One document matched: draft-ietf-16ng-ip-over-ethernet-over-802.16-01.txt
Differences from draft-ietf-16ng-ip-over-ethernet-over-802.16-00.txt
Network Working Group HS. Jeon
Internet-Draft ETRI
Intended status: Standards Track M. Riegel
Expires: September 5, 2007 Siemens
SJ. Jeong
ETRI
March 4, 2007
Transmission of IP over Ethernet over IEEE 802.16 Networks
draft-ietf-16ng-ip-over-ethernet-over-802.16-01.txt
Status of this Memo
By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on September 5, 2007.
Copyright Notice
Copyright (C) The IETF Trust (2007).
Abstract
This document describes the transmission of IPv4 as well as IPv6 over
Ethernet in a network deploying the IEEE 802.16 cellular radio
transmission technology. The Ethernet on top of IEEE 802.16 is
realized by bridging between the point-to-point radio links, which
are provided by IEEE 802.16 between the base station and its
Jeon, et al. Expires September 5, 2007 [Page 1]
Internet-Draft IPoEth over IEEE 802.16 March 2007
associated subscriber stations. Due to the resource constraints of
radio transmission systems and the limitations of the IEEE 802.16 MAC
functionality for the realization of an Ethernet, the transmission of
IP over an Ethernet over IEEE 802.16 may considerably benefit by
adding IP specific support functions in the Ethernet over IEEE 802.16
while maintaining full compatibility with standard IP over Ethernet
behavior.
Jeon, et al. Expires September 5, 2007 [Page 2]
Internet-Draft IPoEth over IEEE 802.16 March 2007
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 4
2. Requirements . . . . . . . . . . . . . . . . . . . . . . . . . 4
3. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 4
4. The IEEE 802.16 Link Model . . . . . . . . . . . . . . . . . . 5
4.1. Connection Oriented Air Interface . . . . . . . . . . . . 5
4.2. Feeding User Data into the Appropriate Connections . . . . 6
4.3. MAC addressing in IEEE 802.16 . . . . . . . . . . . . . . 6
5. The IEEE 802.16 Network Model for Ethernet . . . . . . . . . . 6
5.1. IEEE 802.16 Ethernet Link Model . . . . . . . . . . . . . 6
5.2. Ethernet without Native Broadcast and Multicast Support . 7
5.3. Segmenting the Ethernet into VLAN . . . . . . . . . . . . 8
5.4. Deployment Scenarios for IP over Ethernet over IEEE
802.16 . . . . . . . . . . . . . . . . . . . . . . . . . . 8
5.4.1. Public Access Scenario . . . . . . . . . . . . . . . . 8
5.4.2. Enterprise LAN Scenario . . . . . . . . . . . . . . . 9
6. Bridge Considerations . . . . . . . . . . . . . . . . . . . . 10
6.1. Multicast and Broadcast Packet Processing . . . . . . . . 10
6.1.1. Multicast Transmission Considerations . . . . . . . . 10
6.1.2. Broadcast Transmission Considerations . . . . . . . . 11
6.2. Proxy ARP . . . . . . . . . . . . . . . . . . . . . . . . 11
6.2.1. Public Access Scenario Case . . . . . . . . . . . . . 12
6.2.2. Enterprise LAN Scenario Case . . . . . . . . . . . . . 12
7. Access Router Considerations . . . . . . . . . . . . . . . . . 12
8. Prefix Assignment . . . . . . . . . . . . . . . . . . . . . . 12
8.1. IPv4 over Ethernet . . . . . . . . . . . . . . . . . . . . 12
8.2. IPv6 over Ethernet . . . . . . . . . . . . . . . . . . . . 13
9. Transmission of IP over Ethernet . . . . . . . . . . . . . . . 13
9.1. IPv4 over Ethernet . . . . . . . . . . . . . . . . . . . . 13
9.1.1. Address Configuration . . . . . . . . . . . . . . . . 13
9.1.2. Address Resolution . . . . . . . . . . . . . . . . . . 13
9.2. IPv6 over Ethernet . . . . . . . . . . . . . . . . . . . . 14
9.2.1. Router Discovery, Prefix Discovery and Parameter
Discovery . . . . . . . . . . . . . . . . . . . . . . 14
9.2.2. Address Configuration . . . . . . . . . . . . . . . . 14
9.2.3. Address Resolution . . . . . . . . . . . . . . . . . . 14
9.3. Maximum Transmission Unit Consideration . . . . . . . . . 14
10. Security Considerations . . . . . . . . . . . . . . . . . . . 15
11. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 15
12. References . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 17
Intellectual Property and Copyright Statements . . . . . . . . . . 18
Jeon, et al. Expires September 5, 2007 [Page 3]
Internet-Draft IPoEth over IEEE 802.16 March 2007
1. Introduction
IEEE 802.16 [IEEE802.16] defines a point-to-multipoint radio
transmission system connecting a Base Station (BS) with multiple
Subscriber Stations (SSs). IEEE 802.16e [IEEE802.16e] amends the
base specification with PHY and MAC functions for supporting mobile
terminals while adopting the same data link principles also for
mobile networking systems.
This document describes the transmission of IPv4 as well as IPv6 over
Ethernet in a network deploying the IEEE 802.16 cellular radio
transmission technology. The Ethernet on top of IEEE 802.16 is
realized by bridging between the point-to-point radio links, which
are provided by IEEE 802.16 between the base station and its
associated subscriber stations.
Due to the resource constraints of radio transmission systems and the
particularities of the IEEE 802.16 MAC for the realization of
Ethernet, the transmission of IP over Ethernet over IEEE 802.16 may
considerably benefit by adding IP specific support functions in the
Ethernet over IEEE 802.16 while maintaining full compatibility with
standard IP over Ethernet behavior.
2. Requirements
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119].
3. Terminology
Access Router (AR): An entity that performs an IP routing function
to provide IP connectivity for Subscriber Stations.
Base Station (BS): A generalized equipment sets providing
connectivity, management, and control of the subscriber station.
Connection Identifier (CID): A 16 bit value that identifies a
connection to equivalent peers in the MAC of the base station and
subscriber station.
Subscriber Station (SS): A generalized equipment set providing
connectivity between subscriber equipment and a base station.
Within this document the term SS also represents the Mobile
Subscriber Station introduced in IEEE 802.16e
Jeon, et al. Expires September 5, 2007 [Page 4]
Internet-Draft IPoEth over IEEE 802.16 March 2007
Service-specific Convergence Sublayer (CS): Sublayer in the IEEE
802.16 MAC layer which classifies external network data and
associates them to the proper MAC service flow identifier and
connection identifier.
4. The IEEE 802.16 Link Model
4.1. Connection Oriented Air Interface
The IEEE 802.16 MAC establishes multiple connections between a BS and
its associated SSs for the transfer of user data over the air. Each
of these connections realize an individual Service Flow which is
identified by a 16 bit CID number and has a defined QoS profile.
Multiple connections can be established between a BS and a SS, each
with its particular QoS class and direction. Despite of the BS and
all the SS are identified by unique 48bit MAC addresses, packets
going over the air are only carrying the CID number of the particular
connection. The connections are established by MAC management
messages between the BS and the SS during network entry or also later
on demand. Unique cryptographic keys are generated during the
initial authentication phase between the BS and each of the
associated SSs to protect the data transmission over the air.
While uplink connections from the SSs to the BS provide only unicast
transmission capabilities from, downlink connections can be used for
unicast transmission from the BS to a single SS as well as for
multicast transmissions to a group of SSs.
| | | | | |
+--+--+ +--+--+ +--+--+ +--+-+-+--+
| MAC | | MAC | | MAC | | MAC |
+-----+ +-----+ +-----+ +---------+
| PHY | | PHY | | PHY | | PHY |
+-+-+-+ +-+-+-+ +-+-+-+ +-+-+-+-+-+
| | | | | | | | | |
| +-------|-+-------|-+----CID#w----+ | | |
| | +------CID#x------+ | |
| +----------------CID#y--------+ |
+--------------------------CID#z----------+
SS#1 SS#2 SS#3 BS
Figure 1. Basic IEEE 802.16 Link Model
Jeon, et al. Expires September 5, 2007 [Page 5]
Internet-Draft IPoEth over IEEE 802.16 March 2007
4.2. Feeding User Data into the Appropriate Connections
Assignment of higher layer packets to particular service flows and
related CIDs is performed by the convergence sublayer within the IEEE
802.16 MAC. It classifies the packets depending on the values of a
defined subset of the payload packet header fields and assigns the
packets to the appropriate service flow.
To enable the transmission of different kind of payloads over IEEE
802.16, multiple convergence sublayers are defined, each specific for
one kind of payload packet type, like Ethernet, IPv4, IPv6 or even
for encapsulated payload, like IPv4 over Ethernet or IPv6 over
Ethernet.
4.3. MAC addressing in IEEE 802.16
The 48-bit unique MAC address of a SS is used during the initial
ranging process for the identification of a SS and is verified by the
succeeding PKMv2 authentication phase. Out of it, the BS establishes
a list of MAC addresses of all SSs connected to the BS purely for MAC
management purposes.
While MAC addresses exist for all the SSs as well as the BS the
transfer of packets over the air is performed based only on the CID
value. It enables the transport of arbitrary source and destination
MAC addresses in Ethernet frames between a SS and its BS. This can
be leveraged when there are additional MAC addresses to the SS MAC
address in the case that the SS acts as an Ethernet bridge for a
network behind the SS.
Due to the defined mapping of the CIDs to the MAC address of the
associated SS, the BS is able to bundle all connections belonging to
a particular SS to a single connection on the network side to realize
a plain layer 2 forwarding behaviour in the BS.
5. The IEEE 802.16 Network Model for Ethernet
5.1. IEEE 802.16 Ethernet Link Model
According to [RFC2461], an IP Link is defined as a communication
facility or medium over which nodes can communicate at the link
layer, i.e. the layer immediately below IP. IEEE 802.16 provides
point-to-point connections between SSs and the BS without enabling
any direct SS to SS connectivity.
Ethernet is realized over IEEE 802.16 by implementing bridging
between all SSs with the IEEE 802.16 radio transmission system
Jeon, et al. Expires September 5, 2007 [Page 6]
Internet-Draft IPoEth over IEEE 802.16 March 2007
providing the point-to-point connections between the hosts and the
bridge behind the BS. This is equivalent to today's switched
Ethernet with twisted pair wires connecting the hosts to a bridge
("Switch") but in a IEEE 802.16 network the 'twisted pair wires' are
usually implemented by per SS connections between the BS and a
bridging function. The bridge must be able to create a new port
whenever a new SS attaches to any of the BSs of the network or to
remove a port when an associated SS detaches from the network.
The BS forwards all the service flow belonging to one SS to one radio
side port of a bridge behind the BSs. Not more than one SS should be
connected to a port of the bridge.
If the SS functions as a bridge for multiple hosts behind the SS
(i.e. SS#4 in the below figure) then it should support bridging
according to [IEEE802.1D] supporting efforts of [IEEE802.16k] between
all its LAN ports and the air link.
------------------------ IP Link --------------------------
| | | | | |
ETH ETH ETH ETH ETH ETH
| | | | | |
| | +---------+---------+ | +-+---+-+
| | | Bridge | | |Bridge |
| | +--+-+---------+-+--+ | +---+---+
| | | | | | | |
+--+--+ +--+--+ +--+-+--+ +--+-+--+ +--+--+ +--+--+
| MAC | | MAC | | MAC | | MAC | | MAC | | MAC |
+-----+ +-----+ +-------+ +-------+ +-----+ +-----+
| PHY | | PHY | | PHY | | PHY | | PHY | | PHY |
+-+-+-+ +-+-+-+ +-+-+-+-+ +-+-+-+-+ +-+-+-+ +-+-+-+
| | | | | | | | | | | | | |
| +-------|-+--CID#u-+ | | | | +-CID#x--+-|-------+ |
| +----CID#v---+ | | +---CID#y----+ |
+--------------CID#w-----+ +-----CID#z--------------+
SS#1 SS#2 BS#1 BS#2 SS#3 SS#4
Figure 2. IEEE 802.16 Ethernet Link Model
5.2. Ethernet without Native Broadcast and Multicast Support
Current IEEE 802.16 [IEEE802.16][IEEE802.16e] does not define any
transport connection for IP broadcast and multicast data. Also,
Multicast and Broadcast Service (MBS, stated in 6.3.23 of
[IEEE802.16e]) cannot be used for the IP broadcast or multicast data
because MBS is invisible to IP layer. Hence IP broadcast and
Jeon, et al. Expires September 5, 2007 [Page 7]
Internet-Draft IPoEth over IEEE 802.16 March 2007
multicast packets should be replicated and then carried via unicast
transport connections as IEEE 802.16 access link. Bridge does the
replication.
5.3. Segmenting the Ethernet into VLAN
It is possible to restrict the size and coverage of an IP link by
segmenting the Ethernet and grouping subsets of hosts into VLANs.
Therefore, the bridge behind the BSs must be enabled to support VLANs
according to [IEEE802.1Q] by assigning and handling the VLAN-IDs of
the virtual bridge ports.
If a SS itself contains a VLAN enabled bridge or is directly
connected to a bridge supporting VLANs, the port associated with such
a SS may be enabled as trunk port. On trunk ports, Ethernet frames
are forwarded in the [IEEE802.1Q] frame format.
5.4. Deployment Scenarios for IP over Ethernet over IEEE 802.16
Figure 3 and 4 show the deployment scenarios in case of IP over
Ethernet over IEEE 802.16. In both figures, an AR is connected to a
bridge, which is connected to all BSs. The bridge becomes an
aggregation point for all the connections from SSs. Multiple ARs can
exist on a link, and an IP Link may consist of multiple hosts either
being co-located with a SS or behind a SS connected a bridge. The
network behind a SS can support various access network technologies,
e.g. 802.3, 802.11 or 802.15.
5.4.1. Public Access Scenario
Figure 3 depicts a public access scenario. In the general public
access case, direct communication between nodes is restricted because
of security and accounting issues and the AR is connected to a
network side port of the bridge behind the BSs.
In this scenario, the bridge forwards all packets received from any
radio side port to all network side ports being in the forwarding
state. Peer-to-peer communication is not supported by the bridge and
all packets originated from a SS should be delivered to an AR. The
AR performs a security filtering, policing and accounting of all
traffic from hosts, like a NAS (Network Access Server).
Jeon, et al. Expires September 5, 2007 [Page 8]
Internet-Draft IPoEth over IEEE 802.16 March 2007
+--+
|SS|
+--+*
*
* +----+
+--+ * | +-------+
|SS|* * * * **| BS +------+ \
+--+ * | +-----+ \ \ +---+
+--+ * +----+ \ \ +-+ B |
|SS|* \ +--+ R |
+--+ +---+ I | +----+
+----+ | D +---+ AR +--Internet
|Host+ +--+ G | +----+
+----+\ +----+ / +-+ E |
+----+ +------+--+ | +---+ / +---+
|Host+-+BRIDGE|SS|* * * *| BS | /
+----+ +------+--+ * | +---+
+----+/ * +----+
|Host+ +--+ *
+----+ |SS|*
+--+
Figure 3. Public Access Scenario
While the bridge forces all traffic from hosts to reach the AR, it
still performs Learning Process and maintains Filtering Database as
specified in [IEEE802.1D] and then forwards IP unicast packets from
the AR based on the Filtering Database. However, IP broadcast and
multicast packets are treated with special rules for Broadcast Data
Forwarding and Multicast Data Forwarding as stated in Section 6.1.
5.4.2. Enterprise LAN Scenario
The enterprise LAN scenario assumes trust relationship between all
hosts and thus enables hosts to directly communicate each other
without detouring. Multiple AR may be connected to a link, and ARs
may reside on both sides of the network, on the network side of the
bridge behind the BSs as well as behind a SS connected to a bridge.
Figure 4 depicts the enterprise LAN scenario network model.
IP unicast packets from either SSs or AR are forwarded by
[IEEE802.1D] based bridging, and IP broadcast and multicast packets
are processed on the bridge according to the Broadcast Data
Forwarding Rules and Multicast Data Forwarding Rules presented in
Section 6.1.
Jeon, et al. Expires September 5, 2007 [Page 9]
Internet-Draft IPoEth over IEEE 802.16 March 2007
+--+
|SS|
+--+*
* +----+
* +----+ +Host|
+--+ * | +-------+ /+----+
|SS|* * * * **| BS +------+ \ / +----+
+--+ * | +-----+ \ \ +---+/ ++Host|
+--+ * +----+ \ \ +-+ B + / +----+
|SS|* \ +--+ R ++
+----+ +--+ +---+ I | +----+
--+ AR ++ | D +---+ AR +---
+----+ \ +--+ G | +----+
\ +----+ / +-+ E |
+----+ +------+--+ | +---+ / +---+
|Host+-+BRIDGE|SS|* * * *| BS | /
+----+ +------+--+ * | +---+
+----+/ * +----+
|Host+ +--+ *
+----+ |SS|*
+--+
Figure 4. Enterprise LAN Scenario
6. Bridge Considerations
This section discusses operations of the bridge behind the BSs
6.1. Multicast and Broadcast Packet Processing
All multicast and multicast control messages shall be processed in
the bridge according to [RFC4541]. Broadcasting messages to all
radio side ports of the bridge SHOULD be prevented.
Further details on prevention of broadcasting messages to all radio
side ports are given in the following sections.
6.1.1. Multicast Transmission Considerations
Bridge copies the IP multicast packets, like IP broadcast, and
forwards into all its available ports, but an incoming port. As a
result, the IP multicast packets can be transmitted to SSs which do
not participate in the corresponding multicast group. This is why IP
multicast membership should be propagated between bridges
[RFC4541] describes Internet Group Management Protocol (IGMP) and
Jeon, et al. Expires September 5, 2007 [Page 10]
Internet-Draft IPoEth over IEEE 802.16 March 2007
Multicast Listener Discovery (MLD) snooping switches. The IGMP/MLD
snooping switches examine IGMP/MLD report messages and creates a
multicast address entry in its forwarding table. Followings
summarize two main processes of IGMP/MLD snooping switches (i.e.
bridge).
IGMP and MLD Forwarding Rules: A snooping switch that creates a new
multicast address entry in its forwarding table with received
report messages forwards the report messages only to those ports
where multicast routers are attached. The multicast entry can be
removed by receiving corresponding IGMP Leave Group/MLD Done
messages or timeout mechanism.
Multicast Data Forwarding Rules: Packets with a destination IP
address outside 224.0.0.0/24 in IPv4 or for IPv6 multicast address
with scope 2 or greater except FF02::1 (link-local scope all-nodes
multicast address) are forwarded according to the previously
created forwarding table and also forwarded on multicast router
ports. An unregistered IP multicast packets that does not match
any of entries in the forwarding table should be forwarded on
ports where multicast routers are attached.
6.1.2. Broadcast Transmission Considerations
Bridge floods the IP broadcast packets out of all connected ports
except that on which the packets was received. This behaviour in not
appropriate with scarce resources and dormant-mode hosts in a
wireless network such as IEEE 802.16 based access network. This
document defines following forwarding rules on bridges for filtering
the IP broadcast data. Note that packets destined for permanently
assigned multicast addresses such as 224.0.0.0/24 in IPv4 or FF02::1
in IPv6 are regarded as broadcast data.
Broadcast Data Forwarding Rules: The bridge discards all IP
broadcast packets except ARP, DHCP (DHCPv4 and DHCPv6), IGMP, and
MLD related traffic. The ARP, DHCP, IGMP and MLD related packets
received on radio side are forwarded only towards access router,
not another radio sides. On the other hand, the allowed IP
broadcast packets received on the network side are forwarded on
all ports except their incoming port.
6.2. Proxy ARP
Proxy ARP provides a process where a device connecting between hosts
answers ARP Requests instead of a remote host. In this document, the
Proxy ARP is used to force traffic from hosts to access router and
avoid broadcasting ARP Requests over the air depending on the
particular deployment scenario. A bridge behind the BSs performs the
Jeon, et al. Expires September 5, 2007 [Page 11]
Internet-Draft IPoEth over IEEE 802.16 March 2007
Proxy ARP process.
6.2.1. Public Access Scenario Case
A bridge behind the BSs filters broadcast ARP Requests and responds
to all the ARP Requests from radio side port with access router's
Ethernet address so that all IPv4 packets from SSs are forwarded to
the access router in the public access scenario. Learning the IP and
Ethernet address of the access router on bridge follows Section 3.1
in [RFC4562].
6.2.2. Enterprise LAN Scenario Case
The bridge behind the BSs maintains an ARP Cache. The ARP Cache has
a sufficient size to accommodate ARP entries for all its serving SSs
and is updated by any packets including ARP Requests from SSs like
its Filtering Database.
Upon receiving the ARP Requests from SSs, the bridge unicasts ARP
Replies back to SSs with Ethernet address of target host provided
that the target address matches an entry in the ARP Cache.
Otherwise, the bridge floods the ARP Requests. The bridge silently
discard any received self-ARP Requests.
7. Access Router Considerations
In the public access scenario, all packets between SSs will always be
relayed via access router. In this situation, the access router may
forward packets via same interface on which the access router
received the packets. This results in Redirect message from the
access router [RFC0792][RFC2461]. Access router in the public access
scenario disables above the Redirect function on the interface to
which SSs attach.
8. Prefix Assignment
8.1. IPv4 over Ethernet
All SSs under the same AR share a single subnet prefix. Sharing the
prefix means locating all SSs on the same subnet and it benefits from
high address assignment efficiency when concerning scarce IPv4
address space. The prefix can be manually configured or
automatically with subnet mask option in DHCPv4 [RFC2132].
Jeon, et al. Expires September 5, 2007 [Page 12]
Internet-Draft IPoEth over IEEE 802.16 March 2007
8.2. IPv6 over Ethernet
In the enterprise LAN scenario, a single subnet prefix has an
advantage over multiple subnet prefixes in simplifying management.
However, assignment of unique prefix per SS can be considered in the
public access scenario because it forces all packets from SSs to be
transferred to an access router.
Access router assigns IPv6 prefixes with Prefix Information option as
specified in [RFC2461].
9. Transmission of IP over Ethernet
9.1. IPv4 over Ethernet
[RFC0894] defines the transmission of IPv4 packets over Ethernet
networks. It contains the specification of the encapsulation of the
IPv4 packets into Ethernet frames as well as rules for mapping of IP
addresses onto Ethernet MAC addresses. This document follows the
operations specified in [RFC0894].
9.1.1. Address Configuration
IPv4 addresses are configured manually or assigned dynamically from
DHCPv4 server [RFC2131].
DHCP clients may send DHCP DISCOVER and DHCP REQUEST messages with
the BROADCAST bit set to request the DHCP server to broadcast its
DHCP OFFER and DHCP ACK messages. The bridge filters these broadcast
DHCP OFFER and DHCP ACK messages and forwards the broadcast messages
only to the host defined by the client hardware address in the chaddr
information element.
Alternatively, the DHCP Relay Agent Information Option (option-82)
[RFC3046] may be used to avoid DHCP broadcast replies. The option-82
consists of two type of sub-options; Circuit ID and Remote ID. DHCP
Relay Agent is located on bridges as Layer 2 DHCP Relay Agent in
[TR101]. Bridge port number is possible as Circuit ID and Remote ID
may be left unspecified. Note that using option-82 has a requirement
that DHCP servers should be aware of the option-82.
9.1.2. Address Resolution
SSs use Address Resolution Protocol (ARP) [RFC0826] for finding a
destination's Ethernet MAC address.
Jeon, et al. Expires September 5, 2007 [Page 13]
Internet-Draft IPoEth over IEEE 802.16 March 2007
9.2. IPv6 over Ethernet
[RFC2464] defines transmission of IPv6 Packets over Ethernet
Networks. Encapsulation of IPv6 packets into Ethernet frames and
mapping rules for IPv6 address to Ethernet address (i.e. MAC
address) follow [RFC2464].
9.2.1. Router Discovery, Prefix Discovery and Parameter Discovery
Router Discovery, Prefix Discovery and Parameter Discovery procedures
are achieved by receiving Router Advertisement messages. In this
document, SSs perform above the discovery process by solicited Router
Advertisement messages because periodic Router Advertisement messages
are discarded on the bridges following the Broadcast Data Forwarding
Rules in Section 6.1.2.
9.2.2. Address Configuration
9.2.2.1. Stateful Address Autoconfiguration
When the'M' flag in the received RA is set, a SS should perform
stateful address configuration according to [RFC3315]. In this case,
an AR supports DHCPv6 server or relay function.
9.2.2.2. Stateless Address Autoconfiguration
The global IPv6 addresses are derived based on prefix and EUI-64-
derived interface identifier and then confirmed through Duplicate
Address Detection (DAD) as specified in [RFC2462].
9.2.3. Address Resolution
SS sends Neighbor Solicitation destined for solicited-node address
corresponding to the target address in order to determine MAC address
of a neighbor and then resolves the MAC address by receiving Neighbor
Advertisement as specified in [RFC2461].
9.3. Maximum Transmission Unit Consideration
[RFC2460] requires that link layer support a minimum Maximum
Transmission Unit (MTU) size of 1280 bytes and recommends the MTU of
at least 1500 bytes be configured for IPv6 over Ethernet
transmission. [RFC0894] also specifies 1500 bytes as a maximum
length of IPv4 over Ethernet. Therefore, IEEE 802.16 frame should
carry a payload size of 1518 bytes including the Ethernet header size
of 18 bytes or 1522 bytes including additional VLAN tag size of 4
bytes if present.
Jeon, et al. Expires September 5, 2007 [Page 14]
Internet-Draft IPoEth over IEEE 802.16 March 2007
The Length field in IEEE 802.16 MAC header has a size of 11 bits and
indicates length in bytes of the MAC PDU including CRC and MAC
header. Hence PDU size is up to 2048 bytes and the maximum size of
payload is 2038 bytes by subtracting size of CRC and MAC header from
2048 bytes. The maximum size of payload is sufficient to carry IPv4
over Ethernet or IPv6 over Ethernet and thus the MTU of IPv4 and IPv6
is the same as specified in [RFC0894] and [RFC2460] respectively.
10. Security Considerations
This document does not introduce new vulnerability to operations of
IPv4 over Ethernet and IPv6 over Ethernet. [RFC3971] can be adopted
for securing neighbor discovery processes.
11. Acknowledgments
We would like to express special thanks to David Johnston and Dave
Thaler for their inputs to this work.
12. References
[I-D.ietf-16ng-ps-goals]
Jee, J., "IP over 802.16 Problem Statement and Goals",
draft-ietf-16ng-ps-goals-01 (work in progress),
February 2007.
[IEEE802.16]
IEEE Std 802.16-2004, "IEEE Standard for Local and
metropolitan area networks, Part 16: Air Interface for
Fixed Broadband Wireless Access Systems", October 2004.
[IEEE802.16e]
IEEE P802.16e-2005, "IEEE Standard for Local and
metropolitan area networks, Amendment for Physical and
Medium Access Control Layers for Combined Fixed and
Mobile Operation in Licensed Bands", December 2005.
[IEEE802.16k]
IEEE 802.16's Network Management Task Group: 802.16k Pro
ject, "http://www.ieee802.org/netman/16k.html".
[IEEE802.1D]
IEEE Std 802.1D-2004, "IEEE Standard for Local and
metropolitan area networks, Media Access Control (MAC)
Bridges", June 2004.
Jeon, et al. Expires September 5, 2007 [Page 15]
Internet-Draft IPoEth over IEEE 802.16 March 2007
[IEEE802.1Q]
IEEE Std 802.1Q-2005, "IEEE Standard for Local and
metropolitan area networks, Virtual Bridged Local Area
Networks", May 2005.
[RFC0826] Plummer, D., "Ethernet Address Resolution Protocol: Or
converting network protocol addresses to 48.bit Ethernet
address for transmission on Ethernet hardware", STD 37,
RFC 826, November 1982.
[RFC0894] Hornig, C., "Standard for the transmission of IP datagrams
over Ethernet networks", STD 41, RFC 894, April 1984.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
[RFC2460] Deering, S. and R. Hinden, "Internet Protocol, Version 6
(IPv6) Specification", RFC 2460, December 1998.
[RFC2461] Narten, T., Nordmark, E., and W. Simpson, "Neighbor
Discovery for IP Version 6 (IPv6)", RFC 2461,
December 1998.
[RFC2462] Thomson, S. and T. Narten, "IPv6 Stateless Address
Autoconfiguration", RFC 2462, December 1998.
[RFC2464] Crawford, M., "Transmission of IPv6 Packets over Ethernet
Networks", RFC 2464, December 1998.
[RFC3046] Patrick, M., "DHCP Relay Agent Information Option",
RFC 3046, January 2001.
[RFC3315] Droms, R., Bound, J., Volz, B., Lemon, T., Perkins, C.,
and M. Carney, "Dynamic Host Configuration Protocol for
IPv6 (DHCPv6)", RFC 3315, July 2003.
[RFC3971] Arkko, J., Kempf, J., Zill, B., and P. Nikander, "SEcure
Neighbor Discovery (SEND)", RFC 3971, March 2005.
[RFC4541] Christensen, M., Kimball, K., and F. Solensky,
"Considerations for Internet Group Management Protocol
(IGMP) and Multicast Listener Discovery (MLD) Snooping
Switches", RFC 4541, May 2006.
[RFC4562] Melsen, T. and S. Blake, "MAC-Forced Forwarding: A Method
for Subscriber Separation on an Ethernet Access Network",
RFC 4562, June 2006.
Jeon, et al. Expires September 5, 2007 [Page 16]
Internet-Draft IPoEth over IEEE 802.16 March 2007
[TR101] DSL Forum, "Migration to Ethernet-Based DSL Aggregation",
April 2006.
Authors' Addresses
HongSeok Jeon
Electronics Telecommunications Research Institute
161 Gajeong-dong, Yuseong-gu
Daejeon, 305-350
KOREA
Phone: +82-42-860-3892
Email: jeonhs@etri.re.kr
Max Riegel
Siemens
St-Martin-Str 76
Munich, 81541
Germany
Phone: +49-89-636-75194
Email: maximilian.riegel@siemens.com
SangJin Jeong
Electronics Telecommunications Research Institute
161 Gajeong-dong, Yuseong-gu
Daejeon, 305-350
KOREA
Phone: +82-42-860-1877
Email: sjjeong@gmail.com
Jeon, et al. Expires September 5, 2007 [Page 17]
Internet-Draft IPoEth over IEEE 802.16 March 2007
Full Copyright Statement
Copyright (C) The IETF Trust (2007).
This document is subject to the rights, licenses and restrictions
contained in BCP 78, and except as set forth therein, the authors
retain all their rights.
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Intellectual Property
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Acknowledgment
Funding for the RFC Editor function is provided by the IETF
Administrative Support Activity (IASA).
Jeon, et al. Expires September 5, 2007 [Page 18]
| PAFTECH AB 2003-2026 | 2026-04-24 04:35:27 |