||
| associations are not established yet in the radio network, to reduce | ||||
| the protocol overhead, PDCP (Packet Data Convergence Protocol) is | ||||
| bypassed until AS security is activated. RLC (Radio Link Control | ||||
| protocol) is configured by default in AM mode, but depending of the | ||||
| features supported by the network and the terminal it may be | ||||
| configured in other modes by the network operator. For example, the | ||||
| transparent mode does not add any header or does not process the | ||||
| payload in any way reducing the overhead, but the MTU would be | ||||
| limited by the transport block used to transmit the data which is | ||||
| couple of thousand of bits maximum. If UM (only Release 15 | ||||
| compatible terminals) is used, the RLC mechanisms of reliability is | ||||
| disabled and only the reliability provided by the MAC layer by Hybrid | ||||
| Automatic Repeat reQuest (HARQ) is available. In this case, the | ||||
| protocol overhead might be smaller than for the AM case because the | ||||
| lack of status reporting but with the same support for segmentation | ||||
| up to 16000 Bytes. NAS packet are encapsulated within a RRC (Radio | ||||
| Resource Control){TGPP36331} message. | ||||
| Depending of the data type indication signaled (IP or non-IP data), | The data encryption from the network side is performed by the C-SGN | |||
| the network allocates an IP address or just establish a direct | in a NAS PDU. Depending on the data type signaled indication (IP or | |||
| forwarding path. DoNAS is regulated under rate control upon previous | non-IP data), the network allocates an IP address or just establish a | |||
| agreement, meaning that a maximum number of bits per unit of time is | direct forwarding path. DoNAS (Data over NAS) is regulated under | |||
| agreed per device subscription beforehand and configured in the | rate control upon previous agreement, meaning that a maximum number | |||
| device. The use of DoNAS is typically expected when a terminal in a | of bits per unit of time is agreed per device subscription beforehand | |||
| power saving state requires to do a short transmission and receive an | and configured in the device. | |||
| acknowledgment or short feedback from the network. Depending of the | ||||
| The use of DoNAS is typically expected when a terminal in a power | ||||
| saving state requires to do a short transmission and receive an | ||||
| acknowledgment or short feedback from the network. Depending on the | ||||
| size of buffered data to transmit, the UE might be instructed to | size of buffered data to transmit, the UE might be instructed to | |||
| deploy the connected mode transmissions instead, limiting and | deploy the connected mode transmissions instead, limiting and | |||
| controlling the DoNAS transmissions to predefined thresholds and a | controlling the DoNAS transmissions to predefined thresholds and a | |||
| good resource optimization balance for the terminal and the network. | good resource optimization balance for the terminal and the network. | |||
| The support for mobility of DoNAS is present but produces additional | The support for mobility of DoNAS is present but produces additional | |||
| overhead. | overhead. Additional details of DoNAS are given in the Appendix. | |||
| +--------+ +--------+ +--------+ | 5.2.1. SCHC Entities Placing | |||
| | | | | | | +------------------+ | ||||
| | UE | | C-BS | | C-SGN | | Roaming Scenarios| | ||||
| +----|---+ +--------+ +--------+ | +--------+ | | ||||
| | | | | | | | | ||||
| +----------------|------------|+ | | P-GW | | | ||||
| | Attach | | +--------+ | | ||||
| +------------------------------+ | | | | ||||
| | | | | | | | ||||
| +------|------------|--------+ | | | | | ||||
| |RRC Connection Establishment| | | | | | ||||
| |with NAS PDU transmission | | | | | | ||||
| |& Ack Rsp | | | | | | ||||
| +----------------------------+ | | | | | ||||
| | | | | | | | ||||
| | |Initial UE | | | | | ||||
| | |message | | | | | ||||
| | |----------->| | | | | ||||
| | | | | | | | ||||
| | | +---------------------+| | | | ||||
| | | |Checks Integrity || | | | ||||
| | | |protection, decrypts || | | | ||||
| | | |data || | | | ||||
| | | +---------------------+| | | | ||||
| | | | Small data packet | | ||||
| | | |--------------------------------> | ||||
| | | | Small data packet | | ||||
| | | |<-------------------------------- | ||||
| | | +----------|---------+ | | | | ||||
| | | Integrity protection,| | | | | ||||
| | | encrypts data | | | | | ||||
| | | +--------------------+ | | | | ||||
| | | | | | | | ||||
| | |Downlink NAS| | | | | ||||
| | |message | | | | | ||||
| | |<-----------| | | | | ||||
| +-----------------------+ | | | | | ||||
| |Small Data Delivery, | | | | | | ||||
| |RRC connection release | | | | | | ||||
| +-----------------------+ | | | | | ||||
| | | | ||||
| | | | ||||
| +------------------+ | ||||
| Figure 6: DoNAS transmission sequence from an Uplink initiated access | In this scenario SCHC can be applied in the NAS protocol layer | |||
| instead of PDCP. The same principles than for user plane | ||||
| transmissions applies here as well. The main difference is the | ||||
| physical placing of the SCHC entities in the network side as the | ||||
| C-SGN (placed in the core network) is the terminating node for NAS | ||||
| instead of the eNB. | ||||
| 3.4. SCHC entities | +--------+ +--------+--------+ + +--------+ | |||
| | IP/ +--+-----------------+--+ IP/ | IP/ +-----+ IP/ | | ||||
| | Non-IP | | | | Non-IP | Non-IP | | | Non-IP | | ||||
| +--------+ | | +-----------------+ | +--------+ | ||||
| | NAS +-----------------------+ NAS |GTP|C/U +-----+GTP|C/U | | ||||
| |(SCHC) | | | | (SCHC) | | | | | | ||||
| +--------+ | +-----------+ | +-----------------+ | +--------+ | ||||
| | RRC +-----+RRC |S1|AP+-----+ S1|AP | | | | | | ||||
| +--------+ | +-----------+ | +--------+ UDP +-----+ UDP | | ||||
| | PDCP* +-----+PDCP*|SCTP +-----+ SCTP | | | | | | ||||
| +--------+ | +-----------+ | +-----------------+ | +--------+ | ||||
| | RLC +-----+ RLC | IP +-----+ IP | IP +-----+ IP | | ||||
| +--------+ | +-----------+ | +-----------------+ | +--------+ | ||||
| | MAC +-----+ MAC | L2 +-----+ L2 | L2 +-----+ L2 | | ||||
| +--------+ | +-----------+ | +-----------------+ | +--------+ | ||||
| | PHY +--+--+ PHY | PHY +--+--+ PHY | PHY +-----+ PHY | | ||||
| +--------+ +-----+-----+ +--------+--------+ | +--------+ | ||||
| C-Uu/ S1-lite SGi | ||||
| CIOT/ LTE-Uu C-BS/eNB C-SGN PGW | ||||
| LTE eMTC | ||||
| UE | ||||
| SCHC could be deployed differently depending of the placing of the | *PDCP is bypassed until AS security is activated [TGPP36300]. | |||
| entities in the architecture. NB-IoT and in general the cellular | ||||
| technologies interfaces are standardized by 3GPP. Therefore the | ||||
| introduction of SCHC entities in the RAN (Radio Access Network) would | ||||
| require support from both the network and terminal entities. If SCHC | ||||
| entities are to be placed in RAN it would require to be added to be | ||||
| specified as an option for the UE - Base Station/C-SGN interfaces. | ||||
| Another option is to place the SCHC entities in the applications | ||||
| layer, and the SCHC packets would be transmitted as non-IP packets. | ||||
| The first option allows the deployment of IP for routing and | ||||
| addressing as well. | ||||
| 4. Static Context Header Compression | Figure 4 | |||
| TBD (Edgar) | 5.3. Parameters for Static Context Header Compression (SCHC) | |||
| 5.3.1. SCHC Context initialization | ||||
| 4.1. SCHC Rules | RRC (Radio Resource Control) protocol is the main tool used to | |||
| configure the operation parameters of the AS transmissions for 3GPP | ||||
| technologies. RoHC operation is configured with this protocol and it | ||||
| is to expect that SCHC will be configured and the static context | ||||
| distributed in similar fashion for these scenarios. | ||||
| TBD (Ana) * Depending of SCHC deployment case * End-2-end * Global | 5.3.2. SCHC Rules | |||
| rules to fetch customized rules * Minimum rule set for applying | ||||
| functions * Fragmentation, compression, NATing | ||||
| o Size of rule id | The number of rules in a context are defined by the network operator | |||
| in these scenarios. For this, the operator must be aware of the type | ||||
| of IP traffic that the device will carry out. This means that the | ||||
| operator might provision sets of rules compatible with the use case | ||||
| of the device. For devices acting as gateways of other devices | ||||
| several rules that match the diversity of devices and protocols used | ||||
| by the devices associated to the gateway. Meanwhile than simpler | ||||
| devices (for example an electricity meter) may have a predetermined | ||||
| set of protocols and parameters fixed. Additionally, the deployment | ||||
| of IPV4 addresses in addition to IPV6 may force to provision separate | ||||
| rules to deal with each of the cases. | ||||
| o 1 fragment rule And at least one Rule ID may be reserved to the | 5.3.3. Rule ID | |||
| case where no SCHC C/D nor SCHC fragmentation were possible. | ||||
| 4.2. Packet processing | For these transmission scenarios in NB-IoT, a reasonable assumption | |||
| of 9 bytes of radio protocol overhead can be expected. PDCP 5 bytes | ||||
| due to header and integrity protection, and 4 bytes of RLC and MAC. | ||||
| The minimum physical Transport Block (TB) that can withhold this | ||||
| overhead value according to 3GPP Release 15 specifications are: 88, | ||||
| 104, 120 and 144 bits. If it is wished to optimize the number of | ||||
| transmissions of a very small application packet so that in some | ||||
| cases can be transmitted using only one physical layer transmission, | ||||
| then the SCHC overhead should not exceed the available number of bits | ||||
| of the smallest utile physical TB available. The packets handled by | ||||
| 3GPP networks are byte-aligned, and therefore the minimum payload | ||||
| possible (including padding) is 8 bits. Therefore in order to | ||||
| utilize the smallest TB the maximum SCHC is 8 bits. This must | ||||
| include the Compression Residue in addition to the Rule ID. In the | ||||
| other hand, it is possible that more complex NB-IoT devices (such as | ||||
| a capillarity gateway) might require additional bits to handle the | ||||
| variety and multiple parameters the of higher layer protocols | ||||
| deployed. In that sense, the operator may want to have flexibility | ||||
| on the number and type of rules supported by each device | ||||
| independently, and consequently a configurable value is preferred for | ||||
| these scenarios. The configuration may be set as part of the | ||||
| operation profile agreed together with the context distribution. The | ||||
| Rule Id field size may range for example from 2 bits resulting in 4 | ||||
| rules to a 8 bits value that would yield up to 256 rules which can be | ||||
| used together with the operators and seems quite a reasonable maximum | ||||
| limit even for a device acting as a NAT. More bits could be | ||||
| configured, but it should take in account the byte-alignment of the | ||||
| expected Compression Residue too. In the minimum TB size case, 2 | ||||
| bits size of Rule Id leave only 6 bits available for Compression | ||||
| Residue. | ||||
| (Ana) *Operation over top vs 3gpp entities how to recognize a schc | 5.3.4. SCHC MAX_PACKET_SIZE | |||
| packet | ||||
| 4.3. SCHC Context | The Access Stratum can handle the fragmentation of SCHC packets if | |||
| needed including reliability. Hence the packet size is limited by | ||||
| the MTU possible to be handled by the AS radio protocols that | ||||
| corresponds to 1600 bytes for 3GPP Release 15. | ||||
| o NATing | 5.3.5. Fragmentation | |||
| o What protocols can be identified for compression depending of the | For these scenarios the SCHC fragmentation functions are recommend to | |||
| deployument | be disabled. The RLC layer of NB-IoT can segment packets in suitable | |||
| units that fit the selected transport blocks for transmissions of the | ||||
| physical layer. The selection of the blocks is done according to the | ||||
| input of the link adaptation function in the MAC layer and the | ||||
| quantity of data in the buffer. The link adaptation layer may | ||||
| produce different results at each Time Transmission Interval (TTI) | ||||
| resulting in varying physical transport blocks that depends of the | ||||
| network load, interference and number of bits to be transmitted and | ||||
| QoS. Even if setting a value that allows the construction of data | ||||
| units following SCHC tiles principle, the protocol overhead may be | ||||
| greater or equal than allowing the AS radio protocols to take care of | ||||
| the fragmentation natively. | ||||
| 5. Fragmentation | 5.3.5.1. Fragmentation in Transparent Mode | |||
| The RLC layer of NB-IoT can segment packets in suitable units that | If RLC is configured to operate in Transparent Mode, there could be a | |||
| fits the selected transport blocks for transmissions of the physical | case to activate a fragmentation function together with a light | |||
| layer. The selection of the blocks is done according to the input of | reliability function such as the ACK-Always mode. In practice , it | |||
| the link adaptation function in the MAC layer and the quantity of | is very rare to transmit user plane data using this configuration and | |||
| data in the buffer. The link adaptation layer may produce different | it is mainly targeting control plane transmissions. In those cases | |||
| results at each Time Transmission Interval (TTI) for what is very | the reliability is normally ensured by MAC based mechanisms, such as | |||
| difficult to set a fragmentation value according to the transport | repetitions or automatic retransmissions, and additional reliability | |||
| block that is selected for each transmission. Instead for NB-IoT | might only generate protocol overhead. | |||
| SCHC must take care of keeping the application packets with a | ||||
| suitable size that do not exceed the MTU (1600 bytes). | ||||
| 5.1. Fragmentation modes | In future operations, it could be devised the utilization of SCHC to | |||
| reduce radio network protocols overhead and support the reliability | ||||
| of the transmissions, and targeting small data with the fewer | ||||
| possible transmissions. This could be realized by using fixed or | ||||
| limited set of transport blocks compatible with the tiling SCHC | ||||
| fragmentation handling. | ||||
| (Sothy) Look a the different options of reliability and see the | 6. Non-IP based Data Transmission | |||
| implications for NB-IoT for the different deployment modes | ||||
| 5.2. Fragmentation Parameters | The Non-IP Data Delivery (NIDD) services of 3GPP enable the | |||
| possibility of transmitting SCHC packets compressed by the | ||||
| application layer. The packets can be delivered by means of IP- | ||||
| tunnels to the 3GPP network or using SCEF functions (i.e., API | ||||
| calls). In both cases the packet IP is not understood by the 3GPP | ||||
| network since it is already compressed and the network does not has | ||||
| information of the context used for compression. Therefore the | ||||
| network will treat the packet as a Non-IP traffic and deliver it to | ||||
| the UE without any other stack element, directly under the L2. | ||||
| (Edgar) Headers sizes Example for the end2end case and check what is | 6.1. SCHC Entities Placing | |||
| operator defined * Rule ID | ||||
| In the two scenarios using NIDD, SCHC entities are located almost in | ||||
| top of the stack. In the terminal, it may be implemented by a | ||||
| application utilizing the NB-IoT connectivity services. In the | ||||
| network side, the SCHC entities are located in the Application Server | ||||
| (AS). The IP tunneling scenario requires that the Application Server | ||||
| sends the compressed packet over an IP connection that is terminated | ||||
| by the 3GPP core network. If instead the SCEF services are used, | ||||
| then it is possible to utilize a API call to transfer the SCHC | ||||
| packets between the core network and the AS, also an IP tunnel could | ||||
| be established by the AS, if negotiated with the SCEF. | ||||
| +---------+ XXXXXXXXXXXXXXXXXXXXXXXX +--------+ | ||||
| | SCHC | XXX XXX | SCHC | | ||||
| |(Non-IP) +-----XX........................XX....+--*---+(Non-IP)| | ||||
| +---------+ XX +----+ XX | | +--------+ | ||||
| | | XX |SCEF+-------+ | | | | ||||
| | | XXX 3GPP RAN & +----+ XXX +---+ UDP | | ||||
| | | XXX CORE NETWORK XXX | | | | ||||
| | L2 +---+XX +------------+ | +--------+ | ||||
| | | XX |IP TUNNELING+--+ | | | ||||
| | | XXX +------------+ +---+ IP | | ||||
| +---------+ XXXX XXXX | +--------+ | ||||
| | PHY +------+ XXXXXXXXXXXXXXXXXXXXXXX +---+ PHY | | ||||
| +---------+ +--------+ | ||||
| UE AS | ||||
| Figure 5: SCHC entities placed when using Non-IP Delivery (NIDD) 3GPP | ||||
| Sevices | ||||
| 6.2. Parameters for Static Context Header Compression | ||||
| 6.2.1. SCHC Context initialization | ||||
| The static context is handled in the application layer level, | ||||
| consequently the contexts are required to be distributed according to | ||||
| the applications own capabilities, perhaps utilizing IP data | ||||
| transmissions up to context initialization. Also the same IP | ||||
| tunneling or SCEF services used later for the SCHC packets transport | ||||
| may be used by the applications in both ends to deliver the static | ||||
| contexts to be used. | ||||
| 6.2.2. SCHC Rules | ||||
| Even when the transmissions content are not visible for the 3GPP | ||||
| network, the same limitations than for IP based data transmissions | ||||
| applies in these scenarios in terms of aiming to use the minimum | ||||
| number of transmission and minimize the protocol overhead. | ||||
| 6.2.3. Rule ID | ||||
| Similarly to the case of IP transmissions, the Rule ID size can be | ||||
| dynamically set prior the context delivery. For example negotiated | ||||
| between the applications when choosing a profile according to the | ||||
| type of traffic and type of application deployed. Same | ||||
| considerations related to the transport block size and performance | ||||
| mentioned for the IP type of traffic has to be follow when choosing a | ||||
| size value for the Rule ID field. | ||||
| 6.2.4. SCHC MAX_PACKET_SIZE | ||||
| In these scenarios the maximum recommended MTU size that applies is | ||||
| 1358 Bytes, since the SCHC packets (and fragments) are traversing the | ||||
| whole 3GPP network infrastructure (core and radio), and not only the | ||||
| radio as the IP transmissions case. | ||||
| 6.3. Fragmentation | ||||
| In principle the fragmentation function should be activated for | ||||
| packets greater than 1358 Bytes. Since the 3GPP reliability | ||||
| functions take great deal care of it, for simple point to point | ||||
| connections may be enough a NO-ACK mode. Nevertheless additional | ||||
| considerations for more complex cases are mentioned in the next | ||||
| subsection to be taken in account. | ||||
| 6.3.1. Fragmentation modes | ||||
| Depending of the QoS that has been assigned to the packets, it is | ||||
| possible that packets are lost before they arrive to 3GPP radio | ||||
| network transmission, for example in between the links of a | ||||
| capillarity gateway, or due to buffer overflow handling in a backhaul | ||||
| connection. In consequence, it is possible to secure additional | ||||
| reliability on the packets transmitted with a small trade-off on | ||||
| additional transmissions to signal the packets arrival indication | ||||
| end-to-end if no transport protocol takes care of retransmission. To | ||||
| achieve this, the packets fragmentation is activated with the ACK-on- | ||||
| Error mode enabled. In some cases, it is even desirable to keep | ||||
| track of all the SCHC packets delivered, in that case, the | ||||
| fragmentation function could be active for all packets transmitted by | ||||
| the applications (SCHC MAX_PACKET_SIZE == 1 Byte) and the ACK-on- | ||||
| Error mode. | ||||
| 6.3.2. Fragmentation Parameters(TBD) | ||||
| o Rule ID | ||||
| o DTag | o DTag | |||
| o FCN | o FCN | |||
| o W (number of bits) | ||||
| o WINDOW_SIZE | ||||
| o Retransmission Timer | o Retransmission Timer | |||
| o Inactivity Timer | o Inactivity Timer | |||
| o MAX_ACK_Retries | o MAX_ACK_Retries | |||
| o MAX_ATTEMPS | o MAX_ATTEMPS | |||
| o MIC (Ana) | o MIC (size and algorithm) | |||
| TBD | ||||
| 6. Padding | 7. Padding | |||
| NB-IoT and 3GPP wireless access in general assumes byte aligned | NB-IoT and 3GPP wireless access, in general, assumes byte aligned | |||
| payload. Therefore the L2 word for NB-IoT MUST be considered 8 bits | payload. Therefore the L2 word for NB-IoT MUST be considered 8 bits | |||
| and the treatment of padding should use this value accordingly. | and the treatment of padding should use this value accordingly. | |||
| 7. Security considerations | 8. Security considerations | |||
| 3GPP access security is specified in [TGPP33203]. | 3GPP access security is specified in (TGPP33203). | |||
| 8. Appendix | 9. 3GPP References | |||
| ## NB-IoT with data over NAS | o [TGPP23720] 3GPP, "TR 23.720 v13.0.0 - Study on architecture | |||
| +---+ +---+ +----+ +--+ | enhancements for Cellular Internet of Things", 2016. | |||
| Applications |AP1| |AP1| | AP2| |AP2| | ||||
| (IP/non-IP) |PDU| |PDU| | PDU|~~~~~~~~~~~~~~~~~~~|PDU| | ||||
| +---+ +---+ +----+ +---+ | ||||
| | |/ / / | | | ||||
| NAS /RRC +-------+---|-----+-----+ +--------+ | ||||
| |NAS|AP1|AP1| AP2 |NAS/ | |NAS/|AP2| | ||||
| |RRC|PDU|PDU| PDU |RRC | |RRC |PDU| | ||||
| +---+---|---+-----+-----+ +--------| | ||||
| | | \ | | | | ||||
| |<----Max. 1600 bytes-->| |_ |_ | ||||
| | | \ \ \ \ | ||||
| | | --\ -\ \_ \_ | ||||
| +-------------| +-----|----------+ \ \ | ||||
| RLC |RLC |NAS/RRC| |RLC | NAS/RRC | +----|-------+ | ||||
| |Head | PDU | |Head | PDU (2/2)| |RLC |NAS/RRC| | ||||
| | | (1/2) | |Head | PDU (2/2)| |RLC |NAS/RRC| | ||||
| +-------------+ +-----+----------+ |Head|PDU | | ||||
| | | | \ \ +------------+ | ||||
| | | LCID1 | \ \ | | | ||||
| | | | \ \ | | | ||||
| | | | \ \ \ | | ||||
| | | | \ \ \ | | ||||
| +-------------------+ +----|-----------------+ +----+---------|-+ | ||||
| MAC |MAC |RLC | RLC | |MAC |RLC | RLC | |MAC | RLC |P| | ||||
| |Head |Head |PAYLOAD| |Head|Head| PAYLOAD | |Head| PDU |a| | ||||
| | | | | | | | | | | |d| | ||||
| +-------------------+ +----------------------+ +----+---------+-+ | ||||
| TB1 TB2 TB3 | ||||
| Figure 7: Example of User Plane packet encapsulation for Data over | o [TGPP33203] 3GPP, "TS 33.203 v13.1.0 - 3G security; Access | |||
| NAS | security for IP-based services", 2016. | |||
| 8.1. NB-IoT example with mobility | o [TGPP36321] 3GPP, "TS 36.321 v13.2.0 - Evolved Universal | |||
| Terrestrial Radio Access (E-UTRA); Medium Access Control (MAC) | ||||
| protocol specification", 2016 | ||||
| ## LTE-M considerations | o [TGPP36323] 3GPP, "TS 36.323 v13.2.0 - Evolved Universal | |||
| Terrestrial Radio Access (E-UTRA); Packet Data Convergence | ||||
| Protocol (PDCP) specification", 2016. | ||||
| 9. Informative References | o [TGPP36331] 3GPP, "TS 36.331 v13.2.0 - Evolved Universal | |||
| Terrestrial Radio Access (E-UTRA); Radio Resource Control (RRC); | ||||
| Protocol specification", 2016. | ||||
| [I-D.ietf-lpwan-ipv6-static-context-hc] | o [TGPP36300] 3GPP, "TS 36.300 v15.1.0 - Evolved Universal | |||
| Minaburo, A., Toutain, L., Gomez, C., and D. Barthel, | Terrestrial Radio Access (E-UTRA) and Evolved Universal | |||
| "LPWAN Static Context Header Compression (SCHC) and | Terrestrial Radio Access Network (E-UTRAN); Overall description; | |||
| fragmentation for IPv6 and UDP", draft-ietf-lpwan-ipv6- | Stage 2", 2018 | |||
| static-context-hc-16 (work in progress), June 2018. | ||||
| [I-D.ietf-lpwan-overview] | o [TGPP24301] 3GPP "TS 24.301 v15.2.0 - Non-Access-Stratum (NAS) | |||
| Farrell, S., "LPWAN Overview", draft-ietf-lpwan- | protocol for Evolved Packet System (EPS); Stage 3", 2018 | |||
| overview-10 (work in progress), February 2018. | ||||
| [TGPP24301] | 10. Appendix | |||
| "TS 24.301 v15.2.0 - Non-Access-Stratum (NAS) protocol for | ||||
| Evolved Packet System (EPS); Stage 3", n.d.. | ||||
| [TGPP33203] | 10.1. NB-IoT User Plane protocol architecture | |||
| "TS 33.203 v13.1.0 - 3G security; Access security for IP- | ||||
| based services", n.d.. | ||||
| [TGPP36300] | 10.1.1. Packet Data Convergence Protocol (PDCP) | |||
| "TS 36.300 v15.1.0 - Evolved Universal Terrestrial Radio | ||||
| Access (E-UTRA) and Evolved Universal Terrestrial Radio | ||||
| Access Network (E-UTRAN); Overall description; Stage 2", | ||||
| n.d.. | ||||
| [TGPP36321] | Each of the Radio Bearers (RB) are associated with one PDCP entity. | |||
| "TS 36.321 v13.2.0 - Evolved Universal Terrestrial Radio | And a PDCP entity is associated with one or two RLC entities | |||
| Access (E-UTRA); Medium Access Control (MAC) protocol | depending of the unidirectional or bi-directional characteristics of | |||
| specification", n.d.. | the RB and RLC mode used. A PDCP entity is associated either control | |||
| plane or user plane which independent configuration and functions. | ||||
| The maximum supported size for NB-IoT of a PDCP SDU is 1600 octets. | ||||
| The main services and functions of the PDCP sublayer for NB-IoT for | ||||
| the user plane include: | ||||
| [TGPP36323] | o Header compression and decompression by means of ROHC (Robust | |||
| "TS 36.323 v13.2.0 - Evolved Universal Terrestrial Radio | Header Compression) | |||
| Access (E-UTRA); Packet Data Convergence Protocol (PDCP) | ||||
| specification", n.d.. | ||||
| [TGPP36331] | o Transfer of user and control data to higher and lower layers | |||
| "TS 36.331 v13.2.0 - Evolved Universal Terrestrial Radio | ||||
| Access (E-UTRA); Radio Resource Control (RRC); Protocol | o Duplicate detection of lower layer SDUs when re-establishing | |||
| specification", n.d.. | connection (when RLC with Acknowledge Mode in use for User Plane | |||
| only) | ||||
| o Ciphering and deciphering | ||||
| o Timer-based SDU discard in uplink | ||||
| 10.1.2. Radio Link Protocol (RLC) | ||||
| RLC is a layer-2 protocol that operates between the UE and the base | ||||
| station (eNB). It supports the packet delivery from higher layers to | ||||
| MAC creating packets that are transmitted over the air optimizing the | ||||
| Transport Block utilization. RLC flow of data packets is | ||||
| unidirectional and it is composed of a transmitter located in the | ||||
| transmission device and a receiver located in the destination device. | ||||
| Therefore to configure bi-directional flows, two set of entities, one | ||||
| in each direction (downlink and uplink) must be configured and they | ||||
| are effectively peered to each other. The peering allows the | ||||
| transmission of control packets (ex., status reports) between | ||||
| entities. RLC can be configured for data transfer in one of the | ||||
| following modes: | ||||
| o Transparent Mode (TM). In this mode RLC do not segment or | ||||
| concatenate SDUs from higher layers and do not include any header | ||||
| to the payload. When acting as a transmitter, RLC receives SDUs | ||||
| from upper layers and transmit directly to its flow RLC receiver | ||||
| via lower layers. Similarly, an TM RLC receiver would only | ||||
| deliver without additional processing the packets to higher layers | ||||
| upon reception. | ||||
| o Unacknowledged Mode (UM). This mode provides support for | ||||
| segmentation and concatenation of payload. The size of the RLC | ||||
| packet depends of the indication given at a particular | ||||
| transmission opportunity by the lower layer (MAC) and are octets | ||||
| aligned. The packet delivery to the receiver do not include | ||||
| support for reliability and the lost of a segment from a packet | ||||
| means a whole packet loss. Also in case of lower layer | ||||
| retransmissions there is no support for re-segmentation in case of | ||||
| change of the radio conditions triggering the selection of a | ||||
| smaller transport block. Additionally it provides PDU duplication | ||||
| detection and discard, reordering of out of sequence and loss | ||||
| detection. | ||||
| o Acknowledged Mode (AM). Additional to the same functions | ||||
| supported from UM, this mode also adds a moving windows based | ||||
| reliability service on top of the lower layer services. It also | ||||
| provides support for re-segmentation and it requires bidirectional | ||||
| communication to exchange acknowledgment reports called RLC Status | ||||
| Report and trigger retransmissions is needed. Protocol error | ||||
| detection is also supported by this mode. The mode uses depends | ||||
| of the operator configuration for the type of data to be | ||||
| transmitted. For example, data transmissions supporting mobility | ||||
| or requiring high reliability would be most likely configured | ||||
| using AM, meanwhile streaming and real time data would be map to a | ||||
| UM configuration. | ||||
| 10.1.3. Medium Access Control (MAC) | ||||
| MAC provides a mapping between the higher layers abstraction called | ||||
| Logical Channels comprised by the previously described protocols to | ||||
| the Physical layer channels (transport channels). Additionally, MAC | ||||
| may multiplex packets from different Logical Channels and prioritize | ||||
| what to fit into one Transport Block if there is data and space | ||||
| available to maximize the efficiency of data transmission. MAC also | ||||
| provides error correction and reliability support by means of HARQ, | ||||
| transport format selection and scheduling information reporting from | ||||
| the terminal to the network. MAC also adds the necessary padding and | ||||
| piggyback control elements when possible additional to the higher | ||||
| layers data. | ||||
| <Max. 1600 bytes> | ||||
| +---+ +---+ +------+ | ||||
| Application |AP1| |AP1| | AP2 | | ||||
| (IP/non-IP) |PDU| |PDU| | PDU | | ||||
| +---+ +---+ +------+ | ||||
| | | | | | | | ||||
| PDCP +--------+ +--------+ +-----------+ | ||||
| |PDCP|AP1| |PDCP|AP1| |PDCP| AP2 | | ||||
| |Head|PDU| |Head|PDU| |Head| PDU | | ||||
| +--------+ +--------+ +--------+--\ | ||||
| | | | | | | | | |\ `----\ | ||||
| +---------------------------+ | |(1)| `-----\(2)'-\ | ||||
| RLC |RLC |PDCP|AP1|RLC |PDCP|AP1| +-------------+ +----|---+ | ||||
| |Head|Head|PDU|Head|Head|PDU| |RLC |PDCP|AP2| |RLC |AP2| | ||||
| +-------------|-------------+ |Head|Head|PDU| |Head|PDU| | ||||
| | | | | | +---------|---+ +--------+ | ||||
| | | | LCID1 | | / / / / / | ||||
| / / / _/ _// _/ _/ / LCID2 / | ||||
| | | | | | / _/ _/ / ___/ | ||||
| | | | | || | | / / | ||||
| +------------------------------------------+ +-----------+---+ | ||||
| MAC |MAC|RLC|PDCP|AP1|RLC|PDCP|AP1|RLC|PDCP|AP2| |MAC|RLC|AP2|Pad| | ||||
| |Hea|Hea|Hea |PDU|Hea|Hea |PDU|Hea|Hea |PDU| |Hea|Hea|PDU|din| | ||||
| |der|der|der | |der|der | |der|der | | |der|der| |g | | ||||
| +------------------------------------------+ +-----------+---+ | ||||
| TB1 TB2 | ||||
| Figure 6: Example of User Plane packet encapsulation for two | ||||
| transport blocks | ||||
| 10.2. NB-IoT Data over NAS (DoNAS) | ||||
| The AS protocol stack used by DoNAS is somehow special. Since the | ||||
| security associations are not established yet in the radio network, | ||||
| to reduce the protocol overhead, PDCP (Packet Data Convergence | ||||
| Protocol) is bypassed until AS security is activated. RLC (Radio | ||||
| Link Control protocol) is configured by default in AM mode, but | ||||
| depending of the features supported by the network and the terminal | ||||
| it may be configured in other modes by the network operator. For | ||||
| example, the transparent mode does not add any header or does not | ||||
| process the payload in any way reducing the overhead, but the MTU | ||||
| would be limited by the transport block used to transmit the data | ||||
| which is couple of thousand of bits maximum. If UM (only Release 15 | ||||
| compatible terminals) is used, the RLC mechanisms of reliability is | ||||
| disabled and only the reliability provided by the MAC layer by Hybrid | ||||
| Automatic Repeat reQuest (HARQ) is available. In this case, the | ||||
| protocol overhead might be smaller than for the AM case because the | ||||
| lack of status reporting but with the same support for segmentation | ||||
| up to 16000 Bytes. NAS packet are encapsulated within a RRC (Radio | ||||
| Resource Control)[TGPP36331] message. | ||||
| Depending of the data type indication signaled (IP or non-IP data), | ||||
| the network allocates an IP address or just establish a direct | ||||
| forwarding path. DoNAS is regulated under rate control upon previous | ||||
| agreement, meaning that a maximum number of bits per unit of time is | ||||
| agreed per device subscription beforehand and configured in the | ||||
| device. The use of DoNAS is typically expected when a terminal in a | ||||
| power saving state requires to do a short transmission and receive an | ||||
| acknowledgment or short feedback from the network. Depending of the | ||||
| size of buffered data to transmit, the UE might be instructed to | ||||
| deploy the connected mode transmissions instead, limiting and | ||||
| controlling the DoNAS transmissions to predefined thresholds and a | ||||
| good resource optimization balance for the terminal and the network. | ||||
| The support for mobility of DoNAS is present but produces additional | ||||
| overhead. | ||||
| +--------+ +--------+ +--------+ | ||||
| | | | | | | +-----------------+ | ||||
| | UE | | C-BS | | C-SGN | |Roaming Scenarios| | ||||
| +----|---+ +--------+ +--------+ | +--------+ | | ||||
| | | | | | | | | ||||
| +----------------|------------|+ | | P-GW | | | ||||
| | Attach | | +--------+ | | ||||
| +------------------------------+ | | | | ||||
| | | | | | | | ||||
| +------|------------|--------+ | | | | | ||||
| |RRC Connection Establishment| | | | | | ||||
| |with NAS PDU transmission | | | | | | ||||
| |& Ack Rsp | | | | | | ||||
| +----------------------------+ | | | | | ||||
| | | | | | | | ||||
| | |Initial UE | | | | | ||||
| | |message | | | | | ||||
| | |----------->| | | | | ||||
| | | | | | | | ||||
| | | +---------------------+| | | | ||||
| | | |Checks Integrity || | | | ||||
| | | |protection, decrypts || | | | ||||
| | | |data || | | | ||||
| | | +---------------------+| | | | ||||
| | | | Small data packet | | ||||
| | | |-------------------------------> | ||||
| | | | Small data packet | | ||||
| | | |<------------------------------- | ||||
| | | +----------|---------+ | | | | ||||
| | | Integrity protection,| | | | | ||||
| | | encrypts data | | | | | ||||
| | | +--------------------+ | | | | ||||
| | | | | | | | ||||
| | |Downlink NAS| | | | | ||||
| | |message | | | | | ||||
| | |<-----------| | | | | ||||
| +-----------------------+ | | | | | ||||
| |Small Data Delivery, | | | | | | ||||
| |RRC connection release | | | | | | ||||
| +-----------------------+ | | | | | ||||
| | | | ||||
| | | | ||||
| +-----------------+ | ||||
| Figure 7: DoNAS transmission sequence from an Uplink initiated access | ||||
| +---+ +---+ +---+ +----+ | ||||
| Application |AP1| |AP1| |AP2| |AP2 | | ||||
| (IP/non-IP) |PDU| |PDU| |PDU| ............... |PDU | | ||||
| +---+ +---+ +---+ +----+ | ||||
| | |/ / | \ | | | ||||
| NAS /RRC +--------+---|---+----+ +---------+ | ||||
| |NAS/|AP1|AP1|AP2|NAS/| |NAS/|AP2 | | ||||
| |RRC |PDU|PDU|PDU|RRC | |RRC |PDU | | ||||
| +--------+-|-+---+----+ +---------| | ||||
| | |\ | | | | ||||
| |<--Max. 1600 bytes-->|__ |_ | | ||||
| | | \__ \___ \_ \_ | ||||
| | | \ \ \__ \_ | ||||
| +---------------|+-----|----------+ \ \ | ||||
| RLC |RLC | NAS/RRC ||RLC | NAS/RRC | +----|-------+ | ||||
| |Head| PDU(1/2)||Head | PDU (2/2)| |RLC |NAS/RRC| | ||||
| +---------------++----------------+ |Head|PDU | | ||||
| | | | \ | +------------+ | ||||
| | | LCID1 | \ | | / | ||||
| | | | \ \ | | | ||||
| | | | \ \ | | | ||||
| | | | \ \ \ | | ||||
| +----+----+----------++-----|----+---------++----+---------|---+ | ||||
| MAC |MAC |RLC | RLC ||MAC |RLC | RLC ||MAC | RLC |Pad| | ||||
| |Head|Head| PAYLOAD ||Head |Head| PAYLOAD ||Head| PDU | | | ||||
| +----+----+----------++-----+----+---------++----+---------+---+ | ||||
| TB1 TB2 TB3 | ||||
| Figure 8: Example of User Plane packet encapsulation for Data over | ||||
| NAS | ||||
| 11. Informative References | ||||
| [I-D.ietf-lpwan-ipv6-static-context-hc] | ||||
| Minaburo, A., Toutain, L., Gomez, C., Barthel, D., and J. | ||||
| Zuniga, "LPWAN Static Context Header Compression (SCHC) | ||||
| and fragmentation for IPv6 and UDP", draft-ietf-lpwan- | ||||
| ipv6-static-context-hc-18 (work in progress), December | ||||
| 2018. | ||||
| [RFC5795] Sandlund, K., Pelletier, G., and L-E. Jonsson, "The RObust | ||||
| Header Compression (ROHC) Framework", RFC 5795, | ||||
| DOI 10.17487/RFC5795, March 2010, | ||||
| <https://www.rfc-editor.org/info/rfc5795>. | ||||
| [RFC8376] Farrell, S., Ed., "Low-Power Wide Area Network (LPWAN) | ||||
| Overview", RFC 8376, DOI 10.17487/RFC8376, May 2018, | ||||
| <https://www.rfc-editor.org/info/rfc8376>. | ||||
| Authors' Addresses | Authors' Addresses | |||
| Ana Minaburo | Ana Minaburo | |||
| Acklio | Acklio | |||
| 2bis rue de la Chataigneraie | 2bis rue de la Chataigneraie | |||
| 35510 Cesson-Sevigne Cedex | 35510 Cesson-Sevigne Cedex | |||
| France | France | |||
| Email: ana@ackl.io | Email: ana@ackl.io | |||
| skipping to change at page 17, line 4 ¶ | skipping to change at page 23, line 18 ¶ | |||
| Authors' Addresses | Authors' Addresses | |||
| Ana Minaburo | Ana Minaburo | |||
| Acklio | Acklio | |||
| 2bis rue de la Chataigneraie | 2bis rue de la Chataigneraie | |||
| 35510 Cesson-Sevigne Cedex | 35510 Cesson-Sevigne Cedex | |||
| France | France | |||
| Email: ana@ackl.io | Email: ana@ackl.io | |||
| Edgar Ramos | Edgar Ramos | |||
| Ericsson | Ericsson | |||
| Hirsalantie 11 | Hirsalantie 11 | |||
| 02420 Jorvas | 02420 Jorvas, Kirkkonummi | |||
| Finland | Finland | |||
| Email: edgar.ramos@ericsson.com | Email: edgar.ramos@ericsson.com | |||
| Sivasothy Shanmugalingam | Sivasothy Shanmugalingam | |||
| Acklio | Acklio | |||
| 2bis rue de la Chataigneraie | 2bis rue de la Chataigneraie | |||
| 35510 Cesson-Sevigne Cedex | 35510 Cesson-Sevigne Cedex | |||
| France | France | |||
| End of changes. 83 change blocks. | ||||
| 441 lines changed or deleted | 715 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||