Network Working Group M-K. Shin Internet-Draft ETRIExpires: November 25, 2006Intended status: Informational Y-H. Han Expires: April 4, 2007 KUTMay 24,S-E. Kim KT D. Premec Siemens Mobile October 1, 2006ISPIPv6 Deployment Scenarios inWireless Broadband Access802.16(e) Networksdraft-ietf-v6ops-802-16-deployment-scenarios-00draft-ietf-v6ops-802-16-deployment-scenarios-01 Status of this Memo By submitting this Internet-Draft, each author represents that any applicable patent or other IPR claims of which he or she is aware have been or will be disclosed, and any of which he or she becomes aware will be disclosed, in accordance with Section 6 of BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet- Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt. The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html. This Internet-Draft will expire onNovember 25, 2006.April 4, 2007. Copyright Notice Copyright (C) The Internet Society (2006). Abstract This document provides detailed description of IPv6 deployment and integration methods and scenarios in wireless broadband access networks in coexistence with deployed IPv4 services. In this document we will discuss main components of IPv6 IEEE 802.16 access network and its differences from IPv4 IEEE 802.16 networks and how IPv6 is deployed and integrated in each of the IEEE 802.16 technologies using tunneling mechanisms and native IPv6. Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 2. Wireless Broadband Access Network Technologies - IEEE 802.16 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 2.1. Elements of IEEE 802.16 Networks . . . . . . . . . . . . . 4 2.2. Deploying IPv6 in IEEE 802.16 Networks . . . . . . . . . . 5 2.2.1.Scenario A . . . . . . . . . . . .Mobile Access Deployment Scenarios . . . . . . . . . .76 2.2.2.Scenario B . . . . . . . . . . . . . . . . . . . . . . 9 2.2.3. Scenario C . . . . . . . . . . . .Fixed/Nomadic Deployment Scenarios . . . . . . . . . . 102.2.4. Scenario D . . . . . . . . . . . . . . . . . . . . . . 122.3. IPv6 Multicast . . . . . . . . . . . . . . . . . . . . . . 13 2.4. IPv6Mobility . . . . . . . . . . . . . . . . . . . . . . 14 2.5. IPv6QoS . . . . . . . . . . . . . . . . . . . . . . . . . 142.6.2.5. IPv6 Security . . . . . . . . . . . . . . . . . . . . . .15 2.7.14 2.6. IPv6 Network Management . . . . . . . . . . . . . . . . . 15 3. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 16 4. Security Considerations . . . . . . . . . . . . . . . . . . . 17 5. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 18 6. References . . . . . . . . . . . . . . . . . . . . . . . . . . 19 6.1. Normative References . . . . . . . . . . . . . . . . . . . 19 6.2. Informative References . . . . . . . . . . . . . . . . . . 19 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 21 Intellectual Property and Copyright Statements . . . . . . . . . . 22 1. Introduction Recently, broadband wireless access network is emerging for wireless communication for user requirements such as high quality data/voice service, fast mobility, wide coverage, etc. The IEEE 802.16 Working Group develops standards and recommended practices to support the development and deployment of broadband wireless metropolitan area networks. Whereas theexisting IEEE 802.16 standard[IEEE802.16] standard addresses fixed wireless applications only, theIEEE 802.16(e) standard[IEEE802.16e]aims to servestandard serves the needs of fixed, nomadic, and fully mobile networks. It adds mobility support to the original standard so that mobile subscriber stations can movewhile receivingduring services. The standardization of IEEE 802.16e is completed, which plans to support mobility up to speeds of 70~80 mile/h that will enable the subscribers to carry mobile devices such as PDAs, phones, or laptops. IEEE 802.16e is one of the most promising access technologies which would be applied to the IP-based broadband mobile communication.WiMAX Forum is an industrial corporation formed to promote and certify compatibility and interoperability of broadband wireless products mainly based on IEEE 802.16. The Network Working Group (NWG) of WiMAX Forum is defining the IEEE 802.16 network architecture (e.g., IPv4, IPv6, Mobility, interworking with different networks, AAA, etc). Similarly, WiBro (Wireless Broadband), Korea effort which focuses on the 2.3 GHz spectrum band, is also based on the IEEE 802.16 and IEEE 802.16e specifications.As the deployment of wireless broadband access network progresses, users will be connected to IPv6 networks. While the IEEE 802.16 defines the encapsulation of an IPv4/IPv6 datagram in an IEEE 802.16 MAC payload, a complete description of IPv4/IPv6 operation and deployment is not present. In this document, we will discuss main components of IPv6 IEEE 802.16 access network and its differences from IPv4 IEEE 802.16 networks and how IPv6 is deployed and integrated in each of the IEEE 802.16 technologies using tunneling mechanisms and native IPv6. This document extends works of [I-D.ietf-v6ops-bb-deployment- scenarios] and follows the structure and common terminology of the document. 2. Wireless Broadband Access Network Technologies - IEEE 802.16 This section describes the infrastructure thatexists today inis based on IEEE 802.16 networks providing wireless broadband services to the customer. It also describes a way to deploy IPv6deployment options in theseover IEEE 802.16 networks. 2.1. Elements of IEEE 802.16 Networks The IEEE 802.11 access network (WLAN) has driven the revolution of wirelesscommunication butcommunication. However, the more people use it the more its limitationslikesuch as short rangeorand lack of mobility supportwere revealed.arose. Compared with such IEEE 802.11 network, IEEE 802.16 supports enhanced featureslikesuch as widerrangecoverage and mobility. So it is expected that IEEE 802.16 network could be the next step of IEEE 802.11 network. The mechanism of transporting IP traffic over IEEE 802.16 networks is outlined in [IEEE802.16], but the details of IPv6 operations over IEEE 802.16 are being discussed now. Here are some of the key elements of an IEEE 802.16networksnetwork: o MS: Mobile Station. A station in the mobile service intended to be used while in motion or during halts at unspecified points. A mobile station (MS) is always a subscriber station(SS).(SS) which must provide mobility function. o BS: Base Station. A generalized equipment set providingconnectivity,management and control of MS connections. There is a unidirectional mapping between BS and MS medium access control (MAC) peers for the purpose of transporting a service flow's traffic.Connections areA connection is identified by a connection identifier(CID) and all(CID). All traffic is carried onathe connection. Sometimes there can be alternative IEEE 802.16 network deployment where a BS is integrated with an access router, composing one box in view of implementation.Figure 1 illustrates the key elements ofo AR: Access Router. A generalized equipment set providing IP connectivity between BS and IP based network. An AR performs first hop routing function to all MS. Figure 1 illustrates the key elements of IEEE802.16802.16(e) networks. Customer | Access Provider | Service Provider Premise | | (Backend Network) +-----++-----+ +------++----+ +----+ +--------+ | MSs |--(802.16)--| BS|-----+Access+---+|-----| | | Edge | ISP +-----++-----+ |Router|+----+ | AR |---| Router+==>Network +--+---+|==>Network +--| | | (ER) | | +----+ +--------+ +-----++-----++----+ | | +------+ |MssMSs |--(802.16)--| BS|--------+|--+ +--|AAA | +-----++-----++----+ |Server| +------+ Figure 1: Key Elements of IEEE 802.16(e) Networks 2.2. Deploying IPv6 in IEEE 802.16 NetworksIEEE 802.16 supports[IEEE802.16] specifies two modessuch as 2-way PMP (Point-to- Multipoint) and Mesh topologyfor sharing the wirelessnetworks. In this document, we focusmedium: point-to-multipoint (PMP) and mesh (optional). This document only focuses on2-wayPMPtopology wireless networks. There are two different deployment options in current IEEE 802.16 networks: Cellular-like and Hot-zonemode. Some of the factors that hinder deploymentscenarios.of native IPv6can be deployed in bothcore protocols are introduced by [I-D.jee-16ng-problem-statement]. The summary ofthese deployment models. A. Cellular-like Deployment Modelthem is as follows: 1. Lacking of Facility for IPv6 Native Multicasting IEEE 802.16BS can offer both fixed communications and mobilePMP mode is a connection oriented technology without bi- directional native multicast support. IPv6 neighbor discovery [RFC2461] supports various functionsunlike IEEE 802.11. In particular, IEEE 802.16e working group standardizedfor the interaction between nodes attached on the same subnet, suchmobility featuresas on-link determination and address resolution. It is designed with no dependence on a specific link layer technology, but requires that thespecificationlink layer technology support native multicast. This lacking ofIEEE 802.16e provides some competitionfacility for IPv6 native multicast results in inappropriateness to apply the standard neighbor discover protocol specially regarding, address resolution, router discovery, stateless auto-configuration and duplicated address detection. 2. Impact on IPv6 Subnet Model IEEE 802.16 is different from existingcellular systems. This use case will be implemented only with the licensed spectrum.wireless access technologies such as IEEE 802.11 or 3G, and, while IEEE 802.16BS might be deployed with a proprietary backend managed bydefines the encapsulation of anoperator. All originalIP datagram in an IEEE 802.16 MAC payload, a complete description of IPv6functionalities willoperation is notsurvivepresent. IEEE 802.16 can rather benefit from IETF input andsome of them might be compromisedspecification toefficiently servesupport IPv6 operation. Especially, BS should look at the classifiers and decide where tothis 'Cellular-like' use case. Undersend theuse case, however,packet, since IEEE 802.16standards are still IP- centric, providing packet-switched approach,connection always ends at BS, whilecellular standards like GSM haveIPv6 connection terminates at amore circuit-switched approach. B. Hot Zone Deployment Model The successdefault router. This operation and limitation may be dependent on the given subnet model [I-D.madanapalli-16ng-subnet-model-analysis]. 3. Multiple Convergence Sublayers (CS) There are operational complexity problems ofa Hotspot service with IEEE 802.11 has been prominent. The new IEEEIP over 802.16standards basically support such Hotspot services with large coverage area and high data rate. An area servedcaused byone base station is usually termed 'Hot Zone' because it is considerably larger than an IEEE 802.11 access point service area called Hotspot. Many wireless Internet service providers (Wireless ISPs) have planned to use IEEE 802.16 forthepurposeexistence ofhigh quality service. A companymultiple convergence sublayers [I-D.iab-link- encaps]. We should consider which type of Convergence Sublayer (CS) canusebe efficiently used on each subnet models and scenarios. IEEE 802.16to build up mobile office. Wireless Internet spreading through a campus or a cafe can be also implemented with it. The distinct pointCS delivers and classifies various kinds ofthis use case is that it can use unlicensed (2.4 & 5 GHz) band as wellhigher layer PDUs such aslicensed (2.6 & 3.5GHz) band. By using the unlicensed band, aATM, IPv4 packet and IPv6 packets over radio channel. For this purpose, IEEE 802.16BS might be used just as a wireless hub which a user purchases to build a private wireless network in his/her home or laboratory. Under 'Hot Zone' use case, a IEEE 802.16 BS will be deployed using an Ethernet (IP) backbone rather than a proprietary backend like cellular systems. Thus, many IPv6 functionalities will be preserved when adopting IPv6 to IEEE 802.16 networks, which brings out many research issues [I-D.jee-16ng-problem-statement] [I-D.madanapalli-nd- over-802.16-problems]. Some of the factors that hinder deployment of native IPv6 core protocols include: 1. Lacking of Facility for IPv6 Native Multicasting IEEE 802.16 is a PMP connection oriented technology without bi- directional native multicast support. IPv6 neighbor discovery [RFC2461] supports various functions for the interaction between nodes attached on the same subnet, such as on-link determination and address resolution. It is designed with no dependence on a specific link layer technology, but requires that the link layer technology support native multicast. The specification of IEEE 802.16 provides multicast and broadcast services. However, the aim of such services is to transmit IEEE 802.16 MAC management messages, not IP messages. This lacking of facility for IPv6 native multicast results in inappropriateness to apply the standard neighbor discover protocol specially regarding, address resolution, router discovery, stateless auto-configuration and duplicated address detection. 2. Impact of BS on Subnet Model IEEE 802.16 is different from existing wireless access technologies such as IEEE 802.11 or 3G, and, while IEEE 802.16 defines the encapsulation of an IP datagram in an IEEE 802.16 MAC payload, a complete description of IPv6 operation is not present. IEEE 802.16 can rather benefit from IETF input and specification to support IPv6 operation. Especially, BS should look at the classifiers and decide where to send the packet, since IEEE 802.16 connection always ends at BS, while IPv6 connection terminates at a default router. This operation and limitation may be dependent on the given subnet model. Also, we should consider which type of Convergence Sublayer (CS) can be efficiently used on each subnet models. IEEE 802.16 CS provides the tunneling of IP(v6) packets over IEEE 802.16 air-link. The tunnels are identified byintroduces the Connection Identifier (CID). Generally, CS performs the following functions in terms of IP packet transmission: 1) Receipt of protocol data units (PDUs) from the higher layer, 2) Performing classification and CID mapping of the PDUs, 3) Delivering the PDUs to the appropriate MAC SAP, 4) Receipt of PDUs from the peer MACSAP.SAP, and 5) Forwarding the PDUs to the corresponding AR. The specification of IEEE 802.16 defines several CSs for carrying IP packets, but does notprovide aprovide a detailed description of how to carry them. The several CSs are generally classified into two types of CS: IPv6 CS and Ethernet CS. In addition, due to the problems caused by the existence of multiple convergence sublayers [I-D.iab-link-encaps], the mobile access scenarios need solutions about how roaming will work when forced to move from one CS to another. Note that, at this phase this issue is the out of scope of this draft. It should be also discussed in 16ng WG. There are two different deployment scenarios: fixed and mobile access. A fixed access scenario substitudes for existing wired-based access technologies such as digital subscriber line (xDSL) and cable network. This fixed access scenario can provide nomadic access within the radio coverages, which is called Hot-zone model. A mobile access scenario is for new paradigm for voice, data and video over mobile network. This scenario can provide high speed data rate equalivent to wire-based Internet as well as mobility function equivalent to cellular system. The mobile access scenario can be classified into two different IPv6 sunbet models: shared IPv6 prefix link model and point-to-point link model. 2.2.1. Mobile Access Deployment Scenarios Unlike IEEE 802.11, IEEE 802.16 BS can offer mobility function as well as fixed communication. [IEEE802.16e] has been standardized to provide mobility features on IEEE 802.16 environments. This use case will be implemented only with the licensed spectrum. IEEE 802.16 BS might be deployed with a proprietary backend managed by an operator. All original IPv6 functionalities [RFC2461], [RFC2462] will not survive. Some architectural characteristics of IEEE 802.16 networks may affect the detaileddescriptionoperations ofhow to carry them. The several CSsNDP [RFC2461]. There aregenerally classified intotwotypes of CS:possible IPv6CSsubnet models for mobile access deployment scenarios: shared IPv6 prefix link model andEthernet CS. While deployingpoint-to- point link model [I-D.madanapalli-16ng-subnet-model-analysis]. The mobile access deployment models, WiMax and WiBro, fall within this deployment model. 1. Shared IPv6in the above mentioned approach, there are four possible typical scenarios as discussed below. 2.2.1. Scenario A Scenario APrefix Link Model This link model represents IEEE 802.16 mobile access network deployment where aBS is separated from a router, and asubnet consists of only singlerouterinterface of AR and multipleBSs andMSs.Current celluar-like deployment models, WiMaxTherefore, all MSs andWiBro, fall within this scenario A.corresponding interface of AR share the same IPv6 prefix as shown in Figure 2. IPv6 prefix will be different from the interface of AR. +-----+ | MS1|<------+|<-(16)-+ +-----+ | +-----+ | +-----+ +-----+ +--------+ |MSs |<------+----|MS2 |<-(16)-+----| BS1|---->||--+->| AR |----| Edge | ISP +-----+ +-----+ | +-----+ | Router +==>Network^| +--------+ +-----+ +-----+ | |Mss |<-----------|MS3 |<-(16)-+----| BS2|--------+|--+ +-----+ | +-----+ +-----+ | | MS4 |<-(16)-+ +-----+<---> IP terminationFigure 2:Scenario AShared IPv6 Prefix Link Model 2. Point-to-Point Link Model This link model represents IEEE 802.16 mobile access network deployment where a subnet consists of only single AR, BS and MS. That is, each connection to a mobile node is treated as a single link. Each link between the MS and the AR is allocated a separate, unique prefix or unique set of prefixes by the AR. The point-to- point link model follows the recommendations of [RFC3314]. +-----+ | MS1 |<-(16)---------+ +-----+ | +-----+ +-----+ +-----+ +--------+ | MS2 |<-(16)------| BS1 |--+->| AR |----| Edge | ISP +-----+ +-----+ | +-----+ | Router +==>Network | +--------+ +-----+ +-----+ | | MS3 |<-(16)------| BS2 |--+ +-----+ +-----+ +-----+ | | MS4 |<-(16)---------+ +-----+ Figure 3: Point-to-Point Link Model 2.2.1.1. IPv6 Related Infrastructure Changes IPv6 will be deployed in this scenario by upgrading the following devices to dual-stack: MS,BS (if possible),BS, AR andEdge Router. In this scenario theER. In this scenario, IEEE 802.16 BSs have only MAC and PHY layers without router function and operates as a bridge. The BSis Layer 3 unaware, so no changes are neededdoes not need to support IPv6. However, if IPv4 stack is loaded to them for management and configuration purpose, it is expected that BS should be upgraded by implementing IPv6 stack, too. 2.2.1.2. Addressing IPv6 MS has two possible options to get an IPv6 address. These options will be equally applied to the otherthree scenarios below.scenario below (Section 2.2.2). 1. IPv6 MS can get the IPv6 address from an access router using stateless auto-configuration. In this case, router discovery and DAD operationusing multicastshould be properly operated over IEEE 802.16 link. 2. IPv6 MS can use DHCPv6 to get an IPv6 address from the DHCPv6 server. In this case, the DHCPv6 server would be located in the service provider core network andEdge Router would simply act as a DHCP Relay Agent.the AR should provide DHCPv6 relay agent. This option is similar to what we do today in case of DHCPv4. In this scenario, a router and multiple BSs form an IPv6 subnet and a single prefix is allocated to all the attachedMS.MSs. All MSs attached to same AR can be on same IPv6 link.2.2.1.3.As for the prefix assignment, in case of shared IPv6Controlprefix link model, one or more IPv6 prefixes are assigned to the link andDatahence shared by all the nodes that are attached to the link. In point-to- point link model, the AR assigns a unique prefix or set of unique prefixes for each MS. 2.2.1.3. IPv6 Transport In a subnet, there are always two underlying links: one is the IEEE 802.16 wireless link between MS and BS, and the other is a wired link between BS and AR.Also, there are multiple BSsThe IPv6 packet should be classified by IPv6 source/destination addresses, etc. BS generates the flow based on thesame link.classification. It also decides where to send the packet or just forward the packet to the ACR, since IEEE 802.16 connection always ends at BS while IPv6 connection terminates at the AR. This operation may be dependent on IPv6 subnet models. If stateless auto-configuration is used to get an IPv6 address, router discovery and DAD operation should be properly operated over IEEE 802.16 link.So, BS may supportIn case of shared IPv6basic protocols such as ND using multicast functions, or provide some schemes to facilitateprefix link model, thestateless auto-configuration. Especially, IEEE 802.16 connection terminates at BS,DAD [RFC2461] does nota router. So, BS should look at the classifiers and decide whereadapt well tosend the packet. In addition, one BS can sendthepacket to other BSs, since multiple BSs are802.16 air interface as there is no native multicast support and when supported consumes air bandwidth as well as it would have adverse effect on MSs that were in thesame link. The operation and transmission methods are being intensively discusseddormant mode. An optimization, called Relay DAD, may be required to perform DAD. However, inother documents [I-D.shin-16ng-ipv6-transmission].case of point-to-point link model, DAD is easy since each connection to a MN is treated as a unique IPv6 link. Note that in this scenarioEthernet CS as well asIPv6 CS may beusedmore appropriate than Ethernet CS to transport IPv6packets.packets, since there are some overhead of Ethernet CS (e.g., Ethernet header) under mobile access environments . Simple or complex network equipments may constitute the underlying wired network betweenBSthe AR andAR.the ER. If the IP aware equipments between the AR and the ER do not support IPv6, the service providersare deployingcan deploy IPv6-in-IPv4 tunneling mechanisms to transport IPv6 packets betweenanthe AR andan Edge router.the ER. The service providers are deploying tunneling mechanisms to transport IPv6 over their existing IPv4 networks as well as deploying native IPv6 where possible. Native IPv6 should be preferred over tunneling mechanisms as native IPv6 deployment option might be more scalable and provide required service performance. Tunneling mechanisms should only be used when native IPv6 deployment is not an option.This can be equally applied to other three scenarios below. 2.2.1.4. Routing In general, the AR is configured with a default route that points to the Edge router. No routing protocols are needed on these devices which generally have limited resources. The Edge Router runs the IGP used in the ISP network such as OSPFv3 or IS-IS for IPv6. The connected prefixes have to be redistributed. Prefix summarization should be done at the Edge Router. 2.2.2. Scenario B Scenario B represents IEEE 802.16 network deployment where a BS is separated from a router, there are multiple access routers, and a subnet consists of multiple BS and MSs. If 802.16 access networks are widely deployed like WLAN, this scenario should be also considered. Hot-zone deployment model falls within this scenario B. +-----+ +-----+ +-----+ ISP 1 | MS1 |<-----+ +->| AR1 |----| ER1 |===>Network +-----+ | | +-----+ +-----+ +-----+ | +-----+ | | MS2 |<-----+-----| BS1 |--| +-----+ +-----+ | +-----+ +-----+ ISP 2 +->| AR2 |----| ER2 |===>Network +-----+ +-----+ | +-----+ +-----+ | Ms3 |<-----------| BS2 |--+ +-----+ +-----+ <---> IP termination Figure 3: Scenario B 2.2.2.1. IPv6 Related Infrastructure Changes IPv6 will be deployed in this scenario by upgrading the following devices to dual-stack: MS, BS (if possible), AR and Edge Router. In thisThis can be equally applied to other scenario below (Section 2.2.2). 2.2.1.4. Routing In general, theBSMS isLayer 3 unaware, soconfigured with a default route that points to the the AR. Therefore, nochangesrouting protocols are needed on the MS. The MS just sends tosupport IPv6. However, if IPv4 stack is loadedthe AR by default route. The AR can configure multiple link tothemER formanagement and configuration purpose, it is expected that BSnetwork reliability. The AR shouldbe upgraded by implementingsupport IPv6stack, too. 2.2.2.2. Addressing In this scenario, multiple BSs and MSs form anrouting protocol such as OSPFv3 [RFC2740] or IS-IS for IPv6subnet and multiple prefixes are allocatedwhen connected toalltheattached MS. All MSs attached to different BSs underER with multiple links. The ER runs thesame AR,IGP such as OSPFv3 or IS-IS for IPv6 in the service provider network. The routing information of the ER can beon same IPv6 link. 2.2.2.3.redistributed to the AR. Prefix summarization should be done at the ER. 2.2.1.5. Mobility As for mobility management, the movement between BSs is handled by Mobile IPv6Control and Data Transport In[RFC3775], if it requires asubnet, like scenario A, there are always two underlying links: onesubnet change. Also, in certain cases (e.g., fast handover [I-D.ietf-mipshop-fmipv6- rfc4068bis]) the link mobility information must be available for facilitating layer 3 handoff procedure. Mobile IPv6 defines that movement detection uses Neighbor Unreachability Detection to detect when the default router is no longer bi-directionally reachable, in which case the mobile node must discover a new default router. Periodic Router Advertisements for reachability and movement detection may be unnecessary because IEEE 802.16 MAC provides the reachability by its Ranging procedure and the movement detection by the Handoff procedure. IEEE 802.16wireless link between MS and BS, and the otherdefines L2 triggers whether refresh of an IP address isa wired link between BS and AR. Also, there are multiple BSs onrequired during thesame link. If stateless auto-configuration is used to gethandoff. Though a handoff has occurred, anIPv6 address, considerations onadditional router discoveryand DAD operation are the same as scenario A. The operation and transmission methods are being intensively discussed in other documents [I-D.shin-16ng-ipv6-transmission]. Note thatprocedure is not required inthis scenario Ethernet CScase of intra-subnet handoff. Also, faster handoff may bemore suitable to transport IPv6 packets, rather than IPv6 CS, since this scenario requires broadcast-like functions (e.g., multi-homing). Simple or complex network equipments may constitute the underlying wired network between BS and AR. If the IP aware equipments do not support IPv6,occurred by theservice providers are deploying IPv6-in-IPv4 tunneling mechanisms to transportL2 trigger in case of inter-subnet handoff. Also, IEEE 802.16g which is under-developed defines L2 triggers for link status such as link-up, link-down, handoff-start. These L2 triggers may make Mobile IPv6packets between an ARprocedure more efficient andan Edge router. 2.2.2.4. Routingfaster. Inthis scenario,addition, Mobile IPv6multi-homing considerations exist. For example, if there exist two routers to support MSs, default router must be selected. The Edge Router runsFast Handover assumes theIGP used insupport from link- layer technology, but theSP network suchparticular link-layer information being available, asOSPFv3well as the timing of its availability (before, during orIS-IS for IPv6. The connected prefixes haveafter a handover has occurred), differs according tobe redistributed. Prefix summarization should be done attheEdge Router. 2.2.3. Scenario C Scenario C representsparticular link-layer technology in use. This issue is also being discussed in [I-D.ietf-mipshop-fh80216e]. 2.2.2. Fixed/Nomadic Deployment Scenarios The IEEE 802.16 accessnetworknetworks can provide plain Ethernet connectivity end-to-end. Wireless DSL deploymentwhere a BSmodel isintegrated with a router, composing one box in viewan example ofimplementation, andasubnet consists of only single BS/router and multiple MSs. +-----+ | MS1 |<------+ +-----+ | +-----+ | +-------+ +--------+ | MS2 |<------+--->|BS/AR1 |---------| Edge | ISP +-----+ +-------+ | Router +==>Network +--------+ +-----+ +-------+ | | Ms3 |<---------->|BS/AR2 |-----------+ +-----+ +-------+ <---> IP termination Figure 4: Scenario C 2.2.3.1. IPv6 Related Infrastructure Changesfixed/nomadic IPv6will be deployed in this scenario by upgrading the following devices to dual-stack: MS, BS/AR and Edge Router. 2.2.3.2. Addressing In this scenario, a single prefix is allocateddeployment of IEEE 802.16. Many wireless Internet service providers (Wireless ISPs) have planned toalluse IEEE 802.16 for theattached MS. All MSs attached to same BSpurpose of high quality broadband wireless service. A company canbe on same IPv6 link. 2.2.3.3. IPv6 Control and Data Transport If stateless auto-configuration is used to get an IPv6 address, router discovery and DAD operations should be properly operated overuse IEEE 802.16link. So, BS/AR should support IPv6 basic protocols such as ND using multicast functions, or provide some schemestofacilitate the stateless auto-configuration.build up mobile office. Wireless Internet spreading through a campus or a cafe can be also implemented with it. Theoperation and transmission methods are being intensively discussed in other documents [I-D.shin-16ng-ipv6-transmission]. Note that indistinct point of thisscenario Ethernet CSuse case is that it can use unlicensed (2.4 & 5 GHz) band as well asIPv6 CS maylicensed (2.6 & 3.5GHz) band. By using the unlicensed band, an IEEE 802.16 BS might be usedto transport IPv6 packets. 2.2.3.4. Routing In general, BS/Router is configured withjust as adefault route that points to the Edge router. No routing protocols are needed on these deviceswireless switch/hub whichgenerally have limited resources. The Edge Router runs the IGP useda user purchases to build a private wireless network in his/her home or laboratory. Under fixed access model, theSP networkIEEE 802.16 BS will be deployed using an IP backbone rather than a proprietary backend like cellular systems. Thus, many IPv6 functionalities such asOSPFv3 or IS-IS for IPv6. The connected prefixes have to be redistributed. Prefix summarization should[RFC2461], [RFC2462] will bedone at the Edge Router. 2.2.4. Scenario D Scenario Dpreserved when adopting IPv6 to IEEE 802.16 devices. This scenario also represents IEEE 802.16accessnetwork deployment where aBS is integrated with a router, composing one box in view of implementation. In this scenario, asubnet consists ofonly single BS/routermultiple MSs andsingle MS.multiple interface of the multiple BSs. Multiple access routers can exist. There exist multiple hosts behind an SS (networks behind an MS may exist). When 802.16 access networks are widely deployed like WLAN, this case should be also considered. Hot-zone deployment model falls within this case. +-----+ +-----+ +-----+ ISP 1 | SS1 |<-(16)+ +->| AR1 |----| ER1 |===>Network +-----+ | | +-----+ +-----+ +-----+ | +-----+ | | SS2 |<-(16)+-----| BS1 |--| +-----+ +-----+ | +-----+ +-----+ ISP 2 +->| AR2 |----| ER2 |===>Network +-----+ +-----+ +-----+ | +-----+ +-----+ |Hosts|<-->|SS/GW|<-(16)------| BS2 |--+ +-----+ +-----+ +-----+ Thisscenario mimicsnetwork behind MS may exist Figure 4: Fixed/Nomadic Deployment Scenario While Figure 3 illustrates a generic deployment scenario, the following Figure 4 shows in more detail how an existing DSL ISP would integrate thecurrent 3GPP-like IPv6 deployment model.802.16 access network into its existing infrastructure. +-----+ +---+ +-----+ +-----+ ISP 1 |MS1 |<-------------+SS1 |<-(16)+ | | +-->|BRAS |----| ER1 |===>Network +-----+ | | b| | +-----+ +-----+v+-----++-------+ +--------+|MS2 |<---------->|BS/AR1 |---------| Edge+-----+ |E r| | | SS2 |<-(16)+-----| BS1 |-----|t i| | +-----+ +-----+ |h d|--+ | g| | +-----+ +-----+ ISP 2 +-----+ +-----++-------+|Router +==>Network +--------+e| +-->|BRAS |----| ER2 |===>Network | SS3 |<-(16)------| BS2 |-----| | | +-----+ +-----+ +-----++-------++-----+ +---+ | |Ms3 |<---------->|BS/AR2 |-----------++-----++-------+ <---> IP termination+-----+ | | TE |<-(DSL)-----|DSLAM|------------+ +-----+ +-----+ Figure 5:Scenario D 2.2.4.1.Integration of 802.16 access into DSL infrastructure In this approach the 802.16 BS is acting as a DSLAM (Digital Subscriber Line Access Multiplexer). On the network side, the BS is connected to an Ethernet bridge which can be separate equipment or integrated into BRAS (Broadband Remote Access Server). 2.2.2.1. IPv6 Related Infrastructure Changes IPv6 will be deployed in this scenario by upgrading the following devices to dual-stack: MS,BS/ARBS, AR andEdge Router. 2.2.4.2. AddressingER. In thiscase,scenario, IEEE 802.16 BSs have only MAC and PHY layers without router function and operates as a bridge. The BS does not need to support IPv6. However, ifstateless auto-configurationIPv4 stack isused, 3GPP-like IPv6 addressing scheme [RFC 3314] can be used. That is, a unique prefix can be allocatedloaded toeach MS. [RFC 3314] recommendsthem for management and configuration purpose, it is expected thata given prefixBS should beassigned to only one primary PDP context so that 3GPP terminals are allowed to generate multipleupgraded by implementing IPv6address using the prefix withoutstack, too. The BRAS in Figure 4 is providing theconcernsfunctionality ofaddress confliction (DAD). 2.2.4.3. IPv6 Control and Data Transport In this scenario, IEEE 802.16 connection and IPv6 termination point arethesame, since aAR. The Ethernet bridge is necessary for protecting the BRAS from 802.16 link layer peculiarities. The Ethernet bridge relays all traffic received through BS to its network side port(s) connected to BRAS. Any traffic received from BRAS isintegrated with a router. In addition, eachrelayed to appropriate BS. Since 802.16 MAC layer has no native support for multicast (and broadcast) in the uplink direction, the Ethernet bridge will emulate Ethernet level multicast (and broadcast) by relaying the multicast frame received from the MScan be on differentto all of its ports. Ethernet bridge may also provide some IPv6link. So, manyspecific functions to increase link efficiency of the 802.16 radio link (see Section 2.2.2.3). 2.2.2.2. Addressing One or more IPv6protocolsprefixes can beoperated without much consideration aboutshared to all theunderlying network implementation. Only IEEE 802.16 link willattached MSs. Prefix delegation can betaken into consideration for IPv6 adoption. For example, DAD operation is not neededrequired sinceeach MS has only a well-known neighbor, a router. The operation and transmission methods are being intensively discussed in other documents [I-D.shin- 16ng-ipv6-transmission].networks can exist behind SS. 2.2.2.3. IPv6 Transport Note that in this scenarioIPv6Ethernet CStypemay be moresuitableappropriate than IPv6 CS to transport IPv6packets rather thanpackets, since the scenario need to support plain Ethernet connectivity end-to-end. However, the IPv6 CS can also be supported. Every MS and the BS has the Ethernet typesince broadcast- like functions are not required. 2.2.4.4. RoutingMAC address. If the MS is using IP CS, then the BS needs to take care of the Ethernet header. Ingeneral,theaccess routerupstream direction, the BS will need to generate an appropriate Ethernet header and prepend it to the IP datagram. In the downstream direction, the BS will use the destination address from the Ethernet header to identify the MS and then it will strip the Ethernet header before relaying the IP datagram over the 802.16 MAC connection. Ethernet bridge may provide implementation of authoritative address cache and Relay DAD. Authoritative address cache isconfigured withadefault routemapping between the IPv6 address and the MAC addresses of all attached MSs. The bridge builds its authoritative address cache by parsing the IPv6 Neighbor Discovery messages used during address configuration (DAD). Relay DAD means thatpointsthe Neighbor Solicitation message used in DAD process will be relayed only to theEdge Router. No routing protocols are needed on these devicesMS whichgenerally have limited resources.already has configured the solicited address as its own address (if such MS exist at all). 2.2.2.4. Routing In this scenario, IPv6 multi-homing considerations exist. For example, if there exist two routers to support MSs, default router must be selected. The Edge Router runs the IGP used in theservice providerSP network such as OSPFv3 [RFC2740] or IS-IS for IPv6. The connected prefixes have to be redistributed. Prefix summarization should be done at the Edge Router.2.3. IPv6 Multicast In order to2.2.2.5. Mobility No mobility functions are supported in fixed access scenario. However, mobility can supportmulticast servicesinIEEE 802.16, Multicast Listener Discovery (MLD) [RFC2710] must be supported betweentheMS and BS/Router. Also,radio coverage without any mobility protocol like WLAN technology. Therefore, a user can access Internet nomadically in theinter-working with IP multicast protocols andcoverage. 2.3. IPv6 Multicastand Broadcast Service (MBS) should be considered. WithinIn IEEE 802.16networks, an MS connects to its BS/router via point-to-point links. MLD allows an MS to send link-localair link, downlink connections can be shared among multiple MSs, enabling multicastdestination queries and reports. The packets are transmitted as normal IEEE 802.16 MAC frames, aschannels with multiple MSs receiving the sameas regular unicast packets. Especially, multicast CIDs caninformation from the BS. MBS may be used totransmitefficientlyquery packets on the downlink. There are exactly two IP devices connected to the point-to-point link, and no attemptimplement multicast. However, it ismade (at the link-layer) to suppress the forwarding of multicast traffic. Consequently, sending MLD reports for link-local addresses in IEEE 802.16 network maynotalways be necessary. MLD is needed for multicast group knowledge thatclear how to do this, as currently CID isnot link-local. MBS defines Multicast and Broadcast Services,assigned by BS, butactually, MBS seems to be a broadcast service, not multicasting. MBS adheres to broadcast services, while traditional IP multicast schemes define multicast routing using a shared tree or source-specific tree to deliver packets efficiently. In IEEE 802.16 networks, two types of access toin MBSmayit should besupported: single-BS accessdone at an AR andmulti-BS access. Therefore, these two types of services may be roughly mapped into Source-Specific Multicast.it's network scope. For MBS how this mapping will happen is not clear, so MBS discussions have been postponed in WiMax for now. Note that it should be intensively researched later, since MBS will be one of the killer services in IEEE 802.16 networks.2.4. IPv6 Mobility As for mobility management, the movement between BSs is handled by Mobile IPv6 [RFC3775], if it requires a subnet change. Also, in certain cases (e.g., fast handover [I-D.ietf-mipshop-fast-mipv6]) the link mobility information must be available for facilitating layer 3 handoff procedure. Mobile IPv6 defines that movement detection uses Neighbor Unreachability DetectionIn order todetect when the default router is no longer bi-directionally reachable,support multicast services inwhich case the mobile nodeIEEE 802.16, Multicast Listener Discovery (MLD) [RFC2710] mustdiscover a new default router. Periodic Router Advertisements for reachability and movement detection maybeunnecessary because IEEE 802.16 MAC providessupported between thereachability by its Ranging procedureMS andthe movement detection by the Handoff procedure, if a BS is integrated with aAR.In addition, IEEE 802.16e has facilities in determining whetherAlso, thechange of MS'sinter-working with IPaddress is required during the handoff. Therefore, Mobile IPv6 can get a hint from such low-layer facilities,multicast protocols andconduct its Layer 3 mobility protocol only when it is needed. Though a handoff has occurred, an additional router discovery procedure is not required in case of intra-subnet handoff. Also, faster handoff mayMulticast and Broadcast Service (MBS) should beoccurred by the L2 trigger in case of inter-subnet handoff. Mobile IPv6 Fast Handover assumes the support from link-layer technology,considered. MBS defines Multicast and Broadcast Services, butthe particular link-layer information being available, as well as the timing of its availability (before, during or afteractually, MBS seems to be a broadcast service, not multicasting. MBS adheres to broadcast services, while traditional IP multicast schemes define multicast routing using ahandover has occurred), differs accordingshared tree or source-specific tree tothe particular link-layer technology in use. IEEE 802.16g which is under-developed defines L2 triggers fordeliver packets efficiently. In IEEE 802.16link status such as link-up, link-down, handoff-start. These L2 triggersnetworks, two types of access to MBS maymake Mobile IPv6 procedure more efficientbe supported: single-BS access andfaster. This issue is also being discussed in [I-D.ietf-mipshop-fh80216e]. 2.5.multi-BS access. Therefore, these two types of services may be roughly mapped into Source-Specific Multicast. 2.4. IPv6 QoS In IEEE 802.16 networks, a connection is unidirectional and has a QoS specification. The QoS has different semantics with IP QoS (e.g., diffserv). Mapping CID to Service Flow IDentifier (SFID) defines QoS parameters of the service flow associated with that connection. In order to interwork with IP QoS, IP QoS (e.g., diffserv, or flow label for IPv6) mapping to IEEE 802.16 link specifics should be provided.2.6.2.5. IPv6 Security When initiating the connection, an MS is authenticated by the AAA server located at its service provider network. All the parameters related to authentication (username, password and etc.) are forwarded by the BS to the AAA server. The AAA server authenticatesMSs. Ifthe MSs and once authenticated. When an MS is once authenticated and associated successfully with BS,anIPv6 address will be acquired by theMS.MS with stateless autoconfiguration or DHCPv6. Note the initiation and authentication process is the same as used in IPv4. IPsec is a fundamental part of IPv6. Unlike IPv4, IPsec for IPv6 may be used within the global end-to-end architecture. But, we don't have PKIs across organizations and IPsec isn't integrated with IEEE 802.16 network mobility management. IEEE 802.16 network threats may be different from IPv6 and IPv6 transition threat models [I-D.ietf-v6ops-security-overview]. It should be also discussed.2.7.2.6. IPv6 Network Management For IPv6 network management, the necessary instrumentation (such as MIBs, NetFlow Records, etc) should be available. Upon entering the network, an MS is assigned three management connections in each direction. These three connections reflect the three different QoS requirements used by different management levels. The first of these is the basic connection, which is used for the transfer of short, time-critical MAC managementmessagemessages and radio link control (RLC) messages. The primary management connection is used to transfer longer, more delay-tolerant messages such as those used for authentication and connection setup. The secondary management connection is used for the transfer of standards-based management messages such as Dynamic Host Configuration Protocol (DHCP), Trivial File Transfer Protocol (TFTP), and Simple Network Management Protocol (SNMP). IPv6 based IEEE 802.16 network can be managed by IPv4 or IPv6 when network elements are implemented dual stak. For example, network management system (NMS) can send SNMP message by IPv4 with IPv6 related object identifier. Also, an NMS can use IPv6 for SNMP request and response including IPv4 related OID. 3. IANA Considerations This document requests no action by IANA. 4. Security Considerations Please refer tosec 2.6Section 2.5 "IPv6 Security" technology sections for details. 5. Acknowledgements This work extends v6ops works on [I-D.ietf-v6ops-bb-deployment- scenarios]. We thank all the authors of the document. Special thanks are due to Maximilian Riegel, Jonne Soininen, Brian E Carpenter, Jim Bound, and Jung-Mo Moon for extensive review of this document. 6. References 6.1. Normative References[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997. [RFC3775] Johnson, D., Perkins, C., and J. Arkko, "Mobility Support in IPv6", RFC 3775, June 2004.[RFC2461] Narten, T., Nordmark, E., and W. Simpson, "Neighbor Discovery for IP Version 6 (IPv6)", RFC 2461, December 1998.[RFC2460] Deering, S. and R. Hinden, "Internet Protocol, Version 6 (IPv6) Specification", RFC 2460, December 1998.[RFC2462] Thomson, S. and T. Narten, "IPv6 Stateless Address Autoconfiguration", RFC 2462, December 1998. [RFC2710] Deering, S., Fenner, W., and B. Haberman, "Multicast Listener Discovery (MLD) for IPv6", RFC 2710, October 1999. [RFC2740] Coltun, R., Ferguson, D., and J. Moy, "OSPF for IPv6", RFC 2740, December 1999. 6.2. Informative References[RFC3316] Arkko, J., Kuijpers, G., Soliman, H., Loughney, J., and J. Wiljakka, "Internet Protocol Version 6 (IPv6)[RFC3314] Wasserman, M., "Recommendations forSome Second andIPv6 in Third GenerationCellular Hosts",Partnership Project (3GPP) Standards", RFC3316, April 2003. [I-D.ietf-mipshop-fast-mipv6] Koodli, R., "Fast Handovers for Mobile3314, September 2002. [RFC3775] Johnson, D., Perkins, C., and J. Arkko, "Mobility Support in IPv6",draft-ietf-mipshop-fast-mipv6-03RFC 3775, June 2004. [I-D.jee-16ng-problem-statement] Jee, J., "16ng Problem Statement", draft-jee-16ng-problem-statement-02 (work in progress), October2004. [I-D.madanapalli-nd-over-802.16-problems]2005. [I-D.madanapalli-16ng-subnet-model-analysis] Madanapalli, S.,"IPv6 Neighbor Discovery over 802.16: Problems and Goals", draft-madanapalli-nd-over-802.16-problems-00"Analysis of IPv6 Link Models for 802.16 based Networks", draft-madanapalli-16ng-subnet-model-analysis-01 (work in progress), September 2006. [I-D.ietf-mipshop-fmipv6-rfc4068bis] Koodli, R., "Fast Handovers for Mobile IPv6", draft-ietf-mipshop-fmipv6-rfc4068bis-00 (work in progress),December 2005. [I-D.mandin-ip-over-80216-ethcs] Mandin, J., "Transport of IPMay 2006. [I-D.ietf-mipshop-fh80216e] Jang, H., "Mobile IPv6 Fast Handovers over802.16", draft-mandin-ip-over-80216-ethcs-00IEEE 802.16e Networks", draft-ietf-mipshop-fh80216e-00 (work in progress),October 2005.April 2006. [I-D.ietf-v6ops-security-overview] Davies, E., "IPv6 Transition/Co-existence Security Considerations",draft-ietf-v6ops-security-overview-04draft-ietf-v6ops-security-overview-05 (work in progress),MarchSeptember 2006. [I-D.ietf-v6ops-bb-deployment-scenarios] Asadullah, S., "ISP IPv6 Deployment Scenarios in Broadband Access Networks",draft-ietf-v6ops-bb-deployment-scenarios-04draft-ietf-v6ops-bb-deployment-scenarios-05 (work in progress),October 2005. [I-D.shin-16ng-ipv6-transmission] Shin, M. and H. Jang, "Transmission of IPv6 Packets over IEEE 802.16", draft-shin-16ng-ipv6-transmission-00June 2006. [I-D.iab-link-encaps] Aboba, B., "Multiple Encapsulation Methods Considered Harmful", draft-iab-link-encaps-02 (work in progress),FebruaryAugust 2006. [IEEE802.16] "IEEE 802.16-2004, IEEE standard for Local and metropolitan area networks, Part 16: Air Interface for fixed broadband wireless access systems", October 2004. [IEEE802.16e] "IEEE Std. for Local and metropolitan area networks Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems Amendment 2: Physical and Medium Access Control Layers for Combined Fixed and Mobile Operation in Licensed Bands and Corrigendum 1", February 2006. Authors' Addresses Myung-Ki Shin ETRI 161 Gajeong-dong Yuseng-gu Daejeon, 305-350 Korea Phone: +82 42 860 4847 Email: myungki.shin@gmail.com Youn-Hee Han KUT Gajeon-Ri 307 Byeongcheon-Myeon Cheonan-Si Chungnam Province, 330-708 Korea Email: yhhan@kut.ac.kr Sang-Eon Kim KT 17 Woomyeon-dong, Seocho-gu Seoul, 137-791 Korea Email: sekim@kt.co.kr Domagoj Premec Siemens Mobile Heinzelova 70a 10010 Zagreb Croatia Email: domagoj.premec@siemens.com Full Copyright Statement Copyright (C) The Internet Society (2006). This document is subject to the rights, licenses and restrictions contained in BCP 78, and except as set forth therein, the authors retain all their rights. This document and the information contained herein are provided on an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Intellectual PropertyStatementThe IETF takes no position regarding the validity or scope of any Intellectual Property Rights or other rights that might be claimed to pertain to the implementation or use of the technology described in this document or the extent to which any license under such rights might or might not be available; nor does it represent that it has made any independent effort to identify any such rights. Information on the procedures with respect to rights in RFC documents can be found in BCP 78 and BCP 79. Copies of IPR disclosures made to the IETF Secretariat and any assurances of licenses to be made available, or the result of an attempt made to obtain a general license or permission for the use of such proprietary rights by implementers or users of this specification can be obtained from the IETF on-line IPR repository at http://www.ietf.org/ipr. The IETF invites any interested party to bring to its attention any copyrights, patents or patent applications, or other proprietary rights that may cover technology that may be required to implement this standard. Please address the information to the IETF at ietf-ipr@ietf.org.Disclaimer of Validity This document and the information contained herein are provided on an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Copyright Statement Copyright (C) The Internet Society (2006). This document is subject to the rights, licenses and restrictions contained in BCP 78, and except as set forth therein, the authors retain all their rights.Acknowledgment Funding for the RFC Editor function iscurrentlyprovided by theInternet Society.IETF Administrative Support Activity (IASA).