Internet DRAFT - draft-madanapalli-ipv6-over-802.16-ipv6cs

draft-madanapalli-ipv6-over-802.16-ipv6cs







16ng Working Group                                        S. Madanapalli
Internet-Draft                                               Samsung ISO
Expires: December 16, 2006                                      B. Patil
                                                                   Nokia
                                                             E. Nordmark
                                                   Sun Microsystems, Inc
                                                                 J. Choi
                                                             Samsung AIT
                                                                 S. Park
                                                     Samsung Electronics
                                                           June 14, 2006


      Transmission of IPv6 over 802.16's IPv6 Convergence Sublayer
            draft-madanapalli-ipv6-over-802.16-ipv6cs-00.txt

Status of this Memo

   By submitting this Internet-Draft, each author represents that any
   applicable patent or other IPR claims of which he or she is aware
   have been or will be disclosed, and any of which he or she becomes
   aware will be disclosed, in accordance with Section 6 of BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt.

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

   This Internet-Draft will expire on December 16, 2006.

Copyright Notice

   Copyright (C) The Internet Society (2006).

Abstract

   IEEE 802.16d and 802.16e are air interface specifications for fixed



Madanapalli, et al.     Expires December 16, 2006               [Page 1]

Internet-Draft         IPv6 over 802.16's IPv6 CS              June 2006


   and mobile broadband wireless access systems. 802.16d/e is the air
   interface that is used in the WiMAX (Worldwide Interoperability of
   Microwave Access) architecture and specified by the WiMAX forum.
   This document defines the operation of IPv6 over the IPv6 convergence
   sublayer of 802.16d/e within the scope of the WiMAX network
   architecture.  It specifies various aspects of IPv6 such as neighbor
   discovery, address configuration, Path MTU and the transmission/
   receiving of IPv6 packets.


Table of Contents

   1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  3
   2.  Overview of 802.16d/e Convergence Sublayer . . . . . . . . . .  3
     2.1.  IPv6 Service-Specific Convergence Sublayer Overview  . . .  4
   3.  Terminology  . . . . . . . . . . . . . . . . . . . . . . . . .  5
   4.  Architecture of WiMAX network  . . . . . . . . . . . . . . . .  5
   5.  IPv6 Link model for IPv6 CS  . . . . . . . . . . . . . . . . .  7
     5.1.  On-link communication  . . . . . . . . . . . . . . . . . .  8
   6.  Transmission of IPv6 over 802.16d/e using IPv6 CS  . . . . . .  8
     6.1.  Frame Format . . . . . . . . . . . . . . . . . . . . . . .  8
     6.2.  Maximum Transmission Unit  . . . . . . . . . . . . . . . .  9
     6.3.  IPv6 Prefix Assignment . . . . . . . . . . . . . . . . . . 10
   7.  IPv6 Neighbor Discovery Procedures . . . . . . . . . . . . . . 10
     7.1.  Router Discovery . . . . . . . . . . . . . . . . . . . . . 10
       7.1.1.  Router Solicitation  . . . . . . . . . . . . . . . . . 10
       7.1.2.  Router Advertisement . . . . . . . . . . . . . . . . . 10
       7.1.3.  Router Lifetime and Periodic Router Advertisements . . 10
     7.2.  Prefix Discovery . . . . . . . . . . . . . . . . . . . . . 11
     7.3.  Address Resolution . . . . . . . . . . . . . . . . . . . . 11
     7.4.  Next-Hop Determination . . . . . . . . . . . . . . . . . . 11
     7.5.  Neighbor Unreachability Detection (NUD)  . . . . . . . . . 11
   8.  Address Autoconfiguration  . . . . . . . . . . . . . . . . . . 12
     8.1.  Stateless Address Autoconfiguration  . . . . . . . . . . . 12
     8.2.  Stateful Address Autoconfiguration . . . . . . . . . . . . 12
   9.  Duplicate Address Detection  . . . . . . . . . . . . . . . . . 12
     9.1.  Conceptual Data Structures . . . . . . . . . . . . . . . . 13
     9.2.  Relay DAD Procedure  . . . . . . . . . . . . . . . . . . . 13
       9.2.1.  MS Behavior  . . . . . . . . . . . . . . . . . . . . . 15
       9.2.2.  AR Behavior  . . . . . . . . . . . . . . . . . . . . . 15
   10. IANA Considerations  . . . . . . . . . . . . . . . . . . . . . 15
   11. Security Considerations  . . . . . . . . . . . . . . . . . . . 15
   12. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 16
   13. References . . . . . . . . . . . . . . . . . . . . . . . . . . 16
   Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 18
   Intellectual Property and Copyright Statements . . . . . . . . . . 20





Madanapalli, et al.     Expires December 16, 2006               [Page 2]

Internet-Draft         IPv6 over 802.16's IPv6 CS              June 2006


1.  Introduction

   IEEE 802.16d/e [1], [2] is the wireless MAN air interface standard.
   802.16d/e specifications cover the PHY and MAC layers of the air
   interface as well as the definition of several convergence sublayers
   (CS) above the MAC which provide the capability for transmission of
   ATM, IPv4/6, Ethernet and others.  The network working group (NWG) in
   WiMAX forum [11], which is an industry consortium, is specifying the
   network architecture and documenting the operation of IPv4, IPv6 and,
   Ethernet (802.3, 802.1q).  The scope of this document is limited to
   the specification of IPv6 over the IPv6 convergence sublayer of
   802.16d/e.

   This document specifies the link model in the context of the WiMAX
   network architecture using the IEEE 802.16d/e air interface
   specification as well as the operation of the various IPv6 features
   such as Neighbor discovery, Address autoconfiguration, Path MTU among
   others.


2.  Overview of 802.16d/e Convergence Sublayer

   The 802.16d/e MAC comprises of three sublayers:
      - The service specific CS
      - The MAC common part sublayer (CPS)
      - The security sublayer

   For details of the functionality of these sublayers, please refer to
   the 802.16d/e specifications [1], [2].

   Multiple CSs are provide for interfacing with various protocols.  The
   internal format of the CS is unique to the CS and the MAC CPS has no
   necessity to understand or parse the CS payload.  The service
   specific CS resides above the MAC CPS and is responsible for
   accepting and processing the higher layer PDUs (Packet Data Unit)
   which includes classification of the higher layer PDUs and delivering
   it to the appropriate MAC SAP (Service access point) and receiving
   PDUs from the peer entity.  The primary task of the convergence
   sublayer is to classify service data units (SDUs) to the proper MAC
   connection (CID).

   Currently the two main CSs provided are: ATM CS and Packet CS.
   Packet CS supports IEEE 802.3, IEEE 802.1Q, IPv4 and, IPv6 PDUs via
   their own specific CS.  Within the context of this document, IPv6 CS
   is relevant.






Madanapalli, et al.     Expires December 16, 2006               [Page 3]

Internet-Draft         IPv6 over 802.16's IPv6 CS              June 2006


2.1.  IPv6 Service-Specific Convergence Sublayer Overview

   IPv6 CS is responsible for the transmission and reception of IPv6
   packets.  The IPv6 layer interfaces to the IPv6 CS as shown in the
   figure below:


                     +-------------------+
                     |        ULP        |
                     +-------------------+
                               |
                               |
                               V
                     +-------------------+
                     |        IPv6       |
                     +-------------------+
                               |
                               | MAC-SSCS SAP
                               V
                     +-------------------+
                     |  802.16 IPv6 CS   |
                     +-------------------+
                               |
                               | MAC-CPS SAP
                               V
                     +-------------------+
                     |   802.16 MAC CPS  |
                     +-------------------+


                    Figure 1.  802.16 MAC Sublayers


   In case of IPv6 CS the classification parameters constitute of IPv6
   Header and Transport Header.  The following parameters are used as
   classifiers in case of IPv6 CS: IPv6 source and destination
   addresses, next header in the last header of the IP header chain,
   Traffic Class, and, source and destination port numbers.

   The following are the list of functions that IPv6 CS performs:
   a.  Classification of an IPv6 packet to an appropriate MAC Connection
   b.  Suppression of IPv6 Header, called Payload Header Suppression
       (PHS) (optional)
   c.  Delivery of the resulting IPv6 CS PDU to the MAC-CPS SAP to
       delivery to the peer MAC-CPS SAP.
   d.  Receipt of the IPv6 CS PDU from the MAC-CS SAP





Madanapalli, et al.     Expires December 16, 2006               [Page 4]

Internet-Draft         IPv6 over 802.16's IPv6 CS              June 2006


   e.  Rebuilding the IPv6 header if PHS is in use.


3.  Terminology

   Access Router (AR):
      A layer 3 entity that acts as a first-hop default router for the
      MSs.  The WiMAX network architecture defines the concept of an
      Access Service Network (ASN) which is a logical boundary and an
      aggregation of functions.  The ASN Gateway (ASN-GW) is a logical
      entity that represents an aggregation of control plane functions
      in addition to performing bearer plane routing or bridging
      function.  The IPv6 AR is a function of the ASN-GW when the base
      station (BS) and ASN-GW are split and is a function of the ASN in
      the case of an integrated entity which includes the BS and other
      functions.

   Base Station (BS):
      A layer 2 entity conforming to 802.16 suite of standards that
      transmit Layer 3 PDUs between MS and AR unchanged.

   Convergence Sublayer (CS):
      The service-specific convergence sublayers (called Convergence
      Layers in this document) interfaces to higher layers, above the
      core MAC common part sublayer.  The primary task of the
      convergence sublayer is to classify upper layer service data units
      (SDUs) to the proper MAC connection.

   Mobile Station (MS):
      An end-user equipment that provides connectivity to 802.16 based
      networks.  The terms MS, SS (Subscriber Station) and host are used
      interchangeably in this document.

   Transport Connection:
      An 802.16 based MAC connection between an MS and a BS with a
      specific QoS attributes.  There can be multiple connections
      between an MS and a BS at any given time serving different QoS
      requirements of the end user applications.  Each connection is
      identified by an unique identifier called Connection Identifier
      (CID).


4.  Architecture of WiMAX network

   In WiMAX networks, ASN GW plays the role of Access Router (AR).  An
   MS is attached to only one ASN GW at a given time.  ASN-GW manages
   the information (including IP address) of all MSs on the link.
   Subsequent to network entry, an MS is provided with an initial



Madanapalli, et al.     Expires December 16, 2006               [Page 5]

Internet-Draft         IPv6 over 802.16's IPv6 CS              June 2006


   transport connection, Initial Service Flow, to communicate with the
   AR to get the IP address and other host configuration information.

   The following figures illustrates high level view of the elements in
   the WiMAX network architecture that are involved in enabling IPv6:



        +-----+
        | MS1 |-----+
        +-----+     |
                    |
                    |
        +-----+     |     +-----+          +-----------+
        | MS2 |-----+-----| BS1 |----------| AR/ASN-GW |-----[Internet]
        +-----+     |     +-----+          +-----------+
           .        |           ____________
           .        |          ()__________()
        +-----+     |             L2 Tunnel
        | MSn |-----+
        +-----+

               Figure 2. WiMAX N/W Architecture: Separate BS and AR



   The above figure shows the case where BS and AR exist as separate
   entities, in this case a tunnelled interface between the two exists.



        +-----+
        | MS1 |-----+
        +-----+     |
                    |
                    |
        +-----+     |       +--------------+
        | MS2 |-----+-------| BS/AR/ASN-GW |-----[Internet]
        +-----+     |       +--------------+
           .        |
           .        |
        +-----+     |
        | MSn |-----+
        +-----+

               Figure 3. WiMAX N/W Architecture: BS and AR in one box





Madanapalli, et al.     Expires December 16, 2006               [Page 6]

Internet-Draft         IPv6 over 802.16's IPv6 CS              June 2006


   The above figure shows the case where BS and AR co-exist as a single
   entity.

   In either case, the AR is the first hop IPv6 Router for an MS/SS.


5.  IPv6 Link model for IPv6 CS

   The link between the MS and the AR at the IPv6 layer is viewed as a
   shared link.  The lower layer link between the MS and BS is a point-
   to-point link.  This point-to-point link between the MS and BS is
   extended all the way to the AR when the granularity of the tunnel
   between the BS and AR is on a per MS basis.  However the tunneled
   link between the BS and AR can also be a shared link which supports
   multiple MSs.  The lower-layer link between the MS and BS is referred
   to as a MAC transport connection and is identified uniquely within
   the scope of a BS by a Connection Identifier (CID).  The figure below
   shows the link model for IPv6:



          MS
        +----+                                       +----+
        |    |            IPv6 (Shared link)         |    |
        | L3 |=======================================|    |
        |    |                                       |    |
        |----|    PTP conn. +----+  L2 Tunnel        | AR |---[Internet]
        | L2 |--------------| BS |===================|    |
        |    |              |    |                   |    |
        +----+              +----+                   |    |
                                                     |    |
                            +----+     L2 Tunnel     |    |
                            | BS |===================|    |
                            |    |                   |    |
                            +----+                   +----+

               Figure 4. IPv6 link model in WiMAX Networks



   An AR can serve one or more BSs.  All MSs connected to BSs that are
   served by an AR are on the same IPv6 link.

   In the case of WiMAX, subsequent to the MS performing Registration
   (an 802.16 procedure), there exists an initial L2 transport
   connection between the MS and the AR which enables the sending and
   receiving of IPv6 packets without any IPv6 address for the MS.




Madanapalli, et al.     Expires December 16, 2006               [Page 7]

Internet-Draft         IPv6 over 802.16's IPv6 CS              June 2006


5.1.  On-link communication

   The IPv6 link is a shared link.  Hence from that perspective it
   appears to an MS that it can reach any other MS on the same link
   directly.  However in reality the lower-layer is a point-to-point
   link and all IPv6 packets between hosts that are on the same IPv6
   link have to be transmitted via the AR.  Packets originated by an MS
   always are sent to the AR for delivery to a destination.  When the
   destination is another MS which is on the same IPv6 link, the AR
   sends the packet unchanged to the destination MS, i.e. the AR does
   not decrement the hop limit while forwarding the packet within the
   link.


6.  Transmission of IPv6 over 802.16d/e using IPv6 CS

   IPv6 packets between the host/MS and BS are transmitted by
   encapsulating the IPv6 packet in 802.16 frame with 6 octet MAC
   header.


                 MS
             +-------+
             |  UL   |
             |-------|
             | IPv6  |                     BS
             |-------|                  +-------+
             |IPv6CS |--------//--------|IPv6CS |
             |-------|    802.16d/e     |-------|
             |  MAC  |                  |  MAC  |
             |-------|                  |-------|
             |  PHY  |                  |  PHY  |
             +-------+                  +-------+

          Figure 5. Transmission of IPv6 over IPv6 CS


6.1.  Frame Format

   IPv6 packets are transmitted in Generic 802.16 MAC frames as shown in
   the following figure.










Madanapalli, et al.     Expires December 16, 2006               [Page 8]

Internet-Draft         IPv6 over 802.16's IPv6 CS              June 2006


                        0                   1
                        0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
                       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
                       |H|E|   Type    |R|C|EKS|R|LEN  |
                       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
                       |    LEN LSB    |    CID MSB    |
                       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
                       |    CID LSB    |    HCS        |
                       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
                       |             IPv6              |
                       +-                             -+
                       |            header             |
                       +-                             -+
                       |             and               |
                       +-                             -+
                       /            payload ...        /
                       +-                             -+
                       |                               |
                       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
                       |CRC (optional) |
                       +-+-+-+-+-+-+-+-+

                       Figure 6. 802.16 Frame Format


      H: Header Type (1 bit).  Shall be set to zero indicating that it
      is a Generic MAC PDU.
      E: Encryption Control. 0 = Payload is not encrypted; 1 = Payload
      is encrypted.
      R: Reserved.  Shall be set to zero.
      C: CRC Indicator. 1 = CRC is included, 0 = 1 No CRC is included
      EKS: Encryption Key Sequence
      LEN: The Length in bytes of the MAC PDU including the MAC header
      and the CRC if present (11 bits)
      CID: Connection Identifier (16 bits)
      HCS: Header Check Sequence (8 bits)
      CRC: An optional 8-bit field.  CRC appended to the PDU after
      encryption.
      Type: This field indicates the subheaders (Mesh subheader,
      Fragmentation Subheader, Packing subheader etc and special payload
      types (ARQ) present in the message payload

6.2.  Maximum Transmission Unit

   The 802.16d/e link has an MTU of 1522 octets.  Hence the MTU of the
   IPv6 packets can be configured to be 1500 octets as the
   recommendation in [3].  However because of a tunnelled interface
   between the BS and the Access router (AR), it makes sense to limit



Madanapalli, et al.     Expires December 16, 2006               [Page 9]

Internet-Draft         IPv6 over 802.16's IPv6 CS              June 2006


   the MTU to a value less than 1500 octets.  A value of 1400 octets is
   recommended for the MTU on the IPv6 hosts.  Router advertisements can
   however override the recommended MTU and specify an appropriate value
   which is 1500 octets or less.

6.3.  IPv6 Prefix Assignment

   The IPv6 link between MSs and the AR is a shared link.  An IPv6
   prefix is shared by all the nodes which are on the same link.  The
   prefix is assigned to the nodes with On-link flag (L-flag) reset so
   that the nodes may not make on-link assumption for the addresses
   whose prefix matches with sending node prefix.


7.  IPv6 Neighbor Discovery Procedures

7.1.  Router Discovery

7.1.1.  Router Solicitation

   An MS can send a Router Solicitation message to solicit a Router
   Advertisement message from the AR to acquire necessary information as
   specified in [4].  On completion of the network attachment procedure
   (802.16 specific), an initial transport connection is established
   between the MS and the AR.  The MS should send a router solicitation
   as soon as this connection is established.  An MS that is network
   attached may also send router solicitations at any time.

7.1.2.  Router Advertisement

   Upon receiving a Router Solicitation or as soon as the initial
   transport connection following the network attachment procedure is
   established, the AR sends a router advertisement.  As there is only
   one AR at any given time serving an MS which receives a Router
   Solicitation from an MS, the Router Advertisement can be sent without
   any random delay.

   AR may send unsolicited Router Advertisements periodically as
   specified in [4].

7.1.3.  Router Lifetime and Periodic Router Advertisements

   The router lifetime should be set to a large value, preferably in
   hours. 802.16d/e hosts have the capability to transition to an Idle
   mode in which case the radio link between the BS and MS is torn down.
   Paging is required in case the network needs to deliver packets to
   the MS.  In order to avoid waking a mobile which is in Idle mode and
   consuming resources on the air interface, the interval between



Madanapalli, et al.     Expires December 16, 2006              [Page 10]

Internet-Draft         IPv6 over 802.16's IPv6 CS              June 2006


   periodic router advertisements should be set quite high.  The
   MaxRtrAdvInterval should be configurable to a value which is greater
   than 1800 seconds and less than 14400 seconds.

7.2.  Prefix Discovery

   The AR advertises the prefixes by putting PIO (Prefix Information
   Option) in the Router Advertisements and an MS learns the prefix
   information by consulting these PIOs.  The prefixes are advertised
   with on-link flag (L-bit) reset so that the MSs may not make any
   assumption about existence of on-link neighbors.  In PIO, a prefix
   may be advertised with autonomous address-configuration flag (A-bit)
   set.  The MSs on the link uses the prefix with A-bit set for auto-
   configuring an IPv6 address in a stateless manner as specified in
   [5].  All Router Advertisements should contain all the prefixes
   assigned to the IPv6 link.  To enable this, the link should not be
   assigned with too many prefixes so that all the PIOs can be sent in a
   single Router Advertisement.

7.3.  Address Resolution

   When IPv6 is supported over the IPv6 CS in the case of 802.16d/e, the
   IPv6 layer sits directly over the 802.16d/e MAC layer.  The MAC
   address of the host is not used in the MAC header.  Instead a
   Connection Identifier (CID) is used.  As s result address resolution
   is not required in this case.

   However an MS or an AR may perform address resolution if they have
   been implemented as per IPv6 suite of specifications.  In such cases
   the AR can relay the address resolution request to the MS that is
   owning the target IPv6 address so that the actual MS responds to the
   address resolution query.  An intelligent/future implementation may
   choose not to do the address resolution if the access technology is
   802.16d/e with IPv6 CS.

7.4.  Next-Hop Determination

   The Next-hop for an MS is always the AR and so Next-Hop resolution
   may be trivial.  An intelligent/future implementation of a host may
   choose not to do the next-hop determination if the access technology
   is 802.16d/e.

7.5.  Neighbor Unreachability Detection (NUD)

   For an MS the only neighbor is the AR and hence the MS can avoid the
   NUD which can be derived from the MAC layer functionality e.g.
   existence of a MAC transport connection.  However the AR must perform
   NUD as defined in [4] using NS/NA exchange as the MS may have



Madanapalli, et al.     Expires December 16, 2006              [Page 11]

Internet-Draft         IPv6 over 802.16's IPv6 CS              June 2006


   multiple addresses at any given time.


8.  Address Autoconfiguration

   MSs can configure their addresses using either stateless address
   autoconfiguration or stateful configuration with DHCPv6.

8.1.  Stateless Address Autoconfiguration

   Stateless address autoconfiguration is performed as specified in [5].
   The Interface Identifier is generated from its MAC address as per
   [6].  The MS may also generate random Interface Identifiers as per
   the privacy extensions specification for address autoconfiguration as
   per [7].  The address configured through stateless address
   autoconfiguration must pass the duplicate address detection test
   before being assigned to the interface.

8.2.  Stateful Address Autoconfiguration

   The Stateful Address Autoconfiguration is invoked if the M-flag is
   set in the Router Advertisement.  Obtaining the IPv6 address through
   stateful address autoconfiguration method is specified in the [8].
   The address configured through stateful address autoconfiguration
   must pass the duplicate address detection test before being assigned
   to the interface.


9.  Duplicate Address Detection

   The IPv6 link is viewed as a shared link.  However the DAD procedure
   as specified in [5] does not adapt well to the 802.16d/e air
   interface.  In order to optimize the air interface and to conserve
   the battery life of MSs that are in Idle mode, it is not recommended
   to multicast the NS messages to all hosts on the link.  An
   enhancement to the DAD mechanism is specified here for use in the
   case of IPv6 over 802.16d/e.

   The WiMAX IPv6 AR is aware of all the IPv6 addresses configured by
   the hosts for which it is the serving AR.  When an MS initiates the
   DAD procedure by sending a DAD NS, the AR looks at its authoritative
   address cache to determine if the target address in DAD NS is a
   duplicate.  If a match exists, the AR relays the DAD NS to the MS
   that currently is configured with that address.  The MS which owns
   the address defends the address as specified in [5] by sending a DAD
   NA which is relayed via the AR to the MS performing the DAD
   procedure.




Madanapalli, et al.     Expires December 16, 2006              [Page 12]

Internet-Draft         IPv6 over 802.16's IPv6 CS              June 2006


9.1.  Conceptual Data Structures

   In order to enable Relay DAD, the AR needs to maintain the following
   information for each interface.

   Authoritative Address Cache:
      A set of entries about the IPv6 addresses that are currently in
      use by the MSs belonging to the same IPv6 link as the router
      interface.  The authoritative address Cache includes all types of
      addresses (link local, unique local and global addresses).  The AR
      learns the addresses from the DAD Neighbor Solicitation and
      updates the address cache.  The entries in the Authoritative
      Address Cache are deleted only if the prefix lifetime expires or
      the node deregisters explicitly.  The link local addresses have
      infinite lifetime and will be deleted only when there is an
      explicit deregistration of the particular MS
      The deregistration procedure is specific to 802.16d/e and the
      interaction between the deregistration procedure and the deletion
      of the address from the authoritative address cache is outside the
      scope of this document.

9.2.  Relay DAD Procedure

   The following figure illustrates the Relay DAD procedures.



























Madanapalli, et al.     Expires December 16, 2006              [Page 13]

Internet-Draft         IPv6 over 802.16's IPv6 CS              June 2006


    +-------+               +-------+               +-------+
    |  MS1  |               | BS/AR |               |  MS2  |
    +-------+               +-------+               +-------+
        |                       |                       |
        |   N/W Entry & Auth    |                       |
   (1)  |<--------------------->|                       |
        |                       |                       |
        | Transport conn. Est.  |                       |
   (2)  |<--------------------->|                       |
        |                       |                       |
        |                       |                       |
        |LLA Construction       |                       |
   (3)  |------+                |                       |
        |      |                |                       |
        |<-----+                |                       |
        |                       |                       |
        |       MLD Join        |                       |
   (4)  |---------------------->|                       |
        |                       |                       |
        |       DAD NS          |                       |
   (5)  |---------------------->|                       |
        |                       |Addr. Cache Lookup     |
   (6)  |                       |------+                |
        |                       |      |                |
        |                       |<-----+                |
        |                       |                       |
        |                       |       DAD NS          |
   (7)  |                       |---------------------->|
        |                       |                       |
        |       DAD NA          |                       |
   (8)  |<----------------------|<----------------------|
        |                       |                       |
        |                       |                       |


                    Figure 7. Relay DAD


   1.  The MS1 performs initial network entry and authentication
       procedures as described in 802.16d/e
   2.  On successful completion of step 1, an initial transport
       connection is established between the MS and the AR.
   3.  MS1 constructs a Link Local Address as specified in [5].
   4.  MS1 constructs a solicited node multicast address for the
       corresponding Link Local Address and sends MLD Join request for
       the solicited node multicast address.





Madanapalli, et al.     Expires December 16, 2006              [Page 14]

Internet-Draft         IPv6 over 802.16's IPv6 CS              June 2006


   5.  MS1 starts verifying address uniqueness by sending a DAD NS on
       the initial MAC transport connection.  The MS1 can also send a
       Router Solicitation simultaneously on initial MAC transport
       connection for Router and Prefix discovery.
   6.  AR looks into the authoritative address cache to check if the
       address is already in use
   7.  AR relays the DAD NS to the address owner (MS2) in case there is
       match in the address cache.
   8.  MS2 defends the address by sending DAD NA, which is relayed to
       MS1 via the AR.  Upon on receiving the DAD NA, it discards the
       tentative address and behaves as specified in [5].

9.2.1.  MS Behavior

   The MS behavior is as specified in [5].  And it is recommended that
   the MS performs DAD for all addresses that it acquires before
   assigning to its interface even if the same Interface Identifier
   being reused for the new address.

9.2.2.  AR Behavior

   The AR must implement the address cache and must not decrement the
   hop limit while forwarding the DAD NS to the address owner.  An
   address that matches with the interface identifier (least 64 bits)
   must be considered as duplicate as some implementations may choose
   not to do DAD for all addresses constructed from the same interface
   identifier.  If the MS which owns the address is in idle mode, the MS
   must be paged and brought to active state in order to deliver the DAD
   NS.

   The AR also required to maintain the state (MS information) for all
   DAD NSs that it relays, so that the DAD NA can be relayed back the
   DAD probing MS.


10.  IANA Considerations

   This draft does not require any actions from IANA.


11.  Security Considerations

   This document specifies the operation of IPv6 over the IEEE 802.16d/e
   air interface and hence the security aspects are equivalent to the
   IPv6 specifications.

   The IPv6 AR in the case of 802.16d/e maintains the addresses of all
   the hosts that it is currently serving.  As a result a couple of



Madanapalli, et al.     Expires December 16, 2006              [Page 15]

Internet-Draft         IPv6 over 802.16's IPv6 CS              June 2006


   issues arise:

   1.  A malicious node may launch a DoS attack by configuring a large
   number of addresses and performing DAD on those.  However this is not
   an issue since the AR is aware at the lower layer the identity of the
   host performing the DAD and has the ability to terminate the
   connection.

   2.  A malicious node may configure a large number of addresses and
   attempt to insert these in the AR's address cache.  This may result
   in an overflow of the address cache at the AR.  It is recommended
   that hosts in such a network be allowed to configure a limited number
   of addresses.  This number is a configurable parameter and is
   implementation specific to the AR.


12.  Acknowledgements

   TBD

13.  References

   [1]   "IEEE 802.16d, IEEE standard for Local and metropolitan area
         networks, Part 16:Air Interface for fixed broadband  wireless
         access systems", October 2004.

   [2]   "IEEE 802.16e, IEEE standard for Local and metropolitan area
         networks, Part 16:Air Interface for fixed and Mobile broadband
         wireless access systems", October 2005.

   [3]   Deering, S. and R. Hinden, "Internet Protocol, Version 6 (IPv6)
         Specification", RFC 2460, December 1998.

   [4]   Narten, T., Nordmark, E., and W. Simpson, "Neighbor Discovery
         for IP Version 6 (IPv6)", RFC 2461, December 1998.

   [5]   Thomson, S. and T. Narten, "IPv6 Stateless Address
         Autoconfiguration", RFC 2462, December 1998.

   [6]   Hinden, R. and S. Deering, "IP Version 6 Addressing
         Architecture", RFC 4291, February 2006.

   [7]   Narten, T. and R. Draves, "Privacy Extensions for Stateless
         Address Autoconfiguration in IPv6", RFC 3041, January 2001.

   [8]   Droms, R., Bound, J., Volz, B., Lemon, T., Perkins, C., and M.
         Carney, "Dynamic Host Configuration Protocol for IPv6
         (DHCPv6)", RFC 3315, July 2003.



Madanapalli, et al.     Expires December 16, 2006              [Page 16]

Internet-Draft         IPv6 over 802.16's IPv6 CS              June 2006


   [9]   Madanapalli, S., "IPv6 Neighbor Discovery over 802.16: Problems
         and Goals,
         draft-madanapalli-nd-over-802.16-problems-00.txt(work in
         progress)", November 2005.

   [10]  Bernard, B., "Multiple Encapsulation Methods Considered
         Harmful,  draft-iab-link-encaps-00.txt (work in progress)",
         May 2006.

   [11]  "WiMAX Forum, www.wimaxforum.org".









































Madanapalli, et al.     Expires December 16, 2006              [Page 17]

Internet-Draft         IPv6 over 802.16's IPv6 CS              June 2006


Authors' Addresses

   Syam Madanapalli
   Samsung ISO
   66/1 Bagmane Tech Park
   CV Raman Nagar
   Bangalore  560093
   India

   Phone: +91-80-41819999
   Email: smadanapalli at gmail dot com


   Basavaraj Patil
   Nokia
   6000 Connection Drive
   Irving, TX  75039
   US

   Email: basavaraj.patil@nokia.com


   Erik Nordmark
   Sun Microsystems, Inc
   901 San Antonio Road
   Palo Alto, CA  94110
   US

   Email: erik.nordmark@sun.com


   JinHyeock Choi
   Samsung AIT
   Communication Lab
   P.O.Box 111
   Suwon  440-600
   Korea

   Phone: +82-31-280-9233
   Email: jinchoe@samsung.com











Madanapalli, et al.     Expires December 16, 2006              [Page 18]

Internet-Draft         IPv6 over 802.16's IPv6 CS              June 2006


   Soohong D. Park
   Samsung Electronics
   Mobile Platform Laboratory
   416, Maetan-3dong, Yeongtong-Gu
   Suwon
   Korea

   Phone: +82-31-200-4508
   Email: soohong.park@samsung.com










































Madanapalli, et al.     Expires December 16, 2006              [Page 19]

Internet-Draft         IPv6 over 802.16's IPv6 CS              June 2006


Intellectual Property Statement

   The IETF takes no position regarding the validity or scope of any
   Intellectual Property Rights or other rights that might be claimed to
   pertain to the implementation or use of the technology described in
   this document or the extent to which any license under such rights
   might or might not be available; nor does it represent that it has
   made any independent effort to identify any such rights.  Information
   on the procedures with respect to rights in RFC documents can be
   found in BCP 78 and BCP 79.

   Copies of IPR disclosures made to the IETF Secretariat and any
   assurances of licenses to be made available, or the result of an
   attempt made to obtain a general license or permission for the use of
   such proprietary rights by implementers or users of this
   specification can be obtained from the IETF on-line IPR repository at
   http://www.ietf.org/ipr.

   The IETF invites any interested party to bring to its attention any
   copyrights, patents or patent applications, or other proprietary
   rights that may cover technology that may be required to implement
   this standard.  Please address the information to the IETF at
   ietf-ipr@ietf.org.


Disclaimer of Validity

   This document and the information contained herein are provided on an
   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
   ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
   INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
   INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.


Copyright Statement

   Copyright (C) The Internet Society (2006).  This document is subject
   to the rights, licenses and restrictions contained in BCP 78, and
   except as set forth therein, the authors retain all their rights.


Acknowledgment

   Funding for the RFC Editor function is currently provided by the
   Internet Society.




Madanapalli, et al.     Expires December 16, 2006              [Page 20]