IPv6 Backbone Router
draft-ietf-6lo-backbone-router-08

Document Type Active Internet-Draft (6lo WG)
Last updated 2018-10-22
Stream IETF
Intended RFC status (None)
Formats plain text xml pdf html bibtex
Stream WG state WG Document
Document shepherd Samita Chakrabarti
IESG IESG state I-D Exists
Consensus Boilerplate Unknown
Telechat date
Responsible AD (None)
Send notices to "Samita Chakrabarti" <samitac.ietf@gmail.com>
6lo                                                      P. Thubert, Ed.
Internet-Draft                                                     cisco
Intended status: Standards Track                              C. Perkins
Expires: April 25, 2019                                        Futurewei
                                                        October 22, 2018

                          IPv6 Backbone Router
                   draft-ietf-6lo-backbone-router-08

Abstract

   Backbone Routers running IPv6 Neighbor Discovery can manage multiple
   wireless links to form a large MultiLink Subnet, but it is more
   efficient if IPv6 Neighbor Discovery packets are not broadcast over
   the wireless links.  This specification specifies proxy operations
   for IPv6 Neighbor Discovery on behalf of devices located on
   broadcast-inefficient wireless networks.  Backbone Routers placed
   along the wireless edge of the backbone handle IPv6 Neighbor
   Discovery, and route packets on behalf of registered nodes.  Wireless
   nodes register, or are registered by proxy, to a Backbone Router to
   establish proxy services in a fashion similar to layer-2 association.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at https://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on April 25, 2019.

Copyright Notice

   Copyright (c) 2018 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (https://trustee.ietf.org/license-info) in effect on the date of

Thubert & Perkins        Expires April 25, 2019                 [Page 1]
Internet-Draft            IPv6 Backbone Router              October 2018

   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
   2.  Applicability and Requirements Served . . . . . . . . . . . .   4
   3.  Terminology . . . . . . . . . . . . . . . . . . . . . . . . .   5
   4.  Overview  . . . . . . . . . . . . . . . . . . . . . . . . . .   6
   5.  Backbone Router Routing Operations  . . . . . . . . . . . . .   8
     5.1.  Over the Backbone Link  . . . . . . . . . . . . . . . . .   8
     5.2.  Proxy Operations Over the LLN Interface . . . . . . . . .   9
       5.2.1.  Routing Proxy Operations  . . . . . . . . . . . . . .  10
       5.2.2.  Bridging Proxy Operations . . . . . . . . . . . . . .  10
   6.  Backbone Router Proxy Operations  . . . . . . . . . . . . . .  11
     6.1.  Primary and Secondary BBRs  . . . . . . . . . . . . . . .  12
     6.2.  Binding Table . . . . . . . . . . . . . . . . . . . . . .  12
     6.3.  Registration and Binding Table Entry Creation . . . . . .  13
     6.4.  Defending Addresses . . . . . . . . . . . . . . . . . . .  14
   7.  Security Considerations . . . . . . . . . . . . . . . . . . .  15
   8.  Protocol Constants  . . . . . . . . . . . . . . . . . . . . .  16
   9.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .  16
   10. Future Work . . . . . . . . . . . . . . . . . . . . . . . . .  16
   11. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . .  16
   12. References  . . . . . . . . . . . . . . . . . . . . . . . . .  16
     12.1.  Normative References . . . . . . . . . . . . . . . . . .  16
     12.2.  Informative References . . . . . . . . . . . . . . . . .  17
     12.3.  External Informative References  . . . . . . . . . . . .  19
   Appendix A.  Changes from revision 07 to revision 08  . . . . . .  20
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  20

1.  Introduction

   IEEE STD. 802.1 [IEEEstd8021] Ethernet Bridging provides an efficient
   and reliable broadcast service; applications and protocols have been
   built that heavily depend on that feature for their core operation.
   Unfortunately, many wireless networks do not economically provide the
   broadcast capabilities of Ethernet Bridging; protocols designed for
   bridged networks that rely on broadcast often exhibit disappointing
Show full document text