rfc9391.original | rfc9391.txt | |||
---|---|---|---|---|
lpwan Working Group E. Ramos | Internet Engineering Task Force (IETF) E. Ramos | |||
Internet-Draft Ericsson | Request for Comments: 9391 Ericsson | |||
Intended status: Standards Track A. Minaburo | Category: Standards Track A. Minaburo | |||
Expires: 18 June 2023 Acklio | ISSN: 2070-1721 Acklio | |||
15 December 2022 | April 2023 | |||
Static Context Header Compression over Narrowband Internet of Things | Static Context Header Compression over Narrowband Internet of Things | |||
draft-ietf-lpwan-schc-over-nbiot-15 | ||||
Abstract | Abstract | |||
This document describes Static Context Header Compression and | This document describes Static Context Header Compression and | |||
Fragmentation (SCHC) specifications, RFC 8724 and RFC 8824, | fragmentation (SCHC) specifications, RFCs 8724 and 8824, in | |||
combination with the 3rd Generation Partnership Project (3GPP) and | combination with the 3rd Generation Partnership Project (3GPP) and | |||
the Narrowband Internet of Things (NB-IoT). | the Narrowband Internet of Things (NB-IoT). | |||
This document has two parts. One normative to specify the use of | This document has two parts: one normative part that specifies the | |||
SCHC over NB-IoT. And one informational, which recommends some | use of SCHC over NB-IoT and one informational part that recommends | |||
values if 3GPP wanted to use SCHC inside their architectures. | some values if 3GPP wants to use SCHC inside their architectures. | |||
Status of This Memo | Status of This Memo | |||
This Internet-Draft is submitted in full conformance with the | This is an Internet Standards Track document. | |||
provisions of BCP 78 and BCP 79. | ||||
Internet-Drafts are working documents of the Internet Engineering | ||||
Task Force (IETF). Note that other groups may also distribute | ||||
working documents as Internet-Drafts. The list of current Internet- | ||||
Drafts is at https://datatracker.ietf.org/drafts/current/. | ||||
Internet-Drafts are draft documents valid for a maximum of six months | This document is a product of the Internet Engineering Task Force | |||
and may be updated, replaced, or obsoleted by other documents at any | (IETF). It represents the consensus of the IETF community. It has | |||
time. It is inappropriate to use Internet-Drafts as reference | received public review and has been approved for publication by the | |||
material or to cite them other than as "work in progress." | Internet Engineering Steering Group (IESG). Further information on | |||
Internet Standards is available in Section 2 of RFC 7841. | ||||
This Internet-Draft will expire on 18 June 2023. | Information about the current status of this document, any errata, | |||
and how to provide feedback on it may be obtained at | ||||
https://www.rfc-editor.org/info/rfc9391. | ||||
Copyright Notice | Copyright Notice | |||
Copyright (c) 2022 IETF Trust and the persons identified as the | Copyright (c) 2023 IETF Trust and the persons identified as the | |||
document authors. All rights reserved. | document authors. All rights reserved. | |||
This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
Provisions Relating to IETF Documents (https://trustee.ietf.org/ | Provisions Relating to IETF Documents | |||
license-info) in effect on the date of publication of this document. | (https://trustee.ietf.org/license-info) in effect on the date of | |||
Please review these documents carefully, as they describe your rights | publication of this document. Please review these documents | |||
and restrictions with respect to this document. Code Components | carefully, as they describe your rights and restrictions with respect | |||
extracted from this document must include Revised BSD License text as | to this document. Code Components extracted from this document must | |||
described in Section 4.e of the Trust Legal Provisions and are | include Revised BSD License text as described in Section 4.e of the | |||
provided without warranty as described in the Revised BSD License. | Trust Legal Provisions and are provided without warranty as described | |||
in the Revised BSD License. | ||||
Table of Contents | Table of Contents | |||
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 | 1. Introduction | |||
2. Conventions and Definitions . . . . . . . . . . . . . . . . . 3 | 2. Conventions and Definitions | |||
3. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3 | 3. Terminology | |||
4. NB-IoT Architecture . . . . . . . . . . . . . . . . . . . . . 5 | 4. NB-IoT Architecture | |||
5. Data Transmission in the 3GPP Architecture . . . . . . . . . 6 | 5. Data Transmission in the 3GPP Architecture | |||
5.1. Normative Part. . . . . . . . . . . . . . . . . . . . . . 7 | 5.1. Normative Scenarios | |||
5.1.1. SCHC over Non-IP Data Delivery (NIDD) . . . . . . . . 7 | 5.1.1. SCHC over Non-IP Data Delivery (NIDD) | |||
5.2. Informational Part. . . . . . . . . . . . . . . . . . . . 10 | 5.2. Informational Scenarios | |||
5.2.1. Use of SCHC over the Radio link . . . . . . . . . . . 11 | 5.2.1. Use of SCHC over the Radio Link | |||
5.2.2. Use of SCHC over the Non-Access Stratum (NAS) . . . . 12 | 5.2.2. Use of SCHC over the Non-Access Stratum (NAS) | |||
5.2.3. Parameters for Static Context Header Compression and | 5.2.3. Parameters for Static Context Header Compression and | |||
Fragmentation (SCHC) for the Radio link and DONAS | Fragmentation (SCHC) for the Radio Link and DoNAS Use | |||
use-cases. . . . . . . . . . . . . . . . . . . . . . 13 | Cases | |||
6. Padding . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 | 6. Padding | |||
7. IANA considerations . . . . . . . . . . . . . . . . . . . . . 15 | 7. IANA Considerations | |||
8. Security considerations . . . . . . . . . . . . . . . . . . . 15 | 8. Security Considerations | |||
9. References . . . . . . . . . . . . . . . . . . . . . . . . . 15 | 9. References | |||
9.1. Normative References . . . . . . . . . . . . . . . . . . 16 | 9.1. Normative References | |||
9.2. Informative References . . . . . . . . . . . . . . . . . 16 | 9.2. Informative References | |||
Appendix A. NB-IoT User Plane protocol architecture . . . . . . 17 | Appendix A. NB-IoT User Plane Protocol Architecture | |||
A.1. Packet Data Convergence Protocol (PDCP) TS36323 . . . . . 18 | A.1. Packet Data Convergence Protocol (PDCP) | |||
A.2. Radio Link Protocol (RLC) TS36322 . . . . . . . . . . . . 18 | A.2. Radio Link Protocol (RLC) | |||
A.3. Medium Access Control (MAC) TR36321 . . . . . . . . . . . 19 | A.3. Medium Access Control (MAC) | |||
Appendix B. NB-IoT Data over NAS (DoNAS) . . . . . . . . . . . . 20 | Appendix B. NB-IoT Data over NAS (DoNAS) | |||
Appendix C. Acknowledgements . . . . . . . . . . . . . . . . . . 23 | Acknowledgements | |||
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 23 | Authors' Addresses | |||
1. Introduction | 1. Introduction | |||
This document defines the scenarios where the Static Context Header | This document defines scenarios where Static Context Header | |||
Compression and fragmentation (SCHC) [RFC8724] and [RFC8824] are | Compression and fragmentation (SCHC) [RFC8724] [RFC8824] are suitable | |||
suitable for 3rd Generation Partnership Project (3GPP) and Narrowband | for 3rd Generation Partnership Project (3GPP) and Narrowband Internet | |||
Internet of Things (NB-IoT) protocol stacks. | of Things (NB-IoT) protocol stacks. | |||
In the 3GPP and the NB-IoT networks, header compression efficiently | In the 3GPP and the NB-IoT networks, header compression efficiently | |||
brings Internet connectivity to the Device-User Equipment (Dev-UE), | brings Internet connectivity to the Device UE (Dev-UE), the radio | |||
the radio (RGW-eNB) and network (NGW-MME) gateways, and the | (RGW-eNB) and network (NGW-MME) gateways, and the Application Server. | |||
Application Server. This document describes the SCHC parameters | This document describes the SCHC parameters supporting SCHC over the | |||
supporting static context header compression and fragmentation over | NB-IoT architecture. | |||
the NB-IoT architecture. | ||||
This document assumes functionality for NB-IoT of 3GPP release 15 | This document assumes functionality for NB-IoT of 3GPP release 15 | |||
[_3GPPR15]. Otherwise, the text explicitly mentions other versions' | [R15-3GPP]. Otherwise, the text explicitly mentions other versions' | |||
functionality. | functionality. | |||
This document has two parts, a standard end-to-end scenario | This document has two parts: normative end-to-end scenarios | |||
describing how any application must use SCHC over the 3GPP public | describing how any application must use SCHC over the 3GPP public | |||
service. And informational scenarios about how 3GPP could use SCHC | service and informational scenarios about how 3GPP could use SCHC in | |||
in their protocol stack network. | their protocol stack network. | |||
2. Conventions and Definitions | 2. Conventions and Definitions | |||
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | |||
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and | "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and | |||
"OPTIONAL" in this document are to be interpreted as described in | "OPTIONAL" in this document are to be interpreted as described in | |||
BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all | BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all | |||
capitals, as shown here. | capitals, as shown here. | |||
3. Terminology | 3. Terminology | |||
This document will follow the terms defined in [RFC8724], in | This document will follow the terms defined in [RFC8724], [RFC8376], | |||
[RFC8376], and the [TR23720]. | and [TR23720]. | |||
* Capillary Gateway. A capillary gateway facilitates seamless | Capillary Gateway: Facilitates seamless integration because it has | |||
integration because it has wide area connectivity through cellular | wide-area connectivity through cellular and provides wide-area | |||
and provides wide area access as a proxy to other devices using | access as a proxy to other devices using LAN technologies (BT, Wi- | |||
LAN technologies (BT, Wi-Fi, Zigbee, or others.) | Fi, Zigbee, or others). | |||
* CIoT EPS. Cellular IoT Evolved Packet System. It is a | Cellular IoT Evolved Packet System (CIoT EPS): A functionality to | |||
functionality to improve the support of small data transfers. | improve the support of small data transfers. | |||
* Dev-UE. Device - User Equipment. | Device UE (Dev-UE): As defined in [RFC8376], Section 3. | |||
* DoNAS. Data over Non-Access Stratum. | Data over Non-Access Stratum (DoNAS): Sending user data within | |||
signaling messages over the NAS functional layer. | ||||
* EPC. Evolved Packet Connectivity. Core network of 3GPP LTE | Evolved Packet Connectivity (EPC): Core network of 3GPP LTE systems. | |||
systems. | ||||
* EUTRAN. Evolved Universal Terrestrial Radio Access Network. | Evolved Universal Terrestrial Radio Access Network (EUTRAN): Radio | |||
Radio access network of LTE-based systems. | access network of LTE-based systems. | |||
* HARQ. Hybrid Automatic Repeat Request. | Hybrid Automatic Repeat reQuest (HARQ): A combination of high-rate | |||
Forward Error Correction (FEC) and Automatic Repeat reQuest (ARQ) | ||||
error control. | ||||
* HSS. Home Subscriber Server. It is a database that contains | Home Subscriber Server (HSS): A database that contains users' | |||
users' subscription data, including data needed for mobility | subscription data, including data needed for mobility management. | |||
management. | ||||
* IP address. IPv6 or IPv4 address used. | IP address: IPv6 or IPv4 address used. | |||
* IWK-SCEF. InterWorking Service Capabilities Exposure Function. | InterWorking Service Capabilities Exposure Function (IWK-SCEF): Used | |||
It is used in roaming scenarios, it is located in the Visited PLMN | in roaming scenarios, is located in the Visited PLMN, and serves | |||
and serves for interconnection with the SCEF of the Home PLMN. | for interconnection with the Service Capabilities Exposure | |||
Function (SCEF) of the Home PLMN. | ||||
* L2. Layer-2 in the 3GPP architectures it includes MAC, RLC and | Layer 2 (L2): L2 in the 3GPP architectures includes MAC, RLC, and | |||
PDCP layers see Appendix A. | PDCP layers; see Appendix A. | |||
* LCID. Logical Channel ID. Is the logical channel instance of the | Logical Channel ID (LCID): The logical channel instance of the | |||
corresponding MAC SDU. | corresponding MAC SDU. | |||
* MAC. Medium Access Control protocol, part of L2. | Medium Access Control (MAC) protocol: Part of L2. | |||
* NAS. Non-Access Stratum. | Non-Access Stratum (NAS): Functional layer for signaling messages | |||
that establishes communication sessions and maintains the | ||||
communication while the user moves. | ||||
* NB-IoT. Narrowband IoT. A 3GPP LPWAN technology based on the LTE | Narrowband IoT (NB-IoT): A 3GPP Low-Power WAN (LPWAN) technology | |||
architecture but with additional optimization for IoT and using a | based on the LTE architecture but with additional optimization for | |||
Narrowband spectrum frequency. | IoT and using a Narrowband spectrum frequency. | |||
* NGW-CSGN. Network Gateway - CIoT Serving Gateway Node. | Network Gateway - CIoT Serving Gateway Node (NGW-CSGN): As defined | |||
in [RFC8376], Section 3. | ||||
* NGW-CSGW. Network Gateway - Cellular Serving Gateway. It routes | Network Gateway - Cellular Serving Gateway (NGW-CSGW): Routes and | |||
and forwards the user data packets through the access network. | forwards the user data packets through the access network. | |||
* NGW-MME. Network Gateway - Mobility Management Entity. An entity | Network Gateway - Mobility Management Entity (NGW-MME): An entity in | |||
in charge of handling mobility of the Dev-UE. | charge of handling mobility of the Dev-UE. | |||
* NGW-PGW. Network Gateway - Packet Data Network Gateway. An | Network Gateway - Packet Data Network Gateway (NGW-PGW): An | |||
interface between the internal with the external network. | interface between the internal and external network. | |||
* NGW-SCEF. Network Gateway - Service Capability Exposure Function. | Network Gateway - Service Capability Exposure Function (NGW-SCEF): E | |||
EPC node for exposure of 3GPP network service capabilities to 3rd | PC node for exposure of 3GPP network service capabilities to third | |||
party applications. | party applications. | |||
* NIDD. Non-IP Data Delivery. | Non-IP Data Delivery (NIDD): End-to-end communication between the UE | |||
and the Application Server. | ||||
* PDCP. Packet Data Convergence Protocol part of L2. | Packet Data Convergence Protocol (PDCP): Part of L2. | |||
* PLMN. Public Land Mobile Network. Combination of wireless | Public Land-based Mobile Network (PLMN): A combination of wireless | |||
communication services offered by a specific operator. | communication services offered by a specific operator. | |||
* PDU. Protocol Data Unit. A data packet including headers that | Protocol Data Unit (PDU): A data packet including headers that are | |||
are transmitted between entities through a protocol. | transmitted between entities through a protocol. | |||
* RLC. Radio Link Protocol part of L2. | Radio Link Protocol (RLC): Part of L2. | |||
* RGW-eNB. Radio Gateway - evolved Node B. Base Station that | Radio Gateway - evolved Node B (RGW-eNB): Base Station that controls | |||
controls the UE. | the UE. | |||
* SDU. Service Data Unit. A data packet (PDU) from higher layer | Service Data Unit (SDU): A data packet (PDU) from higher-layer | |||
protocols used by lower layer protocols as a payload of their own | protocols used by lower-layer protocols as a payload of their own | |||
PDUs. | PDUs. | |||
4. NB-IoT Architecture | 4. NB-IoT Architecture | |||
The Narrowband Internet of Things (NB-IoT) architecture has a complex | The NB-IoT architecture has a complex structure. It relies on | |||
structure. It relies on different NGWs from different providers. It | different Network Gateways (NGWs) from different providers. It can | |||
can send data via different paths, each with different | send data via different paths, each with different characteristics in | |||
characteristics in terms of bandwidth, acknowledgments, and layer-2 | terms of bandwidth, acknowledgments, and L2 reliability and | |||
reliability and segmentation. | segmentation. | |||
Figure 1 shows this architecture, where the Network Gateway Cellular | Figure 1 shows this architecture, where the Network Gateway - | |||
Internet of Things Serving Gateway Node (NGW-CSGN) optimizes co- | Cellular IoT Serving Gateway Node (NGW-CSGN) optimizes co-locating | |||
locating entities in different paths. For example, a Dev-UE using | entities in different paths. For example, a Dev-UE using the path | |||
the path formed by the Network Gateway Mobility Management Entity | formed by the Network Gateway - Mobility Management Entity (NGW-MME), | |||
(NGW-MME), the NGW-CSGW, and Network Gateway Packet Data Network | the NGW-CSGW, and the Network Gateway - Packet Data Network Gateway | |||
Gateway (NGW-PGW) may get a limited bandwidth transmission from a few | (NGW-PGW) may get a limited bandwidth transmission from a few bytes/s | |||
bytes/s to one thousand bytes/s only. | to one thousand bytes/s only. | |||
Another node introduced in the NB-IoT architecture is the Network | Another node introduced in the NB-IoT architecture is the Network | |||
Gateway Service Capability Exposure Function (NGW-SCEF), which | Gateway - Service Capability Exposure Function (NGW-SCEF), which | |||
securely exposes service and network capabilities to entities | securely exposes service and network capabilities to entities | |||
external to the network operator. The Open Mobile Alliance (OMA) | external to the network operator. The Open Mobile Alliance (OMA) | |||
[OMA0116] and the One Machine to Machine (OneM2M) [TR-0024] define | [OMA0116] and the One Machine to Machine (OneM2M) [TR-0024] define | |||
the northbound APIs. [TS23222] defines architecture for the common | the northbound APIs. [TS23222] defines architecture for the common | |||
API framework for 3GPP northbound APIs and [TS33122] defines security | API framework for 3GPP northbound APIs. [TS33122] defines security | |||
aspects for common API framework for 3GPP northbound APIs. In this | aspects for a common API framework for 3GPP northbound APIs. In this | |||
case, the path is small for data transmission. The main functions of | case, the path is small for data transmission. The main functions of | |||
the NGW-SCEF are Connectivity path and Device Monitoring. | the NGW-SCEF are path connectivity and device monitoring. | |||
+---+ +---------+ +------+ | +---+ +---------+ +------+ | |||
|Dev| \ | +-----+ | ---| HSS | | |Dev| \ | +-----+ | ---| HSS | | |||
|-UE| \ | | NGW | | +------+ | |-UE| \ | | NGW | | +------+ | |||
+---+ | | |-MME |\__ | +---+ | | |-MME |\__ | |||
\ / +-----+ | \ | \ / +-----+ | \ | |||
+---+ \+-----+ /| | | +------+ | +---+ \+-----+ /| | | +------+ | |||
|Dev| ----| RGW |- | | | | NGW- | | |Dev| ----| RGW |- | | | | NGW- | | |||
|-UE| |-eNB | | | | | SCEF |---------+ | |-UE| |-eNB | | | | | SCEF |---------+ | |||
+---+ /+-----+ \| | | +------+ | | +---+ /+-----+ \| | | +------+ | | |||
/ \ +------+| | | / \ +------+| | | |||
/ |\| NGW- || +-----+ +-----------+ | / |\| NGW- || +-----+ +-----------+ | |||
+---+ / | | CSGW |--| NGW-|---|Application| | +---+ / | | CSGW |--| NGW-|---|Application| | |||
|Dev| | | || | PGW | | Server | | |Dev| | | || | PGW | | Server | | |||
|-UE| | +------+| +-----+ +-----------+ | |-UE| | +------+| +-----+ +-----------+ | |||
+---+ | | | +---+ | | | |||
|NGW-CSGN | | |NGW-CSGN | | |||
+---------+ | +---------+ | |||
Figure 1: 3GPP network architecture | Figure 1: 3GPP Network Architecture | |||
5. Data Transmission in the 3GPP Architecture | 5. Data Transmission in the 3GPP Architecture | |||
NB-IoT networks deal with end-to-end user data and in-band signaling | NB-IoT networks deal with end-to-end user data and in-band signaling | |||
between the nodes and functions to configure, control, and monitor | between the nodes and functions to configure, control, and monitor | |||
the system functions and behaviors. The signaling uses a different | the system functions and behaviors. The signaling uses a different | |||
path with specific protocols, handling processes, and entities but | path with specific protocols, handling processes, and entities but | |||
can transport end-to-end user data for IoT services. In contrast, | can transport end-to-end user data for IoT services. In contrast, | |||
the end-to-end application only transports end-to-end data. | the end-to-end application only transports end-to-end data. | |||
The recommended 3GPP MTU size is 1358 bytes. The radio network | The recommended 3GPP MTU size is 1358 bytes. The radio network | |||
protocols limit the packet sizes over the air, including radio | protocols limit the packet sizes over the air, including radio | |||
protocol overhead, to 1600 bytes, see Section 5.2.3. However, the | protocol overhead, to 1600 bytes; see Section 5.2.3. However, the | |||
recommended 3GPP MTU is smaller to avoid fragmentation in the network | recommended 3GPP MTU is smaller to avoid fragmentation in the network | |||
backbone due to the payload encryption size (multiple of 16) and the | backbone due to the payload encryption size (multiple of 16) and the | |||
additional core transport overhead handling. | additional core transport overhead handling. | |||
3GPP standardizes NB-IoT and, in general, the cellular technologies | 3GPP standardizes NB-IoT and, in general, the interfaces and | |||
interfaces and functions. Therefore, the introduction of SCHC | functions of cellular technologies. Therefore, the introduction of | |||
entities to Dev-UE, RGW-eNB, and NGW-CSGN needs to be specified in | SCHC entities to Dev-UE, RGW-eNB, and NGW-CSGN needs to be specified | |||
the NB-IoT standard. | in the NB-IoT standard. | |||
This document identifies the use cases of SCHC over the NB-IoT | This document identifies the use cases of SCHC over the NB-IoT | |||
architecture. | architecture. | |||
First, the radio transmission where, see Section 5.2.1, the Dev-UE | The first use case is of the radio transmission (see Section 5.2.1) | |||
and the RGW-eNB can use the SCHC functionalities. | where the Dev-UE and the RGW-eNB can use the SCHC functionalities. | |||
Second, the packets transmitted over the control path can also use | The second is where the packets transmitted over the control path can | |||
SCHC when the transmission goes over the NGW-MME or NGW-SCEF. See | also use SCHC when the transmission goes over the NGW-MME or NGW-SCEF | |||
Section 5.2.2. | (see Section 5.2.2). | |||
These two use cases are also valid for any 3GPP architecture and not | These two use cases are also valid for any 3GPP architecture and not | |||
only for NB-IoT. And as the 3GPP internal network is involved, they | only for NB-IoT. And as the 3GPP internal network is involved, they | |||
have been put in the informational part of this section. | have been put in the informational part of this section. | |||
And third, over the SCHC over Non-IP Data Delivery (NIDD) connection | And the third covers the SCHC over Non-IP Data Delivery (NIDD) | |||
or at least up to the operator network edge, see Section 5.1.1. In | connection or at least up to the operator network edge (see | |||
this case, SCHC functionalities are available in the application | Section 5.1.1). In this case, SCHC functionalities are available in | |||
layer of the Dev-UE and the Application Servers or a broker function | the application layer of the Dev-UE and the Application Servers or a | |||
at the edge of the operator network. NGW-PGW or NGW-SCEF transmit | broker function at the edge of the operator network. NGW-PGW or NGW- | |||
the packets which are non-IP traffic, using IP tunneling or API | SCEF transmit the packets that are Non-IP traffic, using IP tunneling | |||
calls. It is also possible to benefit legacy devices with SCHC by | or API calls. It is also possible to benefit legacy devices with | |||
using the non-IP transmission features of the operator network. | SCHC by using the Non-IP transmission features of the operator | |||
network. | ||||
A non-IP transmission refers to other layer-2 transport different | A Non-IP transmission refers to an L2 transport that is different | |||
from NB-IoT. | from NB-IoT. | |||
5.1. Normative Part. | 5.1. Normative Scenarios | |||
This scenarios does not modify the 3GPP architecture or any of its | These scenarios do not modify the 3GPP architecture or any of its | |||
components, it only use it as a layer-2 transmission. | components. They only use the architecture as an L2 transmission. | |||
5.1.1. SCHC over Non-IP Data Delivery (NIDD) | 5.1.1. SCHC over Non-IP Data Delivery (NIDD) | |||
This section specifies the use of SCHC over Non-IP Data Delivery | This section specifies the use of SCHC over NIDD services of 3GPP. | |||
(NIDD) services of 3GPP. The NIDD services of 3GPP enable the | The NIDD services of 3GPP enable the transmission of SCHC packets | |||
transmission of SCHC packets compressed by the application layer. | compressed by the application layer. The packets can be delivered | |||
The packets can be delivered between the NGW-PGW and the Application | between the NGW-PGW and the Application Server or between the NGW- | |||
Server or between the NGW-SCEF and the Application Server, using IP- | SCEF and the Application Server, using IP-tunnels or API calls. In | |||
tunnels or API calls. In both cases, as compression occurs before | both cases, as compression occurs before transmission, the network | |||
transmission, the network will not understand the packet, and the | will not understand the packet, and the network does not have context | |||
network does not have context information of this compression. | information of this compression. Therefore, the network will treat | |||
Therefore, the network will treat the packet as Non-IP traffic and | the packet as Non-IP traffic and deliver it to the other side without | |||
deliver it to the other side without any other protocol stack | any other protocol stack element, directly over L2. | |||
element, directly over the layer-2. | ||||
5.1.1.1. SCHC Entities Placing over NIDD | 5.1.1.1. SCHC Entities Placing over NIDD | |||
In the two scenarios using NIDD compression, SCHC entities are | In the two scenarios using NIDD compression, SCHC entities are | |||
located almost on top of the stack. The NB-IoT connectivity services | located almost on top of the stack. The NB-IoT connectivity services | |||
implement SCHC in the Dev-UE, an in the Application Server. The IP | implement SCHC in the Dev-UE, an in the Application Server. The IP | |||
tunneling scenario requires that the Application Server send the | tunneling scenario requires that the Application Server send the | |||
compressed packet over an IP connection terminated by the 3GPP core | compressed packet over an IP connection terminated by the 3GPP core | |||
network. If the transmission uses the NGW-SCEF services, it is | network. If the transmission uses the NGW-SCEF services, it is | |||
possible to utilize an API call to transfer the SCHC packets between | possible to utilize an API call to transfer the SCHC packets between | |||
skipping to change at page 8, line 5 ¶ | skipping to change at line 340 ¶ | |||
| | XXX CORE NETWORK XXX | | | | | | XXX CORE NETWORK XXX | | | | |||
| L2 +---+XX +------------+ | +--------+ | | L2 +---+XX +------------+ | +--------+ | |||
| | XX |IP TUNNELING+--+ | | | | | XX |IP TUNNELING+--+ | | | |||
| | XXX +------------+ +---+ IP | | | | XXX +------------+ +---+ IP | | |||
+---------+ XXXX XXXX | +--------+ | +---------+ XXXX XXXX | +--------+ | |||
| PHY +------+ XXXXXXXXXXXXXXXXXXXXXXX +---+ PHY | | | PHY +------+ XXXXXXXXXXXXXXXXXXXXXXX +---+ PHY | | |||
+---------+ +--------+ | +---------+ +--------+ | |||
Dev-UE Application | Dev-UE Application | |||
Server | Server | |||
Figure 2: End-to End Compression. SCHC entities placed when | Figure 2: End-to-End Compression: SCHC Entities Placed when Using | |||
using Non-IP Delivery (NIDD) 3GPP Services | Non-IP Delivery (NIDD) 3GPP Services | |||
5.1.1.2. Parameters for Static Context Header Compression and | 5.1.1.2. Parameters for Static Context Header Compression and | |||
Fragmentation (SCHC) | Fragmentation (SCHC) | |||
These scenarios MAY use SCHC header compression capability to improve | These scenarios MAY use the SCHC header compression capability to | |||
the transmission of IPv6 packets. | improve the transmission of IPv6 packets. | |||
* SCHC Context initialization. | * SCHC Context Initialization | |||
The application layer handles the static context; consequently, the | The application layer handles the static context. Consequently, | |||
context distribution MUST be according to the application's | the context distribution MUST be according to the application's | |||
capabilities, perhaps utilizing IP data transmissions up to context | capabilities, perhaps utilizing IP data transmissions up to | |||
initialization. Also, the static contexts delivery may use the same | context initialization. Also, the static context delivery may use | |||
IP tunneling or NGW-SCEF services used later for the SCHC packets | the same IP tunneling or NGW-SCEF services used later for the | |||
transport. | transport of SCHC packets. | |||
* SCHC Rules. | * SCHC Rules | |||
For devices acting as a capillary gateway, several rules match the | For devices acting as a capillary gateway, several rules match the | |||
diversity of devices and protocols used by the devices associated | diversity of devices and protocols used by the devices associated | |||
with the gateway. Meanwhile, simpler devices may have predetermined | with the gateway. Meanwhile, simpler devices may have | |||
protocols and fixed parameters. | predetermined protocols and fixed parameters. | |||
* Rule ID. | * RuleID | |||
This scenario can dynamically set the RuleID size before the context | This scenario can dynamically set the RuleID size before the | |||
delivery. For example, negotiate between the applications when | context delivery, for example, by negotiating between the | |||
choosing a profile according to the type of traffic and application | applications when choosing a profile according to the type of | |||
deployed. Transmission optimization may require only one physical | traffic and application deployed. Transmission optimization may | |||
layer transmission. SCHC overhead SHOULD NOT exceed the available | require only one Physical Layer transmission. SCHC overhead | |||
number of effective bits of the smallest physical TB available to | SHOULD NOT exceed the available number of effective bits of the | |||
optimize the transmission. The packets handled by 3GPP networks are | smallest physical TB available to optimize the transmission. The | |||
byte-aligned. Thus, to use the smallest TB, the maximum SCHC header | packets handled by 3GPP networks are byte-aligned. Thus, to use | |||
size is 12 bits. On the other hand, more complex NB-IoT devices | the smallest TB, the maximum SCHC header size is 12 bits. On the | |||
(such as a capillary gateway) might require additional bits to handle | other hand, more complex NB-IoT devices (such as a capillary | |||
the variety and multiple parameters of higher-layer protocols | gateway) might require additional bits to handle the variety and | |||
deployed. The configuration may be part of the agreed operation | multiple parameters of higher-layer protocols deployed. The | |||
profile and content distribution. The RuleID field size may range | configuration may be part of the agreed operation profile and | |||
from 2 bits, resulting in 4 rules to an 8-bit value that would yield | content distribution. The RuleID field size may range from 2 | |||
up to 256 rules that can be used with the operators and seems quite a | bits, resulting in 4 rules, to an 8-bit value, yielding up to 256 | |||
reasonable maximum limit even for a device acting as a NAT. An | rules for use by operators. A 256-rule maximum limit seems to be | |||
application may use a larger RuleID, but it should consider the byte | quite reasonable, even for a device acting as a NAT. An | |||
alignment of the expected Compression Residue. In the minimum TB | application may use a larger RuleID, but it should consider the | |||
size case, 2 bits of RuleID leave only 6 bits available for | byte alignment of the expected Compression Residue. In the | |||
Compression Residue. | minimum TB size case, 2 bits of RuleID leave only 6 bits available | |||
for Compression Residue. | ||||
* SCHC MAX_PACKET_SIZE. | * SCHC MAX_PACKET_SIZE | |||
In these scenarios, the maximum RECOMMENDED MTU size is 1358 bytes | In these scenarios, the maximum RECOMMENDED MTU size is 1358 bytes | |||
since the SCHC packets (and fragments) are traversing the whole 3GPP | since the SCHC packets (and fragments) are traversing the whole | |||
network infrastructure (core and radio), not only the radio as the IP | 3GPP network infrastructure (core and radio), not only the radio | |||
transmissions case. | as in the IP transmissions case. | |||
* Fragmentation. | * Fragmentation | |||
Packets larger than 1358 bytes need the SCHC fragmentation function. | Packets larger than 1358 bytes need the SCHC fragmentation | |||
Since the 3GPP uses reliability functions, the No-ACK fragmentation | function. Since the 3GPP uses reliability functions, the No-ACK | |||
mode MAY be enough in point-to-point connections. Nevertheless, | fragmentation mode MAY be enough in point-to-point connections. | |||
additional considerations are described below for more complex cases. | Nevertheless, additional considerations are described below for | |||
more complex cases. | ||||
* Fragmentation modes. | * Fragmentation Modes | |||
A global service assigns a QoS to the packets e.g. depending on the | A global service assigns a QoS to the packets, e.g., depending on | |||
billing. Packets with very low QoS may get lost before arriving in | the billing. Packets with very low QoS may get lost before | |||
the 3GPP radio network transmission, for example, in between the | arriving in the 3GPP radio network transmission, e.g., in between | |||
links of a capillary gateway or due to buffer overflow handling in a | the links of a capillary gateway or due to buffer overflow | |||
backhaul connection. The use of SCHC fragmentation with the ACK-on- | handling in a backhaul connection. The use of SCHC fragmentation | |||
Error mode is RECOMMENDED to secure additional reliability on the | with the ACK-on-Error mode is RECOMMENDED to secure additional | |||
packets transmitted with a small trade-off on further transmissions | reliability on the packets transmitted with a small trade-off on | |||
to signal the end-to-end arrival of the packets if no transport | further transmissions to signal the end-to-end arrival of the | |||
protocol takes care of retransmission. | packets if no transport protocol takes care of retransmission. | |||
Also, the ACK-on-Error mode could be desirable to keep track of all | Also, the ACK-on-Error mode could be desirable to keep track of | |||
the SCHC packets delivered. In that case, the fragmentation function | all the SCHC packets delivered. In that case, the fragmentation | |||
could be activated for all packets transmitted by the applications. | function could be activated for all packets transmitted by the | |||
SCHC ACK-on-Error fragmentation MAY be activated in transmitting non- | applications. SCHC ACK-on-Error fragmentation MAY be activated in | |||
IP packets on the NGW-MME. A non-IP packet will use SCHC reserved | transmitting Non-IP packets on the NGW-MME. A Non-IP packet will | |||
RuleID for non-compressing packets as [RFC8724] allows it. | use SCHC reserved RuleID for non-compressing packets as [RFC8724] | |||
allows it. | ||||
* Fragmentation Parameters. | * Fragmentation Parameters | |||
SCHC profile will have specific Rules for the fragmentation modes. | SCHC profile will have specific Rules for the fragmentation modes. | |||
The rule will identify, which fragmentation mode is in use, and | The rule will identify which fragmentation mode is in use, and | |||
section Section 5.2.3 defines the RuleID size. | Section 5.2.3 defines the RuleID size. | |||
SCHC parametrization considers that NBIoT aligns the bit and uses | SCHC parametrization considers that NB-IoT aligns the bit and uses | |||
padding and the size of the Transfer Block. SCHC will try to reduce | padding and the size of the Transfer Block. SCHC will try to reduce | |||
padding to optimize the compression of the information. The Header | padding to optimize the compression of the information. The header | |||
size needs to be multiple of 4, and the Tiles MAY keep a fixed value | size needs to be a multiple of 4. The Tiles MAY keep a fixed value | |||
of 4 or 8 bits to avoid padding except for transfer block equals 16 | of 4 or 8 bits to avoid padding, except for when the transfer block | |||
bits where Tiles may be 2 bits. The transfer block size has a wide | equals 16 bits as the Tiles may be 2 bits. The transfer block size | |||
range of values. Two configurations are RECOMMENDED for the | has a wide range of values. Two configurations are RECOMMENDED for | |||
fragmentation parameters. | the fragmentation parameters. | |||
* For Transfer Blocks smaller or equal to 304 bits using an 8-bit | * For Transfer Blocks smaller than or equal to 304 bits using an | |||
Header_size configuration, with the size of the header fields as | 8-bit Header_size configuration, with the size of the header | |||
follows: | fields as follows: | |||
- RuleID from 1 - 3 bits, | - RuleID from 1 - 3 bits | |||
- DTag 1 bit, | - DTag 1 bit | |||
- FCN 3 bits, | - FCN 3 bits | |||
- W 1 bits. | - W 1 bits | |||
* For Transfer Blocks bigger than 304 bits using a 16-bit | * For Transfer Blocks bigger than 304 bits using a 16-bit | |||
Header_size configuration, with the size of the header fields as | Header_size configuration, with the size of the header fields as | |||
follows: | follows: | |||
- RulesID from 8 - 10 bits, | - RulesID from 8 - 10 bits | |||
- DTag 1 or 2 bits, | - DTag 1 or 2 bits | |||
- FCN 3 bits, | - FCN 3 bits | |||
- W 2 or 3 bits. | - W 2 or 3 bits | |||
* WINDOW_SIZE of 2^N-1 is RECOMMENDED. | * WINDOW_SIZE of (2^N)-1 is RECOMMENDED. | |||
* RCS will follow the default size defined in section 8.2.3 of the | * Reassembly Check Sequence (RCS) will follow the default size | |||
[RFC8724], with a length equal to the L2 Word. | defined in Section 8.2.3 of [RFC8724], with a length equal to the | |||
L2 Word. | ||||
* MAX_ACK_REQ is RECOMMENDED to be 2, but applications MAY change | * MAX_ACK_REQ is RECOMMENDED to be 2, but applications MAY change | |||
this value based on transmission conditions. | this value based on transmission conditions. | |||
The IoT devices communicate with small data transfer and use the | The IoT devices communicate with small data transfers and use the | |||
Power Save Mode and the Idle Mode DRX, which govern how often the | Power Save Mode and the Idle Mode Discontinuous Reception (DRX), | |||
device wakes up, stays up, and is reachable. The use of the | which govern how often the device wakes up, stays up, and is | |||
different modes allows the battery to last ten years. | reachable. The use of the different modes allows the battery to last | |||
Table 10.5.163a in [TS24008] specifies a range for the radio timers | ten years. Table 10.5.163a in [TS24008] defines the radio timer | |||
as N to 3N in increments of one where the units of N can be 1 hour or | values with units incrementing by N. The units of N can be 1 hour or | |||
10 hours. The Inactivity Timer and the Retransmission Timer be set | 10 hours. The range used for IoT is of N to 3N, where N increments | |||
by one. The Inactivity Timer and the Retransmission Timer can be set | ||||
based on these limits. | based on these limits. | |||
5.2. Informational Part. | 5.2. Informational Scenarios | |||
These scenarios shows how 3GPP could use SCHC for their | These scenarios show how 3GPP could use SCHC for their transmissions. | |||
transmissions. | ||||
5.2.1. Use of SCHC over the Radio link | 5.2.1. Use of SCHC over the Radio Link | |||
Deploying SCHC over the radio link only would require placing it as | Deploying SCHC over the Radio Link only would require placing it as | |||
part of the protocol stack for data transfer between the Dev-UE and | part of the protocol stack for data transfer between the Dev-UE and | |||
the RGW-eNB. This stack is the functional layer responsible for | the RGW-eNB. This stack is the functional layer responsible for | |||
transporting data over the wireless connection and managing radio | transporting data over the wireless connection and managing radio | |||
resources. There is support for features such as reliability, | resources. There is support for features such as reliability, | |||
segmentation, and concatenation. The transmissions use link | segmentation, and concatenation. The transmissions use link | |||
adaptation, meaning that the system will optimize the transport | adaptation, meaning that the system will optimize the transport | |||
format used according to the radio conditions, the number of bits to | format used according to the radio conditions, the number of bits to | |||
transmit, and the power and interference constraints. That means | transmit, and the power and interference constraints. That means | |||
that the number of bits transmitted over the air depends on the | that the number of bits transmitted over the air depends on the | |||
selected Modulation and Coding Schemes (MCS). Transport Block (TB) | selected Modulation and Coding Schemes (MCSs). Transport Block (TB) | |||
transmissions happen in the physical layer at network-synchronized | transmissions happen in the Physical Layer at network-synchronized | |||
intervals called Transmission Time Interval (TTI). Each Transport | intervals called Transmission Time Interval (TTI). Each TB has a | |||
Block has a different MCS and number of bits available to transmit. | different MCS and number of bits available to transmit. The MAC | |||
The MAC layer [TR36321] defines the Transport Blocks' | layer [TR36321] defines the characteristics of the TBs. The Radio | |||
characteristics. The Radio link stack shown in Figure 3 comprises | Link stack shown in Figure 3 comprises the Packet Data Convergence | |||
the Packet Data Convergence Protocol (PDCP) [TS36323], Radio Link | Protocol (PDCP) [TS36323], the Radio Link Protocol (RLC) [TS36322], | |||
Protocol (RLC) [TS36322], Medium Access Control protocol (MAC) | the Medium Access Control protocol (MAC) [TR36321], and the Physical | |||
[TR36321], and the Physical Layer [TS36201]. The Appendix A gives | Layer [TS36201]. Appendix A gives more details about these | |||
more details about these protocols. | protocols. | |||
+---------+ +---------+ | | +---------+ +---------+ | | |||
|IP/non-IP+------------------------------+IP/non-IP+->+ | |IP/Non-IP+------------------------------+IP/Non-IP+->+ | |||
+---------+ | +---------------+ | +---------+ | | +---------+ | +---------------+ | +---------+ | | |||
| PDCP +-------+ PDCP | GTP|U +------+ GTP-U |->+ | | PDCP +-------+ PDCP | GTP|U +------+ GTP-U |->+ | |||
| (SCHC) + + (SCHC)| + + | | | | (SCHC) + + (SCHC)| + + | | | |||
+---------+ | +---------------+ | +---------+ | | +---------+ | +---------------+ | +---------+ | | |||
| RLC +-------+ RLC |UDP/IP +------+ UDP/IP +->+ | | RLC +-------+ RLC |UDP/IP +------+ UDP/IP +->+ | |||
+---------+ | +---------------+ | +---------+ | | +---------+ | +---------------+ | +---------+ | | |||
| MAC +-------+ MAC | L2 +------+ L2 +->+ | | MAC +-------+ MAC | L2 +------+ L2 +->+ | |||
+---------+ | +---------------+ | +---------+ | | +---------+ | +---------------+ | +---------+ | | |||
| PHY +-------+ PHY | PHY +------+ PHY +->+ | | PHY +-------+ PHY | PHY +------+ PHY +->+ | |||
+---------+ +---------------+ +---------+ | | +---------+ +---------------+ +---------+ | | |||
C-Uu/ S1-U SGi | C-Uu/ S1-U SGi | |||
Dev-UE RGW-eNB NGW-CSGN | Dev-UE RGW-eNB NGW-CSGN | |||
Radio Link | Radio Link | |||
Figure 3: SCHC over the Radio link | Figure 3: SCHC over the Radio Link | |||
5.2.1.1. SCHC Entities Placing over the Radio Link | 5.2.1.1. Placing SCHC Entities over the Radio Link | |||
The 3GPP architecture supports Robust Header Compression (ROHC) | The 3GPP architecture supports Robust Header Compression (ROHC) | |||
[RFC5795] in the PDCP layer. Therefore, the architecture can deploy | [RFC5795] in the PDCP layer. Therefore, the architecture can deploy | |||
SCHC header compression entities similarly without the need for | SCHC header compression entities similarly without the need for | |||
significant changes in the 3GPP specifications. | significant changes in the 3GPP specifications. | |||
The RLC layer has three functional modes Transparent Mode (TM), | The RLC layer has three functional modes: Transparent Mode (TM), | |||
Unacknowledged Mode (UM), and Acknowledged Mode (AM). The mode of | Unacknowledged Mode (UM), and Acknowledged Mode (AM). The mode of | |||
operation controls the functionalities of the RLC layer. TM only | operation controls the functionalities of the RLC layer. TM only | |||
applies to signaling packets, while AM or UM carry signaling and data | applies to signaling packets, while AM or UM carry signaling and data | |||
packets. | packets. | |||
The RLC layer takes care of fragmentation unless for the Transparent | The RLC layer takes care of fragmentation except for the TM. In AM | |||
Mode. In AM or UM modes, the SCHC fragmentation is unnecessary and | or UM, the SCHC fragmentation is unnecessary and SHOULD NOT be used. | |||
SHOULD NOT be used. While sending IP packets, the Radio link does | While sending IP packets, the Radio Link does not commonly use the | |||
not commonly use the RLC Transparent Mode. However, if other | RLC TM. However, if other protocol overhead optimizations are | |||
protocol overhead optimizations are targeted for NB-IoT traffic, SCHC | targeted for NB-IoT traffic, SCHC fragmentation may be used for TM | |||
fragmentation may be used for TM transmission mode in the future. | transmission in the future. | |||
5.2.2. Use of SCHC over the Non-Access Stratum (NAS) | 5.2.2. Use of SCHC over the Non-Access Stratum (NAS) | |||
This section consists of IETF suggestions to the 3GPP. The NGW-MME | This section consists of IETF suggestions to the 3GPP. The NGW-MME | |||
conveys mainly signaling between the Dev-UE and the cellular network | conveys mainly signaling between the Dev-UE and the cellular network | |||
[TR24301]. The network transports this traffic on top of the radio | [TR24301]. The network transports this traffic on top of the Radio | |||
link. | Link. | |||
This kind of flow supports data transmissions to reduce the overhead | This kind of flow supports data transmissions to reduce the overhead | |||
when transmitting infrequent small quantities of data. This | when transmitting infrequent small quantities of data. This | |||
transmission is known as Data over Non-Access Stratum (DoNAS) or | transmission is known as Data over Non-Access Stratum (DoNAS) or | |||
Control Plane Cellular Internet of Things (CIoT) evolved packet | Control Plane CIoT EPS optimizations. In DoNAS, the Dev-UE uses the | |||
system (EPS) optimizations. In DoNAS, the Dev-UE uses the pre- | pre-established security, can piggyback small uplink data into the | |||
established security and can piggyback small uplink data into the | initial uplink message, and uses an additional message to receive a | |||
initial uplink message and uses an additional message to receive a | ||||
downlink small data response. | downlink small data response. | |||
The NGW-MME performs the data encryption from the network side in a | The NGW-MME performs the data encryption from the network side in a | |||
DoNAS PDU. Depending on the data type signaled indication (IP or | DoNAS PDU. Depending on the data type signaled indication (IP or | |||
non-IP data), the network allocates an IP address or establishes a | Non-IP data), the network allocates an IP address or establishes a | |||
direct forwarding path. DoNAS is regulated under rate control upon | direct forwarding path. DoNAS is regulated under rate control upon | |||
previous agreement, meaning that a maximum number of bits per unit of | previous agreement, meaning that a maximum number of bits per unit of | |||
time is agreed upon per device subscription beforehand and configured | time is agreed upon per device subscription beforehand and configured | |||
in the device. | in the device. | |||
The system will use DoNAS when a terminal in a power-saving state | The system will use DoNAS when a terminal in a power-saving state | |||
requires a short transmission and receives an acknowledgment or short | requires a short transmission and receives an acknowledgment or short | |||
feedback from the network. Depending on the size of buffered data to | feedback from the network. Depending on the size of the buffered | |||
transmit, the Dev-UE might deploy the connected mode transmissions | data to be transmitted, the Dev-UE might deploy the connected mode | |||
instead, limiting and controlling the DoNAS transmissions to | transmission instead. The connected mode would limit and control the | |||
predefined thresholds and a good resource optimization balance for | DoNAS transmissions to predefined thresholds, and it would be a good | |||
the terminal and the network. The support for mobility of DoNAS is | resource optimization balance for the terminal and the network. The | |||
present but produces additional overhead. The Appendix B gives | support for mobility of DoNAS is present but produces additional | |||
additional details of DoNAS. | overhead. Appendix B gives additional details of DoNAS. | |||
5.2.2.1. SCHC Entities Placing over DoNAS | 5.2.2.1. Placing SCHC Entities over DoNAS | |||
SCHC resides in this scenario's Non-Access Stratum (NAS) protocol | SCHC resides in this scenario's Non-Access Stratum (NAS) protocol | |||
layer. The same principles as for the section Section 5.2.1 apply | layer. The same principles as for Section 5.2.1 apply here as well. | |||
here as well. Because the NAS protocol already uses ROHC [RFC5795], | Because the NAS protocol already uses ROHC [RFC5795], it can also | |||
it can also adapt SCHC for header compression. The main difference | adapt SCHC for header compression. The main difference compared to | |||
compared to the radio link, section Section 5.2.1, is the physical | the Radio Link (Section 5.2.1) is the physical placing of the SCHC | |||
placing of the SCHC entities. On the network side, the NGW-MME | entities. On the network side, the NGW-MME resides in the core | |||
resides in the core network and is the terminating node for NAS | network and is the terminating node for NAS instead of the RGW-eNB. | |||
instead of the RGW-eNB. | ||||
+--------+ +--------+--------+ + +--------+ | +--------+ +--------+--------+ + +--------+ | |||
| IP/ +--+-----------------+--+ IP/ | IP/ +-----+ IP/ | | | IP/ +--+-----------------+--+ IP/ | IP/ +-----+ IP/ | | |||
| Non-IP | | | | Non-IP | Non-IP | | | Non-IP | | | Non-IP | | | | Non-IP | Non-IP | | | Non-IP | | |||
+--------+ | | +-----------------+ | +--------+ | +--------+ | | +-----------------+ | +--------+ | |||
| NAS +-----------------------+ NAS |GTP-C/U +-----+GTP-C/U | | | NAS +-----------------------+ NAS |GTP-C/U +-----+GTP-C/U | | |||
|(SCHC) | | | | (SCHC) | | | | | | |(SCHC) | | | | (SCHC) | | | | | | |||
+--------+ | +-----------+ | +-----------------+ | +--------+ | +--------+ | +-----------+ | +-----------------+ | +--------+ | |||
| RRC +-----+RRC |S1|AP+-----+ S1|AP | | | | | | | RRC +-----+RRC |S1|AP+-----+ S1|AP | | | | | | |||
+--------+ | +-----------+ | +--------+ UDP +-----+ UDP | | +--------+ | +-----------+ | +--------+ UDP +-----+ UDP | | |||
skipping to change at page 13, line 38 ¶ | skipping to change at line 611 ¶ | |||
+--------+ | +-----------+ | +-----------------+ | +--------+ | +--------+ | +-----------+ | +-----------------+ | +--------+ | |||
| MAC +-----+ MAC | L2 +-----+ L2 | L2 +-----+ L2 | | | MAC +-----+ MAC | L2 +-----+ L2 | L2 +-----+ L2 | | |||
+--------+ | +-----------+ | +-----------------+ | +--------+ | +--------+ | +-----------+ | +-----------------+ | +--------+ | |||
| PHY +--+--+ PHY | PHY +--+--+ PHY | PHY +-----+ PHY | | | PHY +--+--+ PHY | PHY +--+--+ PHY | PHY +-----+ PHY | | |||
+--------+ +-----+-----+ +--------+--------+ | +--------+ | +--------+ +-----+-----+ +--------+--------+ | +--------+ | |||
C-Uu/ S1 SGi | C-Uu/ S1 SGi | |||
Dev-UE RGW-eNB NGW-MME NGW-PGW | Dev-UE RGW-eNB NGW-MME NGW-PGW | |||
*PDCP is bypassed until AS security is activated TGPP36300. | *PDCP is bypassed until AS security is activated TGPP36300. | |||
Figure 4: SCHC entities placement in the 3GPP CIOT radio protocol | Figure 4: SCHC Entities Placement in the 3GPP CIOT Radio Protocol | |||
architecture for DoNAS transmissions | Architecture for DoNAS Transmissions | |||
5.2.3. Parameters for Static Context Header Compression and | 5.2.3. Parameters for Static Context Header Compression and | |||
Fragmentation (SCHC) for the Radio link and DONAS use-cases. | Fragmentation (SCHC) for the Radio Link and DoNAS Use Cases | |||
If 3GPP incorporates SCHC, it is recommended that these scenarios use | If 3GPP incorporates SCHC, it is recommended that these scenarios use | |||
SCHC header compression [RFC8724] capability to optimize the data | the SCHC header compression [RFC8724] capability to optimize the data | |||
transmission. | transmission. | |||
* SCHC Context initialization. | * SCHC Context Initialization | |||
The RRC (Radio Resource Control) protocol is the main tool used to | The Radio Resource Control (RRC) protocol is the main tool used to | |||
configure the parameters of the Radio link. It will configure SCHC | configure the parameters of the Radio Link. It will configure | |||
and the static context distribution as it has made for ROHC [RFC5795] | SCHC and the static context distribution as it has been made for | |||
operation [TS36323]. | ROHC operation [RFC5795] [TS36323]. | |||
* SCHC Rules. | * SCHC Rules | |||
The network operator in these scenarios defines the number of rules. | The network operator defines the number of rules in these | |||
For this, the network operator must know the IP traffic the device | scenarios. For this, the network operator must know the IP | |||
will carry. The operator might supply rules compatible with the | traffic the device will carry. The operator might supply rules | |||
device's use case. For devices acting as a capillary gateway, | compatible with the device's use case. For devices acting as a | |||
several rules match the diversity of devices and protocols used by | capillary gateway, several rules match the diversity of devices | |||
the devices associated with the gateway. Meanwhile, simpler devices | and protocols used by the devices associated with the gateway. | |||
may have predetermined protocols and fixed parameters. The use of | Meanwhile, simpler devices may have predetermined protocols and | |||
IPv6 and IPv4 may force to get more rules to deal with each case. | fixed parameters. The use of IPv6 and IPv4 may force the operator | |||
to develop more rules to deal with each case. | ||||
* RuleID. | * RuleID | |||
There is a reasonable assumption of 9 bytes of radio protocol | There is a reasonable assumption of 9 bytes of radio protocol | |||
overhead for these transmission scenarios in NB-IoT, where PDCP uses | overhead for these transmission scenarios in NB-IoT, where PDCP | |||
5 bytes due to header and integrity protection, and RLC and MAC use 4 | uses 5 bytes due to header and integrity protection and where RLC | |||
bytes. The minimum physical Transport Blocks (TB) that can withhold | and MAC use 4 bytes. The minimum physical TBs that can withhold | |||
this overhead value according to 3GPP Release 15 specifications are | this overhead value, according to the 3GPP Release 15 | |||
88, 104, 120, and 144 bits. As for Section 5.1.1.2, these scenarios | specification [R15-3GPP], are 88, 104, 120, and 144 bits. As for | |||
must optimize the physical layer where the smallest TB is 12 bits. | Section 5.1.1.2, these scenarios must optimize the Physical Layer | |||
These 12 bits must include the Compression Residue in addition to the | where the smallest TB is 12 bits. These 12 bits must include the | |||
RuleID. On the other hand, more complex NB-IoT devices (such as a | Compression Residue in addition to the RuleID. On the other hand, | |||
capillary gateway) might require additional bits to handle the | more complex NB-IoT devices (such as a capillary gateway) might | |||
variety and multiple parameters of higher-layer protocols deployed. | require additional bits to handle the variety and multiple | |||
In that sense, the operator may want flexibility on the number and | parameters of higher-layer protocols deployed. In that sense, the | |||
type of rules independently supported by each device; consequently, | operator may want flexibility on the number and type of rules | |||
these scenarios require a configurable value. The configuration may | independently supported by each device; consequently, these | |||
be part of the agreed operation profile with the content | scenarios require a configurable value. The configuration may be | |||
distribution. The RuleID field size may range from 2 bits, resulting | part of the agreed operation profile with the content | |||
in 4 rules to an 8-bit value that would yield up to 256 rules that | distribution. The RuleID field size may range from 2 bits, | |||
can be used with the operators and seems quite a reasonable maximum | resulting in 4 rules, to an 8-bit value, yielding up to 256 rules | |||
limit even for a device acting as a NAT. An application may use a | for use with the operators. A 256-rule maximum limit seems to be | |||
larger RuleID, but it should consider the byte alignment of the | quite reasonable, even for a device acting as a NAT. An | |||
expected Compression Residue. In the minimum TB size case, 2 bits of | application may use a larger RuleID, but it should consider the | |||
RuleID leave only 6 bits available for Compression Residue. | byte alignment of the expected Compression Residue. In the | |||
minimum TB size case, 2 bits of RuleID leave only 6 bits available | ||||
for Compression Residue. | ||||
* SCHC MAX_PACKET_SIZE. | * SCHC MAX_PACKET_SIZE | |||
The Radio Link can handle the fragmentation of SCHC packets if | The Radio Link can handle the fragmentation of SCHC packets if | |||
needed, including reliability. Hence, the packet size is limited by | needed, including reliability. Hence, the packet size is limited | |||
the MTU handled by the radio protocols, which corresponds to 1600 | by the MTU that is handled by the radio protocols, which | |||
bytes for 3GPP Release 15. | corresponds to 1600 bytes for the 3GPP Release 15. | |||
* Fragmentation. | * Fragmentation | |||
For the Radio link Section 5.2.1 and DoNAS' Section 5.2.2 scenarios, | For the Radio Link (Section 5.2.1) and DoNAS (Section 5.2.2) | |||
the SCHC fragmentation functions are disabled. The RLC layer of NB- | scenarios, the SCHC fragmentation functions are disabled. The RLC | |||
IoT can segment packets into suitable units that fit the selected | layer of NB-IoT can segment packets into suitable units that fit | |||
transport blocks for transmissions of the physical layer. The block | the selected TB for transmissions of the Physical Layer. The | |||
selection is made according to the link adaptation input function in | block selection is made according to the link adaptation input | |||
the MAC layer and the quantity of data in the buffer. The link | function in the MAC layer and the quantity of data in the buffer. | |||
adaptation layer may produce different results at each Time | The link adaptation layer may produce different results at each | |||
Transmission Interval (TTI), resulting in varying physical transport | TTI, resulting in varying physical TBs that depend on the network | |||
blocks that depend on the network load, interference, number of bits | load, interference, number of bits transmitted, and QoS. Even if | |||
transmitted, and QoS. Even if setting a value that allows the | setting a value that allows the construction of data units | |||
construction of data units following the SCHC tiles principle, the | following the SCHC tiles principle, the protocol overhead may be | |||
protocol overhead may be greater or equal to allowing the Radio link | greater or equal to allowing the Radio Link protocols to take care | |||
protocols to take care of the fragmentation intrinsically. | of the fragmentation intrinsically. | |||
* Fragmentation in RLC Transparent Mode. | * Fragmentation in RLC TM | |||
The RLC Transparent Mode mostly applies to control signaling | The RLC TM mostly applies to control signaling transmissions. | |||
transmissions. When RLC operates in Transparent Mode, the MAC layer | When RLC operates in TM, the MAC layer mechanisms ensure | |||
mechanisms ensure reliability and generate overhead. This additional | reliability and generate overhead. This additional reliability | |||
reliability implies sending repetitions or automatic retransmissions. | implies sending repetitions or automatic retransmissions. | |||
The ACK-Always fragmentation mode of SCHC may reduce this overhead in | The ACK-Always fragmentation mode of SCHC may reduce this overhead | |||
future operations when data transmissions may use this mode. ACK- | in future operations when data transmissions may use this mode. | |||
Always mode may transmit compressed data with fewer possible | The ACK-Always mode may transmit compressed data with fewer | |||
transmissions by using fixed or limited transport blocks compatible | possible transmissions by using fixed or limited TBs compatible | |||
with the tiling SCHC fragmentation handling. For SCHC fragmentation | with the tiling SCHC fragmentation handling. For SCHC | |||
parameters see Section 5.1.1.2. | fragmentation parameters, see Section 5.1.1.2. | |||
6. Padding | 6. Padding | |||
NB-IoT and 3GPP wireless access, in general, assumes byte-aligned | NB-IoT and 3GPP wireless access, in general, assumes a byte-aligned | |||
payload. Therefore, the layer 2 word for NB-IoT MUST be considered 8 | payload. Therefore, the L2 Word for NB-IoT MUST be considered 8 | |||
bits, and the padding treatment should use this value accordingly. | bits, and the padding treatment should use this value accordingly. | |||
7. IANA considerations | 7. IANA Considerations | |||
This document has no IANA actions. | This document has no IANA actions. | |||
8. Security considerations | 8. Security Considerations | |||
This document does not add any security considerations and follows | This document does not add any security considerations and follows | |||
the [RFC8724] and the 3GPP access security document specified in | [RFC8724] and the 3GPP access security document specified in | |||
[TS33122]. | [TS33122]. | |||
9. References | 9. References | |||
9.1. Normative References | 9.1. Normative References | |||
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | |||
Requirement Levels", BCP 14, RFC 2119, | Requirement Levels", BCP 14, RFC 2119, | |||
DOI 10.17487/RFC2119, March 1997, | DOI 10.17487/RFC2119, March 1997, | |||
<https://www.rfc-editor.org/info/rfc2119>. | <https://www.rfc-editor.org/info/rfc2119>. | |||
[RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC | [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC | |||
2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, | 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, | |||
May 2017, <https://www.rfc-editor.org/info/rfc8174>. | May 2017, <https://www.rfc-editor.org/info/rfc8174>. | |||
skipping to change at page 16, line 29 ¶ | skipping to change at line 747 ¶ | |||
<https://www.rfc-editor.org/info/rfc8724>. | <https://www.rfc-editor.org/info/rfc8724>. | |||
[RFC8824] Minaburo, A., Toutain, L., and R. Andreasen, "Static | [RFC8824] Minaburo, A., Toutain, L., and R. Andreasen, "Static | |||
Context Header Compression (SCHC) for the Constrained | Context Header Compression (SCHC) for the Constrained | |||
Application Protocol (CoAP)", RFC 8824, | Application Protocol (CoAP)", RFC 8824, | |||
DOI 10.17487/RFC8824, June 2021, | DOI 10.17487/RFC8824, June 2021, | |||
<https://www.rfc-editor.org/info/rfc8824>. | <https://www.rfc-editor.org/info/rfc8824>. | |||
9.2. Informative References | 9.2. Informative References | |||
[OMA0116] OMA, "Common definitions for RESTful Network APIs", 2018, | [OMA0116] Open Mobile Alliance, "Common definitions for RESTful | |||
Network APIs", Version 1.0, January 2018, | ||||
<https://www.openmobilealliance.org/release/ | <https://www.openmobilealliance.org/release/ | |||
REST_NetAPI_Common/V1_0-20180116-A/OMA-TS- | REST_NetAPI_Common/V1_0-20180116-A/OMA-TS- | |||
REST_NetAPI_Common-V1_0-20180116-A.pdf>. | REST_NetAPI_Common-V1_0-20180116-A.pdf>. | |||
[R15-3GPP] 3GPP, "Release 15", April 2019, <https://www.3gpp.org/ | ||||
specifications-technologies/releases/release-15>. | ||||
[RFC5795] Sandlund, K., Pelletier, G., and L-E. Jonsson, "The RObust | [RFC5795] Sandlund, K., Pelletier, G., and L-E. Jonsson, "The RObust | |||
Header Compression (ROHC) Framework", RFC 5795, | Header Compression (ROHC) Framework", RFC 5795, | |||
DOI 10.17487/RFC5795, March 2010, | DOI 10.17487/RFC5795, March 2010, | |||
<https://www.rfc-editor.org/info/rfc5795>. | <https://www.rfc-editor.org/info/rfc5795>. | |||
[RFC8376] Farrell, S., Ed., "Low-Power Wide Area Network (LPWAN) | [RFC8376] Farrell, S., Ed., "Low-Power Wide Area Network (LPWAN) | |||
Overview", RFC 8376, DOI 10.17487/RFC8376, May 2018, | Overview", RFC 8376, DOI 10.17487/RFC8376, May 2018, | |||
<https://www.rfc-editor.org/info/rfc8376>. | <https://www.rfc-editor.org/info/rfc8376>. | |||
[TR-0024] OneM2M, "3GPP_Interworking", 2020, | [TR-0024] OneM2M, "3GPP_Interworking", TR-0024-V4.3.0, March 2020, | |||
<https://ftp.onem2m.org/work%20programme/WI-0037/TR-0024- | <https://ftp.onem2m.org/work%20programme/WI-0037/TR-0024- | |||
3GPP_Interworking-V4_3_0.DOCX>. | 3GPP_Interworking-V4_3_0.DOCX>. | |||
[TR23720] 3GPP, "Study on architecture enhancements for Cellular | [TR23720] 3GPP, "Study on architecture enhancements for Cellular | |||
Internet of Things", 2015, | Internet of Things", 3GPP TR 23.720 V13.0.0, March 2016, | |||
<https://www.3gpp.org/ftp/Specs/ | <https://www.3gpp.org/ftp/Specs/ | |||
archive/23_series/23.720/23720-d00.zip>. | archive/23_series/23.720/23720-d00.zip>. | |||
[TR24301] 3GPP, "Evolved Universal Terrestrial Radio Access | [TR24301] 3GPP, "Non-Access-Stratum (NAS) protocol for Evolved | |||
(E-UTRA); Medium Access Control (MAC) protocol | Packet System (EPS); Stage 3", 3GPP TS 24.301 V15.8.0, | |||
specification", 2019, <https://www.3gpp.org/ftp//Specs/ | December 2019, <https://www.3gpp.org/ftp//Specs/ | |||
archive/24_series/24.301/24301-f80.zip>. | archive/24_series/24.301/24301-f80.zip>. | |||
[TR36321] 3GPP, "Evolved Universal Terrestrial Radio Access | [TR36321] 3GPP, "Evolved Universal Terrestrial Radio Access | |||
(E-UTRA); Medium Access Control (MAC) protocol | (E-UTRA); Medium Access Control (MAC) protocol | |||
specification", 2016, <https://www.3gpp.org/ftp/Specs/ | specification", 3GPP TS 36.321 V13.2.0, June 2016, | |||
<https://www.3gpp.org/ftp/Specs/ | ||||
archive/36_series/36.321/36321-d20.zip>. | archive/36_series/36.321/36321-d20.zip>. | |||
[TS23222] 3GPP, "Common API Framework for 3GPP Northbound APIs", | [TS23222] 3GPP, "Functional architecture and information flows to | |||
2022, <https://www.3gpp.org/ftp/Specs/ | support Common API Framework for 3GPP Northbound APIs; | |||
Stage 2", 3GPP TS 23.222 V15.6.0, September 2022, | ||||
<https://www.3gpp.org/ftp/Specs/ | ||||
archive/23_series/23.222/23222-f60.zip>. | archive/23_series/23.222/23222-f60.zip>. | |||
[TS24008] 3GPP, "Mobile radio interface layer 3 specification.", | [TS24008] 3GPP, "Mobile radio interface Layer 3 specification; Core | |||
2018, <https://www.3gpp.org/ftp//Specs/ | network protocols; Stage 3", 3GPP TS 24.008 V15.5.0, | |||
December 2018, <https://www.3gpp.org/ftp//Specs/ | ||||
archive/24_series/24.008/24008-f50.zip>. | archive/24_series/24.008/24008-f50.zip>. | |||
[TS33122] 3GPP, "Security aspects of Common API Framework (CAPIF) | [TS33122] 3GPP, "Security aspects of Common API Framework (CAPIF) | |||
for 3GPP northbound APIs", 2018, | for 3GPP northbound APIs", 3GPP TS 33.122 V15.3.0, March | |||
<https://www.3gpp.org/ftp//Specs/ | 2019, <https://www.3gpp.org/ftp//Specs/ | |||
archive/33_series/33.122/33122-f30.zip>. | archive/33_series/33.122/33122-f30.zip>. | |||
[TS36201] 3GPP, "Evolved Universal Terrestrial Radio Access | [TS36201] 3GPP, "Evolved Universal Terrestrial Radio Access | |||
(E-UTRA); LTE physical layer; General description", 2018, | (E-UTRA); LTE physical layer; General description", 3GPP | |||
TS 36.201 V15.1.0, June 2018, | ||||
<https://www.3gpp.org/ftp/Specs/ | <https://www.3gpp.org/ftp/Specs/ | |||
archive/36_series/36.201/36201-f10.zip>. | archive/36_series/36.201/36201-f10.zip>. | |||
[TS36322] 3GPP, "Evolved Universal Terrestrial Radio Access | [TS36322] 3GPP, "Evolved Universal Terrestrial Radio Access | |||
(E-UTRA); Radio Link Control (RLC) protocol | (E-UTRA); Radio Link Control (RLC) protocol | |||
specification", 2018, <https://www.3gpp.org/ftp/Specs/ | specification", 3GPP TS 36.322 V15.0.1, April 2018, | |||
<https://www.3gpp.org/ftp/Specs/ | ||||
archive/36_series/36.322/36322-f01.zip>. | archive/36_series/36.322/36322-f01.zip>. | |||
[TS36323] 3GPP, "Evolved Universal Terrestrial Radio Access | [TS36323] 3GPP, "Evolved Universal Terrestrial Radio Access | |||
(E-UTRA); Packet Data Convergence Protocol (PDCP) | (E-UTRA); Packet Data Convergence Protocol (PDCP) | |||
specification", 2016, <https://www.3gpp.org/ftp/Specs/ | specification", 3GPP TS 36.323 V13.2.0, June 2016, | |||
<https://www.3gpp.org/ftp/Specs/ | ||||
archive/36_series/36.323/36323-d20.zip>. | archive/36_series/36.323/36323-d20.zip>. | |||
[TS36331] 3GPP, "Evolved Universal Terrestrial Radio Access | [TS36331] 3GPP, "Evolved Universal Terrestrial Radio Access | |||
(E-UTRA); Radio Resource Control (RRC); Protocol | (E-UTRA); Radio Resource Control (RRC); Protocol | |||
specification", 2018, <https://www.3gpp.org/ftp//Specs/ | specification", 3GPP TS 36.331 V15.5.1, April 2019, | |||
<https://www.3gpp.org/ftp//Specs/ | ||||
archive/36_series/36.331/36331-f51.zip>. | archive/36_series/36.331/36331-f51.zip>. | |||
[_3GPPR15] 3GPP, "The Mobile Broadband Standard", 2019, | Appendix A. NB-IoT User Plane Protocol Architecture | |||
<https://www.3gpp.org/release-15>. | ||||
Appendix A. NB-IoT User Plane protocol architecture | A.1. Packet Data Convergence Protocol (PDCP) | |||
A.1. Packet Data Convergence Protocol (PDCP) [TS36323] | ||||
Each of the Radio Bearers (RB) is associated with one PDCP entity. | Each of the Radio Bearers (RBs) is associated with one PDCP entity | |||
Moreover, a PDCP entity is associated with one or two RLC entities | [TS36323]. Moreover, a PDCP entity is associated with one or two RLC | |||
depending on the unidirectional or bi-directional characteristics of | entities, depending on the unidirectional or bidirectional | |||
the RB and RLC mode used. A PDCP entity is associated with either a | characteristics of the RB and RLC mode used. A PDCP entity is | |||
control plane or a user plane with independent configuration and | associated with either a control plane or a user plane with | |||
functions. The maximum supported size for NB-IoT of a PDCP SDU is | independent configuration and functions. The maximum supported size | |||
1600 octets. The primary services and functions of the PDCP sublayer | for NB-IoT of a PDCP SDU is 1600 octets. The primary services and | |||
for NB-IoT for the user plane include: | functions of the PDCP sublayer for NB-IoT for the user plane include: | |||
* Header compression and decompression using ROHC [RFC5795] | * Header compression and decompression using ROHC [RFC5795] | |||
* Transfer of user and control data to higher and lower layers | * Transfer of user and control data to higher and lower layers | |||
* Duplicate detection of lower layer SDUs when re-establishing | * Duplicate detection of lower-layer SDUs when re-establishing | |||
connection (when RLC with Acknowledge Mode in use for User Plane | connection (when RLC with Acknowledge Mode is in use for User | |||
only) | Plane only) | |||
* Ciphering and deciphering | * Ciphering and deciphering | |||
* Timer-based SDU discard in uplink | * Timer-based SDU discard in uplink | |||
A.2. Radio Link Protocol (RLC) [TS36322] | A.2. Radio Link Protocol (RLC) | |||
RLC is a layer-2 protocol that operates between the UE and the base | RLC [TS36322] is an L2 protocol that operates between the User | |||
station (eNB). It supports the packet delivery from higher layers to | Equipment (UE) and the base station (eNB). It supports the packet | |||
MAC, creating packets transmitted over the air, optimizing the | delivery from higher layers to MAC, creating packets transmitted over | |||
Transport Block utilization. RLC flow of data packets is | the air, optimizing the TB utilization. RLC flow of data packets is | |||
unidirectional, and it is composed of a transmitter located in the | unidirectional, and it is composed of a transmitter located in the | |||
transmission device and a receiver located in the destination device. | transmission device and a receiver located in the destination device. | |||
Therefore, to configure bi-directional flows, two sets of entities, | Therefore, to configure bidirectional flows, two sets of entities, | |||
one in each direction (downlink and uplink), must be configured and | one in each direction (downlink and uplink), must be configured and | |||
effectively peered to each other. The peering allows the | effectively peered to each other. The peering allows the | |||
transmission of control packets (ex., status reports) between | transmission of control packets (e.g., status reports) between | |||
entities. RLC can be configured for data transfer in one of the | entities. RLC can be configured for a data transfer in one of the | |||
following modes: | following modes: | |||
* Transparent Mode (TM). RLC does not segment or concatenate SDUs | * Transparent Mode (TM) | |||
from higher layers in this mode and does not include any header to | ||||
the payload. RLC receives SDUs from upper layers when acting as a | ||||
transmitter and transmits directly to its flow RLC receiver via | ||||
lower layers. Similarly, a TM RLC receiver would only deliver | ||||
without processing the packets to higher layers upon reception. | ||||
* Unacknowledged Mode (UM). This mode provides support for | RLC does not segment or concatenate SDUs from higher layers in | |||
segmentation and concatenation of payload. The RLC packet's size | this mode and does not include any header with the payload. RLC | |||
depends on the indication given at a particular transmission | receives SDUs from upper layers when acting as a transmitter and | |||
opportunity by the lower layer (MAC) and is octet-aligned. The | transmits directly to its flow RLC receiver via lower layers. | |||
packet delivery to the receiver does not include reliability | Similarly, upon reception, a TM RLC receiver would not process the | |||
support, and the loss of a segment from a packet means a complete | packets and only deliver them to higher layers. | |||
packet loss. Also, in the case of lower layer retransmissions, | ||||
there is no support for re-segmentation in case of change of the | ||||
radio conditions triggering the selection of a smaller transport | ||||
block. Additionally, it provides PDU duplication detection and | ||||
discards, reordering of out-of-sequence, and loss detection. | ||||
* Acknowledged Mode (AM). In addition to the same functions | * Unacknowledged Mode (UM) | |||
supported by UM, this mode also adds a moving windows-based | ||||
reliability service on top of the lower layer services. It also | ||||
supports re-segmentation, and it requires bidirectional | ||||
communication to exchange acknowledgment reports called RLC Status | ||||
Report and trigger retransmissions. This model also supports | ||||
protocol error detection. The mode used depends on the operator | ||||
configuration for the type of data to be transmitted. For | ||||
example, data transmissions supporting mobility or requiring high | ||||
reliability would be most likely configured using AM. Meanwhile, | ||||
streaming and real-time data would be mapped to a UM | ||||
configuration. | ||||
A.3. Medium Access Control (MAC) [TR36321] | This mode provides support for segmentation and concatenation of | |||
payload. The RLC packet's size depends on the indication given at | ||||
a particular transmission opportunity by the lower layer (MAC) and | ||||
is octet-aligned. The packet delivery to the receiver does not | ||||
include reliability support, and the loss of a segment from a | ||||
packet means a complete packet loss. Also, in lower-layer | ||||
retransmissions, there is no support for re-segmentation in case | ||||
the radio conditions change and trigger the selection of a smaller | ||||
TB. Additionally, it provides PDU duplication detection and | ||||
discards, out-of-sequence reordering, and loss detection. | ||||
MAC provides a mapping between the higher layers abstraction called | * Acknowledged Mode (AM) | |||
Logical Channels comprised by the previously described protocols to | ||||
the Physical layer channels (transport channels). Additionally, MAC | In addition to the same functions supported by UM, this mode also | |||
may multiplex packets from different Logical Channels and prioritize | adds a moving windows-based reliability service on top of the | |||
what to fit into one Transport Block if there is data and space | lower-layer services. It also supports re-segmentation, and it | |||
available to maximize data transmission efficiency. MAC also | requires bidirectional communication to exchange acknowledgment | |||
provides error correction and reliability support through Hybrid | reports, called RLC Status Reports, and to trigger | |||
Automatic Repeat reQuest (HARQ), transport format selection, and | retransmissions. This model also supports protocol-error | |||
scheduling information reporting from the terminal to the network. | detection. The mode used depends on the operator configuration | |||
MAC also adds the necessary padding and piggyback control elements | for the type of data to be transmitted. For example, data | |||
when possible and the higher layers data. | transmissions supporting mobility or requiring high reliability | |||
would be most likely configured using AM. Meanwhile, streaming | ||||
and real-time data would be mapped to a UM configuration. | ||||
A.3. Medium Access Control (MAC) | ||||
MAC [TR36321] provides a mapping between the higher layers | ||||
abstraction called Logical Channels (which are comprised by the | ||||
previously described protocols) and the Physical Layer channels | ||||
(transport channels). Additionally, MAC may multiplex packets from | ||||
different Logical Channels and prioritize which ones to fit into one | ||||
TB if there is data and space available to maximize data transmission | ||||
efficiency. MAC also provides error correction and reliability | ||||
support through Hybrid Automatic Repeat reQuest (HARQ), transport | ||||
format selection, and scheduling information reported from the | ||||
terminal to the network. MAC also adds the necessary padding and | ||||
piggyback control elements, when possible, as well as the higher | ||||
layers data. | ||||
<Max. 1600 bytes> | <Max. 1600 bytes> | |||
+---+ +---+ +------+ | +---+ +---+ +------+ | |||
Application |AP1| |AP1| | AP2 | | Application |AP1| |AP1| | AP2 | | |||
(IP/non-IP) |PDU| |PDU| | PDU | | (IP/Non-IP) |PDU| |PDU| | PDU | | |||
+---+ +---+ +------+ | +---+ +---+ +------+ | |||
| | | | | | | | | | | | | | |||
PDCP +--------+ +-------- +-----------+ | PDCP +--------+ +-------- +-----------+ | |||
|PDCP|AP1| |PDCP|AP1| |PDCP| AP2 | | |PDCP|AP1| |PDCP|AP1| |PDCP| AP2 | | |||
|Head|PDU| |Head|PDU| |Head| PDU | | |Head|PDU| |Head|PDU| |Head| PDU | | |||
+--------+ +--------+ +--------+--\ | +--------+ +--------+ +--------+--\ | |||
| | | | | | | | |\ `--------\ | | | | | | | | | |\ `--------\ | |||
+---------------------------+ | |(1)| `-------\(2)\ | +---------------------------+ | |(1)| `-------\(2)\ | |||
RLC |RLC |PDCP|AP1|RLC |PDCP|AP1| +-------------+ +----|---+ | RLC |RLC |PDCP|AP1|RLC |PDCP|AP1| +-------------+ +----|---+ | |||
|Head|Head|PDU|Head|Head|PDU| |RLC |PDCP|AP2| |RLC |AP2| | |Head|Head|PDU|Head|Head|PDU| |RLC |PDCP|AP2| |RLC |AP2| | |||
skipping to change at page 20, line 35 ¶ | skipping to change at line 946 ¶ | |||
+------------------------------------------+ +-----------+---+ | +------------------------------------------+ +-----------+---+ | |||
MAC |MAC|RLC|PDCP|AP1|RLC|PDCP|AP1|RLC|PDCP|AP2| |MAC|RLC|AP2|Pad| | MAC |MAC|RLC|PDCP|AP1|RLC|PDCP|AP1|RLC|PDCP|AP2| |MAC|RLC|AP2|Pad| | |||
|Hea|Hea|Hea |PDU|Hea|Hea |PDU|Hea|Hea |PDU| |Hea|Hea|PDU|din| | |Hea|Hea|Hea |PDU|Hea|Hea |PDU|Hea|Hea |PDU| |Hea|Hea|PDU|din| | |||
|der|der|der | |der|der | |der|der | | |der|der| |g | | |der|der|der | |der|der | |der|der | | |der|der| |g | | |||
+------------------------------------------+ +-----------+---+ | +------------------------------------------+ +-----------+---+ | |||
TB1 TB2 | TB1 TB2 | |||
(1) Segment One | (1) Segment One | |||
(2) Segment Two | (2) Segment Two | |||
Figure 5: Example of User Plane packet encapsulation for two | Figure 5: Example of User Plane Packet Encapsulation for Two | |||
transport blocks | Transport Blocks | |||
Appendix B. NB-IoT Data over NAS (DoNAS) | Appendix B. NB-IoT Data over NAS (DoNAS) | |||
The Access Stratum (AS) protocol stack used by DoNAS is specific | The Access Stratum (AS) protocol stack used by DoNAS is specific | |||
because the radio network still needs to establish the security | because the radio network still needs to establish the security | |||
associations and reduce the protocol overhead, so the PDCP (Packet | associations and reduce the protocol overhead so that the PDCP is | |||
Data Convergence Protocol) is bypassed until AS security is | bypassed until the AS security is activated. By default, RLC uses | |||
activated. RLC (Radio Link Control protocol) uses, by default, the | the AM. However, depending on the network's features and the | |||
AM mode, but depending on the network's features and the terminal, it | terminal, RLC may change to other modes by the network operator. For | |||
may change to other modes by the network operator. For example, the | example, the TM does not add any header nor process the payload to | |||
transparent mode does not add any header or process the payload to | reduce the overhead, but the MTU would be limited by the TB used to | |||
reduce the overhead, but the MTU would be limited by the transport | transmit the data, which is a couple of thousand bits maximum. If UM | |||
block used to transmit the data, which is a couple of thousand bits | (only terminals compatible with 3GPP Release 15 [R15-3GPP]) is used, | |||
maximum. If UM (only Release 15 compatible terminals) is used, the | the RLC mechanisms of reliability are disabled, and only the | |||
RLC mechanisms of reliability are disabled, and only the reliability | reliability provided by the MAC layer by HARQ is available. In this | |||
provided by the MAC layer by HARQ is available. In this case, the | case, the protocol overhead might be smaller than the AM case because | |||
protocol overhead might be smaller than the AM case because of the | of the lack of status reporting, but the overhead would have the same | |||
lack of status reporting but with the same support for segmentation | support for segmentation up to 1600 bytes. NAS packets are | |||
up to 1600 bytes. NAS packets are encapsulated within an RRC (Radio | encapsulated within an RRC [TS36331] message. | |||
Resource Control) [TS36331] message. | ||||
Depending on the data type indication signaled (IP or non-IP data), | Depending on the data type indication signaled (IP or Non-IP data), | |||
the network allocates an IP address or establishes a direct | the network allocates an IP address or establishes a direct | |||
forwarding path. DoNAS is regulated under rate control upon previous | forwarding path. DoNAS is regulated under rate control upon previous | |||
agreement, meaning that a maximum number of bits per unit of time is | agreement, meaning that a maximum number of bits per unit of time is | |||
agreed upon per device subscription beforehand and configured in the | agreed upon per device subscription beforehand and configured in the | |||
device. The use of DoNAS is typically expected when a terminal in a | device. The use of DoNAS is typically expected when a terminal in a | |||
power-saving state requires a short transmission and receiving an | power-saving state requires a short transmission and is receiving an | |||
acknowledgment or short feedback from the network. Depending on the | acknowledgment or short feedback from the network. Depending on the | |||
size of buffered data to transmit, the UE might be instructed to | size of buffered data to be transmitted, the UE might be instructed | |||
deploy the connected mode transmissions instead, limiting and | to deploy the connected mode transmissions instead, limiting and | |||
controlling the DoNAS transmissions to predefined thresholds and a | controlling the DoNAS transmissions to predefined thresholds and a | |||
good resource optimization balance for the terminal the network. The | good resource optimization balance for the terminal and the network. | |||
support for mobility of DoNAS is present but produces additional | The support for mobility of DoNAS is present but produces additional | |||
overhead. | overhead. | |||
+--------+ +--------+ +--------+ | +--------+ +--------+ +--------+ | |||
| | | | | | +-----------------+ | | | | | | | +-----------------+ | |||
| UE | | C-BS | | C-SGN | |Roaming Scenarios| | | UE | | C-BS | | C-SGN | |Roaming Scenarios| | |||
+----|---+ +--------+ +--------+ | +--------+ | | +----|---+ +--------+ +--------+ | +--------+ | | |||
| | | | | | | | | | | | | | | | |||
+----------------|------------|+ | | P-GW | | | +----------------|------------|+ | | P-GW | | | |||
| Attach | | +--------+ | | | Attach | | +--------+ | | |||
+------------------------------+ | | | | +------------------------------+ | | | | |||
| | | | | | | | | | | | | | |||
+------|------------|--------+ | | | | | +------|------------|--------+ | | | | | |||
|RRC Connection Establishment| | | | | | |RRC connection establishment| | | | | | |||
|with NAS PDU transmission | | | | | | |with NAS PDU transmission | | | | | | |||
|& Ack Rsp | | | | | | |& Ack Rsp | | | | | | |||
+----------------------------+ | | | | | +----------------------------+ | | | | | |||
| | | | | | | | | | | | | | |||
| |Initial UE | | | | | | |Initial UE | | | | | |||
| |message | | | | | | |message | | | | | |||
| |----------->| | | | | | |----------->| | | | | |||
| | | | | | | | | | | | | | |||
| | +---------------------+| | | | | | +---------------------+| | | | |||
| | |Checks Integrity || | | | | | |Checks Integrity || | | | |||
| | |protection, decrypts || | | | | | |protection, decrypts || | | | |||
| | |data || | | | | | |data || | | | |||
| | +---------------------+| | | | | | +---------------------+| | | | |||
| | | Small data packet | | | | | Small data packet | | |||
| | |-------------------------------> | | | |-------------------------------> | |||
| | | Small data packet | | | | | Small data packet | | |||
| | |<------------------------------- | | | |<------------------------------- | |||
| | +----------|---------+ | | | | | | +----------|---------+ | | | | |||
| | Integrity protection,| | | | | | | Integrity protection,| | | | | |||
| | encrypts data | | | | | | | encrypts data | | | | | |||
| | +--------------------+ | | | | | | +--------------------+ | | | | |||
| | | | | | | | | | | | | | |||
| |Downlink NAS| | | | | | |Downlink NAS| | | | | |||
| |message | | | | | | |message | | | | | |||
| |<-----------| | | | | | |<-----------| | | | | |||
+-----------------------+ | | | | | +-----------------------+ | | | | | |||
|Small Data Delivery, | | | | | | |Small data delivery, | | | | | | |||
|RRC connection release | | | | | | |RRC connection release | | | | | | |||
+-----------------------+ | | | | | +-----------------------+ | | | | | |||
| | | | | | |||
| | | | | | |||
+-----------------+ | +-----------------+ | |||
Figure 6: DoNAS Transmission Sequence from an Uplink Initiated Access | ||||
Figure 6: DoNAS transmission sequence from an Uplink initiated access | ||||
+---+ +---+ +---+ +----+ | +---+ +---+ +---+ +----+ | |||
Application |AP1| |AP1| |AP2| |AP2 | | Application |AP1| |AP1| |AP2| |AP2 | | |||
(IP/non-IP) |PDU| |PDU| |PDU| ............... |PDU | | (IP/Non-IP) |PDU| |PDU| |PDU| ............... |PDU | | |||
+---+ +---+ +---+ +----+ | +---+ +---+ +---+ +----+ | |||
| | | | | | | | | | | | | | | | | | |||
| | | | | | | | | | | | | | | | | | |||
| | | | | | | | | | | | | | | | | | |||
| | | | | | | | | | | | | | | | | | |||
| |/ / | \ | | | | |/ / | \ | | | |||
NAS /RRC +--------+---|---+----+ +---------+ | NAS /RRC +--------+---|---+----+ +---------+ | |||
|NAS/|AP1|AP1|AP2|NAS/| |NAS/|AP2 | | |NAS/|AP1|AP1|AP2|NAS/| |NAS/|AP2 | | |||
|RRC |PDU|PDU|PDU|RRC | |RRC |PDU | | |RRC |PDU|PDU|PDU|RRC | |RRC |PDU | | |||
+--------+-|-+---+----+ +---------| | +--------+-|-+---+----+ +---------| | |||
skipping to change at page 23, line 38 ¶ | skipping to change at line 1063 ¶ | |||
| | LCID1 | \ | | / | | | LCID1 | \ | | / | |||
| | | \ \ | | | | | | \ \ | | | |||
| | | \ \ | | | | | | \ \ | | | |||
| | | \ \ \ | | | | | \ \ \ | | |||
+----+----+----------++-----|----+---------++----+---------|---+ | +----+----+----------++-----|----+---------++----+---------|---+ | |||
MAC |MAC |RLC | RLC ||MAC |RLC | RLC ||MAC | RLC |Pad| | MAC |MAC |RLC | RLC ||MAC |RLC | RLC ||MAC | RLC |Pad| | |||
|Head|Head| PAYLOAD ||Head |Head| PAYLOAD ||Head| PDU | | | |Head|Head| PAYLOAD ||Head |Head| PAYLOAD ||Head| PDU | | | |||
+----+----+----------++-----+----+---------++----+---------+---+ | +----+----+----------++-----+----+---------++----+---------+---+ | |||
TB1 TB2 TB3 | TB1 TB2 TB3 | |||
Figure 7: Example of User Plane packet encapsulation for Data | Figure 7: Example of User Plane Packet Encapsulation for Data | |||
over NAS | over NAS | |||
Appendix C. Acknowledgements | Acknowledgements | |||
The authors would like to thank (in alphabetic order): Carles Gomez, | The authors would like to thank (in alphabetic order): Carles Gomez, | |||
Antti Ratilainen, Tuomas Tirronen, Pascal Thubert, Eric Vyncke. | Antti Ratilainen, Pascal Thubert, Tuomas Tirronen, and Éric Vyncke. | |||
Authors' Addresses | Authors' Addresses | |||
Edgar Ramos | Edgar Ramos | |||
Ericsson | Ericsson | |||
Hirsalantie 11 | Hirsalantie 11 | |||
FI- 02420 Jorvas, Kirkkonummi | FI-02420 Jorvas, Kirkkonummi | |||
Finland | Finland | |||
Email: edgar.ramos@ericsson.com | Email: edgar.ramos@ericsson.com | |||
Ana Minaburo | Ana Minaburo | |||
Acklio | Acklio | |||
1137A Avenue des Champs Blancs | 1137A Avenue des Champs Blancs | |||
35510 Cesson-Sevigne Cedex | 35510 Cesson-Sevigne Cedex | |||
France | France | |||
Email: ana@ackl.io | Email: ana@ackl.io | |||
End of changes. 168 change blocks. | ||||
570 lines changed or deleted | 594 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. |