1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
1086
1087
1088
1089
1090
1091
1092
1093
1094
1095
1096
1097
1098
1099
1100
1101
1102
1103
1104
1105
1106
1107
1108
1109
1110
1111
1112
1113
1114
1115
1116
1117
1118
1119
1120
1121
1122
1123
1124
1125
1126
1127
1128
1129
1130
1131
1132
1133
1134
1135
1136
1137
1138
1139
1140
1141
1142
1143
1144
1145
1146
1147
1148
1149
1150
1151
1152
1153
1154
1155
1156
1157
1158
1159
1160
1161
1162
1163
1164
1165
1166
1167
1168
1169
1170
1171
1172
1173
1174
1175
1176
1177
1178
1179
1180
1181
1182
1183
1184
1185
1186
1187
1188
1189
1190
1191
1192
1193
1194
1195
1196
1197
1198
1199
1200
1201
1202
1203
1204
1205
1206
1207
1208
1209
1210
1211
1212
1213
1214
1215
1216
1217
1218
1219
1220
1221
1222
1223
1224
1225
1226
1227
1228
1229
1230
1231
1232
1233
1234
1235
1236
1237
1238
1239
1240
|
Internet Engineering Task Force (IETF) C. Perkins
Request for Comments: 9119 Lupin Lodge
Category: Informational M. McBride
ISSN: 2070-1721 Futurewei
D. Stanley
HPE
W. Kumari
Google
JC. Zúñiga
SIGFOX
October 2021
Multicast Considerations over IEEE 802 Wireless Media
Abstract
Well-known issues with multicast have prevented the deployment of
multicast in 802.11 (Wi-Fi) and other local-area wireless
environments. This document describes the known limitations of
wireless (primarily 802.11) Layer 2 multicast. Also described are
certain multicast enhancement features that have been specified by
the IETF and by IEEE 802 for wireless media, as well as some
operational choices that can be made to improve the performance of
the network. Finally, some recommendations are provided about the
usage and combination of these features and operational choices.
Status of This Memo
This document is not an Internet Standards Track specification; it is
published for informational purposes.
This document is a product of the Internet Engineering Task Force
(IETF). It represents the consensus of the IETF community. It has
received public review and has been approved for publication by the
Internet Engineering Steering Group (IESG). Not all documents
approved by the IESG are candidates for any level of Internet
Standard; see Section 2 of RFC 7841.
Information about the current status of this document, any errata,
and how to provide feedback on it may be obtained at
https://www.rfc-editor.org/info/rfc9119.
Copyright Notice
Copyright (c) 2021 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1. Introduction
2. Terminology
3. Identified Multicast Issues
3.1. Issues at Layer 2 and Below
3.1.1. Multicast Reliability
3.1.2. Lower and Variable Data Rate
3.1.3. Capacity and Impact on Interference
3.1.4. Power-Save Effects on Multicast
3.2. Issues at Layer 3 and Above
3.2.1. IPv4 Issues
3.2.2. IPv6 Issues
3.2.3. MLD Issues
3.2.4. Spurious Neighbor Discovery
4. Multicast Protocol Optimizations
4.1. Proxy ARP in 802.11-2012
4.2. IPv6 Address Registration and Proxy Neighbor Discovery
4.3. Buffering to Improve Battery Life
4.4. Limiting Multicast Buffer Hardware Queue Depth
4.5. IPv6 Support in 802.11-2012
4.6. Using Unicast Instead of Multicast
4.6.1. Overview
4.6.2. Layer 2 Conversion to Unicast
4.6.3. Directed Multicast Service (DMS)
4.6.4. Automatic Multicast Tunneling (AMT)
4.7. GroupCast with Retries (GCR)
5. Operational Optimizations
5.1. Mitigating Problems from Spurious Neighbor Discovery
5.2. Mitigating Spurious Service Discovery Messages
6. Multicast Considerations for Other Wireless Media
7. Recommendations
8. Ongoing Discussion Items
9. Security Considerations
10. IANA Considerations
11. Informative References
Acknowledgements
Authors' Addresses
1. Introduction
Well-known issues with multicast have prevented the deployment of
multicast in 802.11 [dot11] and other local-area wireless
environments, as described in [mc-props] and [mc-prob-stmt].
Performance issues have been observed when multicast packet
transmissions of IETF protocols are used over IEEE 802 wireless
media. Even though enhancements for multicast transmissions have
been designed at both IETF and IEEE 802, incompatibilities still
exist between specifications, implementations, and configuration
choices.
Many IETF protocols depend on multicast/broadcast for delivery of
control messages to multiple receivers. Multicast allows data to be
sent to multiple interested recipients without the source needing to
send duplicate data to each recipient. With broadcast traffic, data
is sent to every device regardless of their expressed interest in the
data. Multicast is used for various purposes such as Neighbor
Discovery, network flooding, and address resolution, as well as
minimizing media occupancy for the transmission of data that is
intended for multiple receivers. In addition to protocol use of
broadcast/multicast for control messages, more applications, such as
Push To Talk in hospitals or video in enterprises, universities, and
homes, are sending multicast IP to end-user devices, which are
increasingly using Wi-Fi for their connectivity.
IETF protocols typically rely on network protocol layering in order
to reduce or eliminate any dependence of higher-level protocols on
the specific nature of the MAC-layer protocols or the physical media.
In the case of multicast transmissions, higher-level protocols have
traditionally been designed as if transmitting a packet to an IP
address had the same cost in interference and network media access,
regardless of whether the destination IP address is a unicast address
or a multicast or broadcast address. This model was reasonable for
networks where the physical medium was wired, like Ethernet.
Unfortunately, for many wireless media, the costs to access the
medium can be quite different. Multicast over Wi-Fi has often been
plagued by such poor performance that it is disallowed. Some
enhancements have been designed in IETF protocols that are assumed to
work primarily over wireless media. However, these enhancements are
usually implemented in limited deployments and are not widespread on
most wireless networks.
IEEE 802 wireless protocols have been designed with certain features
to support multicast traffic. For instance, lower modulations are
used to transmit multicast frames so that these can be received by
all stations in the cell, regardless of the distance or path
attenuation from the base station or Access Point (AP). However,
these lower modulation transmissions occupy the medium longer; they
hamper efficient transmission of traffic using higher-order
modulations to nearby stations. For these and other reasons, IEEE
802 Working Groups such as 802.11 have designed features to improve
the performance of multicast transmissions at Layer 2 [ietf_802-11].
In addition to protocol design features, certain operational and
configuration enhancements can ameliorate the network performance
issues created by multicast traffic, as described in Section 5.
There seems to be general agreement that these problems will not be
fixed anytime soon, primarily because it's expensive to do so and
because of the unreliability of multicast. Compared to unicast over
Wi-Fi, multicast is often treated as somewhat of a second-class
citizen even though there are many protocols using multicast.
Something needs to be provided in order to make them more reliable.
IPv6 Neighbor Discovery saturating the Wi-Fi link is only part of the
problem. Wi-Fi traffic classes may help. This document is intended
to help make the determination about what problems should be solved
by the IETF and what problems should be solved by the IEEE (see
Section 8).
This document details various problems caused by multicast
transmission over wireless networks, including high packet error
rates, no acknowledgements, and low data rate. It also explains some
enhancements that have been designed at the IETF and IEEE 802.11 to
ameliorate the effects of the radio medium on multicast traffic.
Recommendations are also provided to implementors about how to use
and combine these enhancements. Some advice about the operational
choices that can be made is also included. It is likely that this
document will also be considered relevant to designers of future IEEE
wireless specifications.
2. Terminology
This document uses the following definitions:
ACK
The 802.11 Layer 2 acknowledgement.
AES-CCMP
AES-Counter Mode CBC-MAC Protocol
AP
IEEE 802.11 Access Point.
Basic rate
The slowest rate of all the connected devices at which multicast
and broadcast traffic is generally transmitted.
DVB-H
Digital Video Broadcasting - Handheld
DVB-IPDC
Digital Video Broadcasting - Internet Protocol Datacasting
DTIM
Delivery Traffic Indication Map; an information element that
advertises whether or not any associated stations have buffered
multicast or broadcast frames.
MCS
Modulation and Coding Scheme.
NOC
Network Operations Center.
PER
Packet Error Rate.
STA
802.11 station (e.g., handheld device).
TIM
Traffic Indication Map; an information element that advertises
whether or not any associated stations have buffered unicast
frames.
TKIP
Temporal Key Integrity Protocol
WiMAX
Worldwide Interoperability for Microwave Access
WPA
Wi-Fi Protected Access
3. Identified Multicast Issues
3.1. Issues at Layer 2 and Below
In this section, some of the issues related to the use of multicast
transmissions over IEEE 802 wireless technologies are described.
3.1.1. Multicast Reliability
Multicast traffic is typically much less reliable than unicast
traffic. Since multicast makes point-to-multipoint communications,
multiple acknowledgements would be needed to guarantee reception at
all recipients. However, since there are no ACKs for multicast
packets, it is not possible for the AP to know whether or not a
retransmission is needed. Even in the wired Internet, this
characteristic often causes undesirably high error rates. This has
contributed to the relatively slow uptake of multicast applications
even though the protocols have long been available. The situation
for wireless links is much worse and is quite sensitive to the
presence of background traffic. Consequently, there can be a high
packet error rate (PER) due to lack of retransmission and because the
sender never backs off. PER is the ratio, in percent, of the number
of packets not successfully received by the device. It is not
uncommon for there to be a packet loss rate of 5% or more, which is
particularly troublesome for video and other environments where high
data rates and high reliability are required.
3.1.2. Lower and Variable Data Rate
Multicast over wired differs from multicast over wireless because
transmission over wired links often occurs at a fixed rate. Wi-Fi,
on the other hand, has a transmission rate that varies depending upon
the STA's proximity to the AP. The throughput of video flows and the
capacity of the broader Wi-Fi network will change with device
movement. This impacts the ability for QoS solutions to effectively
reserve bandwidth and provide admission control.
For wireless stations authenticated and linked with an AP, the power
necessary for good reception can vary from station to station. For
unicast, the goal is to minimize power requirements while maximizing
the data rate to the destination. For multicast, the goal is simply
to maximize the number of receivers that will correctly receive the
multicast packet; generally, the AP has to use a much lower data rate
at a power level high enough for even the farthest station to receive
the packet, for example, as briefly mentioned in Section 4 of
[RFC5757]. Consequently, the data rate of a video stream, for
instance, would be constrained by the environmental considerations of
the least-reliable receiver associated with the AP.
Because more robust modulation and coding schemes (MCSs) have a
longer range but also a lower data rate, multicast/broadcast traffic
is generally transmitted at the slowest rate of all the connected
devices. This is also known as the basic rate. The amount of
additional interference depends on the specific wireless technology.
In fact, backward compatibility and multi-stream implementations mean
that the maximum unicast rates are currently up to a few Gbps, so
there can be more than 3 orders of magnitude difference in the
transmission rate between multicast/broadcast versus optimal unicast
forwarding. Some techniques employed to increase spectral
efficiency, such as spatial multiplexing in Multiple Input Multiple
Output (MIMO) systems, are not available with more than one intended
receiver; it is not the case that backwards compatibility is the only
factor responsible for lower multicast transmission rates.
Wired multicast also affects wireless LANs when the AP extends the
wired segment; in that case, multicast/broadcast frames on the wired
LAN side are copied to the Wireless Local Area Network (WLAN). Since
broadcast messages are transmitted at the most robust MCS, many large
frames are sent at a slow rate over the air.
3.1.3. Capacity and Impact on Interference
Transmissions at a lower rate require longer occupancy of the
wireless medium and thus take away from the airtime of other
communications and degrade the overall capacity. Furthermore,
transmission at higher power, as is required to reach all multicast
STAs associated with the AP, proportionately increases the area of
interference with other consumers of the radio spectrum.
3.1.4. Power-Save Effects on Multicast
One of the characteristics of multicast transmission over Wi-Fi is
that every station has to be configured to wake up to receive the
multicast frame, even though the received packet may ultimately be
discarded. This process can have a large effect on the power
consumption by the multicast receiver station. For this reason,
there are workarounds, such as Directed Multicast Service (DMS)
described in Section 4, to prevent unnecessarily waking up stations.
Multicast (and unicast) can work poorly with the power-save
mechanisms defined in IEEE 802.11e for the following reasons.
* Clients may be unable to stay in sleep mode due to multicast
control packets frequently waking them up.
* A unicast packet is delayed until an STA wakes up and requests it.
Unicast traffic may also be delayed to improve power save and
efficiency and to increase the probability of aggregation.
* Multicast traffic is delayed in a wireless network if any of the
STAs in that network are power savers. All STAs associated with
the AP have to be awake at a known time to receive multicast
traffic.
* Packets can also be discarded due to buffer limitations in the AP
and non-AP STA.
3.2. Issues at Layer 3 and Above
This section identifies some representative IETF protocols and
describes possible negative effects due to performance degradation
when using multicast transmissions for control messages. Common uses
of multicast include:
* Control plane signaling
* Neighbor Discovery
* Address resolution
* Service Discovery
* Applications (video delivery, stock data, etc.)
* On-demand routing
* Backbone construction
* Other Layer 3 protocols (non-IP)
User Datagram Protocol (UDP) is the most common transport-layer
protocol for multicast applications. By itself, UDP is not reliable
-- messages may be lost or delivered out of order.
3.2.1. IPv4 Issues
The following list contains some representative discovery protocols
that utilize broadcast/multicast and are used with IPv4.
* ARP [RFC0826]
* DHCP [RFC2131]
* Multicast DNS (mDNS) [RFC6762]
* Universal Plug and Play (uPnP) [RFC6970]
After initial configuration, ARP (described in more detail later),
DHCP, and uPnP occur much less commonly, but service discovery can
occur at any time. Some widely deployed service discovery protocols
(e.g., for finding a printer) utilize mDNS (i.e., multicast), which
is often dropped by operators. Even if multicast snooping [RFC4541]
(which provides the benefit of conserving bandwidth on those segments
of the network where no node has expressed interest in receiving
packets addressed to the group address) is utilized, many devices can
register at once and cause serious network degradation.
3.2.2. IPv6 Issues
IPv6 makes extensive use of multicast, including the following:
* DHCPv6 [RFC8415]
* Protocol Independent Multicast (PIM) [RFC7761]
* IPv6 Neighbor Discovery Protocol (NDP) [RFC4861]
* Multicast DNS (mDNS) [RFC6762]
* Router Discovery [RFC4286]
IPv6 NDP Neighbor Solicitation (NS) messages used in Duplicate
Address Detection (DAD) and address lookup make use of link-scope
multicast. In contrast to IPv4, an IPv6 node will typically use
multiple addresses and may change them often for privacy reasons.
This intensifies the impact of multicast messages that are associated
with the mobility of a node. Router advertisement (RA) messages are
also periodically multicast over the link.
Neighbors may be considered lost if several consecutive Neighbor
Discovery packets fail.
3.2.3. MLD Issues
Multicast Listener Discovery (MLD) [RFC4541] is used to identify
members of a multicast group that are connected to the ports of a
switch. Forwarding multicast frames into a Wi-Fi-enabled area can
use switch support for hardware forwarding state information.
However, since IPv6 makes heavy use of multicast, each STA with an
IPv6 address will require state on the switch for several and
possibly many solicited-node multicast addresses. A solicited-node
multicast address is an IPv6 multicast address used by NDP to verify
whether an IPv6 address is already used by the local link. Multicast
addresses that do not have forwarding state installed (perhaps due to
hardware memory limitations on the switch) cause frames to be flooded
on all ports of the switch. Some switch vendors do not support MLD
for link-scope multicast due to the increase it can cause in state.
3.2.4. Spurious Neighbor Discovery
On the Internet, there is a "background radiation" of scanning
traffic (people scanning for vulnerable machines) and backscatter
(responses from spoofed traffic, etc.). This means that routers very
often receive packets destined for IPv4 addresses regardless of
whether those IP addresses are in use. In the cases where the IP is
assigned to a host, the router broadcasts an ARP request, receives an
ARP reply, and caches it; then, traffic can be delivered to the host.
When the IP address is not in use, the router broadcasts one (or
more) ARP requests and never gets a reply. This means that it does
not populate the ARP cache, and the next time there is traffic for
that IP address, the router will rebroadcast the ARP requests.
The rate of these ARP requests is proportional to the size of the
subnets, the rate of scanning and backscatter, and how long the
router keeps state on non-responding ARPs. As it turns out, this
rate is inversely proportional to how occupied the subnet is (valid
ARPs end up in a cache, stopping the broadcasting; unused IPs never
respond, and so cause more broadcasts). Depending on the address
space in use, the time of day, how occupied the subnet is, and other
unknown factors, thousands of broadcasts per second have been
observed. Around 2,000 broadcasts per second have been observed at
the IETF NOC during face-to-face meetings.
With Neighbor Discovery for IPv6 [RFC4861], nodes accomplish address
resolution by multicasting a Neighbor Solicitation that asks the
target node to return its link-layer address. Neighbor Solicitation
messages are multicast to the solicited-node multicast address of the
target address. The target returns its link-layer address in a
unicast Neighbor Advertisement message. A single request-response
pair of packets is sufficient for both the initiator and the target
to resolve each other's link-layer addresses; the initiator includes
its link-layer address in the Neighbor Solicitation.
On a wired network, there is not a huge difference between unicast,
multicast, and broadcast traffic. Due to hardware filtering (see,
e.g., [Deri-2010]), inadvertently flooded traffic (or excessive
Ethernet multicast) on wired networks can be quite a bit less costly
compared to wireless cases where sleeping devices have to wake up to
process packets. Wired Ethernets tend to be switched networks,
further reducing interference from multicast. There is effectively
no collision / scheduling problem except at extremely high port
utilizations.
This is not true in the wireless realm; wireless equipment is often
unable to send high volumes of broadcast and multicast traffic,
causing numerous broadcast and multicast packets to be dropped.
Consequently, when a host connects, it is often not able to complete
DHCP, and IPv6 RAs get dropped, leading to users being unable to use
the network.
4. Multicast Protocol Optimizations
This section lists some optimizations that have been specified in
IEEE 802 and IETF that are aimed at reducing or eliminating the
issues discussed in Section 3.
4.1. Proxy ARP in 802.11-2012
The AP knows the Medium Access Control (MAC) address and IP address
for all associated STAs. In this way, the AP acts as the central
"manager" for all the 802.11 STAs in its Basic Service Set (BSS).
Proxy ARP is easy to implement at the AP and offers the following
advantages:
* Reduced broadcast traffic (transmitted at low MCS) on the wireless
medium.
* STA benefits from extended power save in sleep mode, as ARP
requests for STA's IP address are handled instead by the AP.
* ARP frames are kept off the wireless medium.
* No changes are needed to STA implementation.
Here is the specification language as described in clause 10.23.13 of
[dot11-proxyarp]:
| When the AP supports Proxy ARP "[...] the AP shall maintain a
| Hardware Address to Internet Address mapping for each associated
| station, and shall update the mapping when the Internet Address of
| the associated station changes. When the IPv4 address being
| resolved in the ARP request packet is used by a non-AP STA
| currently associated to the BSS, the proxy ARP service shall
| respond on behalf of the STA to an ARP request or an ARP Probe.
4.2. IPv6 Address Registration and Proxy Neighbor Discovery
As used in this section, a Low-Power Wireless Personal Area Network
(6LoWPAN) denotes a Low-Power and Lossy Network (LLN) that supports
6LoWPAN Header Compression (HC) [RFC6282]. A 6TiSCH network
[RFC9030] is an example of a 6LoWPAN. In order to control the use of
IPv6 multicast over 6LoWPANs, the 6LoWPAN Neighbor Discovery (6LoWPAN
ND) [RFC6775] standard defines an address registration mechanism that
relies on a central registry to assess address uniqueness as a
substitute to the inefficient DAD mechanism found in the mainstream
IPv6 Neighbor Discovery Protocol (NDP) [RFC4861] [RFC4862].
The 6lo Working Group has specified an update to [RFC6775]. Wireless
devices can register their address to a Backbone Router [RFC8929],
which proxies for the registered addresses with the IPv6 NDP running
on a high-speed aggregating backbone. The update also enables a
proxy registration mechanism on behalf of the Registered Node, e.g.,
by a 6LoWPAN router to which the mobile node is attached.
The general idea behind the Backbone Router concept is that broadcast
and multicast messaging should be tightly controlled in a variety of
WLANs and Wireless Personal Area Networks (WPANs). Connectivity to a
particular link that provides the subnet should be left to Layer 3.
The model for the Backbone Router operation is represented in
Figure 1.
|
+-----+
| | Gateway (default) router
| |
+-----+
|
| Backbone Link
+--------------------+------------------+
| | |
+-----+ +-----+ +-----+
| | Backbone | | Backbone | | Backbone
| | router 1 | | router 2 | | router 3
+-----+ +-----+ +-----+
o o o o o o
o o o o o o o o o o o o o o
o o o o o o o o o o o o o o o
o o o o o o o o o o
o o o o o o o
LLN 1 LLN 2 LLN 3
Figure 1: Backbone Link and Backbone Routers
LLN nodes can move freely from an LLN anchored at one IPv6 Backbone
Router to an LLN anchored at another Backbone Router on the same
backbone, keeping any of the IPv6 addresses they have configured.
The Backbone Routers maintain a Binding Table of their Registered
Nodes, which serves as a distributed database of all the LLN nodes.
An extension to the Neighbor Discovery Protocol is introduced to
exchange Binding Table information across the Backbone Link as needed
for the operation of IPv6 Neighbor Discovery.
[RFC6775] and follow-on work [RFC8505] address the needs of LLNs, and
similar techniques are likely to be valuable on any type of link
where sleeping devices are attached or where the use of broadcast and
multicast operations should be limited.
4.3. Buffering to Improve Battery Life
Methods have been developed to help save battery life; for example, a
device might not wake up when the AP receives a multicast packet.
The AP acts on behalf of STAs in various ways. To enable use of the
power-saving feature for STAs in its BSS, the AP buffers frames for
delivery to the STA at the time when the STA is scheduled for
reception. If an AP, for instance, expresses a Delivery Traffic
Indication Message (DTIM) of 3, then the AP will send a multicast
packet every 3 packets. In fact, when any single wireless STA
associated with an AP has 802.11 power-save mode enabled, the AP
buffers all multicast frames and sends them only after the next DTIM
beacon.
In practice, most APs will send a multicast every 30 packets. For
unicast, the AP could send a Traffic Indication Message (TIM), but,
for multicast, the AP sends a broadcast to everyone. DTIM does power
management, but STAs can choose whether to wake up and whether to
drop the packet. Unfortunately, without proper administrative
control, such STAs may be unable to determine why their multicast
operations do not work.
4.4. Limiting Multicast Buffer Hardware Queue Depth
The Content after Beacon (CAB) queue is used for beacon-triggered
transmission of buffered multicast frames. If lots of multicast
frames were buffered and this queue fills up, it drowns out all
regular traffic. To limit the damage that buffered traffic can do,
some drivers limit the amount of queued multicast data to a fraction
of the beacon_interval. An example of this is [CAB].
4.5. IPv6 Support in 802.11-2012
IPv6 uses NDP instead of ARP. Every IPv6 node subscribes to a
special multicast address for this purpose.
Here is the specification language from clause 10.23.13 of
[dot11-proxyarp]:
| When an IPv6 address is being resolved, the Proxy Neighbor
| Discovery service shall respond with a Neighbor Advertisement
| message [...] on behalf of an associated STA to an [ICMPv6]
| Neighbor Solicitation message [...]. When MAC address mappings
| change, the AP may send unsolicited Neighbor Advertisement
| Messages on behalf of a STA.
NDP may be used to request additional information using the following
methods, among others:
* Maximum Transmission Unit
* Router Solicitation
* Router Advertisement
NDP messages are sent as group-addressed (broadcast) frames in
802.11. Using the proxy operation helps to keep NDP messages off the
wireless medium.
4.6. Using Unicast Instead of Multicast
It is often possible to transmit multicast control and data messages
by using unicast transmissions to each station individually.
4.6.1. Overview
In many situations, it's a good choice to use unicast instead of
multicast over the Wi-Fi link. This avoids most of the problems
specific to multicast over Wi-Fi, since the individual frames are
then acknowledged and buffered for power-save clients in the way that
unicast traffic normally operates.
This approach comes with the trade-off of sometimes sending the same
packet multiple times over the Wi-Fi link. However, in many cases,
such as video into a residential home network, this can be a good
trade-off since the Wi-Fi link may have enough capacity for the
unicast traffic to be transmitted to each subscribed STA, even though
multicast addressing may have been necessary for the upstream access
network.
Several technologies exist that can be used to arrange unicast
transport over the Wi-Fi link, outlined in the subsections below.
4.6.2. Layer 2 Conversion to Unicast
It is often possible to transmit multicast control and data messages
by using unicast transmissions to each station individually.
Although there is not yet a standardized method of conversion, at
least one widely available implementation exists in the Linux
bridging code [bridge-mc-2-uc]. Other proprietary implementations
are available from various vendors. In general, these
implementations perform a straightforward mapping for groups or
channels, discovered by IGMP or MLD snooping, to the corresponding
unicast MAC addresses.
4.6.3. Directed Multicast Service (DMS)
DMS enables an STA to request that the AP transmit multicast group-
addressed frames destined to the requesting STAs as individually
addressed frames (i.e., convert multicast to unicast). Here are some
characteristics of DMS:
* Requires 802.11n Aggregate MAC Service Data Units (A-MSDUs).
* Individually addressed frames are acknowledged and are buffered
for power-save STAs.
* The requesting STA may specify traffic characteristics for DMS
traffic.
* DMS was defined in IEEE Std 802.11v-2011 [v2011].
* DMS requires changes to both AP and STA implementation.
DMS is not currently implemented in products. See [Tramarin2017] and
[Oliva2013] for more information.
4.6.4. Automatic Multicast Tunneling (AMT)
AMT [RFC7450] provides a method to tunnel multicast IP packets inside
unicast IP packets over network links that only support unicast.
When an operating system or application running on an STA has an AMT
gateway capability integrated, it's possible to use unicast to
traverse the Wi-Fi link by deploying an AMT relay in the non-Wi-Fi
portion of the network connected to the AP.
It is recommended that multicast-enabled networks deploying AMT
relays for this purpose make the relays locally discoverable with the
following methods, as described in [RFC8777]:
* DNS-based Service Discovery (DNS-SD) [RFC6763]
* The well-known IP addresses from Section 7 of [RFC7450]
An AMT gateway that implements multiple standard discovery methods is
more likely to discover the local multicast-capable network instead
of forming a connection to a nonlocal AMT relay further upstream.
4.7. GroupCast with Retries (GCR)
GCR (defined in [dot11aa]) provides greater reliability by using
either unsolicited retries or a block acknowledgement mechanism. GCR
increases the probability of broadcast frame reception success but
still does not guarantee success.
For the block acknowledgement mechanism, the AP transmits each group-
addressed frame as a conventional group-addressed transmission.
Retransmissions are group addressed but hidden from non-11aa STAs. A
directed block acknowledgement scheme is used to harvest reception
status from receivers; retransmissions are based upon these
responses.
GCR is suitable for all group sizes including medium to large groups.
As the number of devices in the group increases, GCR can send block
acknowledgement requests to only a small subset of the group. GCR
does require changes to both AP and STA implementations.
GCR may introduce unacceptable latency. After sending a group of
data frames to the group, the AP has to do the following:
* Unicast a Block Ack Request (BAR) to a subset of members.
* Wait for the corresponding Block Ack (BA).
* Retransmit any missed frames.
* Resume other operations that may have been delayed.
This latency may not be acceptable for some traffic.
There are ongoing extensions in 802.11 to improve GCR performance.
* BAR is sent using downlink Multi-User MIMO.
* BA is sent using uplink MU-MIMO (uplink MU-MIMO is an IEEE
801.11ax-2021 feature).
* Latency may also be reduced by simultaneously receiving BA
information from multiple STAs.
5. Operational Optimizations
This section lists some operational optimizations that can be
implemented when deploying wireless IEEE 802 networks to mitigate
some of the issues discussed in Section 3.
5.1. Mitigating Problems from Spurious Neighbor Discovery
ARP Sponges
An ARP Sponge sits on a network and learns which IP addresses
are actually in use. It also listens for ARP requests, and, if
it sees an ARP for an IP address that it believes is not used,
it will reply with its own MAC address. This means that the
router now has an IP-to-MAC mapping, which it caches. If that
IP is later assigned to a machine (e.g., using DHCP), the ARP
Sponge will see this and will stop replying for that address.
Gratuitous ARPs (or the machine ARPing for its gateway) will
replace the sponged address in the router ARP table. This
technique is quite effective; unfortunately, the ARP Sponge
daemons were not really designed for this use (one of the most
widely deployed ARP Sponges [arpsponge] was designed to deal
with the disappearance of participants from an Internet
Exchange Point (IXP)) and so are not optimized for this
purpose. One daemon is needed per subnet; the tuning is tricky
(the scanning rate versus the population rate versus retries,
etc.), and sometimes daemons just stop, requiring a restart of
the daemon that causes disruption.
Router mitigations
Some routers (often those based on Linux) implement a "negative
ARP cache" daemon. If the router does not see a reply to an
ARP, it can be configured to cache this information for some
interval. Unfortunately, the core routers in use often do not
support this. Instead, when a host connects to a network and
gets an IP address, it will ARP for its default gateway (the
router). The router will update its cache with the IP to host
MAC mapping learned from the request (passive ARP learning).
Firewall unused space
The distribution of users on wireless networks / subnets may
change in various use cases, such as conference venues (e.g.,
Service Set Identifiers (SSIDs) are renamed, some SSIDs lose
favor, etc.). This makes utilization for particular SSIDs
difficult to predict ahead of time, but usage can be monitored
as attendees use the different networks. Configuring multiple
DHCP pools per subnet and enabling them sequentially can create
a large subnet from which only addresses in the lower portions
are assigned. Therefore, input IP access lists can be applied,
which deny traffic to the upper, unused portions. Then the
router does not attempt to forward packets to the unused
portions of the subnets and so does not ARP for it. This
method has proven to be very effective but is somewhat of a
blunt axe, is fairly labor intensive, and requires
coordination.
Disabling/Filtering ARP requests
In general, the router does not need to ARP for hosts; when a
host connects, the router can learn the IP-to-MAC mapping from
the ARP request sent by that host. Consequently, it should be
possible to disable and/or filter ARP requests from the router.
Unfortunately, ARP is a very low-level/fundamental part of the
IP stack and is often offloaded from the normal control plane.
While many routers can filter Layer 2 traffic, this is usually
implemented as an input filter and/or has limited ability to
filter output broadcast traffic. This means that the seemingly
simple and obvious solution to "just disable ARP or filter it
outbound" is made difficult or awkward in practice by
implementations and/or architectural issues.
NAT
Broadcasts can often be caused by outside Wi-Fi scanning /
backscatter traffic. In order to reduce the impact of
broadcasts, NAT can be used on the entire (or a large portion)
of a network. This would eliminate NAT translation entries for
unused addresses, and the router would never ARP for them.
There are, however, many reasons to avoid using NAT in such a
blanket fashion.
Stateful firewalls
Another obvious solution would be to put a stateful firewall
between the wireless network and the Internet. This firewall
would block incoming traffic not associated with an outbound
request. But this conflicts with the need and desire of some
organizations to have the network as open as possible and to
honor the end-to-end principle. An attendee on a meeting
network should be an Internet host and should be able to
receive unsolicited requests. Unfortunately, keeping the
network working and stable is the first priority, and a
stateful firewall may be required in order to achieve this.
5.2. Mitigating Spurious Service Discovery Messages
In networks that must support hundreds of STAs, operators have
observed network degradation due to many devices simultaneously
registering with mDNS. In a network with many clients, it is
recommended to ensure that mDNS packets designed to discover services
in smaller home networks be constrained to avoid disrupting other
traffic.
6. Multicast Considerations for Other Wireless Media
Many of the causes of performance degradation described in earlier
sections are also observable for wireless media other than 802.11.
For instance, problems with power save, excess media occupancy, and
poor reliability will also affect 802.15.3 and 802.15.4.
Unfortunately, 802.15 media specifications do not yet include
mechanisms similar to those developed for 802.11. In fact, the
design philosophy for 802.15 is oriented towards minimality, with the
result that many such functions are relegated to operation within
higher-layer protocols. This leads to a patchwork of non-
interoperable and vendor-specific solutions. See [uli] for
additional discussion and a proposal for a task group to resolve
similar issues, in which the multicast problems might be considered
for mitigation.
Similar considerations hold for most other wireless media. A brief
introduction is provided in [RFC5757] for the following:
* 802.16 WiMAX
* 3GPP/3GPP2
* DVB-H/DVB-IPDC
* TV Broadcast and Satellite Networks
7. Recommendations
This section provides some recommendations about the usage and
combinations of some of the multicast enhancements described in
Sections 4 and 5.
Future protocol documents utilizing multicast signaling should be
carefully scrutinized if the protocol is likely to be used over
wireless media.
The use of proxy methods should be encouraged to conserve network
bandwidth and power utilization by low-power devices. The device can
send a unicast message to its proxy, and then the proxy can take care
of any needed multicast operations.
Multicast signaling for wireless devices should be done in a way that
is compatible with low duty-cycle operation.
8. Ongoing Discussion Items
This section suggests two discussion items for further resolution.
First, standards (and private) organizations should develop
guidelines to help clarify when multicast packets would be better
served by being sent wired rather than wireless. For example,
802.1ak [IEEE802.1ak] works on both Ethernet and Wi-Fi, and
organizations could help with deployment decision making by
developing guidelines for multicast over Wi-Fi, including options for
when traffic should be sent wired.
Second, reliable registration to Layer 2 multicast groups and a
reliable multicast operation at Layer 2 might provide a good
multicast over Wi-Fi solution. There shouldn't be a need to support
2^24 groups to get solicited node multicast working: it is possible
to simply select a number of bits that make sense for a given network
size to limit the number of unwanted deliveries to reasonable levels.
The IEEE 802.1, 802.11, and 802.15 Working Groups should be
encouraged to revisit Layer 2 multicast issues and provide workable
solutions.
9. Security Considerations
This document does not introduce or modify any security mechanisms.
Multicast deployed on wired or wireless networks as discussed in this
document can be made more secure in a variety of ways. [RFC4601],
for instance, specifies the use of IPsec to ensure authentication of
the link-local messages in the Protocol Independent Multicast -
Sparse Mode (PIM-SM) routing protocol. [RFC5796] specifies
mechanisms to authenticate the PIM-SM link-local messages using the
IP security (IPsec) Encapsulating Security Payload (ESP) or
(optionally) the Authentication Header (AH).
When using mechanisms that convert multicast traffic to unicast
traffic for traversing radio links, the AP (or other entity) is
forced to explicitly track which subscribers care about certain
multicast traffic. This is generally a reasonable trade-off but does
result in another entity that is tracking what entities subscribe to
which multicast traffic. While such information is already (by
necessity) tracked elsewhere, this does present an expansion of the
attack surface for that potentially privacy-sensitive information.
As noted in [group_key], the unreliable nature of multicast
transmission over wireless media can cause subtle problems with
multicast group key management and updates. [group_key] states that
when TKIP (WPA, now deprecated) or AES-CCMP (WPA2/WPA3) encryption is
in use, AP-to-client (FromDS) multicasts have to be encrypted with a
separate encryption key that is known to all of the clients (this is
called the Group Key). Quoting further from that website, "... most
clients are able to get connected and surf the web, check email, etc.
even when FromDS multicasts are broken. So a lot of people don't
realize they have multicast problems on their network..."
This document encourages the use of proxy methods to conserve network
bandwidth and power utilization by low-power devices. Such proxy
methods in general have security considerations that require the
proxy to be trusted to not misbehave. One such proxy method listed
is an ARP Sponge that listens for ARP requests, and, if it sees an
ARP for an IP address that it believes is not used, it will reply
with its own MAC address. ARP poisoning and false advertising could
potentially undermine (e.g., DoS) this and other proxy approaches.
10. IANA Considerations
This document has no IANA actions.
11. Informative References
[arpsponge]
Wessel, M. and N. Sijm, "Effects of IPv4 and IPv6 address
resolution on AMS-IX and the ARP Sponge", July 2009,
<http://citeseerx.ist.psu.edu/viewdoc/
summary?doi=10.1.1.182.4692>.
[bridge-mc-2-uc]
"bridge: multicast to unicast", commit 6db6f0e, January
2017, <https://github.com/torvalds/linux/commit/6db6f0e>.
[CAB] "limit multicast buffer hardware queue depth", commit
2687951, June 2013,
<https://patchwork.kernel.org/patch/2687951/>.
[Deri-2010]
Deri, L. and J. Gasparakis, "10 Gbit Hardware Packet
Filtering Using Commodity Network Adapters", RIPE 61,
November 2010, <http://ripe61.ripe.net/
presentations/138-Deri_RIPE_61.pdf>.
[dot11] IEEE, "Information Technology--Telecommunications and
Information Exchange between Systems - Local and
Metropolitan Area Networks--Specific Requirements - Part
11: Wireless LAN Medium Access Control (MAC) and Physical
Layer (PHY) Specifications (includes 802.11v amendment)",
DOI 10.1109/IEEESTD.2021.9363693, IEEE Std 802.11-2020,
December 2020,
<https://standards.ieee.org/standard/802_11-2020.html>.
[dot11-proxyarp]
Hiertz, G., Mestanov, F., and B. Hart, "Proxy ARP in
802.11ax", September 2015,
<https://mentor.ieee.org/802.11/dcn/15/11-15-1015-01-00ax-
proxy-arp-in-802-11ax.pptx>.
[dot11aa] IEEE, "Information technology--Telecommunications and
information exchange between systems Local and
metropolitan area networks--Specific requirements Part 11:
Wireless LAN Medium Access Control (MAC) and Physical
Layer (PHY) Specifications Amendment 2: MAC Enhancements
for Robust Audio Video Streaming",
DOI 10.1109/IEEESTD.2012.6204193, IEEE Std 802.11aa-2012,
March 2012,
<https://standards.ieee.org/standard/802_11aa-2012.html>.
[group_key]
"Subject: Why do some WiFi routers block multicast packets
going from wired to wireless?", message to the Super User
Q & A community, January 2017,
<https://superuser.com/questions/730288/why-do-some-wifi-
routers-block-multicast-packets-going-from-wired-to-
wireless>.
[IEEE802.1ak]
IEEE, "Local and Metropolitan Area Networks Virtual
Bridged Local Area Networks - Amendment 07: Multiple
Registration Protocol", DOI 10.1109/IEEESTD.2007.380667,
IEEE Std 802.1ak-2007, June 2007,
<https://www.ieee802.org/1/pages/802.1ak.html>.
[ietf_802-11]
Stanley, D., "IEEE 802.11 multicast capabilities",
November 2015, <https://mentor.ieee.org/802.11/
dcn/15/11-15-1261-03-0arc-multicast-performance-
optimization-features-overview-for-ietf-nov-2015.ppt>.
[mc-prob-stmt]
Abrahamsson, M. and A. Stephens, "Multicast on 802.11",
2013, <https://www.iab.org/wp-content/IAB-uploads/2013/01/
multicast-problem-statement.pptx>.
[mc-props] Stephens, A., "IEEE 802.11 multicast properties",
September 2015, <https://mentor.ieee.org/802.11/
dcn/15/11-15-1161-02-0arc-802-11-multicast-
properties.ppt>.
[Oliva2013]
de la Oliva, A., Serrano, P., Salvador, P., and A. Banchs,
"Performance evaluation of the IEEE 802.11aa multicast
mechanisms for video streaming", 2013 IEEE 14th
International Symposium on "A World of Wireless, Mobile
and Multimedia Networks" (WoWMoM), pp. 1-9,
DOI 10.1109/WoWMoM.2013.6583394, June 2013,
<https://doi.org/10.1109/WoWMoM.2013.6583394>.
[RFC0826] Plummer, D., "An Ethernet Address Resolution Protocol: Or
Converting Network Protocol Addresses to 48.bit Ethernet
Address for Transmission on Ethernet Hardware", STD 37,
RFC 826, DOI 10.17487/RFC0826, November 1982,
<https://www.rfc-editor.org/info/rfc826>.
[RFC2131] Droms, R., "Dynamic Host Configuration Protocol",
RFC 2131, DOI 10.17487/RFC2131, March 1997,
<https://www.rfc-editor.org/info/rfc2131>.
[RFC4286] Haberman, B. and J. Martin, "Multicast Router Discovery",
RFC 4286, DOI 10.17487/RFC4286, December 2005,
<https://www.rfc-editor.org/info/rfc4286>.
[RFC4541] Christensen, M., Kimball, K., and F. Solensky,
"Considerations for Internet Group Management Protocol
(IGMP) and Multicast Listener Discovery (MLD) Snooping
Switches", RFC 4541, DOI 10.17487/RFC4541, May 2006,
<https://www.rfc-editor.org/info/rfc4541>.
[RFC4601] Fenner, B., Handley, M., Holbrook, H., and I. Kouvelas,
"Protocol Independent Multicast - Sparse Mode (PIM-SM):
Protocol Specification (Revised)", RFC 4601,
DOI 10.17487/RFC4601, August 2006,
<https://www.rfc-editor.org/info/rfc4601>.
[RFC4861] Narten, T., Nordmark, E., Simpson, W., and H. Soliman,
"Neighbor Discovery for IP version 6 (IPv6)", RFC 4861,
DOI 10.17487/RFC4861, September 2007,
<https://www.rfc-editor.org/info/rfc4861>.
[RFC4862] Thomson, S., Narten, T., and T. Jinmei, "IPv6 Stateless
Address Autoconfiguration", RFC 4862,
DOI 10.17487/RFC4862, September 2007,
<https://www.rfc-editor.org/info/rfc4862>.
[RFC5757] Schmidt, T., Waehlisch, M., and G. Fairhurst, "Multicast
Mobility in Mobile IP Version 6 (MIPv6): Problem Statement
and Brief Survey", RFC 5757, DOI 10.17487/RFC5757,
February 2010, <https://www.rfc-editor.org/info/rfc5757>.
[RFC5796] Atwood, W., Islam, S., and M. Siami, "Authentication and
Confidentiality in Protocol Independent Multicast Sparse
Mode (PIM-SM) Link-Local Messages", RFC 5796,
DOI 10.17487/RFC5796, March 2010,
<https://www.rfc-editor.org/info/rfc5796>.
[RFC6282] Hui, J., Ed. and P. Thubert, "Compression Format for IPv6
Datagrams over IEEE 802.15.4-Based Networks", RFC 6282,
DOI 10.17487/RFC6282, September 2011,
<https://www.rfc-editor.org/info/rfc6282>.
[RFC6762] Cheshire, S. and M. Krochmal, "Multicast DNS", RFC 6762,
DOI 10.17487/RFC6762, February 2013,
<https://www.rfc-editor.org/info/rfc6762>.
[RFC6763] Cheshire, S. and M. Krochmal, "DNS-Based Service
Discovery", RFC 6763, DOI 10.17487/RFC6763, February 2013,
<https://www.rfc-editor.org/info/rfc6763>.
[RFC6775] Shelby, Z., Ed., Chakrabarti, S., Nordmark, E., and C.
Bormann, "Neighbor Discovery Optimization for IPv6 over
Low-Power Wireless Personal Area Networks (6LoWPANs)",
RFC 6775, DOI 10.17487/RFC6775, November 2012,
<https://www.rfc-editor.org/info/rfc6775>.
[RFC6970] Boucadair, M., Penno, R., and D. Wing, "Universal Plug and
Play (UPnP) Internet Gateway Device - Port Control
Protocol Interworking Function (IGD-PCP IWF)", RFC 6970,
DOI 10.17487/RFC6970, July 2013,
<https://www.rfc-editor.org/info/rfc6970>.
[RFC7450] Bumgardner, G., "Automatic Multicast Tunneling", RFC 7450,
DOI 10.17487/RFC7450, February 2015,
<https://www.rfc-editor.org/info/rfc7450>.
[RFC7761] Fenner, B., Handley, M., Holbrook, H., Kouvelas, I.,
Parekh, R., Zhang, Z., and L. Zheng, "Protocol Independent
Multicast - Sparse Mode (PIM-SM): Protocol Specification
(Revised)", STD 83, RFC 7761, DOI 10.17487/RFC7761, March
2016, <https://www.rfc-editor.org/info/rfc7761>.
[RFC8415] Mrugalski, T., Siodelski, M., Volz, B., Yourtchenko, A.,
Richardson, M., Jiang, S., Lemon, T., and T. Winters,
"Dynamic Host Configuration Protocol for IPv6 (DHCPv6)",
RFC 8415, DOI 10.17487/RFC8415, November 2018,
<https://www.rfc-editor.org/info/rfc8415>.
[RFC8505] Thubert, P., Ed., Nordmark, E., Chakrabarti, S., and C.
Perkins, "Registration Extensions for IPv6 over Low-Power
Wireless Personal Area Network (6LoWPAN) Neighbor
Discovery", RFC 8505, DOI 10.17487/RFC8505, November 2018,
<https://www.rfc-editor.org/info/rfc8505>.
[RFC8777] Holland, J., "DNS Reverse IP Automatic Multicast Tunneling
(AMT) Discovery", RFC 8777, DOI 10.17487/RFC8777, April
2020, <https://www.rfc-editor.org/info/rfc8777>.
[RFC8929] Thubert, P., Ed., Perkins, C.E., and E. Levy-Abegnoli,
"IPv6 Backbone Router", RFC 8929, DOI 10.17487/RFC8929,
November 2020, <https://www.rfc-editor.org/info/rfc8929>.
[RFC9030] Thubert, P., Ed., "An Architecture for IPv6 over the Time-
Slotted Channel Hopping Mode of IEEE 802.15.4 (6TiSCH)",
RFC 9030, DOI 10.17487/RFC9030, May 2021,
<https://www.rfc-editor.org/info/rfc9030>.
[Tramarin2017]
Tramarin, F., Vitturi, S., and M. Luvisotto, "IEEE 802.11n
for Distributed Measurement Systems", 2017 IEEE
International Instrumentation and Measurement Technology
Conference (I2MTC), pp. 1-6, May 2017.
[uli] Kinney, P., "LLC Proposal for 802.15.4", September 2015,
<https://mentor.ieee.org/802.15/dcn/15/15-15-0521-01-wng0-
llc-proposal-for-802-15-4.pptx>.
[v2011] IEEE, "Information technology -- Local and metropolitan
area networks -- Specific requirements -- Part 11:
Wireless LAN Medium Access Control (MAC) and Physical
Layer (PHY) specifications Amendment 8: IEEE 802.11
Wireless Network Management",
DOI 10.1109/IEEESTD.2011.5716530, IEEE Std 802.11v-2011,
February 2011,
<https://ieeexplore.ieee.org/document/5716530>.
Acknowledgements
This document has benefitted from discussions with the following
people, in alphabetical order: Mikael Abrahamsson, Bill Atwood,
Stuart Cheshire, Donald Eastlake 3rd, Toerless Eckert, Jake Holland,
Joel Jaeggli, Jan Komissar, David Lamparter, Morten Pedersen, Pascal
Thubert, and Jeffrey (Zhaohui) Zhang.
Authors' Addresses
Charles E. Perkins
Lupin Lodge
Phone: +1 408 255 9223
Email: charliep@lupinlodge.com
Mike McBride
Futurewei Technologies Inc.
2330 Central Expressway
Santa Clara, CA 95055
United States of America
Email: michael.mcbride@futurewei.com
Dorothy Stanley
Hewlett Packard Enterprise
6280 America Center Dr.
San Jose, CA 95002
United States of America
Phone: +1 630 363 1389
Email: dorothy.stanley@hpe.com
Warren Kumari
Google
1600 Amphitheatre Parkway
Mountain View, CA 94043
United States of America
Email: warren@kumari.net
Juan Carlos Zúñiga
SIGFOX
Montreal
Canada
Email: j.c.zuniga@ieee.org
|