| < draft-thubert-6man-ipv6-over-wireless-04.txt | draft-thubert-6man-ipv6-over-wireless-05.txt > | |||
|---|---|---|---|---|
| 6MAN P. Thubert, Ed. | 6MAN P. Thubert, Ed. | |||
| Internet-Draft Cisco Systems | Internet-Draft Cisco Systems | |||
| Intended status: Informational September 26, 2019 | Intended status: Standards Track 31 March 2020 | |||
| Expires: March 29, 2020 | Expires: 2 October 2020 | |||
| IPv6 Neighbor Discovery on Wireless Networks | IPv6 Neighbor Discovery on Wireless Networks | |||
| draft-thubert-6man-ipv6-over-wireless-04 | draft-thubert-6man-ipv6-over-wireless-05 | |||
| Abstract | Abstract | |||
| This document describes how the original IPv6 Neighbor Discovery and | This document describes how the original IPv6 Neighbor Discovery and | |||
| Wireless ND (WiND) can be applied on various abstractions of wireless | Wireless ND (WiND) can be applied on various abstractions of wireless | |||
| media. | media. | |||
| Status of This Memo | Status of This Memo | |||
| This Internet-Draft is submitted in full conformance with the | This Internet-Draft is submitted in full conformance with the | |||
| skipping to change at page 1, line 32 ¶ | skipping to change at page 1, line 32 ¶ | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at https://datatracker.ietf.org/drafts/current/. | Drafts is at https://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on March 29, 2020. | This Internet-Draft will expire on 2 October 2020. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2019 IETF Trust and the persons identified as the | Copyright (c) 2020 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents (https://trustee.ietf.org/ | |||
| (https://trustee.ietf.org/license-info) in effect on the date of | license-info) in effect on the date of publication of this document. | |||
| publication of this document. Please review these documents | Please review these documents carefully, as they describe your rights | |||
| carefully, as they describe your rights and restrictions with respect | and restrictions with respect to this document. Code Components | |||
| to this document. Code Components extracted from this document must | extracted from this document must include Simplified BSD License text | |||
| include Simplified BSD License text as described in Section 4.e of | as described in Section 4.e of the Trust Legal Provisions and are | |||
| the Trust Legal Provisions and are provided without warranty as | provided without warranty as described in the Simplified BSD License. | |||
| described in the Simplified BSD License. | ||||
| Table of Contents | Table of Contents | |||
| 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 | 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 | |||
| 2. Acronyms . . . . . . . . . . . . . . . . . . . . . . . . . . 5 | 2. Acronyms . . . . . . . . . . . . . . . . . . . . . . . . . . 4 | |||
| 3. IP Models . . . . . . . . . . . . . . . . . . . . . . . . . . 6 | 3. IPv6 ND, Wireless ND and ND-Proxies . . . . . . . . . . . . . 4 | |||
| 3.1. Physical Broadcast Domain . . . . . . . . . . . . . . . . 6 | 4. IP Models . . . . . . . . . . . . . . . . . . . . . . . . . . 6 | |||
| 3.2. MAC-Layer Broadcast Emulations . . . . . . . . . . . . . 7 | 4.1. Physical Broadcast Domain . . . . . . . . . . . . . . . . 6 | |||
| 3.3. Mapping the IPv6 Link Abstraction . . . . . . . . . . . . 8 | 4.2. Link-Layer Broadcast Emulations . . . . . . . . . . . . . 7 | |||
| 3.4. Mapping the IPv6 Subnet Abstraction . . . . . . . . . . . 9 | 4.3. Mapping the IPv6 link Abstraction . . . . . . . . . . . . 8 | |||
| 4. Wireless ND . . . . . . . . . . . . . . . . . . . . . . . . . 10 | 4.4. Mapping the IPv6 subnet Abstraction . . . . . . . . . . . 9 | |||
| 4.1. Introduction to WiND . . . . . . . . . . . . . . . . . . 10 | 5. Wireless Neighbor Discovery . . . . . . . . . . . . . . . . . 10 | |||
| 4.2. Links and Link-Local Addresses . . . . . . . . . . . . . 11 | 5.1. Introduction to Wireless ND . . . . . . . . . . . . . . . 10 | |||
| 4.3. Subnets and Global Addresses . . . . . . . . . . . . . . 12 | 5.2. links and Link-Local Addresses . . . . . . . . . . . . . 11 | |||
| 5. WiND Applicability . . . . . . . . . . . . . . . . . . . . . 12 | 5.3. subnets and Global Addresses . . . . . . . . . . . . . . 11 | |||
| 5.1. Case of LPWANs . . . . . . . . . . . . . . . . . . . . . 13 | 6. WiND Applicability . . . . . . . . . . . . . . . . . . . . . 12 | |||
| 5.2. Case of Infrastructure BSS and ESS . . . . . . . . . . . 13 | 6.1. Case of LPWANs . . . . . . . . . . . . . . . . . . . . . 13 | |||
| 5.3. Case of Mesh Under Technologies . . . . . . . . . . . . . 14 | 6.2. Case of Infrastructure BSS and ESS . . . . . . . . . . . 13 | |||
| 5.4. Case of DMC radios . . . . . . . . . . . . . . . . . . . 15 | 6.3. Case of Mesh Under Technologies . . . . . . . . . . . . . 15 | |||
| 5.4.1. Using IPv6 ND only . . . . . . . . . . . . . . . . . 15 | 6.4. Case of DMB radios . . . . . . . . . . . . . . . . . . . 15 | |||
| 5.4.2. Using Wireless ND . . . . . . . . . . . . . . . . . . 15 | 6.4.1. Using IPv6 ND only . . . . . . . . . . . . . . . . . 15 | |||
| 6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 17 | 6.4.2. Using Wireless ND . . . . . . . . . . . . . . . . . . 15 | |||
| 7. Security Considerations . . . . . . . . . . . . . . . . . . . 18 | 7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 17 | |||
| 8. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 18 | 8. Security Considerations . . . . . . . . . . . . . . . . . . . 18 | |||
| 9. References . . . . . . . . . . . . . . . . . . . . . . . . . 18 | 9. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 18 | |||
| 9.1. Normative References . . . . . . . . . . . . . . . . . . 18 | 10. Normative References . . . . . . . . . . . . . . . . . . . . 18 | |||
| 9.2. Informative References . . . . . . . . . . . . . . . . . 19 | 11. Informative References . . . . . . . . . . . . . . . . . . . 19 | |||
| Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 21 | Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 21 | |||
| 1. Introduction | 1. Introduction | |||
| IEEE STD. 802.1 [IEEEstd8021] Ethernet Bridging provides an efficient | IEEE STD. 802.1 [IEEEstd8021] Ethernet Bridging provides an efficient | |||
| and reliable broadcast service for wired networks; applications and | and reliable broadcast service for wired networks; applications and | |||
| protocols have been built that heavily depend on that feature for | protocols have been built that heavily depend on that feature for | |||
| their core operation. Unfortunately, Low-Power Lossy Networks (LLNs) | their core operation. | |||
| and local wireless networks generally do not provide the broadcast | ||||
| capabilities of Ethernet Bridging in an economical fashion. | Unfortunately, Low-Power Lossy Networks (LLNs) and Wireless Local | |||
| Area Networks (WLANs) generally do not benefit from the same reliable | ||||
| and cheap broadcast capabilities as Ethernet links. As opposed to | ||||
| unicast transmissions, the broadcast transmissions over wireless | ||||
| links are not subject to automatic retries (ARQ) and can be very | ||||
| unreliable. Reducing the speed at the PHY layer for broadcast | ||||
| transmissions can increase the reliability, at the expense of a | ||||
| higher relative cost of broadcast on the overall available bandwidth. | ||||
| As a result, protocols designed for bridged networks that rely on | As a result, protocols designed for bridged networks that rely on | |||
| multicast and broadcast often exhibit disappointing behaviours when | broadcast transmissions often exhibit disappointing behaviours when | |||
| employed unmodified on a local wireless medium (see | employed unmodified on a local wireless medium (see | |||
| [I-D.ietf-mboned-ieee802-mcast-problems]). | [MCAST-PROBLEMS]). | |||
| Wi-Fi [IEEEstd80211] Access Points (APs) deployed in an Extended | Wi-Fi [IEEEstd80211] Access Points (APs) deployed in an Extended | |||
| Service Set (ESS) act as Ethernet Bridges [IEEEstd8021], with the | Service Set (ESS) act as Ethernet Bridges [IEEEstd8021] between the | |||
| property that the bridging state is established at the time of | wireless stations (STA) and the wired backbone. As opposed to the | |||
| association. This ensures connectivity to the node (STA) and | classical Transparent (aka Learning) Bridge operation that installs | |||
| the forwarding state reactively to traffic, the bridging state in the | ||||
| AP is established proactively, at the time of association. This | ||||
| protects the wireless medium against broadcast-intensive Transparent | protects the wireless medium against broadcast-intensive Transparent | |||
| Bridging reactive Lookups. | Bridging lookups. In other words, the association process registers | |||
| the Link-Layer (MAC) Address of the STA to the AP. The AP maintains | ||||
| In other words, the association process is used to register the MAC | the full list of associated addresses and does not forward over the | |||
| Address of the STA to the AP. The AP subsequently proxies the | radio the broadcast lookups for destinations that are not there. | |||
| bridging operation and does not need to forward the broadcast Lookups | ||||
| over the radio. | ||||
| Like Transparent Bridging, IPv6 [RFC8200] Neighbor Discovery | ||||
| [RFC4861] [RFC4862] Protocol (IPv6 ND) is a reactive protocol, based | ||||
| on multicast transmissions to locate an on-link correspondent and | ||||
| ensure the uniqueness of an IPv6 address. The mechanism for | ||||
| Duplicate Address Detection (DAD) [RFC4862] was designed for the | ||||
| efficient broadcast operation of Ethernet Bridging. Since broadcast | ||||
| can be unreliable over wireless media, DAD often fails to discover | ||||
| duplications [I-D.yourtchenko-6man-dad-issues]. In practice, IPv6 | ||||
| addresses very rarely conflict because of the entropy of the 64-bit | ||||
| Interface IDs, not because address duplications are detected and | ||||
| resolved. | ||||
| The IPv6 ND Neighbor Solicitation (NS) [RFC4861] message is used for | In the case of Ethernet LANs as well as most WLANs and Low-Power | |||
| DAD and Address Resolution (AR) when a node moves, or wakes up and | Personal Area Networks (LoWPANs), the Network-Layer multicast | |||
| reconnects to the wireless network. The NS message is targeted to a | operation is typically implemented as a Link-Layer broadcast for the | |||
| Solicited-Node Multicast Address (SNMA) [RFC4291] and should in | lack of an adapted Link-Layer multicast operation. That Link-Layer | |||
| theory only reach a very small group of nodes. It must be noted that | multicast operation would need to handle a possibly very large number | |||
| in the the case of Ethernet LANs as well as most WLANs and LPWANs, | of groups and it was easier to simply broadcast all the Network-Layer | |||
| the Layer-3 multicast operation becomes a MAC_Layer broadcast for the | multicast packets. | |||
| lack of a Layer-2 multicast operation that could handle a possibly | ||||
| very large number of groups in order to make the unicast efficient. | ||||
| It results that IPv6 ND messages are processed by most of the | ||||
| wireless nodes over the subnet (e.g., the ESS fabric) regardless of | ||||
| how few of the nodes are subscribed to the SNMA. | ||||
| IPv6 ND address Lookups and DADs over a large fabric can generate | Like Transparent Bridging, the IPv6 [RFC8200] Neighbor Discovery | |||
| hnudreds of broadcasts per second. If the broadcasts were blindly | [RFC4861] [RFC4862] Protocol (IPv6 ND) is reactive, based on on- | |||
| copied over Wi-Fi and/or over a LowPower Lossy Network (LLN), the ND- | demand multicast transmissions to locate an on-link correspondent and | |||
| related multicast could consume enough bandwidth to cause a | ensure the uniqueness of an IPv6 address. On wireless, the packets | |||
| substantial degradation to the unicast traffic service | are broadcasted, meaning that they are both expensive and unreliable. | |||
| [I-D.vyncke-6man-mcast-not-efficient]. To protect their bandwidth, | ||||
| some networks throttle ND-related broadcasts, which reduces the | ||||
| capability of the protocol to perform as expected. | ||||
| Conversely, a Wi-Fi station must keep its radio turned on to listen | On paper, a Wi-Fi station must keep its radio turned on to listen to | |||
| to the periodic series of broadcast frames, which for the most part | the periodic series of broadcast frames, which for the most part will | |||
| will be dropped when they reach Layer-3. In order to avoid this | be dropped when they reach Network-Layer. In order to avoid this | |||
| waste of energy and increase its battery life, a typical battery- | waste of energy and increase its battery life, a typical battery- | |||
| operated device such as an IoT sensor or a smartphone will blindly | operated device such as an IoT sensor or a smartphone will blindly | |||
| ignore a ratio of the broadcasts, making IPv6 ND operations even less | ignore a ratio of the broadcasts, making IPv6 ND operations even less | |||
| reliable. | reliable. | |||
| These problems can be alleviated by reducing the IPv6 ND broadcasts | It results that an IPv6 ND multicast message is processed by many of | |||
| over wireless access links. This has been done by splitting the | the wireless nodes over the whole subnet (e.g., the ESS fabric) | |||
| broadcast domains and by routing between subnets, at the extreme by | though there are very few nodes subscribed to the multicast group, | |||
| assigning a /64 prefix to each wireless node (see [RFC8273]). | and at most one intended target. Yet, the packet may be missed by | |||
| the intended target. | ||||
| Another way is to proxy at the boundary of the wired and wireless | ||||
| domains the Layer-3 protocols that rely on MAC Layer broadcast | ||||
| operations. For instance, IEEE 802.11 [IEEEstd80211] situates proxy- | ||||
| ARP (IPv4) and proxy-ND (IPv6) functions at the Access Points (APs). | ||||
| But proxying ND requires a perfect knowledge of the peer IPv6 | ||||
| addresses for which proxying is provided. In a generic fashion, | ||||
| radio connectivity changes with movements and variations in the | ||||
| environment, which makes forming and maintaining that knowledge a | ||||
| hard problem in the general case. | ||||
| Discovering peer addresses by snooping the IPV6 ND protocol as | ||||
| proposed for SAVI [I-D.bi-savi-wlan] was found to be unreliable. An | ||||
| IPv6 address may not be discovered immediately due to a packet loss, | ||||
| or if a "silent" node is not currently using one of its addresses, | ||||
| e.g., a node that waits in wake-on-lan state. A change of state, | ||||
| e.g. due to a movement, may be missed or misordered, leading to | ||||
| unreliable connectivity and an incomplete knowledge of the set of | ||||
| peers. | ||||
| Wireless ND (WiND) introduces a new approach to IPv6 ND that is | ||||
| designed to apply to the WLANs and WPANs types of networks. On the | ||||
| one hand, WiND avoids the use of broadcast operation for DAD and AR, | ||||
| and on the other hand, WiND supports use cases where Subnet and MAC- | ||||
| level domains are not congruent, which is common in those types of | ||||
| networks unless a specific MAC-Level emulation is provided. WiND | ||||
| applies routing inside the Subnets, which enables MultiLink Subnets. | ||||
| Hosts register their addresses to their serving routers with | ||||
| [RFC8505]. With the registration, routers have a complete knowledge | ||||
| of the hosts they serve and in return, hosts obtain routing services | ||||
| for their registered addresses. The registration is abstract to the | ||||
| routing protocol, and it can be protected to prevent impersonation | ||||
| attacks with [I-D.ietf-6lo-ap-nd]. | ||||
| The routing service can be a simple reflexion in a Hub-and-Spoke | Though IPv6 ND was the state of the art when designed for an Ethernet | |||
| Subnet that emulates an IEEE Std 802.11 Infrastructure BSS at Layer | wire at the end of the twentieth century, it must be reevaluated for | |||
| 3. It can also be a full-fledge routing protocol, in particular RPL | the new technologies, such as wireless and overlays, that evolved | |||
| [RFC6550] that was designed to adapt to various LLNs such as WLAN and | since then. This document discusses the applicability of IPv6 ND | |||
| WPAN radio meshes with the concept of Objective Function. Finally, | over wireless links, as compared with routing-based alternatives such | |||
| the routing service can also be ND proxy that emulates an IEEE Std | as prefix-per node and multi-link subnets (MLSN), and with Wireless | |||
| 802.11 Infrastructure ESS at Layer 3. WiND specifies the IPv6 | ND (WiND), that is similar to the Wi-Fi association and reduces the | |||
| Backbone Router for that purpose in [I-D.ietf-6lo-backbone-router]. | need for Network-Layer multicast. | |||
| More details on WiND can be found in Section 4.1. | ||||
| 2. Acronyms | 2. Acronyms | |||
| This document uses the following abbreviations: | This document uses the following abbreviations: | |||
| 6BBR: 6LoWPAN Backbone Router | 6BBR: 6LoWPAN Backbone Router | |||
| 6LBR: 6LoWPAN Border Router | ||||
| 6LN: 6LoWPAN Node | 6LN: 6LoWPAN Node | |||
| 6LR: 6LoWPAN Router | 6LR: 6LoWPAN Router | |||
| ARO: Address Registration Option | ARO: Address Registration Option | |||
| DAC: Duplicate Address Confirmation | DAC: Duplicate Address Confirmation | |||
| DAD: Duplicate Address Detection | DAD: Duplicate Address Detection | |||
| DAR: Duplicate Address Request | DAR: Duplicate Address Request | |||
| EDAC: Extended Duplicate Address Confirmation | ||||
| EDAC: Extended Duplicate Address Confirmation | EDAR: Extended Duplicate Address Request | |||
| MLSN: Multi-link subnet | ||||
| EDAR: Extended Duplicate Address Request | ||||
| MLSN: Multi-Link Subnet | ||||
| LLN: Low-Power and Lossy Network | LLN: Low-Power and Lossy Network | |||
| LoWPAN: Low-Power Wireless Personal Area Network | ||||
| NA: Neighbor Advertisement | ||||
| NBMA: Non-Broadcast Multi-Access | ||||
| NCE: Neighbor Cache Entry | ||||
| ND: Neighbor Discovery | ||||
| NDP: Neighbor Discovery Protocol | ||||
| NS: Neighbor Solicitation | ||||
| RPL: IPv6 Routing Protocol for LLNs | ||||
| RA: Router Advertisement | ||||
| RS: Router Solicitation | ||||
| VLAN: Virtual Local Area Network | ||||
| WiND: Wireless Neighbor Discovery | ||||
| WLAN: Wireless Local Area Network | ||||
| WPAN: Wireless Personal Area Network | ||||
| NA: Neighbor Advertisement | 3. IPv6 ND, Wireless ND and ND-Proxies | |||
| NBMA: Non-Broadcast Multi-Access | The IPv6 ND Neighbor Solicitation (NS) [RFC4861] message is used as a | |||
| multicast IP packet for Address Resolution (AR) and Duplicate Address | ||||
| Setection (DAD) [RFC4862]. In those cases, the NS message is sent at | ||||
| the Network Layer to a Solicited-Node Multicast Address (SNMA) | ||||
| [RFC4291] and should in theory only reach a very small group of | ||||
| nodes. Those messages are generated individually for each address, | ||||
| and may occur when a node joins the network, moves, or wakes up and | ||||
| reconnects to the network. | ||||
| NCE: Neighbor Cache Entry | DAD was designed for the efficient broadcast operation of Ethernet. | |||
| Experiments show that DAD often fails to discover the duplication of | ||||
| IPv6 addresses in large wireless access networks [DAD-ISSUES]. In | ||||
| practice, IPv6 addresses very rarely conflict, not because the | ||||
| address duplications are detected and resolved by the DAD operation, | ||||
| but thanks to the entropy of the 64-bit Interface IDs (IIDs) that | ||||
| makes a collision quasi-impossible for randomized IIDs. | ||||
| ND: Neighbor Discovery | IPv6 ND Address Lookups and DADs over a very large fabric can | |||
| generate hundreds of broadcasts per second. If the broadcasts were | ||||
| blindly copied over Wi-Fi, the ND-related multicast traffic could | ||||
| consume enough bandwidth to cause a substantial degradation to the | ||||
| unicast service [MCAST-EFFICIENCY]. To protect their bandwidth, some | ||||
| networks throttle ND-related broadcasts, which reduces the capability | ||||
| for the ND protocol to operate as expected. | ||||
| NDP: Neighbor Discovery Protocol | This problem can be alleviated by reducing the size of the broadcast | |||
| domain that encompasses wireless access links. This has been done in | ||||
| the art of IP subnetting by partitioning the subnets and by routing | ||||
| between them, at the extreme by assigning a /64 prefix to each | ||||
| wireless node (see [RFC8273]). | ||||
| NS: Neighbor Solicitation | Another way to split the broadcast domain within a subnet is to proxy | |||
| at the boundary of the wired and wireless domains the Network-Layer | ||||
| protocols that rely on Link-Layer broadcast operations. For | ||||
| instance, IEEE 802.11 [IEEEstd80211] recommends to deploy proxy-ARP | ||||
| (IPv4) and proxy-ND (IPv6) functions at the Access Points (APs). But | ||||
| proxying ND requires the full list of the IPv6 addresses for which | ||||
| proxying is provided. Forming and maintaining that knowledge a hard | ||||
| problem in the general case of radio connectivity, which keeps | ||||
| changing with movements and other variations in the environment. | ||||
| RPL: IPv6 Routing Protocol for LLNs | [SAVI] suggests to discover the addresses by snooping the IPV6 ND | |||
| protocol, but that can also be unreliable. An IPv6 address may not | ||||
| be discovered immediately due to a packet loss. It may never be | ||||
| discovered in the case of a "silent" node that is not currently using | ||||
| one of its addresses, e.g., a printer that waits in wake-on-lan | ||||
| state. A change of anchor, e.g. due to a movement, may be missed or | ||||
| misordered, leading to unreliable connectivity and an incomplete list | ||||
| of IPv6 addresses to be proxied for. | ||||
| RA: Router Advertisement | Wireless ND (WiND) introduces a new approach to IPv6 ND that is | |||
| designed to apply to the WLANs and LoWPANs types of networks. On the | ||||
| one hand, WiND avoids the use of broadcast operation for DAD and AR, | ||||
| and on the other hand, WiND supports use cases where subnet and Link- | ||||
| Layer domains are not congruent, which is common in those types of | ||||
| networks unless a specific Link-Layer emulation is provided. | ||||
| RS: Router Solicitation | WiND applies routing inside the subnets, which enables Multilink | |||
| subnets. Hosts register their addresses to their serving routers | ||||
| with [RFC8505]. With the registration, routers have a complete | ||||
| knowledge of the hosts they serve and in return, hosts obtain routing | ||||
| services for their registered addresses. The registration is | ||||
| abstract to the routing protocol, and it can be protected to prevent | ||||
| impersonation attacks with [ADDR-PROTECT]. | ||||
| WiND: Wireless Neighbor Discovery | The routing service can be a simple reflexion in a Hub-and-Spoke | |||
| WLAN: Wireless Local Area Network | subnet that emulates an IEEE Std. 802.11 Infrastructure BSS at the | |||
| Network Layer. It can also be a full-fledge routing protocol, in | ||||
| particular RPL [RFC6550] that was designed to adapt to various LLNs | ||||
| such as WLAN and WPAN radio meshes with the concept of Objective | ||||
| Function. Finally, the routing service can also be ND proxy that | ||||
| emulates an IEEE Std. 802.11 Infrastructure ESS at the Network Layer, | ||||
| as specified in the IPv6 Backbone Router [BB-ROUTER]. | ||||
| WPAN: Wireless Personal Area Network | More details on WiND can be found in Section 5.1. | |||
| 3. IP Models | 4. IP Models | |||
| 3.1. Physical Broadcast Domain | 4.1. Physical Broadcast Domain | |||
| At the physical (PHY) Layer, a broadcast domain is the set of nodes | At the physical (PHY) Layer, a broadcast domain is the set of nodes | |||
| that may receive a datagram that one sends over an interface, in | that may receive a datagram that one sends over an interface, in | |||
| other words the set of nodes in range of radio transmission. This | other words the set of nodes in range of radio transmission. This | |||
| set can comprise a single peer on a serial cable used as point-to- | set can comprise a single peer on a serial cable used as point-to- | |||
| point (P2P) link. It may also comprise multiple peer nodes on a | point (P2P) link. It may also comprise multiple peer nodes on a | |||
| broadcast radio or a shared physical resource such as the legacy | broadcast radio or a shared physical resource such as the legacy | |||
| Ethernet shared wire. | Ethernet yellow wire for which IPv6 ND was initially designed. | |||
| On WLAN and WPAN radios, the physical broadcast domain is defined by | On WLAN and LoWPAN radios, the physical broadcast domain is defined | |||
| a particular transmitter, as the set of nodes that can receive what | by a particular transmitter, as the set of nodes that can receive | |||
| this transmitter is sending. Literally every datagram defines its | what this transmitter is sending. Literally every datagram defines | |||
| own broadcast domain since the chances of reception of a given | its own broadcast domain since the chances of reception of a given | |||
| datagram are statistical. In average and in stable conditions, the | datagram are statistical. In average and in stable conditions, the | |||
| broadcast domain of a particular node can be still be seen as mostly | broadcast domain of a particular node can be still be seen as mostly | |||
| constant and can be used to define a closure of nodes on which an | constant and can be used to define a closure of nodes on which an | |||
| upper-layer abstraction can be built. | upper-layer abstraction can be built. | |||
| A PHY-layer communication can be established between 2 nodes if their | A PHY-layer communication can be established between 2 nodes if their | |||
| physical broadcast domains overlap. | physical broadcast domains overlap. On WLAN and LoWPAN radios, MC | |||
| property is usually reflexive, meaning that if B can receive a | ||||
| datagram from A, then A can receive a datagram from B. But there can | ||||
| be asymmetries due to power levels, interferers near one of the | ||||
| receivers, or differences in the quality of the hardware (e.g., | ||||
| crystals, PAs and antennas) that may affect the balance to the point | ||||
| that the connectivity becomes mostly uni-directional, e.g., A to B | ||||
| but practically not B to A. | ||||
| On WLAN and WPAN radios, this property is usually reflexive, meaning | It takes a particular effort to place a set of devices in a fashion | |||
| that if B can receive a datagram from A, then A can receive a | that all their physical broadcast domains fully overlap, and that | |||
| datagram from B. But there can be asymmetries due to power levels, | situation can not be assumed in the general case. In other words, | |||
| interferers near one of the receivers, or differences in the quality | the property of radio connectivity is generally not transitive, | |||
| of the hardware (e.g., crystals, PAs and antennas) that may affect | meaning that A in range with B and B in range with C does not | |||
| the balance to the point that the connectivity becomes mostly uni- | necessarily imply that A is in range with C. | |||
| directional, e.g., A to B but practically not B to A. It takes a | ||||
| particular effort to place a set of devices in a fashion that all | ||||
| their physical broadcast domains fully overlap, and it can not be | ||||
| assumed in the general case. In other words, the property of radio | ||||
| connectivity is generally not transitive, meaning that A may be in | ||||
| range with B and B may be in range with C does not necessarily imply | ||||
| that A is in range with C. | ||||
| We define Direct MAC-Layer Broadcast (DMC) a transmission mode where | 4.2. Link-Layer Broadcast Emulations | |||
| the broadcast domain that is usable at the MAC layer is directly the | ||||
| physical broadcast domain. IEEE 802.15.4 [IEEE802154] and IEEE | ||||
| 802.11 OCB [IEEEstd80211] (for Out of the Context of a BSS) are | ||||
| examples of DMC radios. This contrasts with a number of MAC-layer | ||||
| Broadcast Emulation schemes that are described in the next section. | ||||
| 3.2. MAC-Layer Broadcast Emulations | We call Direct MAC Broadcast (DMB) the transmission mode where the | |||
| broadcast domain that is usable at the MAC layer is directly the | ||||
| physical broadcast domain. IEEE Std. 802.15.4 [IEEE802154] and IEEE | ||||
| Std. 802.11 OCB [IEEEstd80211] (for Out of the Context of a BSS) are | ||||
| examples of DMB radios. This contrasts with a number of Link-Layer | ||||
| Broadcast Emulation (LLBE) schemes that are described in this | ||||
| section. | ||||
| While a physical broadcast domain is constrained to a single shared | While a physical broadcast domain is constrained to a single shared | |||
| wire, Ethernet Bridging emulates the broadcast properties of that | wire, Ethernet Bridging emulates the broadcast properties of that | |||
| wire over a whole physical mesh of Ethernet links. For the upper | wire over a whole physical mesh of Ethernet links. For the upper | |||
| layer, the qualities of the shared wire are essentially conserved, | layer, the qualities of the shared wire are essentially conserved, | |||
| with a reliable and cheap broadcast operation over a closure of nodes | with a reliable and cheap broadcast operation over a closure of nodes | |||
| defined by their connectivity to the emulated wire. | defined by their connectivity to the emulated wire. | |||
| In large switched fabrics, overlay techniques enable a limited | In large switched fabrics, overlay techniques enable a limited | |||
| connectivity between nodes that are known to a mapping server. The | connectivity between nodes that are known to a Map Resolver. The | |||
| emulated broadcast domain is configured to the system, e.g., with a | emulated broadcast domain is configured to the system, e.g., with a | |||
| VXLAN network identifier (VNID). Broadcast operations on the overlay | VXLAN network identifier (VNID). Broadcast operations on the overlay | |||
| can be emulated but can become very expensive, and it makes sense to | can be emulated but can become very expensive, and it makes sense to | |||
| proactively install the relevant state in the mapping server as | proactively install the relevant state in the mapping server as | |||
| opposed to rely on reactive broadcast lookups. | opposed to rely on reactive broadcast lookups. | |||
| An IEEE Std 802.11 Infrastructure Basic Service Set (BSS) also | An IEEE Std. 802.11 Infrastructure Basic Service Set (BSS) also | |||
| provides a closure of nodes as defined by the broadcast domain of a | provides a closure of nodes as defined by the broadcast domain of a | |||
| central Access Point (AP). The AP relays both unicast and broadcast | central AP. The AP relays both unicast and broadcast packets and | |||
| packets and ensures a reflexive and transitive emulation of the | ensures a reflexive and transitive emulation of the shared wire | |||
| shared wire between the associated nodes, with the capability to | between the associated nodes, with the capability to signal link-up/ | |||
| signal link-up/link-down to the upper layer. Within an | link-down to the upper layer. Within an Infrastructure BSS, the | |||
| Infrastructure BSS, the physical broadcast domain of the AP serves as | physical broadcast domain of the AP serves as emulated broadcast | |||
| emulated broadcast domain for all the nodes that are associated to | domain for all the nodes that are associated to the AP. Broadcast | |||
| the AP. Broadcast packets are relayed by the AP and are not | packets are relayed by the AP and are not acknowledged. To increase | |||
| acknowledged. To ensure that all nodes in the BSS receive the | the chances that all nodes in the BSS receive the broadcast | |||
| broadcast transmission, AP transmits at the slowest PHY speed. This | transmission, AP transmits at the slowest PHY speed. This translates | |||
| translates into maximum co-channel interferences for others and | into maximum co-channel interferences for others and the longest | |||
| longest occupancy of the medium, for a duration that can be 100 times | occupancy of the medium, for a duration that can be a hundred times | |||
| that of a unicast. For that reason, upper layer protocols should | that of the unicast transmission of a frame of the same size. For | |||
| tend to avoid the use of broadcast when operating over Wi-Fi. | that reason, upper layer protocols should tend to avoid the use of | |||
| broadcast when operating over Wi-Fi. | ||||
| In an IEEE Std 802.11 Infrastructure Extended Service Set (ESS), | In an IEEE Std. 802.11 Infrastructure Extended Service Set (ESS), | |||
| infrastructure BSSes are interconnected by a bridged network, | infrastructure BSSes are interconnected by a bridged network, | |||
| typically running Transparent Bridging and Spanning tree Protocol. | typically running Transparent Bridging and the Spanning tree | |||
| In the original model of learning bridges, the state in the | Protocol. In the original model of learning bridges, the forwarding | |||
| Transparent Bridge is set by observing the source MAC address of the | state is set by observing the source MAC address of the frames. When | |||
| frames. When a state is missing for a destination MAC address, the | a state is missing for a destination MAC address, the frame is | |||
| frame is broadcasted with the expectation that the response will | broadcasted with the expectation that the response will populate the | |||
| populate the state. This is a reactive operation, meaning that the | state on the reverse path. This is a reactive operation, meaning | |||
| state is populated reactively to a need for forwarding. It is also | that the state is populated reactively to the need for to reach a | |||
| possible in the original model to send a gratuitous frame to | destination. It is also possible in the original model to broadcast | |||
| advertise self throughout the bridged network, and that is also a | a gratuitous frame to advertise self throughout the bridged network, | |||
| broadcast. | and that is also a broadcast. | |||
| In contrast, the process of the Wi-Fi association prepares a bridging | The process of the Wi-Fi association prepares a bridging state | |||
| state proactively at the AP, which avoids the need for a reactive | proactively at the AP, which avoids the need for a reactive broadcast | |||
| broadcast lookup over the wireless access. The AP may also generate | lookup over the wireless access. In an ESS, the AP may also generate | |||
| a gratuitous broadcast sourced at the MAC address of the STA to | a gratuitous broadcast sourced at the MAC address of the STA to | |||
| prepare or update the state in the learning bridges so they point | prepare or update the state in the learning bridges so they point | |||
| towards the AP for the MAC address of the STA. With WiND, IPv6 ND | towards the AP for the MAC address of the STA. WiND emulates that | |||
| evolves towards similar proactive methods at Layer-3 for its | proactive method at the Network-Layer for the operations of AR, DAD | |||
| operation of address discovery (AD) and duplicate address detection | and IPv6 ND proxy. | |||
| (DAD). | ||||
| In some cases of WLAN and WPAN radios, a mesh-under technology (e.g., | In some instances of WLANs and LoWPANs, a Mesh-Under technology | |||
| a IEEE 802.11s or IEEE 802.15.10) provides meshing services that are | (e.g., a IEEE Std. 802.11s or IEEE Std. 802.15.10) provides meshing | |||
| similar to bridging, and the broadcast domain is well defined by the | services that are similar to bridging, and the broadcast domain is | |||
| membership of the mesh. Mesh-Under emulates a broadcast domain by | well-defined by the membership of the mesh. Mesh-Under emulates a | |||
| flooding the broadcast packets at Layer-2. When operating on a | broadcast domain by flooding the broadcast packets at the Link-Layer. | |||
| single frequency, this operation is known to interfere with itself, | When operating on a single frequency, this operation is known to | |||
| forcing deployment to introduce delays that dampen the collisions. | interfere with itself, and requires inter-frame gaps to dampen the | |||
| All in all, the mechanism is slow, inefficient and expensive. | collisions, which reduces further the amount of available bandwidth. | |||
| Going down the list of cases above, the cost of a broadcast | Going down the list of cases above, the cost of a broadcast | |||
| transmissions becomes increasingly expensive, and there is a push to | transmissions becomes increasingly expensive, and there is a push to | |||
| rethink the upper-layer protocols so as to reduce the depency on | rethink the upper-layer protocols so as to reduce the depency on | |||
| broadcast operations. | broadcast operations. | |||
| There again, a MAC-layer communication can be established between 2 | There again, a Link-Layer communication can be established between 2 | |||
| nodes if their MAC-layer broadcast domains overlap. In the absence | nodes if their Link-Layer broadcast domains overlap. In the absence | |||
| of a MAC-layer emulation such as a mesh-under or an Infrastructure | of a Link-Layer emulation such as a Mesh-Under or an Infrastructure | |||
| BSS, the MAC-layer broadcast domain is congruent with that of the | BSS, the Link-Layer broadcast domain is congruent with that of the | |||
| PHY-layer and inherits its properties for reflexivity and | PHY-layer and inherits its properties for reflexivity and | |||
| transitivity. IEEE 802.11 OCB, which operates Out of the Context of | transitivity. The IEEE Std. 802.11 OCB, which operates without a | |||
| a BSS (DMC radios) is an example of a network that does not have a | BSS, is an example of a network that does not have a Link-Layer | |||
| MAC-Layer broadcast domain emulation, which means that it will | broadcast domain emulation, which means that it will exhibit mostly | |||
| exhibit mostly reflexive and mostly non-transitive transmission | reflexive and mostly non-transitive transmission properties. | |||
| properties. | ||||
| 3.3. Mapping the IPv6 Link Abstraction | 4.3. Mapping the IPv6 link Abstraction | |||
| IPv6 defines a concept of Link, Link Scope and Link-Local Addresses | IPv6 defines a concept of Link, link Scope and Link-Local Addresses | |||
| (LLA), an LLA being unique and usable only within the Scope of a | (LLA), an LLA being unique and usable only within the Scope of a | |||
| Link. The IPv6 Neighbor Discovery (ND) [RFC4861][RFC4862] Duplicate | Link. The IPv6 ND [RFC4861] DAD [RFC4862] process uses a multicast | |||
| Adress Detection (DAD) process leverages a multicast transmission to | transmission to detect a duplicate address, which requires that the | |||
| ensure that an IPv6 address is unique as long as the owner of the | owner of the address is connected to the Link-Layer broadcast domain | |||
| address is connected to the broadcast domain. It must be noted that | of the sender. | |||
| in all the cases in this specification, the Layer-3 multicast | ||||
| operation is always a MAC_Layer broadcast for the lack of a Layer-2 | ||||
| multicast operation that could handle a possibly very large number of | ||||
| groups in order to make the unicast efficient. This means that for | ||||
| every multicast packet regardless of the destination group, all nodes | ||||
| will receive the packet and process it all the way to Layer-3. | ||||
| On wired media, the Link is often confused with the physical | On wired media, the link is often confused with the physical | |||
| broadcast domain because both are determined by the serial cable or | broadcast domain because both are determined by the serial cable or | |||
| the Ethernet shared wire. Ethernet Bridging reinforces that illusion | the Ethernet shared wire. Ethernet Bridging reinforces that illusion | |||
| by provising a MAC-Layer broadcast domain that emulates a physical | with a Link-Layer broadcast domain that emulates a physical broadcast | |||
| broadcast domain over the mesh of wires. But the difference shows on | domain over the mesh of wires. But the difference shows on legacy | |||
| legacy Non-Broadcast Multi-Access (NBMA) such as ATM and Frame-Relay, | Non-Broadcast Multi-Access (NBMA) networks such as ATM and Frame- | |||
| on shared links and on newer types of NBMA networks such as radio and | Relay, on shared links and on newer types of NBMA networks such as | |||
| composite radio-wires networks. It also shows when private VLANs or | radio and composite radio-wires networks. It also shows when private | |||
| Layer-2 cryptography restrict the capability to read a frame to a | VLANs or Link-Layer cryptography restrict the capability to read a | |||
| subset of the connected nodes. | frame to a subset of the connected nodes. | |||
| In mesh-under and Infrastructure BSS, the IP Link extends beyond the | In Mesh-Under and Infrastructure BSS, the IP link extends beyond the | |||
| physical broadcast domain to the emulated MAC-Layer broadcast domain. | physical broadcast domain to the emulated Link-Layer broadcast | |||
| Relying on Multicast for the ND operation remains feasible but | domain. Relying on Multicast for the ND operation remains feasible | |||
| becomes detrimental to unicast traffic, energy-inefficient and | but becomes highly detrimental to the unicast traffic, and more | |||
| unreliable, and its use is discouraged. | energy-inefficient and unreliable as the network grows. | |||
| On DMC radios, IP Links between peers come and go as the individual | On DMB radios, IP links between peers come and go as the individual | |||
| physical broadcast domains of the transmitters meet and overlap. The | physical broadcast domains of the transmitters meet and overlap. The | |||
| DAD operation cannot provide once and for all guarantees on the | DAD operation cannot provide once and for all guarantees on the | |||
| broadcast domain defined by one radio transmitter if that transmitter | broadcast domain defined by one radio transmitter if that transmitter | |||
| keeps meeting new peers on the go. The nodes may need to form new | keeps meeting new peers on the go. The nodes may need to form new | |||
| LLAs to talk to one another and the scope where LLA uniqueness can be | Link-Local Addresses (LLAs) to talk to one another and the scope on | |||
| dynamically checked is that pair of nodes. As long as there's no | which the uniqueness of an LLA must be checked is that pair of nodes. | |||
| conflict a node may use the same LLA with multiple peers but it has | As long as there's no conflict, a node may use the same LLA with | |||
| to revalidate DAD with every new peer node. In practice, each pair | multiple peers but it has to perform DAD with each new peer node. In | |||
| of nodes defines a temporary P2P link, which can be modeled as a sub- | practice, each pair of nodes defines a temporary P2P link, which can | |||
| interface of the radio interface. | be modeled as a sub-interface of the radio interface. | |||
| 3.4. Mapping the IPv6 Subnet Abstraction | 4.4. Mapping the IPv6 subnet Abstraction | |||
| IPv6 also defines a concept of Subnet for Glocal and Unique Local | IPv6 also defines the concept of a subnet for Glocal and Unique Local | |||
| Addresses. Addresses in a same Subnet share a same prefix and by | Addresses. All the addresses in a subnet share the same prefix, and | |||
| extension, a node belongs to a Subnet if it has an interface with an | by extension, a node belongs to a subnet if it has with an address in | |||
| address on that Subnet. A Subnet prefix is Globally Unique so it is | that subnet. A subnet prefix is Globally Unique so it is sufficient | |||
| sufficient to validate that an address that is formed from a Subnet | to validate that an address that is formed from a subnet prefix is | |||
| prefix is unique within that Subnet to guarantee that it is globally | unique within that subnet to guarantee that it is globally unique. | |||
| unique. IPv6 aggregation relies on the property that a packet from | ||||
| the outside of a Subnet can be routed to any router that belongs to | ||||
| the Subnet, and that this router will be able to either resolve the | ||||
| destination MAC address and deliver the packet, or route the packet | ||||
| to the destination within the Subnet. If the Subnet is known as | ||||
| onlink, then any node may also resolve the destination MAC address | ||||
| and deliver the packet, but if the Subnet is not onlink, then a host | ||||
| that does not have an NCE for the destination will need to pass the | ||||
| packet to a router. | ||||
| On IEEE Std. 802.3, a Subnet is often congruent with an IP Link | The IPv6 aggregation model relies on the property that a packet from | |||
| the outside of a subnet can be routed to any router that belongs to | ||||
| the subnet, and that this router will be able to either resolve the | ||||
| destination Link-Layer address and deliver the packet, or route the | ||||
| packet to the destination within the subnet. If the subnet is known | ||||
| as on-link, then any node may also resolve the destination Link-Layer | ||||
| address and deliver the packet, but if the subnet is not on-link, | ||||
| then a host in the subnet that does not have a Neighbor Cache Entry | ||||
| (NCE) for the destination will also need to pass the packet to a | ||||
| router. | ||||
| On IEEE Std. 802.3, a subnet is often congruent with an IP link | ||||
| because both are determined by the physical attachment to an Ethernet | because both are determined by the physical attachment to an Ethernet | |||
| shared wire or an IEEE Std. 802.1 bridged broadcast domain. In that | shared wire or an IEEE Std. 802.1 bridged broadcast domain. In that | |||
| case, the connectivity over the Link is transitive, the Subnet can | case, the connectivity over the link is transitive, the subnet can | |||
| appear as onlink, and any node can resolve a destination MAC address | appear as on-link, and any node can resolve a destination MAC address | |||
| of any other node directly using IPv6 Neighbor Discovery. | of any other node directly using IPv6 Neighbor Discovery. | |||
| But an IP Link and an IP Subnet are not always congruent. In a | But an IP link and an IP subnet are not always congruent. In the | |||
| shared Link situation, a Subnet may encompass only a subset of the | case of a Shared Link, individual subnets may each encompass only a | |||
| nodes connected to the Link. In Route-Over Multi-Link Subnets (MLSN) | subset of the nodes connected to the link. In Route-Over Multi-link | |||
| [RFC4903], routers federate the Links between nodes that belong to | subnets (MLSN) [RFC4903], routers federate the links between nodes | |||
| the Subnet, the Subnet is not onlink and it extends beyond any of the | that belong to the subnet, the subnet is not on-link and it extends | |||
| federated Links. | beyond any of the federated links. | |||
| The DAD and lookup procedures in IPv6 ND expects that a node in a | 5. Wireless Neighbor Discovery | |||
| Subnet is reachable within the broadcast domain of any other node in | ||||
| the Subnet when that other node attempts to form an address that | ||||
| would be a duplicate or attempts to resolve the MAC address of this | ||||
| node. This is why ND is only applicable for P2P and transit links, | ||||
| and requires extensions for other topologies. | ||||
| 4. Wireless ND | 5.1. Introduction to Wireless ND | |||
| 4.1. Introduction to WiND | The DAD and AR procedures in IPv6 ND expect that a node in a subnet | |||
| is reachable within the broadcast domain of any other node in the | ||||
| subnet when that other node attempts to form an address that would be | ||||
| a duplicate or attempts to resolve the MAC address of this node. | ||||
| This is why ND is only applicable for P2P and transit links, and | ||||
| requires extensions for other topologies. | ||||
| Wireless Neighbor Discovery (WiND) | WiND [RFC6775][RFC8505][BB-ROUTER][ADDR-PROTECT] defines a new | |||
| [RFC6775][RFC8505][I-D.ietf-6lo-backbone-router][I-D.ietf-6lo-ap-nd] | operation for Neighbor Discovery that is based on 2 major paradigm | |||
| defines a new ND operation that is based on 2 major paradigm changes, | changes, proactive address registration by hosts to their attachment | |||
| proactive address registration by hosts to their attachment routers | routers and routing to host routes (/128) within the subnet. This | |||
| and routing to host routes (/128) within the subnet. This allows | allows WiND to avoid the expectations of transit links and subnet- | |||
| WiND to avoid the classical ND expectations of transit links and | wide broadcast domains. | |||
| Subnet-wide broadcast domains. | ||||
| WiND is agnostic to the method used for Address Assignment, e.g., | ||||
| Stateless Address Autoconfiguration (SLAAC) [RFC4862] or DHCPv6 | ||||
| [RFC8415]. It does not change the IPv6 addressing [RFC4291] or the | ||||
| current practices of assigning prefixes, typically a /64, to a | ||||
| subnet. But the DAD operation is performed as a unicast exchange | ||||
| with a central registrar, using new ND Extended Duplicate Address | ||||
| messages (EDAR and EDAC) [RFC6775][RFC8505]. This operation | ||||
| modernizes ND for application in overlays with Map Resolvers and | ||||
| enables unicast lookups [UNICAST-AR] for addresses registered to the | ||||
| resolver. | ||||
| The proactive address registration is performed with a new option in | The proactive address registration is performed with a new option in | |||
| NS/NA messages, the Extended Address Registration Option (EARO) | NS/NA messages, the Extended Address Registration Option (EARO) | |||
| defiend in [RFC8505]. This method allows to prepare and maintain the | defined in [RFC8505]. This method allows to prepare and maintain the | |||
| host routes in the routers and avoids the reactive NS(Lookup) found | host routes in the routers and avoids the reactive Address Resolution | |||
| in IPv6 ND. This is a direct benefit for wireless Links since it | in IPv6 ND and the associated Link-Layer broadcasts transmissions. | |||
| avoids the MAC level broadcasts that are associated to NS(Lookup). | ||||
| The EARO provides information to the router that is independent to | The EARO provides information to the router that is independent to | |||
| the routing protocol and routing can take multiple forms, from a | the routing protocol and routing can take multiple forms, from a | |||
| traditional IGP to a collapsed ub-and-Spoke model where only one | traditional IGP to a collapsed Hub-and-Spoke model where only one | |||
| router owns and advertises the prefix. [RFC8505] is already | router owns and advertises the prefix. [RFC8505] is already | |||
| referenced for RIFT [I-D.ietf-rift-rift], RPL [RFC6550] with | referenced as the registrtaion interface to "RIFT: Routing in Fat | |||
| [I-D.thubert-roll-unaware-leaves] and IPv6 ND proxy | Trees" [I-D.ietf-rift-rift] and "RPL: IPv6 Routing Protocol for | |||
| [I-D.ietf-6lo-backbone-router]. | Low-Power and Lossy Networks" [RFC6550] with [RPL-UNAWARE-LEAVES]. | |||
| WiND does not change IPv6 addressing [RFC4291] or the current | ||||
| practices of assigning prefixes to subnets. It is still typical to | ||||
| assign a /64 to a subnet and to use interface IDs of 64 bits. | ||||
| Duplicate Address detection within the Subnet is performed with a | ||||
| central registrar, using new ND Extended Duplicate Address messages | ||||
| (EDAR and EDAC) [RFC8505]. This operation modernizes ND for | ||||
| application in overlays with Map Resolvers and enables unicast | ||||
| lookups [I-D.thubert-6lo-unicast-lookup] for addresses registered to | ||||
| the resolver. | ||||
| WiND also enables to extend a legacy /64 on Ethernet with ND proxy | ||||
| over the wireless. This way nodes can form any address the want and | ||||
| move freely from an L3-AP (that is really a backbone router in | ||||
| bridging mode, more in [I-D.ietf-6lo-backbone-router]) to another, | ||||
| without renumbering. Backbone Routers federate multiple LLNs over a | ||||
| Backbone Link to form a MultiLink Subnet (MLSN). Backbone Routers | ||||
| placed along the LLN edge of the Backbone handle IPv6 Neighbor | ||||
| Discovery, and forward packets on behalf of registered nodes. | ||||
| An LLN node (6LN) registers all its IPv6 Addresses using an NS(EARO) | WiND also enables to span a subnet over an MLSN that federates edge | |||
| as specified in [RFC8505] to the 6BBR. The 6BBR is also a Border | wireless links with a high-speed, typically Ethernet, backbone. This | |||
| Router that performs IPv6 Neighbor Discovery (IPv6 ND) operations on | way, nodes can form any address they want and move freely from a | |||
| its Backbone interface on behalf of the 6LNs that have registered | wireless edge link to another, without renumbering. Backbone Routers | |||
| addresses on its LLN interfaces without the need of a broadcast over | (6BBRs) placed along the wireless edge of the Backbone handle IPv6 | |||
| the wireless medium. | Neighbor Discovery and forward packets over the backbone on behalf of | |||
| the registered nodes on the wireless edge. For instance, a 6BBR in | ||||
| bridging proxy mode (more in [BB-ROUTER]) can operate as a Layer-3 AP | ||||
| to serve wireless IPv6 hosts that are Wi-Fi STAs and maintain the | ||||
| reachability for Global Unicast and Link-LOcal Addresses within the | ||||
| federated MLSN. | ||||
| WiND is also compatible with DHCPv6 and other forms of address | 5.2. links and Link-Local Addresses | |||
| assignment in which case it can still be used for DAD. | ||||
| 4.2. Links and Link-Local Addresses | For Link-Local Addresses, DAD is typically performed between | |||
| communicating pairs of nodes and an NCE can be populated with a | ||||
| single unicast exchange. In the case of a bridging proxies, though, | ||||
| the Link-Local traffic is bridged over the backbone and the DAD must | ||||
| proxied there as well. | ||||
| For Link-Local Addresses, DAD is performed between communicating | For instance, in the case of Bluetooth Low Energy (BLE) | |||
| pairs of nodes. It is carried out as part of a registration process | [RFC7668][IEEEstd802151], the uniqueness of Link-Local Addresses | |||
| that is based on a NS/NA exchange that transports an EARO. During | needs only to be verified between the pair of communicating nodes, | |||
| that process, the DAD is validated and a Neighbor Cache Entry (NCE) | the central router and the peripheral host. In that example, 2 | |||
| is populated with a single unicast exchange. | peripheral hosts connected to the same central router can not have | |||
| the same Link-Local Address because the addresses would collision at | ||||
| the central router which could not talk to both over the same | ||||
| interface. The DAD operation from WiND is appropriate for that use | ||||
| case, but the one from ND is not, because the peripheral hosts are | ||||
| not on the same broadcast domain. | ||||
| For instance, in the case of a Bluetooth Low Energy (BLE) | On the other hand, the uniqueness of Global and Unique-Local | |||
| [RFC7668][IEEEstd802151] Hub-and Spoke configuration, Uniqueness of | Addresses is validated at the subnet Level, using a logical registrar | |||
| Link local Addresses need only to be verified between the pairs of | that is global to the subnet. | |||
| communicating nodes, a central router and a peripheral host. In that | ||||
| example, 2 peripheral hosts connected to the same central router can | ||||
| not have the same Link Local Address because the Binding Cache | ||||
| Entries (BCEs) would collide at the central router which could not | ||||
| talk to both over the same interface. The WiND operation is | ||||
| appropriate for that DAD operation, but the one from ND is not, | ||||
| because peripheral hosts are not on the same broadcast domain. On | ||||
| the other hand, Global and ULA DAD is validated at the Subnet Level, | ||||
| using a registrar hosted by the central router. | ||||
| 4.3. Subnets and Global Addresses | 5.3. subnets and Global Addresses | |||
| WiND extends IPv6 ND for Hub-and-Spoke (e.g., BLE) and Route-Over | WiND extends IPv6 ND for Hub-and-Spoke (e.g., BLE) and Route-Over | |||
| (e.g., RPL) Multi-Link Subnets (MLSNs). | (e.g., RPL) Multi-link subnets (MLSNs). | |||
| In the Hub-and-Spoke case, each Hub-Spoke pair is a distinct IP Link, | In the Hub-and-Spoke case, each Hub-Spoke pair is a distinct IP Link, | |||
| and a Subnet can be mapped on a collection of Links that are | and a subnet can be mapped on a collection of links that are | |||
| connected to the Hub. The Subnet prefix is associated to the Hub. | connected to the Hub. The subnet prefix is associated to the Hub. | |||
| Acting as 6LR, the Hub advertises the prefix as not-onlink to the | ||||
| spokes in RA messages Prefix Information Options (PIO). Acting as | Acting as routers, the Hub advertises the prefix as not-on-link to | |||
| 6LNs, the Spokes autoconfigure addresses from that prefix and | the spokes in RA messages Prefix Information Options (PIO). Acting | |||
| as hosts, the Spokes autoconfigure addresses from that prefix and | ||||
| register them to the Hub with a corresponding lifetime. Acting as a | register them to the Hub with a corresponding lifetime. Acting as a | |||
| 6LBR, the Hub maintains a binding table of all the registered IP | registrar, the Hub maintains a binding table of all the registered IP | |||
| addresses and rejects duplicate registrations, thus ensuring a DAD | addresses and rejects duplicate registrations, thus ensuring a DAD | |||
| protection for a registered address even if the registering node is | protection for a registered address even if the registering node is | |||
| sleeping. Acting as 6LR, the Hub also maintains an NCE for the | sleeping. The Hub also maintains an NCE for the registered addresses | |||
| registered addresses and can deliver a packet to any of them for | and can deliver a packet to any of them during their respective | |||
| their respective lifetimes. It can be observed that this design | lifetimes. It can be observed that this design builds a form of | |||
| builds a form of Layer-3 Infrastructure BSS. | Network-Layer Infrastructure BSS. | |||
| A Route-Over MLSN is considered as a collection of Hub-and-Spoke | A Route-Over MLSN is considered as a collection of Hub-and-Spoke | |||
| where the Hubs form a connected dominating set of the member nodes of | where the Hubs form a connected dominating set of the member nodes of | |||
| the Subnet, and IPv6 routing takes place between the Hubs within the | the subnet, and IPv6 routing takes place between the Hubs within the | |||
| Subnet. A single logical 6LBR is deployed to serve the whole mesh. | subnet. A single logical registrar is deployed to serve the whole | |||
| mesh. | ||||
| The registration in [RFC8505] is abstract to the routing protocol and | The registration in [RFC8505] is abstract to the routing protocol and | |||
| provides enough information to feed a routing protocol such as RPL as | provides enough information to feed a routing protocol such as RPL as | |||
| specified in [I-D.thubert-roll-unaware-leaves]. In a degraded mode, | specified in [RPL-UNAWARE-LEAVES]. In a degraded mode, all the Hubs | |||
| all the Hubs are connected to a same high speed backbone such as an | are connected to a same high speed backbone such as an Ethernet | |||
| Ethernet bridging domain where IPv6 ND is operated. In that case, it | bridging domain where IPv6 ND is operated. In that case, it is | |||
| is possible to federate the Hub, Spoke and Backbone nodes as a single | possible to federate the Hub, Spoke and Backbone nodes as a single | |||
| Subnet, operating IPv6 ND proxy operations | subnet, operating IPv6 ND proxy operations [BB-ROUTER] at the Hubs, | |||
| [I-D.ietf-6lo-backbone-router] at the Hubs, acting as 6BBRs. It can | acting as 6BBRs. It can be observed that this latter design builds a | |||
| be observed that this latter design builds a form of Layer-3 | form of Network-Layer Infrastructure ESS. | |||
| Infrastructure ESS. | ||||
| 5. WiND Applicability | 6. WiND Applicability | |||
| WiND allows P2P, P2MP hub-and spoke, MAC-level broadcast domain | WiND applies equally to P2P links, P2MP Hub-and-Spoke, Link-Layer | |||
| emulation such as mesh-under and Wi-Fi BSS, and Route-Over meshes. | Broadcast Domain Emulation such as Mesh-Under and Wi-Fi BSS, and | |||
| Route-Over meshes. | ||||
| There is an intersection where Link and Subnet are congruent and | There is an intersection where link and subnet are congruent and | |||
| where both ND and WiND could apply. These includes P2P, the MAC | where both ND and WiND could apply. These includes P2P, the MAC | |||
| emulation of a PHY broadcast domain, and the particular case of | emulation of a PHY broadcast domain, and the particular case of | |||
| always on, fully overlapping physical radio broadcast domain. But | always on, fully overlapping physical radio broadcast domain. But | |||
| even in those cases where both are possible, WiND is preferable vs. | even in those cases where both are possible, WiND is preferable vs. | |||
| ND because it reduces the need of broadcast. | ||||
| ND because it reduces the need of broadcast ( this is discussed in | This is discussed in more details in the introduction of [BB-ROUTER]. | |||
| the introduction of [I-D.ietf-6lo-backbone-router]). | ||||
| There are also numerous practical use cases in the wireless world | There are also a number of practical use cases in the wireless world | |||
| where Links and Subnets are not P2P and not congruent: | where links and subnets are not congruent: | |||
| o IEEE std 802.11 infrastructure BSS enables one subnet per AP, and | * The IEEE Std. 802.11 infrastructure BSS enables one subnet per AP, | |||
| emulates a broadcast domain at L2. Infra ESS extends that and | and emulates a broadcast domain at the Link-Layer. The | |||
| recommends to use an IPv6 ND proxy [IEEEstd80211] to coexist with | Infrastructure ESS extends that model over a backbone and | |||
| Ethernet connected nodes. WiND incorporates an ND proxy to serve | recommends the use of an IPv6 ND proxy [IEEEstd80211] to | |||
| that need and that was missing so far. | interoperate with Ethernet-connected nodes. WiND incorporates an | |||
| ND proxy to serve that need, which was missing so far. | ||||
| o BlueTooth is Hub-and-Spoke at the MAC layer. It would make little | * BlueTooth is Hub-and-Spoke at the Link-Layer. It would make | |||
| sense to configure a different subnet between the central and each | little sense to configure a different subnet between the central | |||
| individual peripheral node (e.g., sensor). Rather, [RFC7668] | and each individual peripheral node (e.g., sensor). Rather, | |||
| allocates a prefix to the central node acting as router (6LR), and | [RFC7668] allocates a prefix to the central node acting as router, | |||
| each peripheral host (acting as a host (6LR) forms one or more | and each peripheral host (acting as a host) forms one or more | |||
| address(es) from that same prefix and registers it. | address(es) from that same prefix and registers it. | |||
| o A typical Smartgrid networks puts together Route-Over MLSNs that | * A typical Smartgrid networks puts together Route-Over MLSNs that | |||
| comprise thousands of IPv6 nodes. The 6TiSCH architecture | comprise thousands of IPv6 nodes. The 6TiSCH architecture | |||
| [I-D.ietf-6tisch-architecture] presents the Route-Over model over | [I-D.ietf-6tisch-architecture] presents the Route-Over model over | |||
| a [IEEEstd802154] Time-Slotted Channel-Hopping mesh, and | an IEEE Std. 802.15.4 Time-Slotted Channel-Hopping (TSCH) | |||
| generalizes it for multiple other applications. Each node in a | [IEEEstd802154] mesh, and generalizes it for multiple other | |||
| Smartgrid network may have tens to a hundred others nodes in | applications. | |||
| range. A key problem for the routing protocol is which other | ||||
| node(s) should this node peer with, because most of the possible | ||||
| peers do not provide added routing value. When both energy and | ||||
| bandwidth are constrained,talking to them is a bad idea and most | ||||
| of the possible P2P links are not even used. Peerings that are | ||||
| actually used come and go with the dynamics of radio signal | ||||
| propagation. It results that allocating prefixes to all the | ||||
| possible P2P Links and maintain as many addresses in all nodes is | ||||
| not even considered. | ||||
| 5.1. Case of LPWANs | Each node in a Smartgrid network may have tens to a hundred others | |||
| nodes in range. A key problem for the routing protocol is which | ||||
| other node(s) should this node peer with, because most of the | ||||
| possible peers do not provide added routing value. When both | ||||
| energy and bandwidth are constrained, talking to them is a waste | ||||
| of resources and most of the possible P2P links are not even used. | ||||
| Peerings that are actually used come and go with the dynamics of | ||||
| radio signal propagation. It results that allocating prefixes to | ||||
| all the possible P2P links and maintain as many addresses in all | ||||
| nodes is not even considered. | ||||
| LPWANs are by nature so constrained that the addresses and Subnets | 6.1. Case of LPWANs | |||
| LPWANs are by nature so constrained that the addresses and subnets | ||||
| are fully pre-configured and operate as P2P or Hub-and-Spoke. This | are fully pre-configured and operate as P2P or Hub-and-Spoke. This | |||
| saves the steps of neighbor Discovery and enables a very efficient | saves the steps of neighbor Discovery and enables a very efficient | |||
| stateful compression of the IPv6 header. | stateful compression of the IPv6 header. | |||
| 5.2. Case of Infrastructure BSS and ESS | 6.2. Case of Infrastructure BSS and ESS | |||
| In contrast to IPv4, IPv6 enables a node to form multiple addresses, | In contrast to IPv4, IPv6 enables a node to form multiple addresses, | |||
| some of them temporary to elusive, and with a particular attention | some of them temporary to elusive, and with a particular attention | |||
| paid to privacy. Addresses may be formed and deprecated | paid to privacy. Addresses may be formed and deprecated | |||
| asynchronously to the association. Even if the knowledge of IPv6 | asynchronously to the association. | |||
| addresses used by a STA can be obtained by snooping protocols such as | ||||
| IPv6 ND and DHCPv6, or by observing data traffic sourced at the STA, | ||||
| such methods provide only an imperfect knowledge of the state of the | ||||
| STA at the AP. This may result in a loss of connectivity for some | ||||
| IPv6 addresses, in particular for addresses rarely used and in a | ||||
| situation of mobility. This may also result in undesirable remanent | ||||
| state in the AP when a STA ceases to use an IPv6 address. It results | ||||
| that snooping protocols is not a recommended technique and that it | ||||
| should only be used as last resort. | ||||
| The recommended alternate is to use the IPv6 Registration method | Snooping protocols such as IPv6 ND and DHCPv6 and observing data | |||
| speficied in p. By that method, the AP exposes its capability to | traffic sourced at the STA provides an imperfect knowledge of the | |||
| proxy ND to the STA in Router Advertisement messages. In turn, the | state of the STA at the AP. Missing a state or a transition may | |||
| STA may request proxy ND services from the AP for one or more IPv6 | result in the loss of connectivity for some of the addresses, in | |||
| addresses, using an Address Registration Option. The Registration | particular for an address that is rarely used, belongs to a sleeping | |||
| state has a lifetime that limits unwanted state remanence in the | node, or one in a situation of mobility. This may also result in | |||
| network. The registration is optionally secured using | undesirable remanent state in the AP when the STA ceases to use an | |||
| [I-D.ietf-6lo-ap-nd] to prevent address theft and impersonation. The | IPv6 address while remaining associated. It results that snooping | |||
| registration carries a sequence number, which enables a fast mobility | protocols is not a recommended technique and that it should only be | |||
| without a loss of connectivity. | used as last resort, when the WiND registration is not available to | |||
| populate the state. | ||||
| The recommended alternative method is to use the WiND Registration | ||||
| for IPv6 Addresses. This way, the AP exposes its capability to proxy | ||||
| ND to the STA in Router Advertisement messages. In turn, the STA may | ||||
| request proxy ND services from the AP for all of its IPv6 addresses, | ||||
| using the Extended Address Registration Option, which provides the | ||||
| following elements: | ||||
| * The registration state has a lifetime that limits unwanted state | ||||
| remanence in the network. | ||||
| * The registration is optionally secured using [ADDR-PROTECT] to | ||||
| prevent address theft and impersonation. | ||||
| * The registration carries a sequence number, which enables to | ||||
| figure the order of events in a fast mobility scenario without | ||||
| loss of connectivity. | ||||
| The ESS mode requires a proxy ND operation at the AP. The proxy ND | The ESS mode requires a proxy ND operation at the AP. The proxy ND | |||
| operation must cover Duplicate Address Detection, Neighbor | operation must cover Duplicate Address Detection, Neighbor | |||
| Unreachability Detection, Address Resolution and Address Mobility to | Unreachability Detection, Address Resolution and Address Mobility to | |||
| transfer a role of ND proxy to the AP where a STA is associated | transfer a role of ND proxy to the AP where a STA is associated | |||
| following the mobility of the STA. The proxy ND specification | following the mobility of the STA. | |||
| associated to the address registration is | ||||
| [I-D.ietf-6lo-backbone-router]. With that specification, the AP | The WiND proxy ND specification that associated to the Address | |||
| Registration is [BB-ROUTER]. With that specification, the AP | ||||
| participates to the protocol as a Backbone Router, typically | participates to the protocol as a Backbone Router, typically | |||
| operating as a bridging proxy though the routing proxy operation is | operating as a bridging proxy though the routing proxy operation is | |||
| also possible. As a bridging proxy, the proxy replies to NS lookups | also possible. As a bridging proxy, the backbone router either | |||
| with the MAC address of the STA, and then bridges packets to the STA | replies to NS lookups with the MAC address of the STA, or preferably | |||
| normally; as a routing proxy, it replies with its own MAC address and | forwards the lookups to the STA as Link-Layer unicast frames to let | |||
| then routes to the STA at the IP layer. The routing proxy reduces | the STA answer. For the data plane, the backbone router acts as a | |||
| the need to expose the MAC address of the STA on the wired side, for | normal AP and bridges the packets to the STA as usual. As a routing | |||
| a better stability and scalability of the bridged fabric. | proxy, the backbone router replies with its own MAC address and then | |||
| routes to the STA at the IP layer. The routing proxy reduces the | ||||
| need to expose the MAC address of the STA on the wired side, for a | ||||
| better stability and scalability of the bridged fabric. | ||||
| 5.3. Case of Mesh Under Technologies | 6.3. Case of Mesh Under Technologies | |||
| The Mesh-Under provides a broadcast domain emulation with reflexive | The Mesh-Under provides a broadcast domain emulation with reflexive | |||
| and Transitive properties and defines a transit Link for IPv6 | and Transitive properties and defines a transit link for IPv6 | |||
| operations. It results that the model for IPv6 operation is similar | operations. It results that the model for IPv6 operation is similar | |||
| to that of a BSS, with the root of the mesh operating an Access Point | to that of a BSS, with the root of the mesh operating as an Access | |||
| does in a BSS/ESS. While it is still possible to operate IPv6 ND, | Point does in a BSS/ESS. | |||
| the inefficiencies of the flooding operation make the IPv6 ND | ||||
| operations even less desirable than in a BSS, and the use of WiND is | ||||
| highly recommended. | ||||
| 5.4. Case of DMC radios | While it is still possible to operate IPv6 ND, the inefficiencies of | |||
| the flooding operation make the IPv6 ND operations even less | ||||
| desirable than in a BSS, and the use of WiND is highly recommended. | ||||
| IPv6 over DMC radios uses P2P Links that can be formed and maintained | 6.4. Case of DMB radios | |||
| when a pair of DMC radios transmitters are in range from one another. | ||||
| 5.4.1. Using IPv6 ND only | IPv6 over DMB radios uses P2P links that can be formed and maintained | |||
| when a pair of DMB radios transmitters are in range from one another. | ||||
| DMC radios do not provide MAC level broadcast emulation. An example | 6.4.1. Using IPv6 ND only | |||
| DMB radios do not provide MAC level broadcast emulation. An example | ||||
| of that is IEEE Std. 802.11 OCB which uses IEEE Std. 802.11 MAC/PHYs | of that is IEEE Std. 802.11 OCB which uses IEEE Std. 802.11 MAC/PHYs | |||
| but does not provide the BSS functions. | but does not provide the BSS functions. | |||
| It is possible to form P2P IP Links between each individual pairs of | It is possible to form P2P IP links between each individual pairs of | |||
| nodes and operate IPv6 ND over those Links with Link Local addresses. | nodes and operate IPv6 ND over those links with Link-Local addresses. | |||
| DAD must be performed for all addresses on all P2P IP Links. | DAD must be performed for all addresses on all P2P IP links. | |||
| If special deployment care is taken so that the physical broadcast | If special deployment care is taken so that the physical broadcast | |||
| domains of a collection of the nodes fully overlap, then it is also | domains of a collection of the nodes fully overlap, then it is also | |||
| possible to build an IP Subnet within that collection of nodes and | possible to build an IP subnet within that collection of nodes and | |||
| operate IPv6 ND. | operate IPv6 ND. | |||
| The model can be stretched beyond the scope of IPv6 ND if an external | If an external mechanism avoids duplicate addresses and if the | |||
| mechanism avoids duplicate addresses and if the deployment ensures | deployment ensures the connectivity between peers, a non-transit Hub- | |||
| the connectivity between peers. This can be achieved for instance in | and-Spoke deployment is also possible where the Hub is the only | |||
| a Hub-and-Spoke deployment if the Hub is the only router in the | router in the subnet and the Prefix is advertised as not on-link. | |||
| Subnet and the Prefix is advertised as not onlink. | ||||
| 5.4.2. Using Wireless ND | 6.4.2. Using Wireless ND | |||
| Though this can be achieved with IPv6 ND, WiND is the recommended | Though this can be achieved with IPv6 ND, WiND is the recommended | |||
| approach since it uses more unicast communications which are more | approach since it uses unicast communications which are more reliable | |||
| reliable and less impacting for other users of the medium. | and less impacting for other users of the medium. | |||
| Router and Hosts respectively send a compressed RA/NA with a SLLAO at | The routers send RAs with a SLLAO at a regular period. The period | |||
| a regular period. The period can be indicated in a RA as in an RA- | can be indicated in the RA-Interval Option [RFC6275]. If available, | |||
| Interval Option [RFC6275]. If available, the message can be | the message can be transported in a compressed form in a beacon, | |||
| transported in a compressed form in a beacon, e.g., in OCB Basic | e.g., in OCB Basic Safety Messages (BSM) that are nominally sent | |||
| Safety Messages (BSM) that are nominally sent every 100ms. An active | every 100ms. | |||
| beaconing mode is possible whereby the Host sends broadcast RS | ||||
| messages to which a router can answer with a unicast RA. | An active beaconing mode is possible whereby the Host sends broadcast | |||
| RS messages to which a router can answer with a unicast RA. | ||||
| A router that has Internet connectivity and is willing to serve as an | A router that has Internet connectivity and is willing to serve as an | |||
| Internet Access may advertise itself as a default router [RFC4191] in | Internet Access may advertise itself as a default router [RFC4191] in | |||
| its RA. The NA/RA is sent over an Unspecified Link where it does not | its RA messages. The RA is sent over an unspecified link where it | |||
| conflict to anyone, so DAD is not necessary at that stage. | does not conflict to anyone, so DAD is not necessary at that stage. | |||
| The receiver instantiates a Link where the sender's address is not a | The host instantiates a link where the router's address is not a | |||
| duplicate. To achieve this, it forms an LLA that does not conflict | duplicate. To achieve this, it forms an LLA that does not conflict | |||
| with that of the sender and registers to the sender using [RFC8505]. | with that of the router and registers to the router using [RFC8505]. | |||
| If the router sent an RA(PIO), the host can also autoconfigure an | ||||
| If the sender sent an RA(PIO) the receiver can also autoconfigure an | ||||
| address from the advertised prefix and register it. | address from the advertised prefix and register it. | |||
| 6LoWPAN Node 6LR | (host) (router) | |||
| (RPL leaf) (router) | ||||
| | | | | | | |||
| | LLN link | | | DMB link | | |||
| | | | | | | |||
| | IPv6 ND RS | | | IPv6 ND RS | | |||
| |-------------->| | |-------------->| | |||
| |-----------> | | |-----------> | | |||
| |------------------> | |------------------> | |||
| | IPv6 ND RA | | | IPv6 ND RA | | |||
| |<--------------| | |<--------------| | |||
| | | | | | | |||
| | NS(EARO) | | | NS(EARO) | | |||
| |-------------->| | |-------------->| | |||
| | | | | | | |||
| | NA(EARO) | | | NA(EARO) | | |||
| |<--------------| | |<--------------| | |||
| | | | | | | |||
| Figure 1: Initial Registration Flow | Figure 1: Initial Registration Flow | |||
| The lifetime in the registration should start with a small value | The lifetime in the registration should start with a small value | |||
| (X=RMin, TBD), and exponentially grow with each reregistration to a | (X=RMin, TBD), and exponentially grow with each re-registration to a | |||
| mlarger value (X=Rmax, TBD). The IP Link is considered down when | larger value (X=Rmax, TBD). The IP link is considered down when | |||
| (X=NbBeacons, TDB) expected messages are not received in a row. It | (X=NbBeacons, TDB) expected messages are not received in a row. It | |||
| must be noted that the Link flapping does not affect the state of the | must be noted that the link flapping does not affect the state of the | |||
| registration and when a Link comes back up, the active -lifetime not | registration and when a link comes back up, the active registrations | |||
| elapsed- registrations are still usable. Packets should be held or | (i.e., registrations for which lifetime is not elapsed) are still | |||
| destroyed when the Link is down. | usable. Packets should be held or destroyed when the link is down. | |||
| P2P Links may be federated in Hub-and-Spoke and then in Route-Over | P2P links may be federated in Hub-and-Spoke and then in Route-Over | |||
| MLSNs as described above. More details on the operation of WiND and | MLSNs as illustrated in Figure 2. More details on the operation of | |||
| RPL over the MLSN can be found in section 3.1, 3.2, 4.1 and 4.2.2 of | WiND and RPL over the MLSN can be found in section 3.1, 3.2, 4.1 and | |||
| [I-D.ietf-6tisch-architecture]. | 4.2.2 of [I-D.ietf-6tisch-architecture]. | |||
| 6LoWPAN Node 6LR 6LBR 6BBR | 6LoWPAN Node 6LR 6LBR 6BBR | |||
| (RPL leaf) (router) (root) | (RPL leaf) (router) (root) | |||
| | | | | | | | | | | |||
| | 6LoWPAN ND |6LoWPAN ND+RPL | 6LoWPAN ND | IPv6 ND | | 6LoWPAN ND |6LoWPAN ND+RPL | 6LoWPAN ND | IPv6 ND | |||
| | LLN link |Route-Over mesh|Ethernet/serial| Backbone | | LLN link |Route-Over mesh|Ethernet/serial| Backbone | |||
| | | | | | | | | | | |||
| | IPv6 ND RS | | | | | IPv6 ND RS | | | | |||
| |-------------->| | | | |-------------->| | | | |||
| |-----------> | | | | |-----------> | | | | |||
| skipping to change at page 17, line 36 ¶ | skipping to change at page 17, line 36 ¶ | |||
| | | | | (EARO) | | | | | (EARO) | |||
| | | | | | | | | | | |||
| | | | NA(EARO) |<timeout> | | | | NA(EARO) |<timeout> | |||
| | | |<--------------| | | | |<--------------| | |||
| | | Extended DAC | | | | | Extended DAC | | | |||
| | |<--------------| | | | |<--------------| | | |||
| | NA(EARO) | | | | | NA(EARO) | | | | |||
| |<--------------| | | | |<--------------| | | | |||
| | | | | | | | | | | |||
| Figure 2: Initial Registration Flow over Multi-Link Subnet | Figure 2: Initial Registration Flow over Multi-link subnet | |||
| An example Hub-and-Spoke is an OCB Road-Side Unit (RSU) that owns a | An example Hub-and-Spoke is an OCB Road-Side Unit (RSU) that owns a | |||
| prefix, provides Internet connectivity using that prefix to On-Board | prefix, provides Internet connectivity using that prefix to On-Board | |||
| Units (OBUs) within its physical broadcast domain. An example of | Units (OBUs) within its physical broadcast domain. An example of | |||
| Route-Over MLSN is a collection of cars in a parking lot operating | Route-Over MLSN is a collection of cars in a parking lot operating | |||
| RPL to extend the connectivity provided by the RSU beyond its | RPL to extend the connectivity provided by the RSU beyond its | |||
| physical broadcast domain. Cars may then operate NEMO [RFC3963] for | physical broadcast domain. Cars may then operate NEMO [RFC3963] for | |||
| their own prefix using their address derived from the prefix of the | their own prefix using their address derived from the prefix of the | |||
| RSU as CareOf Address. | RSU as CareOf Address. | |||
| 6. IANA Considerations | 7. IANA Considerations | |||
| This specification does not require IANA action. | This specification does not require IANA action. | |||
| 7. Security Considerations | 8. Security Considerations | |||
| This specification refers to the security sections of IPv6 ND and | This specification refers to the security sections of IPv6 ND and | |||
| WiND, respectively. | WiND, respectively. | |||
| 8. Acknowledgments | 9. Acknowledgments | |||
| Many thanks to the participants of the 6lo WG where a lot of the work | Many thanks to the participants of the 6lo WG where a lot of the work | |||
| discussed here happened. Also ROLL, 6TiSCH, and 6LoWPAN. | discussed here happened. Also ROLL, 6TiSCH, and 6LoWPAN. | |||
| 9. References | 10. Normative References | |||
| 9.1. Normative References | ||||
| [I-D.ietf-6lo-ap-nd] | ||||
| Thubert, P., Sarikaya, B., Sethi, M., and R. Struik, | ||||
| "Address Protected Neighbor Discovery for Low-power and | ||||
| Lossy Networks", draft-ietf-6lo-ap-nd-12 (work in | ||||
| progress), April 2019. | ||||
| [I-D.ietf-6lo-backbone-router] | ||||
| Thubert, P., Perkins, C., and E. Levy-Abegnoli, "IPv6 | ||||
| Backbone Router", draft-ietf-6lo-backbone-router-13 (work | ||||
| in progress), September 2019. | ||||
| [RFC3963] Devarapalli, V., Wakikawa, R., Petrescu, A., and P. | [RFC3963] Devarapalli, V., Wakikawa, R., Petrescu, A., and P. | |||
| Thubert, "Network Mobility (NEMO) Basic Support Protocol", | Thubert, "Network Mobility (NEMO) Basic Support Protocol", | |||
| RFC 3963, DOI 10.17487/RFC3963, January 2005, | RFC 3963, DOI 10.17487/RFC3963, January 2005, | |||
| <https://www.rfc-editor.org/info/rfc3963>. | <https://www.rfc-editor.org/info/rfc3963>. | |||
| [RFC4191] Draves, R. and D. Thaler, "Default Router Preferences and | [RFC4191] Draves, R. and D. Thaler, "Default Router Preferences and | |||
| More-Specific Routes", RFC 4191, DOI 10.17487/RFC4191, | More-Specific Routes", RFC 4191, DOI 10.17487/RFC4191, | |||
| November 2005, <https://www.rfc-editor.org/info/rfc4191>. | November 2005, <https://www.rfc-editor.org/info/rfc4191>. | |||
| skipping to change at page 19, line 16 ¶ | skipping to change at page 18, line 51 ¶ | |||
| (IPv6) Specification", STD 86, RFC 8200, | (IPv6) Specification", STD 86, RFC 8200, | |||
| DOI 10.17487/RFC8200, July 2017, | DOI 10.17487/RFC8200, July 2017, | |||
| <https://www.rfc-editor.org/info/rfc8200>. | <https://www.rfc-editor.org/info/rfc8200>. | |||
| [RFC8505] Thubert, P., Ed., Nordmark, E., Chakrabarti, S., and C. | [RFC8505] Thubert, P., Ed., Nordmark, E., Chakrabarti, S., and C. | |||
| Perkins, "Registration Extensions for IPv6 over Low-Power | Perkins, "Registration Extensions for IPv6 over Low-Power | |||
| Wireless Personal Area Network (6LoWPAN) Neighbor | Wireless Personal Area Network (6LoWPAN) Neighbor | |||
| Discovery", RFC 8505, DOI 10.17487/RFC8505, November 2018, | Discovery", RFC 8505, DOI 10.17487/RFC8505, November 2018, | |||
| <https://www.rfc-editor.org/info/rfc8505>. | <https://www.rfc-editor.org/info/rfc8505>. | |||
| 9.2. Informative References | [ADDR-PROTECT] | |||
| Thubert, P., Sarikaya, B., Sethi, M., and R. Struik, | ||||
| "Address Protected Neighbor Discovery for Low-power and | ||||
| Lossy Networks", Work in Progress, Internet-Draft, draft- | ||||
| ietf-6lo-ap-nd-20, 9 March 2020, | ||||
| <https://tools.ietf.org/html/draft-ietf-6lo-ap-nd-20>. | ||||
| [I-D.bi-savi-wlan] | [BB-ROUTER] | |||
| Bi, J., Wu, J., Wang, Y., and T. Lin, "A SAVI Solution for | Thubert, P., Perkins, C., and E. Levy-Abegnoli, "IPv6 | |||
| WLAN", draft-bi-savi-wlan-17 (work in progress), May 2019. | Backbone Router", Work in Progress, Internet-Draft, draft- | |||
| ietf-6lo-backbone-router-20, 23 March 2020, | ||||
| <https://tools.ietf.org/html/draft-ietf-6lo-backbone- | ||||
| router-20>. | ||||
| [I-D.ietf-6tisch-architecture] | 11. Informative References | |||
| Thubert, P., "An Architecture for IPv6 over the TSCH mode | ||||
| of IEEE 802.15.4", draft-ietf-6tisch-architecture-26 (work | ||||
| in progress), August 2019. | ||||
| [I-D.ietf-mboned-ieee802-mcast-problems] | [RFC4291] Hinden, R. and S. Deering, "IP Version 6 Addressing | |||
| Perkins, C., McBride, M., Stanley, D., Kumari, W., and J. | Architecture", RFC 4291, DOI 10.17487/RFC4291, February | |||
| Zuniga, "Multicast Considerations over IEEE 802 Wireless | 2006, <https://www.rfc-editor.org/info/rfc4291>. | |||
| Media", draft-ietf-mboned-ieee802-mcast-problems-08 (work | ||||
| in progress), August 2019. | [RFC4903] Thaler, D., "Multi-Link Subnet Issues", RFC 4903, | |||
| DOI 10.17487/RFC4903, June 2007, | ||||
| <https://www.rfc-editor.org/info/rfc4903>. | ||||
| [RFC6550] Winter, T., Ed., Thubert, P., Ed., Brandt, A., Hui, J., | ||||
| Kelsey, R., Levis, P., Pister, K., Struik, R., Vasseur, | ||||
| JP., and R. Alexander, "RPL: IPv6 Routing Protocol for | ||||
| Low-Power and Lossy Networks", RFC 6550, | ||||
| DOI 10.17487/RFC6550, March 2012, | ||||
| <https://www.rfc-editor.org/info/rfc6550>. | ||||
| [RFC6775] Shelby, Z., Ed., Chakrabarti, S., Nordmark, E., and C. | ||||
| Bormann, "Neighbor Discovery Optimization for IPv6 over | ||||
| Low-Power Wireless Personal Area Networks (6LoWPANs)", | ||||
| RFC 6775, DOI 10.17487/RFC6775, November 2012, | ||||
| <https://www.rfc-editor.org/info/rfc6775>. | ||||
| [RFC7668] Nieminen, J., Savolainen, T., Isomaki, M., Patil, B., | ||||
| Shelby, Z., and C. Gomez, "IPv6 over BLUETOOTH(R) Low | ||||
| Energy", RFC 7668, DOI 10.17487/RFC7668, October 2015, | ||||
| <https://www.rfc-editor.org/info/rfc7668>. | ||||
| [RFC8273] Brzozowski, J. and G. Van de Velde, "Unique IPv6 Prefix | ||||
| per Host", RFC 8273, DOI 10.17487/RFC8273, December 2017, | ||||
| <https://www.rfc-editor.org/info/rfc8273>. | ||||
| [RFC8415] Mrugalski, T., Siodelski, M., Volz, B., Yourtchenko, A., | ||||
| Richardson, M., Jiang, S., Lemon, T., and T. Winters, | ||||
| "Dynamic Host Configuration Protocol for IPv6 (DHCPv6)", | ||||
| RFC 8415, DOI 10.17487/RFC8415, November 2018, | ||||
| <https://www.rfc-editor.org/info/rfc8415>. | ||||
| [I-D.ietf-rift-rift] | [I-D.ietf-rift-rift] | |||
| Przygienda, T., Sharma, A., Thubert, P., and D. Afanasiev, | Przygienda, T., Sharma, A., Thubert, P., Rijsman, B., and | |||
| "RIFT: Routing in Fat Trees", draft-ietf-rift-rift-08 | D. Afanasiev, "RIFT: Routing in Fat Trees", Work in | |||
| (work in progress), September 2019. | Progress, Internet-Draft, draft-ietf-rift-rift-11, 10 | |||
| March 2020, | ||||
| <https://tools.ietf.org/html/draft-ietf-rift-rift-11>. | ||||
| [I-D.thubert-6lo-unicast-lookup] | [RPL-UNAWARE-LEAVES] | |||
| Thubert, P. and E. Levy-Abegnoli, "IPv6 Neighbor Discovery | Thubert, P. and M. Richardson, "Routing for RPL Leaves", | |||
| Unicast Lookup", draft-thubert-6lo-unicast-lookup-00 (work | Work in Progress, Internet-Draft, draft-ietf-roll-unaware- | |||
| in progress), January 2019. | leaves-13, 17 March 2020, <https://tools.ietf.org/html/ | |||
| draft-ietf-roll-unaware-leaves-13>. | ||||
| [I-D.thubert-roll-unaware-leaves] | [DAD-ISSUES] | |||
| Thubert, P., "Routing for RPL Leaves", draft-thubert-roll- | Yourtchenko, A. and E. Nordmark, "A survey of issues | |||
| unaware-leaves-07 (work in progress), April 2019. | related to IPv6 Duplicate Address Detection", Work in | |||
| Progress, Internet-Draft, draft-yourtchenko-6man-dad- | ||||
| issues-01, 3 March 2015, <https://tools.ietf.org/html/ | ||||
| draft-yourtchenko-6man-dad-issues-01>. | ||||
| [I-D.vyncke-6man-mcast-not-efficient] | [MCAST-EFFICIENCY] | |||
| Vyncke, E., Thubert, P., Levy-Abegnoli, E., and A. | Vyncke, E., Thubert, P., Levy-Abegnoli, E., and A. | |||
| Yourtchenko, "Why Network-Layer Multicast is Not Always | Yourtchenko, "Why Network-Layer Multicast is Not Always | |||
| Efficient At Datalink Layer", draft-vyncke-6man-mcast-not- | Efficient At Datalink Layer", Work in Progress, Internet- | |||
| efficient-01 (work in progress), February 2014. | Draft, draft-vyncke-6man-mcast-not-efficient-01, 14 | |||
| February 2014, <https://tools.ietf.org/html/draft-vyncke- | ||||
| 6man-mcast-not-efficient-01>. | ||||
| [I-D.yourtchenko-6man-dad-issues] | [I-D.ietf-6tisch-architecture] | |||
| Yourtchenko, A. and E. Nordmark, "A survey of issues | Thubert, P., "An Architecture for IPv6 over the TSCH mode | |||
| related to IPv6 Duplicate Address Detection", draft- | of IEEE 802.15.4", Work in Progress, Internet-Draft, | |||
| yourtchenko-6man-dad-issues-01 (work in progress), March | draft-ietf-6tisch-architecture-28, 29 October 2019, | |||
| 2015. | <https://tools.ietf.org/html/draft-ietf-6tisch- | |||
| architecture-28>. | ||||
| [MCAST-PROBLEMS] | ||||
| Perkins, C., McBride, M., Stanley, D., Kumari, W., and J. | ||||
| Zuniga, "Multicast Considerations over IEEE 802 Wireless | ||||
| Media", Work in Progress, Internet-Draft, draft-ietf- | ||||
| mboned-ieee802-mcast-problems-11, 11 December 2019, | ||||
| <https://tools.ietf.org/html/draft-ietf-mboned-ieee802- | ||||
| mcast-problems-11>. | ||||
| [SAVI] Bi, J., Wu, J., Wang, Y., and T. Lin, "A SAVI Solution for | ||||
| WLAN", Work in Progress, Internet-Draft, draft-bi-savi- | ||||
| wlan-18, 17 November 2019, | ||||
| <https://tools.ietf.org/html/draft-bi-savi-wlan-18>. | ||||
| [UNICAST-AR] | ||||
| Thubert, P. and E. Levy-Abegnoli, "IPv6 Neighbor Discovery | ||||
| Unicast Lookup", Work in Progress, Internet-Draft, draft- | ||||
| thubert-6lo-unicast-lookup-00, 25 January 2019, | ||||
| <https://tools.ietf.org/html/draft-thubert-6lo-unicast- | ||||
| lookup-00>. | ||||
| [IEEE802154] | [IEEE802154] | |||
| IEEE standard for Information Technology, "IEEE Std. | IEEE standard for Information Technology, "IEEE Std. | |||
| 802.15.4, Part. 15.4: Wireless Medium Access Control (MAC) | 802.15.4, Part. 15.4: Wireless Medium Access Control (MAC) | |||
| and Physical Layer (PHY) Specifications for Low-Rate | and Physical Layer (PHY) Specifications for Low-Rate | |||
| Wireless Personal Area Networks". | Wireless Personal Area Networks". | |||
| [IEEEstd8021] | ||||
| IEEE standard for Information Technology, "IEEE Standard | ||||
| for Information technology -- Telecommunications and | ||||
| information exchange between systems Local and | ||||
| metropolitan area networks Part 1: Bridging and | ||||
| Architecture". | ||||
| [IEEEstd80211] | [IEEEstd80211] | |||
| IEEE standard for Information Technology, "IEEE Standard | IEEE standard for Information Technology, "IEEE Standard | |||
| for Information technology -- Telecommunications and | for Information technology -- Telecommunications and | |||
| information exchange between systems Local and | information exchange between systems Local and | |||
| metropolitan area networks-- Specific requirements Part | metropolitan area networks-- Specific requirements Part | |||
| 11: Wireless LAN Medium Access Control (MAC) and Physical | 11: Wireless LAN Medium Access Control (MAC) and Physical | |||
| Layer (PHY) Specifications". | Layer (PHY) Specifications". | |||
| [IEEEstd802151] | [IEEEstd802151] | |||
| IEEE standard for Information Technology, "IEEE Standard | IEEE standard for Information Technology, "IEEE Standard | |||
| skipping to change at page 20, line 46 ¶ | skipping to change at page 21, line 42 ¶ | |||
| Metropolitan Area Networks - Specific Requirements. - Part | Metropolitan Area Networks - Specific Requirements. - Part | |||
| 15.1: Wireless Medium Access Control (MAC) and Physical | 15.1: Wireless Medium Access Control (MAC) and Physical | |||
| Layer (PHY) Specifications for Wireless Personal Area | Layer (PHY) Specifications for Wireless Personal Area | |||
| Networks (WPANs)". | Networks (WPANs)". | |||
| [IEEEstd802154] | [IEEEstd802154] | |||
| IEEE standard for Information Technology, "IEEE Standard | IEEE standard for Information Technology, "IEEE Standard | |||
| for Local and metropolitan area networks -- Part 15.4: | for Local and metropolitan area networks -- Part 15.4: | |||
| Low-Rate Wireless Personal Area Networks (LR-WPANs)". | Low-Rate Wireless Personal Area Networks (LR-WPANs)". | |||
| [RFC4291] Hinden, R. and S. Deering, "IP Version 6 Addressing | [IEEEstd8021] | |||
| Architecture", RFC 4291, DOI 10.17487/RFC4291, February | IEEE standard for Information Technology, "IEEE Standard | |||
| 2006, <https://www.rfc-editor.org/info/rfc4291>. | for Information technology -- Telecommunications and | |||
| information exchange between systems Local and | ||||
| [RFC4903] Thaler, D., "Multi-Link Subnet Issues", RFC 4903, | metropolitan area networks Part 1: Bridging and | |||
| DOI 10.17487/RFC4903, June 2007, | Architecture". | |||
| <https://www.rfc-editor.org/info/rfc4903>. | ||||
| [RFC6550] Winter, T., Ed., Thubert, P., Ed., Brandt, A., Hui, J., | ||||
| Kelsey, R., Levis, P., Pister, K., Struik, R., Vasseur, | ||||
| JP., and R. Alexander, "RPL: IPv6 Routing Protocol for | ||||
| Low-Power and Lossy Networks", RFC 6550, | ||||
| DOI 10.17487/RFC6550, March 2012, | ||||
| <https://www.rfc-editor.org/info/rfc6550>. | ||||
| [RFC6775] Shelby, Z., Ed., Chakrabarti, S., Nordmark, E., and C. | ||||
| Bormann, "Neighbor Discovery Optimization for IPv6 over | ||||
| Low-Power Wireless Personal Area Networks (6LoWPANs)", | ||||
| RFC 6775, DOI 10.17487/RFC6775, November 2012, | ||||
| <https://www.rfc-editor.org/info/rfc6775>. | ||||
| [RFC7668] Nieminen, J., Savolainen, T., Isomaki, M., Patil, B., | ||||
| Shelby, Z., and C. Gomez, "IPv6 over BLUETOOTH(R) Low | ||||
| Energy", RFC 7668, DOI 10.17487/RFC7668, October 2015, | ||||
| <https://www.rfc-editor.org/info/rfc7668>. | ||||
| [RFC8273] Brzozowski, J. and G. Van de Velde, "Unique IPv6 Prefix | ||||
| per Host", RFC 8273, DOI 10.17487/RFC8273, December 2017, | ||||
| <https://www.rfc-editor.org/info/rfc8273>. | ||||
| Author's Address | Author's Address | |||
| Pascal Thubert (editor) | Pascal Thubert (editor) | |||
| Cisco Systems, Inc | Cisco Systems, Inc | |||
| Building D | Building D | |||
| 45 Allee des Ormes - BP1200 | 45 Allee des Ormes - BP1200 | |||
| MOUGINS - Sophia Antipolis 06254 | 06254 Mougins - Sophia Antipolis | |||
| FRANCE | France | |||
| Phone: +33 497 23 26 34 | Phone: +33 497 23 26 34 | |||
| Email: pthubert@cisco.com | Email: pthubert@cisco.com | |||
| End of changes. 142 change blocks. | ||||
| 586 lines changed or deleted | 623 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||