rfc9354.original | rfc9354.txt | |||
---|---|---|---|---|
6Lo Working Group J. Hou | Internet Engineering Task Force (IETF) J. Hou | |||
Internet-Draft B. Liu | Request for Comments: 9354 B. Liu | |||
Intended status: Standards Track Huawei Technologies | Category: Standards Track Huawei Technologies | |||
Expires: November 18, 2022 Y-G. Hong | ISSN: 2070-1721 Y-G. Hong | |||
Daejeon University | Daejeon University | |||
X. Tang | X. Tang | |||
SGEPRI | SGEPRI | |||
C. Perkins | C. Perkins | |||
Lupin Lodge | Lupin Lodge | |||
May 17, 2022 | January 2023 | |||
Transmission of IPv6 Packets over PLC Networks | Transmission of IPv6 Packets over Power Line Communication (PLC) | |||
draft-ietf-6lo-plc-11 | Networks | |||
Abstract | Abstract | |||
Power Line Communication (PLC), namely using the electric-power lines | Power Line Communication (PLC), namely using electric power lines for | |||
for indoor and outdoor communications, has been widely applied to | indoor and outdoor communications, has been widely applied to support | |||
support Advanced Metering Infrastructure (AMI), especially smart | Advanced Metering Infrastructure (AMI), especially smart meters for | |||
meters for electricity. The existing electricity infrastructure | electricity. The existing electricity infrastructure facilitates the | |||
facilitates the expansion of PLC deployments due to its potential | expansion of PLC deployments due to its potential advantages in terms | |||
advantages in terms of cost and convenience. Moreover, a wide | of cost and convenience. Moreover, a wide variety of accessible | |||
variety of accessible devices raises the potential demand of IPv6 for | devices raises the potential demand of IPv6 for future applications. | |||
future applications. This document describes how IPv6 packets are | This document describes how IPv6 packets are transported over | |||
transported over constrained PLC networks, such as ITU-T G.9903, IEEE | constrained PLC networks, such as those described in ITU-T G.9903, | |||
1901.1 and IEEE 1901.2. | IEEE 1901.1, and IEEE 1901.2. | |||
Status of This Memo | Status of This Memo | |||
This Internet-Draft is submitted in full conformance with the | This is an Internet Standards Track document. | |||
provisions of BCP 78 and BCP 79. | ||||
Internet-Drafts are working documents of the Internet Engineering | ||||
Task Force (IETF). Note that other groups may also distribute | ||||
working documents as Internet-Drafts. The list of current Internet- | ||||
Drafts is at https://datatracker.ietf.org/drafts/current/. | ||||
Internet-Drafts are draft documents valid for a maximum of six months | This document is a product of the Internet Engineering Task Force | |||
and may be updated, replaced, or obsoleted by other documents at any | (IETF). It represents the consensus of the IETF community. It has | |||
time. It is inappropriate to use Internet-Drafts as reference | received public review and has been approved for publication by the | |||
material or to cite them other than as "work in progress." | Internet Engineering Steering Group (IESG). Further information on | |||
Internet Standards is available in Section 2 of RFC 7841. | ||||
This Internet-Draft will expire on November 18, 2022. | Information about the current status of this document, any errata, | |||
and how to provide feedback on it may be obtained at | ||||
https://www.rfc-editor.org/info/rfc9354. | ||||
Copyright Notice | Copyright Notice | |||
Copyright (c) 2022 IETF Trust and the persons identified as the | Copyright (c) 2023 IETF Trust and the persons identified as the | |||
document authors. All rights reserved. | document authors. All rights reserved. | |||
This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
(https://trustee.ietf.org/license-info) in effect on the date of | (https://trustee.ietf.org/license-info) in effect on the date of | |||
publication of this document. Please review these documents | publication of this document. Please review these documents | |||
carefully, as they describe your rights and restrictions with respect | carefully, as they describe your rights and restrictions with respect | |||
to this document. Code Components extracted from this document must | to this document. Code Components extracted from this document must | |||
include Simplified BSD License text as described in Section 4.e of | include Revised BSD License text as described in Section 4.e of the | |||
the Trust Legal Provisions and are provided without warranty as | Trust Legal Provisions and are provided without warranty as described | |||
described in the Simplified BSD License. | in the Revised BSD License. | |||
Table of Contents | Table of Contents | |||
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 | 1. Introduction | |||
2. Requirements Notation and Terminology . . . . . . . . . . . . 3 | 2. Requirements Notation and Terminology | |||
3. Overview of PLC . . . . . . . . . . . . . . . . . . . . . . . 5 | 3. Overview of PLC | |||
3.1. Protocol Stack . . . . . . . . . . . . . . . . . . . . . 5 | 3.1. Protocol Stack | |||
3.2. Addressing Modes . . . . . . . . . . . . . . . . . . . . 6 | 3.2. Addressing Modes | |||
3.3. Maximum Transmission Unit . . . . . . . . . . . . . . . . 6 | 3.3. Maximum Transmission Unit | |||
3.4. Routing Protocol . . . . . . . . . . . . . . . . . . . . 7 | 3.4. Routing Protocol | |||
4. IPv6 over PLC . . . . . . . . . . . . . . . . . . . . . . . . 7 | 4. IPv6 over PLC | |||
4.1. Stateless Address Autoconfiguration . . . . . . . . . . . 8 | 4.1. Stateless Address Autoconfiguration | |||
4.2. IPv6 Link Local Address . . . . . . . . . . . . . . . . . 9 | 4.2. IPv6 Link-Local Address | |||
4.3. Unicast Address Mapping . . . . . . . . . . . . . . . . . 9 | 4.3. Unicast Address Mapping | |||
4.3.1. Unicast Address Mapping for IEEE 1901.1 . . . . . . . 10 | 4.3.1. Unicast Address Mapping for IEEE 1901.1 | |||
4.3.2. Unicast Address Mapping for IEEE 1901.2 and ITU-T | 4.3.2. Unicast Address Mapping for IEEE 1901.2 and ITU-T | |||
G.9903 . . . . . . . . . . . . . . . . . . . . . . . 10 | G.9903 | |||
4.4. Neighbor Discovery . . . . . . . . . . . . . . . . . . . 11 | 4.4. Neighbor Discovery | |||
4.5. Header Compression . . . . . . . . . . . . . . . . . . . 12 | 4.5. Header Compression | |||
4.6. Fragmentation and Reassembly . . . . . . . . . . . . . . 13 | 4.6. Fragmentation and Reassembly | |||
5. Internet Connectivity Scenarios and Topologies . . . . . . . 14 | 5. Internet Connectivity Scenarios and Topologies | |||
6. Operations and Manageability Considerations . . . . . . . . . 17 | 6. Operations and Manageability Considerations | |||
7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 17 | 7. IANA Considerations | |||
8. Security Considerations . . . . . . . . . . . . . . . . . . . 17 | 8. Security Considerations | |||
9. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 19 | 9. References | |||
10. References . . . . . . . . . . . . . . . . . . . . . . . . . 19 | 9.1. Normative References | |||
10.1. Normative References . . . . . . . . . . . . . . . . . . 19 | 9.2. Informative References | |||
10.2. Informative References . . . . . . . . . . . . . . . . . 20 | Acknowledgements | |||
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 23 | Authors' Addresses | |||
1. Introduction | 1. Introduction | |||
The idea of using power lines for both electricity supply and | The idea of using power lines for both electricity supply and | |||
communication can be traced back to the beginning of the last | communication can be traced back to the beginning of the last | |||
century. Using the existing power grid to transmit messages, Power | century. Using the existing power grid to transmit messages, Power | |||
Line Communication (PLC) is a good candidate for supporting various | Line Communication (PLC) is a good candidate for supporting various | |||
service scenarios such as in houses and offices, in trains and | service scenarios such as in houses and offices, in trains and | |||
vehicles, in smart grid and advanced metering infrastructure (AMI) | vehicles, in smart grids, and in Advanced Metering Infrastructure | |||
[SCENA]. The data acquisition devices in these scenarios share | (AMI) [SCENA]. The data-acquisition devices in these scenarios share | |||
common features such as fixed position, large quantity, low data rate | common features such as fixed position, large quantity of nodes, low | |||
and low power consumption. | data rate, and low power consumption. | |||
Although PLC technology has evolved over several decades, it has not | Although PLC technology has evolved over several decades, it has not | |||
been fully adapted for IPv6-based constrained networks. The | been fully adapted for IPv6-based constrained networks. The | |||
resource-constrained IoT-related scenarios lie in the low voltage PLC | resource-constrained scenarios related to the Internet of Things | |||
networks with most applications in the area of Advanced Metering | (IoT) lie in the low voltage PLC networks with most applications in | |||
Infrastructure (AMI), Vehicle-to-Grid communications, in-home energy | the area of AMI, vehicle-to-grid communications, in-home energy | |||
management, and smart street lighting. IPv6 is important for PLC | management, and smart street lighting. IPv6 is important for PLC | |||
networks, due to its large address space and efficient address auto- | networks, due to its large address space and efficient address | |||
configuration. | autoconfiguration. | |||
This document provides a brief overview of PLC technologies. Some of | This document provides a brief overview of PLC technologies. Some of | |||
them have LLN (low power and lossy network) characteristics, i.e., | them have LLN (Low-Power and Lossy Network) characteristics, i.e., | |||
limited power consumption, memory and processing resources. This | limited power consumption, memory, and processing resources. This | |||
document specifies the transmission of IPv6 packets over those | document specifies the transmission of IPv6 packets over those | |||
"constrained" PLC networks. The general approach is to adapt | constrained PLC networks. The general approach is to adapt elements | |||
elements of the 6LoWPAN (IPv6 over Low-Power Wireless Personal Area | of the 6LoWPAN (IPv6 over Low-Power Wireless Personal Area Network) | |||
Network) and 6lo (IPv6 over Networks of Resource-constrained Nodes) | and 6lo (IPv6 over Networks of Resource-constrained Nodes) | |||
specifications, such as [RFC4944], [RFC6282], [RFC6775] and [RFC8505] | specifications, such as those described in [RFC4944], [RFC6282], | |||
to constrained PLC networks. | [RFC6775], and [RFC8505], to constrained PLC networks. | |||
2. Requirements Notation and Terminology | 2. Requirements Notation and Terminology | |||
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | |||
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and | "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and | |||
"OPTIONAL" in this document are to be interpreted as described in | "OPTIONAL" in this document are to be interpreted as described in | |||
BCP14 [RFC2119] [RFC8174] when, and only when, they appear in all | BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all | |||
capitals, as shown here. | capitals, as shown here. | |||
This document uses the following acronyms and terminologies: | This document uses the following acronyms and terminologies: | |||
6BBR: 6LoWPAN Backbone Router | 6BBR: 6LoWPAN Backbone Router | |||
6LBR: 6LoWPAN Border Router | 6LBR: 6LoWPAN Border Router | |||
6lo: IPv6 over Networks of Resource-constrained Nodes | ||||
6LoWPAN: IPv6 over Low-Power Wireless Personal Area Network | 6LoWPAN: IPv6 over Low-Power Wireless Personal Area Network | |||
6lo: IPv6 over Networks of Resource-constrained Nodes | ||||
6LR: 6LoWPAN Router | 6LR: 6LoWPAN Router | |||
AMI: Advanced Metering Infrastructure | AMI: Advanced Metering Infrastructure | |||
BBPLC: Broadband Power Line Communication | BBPLC: Broadband Power Line Communication | |||
Coordinator: A device capable of relaying messages | Coordinator: A device capable of relaying messages | |||
DAD: Duplicate Address Detection | DAD: Duplicate Address Detection | |||
IID: IPv6 Interface Identifier | EUI: Extended Unique Identifier | |||
LLN: Low power and Lossy Network | IID: Interface Identifier | |||
LLN: Low-Power and Lossy Network | ||||
MTU: Maximum Transmission Unit | MTU: Maximum Transmission Unit | |||
NBPLC: Narrowband Power Line Communication | NBPLC: Narrowband Power Line Communication | |||
PAN: Personal Area Network | PAN: Personal Area Network | |||
PANC: PAN Coordinator, a coordinator which also acts as the primary | PANC: PAN Coordinator, a coordinator that also acts as the primary | |||
controller of a PAN | controller of a PAN | |||
PLC: Power Line Communication | PLC: Power Line Communication | |||
PLC device: An entity that follows the PLC standards and implements | PLC device: An entity that follows the PLC standards and implements | |||
the protocol stack described in this draft | the protocol stack described in this document | |||
RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks | RA: Router Advertisement | |||
RA: Router Advertisement | RPL: Routing Protocol for Low-Power and Lossy Networks | |||
Below is a mapping table of the terminology between [IEEE_1901.2], | Below is a mapping table of the terminology between [IEEE_1901.2], | |||
[IEEE_1901.1], [ITU-T_G.9903] and this document. | [IEEE_1901.1], [ITU-T_G.9903], and this document. | |||
+---------------+----------------+------------------+---------------+ | +=================+=============+===============+===============+ | |||
| IEEE 1901.2 | IEEE 1901.1 | ITU-T G.9903 | This document | | | IEEE 1901.2 | IEEE 1901.1 | ITU-T G.9903 | This document | | |||
+---------------+----------------+------------------+---------------+ | +=================+=============+===============+===============+ | |||
| PAN | Central | PAN Coordinator | PAN | | | PAN Coordinator | Central | PAN | PAN | | |||
| Coordinator | Coordinator | | Coordinator | | | | Coordinator | Coordinator | Coordinator | | |||
| | | | | | +-----------------+-------------+---------------+---------------+ | |||
| Coordinator | Proxy | Full-function | Coordinator | | | Coordinator | Proxy | Full-Function | Coordinator | | |||
| | Coordinator | device | | | | | Coordinator | Device | | | |||
| | | | | | +-----------------+-------------+---------------+---------------+ | |||
| Device | Station | PAN Device | PLC Device | | | Device | Station | PAN Device | PLC Device | | |||
+---------------+----------------+------------------+---------------+ | +-----------------+-------------+---------------+---------------+ | |||
Table 1: Terminology Mapping between PLC standards | Table 1: Terminology Mapping between PLC Standards | |||
3. Overview of PLC | 3. Overview of PLC | |||
PLC technology enables convenient two-way communications for home | PLC technology enables convenient two-way communications for home | |||
users and utility companies to monitor and control electric plugged | users and utility companies to monitor and control electrically | |||
devices such as electricity meters and street lights. PLC can also | connected devices such as electricity meters and street lights. PLC | |||
be used in smart home scenarios, such as the control of indoor lights | can also be used in smart home scenarios, such as the control of | |||
and switches. Due to the large range of communication frequencies, | indoor lights and switches. Due to the large range of communication | |||
PLC is generally classified into two categories: Narrowband PLC | frequencies, PLC is generally classified into two categories: | |||
(NBPLC) for automation of sensors (which have a low frequency band | Narrowband PLC (NBPLC) for automation of sensors (which have a low | |||
and low power cost), and Broadband PLC (BBPLC) for home and industry | frequency band and low power cost) and Broadband PLC (BBPLC) for home | |||
networking applications. | and industry networking applications. | |||
Various standards have been addressed on the MAC and PHY layers for | Various standards have been addressed on the Media Access Control | |||
this communication technology, e.g., BBPLC (1.8-250 MHz) including | (MAC) and Physical (PHY) layers. For example, standards for BBPLC | |||
IEEE 1901 and ITU-T G.hn, and NBPLC (3-500 kHz) including ITU-T | (1.8-250 MHz) include IEEE 1901 and ITU-T G.hn, and standards for | |||
G.9902 (G.hnem), ITU-T G.9903 (G3-PLC) [ITU-T_G.9903], ITU-T G.9904 | NBPLC (3-500 kHz) include ITU-T G.9902 (G.hnem), ITU-T G.9903 | |||
(PRIME), IEEE 1901.2 [IEEE_1901.2] (a combination of G3-PLC and PRIME | (G3-PLC) [ITU-T_G.9903], ITU-T G.9904 (PRIME), IEEE 1901.2 (a | |||
PLC) and IEEE 1901.2a [IEEE_1901.2a] (an amendment to IEEE 1901.2). | combination of G3-PLC and PRIME PLC) [IEEE_1901.2], and IEEE 1901.2a | |||
(an amendment to IEEE 1901.2) [IEEE_1901.2a]. | ||||
A new PLC standard IEEE 1901.1 [IEEE_1901.1], which is aimed at the | IEEE 1901.1 [IEEE_1901.1], a PLC standard that is aimed at the medium | |||
medium frequency band of less than 12 MHz, has been published by the | frequency band of less than 12 MHz, was published by the IEEE | |||
IEEE standard for Smart Grid Powerline Communication Working Group | standard for Smart Grid Powerline Communication Working Group (SGPLC | |||
(SGPLC WG). IEEE 1901.1 balances the needs for bandwidth versus | WG). IEEE 1901.1 balances the needs for bandwidth versus | |||
communication range, and is thus a promising option for 6lo | communication range and is thus a promising option for 6lo | |||
applications. | applications. | |||
This specification is focused on IEEE 1901.1, IEEE 1901.2, and ITU-T | This specification is focused on IEEE 1901.1, IEEE 1901.2, and ITU-T | |||
G.9903. | G.9903. | |||
3.1. Protocol Stack | 3.1. Protocol Stack | |||
The protocol stack for IPv6 over PLC is illustrated in Figure 1. The | The protocol stack for IPv6 over PLC is illustrated in Figure 1. The | |||
PLC MAC/PHY layer corresponds to IEEE 1901.1, IEEE 1901.2 or ITU-T | PLC MAC and PLC PHY layers correspond to the layers described in IEEE | |||
G.9903. The 6lo adaptation layer for PLC is illustrated in | 1901.1, IEEE 1901.2, or ITU-T G.9903. The 6lo adaptation layer for | |||
Section 4. For multihop tree and mesh topologies, a routing protocol | PLC is illustrated in Section 4. For multihop tree and mesh | |||
is likely to be necessary. The routes can be built in mesh-under | topologies, a routing protocol is likely to be necessary. The routes | |||
mode at layer 2 or in route-over mode at layer-3, as explained in | can be built in mesh-under mode at Layer 2 or in route-over mode at | |||
Section 3.4. | Layer 3, as explained in Sections 3.4 and 4.4. | |||
+----------------------------------------+ | +----------------------------------------+ | |||
| Application Layer | | | Application Layer | | |||
+----------------------------------------+ | +----------------------------------------+ | |||
| Transport Layer | | | Transport Layer | | |||
+----------------------------------------+ | +----------------------------------------+ | |||
| | | | | | |||
| IPv6 | | | IPv6 Layer | | |||
| | | | | | |||
+----------------------------------------+ | +----------------------------------------+ | |||
| Adaptation layer for IPv6 over PLC | | | Adaptation Layer for IPv6 over PLC | | |||
+----------------------------------------+ | +----------------------------------------+ | |||
| PLC MAC Layer | | | PLC MAC Layer | | |||
+----------------------------------------+ | +----------------------------------------+ | |||
| PLC PHY Layer | | | PLC PHY Layer | | |||
+----------------------------------------+ | +----------------------------------------+ | |||
Figure 1: PLC Protocol Stack | Figure 1: PLC Protocol Stack | |||
3.2. Addressing Modes | 3.2. Addressing Modes | |||
Each PLC device has a globally unique long address of 48-bits | Each PLC device has a globally unique long address of 48 bits | |||
([IEEE_1901.1]) or 64-bits ([IEEE_1901.2], [ITU-T_G.9903]) and a | [IEEE_1901.1] or 64 bits [IEEE_1901.2] [ITU-T_G.9903] and a short | |||
short address of 12-bits ([IEEE_1901.1]) or 16-bits ([IEEE_1901.2], | address of 12 bits [IEEE_1901.1] or 16 bits [IEEE_1901.2] | |||
[ITU-T_G.9903]). The long address is set by the manufacturer | [ITU-T_G.9903]. The long address is set by the manufacturer | |||
according to the IEEE EUI-48 MAC address or the IEEE EUI-64 address. | according to the IEEE EUI-48 MAC address or the IEEE EUI-64 address. | |||
Each PLC device joins the network by using the long address and | Each PLC device joins the network by using the long address and | |||
communicates with other devices by using the short address after | communicates with other devices by using the short address after | |||
joining the network. Short addresses can be assigned during the | joining the network. Short addresses can be assigned during the | |||
onboarding process, by the PANC or the JRC (join registrar/ | onboarding process, by the PANC or the JRC (join registrar/ | |||
coordinator) in CoJP (Constrained Join Protocol) | coordinator) in CoJP (Constrained Join Protocol) [RFC9031]. | |||
[I-D.ietf-6tisch-minimal-security]. | ||||
3.3. Maximum Transmission Unit | 3.3. Maximum Transmission Unit | |||
The Maximum Transmission Unit (MTU) of the MAC layer determines | The Maximum Transmission Unit (MTU) of the MAC layer determines | |||
whether fragmentation and reassembly are needed at the adaptation | whether fragmentation and reassembly are needed at the adaptation | |||
layer of IPv6 over PLC. IPv6 requires an MTU of 1280 octets or | layer of IPv6 over PLC. IPv6 requires an MTU of 1280 octets or | |||
greater; thus for a MAC layer with MTU lower than this limit, | greater; thus, for a MAC layer with an MTU lower than this limit, | |||
fragmentation and reassembly at the adaptation layer are required. | fragmentation and reassembly at the adaptation layer are required. | |||
The IEEE 1901.1 MAC supports upper layer packets up to 2031 octets. | The IEEE 1901.1 MAC supports upper-layer packets up to 2031 octets. | |||
The IEEE 1901.2 MAC layer supports an MTU of 1576 octets (the | The IEEE 1901.2 MAC layer supports an MTU of 1576 octets (the | |||
original value of 1280 bytes was updated in 2015 [IEEE_1901.2a]). | original value of 1280 bytes was updated in 2015 [IEEE_1901.2a]). | |||
Though these two technologies can support IPv6 originally without | Though these two technologies can support IPv6 originally without | |||
fragmentation and reassembly, it is possible to configure a smaller | fragmentation and reassembly, it is possible to configure a smaller | |||
MTU in high-noise communication environment. Thus the 6lo functions, | MTU in a high-noise communication environment. Thus, the 6lo | |||
including header compression, fragmentation and reassembly, are still | functions, including header compression, fragmentation, and | |||
applicable and useful. | reassembly, are still applicable and useful. | |||
The MTU for ITU-T G.9903 is 400 octets, insufficient for supporting | The MTU for ITU-T G.9903 is 400 octets, which is insufficient for | |||
IPv6's MTU. For this reason, fragmentation and reassembly is | supporting IPv6's MTU. For this reason, fragmentation and reassembly | |||
required for G.9903-based networks to carry IPv6. | are required for G.9903-based networks to carry IPv6. | |||
3.4. Routing Protocol | 3.4. Routing Protocol | |||
Routing protocols suitable for use in PLC networks include: | Routing protocols suitable for use in PLC networks include: | |||
o RPL (Routing Protocol for Low-Power and Lossy Networks) [RFC6550] | * RPL (Routing Protocol for Low-Power and Lossy Networks) [RFC6550] | |||
is a layer-3 routing protocol. AODV-RPL [I-D.ietf-roll-aodv-rpl] | is a Layer 3 routing protocol. AODV-RPL [AODV-RPL] updates RPL to | |||
updates RPL to include reactive, point-to-point, and asymmetric | include reactive, point-to-point, and asymmetric routing. IEEE | |||
routing. IEEE 1901.2 specifies Information Elements (IEs) with | 1901.2 specifies Information Elements (IEs) with MAC layer | |||
MAC layer metrics, which can be provided to L3 routing protocol | metrics, which can be provided to a Layer 3 routing protocol for | |||
for parent selection. | parent selection. | |||
o IEEE 1901.1 supports the mesh-under routing scheme. Each PLC node | * IEEE 1901.1 supports the mesh-under routing scheme. Each PLC node | |||
maintains a routing table, in which each route entry comprises the | maintains a routing table, in which each route entry comprises the | |||
short addresses of the destination and the related next hop. The | short addresses of the destination and the related next hop. The | |||
route entries are built during the network establishment via a | route entries are built during the network establishment via a | |||
pair of association request/confirmation messages. The route | pair of association request/confirmation messages. The route | |||
entries can be changed via a pair of proxy change request/ | entries can be changed via a pair of proxy change request/ | |||
confirmation messages. These association and proxy change | confirmation messages. These association and proxy change | |||
messages must be approved by the central coordinator (PANC in this | messages must be approved by the central coordinator (PANC in this | |||
document). | document). | |||
o LOADng (The Lightweight On-demand Ad hoc Distance vector routing | * LOADng (Lightweight On-demand Ad hoc Distance vector routing | |||
protocol, Next Generation) is a reactive protocol operating at | protocol, Next Generation) is a reactive protocol operating at | |||
layer-2 or layer-3. Currently, LOADng is supported in ITU-T | Layer 2 or Layer 3. Currently, LOADng is supported in ITU-T | |||
G.9903 [ITU-T_G.9903], and the IEEE 1901.2 standard refers to | G.9903 [ITU-T_G.9903], and the IEEE 1901.2 standard refers to | |||
ITU-T G.9903 for LOAD-based networks. | ITU-T G.9903 for LOAD-based networks. | |||
4. IPv6 over PLC | 4. IPv6 over PLC | |||
A PLC node distinguishes between an IPv6 PDU and a non-IPv6 PDU based | A PLC node distinguishes between an IPv6 PDU and a non-IPv6 PDU based | |||
on the equivalent of a EtherType in a layer-2 PLC PDU. [RFC7973] | on the equivalent of an Ethertype in a Layer 2 PLC PDU. [RFC7973] | |||
defines a Ethertype of "A0ED" for LoWPAN encapsulation, and this | defines an Ethertype of "A0ED" for LoWPAN encapsulation, and this | |||
information can be carried in the IE field in the MAC header of | information can be carried in the IE field in the MAC header of | |||
[IEEE_1901.2] or [ITU-T_G.9903]. And regarding [IEEE_1901.1], the IP | [IEEE_1901.2] or [ITU-T_G.9903]. And regarding [IEEE_1901.1], the IP | |||
packet type has been defined with the corresponding MAC Service Data | packet type has been defined with the corresponding MAC Service Data | |||
Unit (MSDU) type value 49. And the 4-bit Internet Protocol version | Unit (MSDU) type value 49. And the 4-bit Internet Protocol version | |||
number in the IP header helps to distinguish between an IPv4 PDU and | number in the IP header helps to distinguish between an IPv4 PDU and | |||
an IPv6 PDU. | an IPv6 PDU. | |||
6LoWPAN and 6lo standards [RFC4944], [RFC6282], [RFC6775], and | 6LoWPAN and 6lo standards, as described in [RFC4944], [RFC6282], | |||
[RFC8505] provide useful functionality including link-local IPv6 | [RFC6775], and [RFC8505], provide useful functionality, including | |||
addresses, stateless address auto-configuration, neighbor discovery, | link-local IPv6 addresses, stateless address autoconfiguration, | |||
header compression, fragmentation, and reassembly. However, due to | neighbor discovery, header compression, fragmentation, and | |||
the different characteristics of the PLC media, the 6LoWPAN | reassembly. However, due to the different characteristics of the PLC | |||
adaptation layer, as it is, cannot perfectly fulfill the requirements | media, the 6LoWPAN adaptation layer, as it is, cannot perfectly | |||
of PLC environments. These considerations suggest the need for a | fulfill the requirements of PLC environments. These considerations | |||
dedicated adaptation layer for PLC, which is detailed in the | suggest the need for a dedicated adaptation layer for PLC, which is | |||
following subsections. | detailed in the following subsections. | |||
4.1. Stateless Address Autoconfiguration | 4.1. Stateless Address Autoconfiguration | |||
To obtain an IPv6 Interface Identifier (IID), a PLC device performs | To obtain an IPv6 Interface Identifier (IID), a PLC device performs | |||
stateless address autoconfiguration [RFC4944]. The autoconfiguration | stateless address autoconfiguration [RFC4944]. The autoconfiguration | |||
can be based on either a long or short link-layer address. | can be based on either a long or short link-layer address. | |||
The IID can be based on the device's 48-bit MAC address or its EUI-64 | The IID can be based on the device's 48-bit MAC address or its EUI-64 | |||
identifier [EUI-64]. A 48-bit MAC address MUST first be extended to | identifier [EUI-64]. A 48-bit MAC address MUST first be extended to | |||
a 64-bit Interface ID by inserting 0xFFFE at the fourth and fifth | a 64-bit IID by inserting 0xFFFE at the fourth and fifth octets as | |||
octets as specified in [RFC2464]. The IPv6 IID is derived from the | specified in [RFC2464]. The IPv6 IID is derived from the 64-bit IID | |||
64-bit Interface ID by inverting the U/L bit [RFC4291]. | by inverting the U/L (Universal/Local) bit [RFC4291]. | |||
For IEEE 1901.2 and ITU-T G.9903, a 48-bit "pseudo-address" is formed | For IEEE 1901.2 and ITU-T G.9903, a 48-bit "pseudo-address" is formed | |||
by the 16-bit PAN ID, 16 zero bits and the 16-bit short address as | by the 16-bit PAN ID, 16 zero bits, and the 16-bit short address as | |||
follows: | follows: | |||
16_bit_PAN:0000:16_bit_short_address | 16_bit_PAN:0000:16_bit_short_address | |||
Then, the 64-bit Interface ID MUST be derived by inserting 16-bit | Then, the 64-bit IID MUST be derived by inserting the 16-bit 0xFFFE | |||
0xFFFE into as follows: | into as follows: | |||
16_bit_PAN:00FF:FE00:16_bit_short_address | 16_bit_PAN:00FF:FE00:16_bit_short_address | |||
For the 12-bit short addresses used by IEEE 1901.1, the 48-bit | For the 12-bit short addresses used by IEEE 1901.1, the 48-bit | |||
pseudo-address is formed by 24-bit NID (Network IDentifier, YYYYYY), | pseudo-address is formed by a 24-bit NID (Network Identifier, | |||
12 zero bits and a 12-bit TEI (Terminal Equipment Identifier, XXX) as | YYYYYY), 12 zero bits, and a 12-bit TEI (Terminal Equipment | |||
follows: | Identifier, XXX) as follows: | |||
YYYY:YY00:0XXX | YYYY:YY00:0XXX | |||
The 64-bit Interface ID MUST be derived by inserting 16-bit 0xFFFE | The 64-bit IID MUST be derived by inserting the 16-bit 0xFFFE into | |||
into this 48-bit pseudo-address as follows: | this 48-bit pseudo-address as follows: | |||
YYYY:YYFF:FE00:0XXX | YYYY:YYFF:FE00:0XXX | |||
As investigated in [RFC7136], besides [RFC4291], some other IID | As investigated in [RFC7136], aside from the method discussed in | |||
generation methods defined in IETF do not imply any semantics for the | [RFC4291], other IID-generation methods defined by the IETF do not | |||
"Universal/Local" (U/L) bit (bit 6) and the Individual/Group bit (bit | imply any additional semantics for the Universal/Local (U/L) bit (bit | |||
7), so that these two bits are not reliable indicators for their | 6) and the Individual/Group bit (bit 7). Therefore, these two bits | |||
original meanings. Thus when using an IID derived by a short | are not reliable indicators. Thus, when using an IID derived by a | |||
address, the operators of the PLC network can choose to comply with | short address, the operators of the PLC network can choose whether or | |||
original meaning of these two bits or not. If so, since the IID | not to comply with the original meaning of these two bits. If they | |||
derived from the short address is not global, these two bits MUST | choose to comply with the original meaning, these two bits MUST both | |||
both be set to zero. In order to avoid any ambiguity in the derived | be set to zero, since the IID derived from the short address is not | |||
Interface ID, these two bits MUST NOT be a valid part of the PANID | global. In order to avoid any ambiguity in the derived IID, these | |||
(for IEEE 1901.2 and ITU-T G.9903) or NID (for IEEE 1901.1). For | two bits MUST NOT be a valid part of the PAN ID (for IEEE 1901.2 and | |||
example, the PANID or NID must always be chosen so that the two bits | ITU-T G.9903) or NID (for IEEE 1901.1). For example, the PAN ID or | |||
are zeros; or the high 6 bits in PANID or NID are left shifted by 2 | NID must always be chosen so that the two bits are zeros or the high | |||
bits. If not, the operator must be aware that these two bits are not | six bits in PAN ID or NID are left shifted by two bits. If they | |||
reliable indicators, and the IID cannot be transformed back into a | choose not to comply with the original meaning, the operator must be | |||
short link layer address via a reverse operation of the mechanism | aware that these two bits are not reliable indicators, and the IID | |||
presented above. However, the short address can still be obtained | cannot be transformed back into a short link-layer address via a | |||
via the Unicast Address Mapping mechanism in Section 4.3. | reverse operation of the mechanism presented above. However, the | |||
short address can still be obtained via the Unicast Address Mapping | ||||
mechanism described in Section 4.3. | ||||
For privacy reasons, the IID derived from the MAC address (with | For privacy reasons, the IID derived from the MAC address (with | |||
padding and bit clamping) SHOULD only be used for link-local address | padding and bit clamping) SHOULD only be used for link-local address | |||
configuration. A PLC host SHOULD use the IID derived from the link- | configuration. A PLC host SHOULD use the IID derived from the short | |||
layer short address to configure IPv6 addresses used for | link-layer address to configure IPv6 addresses used for communication | |||
communication with the public network; otherwise, the host's MAC | with the public network; otherwise, the host's MAC address is | |||
address is exposed. As per [RFC8065], when short addresses are used | exposed. As per [RFC8065], when short addresses are used on PLC | |||
on PLC links, a shared secret key or version number from the | links, a shared secret key or version number from the Authoritative | |||
Authoritative Border Router Option [RFC6775] can be used to improve | Border Router Option [RFC6775] can be used to improve the entropy of | |||
the entropy of the hash input, thus the generated IID can be spread | the hash input. Thus, the generated IID can be spread out to the | |||
out to the full range of the IID address space while stateless | full range of the IID address space while stateless address | |||
address compression is still allowed. The hash algorithm by default | compression is still allowed. By default, the hash algorithm SHOULD | |||
of the implementations SHOULD be SHA256, using the version number, | be SHA256, using the version number, the PAN ID or NID, and the short | |||
the PANID/NID and the short address as the input arguments, and the | address as the input arguments, and the 256-bit hash output is | |||
256-bits hash output is truncated into the IID by taking the high 64 | truncated into the IID by taking the high 64 bits. | |||
bits. | ||||
4.2. IPv6 Link Local Address | 4.2. IPv6 Link-Local Address | |||
The IPv6 link-local address [RFC4291] for a PLC interface is formed | The IPv6 link-local address [RFC4291] for a PLC interface is formed | |||
by appending the IID, as defined above, to the prefix FE80::/64 (see | by appending the IID, as defined above, to the prefix FE80::/64 (see | |||
Figure 2). | Figure 2). | |||
10 bits 54 bits 64 bits | 10 bits 54 bits 64 bits | |||
+----------+-----------------------+----------------------------+ | +----------+-----------------------+----------------------------+ | |||
|1111111010| (zeros) | Interface Identifier | | |1111111010| (zeros) | Interface Identifier | | |||
+----------+-----------------------+----------------------------+ | +----------+-----------------------+----------------------------+ | |||
Figure 2: IPv6 Link Local Address for a PLC interface | Figure 2: IPv6 Link-Local Address for a PLC Interface | |||
4.3. Unicast Address Mapping | 4.3. Unicast Address Mapping | |||
The address resolution procedure for mapping IPv6 unicast addresses | The address-resolution procedure for mapping IPv6 unicast addresses | |||
into PLC link-layer addresses follows the general description in | into PLC link-layer addresses follows the general description in | |||
section 7.2 of [RFC4861]. [RFC6775] improves this procedure by | Section 7.2 of [RFC4861]. [RFC6775] improves this procedure by | |||
eliminating usage of multicast NS. The resolution is realized by the | eliminating usage of multicast NS (Neighbor Solicitation). The | |||
NCEs (neighbor cache entry) created during the address registration | resolution is realized by the NCEs (neighbor cache entries) created | |||
at the routers. [RFC8505] further improves the registration | during the address registration at the routers. [RFC8505] further | |||
procedure by enabling multiple LLNs to form an IPv6 subnet, and by | improves the registration procedure by enabling multiple LLNs to form | |||
inserting a link-local address registration to better serve proxy | an IPv6 subnet and by inserting a link-local address registration to | |||
registration of new devices. | better serve proxy registration of new devices. | |||
4.3.1. Unicast Address Mapping for IEEE 1901.1 | 4.3.1. Unicast Address Mapping for IEEE 1901.1 | |||
The Source/Target Link-layer Address options for IEEE_1901.1 used in | The Source Link-Layer Address and Target Link-Layer Address options | |||
the Neighbor Solicitation and Neighbor Advertisement have the | for IEEE_1901.1 used in the NS and Neighbor Advertisement (NA) have | |||
following form. | the following form. | |||
0 1 2 3 | 0 1 2 3 | |||
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | |||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| Type | Length=1 | NID : | | Type | Length=1 | NID : | |||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
:NID (continued)| Padding (all zeros) | TEI | | :NID (continued)| Padding (all zeros) | TEI | | |||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
Figure 3: Unicast Address Mapping for IEEE 1901.1 | Figure 3: Unicast Address Mapping for IEEE 1901.1 | |||
Option fields: | Option fields: | |||
Type: 1 for Source Link-layer Address and 2 for Target Link-layer | Type: 1 for Source Link-Layer Address and 2 for Target Link-Layer | |||
Address. | Address. | |||
Length: The length of this option (including type and length fields) | Length: The length of this option (including Type and Length fields) | |||
in units of 8 octets. The value of this field is 1 for the | in units of 8 octets. The value of this field is 1 for the 12-bit | |||
12-bit IEEE 1901.1 PLC short addresses. | IEEE 1901.1 PLC short addresses. | |||
NID: 24-bit Network IDentifier | NID: 24-bit Network Identifier | |||
Padding: 12 zero bits | Padding: 12 zero bits | |||
TEI: 12-bit Terminal Equipment Identifier | TEI: 12-bit Terminal Equipment Identifier | |||
4.3.2. Unicast Address Mapping for IEEE 1901.2 and ITU-T G.9903 | 4.3.2. Unicast Address Mapping for IEEE 1901.2 and ITU-T G.9903 | |||
The Source/Target Link-layer Address options for IEEE_1901.2 and | The Source Link-Layer Address and Target Link-Layer Address options | |||
ITU-T G.9903 used in the Neighbor Solicitation and Neighbor | for IEEE_1901.2 and ITU-T G.9903 used in the NS and NA have the | |||
Advertisement have the following form. | following form. | |||
0 1 2 3 | 0 1 2 3 | |||
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | |||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| Type | Length=1 | PAN ID | | | Type | Length=1 | PAN ID | | |||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| Padding (all zeros) | Short Address | | | Padding (all zeros) | Short Address | | |||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
Figure 4: Unicast Address Mapping for IEEE 1901.2 | Figure 4: Unicast Address Mapping for IEEE 1901.2 | |||
Option fields: | Option fields: | |||
Type: 1 for Source Link-layer Address and 2 for Target Link-layer | Type: 1 for Source Link-Layer Address and 2 for Target Link-Layer | |||
Address. | Address. | |||
Length: The length of this option (including type and length fields) | Length: The length of this option (including Type and Length fields) | |||
in units of 8 octets. The value of this field is 1 for the | in units of 8 octets. The value of this field is 1 for the 16-bit | |||
16-bit IEEE 1901.2 PLC short addresses. | IEEE 1901.2 PLC short addresses. | |||
PAN ID: 16-bit PAN IDentifier | PAN ID: 16-bit PAN IDentifier | |||
Padding: 16 zero bits | Padding: 16 zero bits | |||
Short Address: 16-bit short address | Short Address: 16-bit short address | |||
4.4. Neighbor Discovery | 4.4. Neighbor Discovery | |||
Neighbor discovery procedures for 6LoWPAN networks are described in | Neighbor discovery procedures for 6LoWPAN networks are described in | |||
Neighbor Discovery Optimization for 6LoWPANs [RFC6775] and [RFC8505]. | [RFC6775] and [RFC8505]. These optimizations support the | |||
These optimizations support the registration of sleeping hosts. | registration of sleeping hosts. Although PLC devices are | |||
Although PLC devices are electrically powered, sleeping mode SHOULD | electrically powered, sleeping mode SHOULD still be used for power | |||
still be used for power saving. | saving. | |||
For IPv6 prefix dissemination, Router Solicitations (RS) and Router | For IPv6 prefix dissemination, Router Solicitations (RSs) and Router | |||
Advertisements (RA) MAY be used as per [RFC6775]. If the PLC network | Advertisements (RAs) MAY be used as per [RFC6775]. If the PLC | |||
uses route-over, the IPv6 prefix MAY be disseminated by the layer-3 | network uses route-over mode, the IPv6 prefix MAY be disseminated by | |||
routing protocol, such as RPL, which may include the prefix in the | the Layer 3 routing protocol, such as RPL, which may include the | |||
DIO (DODAG Information Object) message. As per [RFC9010], it is | prefix in the DIO (DODAG Information Object) message. As per | |||
possible to have PLC devices configured as RPL-unaware-leaves, which | [RFC9010], it is possible to have PLC devices configured as RPL- | |||
do not participate in RPL at all, along with RPL-aware PLC devices. | unaware leaves, which do not participate in RPL at all, along with | |||
In this case, the prefix dissemination SHOULD use the RS/RA messages. | RPL-aware PLC devices. In this case, the prefix dissemination SHOULD | |||
use the RS/RA messages. | ||||
For context information dissemination, Router Advertisements (RA) | For dissemination of context information, RAs MUST be used as per | |||
MUST be used as per [RFC6775]. The 6LoWPAN context option (6CO) MUST | [RFC6775]. The 6LoWPAN context option (6CO) MUST be included in the | |||
be included in the RA to disseminate the Context IDs used for prefix | RA to disseminate the Context IDs used for prefix and/or address | |||
and/or address compression. | compression. | |||
For address registration in route-over mode, a PLC device MUST | For address registration in route-over mode, a PLC device MUST | |||
register its addresses by sending a unicast link-local Neighbor | register its addresses by sending a unicast link-local NS to the 6LR. | |||
Solicitation to the 6LR. If the registered address is link-local, | If the registered address is link local, the 6LR SHOULD NOT further | |||
the 6LR SHOULD NOT further register it to the registrar (6LBR, 6BBR). | register it to the registrar (6LBR or 6BBR). Otherwise, the address | |||
Otherwise, the address MUST be registered via an ARO or EARO included | MUST be registered via an ARO (Address Registration Option) or EARO | |||
in the DAR ([RFC6775]) or EDAR ([RFC8505]) messages. For RFC8505 | (Extended Address Registration Option) included in the DAR (Duplicate | |||
compliant PLC devices, the 'R' flag in the EARO MUST be set when | Address Request) [RFC6775] or EDAR (Extended Duplicate Address | |||
sending Neighbor Solicitations in order to extract the status | Request) [RFC8505] messages. For PLC devices compliant with | |||
information in the replied Neighbor Advertisements from the 6LR. If | [RFC8505], the 'R' flag in the EARO MUST be set when sending NSs in | |||
DHCPv6 is used to assign addresses or the IPv6 address is derived | order to extract the status information in the replied NAs from the | |||
from unique long or short link layer address, Duplicate Address | 6LR. If DHCPv6 is used to assign addresses or the IPv6 address is | |||
Detection (DAD) SHOULD NOT be utilized. Otherwise, the DAD MUST be | derived from the unique long or short link-layer address, Duplicate | |||
performed at the 6LBR (as per [RFC6775]) or proxied by the routing | Address Detection (DAD) SHOULD NOT be utilized. Otherwise, DAD MUST | |||
be performed at the 6LBR (as per [RFC6775]) or proxied by the routing | ||||
registrar (as per [RFC8505]). The registration status is fed back | registrar (as per [RFC8505]). The registration status is fed back | |||
via the DAC or EDAC message from the 6LBR and the Neighbor | via the DAC (Duplicate Address Confirmation) or EDAC (Extended | |||
Advertisement (NA) from the 6LR. The section 6 of [RFC8505] how | Duplicate Address Confirmation) message from the 6LBR and the NA from | |||
RFC6775-only devices work with RFC8505-updated devices. | the 6LR. Section 6 of [RFC8505] shows how devices that only behave | |||
as specified in [RFC6775] can work with devices that have been | ||||
updated per [RFC8505]. | ||||
For address registration in mesh-under mode, since all the PLC | For address registration in mesh-under mode, since all the PLC | |||
devices are link-local neighbors to the 6LBR, DAR/DAC or EDAR/EDAC | devices are link-local neighbors to the 6LBR, DAR/DAC or EDAR/EDAC | |||
messages are not required. A PLC device MUST register its addresses | messages are not required. A PLC device MUST register its addresses | |||
by sending a unicast NS message with an ARO or EARO. The | by sending a unicast NS message with an ARO or EARO. The | |||
registration status is fed back via the NA message from the 6LBR. | registration status is fed back via the NA message from the 6LBR. | |||
4.5. Header Compression | 4.5. Header Compression | |||
The compression of IPv6 datagrams within PLC MAC frames refers to | IPv6 header compression in PLC is based on [RFC6282] (which updates | |||
[RFC6282], which updates [RFC4944]. Header compression as defined in | [RFC4944]). [RFC6282] specifies the compression format for IPv6 | |||
[RFC6282] which specifies the compression format for IPv6 datagrams | datagrams on top of IEEE 802.15.4; therefore, this format is used for | |||
on top of IEEE 802.15.4, is the basis for IPv6 header compression in | compression of IPv6 datagrams within PLC MAC frames. For situations | |||
PLC. For situations when PLC MAC MTU cannot support the 1280-octet | when the PLC MAC MTU cannot support the 1280-octet IPv6 packet, the | |||
IPv6 packet, headers MUST be compressed according to [RFC6282] | headers MUST be compressed according to the encoding formats | |||
encoding formats, including the Dispatch Header, the LOWPAN_IPHC and | specified in [RFC6282], including the Dispatch Header, the | |||
the compression residu carried in-line. | LOWPAN_IPHC, and the compression residue carried inline. | |||
For IEEE 1901.2 and G.9903, the IP header compression follows the | For IEEE 1901.2 and ITU-T G.9903, the IP header compression follows | |||
instruction in [RFC6282]. However, additional adaptation MUST be | the instruction in [RFC6282]. However, additional adaptation MUST be | |||
considered for IEEE 1901.1 since it has a short address of 12 bits | considered for IEEE 1901.1 since it has a short address of 12 bits | |||
instead of 16 bits. The only modification is the semantics of the | instead of 16 bits. The only modification is the semantics of the | |||
"Source Address Mode" and the "Destination Address Mode" when set as | "Source Address Mode" and the "Destination Address Mode" when set as | |||
"10" in the section 3.1 of [RFC6282], which is illustrated as | "10" in Section 3.1 of [RFC6282], which is illustrated as follows. | |||
following. | ||||
SAM: Source Address Mode: | SAM: Source Address Mode: | |||
If SAC=0: Stateless compression | If SAC=0: Stateless compression | |||
10: 16 bits. The first 112 bits of the address are elided. The | 10: 16 bits. The first 112 bits of the address are elided. The | |||
value of the first 64 bits is the link-local prefix padded with | value of the first 64 bits is the link-local prefix padded with | |||
zeros. The following 64 bits are 0000:00ff:fe00:0XXX, where | zeros. The following 64 bits are 0000:00ff:fe00:0XXX, where | |||
0XXX are the 16 bits carried in-line, in which the first 4 bits | 0XXX are the 16 bits carried inline, in which the first 4 bits | |||
are zero. | are zero. | |||
If SAC=1: stateful context-based compression | If SAC=1: Stateful context-based compression | |||
10: 16 bits. The address is derived using context information and | 10: 16 bits. The address is derived using context information and | |||
the 16 bits carried in-line. Bits covered by context | the 16 bits carried inline. Bits covered by context | |||
information are always used. Any IID bits not covered by | information are always used. Any IID bits not covered by | |||
context information are taken directly from their corresponding | context information are taken directly from their corresponding | |||
bits in the 16-bit to IID mapping given by 0000:00ff:fe00:0XXX, | bits in the mapping between the 16-bit short address and the | |||
where 0XXX are the 16 bits carried in-line, in which the first | IID as provided by 0000:00ff:fe00:0XXX, where 0XXX are the 16 | |||
4 bits are zero. Any remaining bits are zero. | bits carried inline, in which the first 4 bits are zero. Any | |||
remaining bits are zero. | ||||
DAM: Destination Address Mode: | DAM: Destination Address Mode: | |||
If M=0 and DAC=0: Stateless compression | If M=0 and DAC=0: Stateless compression | |||
10: 16 bits. The first 112 bits of the address are elided. The | 10: 16 bits. The first 112 bits of the address are elided. The | |||
value of the first 64 bits is the link-local prefix padded with | value of the first 64 bits is the link-local prefix padded with | |||
zeros. The following 64 bits are 0000:00ff: fe00:0XXX, where | zeros. The following 64 bits are 0000:00ff:fe00:0XXX, where | |||
0XXX are the 16 bits carried in-line, in which the first 4 bits | 0XXX are the 16 bits carried inline, in which the first 4 bits | |||
are zero. | are zero. | |||
If M=0 and DAC=1: stateful context-based compression | If M=0 and DAC=1: Stateful context-based compression | |||
10: 16 bits. The address is derived using context information and | 10: 16 bits. The address is derived using context information and | |||
the 16 bits carried in-line. Bits covered by context | the 16 bits carried inline. Bits covered by context | |||
information are always used. Any IID bits not covered by | information are always used. Any IID bits not covered by | |||
context information are taken directly from their corresponding | context information are taken directly from their corresponding | |||
bits in the 16-bit to IID mapping given by 0000:00ff:fe00:0XXX, | bits in the mapping between the 16-bit short address and the | |||
where 0XXX are the 16 bits carried in- line, in which the first | IID as provided by 0000:00ff:fe00:0XXX, where 0XXX are the 16 | |||
4 bits are zero. Any remaining bits are zero. | bits carried inline, in which the first 4 bits are zero. Any | |||
remaining bits are zero. | ||||
4.6. Fragmentation and Reassembly | 4.6. Fragmentation and Reassembly | |||
The constrained PLC MAC layer provides the function of fragmentation | The constrained PLC MAC layer provides the functions of fragmentation | |||
and reassembly. However, fragmentation and reassembly is still | and reassembly. However, fragmentation and reassembly are still | |||
required at the adaptation layer, if the MAC layer cannot support the | required at the adaptation layer if the MAC layer cannot support the | |||
minimum MTU demanded by IPv6, which is 1280 octets. | minimum MTU demanded by IPv6, which is 1280 octets. | |||
In IEEE 1901.1 and IEEE 1901.2, the MAC layer supports payloads as | In IEEE 1901.1 and IEEE 1901.2, the MAC layer supports payloads as | |||
big as 2031 octets and 1576 octets respectively. However, when the | big as 2031 octets and 1576 octets, respectively. However, when the | |||
channel condition is noisy, smaller packets have higher transmission | channel condition is noisy, smaller packets have a higher | |||
success rate, the operator can choose to configure smaller MTU at the | transmission success rate, and the operator can choose to configure | |||
MAC layer. If the configured MTU is smaller than 1280 octets, the | smaller MTU at the MAC layer. If the configured MTU is smaller than | |||
fragmentation and reassembly defined in [RFC4944] MUST be used. | 1280 octets, the fragmentation and reassembly defined in [RFC4944] | |||
MUST be used. | ||||
In ITU-T G.9903, the maximum MAC payload size is fixed to 400 octets, | In ITU-T G.9903, the maximum MAC payload size is fixed to 400 octets, | |||
so to cope with the required MTU of 1280 octets by IPv6, | so to cope with the required MTU of 1280 octets by IPv6, | |||
fragmentation and reassembly at the 6lo adaptation layer MUST be | fragmentation and reassembly at the 6lo adaptation layer MUST be | |||
provided as specified in [RFC4944]. | provided as specified in [RFC4944]. | |||
[RFC4944] uses a 16-bit datagram tag to identify the fragments of the | [RFC4944] uses a 16-bit datagram tag to identify the fragments of the | |||
same IP packet. [RFC4963] specifies that at high data rates, the | same IP packet. [RFC4963] specifies that at high data rates, the | |||
16-bit IP identification field is not large enough to prevent | 16-bit IP identification field is not large enough to prevent | |||
frequent incorrectly assembled IP fragments. For constrained PLC, | frequent incorrectly assembled IP fragments. For constrained PLC, | |||
the data rate is much lower than the situation mentioned in RFC4963, | the data rate is much lower than the situation mentioned in | |||
thus the 16-bit tag is sufficient to assemble the fragments | [RFC4963]; thus, the 16-bit tag is sufficient to assemble the | |||
correctly. | fragments correctly. | |||
5. Internet Connectivity Scenarios and Topologies | 5. Internet Connectivity Scenarios and Topologies | |||
The PLC network model can be simplified to two kinds of network | The PLC network model can be simplified to two kinds of network | |||
device: PAN Coordinator (PANC) and PLC Device. The PANC is the | devices: PAN Coordinator (PANC) and PLC device. The PANC is the | |||
primary coordinator of the PLC subnet and can be seen as a primary | primary coordinator of the PLC subnet and can be seen as a primary | |||
node; PLC Devices are typically PLC meters and sensors. The address | node; PLC devices are typically PLC meters and sensors. The address | |||
registration and DAD features can also be deployed on the PANC, for | registration and DAD features can also be deployed on the PANC, for | |||
example the 6LBR [RFC6775] or the routing registrar in [RFC8505]. | example, the 6LBR [RFC6775] or the routing registrar [RFC8505]. IPv6 | |||
IPv6 over PLC networks are built as trees, meshes or stars topology | over PLC networks are built as tree, mesh, or star topologies | |||
according to the use cases. Generally, each PLC network has one | according to the use cases. Generally, each PLC network has one | |||
PANC. In some cases, the PLC network can have alternate coordinators | PANC. In some cases, the PLC network can have alternate coordinators | |||
to replace the PANC when the PANC leaves the network for some reason. | to replace the PANC when the PANC leaves the network for some reason. | |||
Note that the PLC topologies in this section are based on logical | Note that the PLC topologies in this section are based on logical | |||
connectivity, not physical links. The term "PLC subnet" refers to a | connectivity, not physical links. The term "PLC subnet" refers to a | |||
multilink subnet, in which the PLC devices share the same address | multilink subnet, in which the PLC devices share the same address | |||
prefix. | prefix. | |||
The star topology is common in current PLC scenarios. In single-hop | The star topology is common in current PLC scenarios. In single-hop | |||
star topologies, communication at the link layer only takes place | star topologies, communication at the link layer only takes place | |||
between a PLC Device and a PANC. The PANC typically collects data | between a PLC device and a PANC. The PANC typically collects data | |||
(e.g., a meter reading) from the PLC devices, and then concentrates | (e.g., a meter reading) from the PLC devices and then concentrates | |||
and uploads the data through Ethernet or Cellular networks (see | and uploads the data through Ethernet or cellular networks (see | |||
Figure 5). The collected data is transmitted by the smart meters | Figure 5). The collected data is transmitted by the smart meters | |||
through PLC, aggregated by a concentrator, sent to the utility and | through PLC, aggregated by a concentrator, and sent to the utility | |||
then to a Meter Data Management System for data storage, analysis and | and then to a Meter Data Management System for data storage, | |||
billing. This topology has been widely applied in the deployment of | analysis, and billing. This topology has been widely applied in the | |||
smart meters, especially in apartment buildings. | deployment of smart meters, especially in apartment buildings. | |||
PLC Device PLC Device | PLC Device PLC Device | |||
\ / +--------- | \ / +--------- | |||
\ / / | \ / / | |||
\ / + | \ / + | |||
\ / | | \ / | | |||
PLC Device ------ PANC ===========+ Internet | PLC Device ------ PANC ===========+ Internet | |||
/ \ | | / \ | | |||
/ \ + | / \ + | |||
/ \ \ | / \ \ | |||
/ \ +--------- | / \ +--------- | |||
PLC Device PLC Device | PLC Device PLC Device | |||
<----------------------> | <----------------------> | |||
PLC subnet (IPv6 over PLC) | PLC subnet (IPv6 over PLC) | |||
Figure 5: PLC Star Network connected to the Internet | Figure 5: PLC Star Network Connected to the Internet | |||
A tree topology is useful when the distance between a device A and | A tree topology is useful when the distance between a device A and | |||
the PANC is beyond the PLC allowed limit and there is another device | the PANC is beyond the PLC-allowed limit and there is another device | |||
B in between able to communicate with both sides. Device B in this | B in between able to communicate with both sides. Device B in this | |||
case acts both as a PLC Device and a Coordinator. For this scenario, | case acts as both a PLC device and a Coordinator. For this scenario, | |||
the link layer communications take place between device A and device | the link-layer communications take place between device A and device | |||
B, and between device B and PANC. An example of a PLC tree network | B, and between device B and PANC. An example of a PLC tree network | |||
is depicted in Figure 6. This topology can be applied in smart | is depicted in Figure 6. This topology can be applied in smart | |||
street lighting, where the lights adjust the brightness to reduce | street lighting, where the lights adjust the brightness to reduce | |||
energy consumption while sensors are deployed on the street-lights to | energy consumption while sensors are deployed on the street lights to | |||
provide information such as light intensity, temperature, and | provide information such as light intensity, temperature, and | |||
humidity. The data transmission distance in the street lighting | humidity. The data-transmission distance in the street lighting | |||
scenario is normally above several kilometers, thus a PLC tree | scenario is normally above several kilometers; thus, a PLC tree | |||
network is required. A more sophisticated AMI network may also be | network is required. A more sophisticated AMI network may also be | |||
constructed into the tree topology which is depicted in [RFC8036]. A | constructed into the tree topology that is depicted in [RFC8036]. A | |||
tree topology is suitable for AMI scenarios that require large | tree topology is suitable for AMI scenarios that require large | |||
coverage but low density, e.g., the deployment of smart meters in | coverage but low density, e.g., the deployment of smart meters in | |||
rural areas. RPL is suitable for maintenance of a tree topology in | rural areas. RPL is suitable for maintenance of a tree topology in | |||
which there is no need for communication directly between PAN | which there is no need for communication directly between PAN | |||
devices. | devices. | |||
PLC Device | PLC Device | |||
\ +--------- | \ +--------- | |||
PLC Device A \ / | PLC Device A \ / | |||
\ \ + | \ \ + | |||
skipping to change at page 16, line 20 ¶ | skipping to change at line 704 ¶ | |||
PLC Device B -- PANC ===========+ Internet | PLC Device B -- PANC ===========+ Internet | |||
/ / | | / / | | |||
/ / + | / / + | |||
PLC Device---PLC Device / \ | PLC Device---PLC Device / \ | |||
/ +--------- | / +--------- | |||
PLC Device---PLC Device | PLC Device---PLC Device | |||
<-------------------------> | <-------------------------> | |||
PLC subnet (IPv6 over PLC) | PLC subnet (IPv6 over PLC) | |||
Figure 6: PLC Tree Network connected to the Internet | Figure 6: PLC Tree Network Connected to the Internet | |||
Mesh networking in PLC is of great potential applications and has | Mesh networking in PLC has many potential applications and has been | |||
been studied for several years. By connecting all nodes with their | studied for several years. By connecting all nodes with their | |||
neighbors in communication range (see Figure 7), a mesh topology | neighbors in communication range (see Figure 7), a mesh topology | |||
dramatically enhances the communication efficiency and thus expands | dramatically enhances the communication efficiency and thus expands | |||
the size of PLC networks. A simple use case is the smart home | the size of PLC networks. A simple use case is the smart home | |||
scenario where the ON/OFF state of air conditioning is controlled by | scenario where the ON/OFF state of air conditioning is controlled by | |||
the state of home lights (ON/OFF) and doors (OPEN/CLOSE). AODV-RPL | the state of home lights (ON/OFF) and doors (OPEN/CLOSE). AODV-RPL | |||
([I-D.ietf-roll-aodv-rpl]) enables direct PLC device to PLC device | [AODV-RPL] enables direct communication between PLC devices, without | |||
communication, without being obliged to transmit frames through the | being obliged to transmit frames through the PANC, which is a | |||
PANC, which is a requirement often cited for AMI infrastructure. | requirement often cited for the AMI infrastructure. | |||
PLC Device---PLC Device | PLC Device---PLC Device | |||
/ \ / \ +--------- | / \ / \ +--------- | |||
/ \ / \ / | / \ / \ / | |||
/ \ / \ + | / \ / \ + | |||
/ \ / \ | | / \ / \ | | |||
PLC Device--PLC Device---PANC ===========+ Internet | PLC Device--PLC Device---PANC ===========+ Internet | |||
\ / \ / | | \ / \ / | | |||
\ / \ / + | \ / \ / + | |||
\ / \ / \ | \ / \ / \ | |||
\ / \ / +--------- | \ / \ / +--------- | |||
PLC Device---PLC Device | PLC Device---PLC Device | |||
<-------------------------------> | <-------------------------------> | |||
PLC subnet (IPv6 over PLC) | PLC subnet (IPv6 over PLC) | |||
Figure 7: PLC Mesh Network connected to the Internet | Figure 7: PLC Mesh Network Connected to the Internet | |||
6. Operations and Manageability Considerations | 6. Operations and Manageability Considerations | |||
The constrained PLC networks are not managed in the same way as an | Constrained PLC networks are not managed in the same way as | |||
enterprise network or a carrier network. Constrained PLC networks, | enterprise networks or carrier networks. Constrained PLC networks, | |||
like the other IoT networks, are designed to be self-organized and | like the other IoT networks, are designed to be self-organized and | |||
self-managed. The software or firmware is flashed into the devices | self-managed. The software or firmware is flashed into the devices | |||
before deployment by the vendor or operator. And during the | before deployment by the vendor or operator. And during the | |||
deployment process, the devices are bootstrapped, and no extra | deployment process, the devices are bootstrapped, and no extra | |||
configuration is needed to get the devices connected to each other. | configuration is needed to get the devices connected to each other. | |||
Once a device becomes offline, it goes back to the bootstrapping | Once a device becomes offline, it goes back to the bootstrapping | |||
stage and tries to rejoin the network. The onboarding status of the | stage and tries to rejoin the network. The onboarding status of the | |||
devices and the topology of the PLC network can be visualized via the | devices and the topology of the PLC network can be visualized via the | |||
PANC. The recently-formed iotops WG in IETF is aiming to identify | PANC. The recently formed IOTOPS WG in the IETF aims to identify the | |||
the requirements in IoT network management, and operational practices | requirements in IoT network management, and operational practices | |||
will be published. Developers and operators of PLC networks should | will be published. Developers and operators of PLC networks should | |||
be able to learn operational experiences from this WG. | be able to learn operational experiences from this WG. | |||
7. IANA Considerations | 7. IANA Considerations | |||
There are no IANA considerations related to this document. | This document has no IANA actions. | |||
8. Security Considerations | 8. Security Considerations | |||
Due to the high accessibility of power grids, PLC might be | Due to the high accessibility of power grids, PLC might be | |||
susceptible to eavesdropping within its communication coverage, e.g., | susceptible to eavesdropping within its communication coverage, e.g., | |||
one apartment tenant may have the chance to monitor the other smart | one apartment tenant may have the chance to monitor the other smart | |||
meters in the same apartment building. Link layer security | meters in the same apartment building. Link-layer security | |||
mechanisms, such as payload encryption and devcie authentication, are | mechanisms, such as payload encryption and device authentication, are | |||
designed in the PLC technologies mentioned in this document. | designed in the PLC technologies mentioned in this document. | |||
Additionally, on-path malicious PLC device could eavesdrop or modify | Additionally, an on-path malicious PLC device could eavesdrop or | |||
packets sent through it if appropriate confidentiality and integrity | modify packets sent through it if appropriate confidentiality and | |||
mechanisms are not implemented. | integrity mechanisms are not implemented. | |||
Malicious PLC devices could paralyze the whole network via DOS | Malicious PLC devices could paralyze the whole network via DoS | |||
attacks, e.g., keep joining and leaving the network frequently, or | attacks, e.g., keep joining and leaving the network frequently or | |||
sending multicast routing messages containing fake metrics. A device | sending multicast routing messages containing fake metrics. A device | |||
may also inadvertently join a wrong or even malicious network, | may also inadvertently join a wrong or even malicious network, | |||
exposing its data to malicious users. When communicating with a | exposing its data to malicious users. When communicating with a | |||
device outside the PLC network, the traffic has to go through the | device outside the PLC network, the traffic has to go through the | |||
PANC. Thus the PANC must be a trusted entity. Moreover, the PLC | PANC. Thus, the PANC must be a trusted entity. Moreover, the PLC | |||
network must prevent malicious devices to join in the network. Thus | network must prevent malicious devices from joining the network. | |||
Mutual authentication of a PLC network and a new device is important, | Thus, mutual authentication of a PLC network and a new device is | |||
and it can be conducted during the onboarding process of the new | important, and it can be conducted during the onboarding process of | |||
device. Methods include protocols such as [RFC7925] (exchanging pre- | the new device. Methods include protocols such as the TLS/DTLS | |||
installed certificates over DTLS), [I-D.ietf-6tisch-minimal-security] | Profile [RFC7925] (exchanging pre-installed certificates over DTLS), | |||
(which uses pre-shared keys), and | the Constrained Join Protocol (CoJP) [RFC9031] (which uses pre-shared | |||
[I-D.ietf-6tisch-dtsecurity-zerotouch-join] (a IoT version of BRSKI, | keys), and Zero-Touch Secure Join [ZEROTOUCH] (an IoT version of the | |||
which uses IDevID and MASA service to facilitate authentication). It | Bootstrapping Remote Secure Key Infrastructure (BRSKI), which uses an | |||
is also possible to use EAP methods such as [I-D.ietf-emu-eap-noob] | Initial Device Identifier (IDevID) and a Manufacturer Authorized | |||
via transports like PANA [RFC5191]. No specific mechanism is | Signing Authority (MASA) service to facilitate authentication). It | |||
specified by this document, as an appropriate mechanism will depend | is also possible to use Extensible Authentication Protocol (EAP) | |||
upon deployment circumstances. In some cases, the PLC devices can be | methods such as the one defined in [RFC9140] via transports like | |||
deployed in uncontrolled places, where the devices may be accessed | Protocol for Carrying Authentication for Network Access (PANA) | |||
physically and be compromised via key extraction. Since the | [RFC5191]. No specific mechanism is specified by this document, as | |||
compromised device may be still able to join in the network since its | an appropriate mechanism will depend upon deployment circumstances. | |||
credentials are still valid. When group-shared symmetric keys are | In some cases, the PLC devices can be deployed in uncontrolled | |||
used in the network, the consequence is even more severe, i.e., the | places, where the devices may be accessed physically and be | |||
whole network or a large part of the network is at risk. Thus in | compromised via key extraction. The compromised device may be still | |||
scenarios where the physical attacks is considered to be relatively | able to join in the network since its credentials are still valid. | |||
highly possible, per device credentials SHOULD be used. Moreover, | When group-shared symmetric keys are used in the network, the | |||
additional end-to-end security services" is a complementary to the | consequence is even more severe, i.e., the whole network or a large | |||
network side security mechanisms, e.g., if a devices is compromised | part of the network is at risk. Thus, in scenarios where physical | |||
and it has joined in the network, and then it claims itself as the | attacks are considered to be relatively highly possible, per-device | |||
PANC and try to make the rest devices join its network. In this | credentials SHOULD be used. Moreover, additional end-to-end security | |||
situation, the real PANC can send an alarm to the operator to | services are complementary to the network-side security mechanisms, | |||
acknowledge the risk. Other behavior analysis mechanisms can be | e.g., if a device is compromised and has joined in the network, and | |||
deployed to recoginize the malicious PLC devices by inspecting the | then it claims itself as the PANC and tries to make the rest of the | |||
packets and the data. | devices join its network. In this situation, the real PANC can send | |||
an alarm to the operator to acknowledge the risk. Other behavior- | ||||
analysis mechanisms can be deployed to recognize the malicious PLC | ||||
devices by inspecting the packets and the data. | ||||
IP addresses may be used to track devices on the Internet; such | IP addresses may be used to track devices on the Internet; such | |||
devices can often in turn be linked to individuals and their | devices can often in turn be linked to individuals and their | |||
activities. Depending on the application and the actual use pattern, | activities. Depending on the application and the actual use pattern, | |||
this may be undesirable. To impede tracking, globally unique and | this may be undesirable. To impede tracking, globally unique and | |||
non-changing characteristics of IP addresses should be avoided, e.g., | non-changing characteristics of IP addresses should be avoided, e.g., | |||
by frequently changing the global prefix and avoiding unique link- | by frequently changing the global prefix and avoiding unique link- | |||
layer derived IIDs in addresses. [RFC8065] discusses the privacy | layer derived IIDs in addresses. [RFC8065] discusses the privacy | |||
threats when interface identifiers (IID) are generated without | threats when an IID is generated without sufficient entropy, | |||
sufficient entropy, including correlation of activities over time, | including correlation of activities over time, location tracking, | |||
location tracking, device-specific vulnerability exploitation, and | device-specific vulnerability exploitation, and address scanning. | |||
address scanning. And an effective way to deal with these threats is | And an effective way to deal with these threats is to have enough | |||
to have enough entropy in the IID compairing to the link lifetime. | entropy in the IID compared to the link lifetime. Consider a PLC | |||
Consider a PLC network with 1024 devices and its link lifetime is 8 | network with 1024 devices and a link lifetime is 8 years, according | |||
years, according to the formula in RFC8065, an entropy of 40 bits is | to the formula in [RFC8065], an entropy of 40 bits is sufficient. | |||
sufficient. Padding the short address (12 or 16 bits) to generate | Padding the short address (12 or 16 bits) to generate the IID of a | |||
the IID of a routable IPv6 address in the public network may be | routable IPv6 address in the public network may be vulnerable to deal | |||
vulnerable to deal with address scans. Thus as suggest in the | with address scans. Thus, as suggested in Section 4.1, a hash | |||
section 4.1, a hash function can be used to generate a 64 bits IID. | function can be used to generate a 64-bit IID. When the version | |||
When the version number of the PLC network is changed, the IPv6 | number of the PLC network is changed, the IPv6 addresses can be | |||
addresses can be changed as well. Other schemes such as limited | changed as well. Other schemes such as limited lease period in | |||
lease period in DHCPv6 [RFC8415], Cryptographically Generated | DHCPv6 [RFC8415], Cryptographically Generated Addresses (CGAs) | |||
Addresses (CGAs) [RFC3972], Temporary Address Extensions [RFC8981], | [RFC3972], Temporary Address Extensions [RFC8981], Hash-Based | |||
Hash-Based Addresses (HBAs) [RFC5535], or semantically opaque | Addresses (HBAs) [RFC5535], or semantically opaque addresses | |||
addresses [RFC7217] SHOULD be used to enhance the IID privacy. | [RFC7217] SHOULD be used to enhance the IID privacy. | |||
9. Acknowledgements | ||||
We gratefully acknowledge suggestions from the members of the IETF | ||||
6lo working group. Great thanks to Samita Chakrabarti and Gabriel | ||||
Montenegro for their feedback and support in connecting the IEEE and | ||||
ITU-T sides. The authors thank Scott Mansfield, Ralph Droms, and Pat | ||||
Kinney for their guidance in the liaison process. The authors wish | ||||
to thank Stefano Galli, Thierry Lys, Yizhou Li, Yuefeng Wu, and | ||||
Michael Richardson for their valuable comments and contributions. | ||||
10. References | 9. References | |||
10.1. Normative References | 9.1. Normative References | |||
[IEEE_1901.1] | [IEEE_1901.1] | |||
IEEE-SA Standards Board, "Standard for Medium Frequency | IEEE, "IEEE Standard for Medium Frequency (less than 12 | |||
(less than 15 MHz) Power Line Communications for Smart | MHz) Power Line Communications for Smart Grid | |||
Grid Applications", IEEE 1901.1, May 2018, | Applications", DOI 10.1109/IEEESTD.2018.8360785, IEEE | |||
Std 1901.1, May 2018, | ||||
<https://ieeexplore.ieee.org/document/8360785>. | <https://ieeexplore.ieee.org/document/8360785>. | |||
[IEEE_1901.2] | [IEEE_1901.2] | |||
IEEE-SA Standards Board, "IEEE Standard for Low-Frequency | IEEE, "IEEE Standard for Low-Frequency (less than 500 kHz) | |||
(less than 500 kHz) Narrowband Power Line Communications | Narrowband Power Line Communications for Smart Grid | |||
for Smart Grid Applications", IEEE 1901.2, October 2013, | Applications", DOI 10.1109/IEEESTD.2013.6679210, IEEE | |||
<https://standards.ieee.org/findstds/ | Std 1901.2, December 2013, | |||
standard/1901.2-2013.html>. | <https://ieeexplore.ieee.org/document/6679210>. | |||
[ITU-T_G.9903] | [ITU-T_G.9903] | |||
International Telecommunication Union, "Narrowband | ITU-T, "Narrowband orthogonal frequency division | |||
orthogonal frequency division multiplexing power line | multiplexing power line communication transceivers for | |||
communication transceivers for G3-PLC networks", | G3-PLC networks", ITU-T Recommendation G.9903, August | |||
ITU-T G.9903, August 2017, | 2017, <https://www.itu.int/rec/T-REC-G.9903>. | |||
<https://www.itu.int/rec/T-REC-G.9903>. | ||||
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | [RFC2119] Bradner, S. and RFC Publisher, "Key words for use in RFCs | |||
Requirement Levels", BCP 14, RFC 2119, | to Indicate Requirement Levels", BCP 14, RFC 2119, | |||
DOI 10.17487/RFC2119, March 1997, | DOI 10.17487/RFC2119, March 1997, | |||
<https://www.rfc-editor.org/info/rfc2119>. | <https://www.rfc-editor.org/info/rfc2119>. | |||
[RFC2464] Crawford, M., "Transmission of IPv6 Packets over Ethernet | [RFC2464] Crawford, M. and RFC Publisher, "Transmission of IPv6 | |||
Networks", RFC 2464, DOI 10.17487/RFC2464, December 1998, | Packets over Ethernet Networks", RFC 2464, | |||
DOI 10.17487/RFC2464, December 1998, | ||||
<https://www.rfc-editor.org/info/rfc2464>. | <https://www.rfc-editor.org/info/rfc2464>. | |||
[RFC4291] Hinden, R. and S. Deering, "IP Version 6 Addressing | [RFC4291] Hinden, R., Deering, S., and RFC Publisher, "IP Version 6 | |||
Architecture", RFC 4291, DOI 10.17487/RFC4291, February | Addressing Architecture", RFC 4291, DOI 10.17487/RFC4291, | |||
2006, <https://www.rfc-editor.org/info/rfc4291>. | February 2006, <https://www.rfc-editor.org/info/rfc4291>. | |||
[RFC4861] Narten, T., Nordmark, E., Simpson, W., and H. Soliman, | [RFC4861] Narten, T., Nordmark, E., Simpson, W., Soliman, H., and | |||
"Neighbor Discovery for IP version 6 (IPv6)", RFC 4861, | RFC Publisher, "Neighbor Discovery for IP version 6 | |||
DOI 10.17487/RFC4861, September 2007, | (IPv6)", RFC 4861, DOI 10.17487/RFC4861, September 2007, | |||
<https://www.rfc-editor.org/info/rfc4861>. | <https://www.rfc-editor.org/info/rfc4861>. | |||
[RFC4944] Montenegro, G., Kushalnagar, N., Hui, J., and D. Culler, | [RFC4944] Montenegro, G., Kushalnagar, N., Hui, J., Culler, D., and | |||
"Transmission of IPv6 Packets over IEEE 802.15.4 | RFC Publisher, "Transmission of IPv6 Packets over IEEE | |||
Networks", RFC 4944, DOI 10.17487/RFC4944, September 2007, | 802.15.4 Networks", RFC 4944, DOI 10.17487/RFC4944, | |||
<https://www.rfc-editor.org/info/rfc4944>. | September 2007, <https://www.rfc-editor.org/info/rfc4944>. | |||
[RFC6282] Hui, J., Ed. and P. Thubert, "Compression Format for IPv6 | [RFC6282] Hui, J., Ed., Thubert, P., and RFC Publisher, "Compression | |||
Datagrams over IEEE 802.15.4-Based Networks", RFC 6282, | Format for IPv6 Datagrams over IEEE 802.15.4-Based | |||
DOI 10.17487/RFC6282, September 2011, | Networks", RFC 6282, DOI 10.17487/RFC6282, September 2011, | |||
<https://www.rfc-editor.org/info/rfc6282>. | <https://www.rfc-editor.org/info/rfc6282>. | |||
[RFC6550] Winter, T., Ed., Thubert, P., Ed., Brandt, A., Hui, J., | [RFC6550] Winter, T., Ed., Thubert, P., Ed., Brandt, A., Hui, J., | |||
Kelsey, R., Levis, P., Pister, K., Struik, R., Vasseur, | Kelsey, R., Levis, P., Pister, K., Struik, R., Vasseur, | |||
JP., and R. Alexander, "RPL: IPv6 Routing Protocol for | JP., Alexander, R., and RFC Publisher, "RPL: IPv6 Routing | |||
Low-Power and Lossy Networks", RFC 6550, | Protocol for Low-Power and Lossy Networks", RFC 6550, | |||
DOI 10.17487/RFC6550, March 2012, | DOI 10.17487/RFC6550, March 2012, | |||
<https://www.rfc-editor.org/info/rfc6550>. | <https://www.rfc-editor.org/info/rfc6550>. | |||
[RFC6775] Shelby, Z., Ed., Chakrabarti, S., Nordmark, E., and C. | [RFC6775] Shelby, Z., Ed., Chakrabarti, S., Nordmark, E., Bormann, | |||
Bormann, "Neighbor Discovery Optimization for IPv6 over | C., and RFC Publisher, "Neighbor Discovery Optimization | |||
Low-Power Wireless Personal Area Networks (6LoWPANs)", | for IPv6 over Low-Power Wireless Personal Area Networks | |||
RFC 6775, DOI 10.17487/RFC6775, November 2012, | (6LoWPANs)", RFC 6775, DOI 10.17487/RFC6775, November | |||
<https://www.rfc-editor.org/info/rfc6775>. | 2012, <https://www.rfc-editor.org/info/rfc6775>. | |||
[RFC7136] Carpenter, B. and S. Jiang, "Significance of IPv6 | ||||
Interface Identifiers", RFC 7136, DOI 10.17487/RFC7136, | ||||
February 2014, <https://www.rfc-editor.org/info/rfc7136>. | ||||
[RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC | ||||
2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, | ||||
May 2017, <https://www.rfc-editor.org/info/rfc8174>. | ||||
[RFC8505] Thubert, P., Ed., Nordmark, E., Chakrabarti, S., and C. | ||||
Perkins, "Registration Extensions for IPv6 over Low-Power | ||||
Wireless Personal Area Network (6LoWPAN) Neighbor | ||||
Discovery", RFC 8505, DOI 10.17487/RFC8505, November 2018, | ||||
<https://www.rfc-editor.org/info/rfc8505>. | ||||
10.2. Informative References | [RFC7136] Carpenter, B., Jiang, S., and RFC Publisher, "Significance | |||
of IPv6 Interface Identifiers", RFC 7136, | ||||
DOI 10.17487/RFC7136, February 2014, | ||||
<https://www.rfc-editor.org/info/rfc7136>. | ||||
[EUI-64] IEEE-SA Standards Board, "Guidelines for 64-bit Global | [RFC8174] Leiba, B. and RFC Publisher, "Ambiguity of Uppercase vs | |||
Identifier (EUI-64) Registration Authority", IEEE EUI-64, | Lowercase in RFC 2119 Key Words", BCP 14, RFC 8174, | |||
March 1997, <https://standards.ieee.org/content/dam/ieee- | DOI 10.17487/RFC8174, May 2017, | |||
standards/standards/web/documents/tutorials/eui.pdf>. | <https://www.rfc-editor.org/info/rfc8174>. | |||
[I-D.ietf-6tisch-dtsecurity-zerotouch-join] | [RFC8505] Thubert, P., Ed., Nordmark, E., Chakrabarti, S., Perkins, | |||
Richardson, M., "6tisch Zero-Touch Secure Join protocol", | C., and RFC Publisher, "Registration Extensions for IPv6 | |||
draft-ietf-6tisch-dtsecurity-zerotouch-join-04 (work in | over Low-Power Wireless Personal Area Network (6LoWPAN) | |||
progress), July 2019. | Neighbor Discovery", RFC 8505, DOI 10.17487/RFC8505, | |||
November 2018, <https://www.rfc-editor.org/info/rfc8505>. | ||||
[I-D.ietf-6tisch-minimal-security] | 9.2. Informative References | |||
Vucinic, M., Simon, J., Pister, K., and M. Richardson, | ||||
"Constrained Join Protocol (CoJP) for 6TiSCH", draft-ietf- | ||||
6tisch-minimal-security-15 (work in progress), December | ||||
2019. | ||||
[I-D.ietf-emu-eap-noob] | [AODV-RPL] Perkins, C. E., Anand, S.V.R., Anamalamudi, S., and B. | |||
Aura, T., Sethi, M., and A. Peltonen, "Nimble Out-of-Band | Liu, "Supporting Asymmetric Links in Low Power Networks: | |||
Authentication for EAP (EAP-NOOB)", draft-ietf-emu-eap- | AODV-RPL", Work in Progress, Internet-Draft, draft-ietf- | |||
noob-06 (work in progress), September 2021. | roll-aodv-rpl-15, 30 September 2022, | |||
<https://datatracker.ietf.org/doc/html/draft-ietf-roll- | ||||
aodv-rpl-15>. | ||||
[I-D.ietf-roll-aodv-rpl] | [EUI-64] IEEE Standards Association, "Guidelines for Use of | |||
Perkins, C. E., Anand, S., Anamalamudi, S., and B. Liu, | Extended Unique Idenfier (EUI), Organizationally Unique | |||
"Supporting Asymmetric Links in Low Power Networks: AODV- | Identifier (OUI), and Company ID (CID)", August 2017, | |||
RPL", draft-ietf-roll-aodv-rpl-13 (work in progress), | <https://standards.ieee.org/wp- | |||
March 2022. | content/uploads/import/documents/tutorials/eui.pdf>. | |||
[IEEE_1901.2a] | [IEEE_1901.2a] | |||
IEEE-SA Standards Board, "IEEE Standard for Low-Frequency | IEEE, "IEEE Standard for Low-Frequency (less than 500 kHz) | |||
(less than 500 kHz) Narrowband Power Line Communications | Narrowband Power Line Communications for Smart Grid | |||
for Smart Grid Applications - Amendment 1", IEEE 1901.2a, | Applications - Amendment 1", | |||
September 2015, <https://standards.ieee.org/findstds/ | DOI 10.1109/IEEESTD.2013.6679210, IEEE Std 1901.2a, | |||
standard/1901.2a-2015.html>. | October 2015, | |||
<https://ieeexplore.ieee.org/document/7286946>. | ||||
[RFC3972] Aura, T., "Cryptographically Generated Addresses (CGA)", | [RFC3972] Aura, T. and RFC Publisher, "Cryptographically Generated | |||
RFC 3972, DOI 10.17487/RFC3972, March 2005, | Addresses (CGA)", RFC 3972, DOI 10.17487/RFC3972, March | |||
<https://www.rfc-editor.org/info/rfc3972>. | 2005, <https://www.rfc-editor.org/info/rfc3972>. | |||
[RFC4963] Heffner, J., Mathis, M., and B. Chandler, "IPv4 Reassembly | [RFC4963] Heffner, J., Mathis, M., Chandler, B., and RFC Publisher, | |||
Errors at High Data Rates", RFC 4963, | "IPv4 Reassembly Errors at High Data Rates", RFC 4963, | |||
DOI 10.17487/RFC4963, July 2007, | DOI 10.17487/RFC4963, July 2007, | |||
<https://www.rfc-editor.org/info/rfc4963>. | <https://www.rfc-editor.org/info/rfc4963>. | |||
[RFC5191] Forsberg, D., Ohba, Y., Ed., Patil, B., Tschofenig, H., | [RFC5191] Forsberg, D., Ohba, Y., Ed., Patil, B., Tschofenig, H., | |||
and A. Yegin, "Protocol for Carrying Authentication for | Yegin, A., and RFC Publisher, "Protocol for Carrying | |||
Network Access (PANA)", RFC 5191, DOI 10.17487/RFC5191, | Authentication for Network Access (PANA)", RFC 5191, | |||
May 2008, <https://www.rfc-editor.org/info/rfc5191>. | DOI 10.17487/RFC5191, May 2008, | |||
<https://www.rfc-editor.org/info/rfc5191>. | ||||
[RFC5535] Bagnulo, M., "Hash-Based Addresses (HBA)", RFC 5535, | [RFC5535] Bagnulo, M. and RFC Publisher, "Hash-Based Addresses | |||
DOI 10.17487/RFC5535, June 2009, | (HBA)", RFC 5535, DOI 10.17487/RFC5535, June 2009, | |||
<https://www.rfc-editor.org/info/rfc5535>. | <https://www.rfc-editor.org/info/rfc5535>. | |||
[RFC7217] Gont, F., "A Method for Generating Semantically Opaque | [RFC7217] Gont, F. and RFC Publisher, "A Method for Generating | |||
Interface Identifiers with IPv6 Stateless Address | Semantically Opaque Interface Identifiers with IPv6 | |||
Autoconfiguration (SLAAC)", RFC 7217, | Stateless Address Autoconfiguration (SLAAC)", RFC 7217, | |||
DOI 10.17487/RFC7217, April 2014, | DOI 10.17487/RFC7217, April 2014, | |||
<https://www.rfc-editor.org/info/rfc7217>. | <https://www.rfc-editor.org/info/rfc7217>. | |||
[RFC7925] Tschofenig, H., Ed. and T. Fossati, "Transport Layer | [RFC7925] Tschofenig, H., Ed., Fossati, T., and RFC Publisher, | |||
Security (TLS) / Datagram Transport Layer Security (DTLS) | "Transport Layer Security (TLS) / Datagram Transport Layer | |||
Profiles for the Internet of Things", RFC 7925, | Security (DTLS) Profiles for the Internet of Things", | |||
DOI 10.17487/RFC7925, July 2016, | RFC 7925, DOI 10.17487/RFC7925, July 2016, | |||
<https://www.rfc-editor.org/info/rfc7925>. | <https://www.rfc-editor.org/info/rfc7925>. | |||
[RFC7973] Droms, R. and P. Duffy, "Assignment of an Ethertype for | [RFC7973] Droms, R., Duffy, P., and RFC Publisher, "Assignment of an | |||
IPv6 with Low-Power Wireless Personal Area Network | Ethertype for IPv6 with Low-Power Wireless Personal Area | |||
(LoWPAN) Encapsulation", RFC 7973, DOI 10.17487/RFC7973, | Network (LoWPAN) Encapsulation", RFC 7973, | |||
November 2016, <https://www.rfc-editor.org/info/rfc7973>. | DOI 10.17487/RFC7973, November 2016, | |||
<https://www.rfc-editor.org/info/rfc7973>. | ||||
[RFC8036] Cam-Winget, N., Ed., Hui, J., and D. Popa, "Applicability | [RFC8036] Cam-Winget, N., Ed., Hui, J., Popa, D., and RFC Publisher, | |||
Statement for the Routing Protocol for Low-Power and Lossy | "Applicability Statement for the Routing Protocol for Low- | |||
Networks (RPL) in Advanced Metering Infrastructure (AMI) | Power and Lossy Networks (RPL) in Advanced Metering | |||
Networks", RFC 8036, DOI 10.17487/RFC8036, January 2017, | Infrastructure (AMI) Networks", RFC 8036, | |||
DOI 10.17487/RFC8036, January 2017, | ||||
<https://www.rfc-editor.org/info/rfc8036>. | <https://www.rfc-editor.org/info/rfc8036>. | |||
[RFC8065] Thaler, D., "Privacy Considerations for IPv6 Adaptation- | [RFC8065] Thaler, D. and RFC Publisher, "Privacy Considerations for | |||
Layer Mechanisms", RFC 8065, DOI 10.17487/RFC8065, | IPv6 Adaptation-Layer Mechanisms", RFC 8065, | |||
February 2017, <https://www.rfc-editor.org/info/rfc8065>. | DOI 10.17487/RFC8065, February 2017, | |||
<https://www.rfc-editor.org/info/rfc8065>. | ||||
[RFC8415] Mrugalski, T., Siodelski, M., Volz, B., Yourtchenko, A., | [RFC8415] Mrugalski, T., Siodelski, M., Volz, B., Yourtchenko, A., | |||
Richardson, M., Jiang, S., Lemon, T., and T. Winters, | Richardson, M., Jiang, S., Lemon, T., Winters, T., and RFC | |||
"Dynamic Host Configuration Protocol for IPv6 (DHCPv6)", | Publisher, "Dynamic Host Configuration Protocol for IPv6 | |||
RFC 8415, DOI 10.17487/RFC8415, November 2018, | (DHCPv6)", RFC 8415, DOI 10.17487/RFC8415, November 2018, | |||
<https://www.rfc-editor.org/info/rfc8415>. | <https://www.rfc-editor.org/info/rfc8415>. | |||
[RFC8981] Gont, F., Krishnan, S., Narten, T., and R. Draves, | [RFC8981] Gont, F., Krishnan, S., Narten, T., Draves, R., and RFC | |||
"Temporary Address Extensions for Stateless Address | Publisher, "Temporary Address Extensions for Stateless | |||
Autoconfiguration in IPv6", RFC 8981, | Address Autoconfiguration in IPv6", RFC 8981, | |||
DOI 10.17487/RFC8981, February 2021, | DOI 10.17487/RFC8981, February 2021, | |||
<https://www.rfc-editor.org/info/rfc8981>. | <https://www.rfc-editor.org/info/rfc8981>. | |||
[RFC9010] Thubert, P., Ed. and M. Richardson, "Routing for RPL | [RFC9010] Thubert, P., Ed., Richardson, M., and RFC Publisher, | |||
(Routing Protocol for Low-Power and Lossy Networks) | "Routing for RPL (Routing Protocol for Low-Power and Lossy | |||
Leaves", RFC 9010, DOI 10.17487/RFC9010, April 2021, | Networks) Leaves", RFC 9010, DOI 10.17487/RFC9010, April | |||
<https://www.rfc-editor.org/info/rfc9010>. | 2021, <https://www.rfc-editor.org/info/rfc9010>. | |||
[SCENA] Cano, C., Pittolo, A., Malone, D., and L. Lampe, "State of | [RFC9031] Vučinić, M., Ed., Simon, J., Pister, K., Richardson, M., | |||
the Art in Power Line Communications: From the | and RFC Publisher, "Constrained Join Protocol (CoJP) for | |||
Applications to the Medium", July 2016, | 6TiSCH", RFC 9031, DOI 10.17487/RFC9031, May 2021, | |||
<https://www.rfc-editor.org/info/rfc9031>. | ||||
[RFC9140] Aura, T., Sethi, M., Peltonen, A., and RFC Publisher, | ||||
"Nimble Out-of-Band Authentication for EAP (EAP-NOOB)", | ||||
RFC 9140, DOI 10.17487/RFC9140, December 2021, | ||||
<https://www.rfc-editor.org/info/rfc9140>. | ||||
[SCENA] Cano, C., Pittolo, A., Malone, D., Lampe, L., Tonello, A., | ||||
and A. Dabak, "State of the Art in Power Line | ||||
Communications: From the Applications to the Medium", IEEE | ||||
Journal on Selected Areas in Communications, Volume 34, | ||||
Issue 7, DOI 10.1109/JSAC.2016.2566018, July 2016, | ||||
<https://ieeexplore.ieee.org/document/7467440>. | <https://ieeexplore.ieee.org/document/7467440>. | |||
[ZEROTOUCH] | ||||
Richardson, M., "6tisch Zero-Touch Secure Join protocol", | ||||
Work in Progress, Internet-Draft, draft-ietf-6tisch- | ||||
dtsecurity-zerotouch-join-04, 8 July 2019, | ||||
<https://datatracker.ietf.org/doc/html/draft-ietf-6tisch- | ||||
dtsecurity-zerotouch-join-04>. | ||||
Acknowledgements | ||||
We gratefully acknowledge suggestions from the members of the IETF | ||||
6lo Working Group. Great thanks to Samita Chakrabarti and Gabriel | ||||
Montenegro for their feedback and support in connecting the IEEE and | ||||
ITU-T sides. The authors thank Scott Mansfield, Ralph Droms, and Pat | ||||
Kinney for their guidance in the liaison process. The authors wish | ||||
to thank Stefano Galli, Thierry Lys, Yizhou Li, Yuefeng Wu, and | ||||
Michael Richardson for their valuable comments and contributions. | ||||
The authors wish to thank Carles Gomez for shepherding this document. | ||||
The authors also thank Paolo Volpato for delivering the presentation | ||||
at IETF 113. Sincere acknowledgements to the valuable comments from | ||||
the following reviewers: Dave Thaler, Dan Romascanu, Murray | ||||
Kucherawy, Benjamin Kaduk, Alvaro Retana, Éric Vyncke, Meral | ||||
Shirazipour, Roman Danyliw, and Lars Eggert. | ||||
Authors' Addresses | Authors' Addresses | |||
Jianqiang Hou | Jianqiang Hou | |||
Huawei Technologies | Huawei Technologies | |||
101 Software Avenue, | 101 Software Avenue, | |||
Nanjing 210012 | Nanjing | |||
210012 | ||||
China | China | |||
Email: houjianqiang@huawei.com | Email: houjianqiang@huawei.com | |||
Bing Liu | Bing Liu | |||
Huawei Technologies | Huawei Technologies | |||
No. 156 Beiqing Rd. Haidian District, | Haidian District | |||
Beijing 100095 | No. 156 Beiqing Rd. | |||
Beijing | ||||
100095 | ||||
China | China | |||
Email: remy.liubing@huawei.com | Email: remy.liubing@huawei.com | |||
Yong-Geun Hong | Yong-Geun Hong | |||
Daejeon University | Daejeon University | |||
62 Daehak-ro, Dong-gu | Dong-gu | |||
Daejeon 34520 | 62 Daehak-ro | |||
Korea | Daejeon | |||
34520 | ||||
Republic of Korea | ||||
Email: yonggeun.hong@gmail.com | Email: yonggeun.hong@gmail.com | |||
Xiaojun Tang | Xiaojun Tang | |||
State Grid Electric Power Research Institute | State Grid Electric Power Research Institute | |||
19 Chengxin Avenue | 19 Chengxin Avenue | |||
Nanjing 211106 | Nanjing | |||
211106 | ||||
China | China | |||
Email: itc@sgepri.sgcc.com.cn | Email: itc@sgepri.sgcc.com.cn | |||
Charles E. Perkins | Charles E. Perkins | |||
Lupin Lodge | Lupin Lodge | |||
Email: charliep@computer.org | Email: charliep@computer.org | |||
End of changes. 155 change blocks. | ||||
529 lines changed or deleted | 560 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. |