rfc9119xml2.original.xml | rfc9119.xml | |||
---|---|---|---|---|
<?xml version="1.0" encoding="UTF-8"?> | <?xml version="1.0" encoding="utf-8"?> | |||
<!DOCTYPE rfc SYSTEM "rfc2629.dtd" | ||||
[ | ||||
<!-- declare nbsp and friends --> | ||||
<!ENTITY nbsp " "> | ||||
<!ENTITY nbhy "‑"> | ||||
<!ENTITY wj "⁠"> | ||||
]> | ||||
<?xml-stylesheet type='text/xsl' href='rfc2629.xslt' ?> | ||||
<?rfc toc="yes"?> | ||||
<?rfc tocompact="yes"?> | ||||
<?rfc tocdepth="3"?> | ||||
<?rfc tocindent="yes"?> | ||||
<?rfc symrefs="yes"?> | ||||
<!-- use symbolic references tags, i.e, [RFC2119] instead of [1] --> | ||||
<?rfc sortrefs="yes" ?> | ||||
<!-- sort the reference entries alphabetically --> | ||||
<!-- control vertical white space | ||||
(using these PIs as follows is recommended by the RFC Editor) --> | ||||
<?rfc comments="yes"?> | ||||
<?rfc inline="yes"?> | ||||
<?rfc compact="yes" ?> | ||||
<!-- do not start each main section on a new page --> | ||||
<?rfc subcompact="yes" ?> | ||||
<!-- ?rfc subcompact="no" ? --> | ||||
<!-- keep one blank line between list items --> | ||||
<?rfc strict="yes" ?> | ||||
<!-- give errors regarding ID-nits and DTD validation --> | ||||
<!-- | ||||
==================================== 80 ======================================== | ||||
==================================== 72 ================================ | ||||
<!-- TODO!! | ||||
== We could write text for more Recommendations. | ||||
== We could more fully describe the IPv6 uses of multicast. | ||||
== We could describe more potential multicast applications that might be | ||||
enabled with better multicast solutions (if in fact better solutions exist). | ||||
<rfc category="info" docName="draft-ietf-mboned-ieee802-mcast-problems-15" | ||||
ipr="trust200902"> | ||||
<front> | ||||
<title abbrev="Multicast Over IEEE 802 Wireless">Multicast Considerations | ||||
over IEEE 802 Wireless Media</title> | ||||
<author fullname="Charles E. Perkins" initials="C.E." surname="Perkins"> | ||||
<organization abbrev="Blue Meadow Networks">Blue Meadow Networks</organiza | ||||
tion> | ||||
<address> | ||||
<postal> | ||||
<street></street> | ||||
<city></city> | ||||
<code></code> | ||||
<region></region> | ||||
<country></country> | ||||
</postal> | ||||
<phone>+1-408-330-4586</phone> | ||||
<email>charliep@computer.org</email> | ||||
</address> | ||||
</author> | ||||
<author fullname="Mike McBride" initials="M." surname="McBride"> | ||||
<organization abbrev="Futurewei">Futurewei Technologies Inc.</organization | ||||
> | ||||
<address> | ||||
<postal> | ||||
<street>2330 Central Expressway</street> | ||||
<city>Santa Clara</city> | ||||
<code>95055</code> | ||||
<region>CA</region> | ||||
<country>USA</country> | ||||
</postal> | ||||
<email>michael.mcbride@futurewei.com</email> | ||||
</address> | ||||
</author> | ||||
<author fullname="Dorothy Stanley" initials="D" surname="Stanley"> | ||||
<organization abbrev="HPE">Hewlett Packard Enterprise</organization> | ||||
<address> | ||||
<postal> | ||||
<street>2000 North Naperville Rd.</street> | ||||
<city>Naperville</city> | ||||
<code>60566</code> | ||||
<region>IL</region> | ||||
<country>USA</country> | ||||
</postal> | ||||
<phone>+1 630 979 1572</phone> | ||||
<email>dstanley1389@gmail.com</email> | ||||
</address> | ||||
</author> | ||||
<author fullname="Warren Kumari" initials="W" surname="Kumari"> | ||||
<organization abbrev="Google">Google</organization> | ||||
<address> | ||||
<postal> | ||||
<street>1600 Amphitheatre Parkway</street> | ||||
<city>Mountain View</city> | ||||
<code>94043</code> | ||||
<region>CA</region> | ||||
<country>USA</country> | ||||
</postal> | ||||
<email>warren@kumari.net</email> | ||||
</address> | ||||
</author> | ||||
<author fullname="Juan Carlos Zuniga" initials="JC" surname="Zuniga"> | ||||
<organization abbrev="SIGFOX">SIGFOX</organization> | ||||
<address> | ||||
<postal> | ||||
<street>425 rue Jean Rostand</street> | ||||
<city>Labege</city> | ||||
<code>31670</code> | ||||
<region/> | ||||
<country>France</country> | ||||
</postal> | ||||
<email>j.c.zuniga@ieee.org</email> | ||||
</address> | ||||
</author> | ||||
<date/> | ||||
<area>Internet</area> | ||||
<workgroup>Internet Area</workgroup> | ||||
<keyword>Multicast</keyword> | ||||
<keyword>IEEE 802 Wireless Multicast</keyword> | ||||
<abstract> | ||||
<t> | ||||
Well-known issues with multicast have prevented the deployment of | ||||
multicast in 802.11 (wifi) and other local-area wireless environments. | ||||
<!-- deleted re: Jake Holland, Aug. 10. | ||||
IETF multicast experts have been meeting | ||||
together to discuss these issues and provide IEEE updates. The | ||||
mboned working group is chartered to receive regular reports on the | ||||
current state of the deployment of multicast technology, create | ||||
"practice and experience" documents that capture the experience of | ||||
those who have deployed and are deploying various multicast | ||||
technologies, and provide feedback to other relevant working groups. | ||||
--> | ||||
This document describes the known limitations | ||||
of wireless (primarily 802.11) Layer-2 multicast. Also described are cer | ||||
tain multicast | ||||
enhancement features that have been specified by the IETF, | ||||
and by IEEE 802, for wireless media, as well as some operational choices | ||||
that can be taken to improve the performance of the network. Finally, | ||||
some recommendations are provided about the usage and combination of | ||||
these features and operational choices. | ||||
</t> | ||||
</abstract> | ||||
</front> | ||||
<middle> | ||||
<section anchor="intro" title="Introduction"> | ||||
<t> | ||||
Well-known issues with multicast have prevented the deployment of | ||||
multicast in 802.11 <xref target="dot11"/> and other local-area | ||||
wireless environments, as described in <xref target="mc-props"/>, | ||||
<xref target="mc-prob-stmt"/>. Performance issues have been observed | ||||
when multicast | ||||
packet transmissions of IETF protocols are used over IEEE 802 wireless | ||||
media. Even though enhancements for multicast transmissions have been | ||||
designed at both IETF and IEEE 802, incompatibilities still exist | ||||
between specifications, implementations and configuration choices. | ||||
</t> | ||||
<t> Many IETF protocols depend on multicast/broadcast for delivery of | ||||
control messages to multiple receivers. Multicast allows sending data to | ||||
multiple interested recipients without the source needing to send duplica | ||||
te | ||||
data to each recipient. With broadcast traffic, data is sent to every dev | ||||
ice | ||||
regardless of their expressed interest in the data. Multicast is used for | ||||
various | ||||
purposes such as neighbor discovery, network flooding, address | ||||
resolution, as well minimizing media occupancy for the | ||||
transmission of data that is intended for multiple receivers. | ||||
In addition to protocol use of broadcast/multicast for | ||||
control messages, more applications, such as push to talk in | ||||
hospitals, or video in enterprises, universities, and homes, are | ||||
sending multicast IP to end user devices, which are increasingly | ||||
using Wi-Fi for their connectivity. </t> | ||||
<t> IETF protocols typically rely on network protocol layering in order | ||||
to reduce or eliminate any dependence of higher level protocols on | ||||
the specific nature of the MAC layer protocols or the physical media. | ||||
In the case of multicast transmissions, higher level protocols have | ||||
traditionally been designed as if transmitting a packet to an IP | ||||
address had the same cost in interference and network media access, | ||||
regardless of whether the destination IP address is a unicast address | ||||
or a multicast or broadcast address. This model was reasonable for | ||||
networks where the physical medium was wired, like Ethernet. | ||||
Unfortunately, for many wireless media, the costs to access the | ||||
medium can be quite different. Multicast over Wi-Fi has often been | ||||
plagued by such poor performance that it is disallowed. | ||||
Some enhancements have been designed | ||||
in IETF protocols that are assumed to work primarily over wireless | ||||
media. However, these enhancements are usually implemented in limited | ||||
deployments and not widespread on most wireless networks.</t> | ||||
<t> IEEE 802 wireless protocols have been designed with certain features | ||||
to support multicast traffic. For instance, lower modulations are | ||||
used to transmit multicast frames, so that these can be received by | ||||
all stations in the cell, regardless of the distance or path | ||||
attenuation from the base station or access point. However, these | ||||
lower modulation transmissions occupy the medium longer; | ||||
they hamper efficient transmission of traffic using | ||||
higher order modulations to nearby stations. | ||||
For these and other reasons, IEEE 802 working groups such as 802.11 | ||||
have designed features to improve the performance of multicast | ||||
transmissions at Layer 2 <xref target="ietf_802-11" />. | ||||
In addition to protocol design features, certain operational and | ||||
configuration enhancements can ameliorate the network | ||||
performance issues created by multicast traffic, | ||||
as described in <xref target="optim3" />.</t> | ||||
<t> There seems to be general agreement that these problems will not | <!DOCTYPE rfc [ | |||
be fixed anytime soon, primarily because it's expensive to do so | <!ENTITY nbsp " "> | |||
and due to multicast being unreliable. Compared to unicast over Wi-Fi, | <!ENTITY zwsp "​"> | |||
multicast is often treated as somewhat of a second class citizen, even | <!ENTITY nbhy "‑"> | |||
though there are many protocols using multicast. Something needs to | <!ENTITY wj "⁠"> | |||
be provided in order to make them more reliable. IPv6 | ]> | |||
neighbor discovery saturating the Wi-Fi link is only part of the | <!-- updated by MS 08/02/21 --> | |||
problem. Wi-Fi traffic classes may help. This document is intended | ||||
to help make the determination about | ||||
what problems should be solved by the IETF and what problems | ||||
should be solved by the IEEE (see <xref target="discussion" />). | ||||
<!-- | ||||
A "multicast over wifi" IETF mailing list has been formed | ||||
(mcast-wifi@ietf.org) for further discussion. This draft will | ||||
be updated according to the current state of discussion. | ||||
--> | ||||
</t> | ||||
<t> This document details various problems caused by multicast transmission | <rfc xmlns:xi="http://www.w3.org/2001/XInclude" category="info" docName="draft- | |||
over wireless networks, including high packet error rates, no | ietf-mboned-ieee802-mcast-problems-15" ipr="trust200902" obsoletes="" updates="" | |||
acknowledgements, and low data rate. It also explains some | submissionType="IETF" xml:lang="en" tocInclude="true" tocDepth="3" symRefs="tru | |||
enhancements that have been designed at the IETF and IEEE 802.11 to ameli | e" sortRefs="true" version="3" consensus="true" number="9119"> | |||
orate | <!-- xml2rfc v2v3 conversion 3.9.1 --> | |||
the effects of the radio medium on multicast traffic. Recommendations ar | <front> | |||
e also provided | <title abbrev="Multicast Over IEEE 802 Wireless">Multicast Considerations | |||
to implementors about how to use and combine these enhancements. | over IEEE 802 Wireless Media</title> | |||
Some advice about the operational choices that can be taken is also | <seriesInfo name="RFC" value="9119"/> | |||
included. It is likely that this document will also be considered | <author fullname="Charles E. Perkins" initials="C." surname="Perkins"> | |||
relevant to designers of future IEEE wireless specifications. </t> | <organization>Lupin Lodge</organization> | |||
</section> <!-- end section "Introduction" --> | <address> | |||
<phone>+1 408 255 9223</phone> | ||||
<email>charliep@lupinlodge.com</email> | ||||
</address> | ||||
</author> | ||||
<author fullname="Mike McBride" initials="M." surname="McBride"> | ||||
<organization abbrev="Futurewei">Futurewei Technologies Inc.</organizatio | ||||
n> | ||||
<address> | ||||
<postal> | ||||
<street>2330 Central Expressway</street> | ||||
<city>Santa Clara</city> | ||||
<code>95055</code> | ||||
<region>CA</region> | ||||
<country>United States of America</country> | ||||
</postal> | ||||
<email>michael.mcbride@futurewei.com</email> | ||||
</address> | ||||
</author> | ||||
<author fullname="Dorothy Stanley" initials="D" surname="Stanley"> | ||||
<organization abbrev="HPE">Hewlett Packard Enterprise</organization> | ||||
<address> | ||||
<postal> | ||||
<street>6280 America Center Dr.</street> | ||||
<city>San Jose</city> | ||||
<code>95002</code> | ||||
<region>CA</region> | ||||
<country>United States of America</country> | ||||
</postal> | ||||
<phone>+1 630 363 1389</phone> | ||||
<email>dorothy.stanley@hpe.com</email> | ||||
</address> | ||||
</author> | ||||
<author fullname="Warren Kumari" initials="W" surname="Kumari"> | ||||
<organization abbrev="Google">Google</organization> | ||||
<address> | ||||
<postal> | ||||
<street>1600 Amphitheatre Parkway</street> | ||||
<city>Mountain View</city> | ||||
<code>94043</code> | ||||
<region>CA</region> | ||||
<country>United States of America</country> | ||||
</postal> | ||||
<email>warren@kumari.net</email> | ||||
</address> | ||||
</author> | ||||
<author fullname="Juan Carlos Zuniga" initials="JC" surname="Zuniga"> | ||||
<organization abbrev="SIGFOX">SIGFOX</organization> | ||||
<address> | ||||
<postal> | ||||
<street/> | ||||
<city>Montreal</city> | ||||
<code/> | ||||
<country>Canada</country> | ||||
</postal> | ||||
<email>j.c.zuniga@ieee.org</email> | ||||
</address> | ||||
</author> | ||||
<date year="2021" month="September"/> | ||||
<area>Internet</area> | ||||
<workgroup>Internet Area</workgroup> | ||||
<keyword>Multicast</keyword> | ||||
<keyword>Broadcast</keyword> | ||||
<keyword>BUM</keyword> | ||||
<keyword>wifi</keyword> | ||||
<keyword>wireless</keyword> | ||||
<keyword>IEEE 802 Wireless Multicast</keyword> | ||||
<abstract> | ||||
<t> | ||||
Well-known issues with multicast have prevented the deployment of | ||||
multicast in 802.11 (Wi-Fi) and other local-area wireless environments. | ||||
This document describes the known limitations | ||||
of wireless (primarily 802.11) Layer 2 multicast. Also described are ce | ||||
rtain multicast | ||||
enhancement features that have been specified by the IETF | ||||
and by IEEE 802 for wireless media, as well as some operational choices | ||||
that can be made to improve the performance of the network. Finally, | ||||
some recommendations are provided about the usage and combination of | ||||
these features and operational choices. | ||||
</t> | ||||
</abstract> | ||||
</front> | ||||
<middle> | ||||
<section anchor="intro" numbered="true" toc="default"> | ||||
<name>Introduction</name> | ||||
<t> | ||||
Well-known issues with multicast have prevented the deployment of | ||||
multicast in 802.11 <xref target="dot11" format="default"/> and other lo | ||||
cal-area | ||||
wireless environments, as described in <xref target="mc-props" format="d | ||||
efault"/> and <xref target="mc-prob-stmt" format="default"/>. Performance issue | ||||
s have been observed | ||||
when multicast | ||||
packet transmissions of IETF protocols are used over IEEE 802 wireless | ||||
media. Even though enhancements for multicast transmissions have been | ||||
designed at both IETF and IEEE 802, incompatibilities still exist | ||||
between specifications, implementations, and configuration choices. | ||||
</t> | ||||
<t> Many IETF protocols depend on multicast/broadcast for delivery of | ||||
control messages to multiple receivers. Multicast allows data to be sent | ||||
to | ||||
multiple interested recipients without the source needing to send duplic | ||||
ate | ||||
data to each recipient. With broadcast traffic, data is sent to every de | ||||
vice | ||||
regardless of their expressed interest in the data. Multicast is used fo | ||||
r various | ||||
purposes such as Neighbor Discovery, network flooding, and address | ||||
resolution, as well as minimizing media occupancy for the | ||||
transmission of data that is intended for multiple receivers. | ||||
In addition to protocol use of broadcast/multicast for | ||||
control messages, more applications, such as Push To Talk in | ||||
hospitals or video in enterprises, universities, and homes, are | ||||
sending multicast IP to end-user devices, which are increasingly | ||||
using Wi-Fi for their connectivity. </t> | ||||
<t> IETF protocols typically rely on network protocol layering in order | ||||
to reduce or eliminate any dependence of higher-level protocols on | ||||
the specific nature of the MAC-layer protocols or the physical media. | ||||
In the case of multicast transmissions, higher-level protocols have | ||||
traditionally been designed as if transmitting a packet to an IP | ||||
address had the same cost in interference and network media access, | ||||
regardless of whether the destination IP address is a unicast address | ||||
or a multicast or broadcast address. This model was reasonable for | ||||
networks where the physical medium was wired, like Ethernet. | ||||
Unfortunately, for many wireless media, the costs to access the | ||||
medium can be quite different. Multicast over Wi-Fi has often been | ||||
plagued by such poor performance that it is disallowed. | ||||
Some enhancements have been designed | ||||
in IETF protocols that are assumed to work primarily over wireless | ||||
media. However, these enhancements are usually implemented in limited | ||||
deployments and are not widespread on most wireless networks.</t> | ||||
<t> IEEE 802 wireless protocols have been designed with certain features | ||||
to support multicast traffic. For instance, lower modulations are | ||||
used to transmit multicast frames so that these can be received by | ||||
all stations in the cell, regardless of the distance or path | ||||
attenuation from the base station or Access Point (AP). | ||||
<section anchor="def" title="Terminology"> | However, these | |||
<!-- | lower modulation transmissions occupy the medium longer; | |||
<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL | they hamper efficient transmission of traffic using | |||
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", | higher-order modulations to nearby stations. | |||
"MAY", and "OPTIONAL" in this document are to be interpreted as | For these and other reasons, IEEE 802 Working Groups such as 802.11 | |||
described in <xref target="RFC2119" />.</t> | have designed features to improve the performance of multicast | |||
<t>This document also uses some terminology from <xref | transmissions at Layer 2 <xref target="ietf_802-11" format="default"/>. | |||
target="RFC5444" />.</t> | In addition to protocol design features, certain operational and | |||
--> | configuration enhancements can ameliorate the network | |||
performance issues created by multicast traffic, | ||||
as described in <xref target="optim3" format="default"/>.</t> | ||||
<t> There seems to be general agreement that these problems will not | ||||
be fixed anytime soon, primarily because it's expensive to do so | ||||
and because of the unreliability of multicast. Compared to unicast over | ||||
Wi-Fi, | ||||
multicast is often treated as somewhat of a second-class citizen even | ||||
though there are many protocols using multicast. Something needs to | ||||
be provided in order to make them more reliable. IPv6 | ||||
Neighbor Discovery saturating the Wi-Fi link is only part of the | ||||
problem. Wi-Fi traffic classes may help. This document is intended | ||||
to help make the determination about | ||||
what problems should be solved by the IETF and what problems | ||||
should be solved by the IEEE (see <xref target="discussion" format="defa | ||||
ult"/>). | ||||
</t> | ||||
<t> This document details various problems caused by multicast transmissi | ||||
on | ||||
over wireless networks, including high packet error rates, no | ||||
acknowledgements, and low data rate. It also explains some | ||||
enhancements that have been designed at the IETF and IEEE 802.11 to amel | ||||
iorate | ||||
the effects of the radio medium on multicast traffic. Recommendations a | ||||
re also provided | ||||
to implementors about how to use and combine these enhancements. | ||||
Some advice about the operational choices that can be made is also | ||||
included. It is likely that this document will also be considered | ||||
relevant to designers of future IEEE wireless specifications. </t> | ||||
</section> | ||||
<section anchor="def" numbered="true" toc="default"> | ||||
<name>Terminology</name> | ||||
<t>This document uses the following definitions: | <t>This document uses the following definitions: | |||
<list style="hanging"> | </t> | |||
<t hangText="ACK"><vspace/> The 802.11 layer 2 acknowledgement</t> | <dl newline="true"> | |||
<t><vspace/></t> | <dt>ACK</dt> | |||
<t hangText="AP"><vspace/> IEEE 802.11 Access Point</t> | <dd> The 802.11 Layer 2 acknowledgement.</dd> | |||
<t><vspace/></t> | <dt>AES-CCMP</dt><dd>AES-Counter Mode CBC-MAC Protocol</dd> | |||
<t hangText="basic rate"><vspace/> The slowest rate of all the | <dt>AP</dt> | |||
connected devices, at which multicast and broadcast traffic is | <dd> IEEE 802.11 Access Point.</dd> | |||
generally transmitted</t> | <dt>Basic rate</dt> | |||
<t><vspace/></t> | <dd> The slowest rate of all the | |||
<t hangText="DTIM"><vspace/> Delivery Traffic Indication Map (DTIM): An | connected devices at which multicast and broadcast traffic is | |||
information element that advertises whether or not any associated | generally transmitted.</dd> | |||
stations have buffered multicast or broadcast frames</t> | <dt>DVB-H</dt><dd>Digital Video Broadcasting - Handheld</dd> | |||
<t><vspace/></t> | <dt>DVB-IPDC</dt><dd>Digital Video Broadcasting - Internet Protocol Datacasting< | |||
<t hangText="MCS"><vspace/> Modulation and Coding Scheme</t> | /dd> | |||
<t><vspace/></t> | <dt>DTIM</dt> | |||
<t hangText="NOC"><vspace/> Network Operations Center</t> | <dd>Delivery Traffic Indication Map; an information element that adverti | |||
<t><vspace/></t> | ses whether or not any associated | |||
<t hangText="PER"><vspace/> Packet Error Rate</t> | stations have buffered multicast or broadcast frames.</dd> | |||
<t><vspace/></t> | <dt>MCS</dt> | |||
<t hangText="STA"><vspace/> 802.11 station (e.g. handheld device)</t> | <dd> Modulation and Coding Scheme.</dd> | |||
<t><vspace/></t> | <dt>NOC</dt> | |||
<t hangText="TIM"><vspace/> Traffic Indication Map (TIM): An | <dd> Network Operations Center.</dd> | |||
<dt>PER</dt> | ||||
<dd> Packet Error Rate.</dd> | ||||
<dt>STA</dt> | ||||
<dd> 802.11 station (e.g., handheld device).</dd> | ||||
<dt>TIM</dt> | ||||
<dd>Traffic Indication Map; an | ||||
information element that advertises whether or not any associated | information element that advertises whether or not any associated | |||
stations have buffered unicast frames</t> | stations have buffered unicast frames.</dd> | |||
<t><vspace/></t> | <dt>TKIP</dt><dd>Temporal Key Integrity Protocol</dd> | |||
</list></t> | <dt>WiMAX</dt><dd>Worldwide Interoperability for Microwave Access</dd> | |||
<!-- <t><vspace blankLines="19" /></t> --> | <dt>WPA</dt><dd>Wi-Fi Protected Access</dd> | |||
</section> <!-- end section "Terminology" --> | </dl> | |||
<section anchor="multicast_issues" title="Identified multicast issues"> | </section> | |||
<section anchor="l2_issues" title="Issues at Layer 2 and Below"> | ||||
<t> In this section some of the issues related to the use of multicast | ||||
transmissions over IEEE 802 wireless technologies are described.</t> | ||||
<section anchor="reliability" title="Multicast reliability"> | <section anchor="multicast_issues" numbered="true" toc="default"> | |||
<t> Multicast traffic is typically much less reliable than unicast | <name>Identified Multicast Issues</name> | |||
<section anchor="l2_issues" numbered="true" toc="default"> | ||||
<name>Issues at Layer 2 and Below</name> | ||||
<t> In this section, some of the issues related to the use of multicast | ||||
transmissions over IEEE 802 wireless technologies are described.</t> | ||||
<section anchor="reliability" numbered="true" toc="default"> | ||||
<name>Multicast Reliability</name> | ||||
<t> Multicast traffic is typically much less reliable than unicast | ||||
traffic. Since multicast makes point-to-multipoint communications, | traffic. Since multicast makes point-to-multipoint communications, | |||
multiple acknowledgements would be needed to guarantee reception | multiple acknowledgements would be needed to guarantee reception | |||
at all recipients. And since there are no ACKs for multicast | at all recipients. However, since there are no ACKs for multicast | |||
packets, it is not possible for the Access Point (AP) to | packets, it is not possible for the AP to | |||
know whether or not a retransmission is needed. Even in the wired | know whether or not a retransmission is needed. Even in the wired | |||
Internet, this characteristic often causes undesirably high error | Internet, this characteristic often causes undesirably high error | |||
rates. This has contributed to the relatively slow uptake of | rates. This has contributed to the relatively slow uptake of | |||
multicast applications even though the protocols have long been | multicast applications even though the protocols have long been | |||
available. The situation for wireless links is much worse, and is | available. The situation for wireless links is much worse and is | |||
quite sensitive to the presence of background traffic. | quite sensitive to the presence of background traffic. | |||
Consequently, there can be a high packet error rate (PER) | Consequently, there can be a high packet error rate (PER) | |||
due to lack of retransmission, and because the sender never backs | due to lack of retransmission and because the sender never backs | |||
off. PER is the ratio, in percent, of the number of packets not succ essfully | off. PER is the ratio, in percent, of the number of packets not succ essfully | |||
received by the device. It is not uncommon for there to be a packet l oss rate of 5% | received by the device. It is not uncommon for there to be a packet l oss rate of 5% | |||
or more, which is particularly troublesome for video and other | or more, which is particularly troublesome for video and other | |||
environments where high data rates and high reliability are | environments where high data rates and high reliability are | |||
required. </t> | required. </t> | |||
</section> <!-- end section "Multicast reliability" --> | </section> | |||
<section anchor="lower_rate" title="Lower and Variable Data Rate"> | ||||
<t> Multicast over wired differs from multicast over wireless because | <section anchor="lower_rate" numbered="true" toc="default"> | |||
<name>Lower and Variable Data Rate</name> | ||||
<t> Multicast over wired differs from multicast over wireless because | ||||
transmission over wired links often occurs at | transmission over wired links often occurs at | |||
a fixed rate. Wi-Fi, on the other hand, has a transmission rate | a fixed rate. Wi-Fi, on the other hand, has a transmission rate | |||
that varies depending upon the STA's proximity to the AP. | that varies depending upon the STA's proximity to the AP. | |||
The throughput of video flows, and the capacity of the broader | The throughput of video flows and the capacity of the broader | |||
Wi-Fi network, will change with device movement. This impacts the abi | Wi-Fi network will change with device movement. This impacts the abil | |||
lity for QoS | ity for QoS | |||
solutions to effectively reserve bandwidth and provide admission | solutions to effectively reserve bandwidth and provide admission | |||
control. </t> | control. </t> | |||
<t> For wireless stations authenticated and linked with an AP, the pow | ||||
<t> For wireless stations authenticated and linked with an Access Point, | er | |||
the power | ||||
necessary for good reception can vary from station to station. For | necessary for good reception can vary from station to station. For | |||
unicast, the goal is to minimize power requirements while maximizing | unicast, the goal is to minimize power requirements while maximizing | |||
the data rate to the destination. For multicast, the goal is simply | the data rate to the destination. For multicast, the goal is simply | |||
to maximize the number of receivers that will correctly receive the | to maximize the number of receivers that will correctly receive the | |||
multicast packet; generally the Access Point has | multicast packet; generally, the AP has | |||
to use a much lower data rate at a power level high enough for even | to use a much lower data rate at a power level high enough for even | |||
the farthest station to receive the packet, for example as briefly | the farthest station to receive the packet, for example, as briefly | |||
mentioned in section 2 of <xref target="RFC5757"/>. Consequently, th | ||||
e data | mentioned in <xref target="RFC5757" sectionFormat="of" section="4"/>. | |||
Consequently, the data | ||||
rate of a video stream, for instance, would be constrained by the | rate of a video stream, for instance, would be constrained by the | |||
environmental considerations of the least reliable receiver | environmental considerations of the least-reliable receiver | |||
associated with the Access Point. </t> | associated with the AP. </t> | |||
<t> Because more robust modulation and coding schemes (MCSs) | <t> Because more robust modulation and coding schemes (MCSs) | |||
have longer range but also lower data rate, multicast / broadcast | have a longer range but also a lower data rate, multicast/broadcast | |||
traffic is generally transmitted at the slowest rate of all the | traffic is generally transmitted at the slowest rate of all the | |||
connected devices. This is also known as the basic rate. | connected devices. This is also known as the basic rate. | |||
The amount of additional interference depends on the | The amount of additional interference depends on the | |||
specific wireless technology. In fact, backward compatibility and | specific wireless technology. In fact, backward compatibility and | |||
multi-stream implementations mean that the maximum unicast rates | multi-stream implementations mean that the maximum unicast rates | |||
are currently up to a few Gbps, so there can be more than | are currently up to a few Gbps, so there can be more than | |||
3 orders of magnitude difference in the transmission rate between | 3 orders of magnitude difference in the transmission rate between | |||
multicast / broadcast versus optimal unicast forwarding. Some | multicast/broadcast versus optimal unicast forwarding. Some | |||
techniques employed to increase spectral efficiency, such as spatial | techniques employed to increase spectral efficiency, such as spatial | |||
multiplexing in MIMO systems, are not available with more than | multiplexing in Multiple Input Multiple Output (MIMO) systems, are no t available with more than | |||
one intended receiver; it is not the case that backwards | one intended receiver; it is not the case that backwards | |||
compatibility is the only factor responsible for lower multicast | compatibility is the only factor responsible for lower multicast | |||
transmission rates. </t> | transmission rates. </t> | |||
<t> Wired multicast also affects wireless LANs when the AP extends | ||||
<t> Wired multicast also affects wireless LANs when the AP extends | the wired segment; in that case, multicast/broadcast frames | |||
the wired segment; in that case, multicast / broadcast frames | ||||
on the wired LAN side are copied to the Wireless Local Area Network ( WLAN). Since broadcast | on the wired LAN side are copied to the Wireless Local Area Network ( WLAN). Since broadcast | |||
messages are transmitted at the most robust MCS, | messages are transmitted at the most robust MCS, | |||
many large frames are sent at a slow rate over the air. </t> | many large frames are sent at a slow rate over the air. </t> | |||
</section> <!-- end section "Lower Data Rate" --> | </section> | |||
<section anchor="interference" title="Capacity and Impact on Interference"> | <section anchor="interference" numbered="true" toc="default"> | |||
<t> Transmissions at a lower | <name>Capacity and Impact on Interference</name> | |||
<t> Transmissions at a lower | ||||
rate require longer occupancy of the wireless medium and thus | rate require longer occupancy of the wireless medium and thus | |||
take away from the airtime of other communications and | take away from the airtime of other communications and | |||
degrade the overall capacity. Furthermore, transmission at higher | degrade the overall capacity. Furthermore, transmission at higher | |||
power, as is required to reach all multicast STAs associated | power, as is required to reach all multicast STAs associated | |||
to the AP, proportionately increases the area of interference with ot her | with the AP, proportionately increases the area of interference with other | |||
consumers of the radio spectrum. </t> | consumers of the radio spectrum. </t> | |||
</section> <!-- end section "Capacity and Impact on Interference" --> | </section> | |||
<section anchor="power_save" title="Power-save Effects on Multicast"> | <section anchor="power_save" numbered="true" toc="default"> | |||
<t> One of the characteristics of multicast transmission over wifi is tha | <name>Power-Save Effects on Multicast</name> | |||
t every | <t> One of the characteristics of multicast transmission over Wi-Fi is | |||
that every | ||||
station has to be configured to wake up to receive the multicast fram e, | station has to be configured to wake up to receive the multicast fram e, | |||
even though the received packet may ultimately be discarded. This | even though the received packet may ultimately be discarded. This | |||
process can have a large effect on the power consumption by | process can have a large effect on the power consumption by | |||
the multicast receiver station. For this reason there are workarounds | the multicast receiver station. For this reason, there are workaround | |||
, | s, | |||
such as Directed Multicast Service (DMS) described in Section 4, to | such as Directed Multicast Service (DMS) described in <xref target="o | |||
ptim2"/>, to | ||||
prevent unnecessarily waking up stations.</t> | prevent unnecessarily waking up stations.</t> | |||
<t> Multicast (and unicast) can work poorly with the power-save mechan | ||||
isms defined in | ||||
IEEE 802.11e for the following reasons. | ||||
</t> | ||||
<ul> | ||||
<li> Clients may be unable to stay in sleep mode due to | ||||
multicast control packets frequently waking them up.</li> | ||||
<t> Multicast (and unicast) can work poorly with the power-save mechanism | <li> A unicast packet is delayed until an STA wakes up and requests | |||
s defined in | ||||
IEEE 802.11e, for the following reasons. | ||||
<list style="symbols"> | ||||
<t> Clients may be unable to stay in sleep mode due to | ||||
multicast control packets frequently waking them up.</t> | ||||
<t> A unicast packet is delayed until an STA wakes up and requests | ||||
it. Unicast traffic may also be delayed to improve power | it. Unicast traffic may also be delayed to improve power | |||
save, efficiency and increase probability of aggregation.</t> | save and efficiency and to increase the probability of aggregatio | |||
n.</li> | ||||
<t> Multicast traffic is delayed in a wireless network if any of | <li> Multicast traffic is delayed in a wireless network if any of | |||
the STAs in that network are power savers. | the STAs in that network are power savers. | |||
All STAs associated to the AP have to be | All STAs associated with the AP have to be | |||
awake at a known time to receive multicast traffic.</t> | awake at a known time to receive multicast traffic.</li> | |||
<li> Packets can also be discarded due to buffer limitations in | ||||
<t> Packets can also be discarded due to buffer limitations in | the AP and non-AP STA.</li> | |||
the AP and non-AP STA.</t> | </ul> | |||
</list></t> | </section> | |||
</section> <!-- end section "Power-save Effects on Multicast" --> | </section> | |||
</section> <!-- end section "Issues at Layer 2 and Below" --> | ||||
<section anchor="l3_issues" title="Issues at Layer 3 and Above"> | <section anchor="l3_issues" numbered="true" toc="default"> | |||
<t> This section identifies some representative IETF protocols, and | <name>Issues at Layer 3 and Above</name> | |||
<t> This section identifies some representative IETF protocols and | ||||
describes possible negative effects due to performance degradation | describes possible negative effects due to performance degradation | |||
when using multicast transmissions for control messages. | when using multicast transmissions for control messages. | |||
Common uses of multicast include: | Common uses of multicast include: | |||
<list style="symbols"> | </t> | |||
<t> Control plane signaling </t> | <ul> | |||
<t> Neighbor Discovery </t> | <li> Control plane signaling </li> | |||
<t> Address Resolution </t> | <li> Neighbor Discovery </li> | |||
<t> Service Discovery </t> | <li> Address resolution </li> | |||
<t> Applications (video delivery, stock data, etc.) </t> | <li> Service Discovery </li> | |||
<t> On-demand routing </t> | <li> Applications (video delivery, stock data, etc.) </li> | |||
<t> Backbone construction </t> | <li> On-demand routing </li> | |||
<t> Other L3 protocols (non-IP) </t> | <li> Backbone construction </li> | |||
<!-- CEP: citations needed here, especially for non-IP protocols. --> | <li> Other Layer 3 protocols (non-IP) </li> | |||
</list> | </ul> | |||
</t> | <t> | |||
<t> | User Datagram Protocol (UDP) is the most common transport-layer | |||
User Datagram Protocol (UDP) is the most common transport layer | ||||
protocol for multicast applications. | protocol for multicast applications. | |||
By itself, UDP is not reliable -- messages may be lost or | By itself, UDP is not reliable -- messages may be lost or | |||
delivered out of order. | delivered out of order. | |||
</t> | </t> | |||
<section anchor="IPv4" numbered="true" toc="default"> | ||||
<section anchor="IPv4" title="IPv4 issues"> | <name>IPv4 Issues</name> | |||
<t> The following list contains some representative | <t> The following list contains some representative | |||
discovery protocols, which utilize broadcast/multicast, that are used | discovery protocols that utilize broadcast/multicast and are used wit | |||
with IPv4. | h IPv4. | |||
<list style="symbols"> | </t> | |||
<t>ARP <xref target="RFC0826"/></t> | <ul> | |||
<t>DHCP <xref target="RFC2131"/></t> | <li>ARP <xref target="RFC0826" format="default"/></li> | |||
<t>mDNS <xref target="RFC6762"/></t> | <li>DHCP <xref target="RFC2131" format="default"/></li> | |||
<t>uPnP <xref target="RFC6970"/></t> | <li>Multicast DNS (mDNS) <xref target="RFC6762" format="default"/></ | |||
</list></t> | li> | |||
<li>Universal Plug and Play (uPnP) <xref target="RFC6970" format="de | ||||
<t> After initial configuration, ARP (described in more detail later), D | fault"/></li> | |||
HCP and uPnP occur much less | </ul> | |||
<t> After initial configuration, ARP (described in more detail later), | ||||
DHCP, and uPnP occur much less | ||||
commonly, but service discovery can occur at any time. Some | commonly, but service discovery can occur at any time. Some | |||
widely-deployed service discovery protocols (e.g., for finding a | widely deployed service discovery protocols (e.g., for finding a | |||
printer) utilize mDNS (i.e., multicast) which is often dropped by ope | printer) utilize mDNS (i.e., multicast), which is often dropped by op | |||
rators. Even if multicast | erators. Even if multicast | |||
snooping <xref target="RFC4541"/> (which provides the benefit of cons | snooping <xref target="RFC4541" format="default"/> (which provides th | |||
erving | e benefit of conserving | |||
bandwidth on those segments of the network where no node has expresse d interest in receiving | bandwidth on those segments of the network where no node has expresse d interest in receiving | |||
packets addressed to the group address) is utilized, many devices can register at once and cause serious | packets addressed to the group address) is utilized, many devices can register at once and cause serious | |||
network degradation.</t> | network degradation.</t> | |||
</section> <!-- end section 'IPv4 uses' --> | </section> | |||
<section anchor="IPv6" title="IPv6 issues"> | <section anchor="IPv6" numbered="true" toc="default"> | |||
<t> IPv6 makes extensive use of multicast, including the following: | <name>IPv6 Issues</name> | |||
<list style="symbols"> | <t> IPv6 makes extensive use of multicast, including the following: | |||
<t> DHCPv6 <xref target="RFC8415"/></t> | </t> | |||
<t> Protocol Independent Multicast (PIM) <xref target="RFC7761"/></t> | <ul> | |||
<t> IPv6 Neighbor Discovery Protocol (NDP) <xref target="RFC4861"/></ | <li> DHCPv6 <xref target="RFC8415" format="default"/></li> | |||
t> | <li> Protocol Independent Multicast (PIM) <xref target="RFC7761" for | |||
<t> multicast DNS (mDNS) <xref target="RFC6762"/></t> | mat="default"/></li> | |||
<t> Router Discovery <xref target="RFC4286"/></t> | <li> IPv6 Neighbor Discovery Protocol (NDP) <xref target="RFC4861" f | |||
</list></t> | ormat="default"/></li> | |||
<t> IPv6 NDP Neighbor Solicitation (NS) messages used in Duplicate Addres | <li> Multicast DNS (mDNS) <xref target="RFC6762" format="default"/>< | |||
s | /li> | |||
Detection (DAD) and Address Lookup make use of Link-Scope multicast. | <li> Router Discovery <xref target="RFC4286" format="default"/></li> | |||
In | </ul> | |||
<t> IPv6 NDP Neighbor Solicitation (NS) messages used in Duplicate Add | ||||
ress | ||||
Detection (DAD) and address lookup make use of link-scope multicast. | ||||
In | ||||
contrast to IPv4, an IPv6 node will typically use multiple | contrast to IPv4, an IPv6 node will typically use multiple | |||
addresses, and may change them often for privacy reasons. This | addresses and may change them often for privacy reasons. This | |||
intensifies the impact of multicast messages that are associated | intensifies the impact of multicast messages that are associated | |||
to the mobility of a node. Router advertisement (RA) messages | with the mobility of a node. Router advertisement (RA) messages | |||
are also periodically multicasted over the Link. | are also periodically multicast over the link. | |||
</t> | </t> | |||
<t> Neighbors may be considered lost if several consecutive | <t> Neighbors may be considered lost if several consecutive | |||
Neighbor Discovery packets fail. | Neighbor Discovery packets fail. | |||
</t> | </t> | |||
</section> <!-- end section 'IPv6 uses' --> | </section> | |||
<section anchor="mld" title="MLD issues"> | <section anchor="mld" numbered="true" toc="default"> | |||
<t> Multicast Listener Discovery (MLD) <xref target="RFC4541"/> is | <name>MLD Issues</name> | |||
<t> Multicast Listener Discovery (MLD) <xref target="RFC4541" format=" | ||||
default"/> is | ||||
used to identify members of a multicast group that are connected to | used to identify members of a multicast group that are connected to | |||
the ports of a switch. Forwarding multicast frames into a | the ports of a switch. Forwarding multicast frames into a | |||
Wi-Fi-enabled area can use switch support for hardware | Wi-Fi-enabled area can use switch support for hardware | |||
forwarding state information. However, since IPv6 makes heavy use | forwarding state information. However, since IPv6 makes heavy use | |||
of multicast, each STA with an IPv6 address will require state on | of multicast, each STA with an IPv6 address will require state on | |||
the switch for several and possibly many multicast solicited-node | the switch for several and possibly many solicited-node multicast | |||
addresses. A solicited-node multicast address is an IPv6 multicast | addresses. A solicited-node multicast address is an IPv6 multicast | |||
address used by NDP to verify whether an IPv6 address is already | address used by NDP to verify whether an IPv6 address is already | |||
used by the local-link. Multicast addresses that do not have forwardi ng state | used by the local link. Multicast addresses that do not have forwardi ng state | |||
installed (perhaps due to hardware memory limitations on the | installed (perhaps due to hardware memory limitations on the | |||
switch) cause frames to be flooded on all ports of the switch. Some | switch) cause frames to be flooded on all ports of the switch. Some | |||
switch vendors do not support MLD, for link-scope multicast, due to | switch vendors do not support MLD for link-scope multicast due to | |||
the increase it can cause in state. </t> | the increase it can cause in state. </t> | |||
</section> <!-- end section "MLD issues" --> | </section> | |||
<section anchor="spurious" title="Spurious Neighbor Discovery"> | <section anchor="spurious" numbered="true" toc="default"> | |||
<t> On the Internet there is a "background radiation" of scanning | <name>Spurious Neighbor Discovery</name> | |||
<t> On the Internet, there is a "background radiation" of scanning | ||||
traffic (people scanning for vulnerable machines) and backscatter | traffic (people scanning for vulnerable machines) and backscatter | |||
(responses from spoofed traffic, etc). This means that routers | (responses from spoofed traffic, etc.). This means that routers | |||
very often receive packets destined for IPv4 addresses regardless of | very often receive packets destined for IPv4 addresses regardless of | |||
whether those IP addresses are in use. In the cases where the IP | whether those IP addresses are in use. In the cases where the IP | |||
is assigned to a host, the router broadcasts an ARP request, gets bac | is assigned to a host, the router broadcasts an ARP request, receives | |||
k an ARP | an ARP | |||
reply, and caches it; then traffic can be delivered to the host. | reply, and caches it; then, traffic can be delivered to the host. | |||
When the IP address is not in use, the router broadcasts one (or | When the IP address is not in use, the router broadcasts one (or | |||
more) ARP requests, and never gets a reply. This means that it does | more) ARP requests and never gets a reply. This means that it does | |||
not populate the ARP cache, and the next time there is traffic for | not populate the ARP cache, and the next time there is traffic for | |||
that IP address the router will rebroadcast the ARP requests. | that IP address, the router will rebroadcast the ARP requests. | |||
</t> | </t> | |||
<t> The rate of these ARP requests is proportional to the size of the | ||||
<t> The rate of these ARP requests is proportional to the size of the | ||||
subnets, the rate of scanning and backscatter, and how long the | subnets, the rate of scanning and backscatter, and how long the | |||
router keeps state on non-responding ARPs. As it turns out, this | router keeps state on non-responding ARPs. As it turns out, this | |||
rate is inversely proportional to how occupied the subnet is | rate is inversely proportional to how occupied the subnet is | |||
(valid ARPs end up in a cache, stopping the broadcasting; unused | (valid ARPs end up in a cache, stopping the broadcasting; unused | |||
IPs never respond, and so cause more broadcasts). Depending on | IPs never respond, and so cause more broadcasts). Depending on | |||
the address space in use, the time of day, how occupied the | the address space in use, the time of day, how occupied the | |||
subnet is, and other unknown factors, thousands of broadcasts per sec ond | subnet is, and other unknown factors, thousands of broadcasts per sec ond | |||
have been observed. Around 2,000 broadcasts per second have been obse rved at | have been observed. Around 2,000 broadcasts per second have been obse rved at | |||
the IETF NOC during face-to-face meetings. </t> | the IETF NOC during face-to-face meetings. </t> | |||
<t> With Neighbor Discovery for IPv6 <xref target="RFC4861" format="de | ||||
<t> With Neighbor Discovery for IPv6 <xref target="RFC4861"/>, nodes | fault"/>, nodes | |||
accomplish address resolution by multicasting a Neighbor Solicitation | accomplish address resolution by multicasting a Neighbor Solicitation | |||
that asks the target node to return its link-layer address. Neighbor | that asks the target node to return its link-layer address. Neighbor | |||
Solicitation messages are multicast to the solicited-node multicast | Solicitation messages are multicast to the solicited-node multicast | |||
address of the target address. The target returns its link-layer address | address of the target address. The target returns its link-layer address | |||
in a unicast Neighbor Advertisement message. A single request-response | in a unicast Neighbor Advertisement message. A single request-response | |||
pair of packets is sufficient for both the initiator and the target to res olve | pair of packets is sufficient for both the initiator and the target to res olve | |||
each other's link-layer addresses; the initiator includes its link-layer | each other's link-layer addresses; the initiator includes its link-layer | |||
address in the Neighbor Solicitation.</t> | address in the Neighbor Solicitation.</t> | |||
<t> On a wired network, there is not a huge difference between unicast | ||||
<t> On a wired network, there is not a huge difference between unicast, | , | |||
multicast and broadcast traffic. Due to hardware filtering | multicast, and broadcast traffic. Due to hardware filtering | |||
(see, e.g., <xref target="Deri-2010" />), inadvertently flooded | (see, e.g., <xref target="Deri-2010" format="default"/>), inadvertent | |||
traffic (or excessive ethernet multicast) on wired networks | ly flooded | |||
can be quite a bit less costly, compared to wireless cases where slee | traffic (or excessive Ethernet multicast) on wired networks | |||
ping | can be quite a bit less costly compared to wireless cases where sleep | |||
ing | ||||
devices have to wake up to process packets. Wired Ethernets tend to be switched | devices have to wake up to process packets. Wired Ethernets tend to be switched | |||
networks, further reducing interference from multicast. There is | networks, further reducing interference from multicast. There is | |||
effectively no collision / scheduling problem except at extremely | effectively no collision / scheduling problem except at extremely | |||
high port utilizations. </t> | high port utilizations. </t> | |||
<t> This is not true in the wireless realm; wireless equipment is | ||||
<t> This is not true in the wireless realm; wireless equipment is | ||||
often unable to send high volumes of broadcast and multicast | often unable to send high volumes of broadcast and multicast | |||
traffic, causing numerous broadcast and multicast packets to be | traffic, causing numerous broadcast and multicast packets to be | |||
dropped. Consequently, when a host connects it is often not | dropped. Consequently, when a host connects, it is often not | |||
able to complete DHCP, and IPv6 RAs get dropped, leading to | able to complete DHCP, and IPv6 RAs get dropped, leading to | |||
users being unable to use the network.</t> | users being unable to use the network.</t> | |||
</section> <!-- end section "Spurious Neighbor Discovery" --> | </section> | |||
</section> <!-- end section "Issues at Layer 3 and Above" --> | </section> | |||
</section> | </section> | |||
<section anchor="optim2" numbered="true" toc="default"> | ||||
<section anchor="optim2" title="Multicast protocol optimizations"> | <name>Multicast Protocol Optimizations</name> | |||
<t> This section lists some optimizations that have been specified in | <t> This section lists some optimizations that have been specified in | |||
IEEE 802 and IETF that are aimed at reducing or eliminating the | IEEE 802 and IETF that are aimed at reducing or eliminating the | |||
issues discussed in <xref target="multicast_issues"/>.</t> | issues discussed in <xref target="multicast_issues" format="default"/>.</ | |||
t> | ||||
<section anchor="proxy-arp" title="Proxy ARP in 802.11-2012"> | <section anchor="proxy-arp" numbered="true" toc="default"> | |||
<t> The AP knows the MAC address and IP address for all associated | <name>Proxy ARP in 802.11-2012</name> | |||
<t> The AP knows the Medium Access Control (MAC) address and IP address | ||||
for all associated | ||||
STAs. In this way, the AP acts as the central "manager" for all | STAs. In this way, the AP acts as the central "manager" for all | |||
the 802.11 STAs in its basic service set (BSS). Proxy ARP is easy to | the 802.11 STAs in its Basic Service Set (BSS). Proxy ARP is easy to | |||
implement at the | implement at the | |||
AP, and offers the following advantages: | AP and offers the following advantages: | |||
<list style="symbols"> | </t> | |||
<t> Reduced broadcast traffic (transmitted at low MCS) on the | <ul> | |||
wireless medium</t> | <li> Reduced broadcast traffic (transmitted at low MCS) on the | |||
<t> STA benefits from extended power save in sleep mode, as ARP | wireless medium.</li> | |||
requests for STA's IP address are handled instead by the AP.</t> | <li> STA benefits from extended power save in sleep mode, as ARP | |||
<t> ARP frames are kept off the wireless medium.</t> | requests for STA's IP address are handled instead by the AP.</li> | |||
<t> No changes are needed to STA implementation.</t> | <li> ARP frames are kept off the wireless medium.</li> | |||
</list></t> | <li> No changes are needed to STA implementation.</li> | |||
</ul> | ||||
<t> Here is the specification language as | <t> Here is the specification language as | |||
described in clause 10.23.13 of <xref target="dot11-proxyarp"/>: | described in clause 10.23.13 of <xref target="dot11-proxyarp" format= | |||
<list style="empty"> | "default"/>: | |||
<t> When the AP supports Proxy ARP "[...] the AP shall maintain a | </t> | |||
<blockquote><t>When the AP supports Proxy ARP "[...] the AP shall main | ||||
tain a | ||||
Hardware Address to Internet Address mapping for each | Hardware Address to Internet Address mapping for each | |||
associated station, and shall update the mapping when the | associated station, and shall update the mapping when the | |||
Internet Address of the associated station changes. When the | Internet Address of the associated station changes. When the | |||
IPv4 address being resolved in the ARP request packet is used | IPv4 address being resolved in the ARP request packet is used | |||
by a non-AP STA currently associated to the BSS, the proxy ARP | by a non-AP STA currently associated to the BSS, the proxy ARP | |||
service shall respond on behalf of the non-AP STA".</t> | service shall respond on behalf of the STA to an ARP request or a | |||
</list></t> | n ARP Probe. | |||
</section> <!-- end section "Proxy ARP in 802.11-2012" --> | </t></blockquote> | |||
</section> | ||||
<section anchor="proxy-ND" | ||||
title="IPv6 Address Registration and Proxy Neighbor Discovery"> | ||||
<t> | <section anchor="proxy-ND" numbered="true" toc="default"> | |||
<name>IPv6 Address Registration and Proxy Neighbor Discovery</name> | ||||
<t> | ||||
As used in this section, | As used in this section, | |||
a Low-Power Wireless Personal Area Network (6LoWPAN) denotes a low | a Low-Power Wireless Personal Area Network (6LoWPAN) denotes a Low-Power | |||
power lossy network (LLN) that supports | and Lossy Network (LLN) that supports | |||
<xref target="RFC6282"> 6LoWPAN Header Compression (HC)</xref>. | <xref target="RFC6282" format="default"> 6LoWPAN Header Compression (HC)< | |||
A <xref target="I-D.ietf-6tisch-architecture">6TiSCH network</xref> | /xref>. | |||
is an example of a 6LowPAN. | A <xref target="RFC9030" format="default">6TiSCH network</xref> | |||
is an example of a 6LoWPAN. | ||||
In order to control the use of IPv6 multicast over 6LoWPANs, the | In order to control the use of IPv6 multicast over 6LoWPANs, the | |||
<xref target="RFC6775">6LoWPAN Neighbor Discovery (6LoWPAN ND)</xref> | <xref target="RFC6775" format="default">6LoWPAN Neighbor Discovery (6LoWP AN ND)</xref> | |||
standard defines an address registration mechanism that relies on a | standard defines an address registration mechanism that relies on a | |||
central registry to assess address uniqueness, as a substitute to the | central registry to assess address uniqueness as a substitute to the | |||
inefficient DAD mechanism found in the mainstream IPv6 Neighbor Discovery Protocol (NDP) | inefficient DAD mechanism found in the mainstream IPv6 Neighbor Discovery Protocol (NDP) | |||
<xref target="RFC4861"/><xref target="RFC4862"/>. | <xref target="RFC4861" format="default"/> <xref target="RFC4862" format=" | |||
</t> | default"/>. | |||
</t> | ||||
<t> | <t> | |||
The 6lo Working Group has specified an | The 6lo Working Group has specified an | |||
<xref target="RFC8505">update</xref> to RFC6775. | <xref target="RFC8505" format="none">update</xref> to <xref target="RFC67 75"/>. | |||
Wireless devices can register their address to a | Wireless devices can register their address to a | |||
<xref target="I-D.ietf-6lo-backbone-router">Backbone Router</xref>, | <xref target="RFC8929" format="default">Backbone Router</xref>, | |||
which proxies for the registered addresses with the IPv6 | which proxies for the registered addresses with the IPv6 | |||
NDP running on a high speed aggregating backbone. The update also | NDP running on a high-speed aggregating backbone. The update also | |||
enables a proxy registration mechanism on behalf of the registered | enables a proxy registration mechanism on behalf of the Registered | |||
node, e.g. by a 6LoWPAN router to which the mobile node is attached. | Node, e.g., by a 6LoWPAN router to which the mobile node is attached. | |||
</t> | </t> | |||
<t> | ||||
<t> | The general idea behind the Backbone Router concept is that broadcast | |||
The general idea behind the backbone router concept is that broadcast | ||||
and multicast messaging should be tightly controlled in a variety | and multicast messaging should be tightly controlled in a variety | |||
of WLANs and Wireless Personal Area | of WLANs and Wireless Personal Area | |||
Networks (WPANs). | Networks (WPANs). | |||
Connectivity to a particular link that provides the subnet should | Connectivity to a particular link that provides the subnet should | |||
be left to Layer-3. The model for the Backbone Router operation is | be left to Layer 3. The model for the Backbone Router operation is | |||
represented in <xref target='figBackbone'/>. | represented in <xref target="figBackbone" format="default"/>. | |||
</t> | </t> | |||
<figure anchor="figBackbone"> | ||||
<figure anchor='figBackbone' title="Backbone Link and Backbone Routers"> | <name>Backbone Link and Backbone Routers</name> | |||
<artwork><![CDATA[ | <artwork name="" type="" align="left" alt=""><![CDATA[ | |||
| | | | |||
+-----+ | +-----+ | |||
| | Gateway (default) router | | | Gateway (default) router | |||
| | | | | | |||
+-----+ | +-----+ | |||
| | | | |||
| Backbone Link | | Backbone Link | |||
+--------------------+------------------+ | +--------------------+------------------+ | |||
| | | | | | | | |||
+-----+ +-----+ +-----+ | +-----+ +-----+ +-----+ | |||
skipping to change at line 665 ¶ | skipping to change at line 562 ¶ | |||
| | router 1 | | router 2 | | router 3 | | | router 1 | | router 2 | | router 3 | |||
+-----+ +-----+ +-----+ | +-----+ +-----+ +-----+ | |||
o o o o o o | o o o o o o | |||
o o o o o o o o o o o o o o | o o o o o o o o o o o o o o | |||
o o o o o o o o o o o o o o o | o o o o o o o o o o o o o o o | |||
o o o o o o o o o o | o o o o o o o o o o | |||
o o o o o o o | o o o o o o o | |||
LLN 1 LLN 2 LLN 3 | LLN 1 LLN 2 LLN 3 | |||
]]></artwork> | ]]></artwork> | |||
</figure> | </figure> | |||
<t> | <t> | |||
LLN nodes can move freely from an LLN anchored at one IPv6 Backbone Router | LLN nodes can move freely from an LLN anchored at one IPv6 Backbone Router | |||
to an LLN anchored at another Backbone Router on the same backbone, | to an LLN anchored at another Backbone Router on the same backbone, | |||
keeping any of the IPv6 addresses they have configured. | keeping any of the IPv6 addresses they have configured. | |||
The Backbone Routers maintain a Binding Table of their | The Backbone Routers maintain a Binding Table of their | |||
Registered Nodes, which serves as a distributed database of all the LLN | Registered Nodes, which serves as a distributed database of all the LLN | |||
Nodes. An extension to the Neighbor Discovery Protocol is introduced to | nodes. An extension to the Neighbor Discovery Protocol is introduced to | |||
exchange Binding Table information across the Backbone Link as needed | exchange Binding Table information across the Backbone Link as needed | |||
for the operation of IPv6 Neighbor Discovery. | for the operation of IPv6 Neighbor Discovery. | |||
</t> | </t> | |||
<t> | <t> | |||
RFC6775 and follow-on work <xref target="RFC8505"/> | <xref target="RFC6775"/> and follow-on work <xref target="RFC8505" format | |||
="default"/> | ||||
address the needs of LLNs, and similar techniques are likely to be | address the needs of LLNs, and similar techniques are likely to be | |||
valuable on any type of | valuable on any type of | |||
link where sleeping devices are attached, or where the use of | link where sleeping devices are attached or where the use of | |||
broadcast and multicast operations should be limited. </t> | broadcast and multicast operations should be limited. </t> | |||
</section> | </section> | |||
<section anchor="buffer" numbered="true" toc="default"> | ||||
<section anchor="buffer" title="Buffering to Improve Battery Life"> | <name>Buffering to Improve Battery Life</name> | |||
<t> Methods have been developed to help save battery life; for example, | <t> Methods have been developed to help save battery life; for example, | |||
a device might not wake up when the AP receives a multicast packet. | a device might not wake up when the AP receives a multicast packet. | |||
The AP acts on behalf of STAs in various ways. To enable use of | The AP acts on behalf of STAs in various ways. To enable use of | |||
the power-saving feature for STAs in its BSS, the AP buffers frames | the power-saving feature for STAs in its BSS, the AP buffers frames | |||
for delivery to the STA at the time when the STA is scheduled for | for delivery to the STA at the time when the STA is scheduled for | |||
reception. If an AP, for instance, expresses a DTIM (Delivery Traffic | reception. If an AP, for instance, expresses a Delivery Traffic | |||
Indication Message) of 3 then | Indication Message (DTIM) of 3, then | |||
the AP will send a multicast packet every 3 packets. In fact, | the AP will send a multicast packet every 3 packets. In fact, | |||
when any single wireless STA associated with an access point has | when any single wireless STA associated with an AP has | |||
802.11 power-save mode enabled, the access point buffers all multicast | 802.11 power-save mode enabled, the AP buffers all multicast | |||
frames and sends them only after the next DTIM beacon. </t> | frames and sends them only after the next DTIM beacon. </t> | |||
<t> In practice, most APs will send a multicast every 30 packets. | ||||
<t> In practice, most AP's will send a multicast every 30 packets. | For unicast, the AP could send a Traffic Indication Message (TIM), | |||
For unicast the AP could send a TIM (Traffic Indication Message), | but, for multicast, the AP sends a broadcast to everyone. DTIM does | |||
but for multicast the AP sends a broadcast to everyone. DTIM does | power management, but STAs can choose whether to wake up | |||
power management but STAs can choose whether or not to wake up | and whether to drop the packet. Unfortunately, without proper administra | |||
and whether or not to drop the packet. Unfortunately, without proper adm | tive | |||
inistrative | ||||
control, such STAs may be unable to determine why their | control, such STAs may be unable to determine why their | |||
multicast operations do not work. </t> | multicast operations do not work. </t> | |||
</section> <!-- end of section 'Buffering to improve Power-Save' --> | </section> | |||
<section title="Limiting multicast buffer hardware queue depth"> | <section numbered="true" toc="default"> | |||
<t>The CAB (Content after Beacon) queue is used for beacon-triggered | <name>Limiting Multicast Buffer Hardware Queue Depth</name> | |||
<t>The Content after Beacon (CAB) queue is used for beacon-triggered | ||||
transmission of buffered multicast frames. If lots of multicast frames were | transmission of buffered multicast frames. If lots of multicast frames were | |||
buffered, and this queue fills up, it drowns out all regular traffic. To lim it the | buffered and this queue fills up, it drowns out all regular traffic. To limi t the | |||
damage that buffered traffic can do, some drivers limit the amount of | damage that buffered traffic can do, some drivers limit the amount of | |||
queued multicast data to a fraction of the beacon_interval. An example of | queued multicast data to a fraction of the beacon_interval. An example of | |||
this is <xref target="CAB" />. </t> | this is <xref target="CAB" format="default"/>. </t> | |||
</section> | </section> | |||
<section anchor="ipv6" numbered="true" toc="default"> | ||||
<section anchor="ipv6" title="IPv6 support in 802.11-2012"> | <name>IPv6 Support in 802.11-2012</name> | |||
<t> IPv6 uses NDP instead of ARP. Every IPv6 node subscribes to a special | <t> IPv6 uses NDP instead of ARP. Every IPv6 node subscribes to a specia | |||
l | ||||
multicast address for this purpose. | multicast address for this purpose. | |||
</t> | </t> | |||
<t> Here is the specification language from clause 10.23.13 | ||||
<t> Here is the specification language from clause 10.23.13 | of <xref target="dot11-proxyarp" format="default"/>: | |||
of <xref target="dot11-proxyarp"/>: | </t> | |||
<list style="empty"> | <blockquote> | |||
<t>"When an IPv6 address is being resolved, the Proxy Neighbor | <t>When an IPv6 address is being resolved, the Proxy Neighbor | |||
Discovery service shall respond with a Neighbor Advertisement | Discovery service shall respond with a Neighbor Advertisement | |||
message [...] on behalf of an associated STA to an [ICMPv6] | message [...] on behalf of an associated STA to an [ICMPv6] | |||
Neighbor Solicitation message [...]. When MAC address mappings | Neighbor Solicitation message [...]. When MAC address mappings | |||
change, the AP may send unsolicited Neighbor Advertisement | change, the AP may send unsolicited Neighbor Advertisement | |||
Messages on behalf of a STA."</t> | Messages on behalf of a STA.</t> | |||
</list></t> | </blockquote> | |||
<t>NDP may be used to request additional information using the following | ||||
<t>NDP may be used to request additional information | methods, among others: | |||
<list style="symbols"> | </t> | |||
<t>Maximum Transmission Unit</t> | <ul> | |||
<t>Router Solicitation</t> | <li>Maximum Transmission Unit</li> | |||
<t>Router Advertisement, etc.</t> | <li>Router Solicitation</li> | |||
</list> | <li>Router Advertisement</li> | |||
NDP messages are sent as group addressed (broadcast) frames | </ul> | |||
<t> | ||||
NDP messages are sent as group-addressed (broadcast) frames | ||||
in 802.11. Using the proxy operation helps to keep NDP messages off | in 802.11. Using the proxy operation helps to keep NDP messages off | |||
the wireless medium.</t> | the wireless medium.</t> | |||
</section> <!-- end of section 'IPv6 support in 802.11-2012' --> | </section> | |||
<section anchor="convert" title="Using Unicast Instead of Multicast"> | <section anchor="convert" numbered="true" toc="default"> | |||
<t> It is often possible to transmit multicast control and data messages | <name>Using Unicast Instead of Multicast</name> | |||
<t> It is often possible to transmit multicast control and data messages | ||||
by using unicast transmissions to each station individually.</t> | by using unicast transmissions to each station individually.</t> | |||
<section anchor="convert-over" numbered="true" toc="default"> | ||||
<section anchor="convert-over" title="Overview"> | <name>Overview</name> | |||
<t> | <t> | |||
In many situations, it's a good choice to use unicast instead of | In many situations, it's a good choice to use unicast instead of | |||
multicast over the Wi-Fi link. This avoids most of the | multicast over the Wi-Fi link. This avoids most of the | |||
problems specific to multicast over Wi-Fi, since the individual | problems specific to multicast over Wi-Fi, since the individual | |||
frames are then acknowledged and buffered for power save clients, | frames are then acknowledged and buffered for power-save clients | |||
in the way that unicast traffic normally operates. | in the way that unicast traffic normally operates. | |||
</t> | </t> | |||
<t> | <t> | |||
This approach comes with the tradeoff of sometimes sending | This approach comes with the trade-off of sometimes sending | |||
the same packet multiple times over the Wi-Fi link. However, | the same packet multiple times over the Wi-Fi link. However, | |||
in many cases, such as video into a residential home network, | in many cases, such as video into a residential home network, | |||
this can be a good tradeoff, since the Wi-Fi link may have enough | this can be a good trade-off since the Wi-Fi link may have enough | |||
capacity for the unicast traffic to be transmitted to each | capacity for the unicast traffic to be transmitted to each | |||
subscribed STA, even though multicast addressing may have been | subscribed STA, even though multicast addressing may have been | |||
necessary for the upstream access network. | necessary for the upstream access network. | |||
</t> | </t> | |||
<t> | <t> | |||
Several technologies exist that can be used to arrange unicast | Several technologies exist that can be used to arrange unicast | |||
transport over the Wi-Fi link, outlined in the subsections below. | transport over the Wi-Fi link, outlined in the subsections below. | |||
</t> | </t> | |||
</section> <!-- end of section 'Overview' --> | </section> | |||
<section anchor="convert-l2" | <section anchor="convert-l2" numbered="true" toc="default"> | |||
title="Layer 2 Conversion to Unicast"> | <name>Layer 2 Conversion to Unicast</name> | |||
<t> | <t> | |||
It is often possible to transmit multicast control and data messages | It is often possible to transmit multicast control and data messages | |||
by using unicast transmissions to each station individually. | by using unicast transmissions to each station individually. | |||
</t> | </t> | |||
<t> | <t> | |||
Although there is not yet a standardized method of conversion, at | Although there is not yet a standardized method of conversion, at | |||
least one widely available implementation exists in the Linux | least one widely available implementation exists in the Linux | |||
bridging code <xref target="bridge-mc-2-uc"/>. Other proprietary | bridging code <xref target="bridge-mc-2-uc" format="default"/>. Othe r proprietary | |||
implementations are available from various vendors. | implementations are available from various vendors. | |||
In general, these implementations perform a straightforward | In general, these implementations perform a straightforward | |||
mapping for groups or channels, discovered by IGMP or MLD | mapping for groups or channels, discovered by IGMP or MLD | |||
snooping, to the corresponding unicast MAC addresses. | snooping, to the corresponding unicast MAC addresses. | |||
</t> | </t> | |||
</section> <!-- end of section 'Layer 2 Conversion to Unicast' --> | </section> | |||
<section anchor="convert-DMS" title="Directed Multicast Service (DMS)"> | <section anchor="convert-DMS" numbered="true" toc="default"> | |||
<t> | <name>Directed Multicast Service (DMS)</name> | |||
There are situations where more is needed than simply converting | <t> | |||
multicast to unicast. <!-- Editor's note: citation needed --> | DMS enables an STA to request that the AP | |||
For these purposes, DMS enables an STA to request that the AP | transmit multicast group-addressed frames destined to the | |||
transmit multicast group addressed frames destined to the | requesting STAs as individually addressed frames (i.e., convert | |||
requesting STAs as individually addressed frames [i.e., convert | multicast to unicast). Here are some characteristics of DMS: | |||
multicast to unicast]. Here are some characteristics of DMS: | </t> | |||
<list style="symbols"> | <ul> | |||
<t> Requires 802.11n A-MSDUs</t> | <li> Requires 802.11n Aggregate MAC Service Data Units (A-MSDU | |||
<t> Individually addressed frames are acknowledged and are | s).</li> | |||
buffered for power save STAs</t> | <li> Individually addressed frames are acknowledged and are | |||
<t> The requesting STA may specify traffic characteristics for | buffered for power-save STAs.</li> | |||
DMS traffic</t> | <li> The requesting STA may specify traffic characteristics fo | |||
<t> DMS was defined in IEEE Std 802.11v-2011</t> | r | |||
<t> DMS requires changes to both AP and STA implementation.</t> | DMS traffic.</li> | |||
</list> | ||||
<li> DMS was defined in IEEE Std 802.11v-2011 <xref target="v2 | ||||
011"/>.</li> | ||||
<li> DMS requires changes to both AP and STA implementation.</li> | ||||
</ul> | ||||
<t> | ||||
DMS is not currently implemented in products. | DMS is not currently implemented in products. | |||
See <xref target="Tramarin2017"/> and <xref target="Oliva2013"/> | See <xref target="Tramarin2017" format="default"/> and <xref target=" Oliva2013" format="default"/> | |||
for more information. </t> | for more information. </t> | |||
</section> <!-- end of section 'Directed Multicast Service (DMS)' --> | </section> | |||
<section anchor="convert-amt" | <section anchor="convert-amt" numbered="true" toc="default"> | |||
title="Automatic Multicast Tunneling (AMT)"> | <name>Automatic Multicast Tunneling (AMT)</name> | |||
<t> | <t> | |||
AMT<xref target="RFC7450"/> provides a method to tunnel multicast | AMT <xref target="RFC7450" format="default"/> provides a method to tu | |||
nnel multicast | ||||
IP packets inside unicast IP packets over network links that only | IP packets inside unicast IP packets over network links that only | |||
support unicast. When an operating system or application running | support unicast. When an operating system or application running | |||
on an STA has an AMT gateway capability integrated, it's possible | on an STA has an AMT gateway capability integrated, it's possible | |||
to use unicast to traverse the Wi-Fi link by deploying an AMT | to use unicast to traverse the Wi-Fi link by deploying an AMT | |||
relay in the non-Wi-Fi portion of the network connected to the AP. | relay in the non-Wi-Fi portion of the network connected to the AP. | |||
</t> | </t> | |||
<t> | <t> | |||
It is recommended that multicast-enabled networks deploying AMT | It is recommended that multicast-enabled networks deploying AMT | |||
relays for this purpose make the relays locally discoverable with | relays for this purpose make the relays locally discoverable with | |||
the following methods, as described in | the following methods, as described in | |||
<xref target="I-D.ietf-mboned-driad-amt-discovery"/>: | <xref target="RFC8777" format="default"/>: | |||
<list style="symbols"> | </t> | |||
<t> DNS-SD <xref target="RFC6763"/></t> | <ul> | |||
<t> the well-known IP addresses from Section 7 of | <li>DNS-based Service Discovery (DNS-SD) <xref target="RFC6763" form | |||
<xref target="RFC7450"/></t> | at="default"/></li> | |||
</list> | <li>The well-known IP addresses from <xref target="RFC7450" sectionF | |||
</t> | ormat="of" section="7"/></li> | |||
<t> | </ul> | |||
<t> | ||||
An AMT gateway that implements multiple standard discovery methods | An AMT gateway that implements multiple standard discovery methods | |||
is more likely to discover the local multicast-capable network, | is more likely to discover the local multicast-capable network | |||
instead of forming a connection to a non-local AMT relay further upstr | instead of forming a connection to a nonlocal AMT relay further upstre | |||
eam. | am. | |||
</t> | </t> | |||
</section> <!-- end of section 'Automatic Multicast Tunneling (AMT)'--> | </section> | |||
</section> <!-- end of section 'Using Unicast Instead of Multicast' --> | </section> | |||
<section anchor="GCR" title="GroupCast with Retries (GCR)"> | <section anchor="GCR" numbered="true" toc="default"> | |||
<t> GCR (defined in <xref target="dot11aa"/>) provides greater | <name>GroupCast with Retries (GCR)</name> | |||
<t> GCR (defined in <xref target="dot11aa" format="default"/>) provides | ||||
greater | ||||
reliability by using either unsolicited retries or a block | reliability by using either unsolicited retries or a block | |||
acknowledgement mechanism. GCR increases probability of broadcast | acknowledgement mechanism. GCR increases the probability of broadcast | |||
frame reception success, but still does not guarantee success.</t> | frame reception success but still does not guarantee success.</t> | |||
<t> For the block acknowledgement mechanism, the AP transmits each | ||||
<t> For the block acknowledgement mechanism, the AP transmits each | group-addressed frame as a conventional group-addressed transmission. | |||
group addressed frame as conventional group addressed transmission. | Retransmissions are group addressed but hidden from non-11aa STAs. | |||
Retransmissions are group addressed, but hidden from non-11aa STAs. | ||||
A directed block acknowledgement scheme is used to harvest reception | A directed block acknowledgement scheme is used to harvest reception | |||
status from receivers; retransmissions are based upon these | status from receivers; retransmissions are based upon these | |||
responses.</t> | responses.</t> | |||
<t> GCR is suitable for all group sizes including medium to large | ||||
<t> GCR is suitable for all group sizes including medium to large | ||||
groups. As the number of devices in the group increases, GCR can send | groups. As the number of devices in the group increases, GCR can send | |||
block acknowledgement requests to only a small subset of the group. | block acknowledgement requests to only a small subset of the group. | |||
GCR does require changes to both AP and STA implementations.</t> | GCR does require changes to both AP and STA implementations.</t> | |||
<t> GCR may introduce unacceptable latency. After sending a group of | ||||
<t> GCR may introduce unacceptable latency. After sending a group of | ||||
data frames to the group, the AP has to do the following: | data frames to the group, the AP has to do the following: | |||
<list style="symbols"> | </t> | |||
<t>unicast a Block Ack Request (BAR) to a subset of members.</t> | <ul> | |||
<li>Unicast a Block Ack Request (BAR) to a subset of members.</li> | ||||
<t>wait for the corresponding Block Ack (BA).</t> | <li>Wait for the corresponding Block Ack (BA).</li> | |||
<li>Retransmit any missed frames.</li> | ||||
<t>retransmit any missed frames.</t> | <li>Resume other operations that may have been delayed.</li> | |||
</ul> | ||||
<t>resume other operations that may have been delayed.</t> | <t> This latency may not be acceptable for some traffic.</t> | |||
</list> This latency may not be acceptable for some traffic.</t> | <t> There are ongoing extensions in 802.11 to improve GCR performance. | |||
</t> | ||||
<t> There are ongoing extensions in 802.11 to improve GCR performance. | <ul> | |||
<list style="symbols"> | <li> BAR is sent using downlink Multi-User MIMO.</li> | |||
<t> BAR is sent using downlink MU-MIMO (note that downlink MU-MIMO | <li> BA is sent using uplink MU-MIMO (uplink MU-MIMO is an IEEE 801.11 | |||
is already specified in 802.11-REVmc 4.3).</t> | ax-2021 feature).</li> | |||
<li> Latency may also be reduced by simultaneously receiving BA | ||||
<t> BA is sent using uplink MU-MIMO (which is a .11ax feature).</t> | information from multiple STAs.</li> | |||
</ul> | ||||
<t> Additional 802.11ax extensions are under consideration; see | </section> | |||
<xref target="mc-ack-mux"/></t> | ||||
<t> Latency may also be reduced by simultaneously receiving BA | ||||
information from multiple STAs.</t> | ||||
</list></t> | ||||
</section> | </section> | |||
</section> | <section anchor="optim3" numbered="true" toc="default"> | |||
<name>Operational Optimizations</name> | ||||
<section anchor="optim3" title="Operational optimizations"> | <t> This section lists some operational optimizations that can be | |||
<t> This section lists some operational optimizations that can be | ||||
implemented when deploying wireless IEEE 802 networks to mitigate | implemented when deploying wireless IEEE 802 networks to mitigate | |||
some of the issues discussed in <xref target="multicast_issues"/>.</t> | some of the issues discussed in <xref target="multicast_issues" format="d | |||
<!-- Jake Holland: | efault"/>.</t> | |||
Is it worth adding here use cases that are considered probably useful, but | ||||
not currently done with multicast over Wi-Fi, in part because of these | ||||
concerns? (e.g. apps providing instant replays in a stadium IIUC currently | ||||
use unicast, but could theoretically share a lot of bandwidth) | ||||
--> | ||||
<section anchor="mitigate-spurious" | <section anchor="mitigate-spurious" numbered="true" toc="default"> | |||
title="Mitigating Problems from Spurious Neighbor Discovery"> | <name>Mitigating Problems from Spurious Neighbor Discovery</name> | |||
<t> <list hangIndent="6" style="hanging"> | <dl newline="true" indent="6"> | |||
<t hangText="ARP Sponges"><vspace blankLines="1"/> An ARP Sponge | <dt>ARP Sponges</dt> | |||
<dd> | ||||
<t> An ARP Sponge | ||||
sits on a network and learns which IP addresses are actually in | sits on a network and learns which IP addresses are actually in | |||
use. It also listens for ARP requests, and, if it sees an ARP for | use. It also listens for ARP requests, and, if it sees an ARP for | |||
an IP address that it believes is not used, it will reply with | an IP address that it believes is not used, it will reply with | |||
its own MAC address. This means that the router now has an IP to | its own MAC address. This means that the router now has an IP-to-MAC | |||
MAC mapping, which it caches. If that IP is later assigned to a | mapping, which it caches. If that IP is later assigned to a | |||
machine (e.g using DHCP), the ARP sponge will see this, and will | machine (e.g., using DHCP), the ARP Sponge will see this and will | |||
stop replying for that address. Gratuitous ARPs (or the machine | stop replying for that address. Gratuitous ARPs (or the machine | |||
ARPing for its gateway) will replace the sponged address in the | ARPing for its gateway) will replace the sponged address in the | |||
router ARP table. This technique is quite effective; but, | router ARP table. This technique is quite effective; unfortunately, t | |||
unfortunately, the ARP sponge daemons were not really designed for | he ARP Sponge daemons were not really designed for | |||
this use (one of the most widely deployed arp sponges | this use (one of the most widely deployed ARP Sponges | |||
<xref target="arpsponge"/>, was | <xref target="arpsponge" format="default"/> was | |||
designed to deal with the disappearance of participants from an | designed to deal with the disappearance of participants from an | |||
IXP) and so are not optimized for this purpose. One daemon is | Internet Exchange Point (IXP)) and so are not optimized for this purp | |||
needed per subnet, the tuning is tricky (the scanning rate versus | ose. | |||
the population rate versus retires, etc.) and sometimes daemons just | ||||
stop, | ||||
requiring a restart of the daemon which causes disruption. <vspace bl | ||||
ankLines="1"/></t> | ||||
<t hangText="Router mitigations"><vspace blankLines="1"/> Some | One daemon is | |||
needed per subnet; the tuning is tricky (the scanning rate versus | ||||
the population rate versus retries, etc.), and sometimes daemons just | ||||
stop, | ||||
requiring a restart of the daemon that causes disruption. </t> | ||||
</dd> | ||||
<dt>Router mitigations</dt> | ||||
<dd> | ||||
<t> Some | ||||
routers (often those based on Linux) implement a "negative ARP | routers (often those based on Linux) implement a "negative ARP | |||
cache" daemon. If the router does not see a reply to | cache" daemon. If the router does not see a reply to | |||
an ARP it can be configured to cache this information for some | an ARP, it can be configured to cache this information for some | |||
interval. Unfortunately, the core routers in use often do | interval. Unfortunately, the core routers in use often do | |||
not support this. Instead, when a host connects to a network and gets an IP | not support this. Instead, when a host connects to a network and gets an IP | |||
address, it will ARP for its default gateway (the router). The | address, it will ARP for its default gateway (the router). The | |||
router will update its cache with the IP to host MAC mapping | router will update its cache with the IP to host MAC mapping | |||
learned from the request (passive ARP learning). <vspace | learned from the request (passive ARP learning). </t> | |||
blankLines="1"/></t> | ||||
<t hangText="Firewall unused space"><vspace blankLines="1"/> The | </dd> | |||
<dt>Firewall unused space</dt> | ||||
<dd> | ||||
<t> The | ||||
distribution of users on wireless networks / subnets may change in va rious | distribution of users on wireless networks / subnets may change in va rious | |||
use cases, such as conference venues (e.g SSIDs are renamed, some SSI | use cases, such as conference venues (e.g., Service Set Identifiers ( | |||
Ds | SSIDs) are renamed, some SSIDs | |||
lose favor, etc). This makes utilization for particular SSIDs | lose favor, etc.). This makes utilization for particular SSIDs | |||
difficult to predict ahead of time, but usage can be monitored | difficult to predict ahead of time, but usage can be monitored | |||
as attendees use the different networks. Configuring multiple | as attendees use the different networks. Configuring multiple | |||
DHCP pools per subnet, and enabling them sequentially, can create | DHCP pools per subnet and enabling them sequentially can create | |||
a large subnet, from which only addresses in the lower portions | a large subnet from which only addresses in the lower portions | |||
are assigned. Therefore input IP access lists can be applied, | are assigned. Therefore, input IP access lists can be applied, | |||
which deny traffic to the upper, unused portions. Then the | which deny traffic to the upper, unused portions. Then the | |||
router does not attempt to forward packets to the unused portions | router does not attempt to forward packets to the unused portions | |||
of the subnets, and so does not ARP for it. This method has proven | of the subnets and so does not ARP for it. This method has proven | |||
to be very effective, but is somewhat of a blunt axe, is fairly | to be very effective but is somewhat of a blunt axe, is fairly | |||
labor intensive, and requires coordination. <vspace | labor intensive, and requires coordination. </t> | |||
blankLines="1"/></t> | ||||
<t hangText="Disabling/filtering ARP requests"><vspace | </dd> | |||
blankLines="1"/> In general, the router does not need to ARP for | <dt>Disabling/Filtering ARP requests</dt> | |||
hosts; when a host connects, the router can learn the IP to MAC | <dd> | |||
mapping from the ARP request sent by that host. Consequently it | <t> In general, the router does not need to ARP for | |||
should be possible to disable and / or filter ARP requests from the | hosts; when a host connects, the router can learn the IP-to-MAC | |||
router. Unfortunately, ARP is a very low level / fundamental part | mapping from the ARP request sent by that host. Consequently, it | |||
of the IP stack, and is often offloaded from the normal control | should be possible to disable and/or filter ARP requests from the | |||
plane. While many routers can filter layer-2 traffic, this is | router. Unfortunately, ARP is a very low-level/fundamental part | |||
usually implemented as an input filter and / or has limited | of the IP stack and is often offloaded from the normal control | |||
ability to filter output broadcast traffic. This means that the | plane. While many routers can filter Layer 2 traffic, this is | |||
simple "just disable ARP or filter it outbound" seems like a | usually implemented as an input filter and/or has limited | |||
really simple (and obvious) solution, but implementations / | ability to filter output broadcast traffic. | |||
architectural issues make this difficult or awkward in practice. | ||||
<vspace blankLines="1"/></t> | ||||
<t hangText="NAT"><vspace blankLines="1"/> Broadcasts can often be | This means that the seemingly simple and obvious solution to "just disable ARP o | |||
caused by outside wifi scanning / backscatter traffic. In order to re | r filter it outbound" is made difficult or awkward in practice by implementation | |||
duce the impact of | s and/or architectural issues. | |||
</t> | ||||
</dd> | ||||
<dt>NAT</dt> | ||||
<dd> | ||||
<t> Broadcasts can often be | ||||
caused by outside Wi-Fi scanning / backscatter traffic. In order to r | ||||
educe the impact of | ||||
broadcasts, NAT can be used on the entire (or a large portion) of a n etwork. This would | broadcasts, NAT can be used on the entire (or a large portion) of a n etwork. This would | |||
eliminate NAT translation entries for unused addresses, and the route r would never ARP | eliminate NAT translation entries for unused addresses, and the route r would never ARP | |||
for them. There are, however, many reasons to avoid using NAT in such a blanket fashion. | for them. There are, however, many reasons to avoid using NAT in such a blanket fashion. | |||
<vspace blankLines="1"/></t> | </t> | |||
<t hangText="Stateful firewalls"><vspace blankLines="1"/> Another | </dd> | |||
<dt>Stateful firewalls</dt> | ||||
<dd> Another | ||||
obvious solution would be to put a stateful firewall between the | obvious solution would be to put a stateful firewall between the | |||
wireless network and the Internet. This firewall would block | wireless network and the Internet. This firewall would block | |||
incoming traffic not associated with an outbound request. | incoming traffic not associated with an outbound request. | |||
But this conflicts with the need and desire of some | But this conflicts with the need and desire of some | |||
organizations to have the network as open as possible and to | organizations to have the network as open as possible and to | |||
honor the end-to-end principle. An attendee on a meeting network | honor the end-to-end principle. An attendee on a meeting network | |||
should be an Internet host, and should be able to receive | should be an Internet host and should be able to receive | |||
unsolicited requests. Unfortunately, keeping the network working | unsolicited requests. Unfortunately, keeping the network working | |||
and stable is the first priority and a stateful firewall may be | and stable is the first priority, and a stateful firewall may be | |||
required in order to achieve this.</t> | required in order to achieve this.</dd> | |||
</list></t> | </dl> | |||
</section><!--'Mitigating Problems from Spurious Neighbor Discovery'--> | </section> | |||
<section anchor="mitigate-spurious-sd" | <section anchor="mitigate-spurious-sd" numbered="true" toc="default"> | |||
title="Mitigating Spurious Service Discovery Messages"> | <name>Mitigating Spurious Service Discovery Messages</name> | |||
<t> | <t> | |||
In networks that must support hundreds of STAs, operators have | In networks that must support hundreds of STAs, operators have | |||
observed network degradation due to many devices simultaneously | observed network degradation due to many devices simultaneously | |||
registering with mDNS. In a network with many clients, it is | registering with mDNS. In a network with many clients, it is | |||
recommended to ensure that mDNS packets designed to discover | recommended to ensure that mDNS packets designed to discover | |||
services in smaller home networks be constrained to avoid | services in smaller home networks be constrained to avoid | |||
disrupting other traffic. | disrupting other traffic. | |||
</t> | </t> | |||
</section> | ||||
</section> <!-- 'Mitigating Spurious Service Discovery Messages' --> | ||||
</section> <!-- end section 'Layer 3 optimizations' --> | ||||
<section anchor="other-media" | </section> | |||
title="Multicast Considerations for Other Wireless Media"> | ||||
<t> Many of the causes of performance degradation described in earlier | <section anchor="other-media" numbered="true" toc="default"> | |||
<name>Multicast Considerations for Other Wireless Media</name> | ||||
<t> Many of the causes of performance degradation described in earlier | ||||
sections are also observable for wireless media other than 802.11.</t> | sections are also observable for wireless media other than 802.11.</t> | |||
<t> For instance, problems with power save, excess media occupancy, and | ||||
<t> For instance, problems with power save, excess media occupancy, and | ||||
poor reliability will also affect 802.15.3 and 802.15.4. Unfortunately, | poor reliability will also affect 802.15.3 and 802.15.4. Unfortunately, | |||
802.15 media specifications do not yet include mechanisms similar to | 802.15 media specifications do not yet include mechanisms similar to | |||
those developed for 802.11. In fact, the design philosophy for 802.15 | those developed for 802.11. In fact, the design philosophy for 802.15 | |||
is oriented towards minimality, with the result that many such | is oriented towards minimality, with the result that many such | |||
functions are relegated to operation within higher layer protocols. | functions are relegated to operation within higher-layer protocols. | |||
This leads to a patchwork of non-interoperable and vendor-specific | This leads to a patchwork of non-interoperable and vendor-specific | |||
solutions. See <xref target="uli"/> for some additional discussion, | solutions. See <xref target="uli" format="default"/> for additional disc ussion | |||
and a proposal for a task group to resolve similar issues, in which | and a proposal for a task group to resolve similar issues, in which | |||
the multicast problems might be considered for mitigation. </t> | the multicast problems might be considered for mitigation. </t> | |||
<t> Similar considerations hold for most other wireless media. A brief | ||||
<t> Similar considerations hold for most other wireless media. A brief | introduction is provided in <xref target="RFC5757" format="default"/> for | |||
introduction is provided in <xref target="RFC5757"/> for the following: | the following: | |||
<list style="symbols"> | </t> | |||
<t> 802.16 WIMAX </t> | <ul> | |||
<t> 3GPP/3GPP2 </t> | <li> 802.16 WiMAX </li> | |||
<t> DVB-H / DVB-IPDC </t> | <li> 3GPP/3GPP2 </li> | |||
<t> TV Broadcast and Satellite Networks </t> | <li> DVB-H/DVB-IPDC </li> | |||
</list></t> | <li> TV Broadcast and Satellite Networks </li> | |||
</section> <!-- 'Multicast Considerations for Other Wireless Media' --> | </ul> | |||
</section> | ||||
<!-- CEP: More recommendations are needed. --> | <section anchor="recommendations" numbered="true" toc="default"> | |||
<section anchor="recommendations" title="Recommendations"> | <name>Recommendations</name> | |||
<t> This section provides some recommendations about the usage and | <t> This section provides some recommendations about the usage and | |||
combinations of some of the multicast enhancements described in | combinations of some of the multicast enhancements described in Sections | |||
<xref target="optim2"/> and <xref target="optim3"/>.</t> | <xref target="optim2" format="counter"/> and <xref target="optim3" format | |||
<t> Future protocol documents utilizing multicast signaling should | ="counter"/>.</t> | |||
<t> Future protocol documents utilizing multicast signaling should | ||||
be carefully scrutinized if the protocol is likely to be used over | be carefully scrutinized if the protocol is likely to be used over | |||
wireless media. </t> | wireless media. </t> | |||
<t> The use of proxy methods should be encouraged to conserve network bandwi | <t> The use of proxy methods should be encouraged to conserve network band | |||
dth | width | |||
and power utilization by low-power devices. The device can use | and power utilization by low-power devices. | |||
a unicast message to its proxy, and then the proxy can take care | ||||
The device can send a unicast message to its proxy, and then the proxy can take | ||||
care | ||||
of any needed multicast operations. </t> | of any needed multicast operations. </t> | |||
<t> Multicast signaling for wireless devices should be done in a way | <t> Multicast signaling for wireless devices should be done in a way that is | |||
compatible with low duty-cycle operation. </t> | compatible with low duty-cycle operation. </t> | |||
</section> | </section> | |||
<section anchor="discussion" numbered="true" toc="default"> | ||||
<name>Ongoing Discussion Items</name> | ||||
<t> This section suggests two discussion items for further resolution | ||||
. </t> | ||||
<t> First, standards (and private) organizations should develop guidelines | ||||
to help clarify when | ||||
multicast packets would be better served by being sent wired rather than | ||||
wireless. | ||||
For example, 802.1ak <xref target="IEEE802.1ak"/> works on | ||||
both Ethernet and Wi-Fi, and organizations could help with deployment dec | ||||
ision making | ||||
by developing guidelines for multicast over Wi-Fi, including options for | ||||
when traffic should be sent wired. | ||||
</t> | ||||
<section anchor="discussion" title="On-going Discussion Items"> | <t> | |||
<t> This section suggests two discussion items for further resolution | Second, reliable registration to Layer 2 multicast groups and a reliable | |||
. </t> | multicast operation at Layer 2 might provide a good multicast over Wi-Fi | |||
<t> First, standards (and private) organizations should develop guidelines t | solution. | |||
o help clarify when | There shouldn't be a need to support 2<sup>24</sup> groups to get solicit | |||
multicast packets would be better served by being sent wired rather than | ed node | |||
wireless. For example, | ||||
<eref target="https://www.ieee802.org/1/pages/802.1ak.html">802.1ak</eref | ||||
> works on | ||||
both ethernet and Wi-Fi and organizations could help with deployment deci | ||||
sion making | ||||
by developing guidelines for multicast over Wi-Fi including options for w | ||||
hen traffic should be sent wired. | ||||
</t> | ||||
<t> | ||||
Second, reliable registration to Layer-2 multicast groups, and a reliable | ||||
multicast operation at Layer-2, might provide a good multicast over wifi | ||||
solution. | ||||
There shouldn't be a need to support 2^24 groups to get solicited node | ||||
multicast working: it is possible to simply select a number of | multicast working: it is possible to simply select a number of | |||
bits that make sense for a given network size to limit the | bits that make sense for a given network size to limit the | |||
number of unwanted deliveries to reasonable levels. IEEE 802.1, | number of unwanted deliveries to reasonable levels. | |||
802.11, and 802.15 should be encouraged to revisit L2 multicast issues an | The IEEE 802.1, | |||
d provide | 802.11, and 802.15 Working Groups should be encouraged to revisit Layer 2 | |||
multicast issues and provide | ||||
workable solutions. | workable solutions. | |||
</t> | </t> | |||
</section> | </section> | |||
<section anchor="sec" numbered="true" toc="default"> | ||||
<section anchor="sec" title="Security Considerations"> | <name>Security Considerations</name> | |||
<t> | <t> | |||
This document does not introduce or modify any security mechanisms. | This document does not introduce or modify any security mechanisms. | |||
Multicast deployed on wired or wireless networks as discussed in this doc ument can be | Multicast deployed on wired or wireless networks as discussed in this doc ument can be | |||
made more secure in a variety of ways. <xref target="RFC4601"/>, for inst | made more secure in a variety of ways. | |||
ance, | <xref target="RFC4601" format="default"/>, for instance, | |||
specifies the use of IPsec to ensure authentication of the link-local messages | specifies the use of IPsec to ensure authentication of the link-local messages | |||
in the Protocol Independent Multicast - Sparse Mode (PIM-SM) routing protocol. | in the Protocol Independent Multicast - Sparse Mode (PIM-SM) routing protocol. | |||
<xref target="RFC5796"/>specifies mechanisms to authenticate the PIM-SM link-l ocal messages | <xref target="RFC5796" format="default"/> specifies mechanisms to authenticate the PIM-SM link-local messages | |||
using the IP security (IPsec) Encapsulating Security Payload (ESP) or (optiona lly) the | using the IP security (IPsec) Encapsulating Security Payload (ESP) or (optiona lly) the | |||
Authentication Header (AH). | Authentication Header (AH). | |||
</t> | </t> | |||
<t>When using mechanisms that convert multicast traffic to unicast traffic f | <t>When using mechanisms that convert multicast traffic to unicast traffic | |||
or traversing radio links, | for traversing radio links, | |||
the AP (or other entity) is forced to explicitly track which subscribers car e about certain multicast traffic. | the AP (or other entity) is forced to explicitly track which subscribers car e about certain multicast traffic. | |||
This is generally a reasonable tradeoff, but does result in another entity t hat is tracking what entities | This is generally a reasonable trade-off but does result in another entity t hat is tracking what entities | |||
subscribe to which multicast traffic. While such information is already (by necessity) tracked elsewhere, | subscribe to which multicast traffic. While such information is already (by necessity) tracked elsewhere, | |||
this does present an expansion of the attack surface for that potentially pr ivacy-sensitive information.</t> | this does present an expansion of the attack surface for that potentially pr ivacy-sensitive information.</t> | |||
<t> | <t> | |||
As noted in <xref target="group_key"/>, the unreliable nature of | As noted in <xref target="group_key" format="default"/>, the unreliable n | |||
ature of | ||||
multicast transmission over wireless media can cause subtle problems | multicast transmission over wireless media can cause subtle problems | |||
with multicast group key management and updates. When WPA (TKIP) or WPA2 | with multicast group key management and updates. | |||
(AES-CCMP) | ||||
encryption is in use, AP to client (From DS) multicasts have to be encryp | <xref target="group_key"/> states that when TKIP (WPA, now deprecated) or AES-CC | |||
ted with a separate encryption key that | MP (WPA2/WPA3) encryption is in use, AP-to-client (FromDS) multicasts have to be | |||
encrypted with a separate encryption key that | ||||
is known to all of the clients (this is called the Group Key). Quoting fu rther from that | is known to all of the clients (this is called the Group Key). Quoting fu rther from that | |||
website, "... most clients are able to get connected and surf the web, | website, "... most clients are able to get connected and surf the web, | |||
check email, etc. even when From DS multicasts are broken. So a lot of | check email, etc. even when FromDS multicasts are broken. So a lot of | |||
people don't realize they have multicast problems on their network..." | people don't realize they have multicast problems on their network..." | |||
</t> | </t> | |||
<t>This document encourages the use of proxy methods to conserve network b | ||||
<t>This document encourages the use of proxy methods to conserve network ban | andwidth and | |||
dwidth and | ||||
power utilization by low-power devices. Such proxy methods in general ha ve security considerations that | power utilization by low-power devices. Such proxy methods in general ha ve security considerations that | |||
require the proxy to be trusted to not misbehave. One such proxy method | require the proxy to be trusted to not misbehave. One such proxy method | |||
listed is an Arp Sponge which | listed is an ARP Sponge that listens for ARP requests, and, if it sees an ARP fo | |||
listens for ARP requests, and, if it sees an ARP for an IP address that | r an IP address that it believes is not used, it will reply | |||
it believes is not used, it will reply | with its own MAC address. ARP poisoning and false advertising could pote | |||
with its own MAC address. ARP poisoning and false advertising could pote | ntially undermine (e.g., DoS) | |||
ntially undermine (e.g. DoS) | this and other proxy approaches.</t> | |||
this, and other, proxy approaches.</t> | ||||
</section> | ||||
<section anchor="iana" title="IANA Considerations"> | ||||
<t> This document does not request any IANA actions.</t> | ||||
</section> | </section> | |||
<section anchor="iana" numbered="true" toc="default"> | ||||
<section anchor="acknowledgements" title="Acknowledgements"> | <name>IANA Considerations</name> | |||
<t> | <t> This document has no IANA actions.</t> | |||
This document has benefitted from discussions with the following | ||||
people, in alphabetical order: | ||||
Mikael Abrahamsson, | ||||
Bill Atwood, | ||||
Stuart Cheshire, | ||||
Donald Eastlake, | ||||
Toerless Eckert, | ||||
Jake Holland, | ||||
Joel Jaeggli, | ||||
Jan Komissar, | ||||
David Lamparter, | ||||
Morten Pedersen, | ||||
Pascal Thubert, | ||||
Jeffrey (Zhaohui) Zhang | ||||
</t> | ||||
</section> | </section> | |||
</middle> | </middle> | |||
<back> | <back> | |||
<references title="Informative References"> | <references> | |||
<!-- <?rfc include='reference.RFC.2119.xml'?> --> | <name>Informative References</name> | |||
<?rfc include='reference.I-D.ietf-6tisch-architecture.xml'?> | ||||
<?rfc include='reference.I-D.ietf-6lo-backbone-router.xml'?> | ||||
<?rfc include='reference.I-D.ietf-mboned-driad-amt-discovery.xml'?> | ||||
<?rfc include='reference.RFC.0826.xml'?> | ||||
<?rfc include='reference.RFC.5424.xml'?> | ||||
<?rfc include='reference.RFC.2131.xml'?> | ||||
<?rfc include='reference.RFC.4861.xml'?> | ||||
<?rfc include='reference.RFC.4286.xml'?> | ||||
<?rfc include='reference.RFC.4541.xml'?> | ||||
<?rfc include='reference.RFC.4601.xml'?> | ||||
<?rfc include='reference.RFC.7761.xml'?> | ||||
<?rfc include='reference.RFC.4862.xml'?> | ||||
<?rfc include='reference.RFC.5757.xml'?> | ||||
<?rfc include='reference.RFC.5796.xml'?> | ||||
<?rfc include='reference.RFC.6282.xml'?> | ||||
<?rfc include='reference.RFC.6762.xml'?> | ||||
<?rfc include='reference.RFC.6763.xml'?> | ||||
<?rfc include='reference.RFC.6775.xml'?> | ||||
<?rfc include='reference.RFC.6970.xml'?> | ||||
<?rfc include='reference.RFC.7450.xml'?> | ||||
<?rfc include='reference.RFC.8505.xml'?> | ||||
<?rfc include='reference.RFC.8415.xml'?> | ||||
<reference anchor="uli" target='https://mentor.ieee.org/802.15/dcn/15/15-1 | ||||
5-0521-01-wng0-llc-proposal-for-802-15-4.pptx'> | ||||
<front> | ||||
<title>LLC Proposal for 802.15.4</title> | ||||
<author fullname="Pat Kinney"> | ||||
<organization>"IEEE 802 Wireless"</organization> | ||||
<address> | ||||
</address> | ||||
</author> | ||||
<date month="Nov" year="2015"/> | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC | |||
</front> | .0826.xml"/> | |||
</reference> | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC | |||
.2131.xml"/> | ||||
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC | ||||
.4861.xml"/> | ||||
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC | ||||
.4286.xml"/> | ||||
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC | ||||
.4541.xml"/> | ||||
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC | ||||
.4601.xml"/> | ||||
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC | ||||
.7761.xml"/> | ||||
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC | ||||
.4862.xml"/> | ||||
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC | ||||
.5757.xml"/> | ||||
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC | ||||
.5796.xml"/> | ||||
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC | ||||
.6282.xml"/> | ||||
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC | ||||
.6762.xml"/> | ||||
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC | ||||
.6763.xml"/> | ||||
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC | ||||
.6775.xml"/> | ||||
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC | ||||
.6970.xml"/> | ||||
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC | ||||
.7450.xml"/> | ||||
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC | ||||
.8505.xml"/> | ||||
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC | ||||
.8415.xml"/> | ||||
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC | ||||
.8929.xml"/> | ||||
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC | ||||
.9030.xml"/> | ||||
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC | ||||
.8777.xml"/> | ||||
<reference anchor="ietf_802-11" target='https://mentor.ieee.org/802.11/dcn | <reference anchor="v2011" target="https://ieeexplore.ieee.org/document/571 | |||
/15/11-15-1261-03-0arc-multicast-performance-optimization-features-overview-for- | 6530"> | |||
ietf-nov-2015.ppt'> | <front> | |||
<front> | <title>Information technology -- Local and metropolitan area networks | |||
<title>IEEE 802.11 multicast capabilities</title> | -- Specific requirements -- Part 11: Wireless LAN Medium Access Control (MAC) an | |||
d Physical Layer (PHY) specifications Amendment 8: IEEE 802.11 Wireless Network | ||||
Management</title> | ||||
<author> | ||||
<organization>IEEE</organization> | ||||
</author> | ||||
<date month="February" year="2011"/> | ||||
</front> | ||||
<seriesInfo name="DOI" value="10.1109/IEEESTD.2011.5716530"/> | ||||
<seriesInfo name="IEEE Std" value="802.11v-2011"/> | ||||
</reference> | ||||
<!-- author fullname="Dorothy Stanley" initials="D" surname="Stanley" --> | <reference anchor="IEEE802.1ak" target="https://www.ieee802.org/1/pages/80 | |||
<author fullname="Dorothy Stanley"> | 2.1ak.html"> | |||
<organization>"IEEE 802 Wireless"</organization> | <front> | |||
<address> | <title>Local and Metropolitan Area Networks Virtual Bridged Local Area | |||
</address> | Networks - Amendment 07: Multiple Registration Protocol</title> | |||
</author> | <author> | |||
<organization>IEEE</organization> | ||||
</author> | ||||
<date month="June" year="2007"/> | ||||
</front> | ||||
<seriesInfo name="DOI" value="10.1109/IEEESTD.2007.380667"/> | ||||
<seriesInfo name="IEEE Std" value="802.1ak-2007 "/> | ||||
</reference> | ||||
<date month="Nov" year="2015"/> | <reference anchor="uli" target="https://mentor.ieee.org/802.15/dcn/15/15-1 | |||
</front> | 5-0521-01-wng0-llc-proposal-for-802-15-4.pptx"> | |||
<front> | ||||
<title>LLC Proposal for 802.15.4</title> | ||||
<author fullname="Pat Kinney" initials="P." surname="Kinney"> | ||||
</author> | ||||
<date month="September" year="2015"/> | ||||
</front> | ||||
</reference> | </reference> | |||
<reference anchor="mc-ack-mux" target='https://mentor.ieee.org/802.11/dcn/ | <reference anchor="ietf_802-11" target="https://mentor.ieee.org/802.11/dcn | |||
15/11-15-0800-00-00ax-multiplexing-of-acknowledgements-for-multicast-transmissio | /15/11-15-1261-03-0arc-multicast-performance-optimization-features-overview-for- | |||
n.pptx'> | ietf-nov-2015.ppt"> | |||
<front> | <front> | |||
<title>Multiplexing of Acknowledgements for Multicast | <title>IEEE 802.11 multicast capabilities</title> | |||
Transmission</title> | <author fullname="Dorothy Stanley" initials="D." surname="Stanley"/> | |||
<date month="November" year="2015"/> | ||||
<author fullname="Yusuke Tanaka"> | </front> | |||
<organization>"IEEE 802 Wireless, Sony Corp."</organization> | ||||
<address> | ||||
</address> | ||||
</author> | ||||
<author fullname="Eisuke Sakai"> | ||||
<organization>"IEEE 802 Wireless, Sony Corp."</organization> | ||||
<address> | ||||
</address> | ||||
</author> | ||||
<author fullname="Yuichi Morioka"> | ||||
<organization>"IEEE 802 Wireless, Sony Corp."</organization> | ||||
<address> | ||||
</address> | ||||
</author> | ||||
<author fullname="Masahito Mori"> | ||||
<organization>"IEEE 802 Wireless, Sony Corp."</organization> | ||||
<address> | ||||
</address> | ||||
</author> | ||||
<author fullname="Guido Hiertz"> | ||||
<organization>"IEEE 802 Wireless, Ericsson"</organization> | ||||
<address> | ||||
</address> | ||||
</author> | ||||
<author fullname="Sean Coffey"> | ||||
<organization>"IEEE 802 Wireless, Realtek"</organization> | ||||
<address> | ||||
</address> | ||||
</author> | ||||
<date month="July" year="2015"/> | ||||
</front> | ||||
</reference> | </reference> | |||
<reference anchor="dot11" target="https://standards.ieee.org/standard/802_ | ||||
<reference anchor="dot11" | 11-2020.html"> | |||
target='http://standards.ieee.org/findstds/standard/802.11-2016.html'> | <front> | |||
<front> | <title>Information Technology--Telecommunications and Information Exch | |||
<title>802.11-2016 - IEEE Standard for Information technology--Telecomm | ange between Systems - Local and Metropolitan Area Networks--Specific Requiremen | |||
unications and information exchange between systems Local and metropolitan area | ts - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) | |||
networks--Specific requirements - Part 11: Wireless LAN Medium Access Control (M | Specifications (includes 802.11v amendment)</title> | |||
AC) and Physical Layer (PHY) Specification (includes 802.11v amendment)</title> | <author> | |||
<organization>IEEE</organization> | ||||
<author surname="P802.11"> | </author> | |||
<organization>"IEEE 802 Wireless"</organization> | <date month="December" year="2020"/> | |||
</front> | ||||
<address> | <seriesInfo name="DOI" value="10.1109/IEEESTD.2021.9363693"/> | |||
</address> | <seriesInfo name="IEEE Std" value="802.11-2020"/> | |||
</author> | ||||
<date month="March" year="2016"/> | ||||
</front> | ||||
</reference> | </reference> | |||
<reference anchor="mc-props" target="https://mentor.ieee.org/802.11/dcn/15 | ||||
<reference anchor="mc-props" target='https://mentor.ieee.org/802.11/dcn/15 | /11-15-1161-02-0arc-802-11-multicast-properties.ppt"> | |||
/11-15-1161-02-0arc-802-11-multicast-properties.ppt'> | <front> | |||
<front> | <title>IEEE 802.11 multicast properties</title> | |||
<title>IEEE 802.11 multicast properties</title> | <author fullname="Adrian Stephens"> | |||
<organization>Intel Corporation</organization> | ||||
<author fullname="Adrian Stephens"> | </author> | |||
<organization>"IEEE 802 Wireless"</organization> | <date month="September" year="2015"/> | |||
</front> | ||||
<address> | ||||
</address> | ||||
</author> | ||||
<date month="March" year="2015"/> | ||||
</front> | ||||
</reference> | </reference> | |||
<reference anchor="bridge-mc-2-uc" target="https://github.com/torvalds/lin | ||||
<reference anchor="bridge-mc-2-uc" target='https://github.com/torvalds/lin | ux/commit/6db6f0e"> | |||
ux/commit/6db6f0eae6052b70885562e1733896647ec1d807'> | <front> | |||
<front> | <title>bridge: multicast to unicast</title> | |||
<title>bridge: multicast to unicast</title> | <author/> | |||
<date month="January" year="2017"/> | ||||
<author fullname="Felix Fietkau"> | </front> | |||
<organization>"Linux"</organization> | <refcontent>commit 6db6f0e</refcontent> | |||
<address> | ||||
</address> | ||||
</author> | ||||
<date month="Jan" year="2017"/> | ||||
</front> | ||||
</reference> | </reference> | |||
<reference anchor="arpsponge" target="http://citeseerx.ist.psu.edu/viewdoc | ||||
<reference anchor="arpsponge" | /summary?doi=10.1.1.182.4692"> | |||
target='http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.182.4692'> | <front> | |||
<front> | <title>Effects of IPv4 and IPv6 address resolution on AMS-IX and | |||
<title>Effects of IPv4 and IPv6 address resolution on AMS-IX and | ||||
the ARP Sponge</title> | the ARP Sponge</title> | |||
<author fullname="Marco Wessel"> | ||||
<author fullname="Marco Wessel"> | <organization>"Universiteit van Amsterdam"</organization> | |||
<organization>"Universiteit van Amsterdam"</organization> | </author> | |||
<author fullname="Niels Sijm"> | ||||
<address> | <organization>"Universiteit van Amsterdam"</organization> | |||
</address> | </author> | |||
</author> | <date month="July" year="2009"/> | |||
</front> | ||||
<author fullname="Niels Sijm"> | ||||
<organization>"Universiteit van Amsterdam"</organization> | ||||
<address> | ||||
</address> | ||||
</author> | ||||
<date month="July" year="2009"/> | ||||
</front> | ||||
</reference> | </reference> | |||
<reference anchor="dot11-proxyarp" target="https://mentor.ieee.org/802.11/ | ||||
<reference anchor="dot11-proxyarp" target='https://mentor.ieee.org/802.11/ | dcn/15/11-15-1015-01-00ax-proxy-arp-in-802-11ax.pptx"> | |||
dcn/15/11-15-1015-01-00ax-proxy-arp-in-802-11ax.pptx'> | <front> | |||
<front> | <title>Proxy ARP in 802.11ax</title> | |||
<title>Proxy ARP in 802.11ax</title> | <author fullname="Guido R. Hiertz" initials="G." surname="Hiertz"/> | |||
<author fullname="Filip Mestanov" initials="F." surname="Mestanov"/> | ||||
<author fullname="Guido R. Hiertz" initials="G. R." surname="Hiertz"> | <author fullname="Brian Hart" initials="B." surname="Hart"/> | |||
<organization>"IEEE 802 Wireless P802.11"</organization> | <date month="September" year="2015"/> | |||
</front> | ||||
<address> | ||||
</address> | ||||
</author> | ||||
<author fullname="Filip Mestanov" initials="F." surname="Mestanov"> | ||||
<organization>"IEEE 802 Wireless P802.11"</organization> | ||||
<address> | ||||
</address> | ||||
</author> | ||||
<author fullname="Brian Hart" initials="B." surname="Hart"> | ||||
<organization>"IEEE 802 Wireless P802.11"</organization> | ||||
<address> | ||||
</address> | ||||
</author> | ||||
<date month="September" year="2015"/> | ||||
</front> | ||||
</reference> | </reference> | |||
<reference anchor="dot11aa" target="https://standards.ieee.org/standard/80 | ||||
<reference anchor="dot11aa" | 2_11aa-2012.html"> | |||
target='https://standards.ieee.org/standard/802_11aa-2012.html'> | <front> | |||
<front> | <title>Information technology--Telecommunications and information exch | |||
<title>Part 11: Wireless LAN Medium Access Control (MAC) and | ange between systems Local and metropolitan area networks--Specific requirements | |||
Physical Layer (PHY) Specifications Amendment 2: MAC Enhancements | Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Spec | |||
for Robust Audio Video Streaming</title> | ifications Amendment 2: MAC Enhancements for Robust Audio Video Streaming</title | |||
> | ||||
<author surname="P802.11"> | <author> | |||
<organization>"IEEE 802 Wireless"</organization> | <organization>IEEE</organization></author> | |||
<date month="March" year="2012"/> | ||||
<address> | </front> | |||
</address> | <seriesInfo name="DOI" value="10.1109/IEEESTD.2012.6204193"/> | |||
</author> | <seriesInfo name="IEEE Std" value="802.11aa-2012"/> | |||
<date month="March" year="2012"/> | ||||
</front> | ||||
</reference> | </reference> | |||
<reference anchor="mc-prob-stmt" target="https://www.iab.org/wp-content/IA | ||||
<reference anchor="mc-prob-stmt" target='https://www.iab.org/wp-content/IA | B-uploads/2013/01/multicast-problem-statement.pptx"> | |||
B-uploads/2013/01/multicast-problem-statement.pptx'> | <front> | |||
<front> | <title>Multicast on 802.11</title> | |||
<title>Multicast on 802.11</title> | <author fullname="Mikael Abrahamsson"> | |||
<organization>Deutsche Telekom</organization> | ||||
<author fullname="Mikael Abrahamsson"> | </author> | |||
<organization>"IAB, IEEE 802 Wireless"</organization> | <author fullname="Adrian Stephens"> | |||
<organization>Intel Corporation</organization> | ||||
<address> | </author> | |||
</address> | <date year="2013"/> | |||
</author> | </front> | |||
<author fullname="Adrian Stephens"> | ||||
<organization>"IAB, IEEE 802 Wireless"</organization> | ||||
<address> | ||||
</address> | ||||
</author> | ||||
<date month="March" year="2015"/> | ||||
</front> | ||||
</reference> | </reference> | |||
<reference anchor="Deri-2010" target="http://ripe61.ripe.net/presentations | ||||
<reference anchor="Deri-2010" | /138-Deri_RIPE_61.pdf"> | |||
target="http://ripe61.ripe.net/presentations/138-Deri_RIPE_61.pdf"> | <front> | |||
<front> | <title abbrev="Deri-2010">10 Gbit Hardware Packet Filtering Using | |||
<title abbrev="Deri-2010">10 Gbit Hardware Packet Filtering Using | ||||
Commodity Network Adapters</title> | Commodity Network Adapters</title> | |||
<author fullname="Luca Deri" initials="L." surname="Deri"> | ||||
<author fullname="Luca Deri" initials="L." surname="Deri"> | <organization>NTOP</organization> | |||
<organization>NTOP</organization> | </author> | |||
</author> | <author fullname="Joseph Gasparakis" initials="J." surname="Gasparakis | |||
"> | ||||
<author fullname="Joseph Gasparakis" initials="J." | <organization>Intel</organization> | |||
surname="Gasparakis"> | </author> | |||
<organization>Intel</organization> | <date month="November" year="2010"/> | |||
</author> | </front> | |||
<refcontent>RIPE 61</refcontent> | ||||
<date year="2010" /> | ||||
</front> | ||||
<seriesInfo name="RIPE" value="61" /> | ||||
<format | ||||
target="http://ripe61.ripe.net/presentations/138-Deri_RIPE_61.pdf" | ||||
type="HTML" /> | ||||
</reference> | </reference> | |||
<reference anchor="CAB" target="https://patchwork.kernel.org/patch/2687951 | ||||
<reference anchor="CAB" | /"> | |||
target="https://patchwork.kernel.org/patch/2687951/"> | <front> | |||
<front> | <title>limit multicast buffer hardware queue depth</title> | |||
<title abbrev="CAB">Limit multicast buffer hardware queue depth</title> | <author/> | |||
<author fullname="Felix Fietkau"> | <date year="2013" month="June"/> | |||
<organization>"openwrt.org"</organization> | </front> | |||
<refcontent>commit 2687951</refcontent> | ||||
<address> | </reference> | |||
</address> | <reference anchor="group_key" target="https://superuser.com/questions/7302 | |||
</author> | 88/why-do-some-wifi-routers-block-multicast-packets-going-from-wired-to-wireless | |||
<date year="2013" /> | "> | |||
</front> | <front> | |||
</reference> | <title>Subject: Why do some WiFi routers block multicast packets going | |||
from wired to wireless?</title> | ||||
<reference anchor="group_key" target='https://superuser.com/questions/7302 | <author /> | |||
88/why-do-some-wifi-routers-block-multicast-packets-going-from-wired-to-wireless | <date month="January" year="2017"/> | |||
'> | </front> | |||
<front> | <refcontent>message to the Super User Q & A community</refcontent> | |||
<title>Why do some WiFi routers block multicast packets going from wire | ||||
d to wireless?</title> | ||||
<author fullname="Spiff"> | ||||
<organization>"superuser.com"</organization> | ||||
<address> | ||||
</address> | ||||
</author> | ||||
<date month="Jan" year="2017"/> | ||||
</front> | ||||
</reference> | </reference> | |||
<reference anchor="Tramarin2017"> | <reference anchor="Tramarin2017"> | |||
<front> | <front> | |||
<title> IEEE 802.11n for Distributed Measurement Systems</title> | <title> IEEE 802.11n for Distributed Measurement Systems</title> | |||
<author fullname="Federico Tramarin" initials="F." surname="Tramarin"> | <author fullname="Federico Tramarin" initials="F." surname="Tramarin"> | |||
<organization> | <organization> | |||
National Research Council of Italy, CNR-IEIIT | National Research Council of Italy, CNR-IEIIT | |||
</organization> | </organization> | |||
<address> | <address> | |||
<postal> | <postal> | |||
<street> | <street> | |||
Via Gradenigo 6/B, 35131 Padova, Italy | Via Gradenigo 6/B, 35131 Padova, Italy | |||
</street> | </street> | |||
</postal> | </postal> | |||
</address> | </address> | |||
</author> | </author> | |||
<author fullname="Stefano Vitturi" initials="S." surname="Vitturi"> | ||||
<author fullname="Stefano Vitturi" | <organization> | |||
initials="S." surname="Vitturi"> | ||||
<organization> | ||||
National Research Council of Italy, CNR-IEIIT | National Research Council of Italy, CNR-IEIIT | |||
</organization> | </organization> | |||
<address> | <address> | |||
<postal> | <postal> | |||
<street> | <street> | |||
Via Gradenigo 6/B, 35131 Padova, Italy | Via Gradenigo 6/B, 35131 Padova, Italy | |||
</street> | </street> | |||
</postal> | </postal> | |||
</address> | </address> | |||
</author> | </author> | |||
<author fullname="Michele Luvisotto" initials="M." surname="Luvisotto" | ||||
<author fullname="Michele Luvisotto" | > | |||
initials="M." surname="Luvisotto"> | <organization> | |||
<organization> | ||||
Dept. of Information Engineering, University of Padova | Dept. of Information Engineering, University of Padova | |||
</organization> | </organization> | |||
<address> | <address> | |||
<postal> | <postal> | |||
<street> | <street> | |||
Via Gradenigo 6/B, 35131 Padova, Italy | Via Gradenigo 6/B, 35131 Padova, Italy | |||
</street> | </street> | |||
</postal> | </postal> | |||
</address> | </address> | |||
</author> | </author> | |||
<date month="May" year="2017"/> | <date month="May" year="2017"/> | |||
</front> | </front> | |||
<seriesInfo name="2017 IEEE International Instrumentation and | <refcontent>2017 IEEE International Instrumentation and Measurement Tech | |||
Measurement Technology Conference (I2MTC)" | nology Conference (I2MTC), pp. 1-6</refcontent> | |||
value="pp. 1-6"/> | </reference> | |||
</reference> | ||||
<!-- | ||||
Antonio de la Oliva | ||||
Universidad Carlos III de Madrid, | ||||
Avda. Universidad, 30, 28911 Leganes, Spain | ||||
Pablo Serrano | ||||
Universidad Carlos III de Madrid, | ||||
Avda. Universidad, 30, 28911 Leganes, Spain | ||||
Pablo Salvador | ||||
Institute IMDEA Networks, | ||||
Avda. del Mar Mediterraneo, 22, 28911 Leganes, Spain | ||||
Albert Banchs | ||||
Institute IMDEA Networks, | ||||
Avda. del Mar Mediterraneo, 22, 28911 Leganes, Spain | ||||
Email: | ||||
{ aoliva,pablo } @it.uc3m.es | ||||
Email: | ||||
{ josepablo.salvador,albert.banchs } @imdea.org | ||||
@INPROCEEDINGS{6583394, | ||||
author={A. de la Oliva and P. Serrano and P. Salvador and A. Banchs}, | ||||
booktitle={2013 IEEE 14th International Symposium on "A World of Wireless, Mobil | ||||
e and Multimedia Networks" (WoWMoM)}, | ||||
title={Performance evaluation of the IEEE 802.11aa multicast mechanisms for vide | ||||
o streaming}, | ||||
year={2013}, | ||||
volume={}, | ||||
number={}, | ||||
pages={1-9}, | ||||
keywords={multicast communication;performance evaluation;radio transmitters; | ||||
telecommunication traffic;video communication;video streaming; | ||||
wireless LAN;IEEE 802.11aa Task Group;IEEE 802.11aa multicast mechanism; | ||||
Internet traffic;group addressed frame handling;home environment; | ||||
multicast flow transmission;multimedia traffic;performance evaluation; | ||||
resource complexity;resource consumption;video streaming;video traffic; | ||||
video transmission;wireless LAN;wireless equipment; | ||||
IEEE 802.11 Standards;Multimedia communication;Receivers;Reliability; | ||||
Streaming media;Wireless LAN;802.11aa;Groupcast;WLAN}, | ||||
doi={10.1109/WoWMoM.2013.6583394}, | ||||
ISSN={}, | ||||
month={June},} | ||||
--> | ||||
<reference anchor="Oliva2013"> | <reference anchor="Oliva2013"> | |||
<front> | <front> | |||
<title> Performance evaluation of the IEEE 802.11aa multicast | <title> Performance evaluation of the IEEE 802.11aa multicast | |||
mechanisms for video streaming </title> | mechanisms for video streaming </title> | |||
<author fullname="Antonio de la Oliva" | <author fullname="Antonio de la Oliva" initials="A." surname="de la Ol | |||
initials="A." surname="de la Oliva"> | iva"> | |||
<organization> | <organization> | |||
Universidad Carlos III de Madrid | Universidad Carlos III de Madrid | |||
</organization> | </organization> | |||
<address> | <address> | |||
<postal> | <postal> | |||
<street> | <street> | |||
Avda. Universidad, 30, 28911 Leganes, Spain | Avda. Universidad, 30, 28911 Leganes, Spain | |||
</street> | </street> | |||
</postal> | </postal> | |||
</address> | </address> | |||
</author> | </author> | |||
<author fullname="Pablo Serrano" initials="P." surname="Serrano"> | ||||
<author fullname="Pablo Serrano" initials="P." surname="Serrano"> | <organization> | |||
<organization> | ||||
Universidad Carlos III de Madrid | Universidad Carlos III de Madrid | |||
</organization> | </organization> | |||
<address> | <address> | |||
<postal> | <postal> | |||
<street> | <street> | |||
Avda. Universidad, 30, 28911 Leganes, Spain | Avda. Universidad, 30, 28911 Leganes, Spain | |||
</street> | </street> | |||
</postal> | </postal> | |||
</address> | </address> | |||
</author> | </author> | |||
<author fullname="Pablo Salvador" initials="P." surname="Salvador"> | ||||
<author fullname="Pablo Salvador" initials="P." surname="Salvador"> | <organization> | |||
<organization> | ||||
Institute IMDEA Networks, | Institute IMDEA Networks, | |||
</organization> | </organization> | |||
<address> | <address> | |||
<postal> | <postal> | |||
<street> | <street> | |||
Avda. del Mar Mediterraneo, 22, 28911 Leganes, Spain | Avda. del Mar Mediterraneo, 22, 28911 Leganes, Spain | |||
</street> | </street> | |||
</postal> | </postal> | |||
</address> | </address> | |||
</author> | </author> | |||
<author fullname="Albert Banchs" initials="A." surname="Banchs"> | ||||
<author fullname="Albert Banchs" initials="A." surname="Banchs"> | <organization> | |||
<organization> | ||||
Institute IMDEA Networks, | Institute IMDEA Networks, | |||
</organization> | </organization> | |||
<address> | <address> | |||
<postal> | <postal> | |||
<street> | <street> | |||
Avda. del Mar Mediterraneo, 22, 28911 Leganes, Spain | Avda. del Mar Mediterraneo, 22, 28911 Leganes, Spain | |||
</street> | </street> | |||
</postal> | </postal> | |||
</address> | </address> | |||
</author> | </author> | |||
<date month="June" year="2013"/> | ||||
<date month="June" year="2013"/> | </front> | |||
</front> | <seriesInfo name="DOI" value="10.1109/WoWMoM.2013.6583394"/> | |||
<seriesInfo name='2013 IEEE 14th International Symposium on | <refcontent>2013 IEEE 14th International Symposium on "A World of Wirele | |||
"A World of Wireless, Mobile and Multimedia Networks" (WoWMoM)' | ss, Mobile and Multimedia Networks" (WoWMoM), pp. 1-9 </refcontent> | |||
value="pp. 1-9"/> | </reference> | |||
</reference> | ||||
<!-- | ||||
<reference anchor="dot15mc"> | ||||
<front> | ||||
<title>IEEE 802.15.4 and ZigBee as Enabling Technologies</title> | ||||
<author surname='Stefano Tennina et al.'> | ||||
<organization> | ||||
</organization> | ||||
<address> | ||||
<uri>https://www.iab.org/wp-content/IAB-uploads/2013/01/multicast-problem | ||||
-statement.pptx</uri> | ||||
</address> | ||||
</author> | ||||
<date month="March" year="2015"/> | ||||
</front> | ||||
</reference> | ||||
<author surname='Stefano Tennina, Anis Koubaa, Roberta Daidone, | ||||
Mario Alves, et al.'> | ||||
Koubaa had first 'a' with caret | ||||
Mario had 'a' with accent | ||||
--> | ||||
</references> | </references> | |||
<section anchor="acknowledgements" numbered="false" toc="default"> | ||||
</back> | <name>Acknowledgements</name> | |||
<t> | ||||
This document has benefitted from discussions with the following | ||||
people, in alphabetical order: | ||||
<contact fullname="Mikael Abrahamsson"/>, | ||||
<contact fullname="Bill Atwood"/>, | ||||
<contact fullname="Stuart Cheshire"/>, | ||||
<contact fullname="Donald Eastlake 3rd"/>, | ||||
<contact fullname="Toerless Eckert"/>, | ||||
<contact fullname="Jake Holland"/>, | ||||
<contact fullname="Joel Jaeggli"/>, | ||||
<contact fullname="Jan Komissar"/>, | ||||
<contact fullname="David Lamparter"/>, | ||||
<contact fullname="Morten Pedersen"/>, | ||||
<contact fullname="Pascal Thubert"/>, and | ||||
<contact fullname="Jeffrey (Zhaohui) Zhang"/>. | ||||
</t> | ||||
</section> | ||||
</back> | ||||
</rfc> | </rfc> | |||
End of changes. 190 change blocks. | ||||
1307 lines changed or deleted | 1079 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ |