<?xml version='1.0' encoding='utf-8'?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" version="3" category="std" consensus="true" docName="draft-ietf-ipwave-ipv6-over-80211ocb-52" indexInclude="true" ipr="trust200902" number="8691" prepTime="2019-12-27T10:13:11" scripts="Common,Latin" sortRefs="true" submissionType="IETF" symRefs="true" tocDepth="3" tocInclude="true" xml:lang="en">
  <link href="https://datatracker.ietf.org/doc/draft-ietf-ipwave-ipv6-over-80211ocb-52" rel="prev"/>
  <link href="https://dx.doi.org/10.17487/rfc8691" rel="alternate"/>
  <link href="urn:issn:2070-1721" rel="alternate"/>
  <front>
    <title abbrev="IPv6 over 802.11-OCB">Basic Support for IPv6 Networks Operating Outside the Context of a Basic Service Set over IEEE Std 802.11</title>
    <seriesInfo name="RFC" value="8691" stream="IETF"/>
    <author initials="N." surname="Benamar" fullname="Nabil Benamar">
      <organization showOnFrontPage="true">Moulay Ismail University of Meknes</organization>
      <address>
        <postal>
          <street></street>
          <city>
          </city>
          <region></region>
          <code></code>
          <country>Morocco</country>
        </postal>
        <phone>+212670832236</phone>
        <email>n.benamar@est.umi.ac.ma</email>
      </address>
    </author>
    <author initials="J." surname="Härri" fullname="Jérôme Härri">
      <organization showOnFrontPage="true">EURECOM</organization>
      <address>
        <postal>
          <street></street>
          <city>Sophia-Antipolis</city>
          <region></region>
          <code>06904</code>
          <country>France</country>
        </postal>
        <phone>+33493008134</phone>
        <email>Jerome.Haerri@eurecom.fr</email>
      </address>
    </author>
    <author fullname="Jong-Hyouk Lee" initials="J." surname="Lee">
      <organization showOnFrontPage="true">Sangmyung University</organization>
      <address>
        <postal>
          <street>31, Sangmyeongdae-gil, Dongnam-gu</street>
          <code>31066</code>
          <city>
            Cheonan
          </city>
          <country>Republic of Korea</country>
        </postal>
        <email>jonghyouk@smu.ac.kr</email>
      </address>
    </author>
    <author initials="T." surname="Ernst" fullname="Thierry ERNST">
      <organization showOnFrontPage="true">YoGoKo</organization>
      <address>
        <postal>
          <street>1137A Avenue des Champs-Blancs</street>
          <city>CESON-SEVIGNE</city>
          <region/>
          <code>35510</code>
          <country>France</country>
        </postal>
        <phone/>
        <email>thierry.ernst@yogoko.fr</email>
      </address>
    </author>
    <date month="12" year="2019"/>
    <area>Internet</area>
    <workgroup>IPWAVE Working Group</workgroup>
    <keyword>IPv6 over 802.11p</keyword>
    <keyword>OCB</keyword>
    <keyword>IPv6 over 802.11-OCB</keyword>
    <abstract pn="section-abstract">
      <t pn="section-abstract-1">
        This document provides methods and settings 
        for using IPv6 to communicate among nodes within range of one another
        over a single IEEE 802.11-OCB link. Support for these methods and
        settings require minimal changes to existing stacks. This document
        also describes limitations associated with using these methods.
        Optimizations and usage of IPv6 over more complex scenarios 
        are not covered in this specification and are a subject for future work.
      </t>
    </abstract>
    <boilerplate>
      <section anchor="status-of-memo" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.1">
        <name slugifiedName="name-status-of-this-memo">Status of This Memo</name>
        <t pn="section-boilerplate.1-1">
            This is an Internet Standards Track document.
        </t>
        <t pn="section-boilerplate.1-2">
            This document is a product of the Internet Engineering Task Force
            (IETF).  It represents the consensus of the IETF community.  It has
            received public review and has been approved for publication by
            the Internet Engineering Steering Group (IESG).  Further
            information on Internet Standards is available in Section 2 of 
            RFC 7841.
        </t>
        <t pn="section-boilerplate.1-3">
            Information about the current status of this document, any
            errata, and how to provide feedback on it may be obtained at
            <eref target="https://www.rfc-editor.org/info/rfc8691" brackets="none"/>.
        </t>
      </section>
      <section anchor="copyright" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.2">
        <name slugifiedName="name-copyright-notice">Copyright Notice</name>
        <t pn="section-boilerplate.2-1">
            Copyright (c) 2019 IETF Trust and the persons identified as the
            document authors. All rights reserved.
        </t>
        <t pn="section-boilerplate.2-2">
            This document is subject to BCP 78 and the IETF Trust's Legal
            Provisions Relating to IETF Documents
            (<eref target="https://trustee.ietf.org/license-info" brackets="none"/>) in effect on the date of
            publication of this document. Please review these documents
            carefully, as they describe your rights and restrictions with
            respect to this document. Code Components extracted from this
            document must include Simplified BSD License text as described in
            Section 4.e of the Trust Legal Provisions and are provided without
            warranty as described in the Simplified BSD License.
        </t>
      </section>
    </boilerplate>
    <toc>
      <section anchor="toc" numbered="false" removeInRFC="false" toc="exclude" pn="section-toc.1">
        <name slugifiedName="name-table-of-contents">Table of Contents</name>
        <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1">
          <li pn="section-toc.1-1.1">
            <t keepWithNext="true" pn="section-toc.1-1.1.1"><xref derivedContent="1" format="counter" sectionFormat="of" target="section-1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-introduction">Introduction</xref></t>
          </li>
          <li pn="section-toc.1-1.2">
            <t keepWithNext="true" pn="section-toc.1-1.2.1"><xref derivedContent="2" format="counter" sectionFormat="of" target="section-2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-terminology">Terminology</xref></t>
          </li>
          <li pn="section-toc.1-1.3">
            <t keepWithNext="true" pn="section-toc.1-1.3.1"><xref derivedContent="3" format="counter" sectionFormat="of" target="section-3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-communication-scenarios-whe">Communication Scenarios Where IEEE 802.11-OCB Links Are Used</xref></t>
          </li>
          <li pn="section-toc.1-1.4">
            <t keepWithNext="true" pn="section-toc.1-1.4.1"><xref derivedContent="4" format="counter" sectionFormat="of" target="section-4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-ipv6-over-80211-ocb">IPv6 over 802.11-OCB</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.4.2">
              <li pn="section-toc.1-1.4.2.1">
                <t keepWithNext="true" pn="section-toc.1-1.4.2.1.1"><xref derivedContent="4.1" format="counter" sectionFormat="of" target="section-4.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-maximum-transmission-unit-m">Maximum Transmission Unit (MTU)</xref></t>
              </li>
              <li pn="section-toc.1-1.4.2.2">
                <t keepWithNext="true" pn="section-toc.1-1.4.2.2.1"><xref derivedContent="4.2" format="counter" sectionFormat="of" target="section-4.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-frame-format">Frame Format</xref></t>
              </li>
              <li pn="section-toc.1-1.4.2.3">
                <t keepWithNext="true" pn="section-toc.1-1.4.2.3.1"><xref derivedContent="4.3" format="counter" sectionFormat="of" target="section-4.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-link-local-addresses">Link-Local Addresses</xref></t>
              </li>
              <li pn="section-toc.1-1.4.2.4">
                <t keepWithNext="true" pn="section-toc.1-1.4.2.4.1"><xref derivedContent="4.4" format="counter" sectionFormat="of" target="section-4.4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-stateless-autoconfiguration">Stateless Autoconfiguration</xref></t>
              </li>
              <li pn="section-toc.1-1.4.2.5">
                <t keepWithNext="true" pn="section-toc.1-1.4.2.5.1"><xref derivedContent="4.5" format="counter" sectionFormat="of" target="section-4.5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-address-mapping">Address Mapping</xref></t>
                <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.4.2.5.2">
                  <li pn="section-toc.1-1.4.2.5.2.1">
                    <t keepWithNext="true" pn="section-toc.1-1.4.2.5.2.1.1"><xref derivedContent="4.5.1" format="counter" sectionFormat="of" target="section-4.5.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-address-mapping-unicast">Address Mapping -- Unicast</xref></t>
                  </li>
                  <li pn="section-toc.1-1.4.2.5.2.2">
                    <t keepWithNext="true" pn="section-toc.1-1.4.2.5.2.2.1"><xref derivedContent="4.5.2" format="counter" sectionFormat="of" target="section-4.5.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-address-mapping-multicast">Address Mapping -- Multicast</xref></t>
                  </li>
                </ul>
              </li>
              <li pn="section-toc.1-1.4.2.6">
                <t keepWithNext="true" pn="section-toc.1-1.4.2.6.1"><xref derivedContent="4.6" format="counter" sectionFormat="of" target="section-4.6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-subnet-structure">Subnet Structure</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.5">
            <t keepWithNext="true" pn="section-toc.1-1.5.1"><xref derivedContent="5" format="counter" sectionFormat="of" target="section-5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-security-considerations">Security Considerations</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.5.2">
              <li pn="section-toc.1-1.5.2.1">
                <t keepWithNext="true" pn="section-toc.1-1.5.2.1.1"><xref derivedContent="5.1" format="counter" sectionFormat="of" target="section-5.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-privacy-considerations">Privacy Considerations</xref></t>
                <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.5.2.1.2">
                  <li pn="section-toc.1-1.5.2.1.2.1">
                    <t keepWithNext="true" pn="section-toc.1-1.5.2.1.2.1.1"><xref derivedContent="5.1.1" format="counter" sectionFormat="of" target="section-5.1.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-privacy-risks-of-meaningful">Privacy Risks of Meaningful Information in Interface IDs</xref></t>
                  </li>
                </ul>
              </li>
              <li pn="section-toc.1-1.5.2.2">
                <t keepWithNext="true" pn="section-toc.1-1.5.2.2.1"><xref derivedContent="5.2" format="counter" sectionFormat="of" target="section-5.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-mac-address-and-interface-i">MAC Address and Interface ID Generation</xref></t>
              </li>
              <li pn="section-toc.1-1.5.2.3">
                <t keepWithNext="true" pn="section-toc.1-1.5.2.3.1"><xref derivedContent="5.3" format="counter" sectionFormat="of" target="section-5.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-pseudonymization-impact-on-">Pseudonymization Impact on Confidentiality and Trust</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.6">
            <t keepWithNext="true" pn="section-toc.1-1.6.1"><xref derivedContent="6" format="counter" sectionFormat="of" target="section-6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-iana-considerations">IANA Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.7">
            <t keepWithNext="true" pn="section-toc.1-1.7.1"><xref derivedContent="7" format="counter" sectionFormat="of" target="section-7"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-references">References</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.7.2">
              <li pn="section-toc.1-1.7.2.1">
                <t keepWithNext="true" pn="section-toc.1-1.7.2.1.1"><xref derivedContent="7.1" format="counter" sectionFormat="of" target="section-7.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-normative-references">Normative References</xref></t>
              </li>
              <li pn="section-toc.1-1.7.2.2">
                <t keepWithNext="true" pn="section-toc.1-1.7.2.2.1"><xref derivedContent="7.2" format="counter" sectionFormat="of" target="section-7.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-informative-references">Informative References</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.8">
            <t keepWithNext="true" pn="section-toc.1-1.8.1"><xref derivedContent="Appendix A" format="default" sectionFormat="of" target="section-appendix.a"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-80211p">802.11p</xref></t>
          </li>
          <li pn="section-toc.1-1.9">
            <t keepWithNext="true" pn="section-toc.1-1.9.1"><xref derivedContent="Appendix B" format="default" sectionFormat="of" target="section-appendix.b"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-aspects-introduced-by-ocb-m">Aspects Introduced by OCB Mode to 802.11</xref></t>
          </li>
          <li pn="section-toc.1-1.10">
            <t keepWithNext="true" pn="section-toc.1-1.10.1"><xref derivedContent="Appendix C" format="default" sectionFormat="of" target="section-appendix.c"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-changes-needed-on-an-80211a">Changes Needed on an 802.11a Software Driver to Become an 802.11-OCB Driver</xref></t>
          </li>
          <li pn="section-toc.1-1.11">
            <t keepWithNext="true" pn="section-toc.1-1.11.1"><xref derivedContent="Appendix D" format="default" sectionFormat="of" target="section-appendix.d"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-protocol-layering">Protocol Layering</xref></t>
          </li>
          <li pn="section-toc.1-1.12">
            <t keepWithNext="true" pn="section-toc.1-1.12.1"><xref derivedContent="Appendix E" format="default" sectionFormat="of" target="section-appendix.e"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-design-considerations">Design Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.13">
            <t keepWithNext="true" pn="section-toc.1-1.13.1"><xref derivedContent="Appendix F" format="default" sectionFormat="of" target="section-appendix.f"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-ieee-80211-messages-transmi">IEEE 802.11 Messages Transmitted in OCB Mode</xref></t>
          </li>
          <li pn="section-toc.1-1.14">
            <t keepWithNext="true" pn="section-toc.1-1.14.1"><xref derivedContent="Appendix G" format="default" sectionFormat="of" target="section-appendix.g"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-examples-of-packet-formats">Examples of Packet Formats</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.14.2">
              <li pn="section-toc.1-1.14.2.1">
                <t keepWithNext="true" pn="section-toc.1-1.14.2.1.1"><xref derivedContent="G.1" format="counter" sectionFormat="of" target="section-g.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-capture-in-monitor-mode">Capture in Monitor Mode</xref></t>
              </li>
              <li pn="section-toc.1-1.14.2.2">
                <t keepWithNext="true" pn="section-toc.1-1.14.2.2.1"><xref derivedContent="G.2" format="counter" sectionFormat="of" target="section-g.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-capture-in-normal-mode">Capture in Normal Mode</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.15">
            <t keepWithNext="true" pn="section-toc.1-1.15.1"><xref derivedContent="Appendix H" format="default" sectionFormat="of" target="section-appendix.h"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-extra-terminology">Extra Terminology</xref></t>
          </li>
          <li pn="section-toc.1-1.16">
            <t keepWithNext="true" pn="section-toc.1-1.16.1"><xref derivedContent="Appendix I" format="default" sectionFormat="of" target="section-appendix.i"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-neighbor-discovery-nd-poten">Neighbor Discovery (ND) Potential Issues in Wireless Links</xref></t>
          </li>
          <li pn="section-toc.1-1.17">
            <t keepWithNext="true" pn="section-toc.1-1.17.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.j"/><xref derivedContent="" format="title" sectionFormat="of" target="name-acknowledgements">Acknowledgements</xref></t>
          </li>
          <li pn="section-toc.1-1.18">
            <t keepWithNext="true" pn="section-toc.1-1.18.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.k"/><xref derivedContent="" format="title" sectionFormat="of" target="name-contributors">Contributors</xref></t>
          </li>
          <li pn="section-toc.1-1.19">
            <t keepWithNext="true" pn="section-toc.1-1.19.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.l"/><xref derivedContent="" format="title" sectionFormat="of" target="name-authors-addresses">Authors' Addresses</xref></t>
          </li>
        </ul>
      </section>
    </toc>
  </front>
  <middle>
    <section numbered="true" toc="include" removeInRFC="false" pn="section-1">
      <name slugifiedName="name-introduction">Introduction</name>
      <t pn="section-1-1">
        This document provides a baseline for using IPv6 to 
        communicate among nodes in range of one another over a single IEEE 802.11-OCB link
        <xref target="IEEE-802.11-2016" format="default" sectionFormat="of" derivedContent="IEEE-802.11-2016"/> (a.k.a., 802.11p;
	see Appendices <xref target="i802.11p" format="counter" sectionFormat="of" derivedContent="A"/>,
        <xref target="introduced-by-OCB" format="counter" sectionFormat="of" derivedContent="B"/>, and <xref target="software-changes" format="counter" sectionFormat="of" derivedContent="C"/>) 
        with minimal changes to existing stacks. Moreover, the document
	identifies the limitations
        of such usage. Concretely, the document describes the layering 
        of IPv6 networking on top of the IEEE Std 802.11 MAC layer or an IEEE Std 802.3 
        MAC layer with a frame translation underneath. The resulting stack is derived from IPv6 
        over Ethernet <xref target="RFC2464" format="default" sectionFormat="of" derivedContent="RFC2464"/> but operates over 802.11-OCB to provide at least P2P (point-to-point) connectivity 
        using IPv6 Neighbor Discovery (ND) and link-local addresses. 
      </t>
      <t pn="section-1-2">
	   The IPv6 network layer operates on 802.11-OCB in the same
	   manner as operating on the Ethernet with the following
	   exceptions:
      </t>
      <ul spacing="normal" bare="false" empty="false" pn="section-1-3">
        <li pn="section-1-3.1">
	    Exceptions due to the different operation of the IPv6 network
	    layer on 802.11 compared to the Ethernet. The operation of IP 
        on Ethernet is described in <xref target="RFC1042" format="default" sectionFormat="of" derivedContent="RFC1042"/> and <xref target="RFC2464" format="default" sectionFormat="of" derivedContent="RFC2464"/>.
	    
	  </li>
        <li pn="section-1-3.2">
	    Exceptions due to the OCB nature of 802.11-OCB compared to
	    802.11.  This has impacts on security, privacy, subnet
	    structure, and movement detection.  Security and
	    privacy recommendations are discussed in Sections <xref target="slaac" format="counter" sectionFormat="of" derivedContent="4.4"/> and <xref target="Security" format="counter" sectionFormat="of" derivedContent="5"/>.  The subnet structure is described
	    in <xref target="subnet-structure" format="default" sectionFormat="of" derivedContent="Section 4.6"/>.  The movement
	    detection on OCB links is not described in this document.
        Likewise, ND extensions and IP Wireless Access in Vehicular
	Environments (IPWAVE) optimizations for vehicular communications are
        not in scope of this document.  The expectation is that further specifications will be edited to cover 
        more complex vehicular networking scenarios.

	    </li>
      </ul>
      <t pn="section-1-4">
        The reader may refer to <xref target="I-D.ietf-ipwave-vehicular-networking" format="default" sectionFormat="of" derivedContent="IPWAVE"/> for an overview of
        problems related to running IPv6 over 802.11-OCB. It is out of scope
	of this document to reiterate those problems.  
      </t>
    </section>
    <section anchor="terminology" numbered="true" toc="include" removeInRFC="false" pn="section-2">
      <name slugifiedName="name-terminology">Terminology</name>
      <t pn="section-2-1">
    The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
    "<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
    described in BCP 14 <xref target="RFC2119" format="default" sectionFormat="of" derivedContent="RFC2119"/> <xref target="RFC8174" format="default" sectionFormat="of" derivedContent="RFC8174"/> 
    when, and only when, they appear in all capitals, as shown here.
      </t>
      <t pn="section-2-2">
    The document makes uses of the following terms:</t>
      <dl newline="true" spacing="normal" pn="section-2-3">
        <dt pn="section-2-3.1">IP-OBU (Internet Protocol On-Board Unit):</dt>
        <dd pn="section-2-3.2">An IP-OBU denotes a
	computer situated in a vehicle such as a car, bicycle,
	or similar.  It has at least one IP interface that runs in
	mode OCB of 802.11 and has an "OBU" transceiver.  See
	the definition of the term "OBU" in <xref target="extra-terminology" format="default" sectionFormat="of" derivedContent="Appendix H"/>.</dd>
        <dt pn="section-2-3.3">IP-RSU (IP Roadside Unit):</dt>
        <dd pn="section-2-3.4">An IP-RSU is situated along the
        road.  It has at least two distinct IP-enabled interfaces. The
        wireless PHY/MAC layer of at least one of its IP-enabled
        interfaces is configured to operate in 802.11-OCB mode.  An
        IP-RSU communicates with the IP-OBU over an 802.11
        wireless link operating in OCB mode.  An IP-RSU is similar to
        an Access Network Router (ANR), defined in <xref target="RFC3753" format="default" sectionFormat="of" derivedContent="RFC3753"/>, and a Wireless Termination Point (WTP),
        defined in <xref target="RFC5415" format="default" sectionFormat="of" derivedContent="RFC5415"/>.</dd>
        <dt pn="section-2-3.5">OCB (outside the context of a Basic Service Set - BSS):</dt>
        <dd pn="section-2-3.6">This is a mode
        of operation in which a station (STA) is not a member of a BSS and does
        not utilize IEEE Std 802.11 authentication, association, or
        data confidentiality.</dd>
        <dt pn="section-2-3.7">802.11-OCB:</dt>
        <dd pn="section-2-3.8"> This refers to the mode specified in IEEE Std 802.11-2016 when the
        MIB attribute dot11OCBActivited is 'true'.</dd>
      </dl>
    </section>
    <section numbered="true" toc="include" removeInRFC="false" pn="section-3">
      <name slugifiedName="name-communication-scenarios-whe">Communication Scenarios Where IEEE 802.11-OCB Links Are Used</name>
      <t pn="section-3-1">
        IEEE 802.11-OCB networks are used for vehicular
        communications as 'Wireless Access in Vehicular
        Environments'. In particular, we refer the reader to <xref target="I-D.ietf-ipwave-vehicular-networking" format="default" sectionFormat="of" derivedContent="IPWAVE"/>, which lists
        some scenarios and requirements for IP in Intelligent
        Transportation Systems (ITS).
      </t>
      <t pn="section-3-2">
	The link model is the following: STA --- 802.11-OCB --- STA.
	In vehicular networks, STAs can be IP-RSUs and/or IP-OBUs. 
    All links are assumed to be P2P, and multiple links can be on one radio 
    interface. While 802.11-OCB is clearly specified and a legacy IPv6
    stack can operate on such links, the use of the operating environment 
    (vehicular networks) brings in new perspectives.
      </t>
    </section>
    <section numbered="true" toc="include" removeInRFC="false" pn="section-4">
      <name slugifiedName="name-ipv6-over-80211-ocb">IPv6 over 802.11-OCB</name>
      <section anchor="MTU" numbered="true" toc="include" removeInRFC="false" pn="section-4.1">
        <name slugifiedName="name-maximum-transmission-unit-m">Maximum Transmission Unit (MTU)</name>
        <t pn="section-4.1-1">
          The default MTU for IP packets on 802.11-OCB is inherited 
          from <xref target="RFC2464" format="default" sectionFormat="of" derivedContent="RFC2464"/> and, as such, is 1500 octets. 
          As noted in <xref target="RFC8200" format="default" sectionFormat="of" derivedContent="RFC8200"/>, every link on the Internet must have a
          minimum MTU of 1280 octets and must follow the other 
          recommendations, especially with regard to fragmentation.
        </t>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-4.2">
        <name slugifiedName="name-frame-format">Frame Format</name>
        <t pn="section-4.2-1">
	  IP packets <bcp14>MUST</bcp14> be transmitted over 802.11-OCB media as QoS
	  data frames whose format is specified in an IEEE 802.11 spec
      <xref target="IEEE-802.11-2016" format="default" sectionFormat="of" derivedContent="IEEE-802.11-2016"/>.
        </t>
        <t pn="section-4.2-2">
	  The IPv6 packet transmitted on 802.11-OCB is
	  immediately preceded by a Logical Link Control (LLC) header
	  and an 802.11 header.  In the LLC header and in accordance
	  with EtherType Protocol Discrimination (EPD; see <xref target="epd" format="default" sectionFormat="of" derivedContent="Appendix D"/>), the value of the Type field <bcp14>MUST</bcp14> be set to
	  0x86DD (IPv6).  The mapping to the 802.11 data service <bcp14>SHOULD</bcp14> 
      use a 'priority' value of 1  (QoS with a 'Background' user priority),
      reserving higher priority values for safety-critical and time-sensitive
      traffic, including the ones listed in <xref target="ETSI-sec-archi" format="default" sectionFormat="of" derivedContent="ETSI-sec-archi"/>.

        </t>
        <t pn="section-4.2-3">
	  To simplify the Application Programming Interface (API)
	  between the operating system and the 802.11-OCB media,
	  device drivers <bcp14>MAY</bcp14> implement IPv6 over Ethernet as per <xref target="RFC2464" format="default" sectionFormat="of" derivedContent="RFC2464"/> 
      and then a frame translation from 802.3 to 802.11 in order 
      to  minimize the code changes.
        </t>
      </section>
      <section anchor="ll" numbered="true" toc="include" removeInRFC="false" pn="section-4.3">
        <name slugifiedName="name-link-local-addresses">Link-Local Addresses</name>
        <t pn="section-4.3-1">
	  There are several types of IPv6 addresses <xref target="RFC4291" format="default" sectionFormat="of" derivedContent="RFC4291"/> <xref target="RFC4193" format="default" sectionFormat="of" derivedContent="RFC4193"/> that may be
	  assigned to an 802.11-OCB interface.  Among these types of
	  addresses, only the IPv6 link-local addresses can be formed
	  using an EUI-64 identifier, particularly during transition
	  time (the period of time before an interface starts using an address
	  different from the LL one).
        </t>
        <t pn="section-4.3-2">
	  If the IPv6 link-local address is formed using an EUI-64
	  identifier, then the mechanism for forming that address is
	  the same mechanism as that used to form an IPv6 link-local
	  address on Ethernet links. Moreover, regardless of whether the interface
      identifier is derived from the EUI-64 identifier, its length is 64 bits,
      as is the case for the Ethernet <xref target="RFC2464" format="default" sectionFormat="of" derivedContent="RFC2464"/>.
        </t>
      </section>
      <section anchor="slaac" numbered="true" toc="include" removeInRFC="false" pn="section-4.4">
        <name slugifiedName="name-stateless-autoconfiguration">Stateless Autoconfiguration</name>
        <t pn="section-4.4-1">
	  The steps a host takes in deciding how to
      autoconfigure its interfaces in IPv6 are described 
      in <xref target="RFC4862" format="default" sectionFormat="of" derivedContent="RFC4862"/>.  This section describes
	  the formation of Interface Identifiers for 'Global' or 'Unique Local' IPv6 addresses.  Interface Identifiers
	  for 'link-local' IPv6 addresses are discussed in <xref target="ll" format="default" sectionFormat="of" derivedContent="Section 4.3"/>.
        </t>
        <t pn="section-4.4-2">
          The <bcp14>RECOMMENDED</bcp14> method for forming
          stable Interface Identifiers (IIDs) is described in <xref target="RFC8064" format="default" sectionFormat="of" derivedContent="RFC8064"/>.  The method of forming IIDs described in
          <xref target="RFC2464" sectionFormat="of" section="4" format="default" derivedLink="https://rfc-editor.org/rfc/rfc2464#section-4" derivedContent="RFC2464"/> <bcp14>MAY</bcp14> be used during
          transition time, particularly for IPv6 link-local
          addresses.  Regardless of the method used to form the IID, 
          its length is 64 bits, similarly to IPv6 over Ethernet <xref target="RFC2464" format="default" sectionFormat="of" derivedContent="RFC2464"/>.
        </t>
        <t pn="section-4.4-3">
          The bits in the IID have no specific meaning,
          and the identifier should be treated as an opaque value.
          The bits 'Universal' and 'Group' in the identifier of an
          802.11-OCB interface, which is an IEEE link-layer address, are
	  significant.  The details of this significance are 
          described in <xref target="RFC7136" format="default" sectionFormat="of" derivedContent="RFC7136"/>.
        </t>
        <t pn="section-4.4-4">
	  Semantically opaque IIDs, instead of 
	  meaningful IIDs derived from a valid and
	  meaningful MAC address (<xref target="RFC2464" sectionFormat="comma" section="4" format="default" derivedLink="https://rfc-editor.org/rfc/rfc2464#section-4" derivedContent="RFC2464"/>), help avoid certain privacy risks (see the risks
	  mentioned in <xref target="privacy-opaque-iid" format="default" sectionFormat="of" derivedContent="Section 5.1.1"/>).  If
	  semantically opaque IIDs are needed, they
	  may be generated using the method for generating
	  semantically opaque IIDs with IPv6
	  Stateless Address Autoconfiguration given in <xref target="RFC7217" format="default" sectionFormat="of" derivedContent="RFC7217"/>.  Typically, an opaque IID is formed starting from identifiers different
	  from the MAC addresses and from cryptographically strong
	  material.  Thus, privacy-sensitive information is absent
	  from Interface IDs because it is impossible to calculate
	  back the initial value from which the Interface ID was first
	  generated.
        </t>
        <t pn="section-4.4-5">
	  Some applications that use IPv6 packets on 802.11-OCB links
	  (among other link types) may benefit from IPv6 addresses
	  whose IIDs don't change too often.  It is
	  <bcp14>RECOMMENDED</bcp14> to use the mechanisms described in <xref target="RFC7217" format="default" sectionFormat="of" derivedContent="RFC7217"/> to
	  permit the use of stable IIDs that do not
	  change within one subnet prefix.  A possible source for the
	  Net_Iface parameter is a virtual interface name or logical
	  interface name that is decided by a local administrator.
        </t>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-4.5">
        <name slugifiedName="name-address-mapping">Address Mapping</name>
        <t pn="section-4.5-1">
	  Unicast and multicast address mapping <bcp14>MUST</bcp14> follow the
	  procedures specified for Ethernet interfaces described in Sections <xref target="RFC2464" sectionFormat="bare" section="6" format="default" derivedLink="https://rfc-editor.org/rfc/rfc2464#section-6" derivedContent="RFC2464"/> and  <xref target="RFC2464" sectionFormat="bare" section="7" format="default" derivedLink="https://rfc-editor.org/rfc/rfc2464#section-7" derivedContent="RFC2464"/> of <xref target="RFC2464" format="default" sectionFormat="of" derivedContent="RFC2464"/>.
        </t>
        <section numbered="true" toc="include" removeInRFC="false" pn="section-4.5.1">
          <name slugifiedName="name-address-mapping-unicast">Address Mapping -- Unicast</name>
          <t pn="section-4.5.1-1">
	    This document is scoped for Address Resolution (AR) and Duplicate Address Detection (DAD) per <xref target="RFC4862" format="default" sectionFormat="of" derivedContent="RFC4862"/>.
          </t>
        </section>
        <section anchor="address-mapping-multicast" numbered="true" toc="include" removeInRFC="false" pn="section-4.5.2">
          <name slugifiedName="name-address-mapping-multicast">Address Mapping -- Multicast</name>
          <t pn="section-4.5.2-1">
	    The multicast address mapping is performed according to
	    the method specified in <xref section="7" target="RFC2464" sectionFormat="of" format="default" derivedLink="https://rfc-editor.org/rfc/rfc2464#section-7" derivedContent="RFC2464"/>.  The meaning of the value "33-33"
	    mentioned there is
	    defined in <xref target="RFC7042" sectionFormat="of" section="2.3.1" format="default" derivedLink="https://rfc-editor.org/rfc/rfc7042#section-2.3.1" derivedContent="RFC7042"/>.
          </t>
          <t pn="section-4.5.2-2">
            Transmitting IPv6 packets to multicast destinations over
            802.11 links proved to have some performance issues <xref target="I-D.ietf-mboned-ieee802-mcast-problems" format="default" sectionFormat="of" derivedContent="IEEE802-MCAST"/>.  These
            issues may be exacerbated in OCB mode. 
            Future improvement to this specification should consider solutions for these problems.
          </t>
        </section>
      </section>
      <section anchor="subnet-structure" numbered="true" toc="include" removeInRFC="false" pn="section-4.6">
        <name slugifiedName="name-subnet-structure">Subnet Structure</name>
        <t pn="section-4.6-1">
	  When vehicles are in close range, a subnet may be formed over
      802.11-OCB interfaces (not by their in-vehicle interfaces).  
      A Prefix List conceptual data structure (<xref target="RFC4861" sectionFormat="comma" section="5.1" format="default" derivedLink="https://rfc-editor.org/rfc/rfc4861#section-5.1" derivedContent="RFC4861"/>) is maintained for each
	  802.11-OCB interface.
        </t>
        <t pn="section-4.6-2">
	  The IPv6 Neighbor Discovery protocol (ND) requires reflexive properties
      (bidirectional connectivity), which is generally, though not always, the case for P2P OCB links.
      IPv6 ND also requires transitive properties for DAD and AR, so an IPv6 subnet can be mapped
      on an OCB network only if all nodes in the network share a single
      physical broadcast domain. The extension to IPv6 ND operating on a
      subnet that covers multiple OCB links and does not fully overlap
      (i.e., non-broadcast multi-access (NBMA)) is not in scope of this document.
      Finally, IPv6 ND requires permanent connectivity of all nodes in the subnet
      to defend their addresses -- in other words, very stable network conditions.

        </t>
        <t pn="section-4.6-3">
	  The structure of this subnet is ephemeral in that it is
	  strongly influenced by the mobility of vehicles: the hidden
	  terminal effects appear, and the 802.11 networks in OCB mode may
	  be considered ad hoc networks with an addressing model,
	  as described in <xref target="RFC5889" format="default" sectionFormat="of" derivedContent="RFC5889"/>.  On the other hand,
	  the structure of the internal subnets in each vehicle is
	  relatively stable.
        </t>
        <t pn="section-4.6-4">
	  As recommended in <xref target="RFC5889" format="default" sectionFormat="of" derivedContent="RFC5889"/>, when the timing
	  requirements are very strict (e.g., fast-drive-through IP-RSU
	  coverage), no on-link subnet prefix should be configured on
	  an 802.11-OCB interface.  In such cases, the exclusive use
	  of IPv6 link-local addresses is <bcp14>RECOMMENDED</bcp14>.
        </t>
        <t pn="section-4.6-5">
	  Additionally, even if the timing requirements are not very
	  strict (e.g., the moving subnet formed by two following
	  vehicles is stable, a fixed IP-RSU is absent), the subnet is
	  disconnected from the Internet (i.e., a default route is absent),
	  and the addressing peers are equally qualified (that is, it is impossible
	  to determine whether some vehicle owns and distributes
	  addresses to others), the use of link-local addresses is
	  <bcp14>RECOMMENDED</bcp14>.
        </t>
        <t pn="section-4.6-6">
	   The baseline ND protocol <xref target="RFC4861" format="default" sectionFormat="of" derivedContent="RFC4861"/> <bcp14>MUST</bcp14> be supported over 802.11-OCB links.
	   Transmitting ND packets may prove to have some performance
	   issues, as mentioned in <xref target="address-mapping-multicast" format="default" sectionFormat="of" derivedContent="Section 4.5.2"/> and
       <xref target="nd-wireless" format="default" sectionFormat="of" derivedContent="Appendix I"/>.  
       These issues may be exacerbated in OCB mode.
	   Solutions for these problems should consider the OCB mode
	   of operation. Future solutions to OCB should consider solutions
       for avoiding broadcast. The best of current knowledge 
       indicates the kinds of issues that may arise with ND in 
       OCB mode; they are described in <xref target="nd-wireless" format="default" sectionFormat="of" derivedContent="Appendix I"/>.
        </t>
        <t pn="section-4.6-7">
	  Protocols like Mobile IPv6 <xref target="RFC6275" format="default" sectionFormat="of" derivedContent="RFC6275"/>
          <xref target="RFC3963" format="default" sectionFormat="of" derivedContent="RFC3963"/> and
	  DNAv6 <xref target="RFC6059" format="default" sectionFormat="of" derivedContent="RFC6059"/>, which depend on timely
	  movement detection, might need additional tuning work to
	  handle the lack of link-layer notifications during handover.
	  This topic is left for further study.
        </t>
      </section>
    </section>
    <section anchor="Security" numbered="true" toc="include" removeInRFC="false" pn="section-5">
      <name slugifiedName="name-security-considerations">Security Considerations</name>
      <t pn="section-5-1">
        Any security mechanism at the IP layer or above that may be
        implemented for the general case of IPv6 may also be implemented
        for IPv6 operating over 802.11-OCB.
      </t>
      <t pn="section-5-2">
	The OCB operation does not use existing 802.11
	link-layer security mechanisms.  There is no encryption
	applied below the network layer running on 802.11-OCB.  At
	the application layer, the IEEE 1609.2 document <xref target="IEEE-1609.2" format="default" sectionFormat="of" derivedContent="IEEE-1609.2"/> provides security services for
	certain applications to use; application-layer mechanisms are
	out of scope of this document.  On the other hand, a security
	mechanism provided at the networking layer, such as IPsec <xref target="RFC4301" format="default" sectionFormat="of" derivedContent="RFC4301"/>, may provide data security protection to a
	wider range of applications.
      </t>
      <t pn="section-5-3">
        802.11-OCB does not provide any cryptographic protection because it operates outside the context of a BSS (no
        Association Request/Response or Challenge messages). 
        Therefore, an attacker can sniff or inject traffic while within 
        range of a vehicle or IP-RSU (by setting an interface card's frequency to the proper range).  
        Also, an attacker may not adhere to the legal limits
        for radio power and can use a very sensitive directional antenna; 
        if attackers wish to attack a given exchange, they do not necessarily 
        need to be in close physical proximity. Hence, such a link is less protected than
        commonly used links (a wired link or the aforementioned 802.11 links with link-layer security).
      </t>
      <t pn="section-5-4">Therefore, any node can join a subnet and directly communicate with any
    nodes on the subset, including potentially impersonating another node. This 
    design allows for a number of threats outlined in <xref target="RFC6959" sectionFormat="of" section="3" format="default" derivedLink="https://rfc-editor.org/rfc/rfc6959#section-3" derivedContent="RFC6959"/>. 
    While not widely deployed, SEND <xref target="RFC3971" format="default" sectionFormat="of" derivedContent="RFC3971"/> <xref target="RFC3972" format="default" sectionFormat="of" derivedContent="RFC3972"/> is a solution 
    that can address spoof-based attack vectors.
      </t>
      <section anchor="Privacy" numbered="true" toc="include" removeInRFC="false" pn="section-5.1">
        <name slugifiedName="name-privacy-considerations">Privacy Considerations</name>
        <t pn="section-5.1-1">
          As with all Ethernet and 802.11 interface identifiers <xref target="RFC7721" format="default" sectionFormat="of" derivedContent="RFC7721"/>, the identifier of an 802.11-OCB
          interface may involve privacy, MAC address spoofing, and IP
          hijacking risks.  A vehicle embarking an IP-OBU
          whose egress interface is 802.11-OCB may expose itself to
          eavesdropping and subsequent correlation of data. This may
          reveal data considered private by the vehicle owner; there
          is a risk of being tracked.  In outdoor public
          environments, where vehicles typically circulate, the
          privacy risks are greater than in indoor settings.
          It is highly likely that attacker sniffers are deployed
          along routes that listen for IEEE frames, including IP
          packets, of vehicles passing by.  For this reason, in 802.11-OCB deployments, there is a strong necessity to use
          protection tools such as dynamically changing MAC addresses
          (<xref target="mac-change" format="default" sectionFormat="of" derivedContent="Section 5.2"/>), semantically opaque Interface
          Identifiers, and stable Interface Identifiers (<xref target="slaac" format="default" sectionFormat="of" derivedContent="Section 4.4"/>).  An example of a change policy is to change the MAC 
          address of the OCB interface each time the system boots up. 
          This may help mitigate privacy risks to a
          certain level. Furthermore,  for privacy concerns, <xref target="RFC8065" format="default" sectionFormat="of" derivedContent="RFC8065"/> recommends using an address-generation scheme
	  rather than generating addresses from a fixed link-layer address.
          However, there are some specificities related to vehicles. Since roaming is an important
          characteristic of moving vehicles, the use of the same Link-Local Address over time 
          can indicate the presence of the same vehicle in different places and thus lead to location tracking. 
          Hence, a vehicle should get hints about a change of environment (e.g., engine running, GPS, etc.) 
          and renew the IID in its LLAs.
          
        </t>
        <section anchor="privacy-opaque-iid" numbered="true" toc="include" removeInRFC="false" pn="section-5.1.1">
          <name slugifiedName="name-privacy-risks-of-meaningful">Privacy Risks of Meaningful Information in Interface IDs</name>
          <t pn="section-5.1.1-1">
	    The privacy risks of using MAC addresses displayed in
	    Interface Identifiers are important.  IPv6 packets can
	    be captured easily on the Internet and on-link on public
	    roads.  For this reason, an attacker may realize many
	    attacks on privacy.  One such attack on 802.11-OCB is to
	    capture, store, and correlate company ID information
	    present in the MAC addresses of a large number of cars (e.g., listening for
	    Router Advertisements or other IPv6 application data
	    packets, and recording the value of the source address in
	    these packets).  Further correlation of this information
	    with other data captured by other means or other visual
	    information (e.g., car color) may constitute privacy
	    risks.
          </t>
        </section>
      </section>
      <section anchor="mac-change" numbered="true" toc="include" removeInRFC="false" pn="section-5.2">
        <name slugifiedName="name-mac-address-and-interface-i">MAC Address and Interface ID Generation</name>
        <t pn="section-5.2-1">
	  In 802.11-OCB networks, the MAC addresses may change during
	  well-defined renumbering events.  At the moment the MAC
	  address is changed on an 802.11-OCB interface, all the
	  Interface Identifiers of IPv6 addresses assigned to that
	  interface <bcp14>MUST</bcp14> change.
        </t>
        <t pn="section-5.2-2">
	  Implementations should use a policy dictating when the MAC address is changed on the 802.11-OCB interface.  
      For more information on the motivation of this policy, please refer to
	  the privacy discussion in <xref target="introduced-by-OCB" format="default" sectionFormat="of" derivedContent="Appendix B"/>.
        </t>
        <t pn="section-5.2-3">
	  A 'randomized' MAC address has the following
	  characteristics:
        </t>
        <ul spacing="normal" bare="false" empty="false" pn="section-5.2-4">
          <li pn="section-5.2-4.1">
              The "Local/Global" bit is set to "locally administered".
            </li>
          <li pn="section-5.2-4.2">
              The "Unicast/Multicast" bit is set to "Unicast".
            </li>
          <li pn="section-5.2-4.3">
              The 46 remaining bits are set to a random value using a
              random number generator that meets the requirements of
              <xref target="RFC4086" format="default" sectionFormat="of" derivedContent="RFC4086"/>.
            </li>
        </ul>
        <t pn="section-5.2-5">
          To meet the randomization requirements for the 46 remaining
          bits, a hash function may be used. For example, the hash function
	  defined in <xref target="SHA256" format="default" sectionFormat="of" derivedContent="SHA256"/>
          may be used with the input of a 256-bit local secret, the 'nominal'
	  MAC address of the interface, and a representation of the date and
	  time of the renumbering event. 
        </t>
        <t pn="section-5.2-6">
	  A randomized Interface ID has the same characteristics of a
	  randomized MAC address except for the length in bits.
        </t>
      </section>
      <section anchor="pseudonym" numbered="true" toc="include" removeInRFC="false" pn="section-5.3">
        <name slugifiedName="name-pseudonymization-impact-on-">Pseudonymization Impact on Confidentiality and Trust</name>
        <t pn="section-5.3-1">
       Vehicle and drivers privacy relies on pseudonymization mechanisms
       such as the ones described in <xref target="mac-change" format="default" sectionFormat="of" derivedContent="Section 5.2"/>.
       This pseudonymization means that upper-layer protocols and applications
       <bcp14>SHOULD NOT</bcp14> rely on layer-2 or layer-3 addresses to assume that the other participant can be trusted.
        
        </t>
      </section>
    </section>
    <section anchor="IANA" numbered="true" toc="include" removeInRFC="false" pn="section-6">
      <name slugifiedName="name-iana-considerations">IANA Considerations</name>
      <t pn="section-6-1">
	This document has no IANA actions.
      </t>
    </section>
  </middle>
  <back>
    <displayreference target="I-D.ietf-mboned-ieee802-mcast-problems" to="IEEE802-MCAST"/>
    <displayreference target="I-D.ietf-ipwave-vehicular-networking" to="IPWAVE"/>
    <references pn="section-7">
      <name slugifiedName="name-references">References</name>
      <references pn="section-7.1">
        <name slugifiedName="name-normative-references">Normative References</name>
        <reference anchor="IEEE-802.11-2016" target="https://standards.ieee.org/findstds/standard/802.11-2016.html" quoteTitle="true" derivedAnchor="IEEE-802.11-2016">
          <front>
            <title>IEEE Standard for Information technology - Telecommunications and information exchange between systems Local and metropolitan area networks--Specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications</title>
            <seriesInfo name="IEEE Standard" value="802.11-2016"/>
            <author>
              <organization showOnFrontPage="true">IEEE</organization>
            </author>
            <date month="December" year="2016"/>
          </front>
        </reference>
        <reference anchor="RFC1042" target="https://www.rfc-editor.org/info/rfc1042" quoteTitle="true" derivedAnchor="RFC1042">
          <front>
            <title>Standard for the transmission of IP datagrams over IEEE 802 networks</title>
            <author initials="J." surname="Postel" fullname="J. Postel">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J.K." surname="Reynolds" fullname="J.K. Reynolds">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="1988" month="February"/>
            <abstract>
              <t>This RFC specifies a standard method of encapsulating the Internet Protocol (IP) datagrams and Address Resolution Protocol (ARP) requests and replies on IEEE 802 Networks to allow compatible and interoperable implementations.  This RFC specifies a protocol standard for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="43"/>
          <seriesInfo name="RFC" value="1042"/>
          <seriesInfo name="DOI" value="10.17487/RFC1042"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" quoteTitle="true" derivedAnchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author initials="S." surname="Bradner" fullname="S. Bradner">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="1997" month="March"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC2464" target="https://www.rfc-editor.org/info/rfc2464" quoteTitle="true" derivedAnchor="RFC2464">
          <front>
            <title>Transmission of IPv6 Packets over Ethernet Networks</title>
            <author initials="M." surname="Crawford" fullname="M. Crawford">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="1998" month="December"/>
            <abstract>
              <t>This document specifies the frame format for transmission of IPv6 packets and the method of forming IPv6 link-local addresses and statelessly autoconfigured addresses on Ethernet networks.  It also specifies the content of the Source/Target Link-layer Address option used in Router Solicitation, Router Advertisement, Neighbor Solicitation, Neighbor Advertisement and Redirect messages when those messages are transmitted on an Ethernet.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2464"/>
          <seriesInfo name="DOI" value="10.17487/RFC2464"/>
        </reference>
        <reference anchor="RFC4086" target="https://www.rfc-editor.org/info/rfc4086" quoteTitle="true" derivedAnchor="RFC4086">
          <front>
            <title>Randomness Requirements for Security</title>
            <author initials="D." surname="Eastlake 3rd" fullname="D. Eastlake 3rd">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Schiller" fullname="J. Schiller">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Crocker" fullname="S. Crocker">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2005" month="June"/>
            <abstract>
              <t>Security systems are built on strong cryptographic algorithms that foil pattern analysis attempts.  However, the security of these systems is dependent on generating secret quantities for passwords, cryptographic keys, and similar quantities.  The use of pseudo-random processes to generate secret quantities can result in pseudo-security. A sophisticated attacker may find it easier to reproduce the environment that produced the secret quantities and to search the resulting small set of possibilities than to locate the quantities in the whole of the potential number space.</t>
              <t>Choosing random quantities to foil a resourceful and motivated adversary is surprisingly difficult.  This document points out many pitfalls in using poor entropy sources or traditional pseudo-random number generation techniques for generating such quantities.  It recommends the use of truly random hardware techniques and shows that the existing hardware on many systems can be used for this purpose. It provides suggestions to ameliorate the problem when a hardware solution is not available, and it gives examples of how large such quantities need to be for some applications.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="106"/>
          <seriesInfo name="RFC" value="4086"/>
          <seriesInfo name="DOI" value="10.17487/RFC4086"/>
        </reference>
        <reference anchor="RFC4191" target="https://www.rfc-editor.org/info/rfc4191" quoteTitle="true" derivedAnchor="RFC4191">
          <front>
            <title>Default Router Preferences and More-Specific Routes</title>
            <author initials="R." surname="Draves" fullname="R. Draves">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="D." surname="Thaler" fullname="D. Thaler">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2005" month="November"/>
            <abstract>
              <t>This document describes an optional extension to Router Advertisement messages for communicating default router preferences and more-specific routes from routers to hosts.  This improves the ability of hosts to pick an appropriate router, especially when the host is multi-homed and the routers are on different links.  The preference values and specific routes advertised to hosts require administrative configuration; they are not automatically derived from routing tables.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4191"/>
          <seriesInfo name="DOI" value="10.17487/RFC4191"/>
        </reference>
        <reference anchor="RFC4193" target="https://www.rfc-editor.org/info/rfc4193" quoteTitle="true" derivedAnchor="RFC4193">
          <front>
            <title>Unique Local IPv6 Unicast Addresses</title>
            <author initials="R." surname="Hinden" fullname="R. Hinden">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="B." surname="Haberman" fullname="B. Haberman">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2005" month="October"/>
            <abstract>
              <t>This document defines an IPv6 unicast address format that is globally unique and is intended for local communications, usually inside of a site. These addresses are not expected to be routable on the global Internet.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4193"/>
          <seriesInfo name="DOI" value="10.17487/RFC4193"/>
        </reference>
        <reference anchor="RFC4291" target="https://www.rfc-editor.org/info/rfc4291" quoteTitle="true" derivedAnchor="RFC4291">
          <front>
            <title>IP Version 6 Addressing Architecture</title>
            <author initials="R." surname="Hinden" fullname="R. Hinden">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Deering" fullname="S. Deering">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2006" month="February"/>
            <abstract>
              <t>This specification defines the addressing architecture of the IP Version 6 (IPv6) protocol.  The document includes the IPv6 addressing model, text representations of IPv6 addresses, definition of IPv6 unicast addresses, anycast addresses, and multicast addresses, and an IPv6 node's required addresses.</t>
              <t>This document obsoletes RFC 3513, "IP Version 6 Addressing Architecture".   [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4291"/>
          <seriesInfo name="DOI" value="10.17487/RFC4291"/>
        </reference>
        <reference anchor="RFC4301" target="https://www.rfc-editor.org/info/rfc4301" quoteTitle="true" derivedAnchor="RFC4301">
          <front>
            <title>Security Architecture for the Internet Protocol</title>
            <author initials="S." surname="Kent" fullname="S. Kent">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="K." surname="Seo" fullname="K. Seo">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2005" month="December"/>
            <abstract>
              <t>This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer.  This document obsoletes RFC 2401 (November 1998).  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4301"/>
          <seriesInfo name="DOI" value="10.17487/RFC4301"/>
        </reference>
        <reference anchor="RFC4861" target="https://www.rfc-editor.org/info/rfc4861" quoteTitle="true" derivedAnchor="RFC4861">
          <front>
            <title>Neighbor Discovery for IP version 6 (IPv6)</title>
            <author initials="T." surname="Narten" fullname="T. Narten">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="E." surname="Nordmark" fullname="E. Nordmark">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="W." surname="Simpson" fullname="W. Simpson">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="H." surname="Soliman" fullname="H. Soliman">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2007" month="September"/>
            <abstract>
              <t>This document specifies the Neighbor Discovery protocol for IP Version 6.  IPv6 nodes on the same link use Neighbor Discovery to discover each other's presence, to determine each other's link-layer addresses, to find routers, and to maintain reachability information about the paths to active neighbors.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4861"/>
          <seriesInfo name="DOI" value="10.17487/RFC4861"/>
        </reference>
        <reference anchor="RFC4862" target="https://www.rfc-editor.org/info/rfc4862" quoteTitle="true" derivedAnchor="RFC4862">
          <front>
            <title>IPv6 Stateless Address Autoconfiguration</title>
            <author initials="S." surname="Thomson" fullname="S. Thomson">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="T." surname="Narten" fullname="T. Narten">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="T." surname="Jinmei" fullname="T. Jinmei">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2007" month="September"/>
            <abstract>
              <t>This document specifies the steps a host takes in deciding how to autoconfigure its interfaces in IP version 6.  The autoconfiguration process includes generating a link-local address, generating global addresses via stateless address autoconfiguration, and the Duplicate Address Detection procedure to verify the uniqueness of the addresses on a link.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4862"/>
          <seriesInfo name="DOI" value="10.17487/RFC4862"/>
        </reference>
        <reference anchor="RFC5415" target="https://www.rfc-editor.org/info/rfc5415" quoteTitle="true" derivedAnchor="RFC5415">
          <front>
            <title>Control And Provisioning of Wireless Access Points (CAPWAP) Protocol Specification</title>
            <author initials="P." surname="Calhoun" fullname="P. Calhoun" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="M." surname="Montemurro" fullname="M. Montemurro" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="D." surname="Stanley" fullname="D. Stanley" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2009" month="March"/>
            <abstract>
              <t>This specification defines the Control And Provisioning of Wireless Access Points (CAPWAP) Protocol, meeting the objectives defined by the CAPWAP Working Group in RFC 4564.  The CAPWAP protocol is designed to be flexible, allowing it to be used for a variety of wireless technologies.  This document describes the base CAPWAP protocol, while separate binding extensions will enable its use with additional wireless technologies.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5415"/>
          <seriesInfo name="DOI" value="10.17487/RFC5415"/>
        </reference>
        <reference anchor="RFC6059" target="https://www.rfc-editor.org/info/rfc6059" quoteTitle="true" derivedAnchor="RFC6059">
          <front>
            <title>Simple Procedures for Detecting Network Attachment in IPv6</title>
            <author initials="S." surname="Krishnan" fullname="S. Krishnan">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="G." surname="Daley" fullname="G. Daley">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2010" month="November"/>
            <abstract>
              <t>Detecting Network Attachment allows hosts to assess if its existing addressing or routing configuration is valid for a newly connected network.  This document provides simple procedures for Detecting Network Attachment in IPv6 hosts, and procedures for routers to support such services.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6059"/>
          <seriesInfo name="DOI" value="10.17487/RFC6059"/>
        </reference>
        <reference anchor="RFC6275" target="https://www.rfc-editor.org/info/rfc6275" quoteTitle="true" derivedAnchor="RFC6275">
          <front>
            <title>Mobility Support in IPv6</title>
            <author initials="C." surname="Perkins" fullname="C. Perkins" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="D." surname="Johnson" fullname="D. Johnson">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Arkko" fullname="J. Arkko">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2011" month="July"/>
            <abstract>
              <t>This document specifies Mobile IPv6, a protocol that allows nodes to remain reachable while moving around in the IPv6 Internet.  Each mobile node is always identified by its home address, regardless of its current point of attachment to the Internet.  While situated away from its home, a mobile node is also associated with a care-of address, which provides information about the mobile node's current location.  IPv6 packets addressed to a mobile node's home address are transparently routed to its care-of address.  The protocol enables IPv6 nodes to cache the binding of a mobile node's home address with its care-of address, and to then send any packets destined for the mobile node directly to it at this care-of address.  To support this operation, Mobile IPv6 defines a new IPv6 protocol and a new destination option.  All IPv6 nodes, whether mobile or stationary, can communicate with mobile nodes.  This document obsoletes RFC 3775. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6275"/>
          <seriesInfo name="DOI" value="10.17487/RFC6275"/>
        </reference>
        <reference anchor="RFC7042" target="https://www.rfc-editor.org/info/rfc7042" quoteTitle="true" derivedAnchor="RFC7042">
          <front>
            <title>IANA Considerations and IETF Protocol and Documentation Usage for IEEE 802 Parameters</title>
            <author initials="D." surname="Eastlake 3rd" fullname="D. Eastlake 3rd">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Abley" fullname="J. Abley">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2013" month="October"/>
            <abstract>
              <t>Some IETF protocols make use of Ethernet frame formats and IEEE 802 parameters.  This document discusses several uses of such parameters in IETF protocols, specifies IANA considerations for assignment of points under the IANA OUI (Organizationally Unique Identifier), and provides some values for use in documentation. This document obsoletes RFC 5342.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="141"/>
          <seriesInfo name="RFC" value="7042"/>
          <seriesInfo name="DOI" value="10.17487/RFC7042"/>
        </reference>
        <reference anchor="RFC7136" target="https://www.rfc-editor.org/info/rfc7136" quoteTitle="true" derivedAnchor="RFC7136">
          <front>
            <title>Significance of IPv6 Interface Identifiers</title>
            <author initials="B." surname="Carpenter" fullname="B. Carpenter">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Jiang" fullname="S. Jiang">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2014" month="February"/>
            <abstract>
              <t>The IPv6 addressing architecture includes a unicast interface identifier that is used in the creation of many IPv6 addresses. Interface identifiers are formed by a variety of methods.  This document clarifies that the bits in an interface identifier have no meaning and that the entire identifier should be treated as an opaque value.  In particular, RFC 4291 defines a method by which the Universal and Group bits of an IEEE link-layer address are mapped into an IPv6 unicast interface identifier.  This document clarifies that those two bits are significant only in the process of deriving interface identifiers from an IEEE link-layer address, and it updates RFC 4291 accordingly.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7136"/>
          <seriesInfo name="DOI" value="10.17487/RFC7136"/>
        </reference>
        <reference anchor="RFC7217" target="https://www.rfc-editor.org/info/rfc7217" quoteTitle="true" derivedAnchor="RFC7217">
          <front>
            <title>A Method for Generating Semantically Opaque Interface Identifiers with IPv6 Stateless Address Autoconfiguration (SLAAC)</title>
            <author initials="F." surname="Gont" fullname="F. Gont">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2014" month="April"/>
            <abstract>
              <t>This document specifies a method for generating IPv6 Interface Identifiers to be used with IPv6 Stateless Address Autoconfiguration (SLAAC), such that an IPv6 address configured using this method is stable within each subnet, but the corresponding Interface Identifier changes when the host moves from one network to another.  This method is meant to be an alternative to generating Interface Identifiers based on hardware addresses (e.g., IEEE LAN Media Access Control (MAC) addresses), such that the benefits of stable addresses can be achieved without sacrificing the security and privacy of users.  The method specified in this document applies to all prefixes a host may be employing, including link-local, global, and unique-local prefixes (and their corresponding addresses).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7217"/>
          <seriesInfo name="DOI" value="10.17487/RFC7217"/>
        </reference>
        <reference anchor="RFC8064" target="https://www.rfc-editor.org/info/rfc8064" quoteTitle="true" derivedAnchor="RFC8064">
          <front>
            <title>Recommendation on Stable IPv6 Interface Identifiers</title>
            <author initials="F." surname="Gont" fullname="F. Gont">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A." surname="Cooper" fullname="A. Cooper">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="D." surname="Thaler" fullname="D. Thaler">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="W." surname="Liu" fullname="W. Liu">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2017" month="February"/>
            <abstract>
              <t>This document changes the recommended default Interface Identifier (IID) generation scheme for cases where Stateless Address Autoconfiguration (SLAAC) is used to generate a stable IPv6 address. It recommends using the mechanism specified in RFC 7217 in such cases, and recommends against embedding stable link-layer addresses in IPv6 IIDs.  It formally updates RFC 2464, RFC 2467, RFC 2470, RFC 2491, RFC 2492, RFC 2497, RFC 2590, RFC 3146, RFC 3572, RFC 4291, RFC 4338, RFC 4391, RFC 5072, and RFC 5121.  This document does not change any existing recommendations concerning the use of temporary addresses as specified in RFC 4941.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8064"/>
          <seriesInfo name="DOI" value="10.17487/RFC8064"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" quoteTitle="true" derivedAnchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author initials="B." surname="Leiba" fullname="B. Leiba">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2017" month="May"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8200" target="https://www.rfc-editor.org/info/rfc8200" quoteTitle="true" derivedAnchor="RFC8200">
          <front>
            <title>Internet Protocol, Version 6 (IPv6) Specification</title>
            <author initials="S." surname="Deering" fullname="S. Deering">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="R." surname="Hinden" fullname="R. Hinden">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2017" month="July"/>
            <abstract>
              <t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="86"/>
          <seriesInfo name="RFC" value="8200"/>
          <seriesInfo name="DOI" value="10.17487/RFC8200"/>
        </reference>
      </references>
      <references pn="section-7.2">
        <name slugifiedName="name-informative-references">Informative References</name>
        <reference anchor="CFR-90" target="https://www.ecfr.gov/cgi-bin/text-idx?node=pt47.5.90&amp;rgn=div5" quoteTitle="true" derivedAnchor="CFR-90">
          <front>
            <title>Electronic Code of Federal Regulations</title>
            <author>
              <organization showOnFrontPage="true">e-CFR</organization>
            </author>
          </front>
          <refcontent>Title 47, Part 90 - PRIVATE LAND MOBILE RADIO SERVICES</refcontent>
        </reference>
        <reference anchor="CFR-90.7" target="https://www.ecfr.gov/cgi-bin/text-idx?node=pt47.5.90&amp;rgn=div5#se47.5.90_17" quoteTitle="true" derivedAnchor="CFR-90.7">
          <front>
            <title>Electronic Code of Federal Regulations</title>
            <author>
              <organization showOnFrontPage="true">e-CFR</organization>
            </author>
          </front>
          <refcontent>Title 47, CFR 90.7 - Definitions</refcontent>
        </reference>
        <reference anchor="CFR-95" target="https://www.ecfr.gov/cgi-bin/text-idx?node=pt47.5.95&amp;rgn=div5" quoteTitle="true" derivedAnchor="CFR-95">
          <front>
            <title>Electronic Code of Federal Regulations</title>
            <author>
              <organization showOnFrontPage="true">e-CFR</organization>
            </author>
          </front>
          <refcontent>Title 47, CFR 95 - PERSONAL RADIO SERVICES</refcontent>
        </reference>
        <reference anchor="ETSI-sec-archi" target="http://www.etsi.org/deliver/etsi_ts/102900_102999/102940/01.02.01_60/ts_102940v010201p.pdf" quoteTitle="true" derivedAnchor="ETSI-sec-archi">
          <front>
            <title>Intelligent Transport Systems (ITS); Security; ITS communications security architecture and security management</title>
            <seriesInfo name="ETSI" value="TS 102 940 V1.2.1"/>
            <author/>
            <date month="November" year="2016"/>
          </front>
        </reference>
        <reference anchor="IEEE-1609.2" target="http://ieeexplore.ieee.org/document/7426684" quoteTitle="true" derivedAnchor="IEEE-1609.2">
          <front>
            <title>IEEE Standard for Wireless Access in Vehicular Environments--Security Services for Applications and Management Messages</title>
            <seriesInfo name="DOI" value="10.1109/IEEESTD.2016.7426684"/>
            <seriesInfo name="IEEE Standard" value="1609.2-2016"/>
            <author>
              <organization showOnFrontPage="true">IEEE</organization>
            </author>
            <date month="March" year="2016"/>
          </front>
        </reference>
        <reference anchor="IEEE-1609.3" target="http://ieeexplore.ieee.org/document/7458115" quoteTitle="true" derivedAnchor="IEEE-1609.3">
          <front>
            <title>IEEE Standard for Wireless Access in Vehicular Environments (WAVE) -- Networking Services</title>
            <seriesInfo name="DOI" value="10.1109/IEEESTD.2016.7458115"/>
            <seriesInfo name="IEEE Standard" value="1609.3-2016"/>
            <author>
              <organization showOnFrontPage="true">IEEE</organization>
            </author>
            <date month="April" year="2016"/>
          </front>
        </reference>
        <reference anchor="IEEE-1609.4" target="http://ieeexplore.ieee.org/document/7435228" quoteTitle="true" derivedAnchor="IEEE-1609.4">
          <front>
            <title>IEEE Standard for Wireless Access in Vehicular Environments (WAVE) -- Multi-Channel Operation</title>
            <seriesInfo name="DOI" value="10.1109/IEEESTD.2016.7435228"/>
            <seriesInfo name="IEEE Standard" value="1609.4-2016"/>
            <author>
              <organization showOnFrontPage="true">IEEE</organization>
            </author>
            <date month="March" year="2016"/>
          </front>
        </reference>
        <reference anchor="IEEE-802.11-2007" target="https://ieeexplore.ieee.org/document/4248378" quoteTitle="true" derivedAnchor="IEEE-802.11-2007">
          <front>
            <title>IEEE Standard for Information Technology - Telecommunications and Information Exchange Between Systems - Local and Metropolitan Area Networks - Specific Requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications</title>
            <seriesInfo name="DOI" value="10.1109/IEEESTD.2007.373646"/>
            <seriesInfo name="IEEE Standard" value="802.11-2007"/>
            <author>
              <organization showOnFrontPage="true">IEEE</organization>
            </author>
            <date month="June" year="2007"/>
          </front>
        </reference>
        <reference anchor="IEEE-802.11-2012" target="https://ieeexplore.ieee.org/document/6419735" quoteTitle="true" derivedAnchor="IEEE-802.11-2012">
          <front>
            <title>IEEE Standard for Information technology--Telecommunications and information exchange between systems Local and metropolitan area networks--Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications</title>
            <seriesInfo name="DOI" value="10.1109/IEEESTD.2012.6178212"/>
            <seriesInfo name="IEEE Standard" value="802.11-2012"/>
            <author>
              <organization showOnFrontPage="true">IEEE</organization>
            </author>
            <date month="March" year="2012"/>
          </front>
        </reference>
        <reference anchor="IEEE-802.11p-2010" target="https://standards.ieee.org/standard/802_11p-2010.html" quoteTitle="true" derivedAnchor="IEEE-802.11p-2010">
          <front>
            <title>IEEE Standard for Information technology - Telecommunications and information exchange between systems - Local and metropolitan area networks - Specific requirements, Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, Amendment 6: Wireless Access in Vehicular Environments</title>
            <seriesInfo name="DOI" value="10.1109/IEEESTD.2010.5514475"/>
            <seriesInfo name="IEEE Standard" value="802.11p-2010"/>
            <author>
              <organization showOnFrontPage="true">IEEE</organization>
            </author>
            <date month="July" year="2010"/>
          </front>
        </reference>
        <reference anchor="IEEE-802.3-2012" target="https://ieeexplore.ieee.org/document/6419735" quoteTitle="true" derivedAnchor="IEEE-802.3-2012">
          <front>
            <title>IEEE Standard for Ethernet</title>
            <seriesInfo name="DOI" value="10.1109/IEEESTD.2012.6419735"/>
            <seriesInfo name="IEEE Standard" value="802.3-2012"/>
            <author>
              <organization showOnFrontPage="true">IEEE</organization>
            </author>
            <date month="December" year="2012"/>
          </front>
        </reference>
        <reference anchor="I-D.ietf-mboned-ieee802-mcast-problems" quoteTitle="true" target="https://tools.ietf.org/html/draft-ietf-mboned-ieee802-mcast-problems-11" derivedAnchor="IEEE802-MCAST">
          <front>
            <title>Multicast Considerations over IEEE 802 Wireless Media</title>
            <author initials="C" surname="Perkins" fullname="Charles Perkins">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="M" surname="McBride" fullname="Mike McBride">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="D" surname="Stanley" fullname="Dorothy Stanley">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="W" surname="Kumari" fullname="Warren Kumari">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J" surname="Zuniga" fullname="Juan Zuniga">
              <organization showOnFrontPage="true"/>
            </author>
            <date month="December" day="11" year="2019"/>
            <abstract>
              <t>Well-known issues with multicast have prevented the deployment of multicast in 802.11 (wifi) and other local-area wireless environments.  This document describes the problems of known limitations with wireless (primarily 802.11) Layer-2 multicast.  Also described are certain multicast enhancement features that have been specified by the IETF, and by IEEE 802, for wireless media, as well as some operational choices that can be taken to improve the performance of the network.  Finally, some recommendations are provided about the usage and combination of these features and operational choices.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-mboned-ieee802-mcast-problems-11"/>
          <format type="TXT" target="http://www.ietf.org/internet-drafts/draft-ietf-mboned-ieee802-mcast-problems-11.txt"/>
          <refcontent>Work in Progress</refcontent>
        </reference>
        <reference anchor="I-D.ietf-ipwave-vehicular-networking" quoteTitle="true" target="https://tools.ietf.org/html/draft-ietf-ipwave-vehicular-networking-12" derivedAnchor="IPWAVE">
          <front>
            <title>IP Wireless Access in Vehicular Environments (IPWAVE): Problem Statement and Use Cases</title>
            <author initials="J" surname="Jeong" fullname="Jaehoon Jeong">
              <organization showOnFrontPage="true"/>
            </author>
            <date month="October" day="3" year="2019"/>
            <abstract>
              <t>This document discusses the problem statement and use cases of IP- based vehicular networking for Intelligent Transportation Systems (ITS).  The main scenarios of vehicular communications are vehicle- to-vehicle (V2V), vehicle-to-infrastructure (V2I), and vehicle-to- everything (V2X) communications.  First, this document explains use cases using V2V, V2I, and V2X networking.  Next, it makes a problem statement about key aspects in IP-based vehicular networking, such as IPv6 Neighbor Discovery, Mobility Management, and Security &amp; Privacy. For each key aspect, this document specifies requirements in IP-based vehicular networking, and suggests the direction of solutions satisfying those requirements.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ipwave-vehicular-networking-12"/>
          <format type="TXT" target="http://www.ietf.org/internet-drafts/draft-ietf-ipwave-vehicular-networking-12.txt"/>
          <refcontent>Work in Progress</refcontent>
        </reference>
        <reference anchor="RFC3753" target="https://www.rfc-editor.org/info/rfc3753" quoteTitle="true" derivedAnchor="RFC3753">
          <front>
            <title>Mobility Related Terminology</title>
            <author initials="J." surname="Manner" fullname="J. Manner" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="M." surname="Kojo" fullname="M. Kojo" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2004" month="June"/>
            <abstract>
              <t>There is a need for common definitions of terminology in the work to be done around IP mobility.  This document defines terms for mobility related terminology.  The document originated out of work done in the Seamoby Working Group but has broader applicability for terminology used in IETF-wide discourse on technology for mobility and IP networks.  Other working groups dealing with mobility may want to take advantage of this terminology.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3753"/>
          <seriesInfo name="DOI" value="10.17487/RFC3753"/>
        </reference>
        <reference anchor="RFC3963" target="https://www.rfc-editor.org/info/rfc3963" quoteTitle="true" derivedAnchor="RFC3963">
          <front>
            <title>Network Mobility (NEMO) Basic Support Protocol</title>
            <author initials="V." surname="Devarapalli" fullname="V. Devarapalli">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="R." surname="Wakikawa" fullname="R. Wakikawa">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A." surname="Petrescu" fullname="A. Petrescu">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="P." surname="Thubert" fullname="P. Thubert">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2005" month="January"/>
            <abstract>
              <t>This document describes the Network Mobility (NEMO) Basic Support protocol that enables Mobile Networks to attach to different points in the Internet.  The protocol is an extension of Mobile IPv6 and allows session continuity for every node in the Mobile Network as the network moves.  It also allows every node in the Mobile Network to be reachable while moving around.  The Mobile Router, which connects the network to the Internet, runs the NEMO Basic Support protocol with its Home Agent.  The protocol is designed so that network mobility is transparent to the nodes inside the Mobile Network.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3963"/>
          <seriesInfo name="DOI" value="10.17487/RFC3963"/>
        </reference>
        <reference anchor="RFC3971" target="https://www.rfc-editor.org/info/rfc3971" quoteTitle="true" derivedAnchor="RFC3971">
          <front>
            <title>SEcure Neighbor Discovery (SEND)</title>
            <author initials="J." surname="Arkko" fullname="J. Arkko" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Kempf" fullname="J. Kempf">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="B." surname="Zill" fullname="B. Zill">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="P." surname="Nikander" fullname="P. Nikander">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2005" month="March"/>
            <abstract>
              <t>IPv6 nodes use the Neighbor Discovery Protocol (NDP) to discover other nodes on the link, to determine their link-layer addresses to find routers, and to maintain reachability information about the paths to active neighbors.  If not secured, NDP is vulnerable to various attacks.  This document specifies security mechanisms for NDP.  Unlike those in the original NDP specifications, these mechanisms do not use IPsec.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3971"/>
          <seriesInfo name="DOI" value="10.17487/RFC3971"/>
        </reference>
        <reference anchor="RFC3972" target="https://www.rfc-editor.org/info/rfc3972" quoteTitle="true" derivedAnchor="RFC3972">
          <front>
            <title>Cryptographically Generated Addresses (CGA)</title>
            <author initials="T." surname="Aura" fullname="T. Aura">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2005" month="March"/>
            <abstract>
              <t>This document describes a method for binding a public signature key to an IPv6 address in the Secure Neighbor Discovery (SEND) protocol.  Cryptographically Generated Addresses (CGA) are IPv6 addresses for which the interface identifier is generated by computing a cryptographic one-way hash function from a public key and auxiliary parameters.  The binding between the public key and the address can be verified by re-computing the hash value and by comparing the hash with the interface identifier.  Messages sent from an IPv6 address can be protected by attaching the public key and auxiliary parameters and by signing the message with the corresponding private key.  The protection works without a certification authority or any security infrastructure.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3972"/>
          <seriesInfo name="DOI" value="10.17487/RFC3972"/>
        </reference>
        <reference anchor="RFC5889" target="https://www.rfc-editor.org/info/rfc5889" quoteTitle="true" derivedAnchor="RFC5889">
          <front>
            <title>IP Addressing Model in Ad Hoc Networks</title>
            <author initials="E." surname="Baccelli" fullname="E. Baccelli" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="M." surname="Townsley" fullname="M. Townsley" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2010" month="September"/>
            <abstract>
              <t>This document describes a model for configuring IP addresses and subnet prefixes on the interfaces of routers which connect to links with undetermined connectivity properties.  This document is not an  Internet Standards Track specification; it is published for  informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5889"/>
          <seriesInfo name="DOI" value="10.17487/RFC5889"/>
        </reference>
        <reference anchor="RFC6959" target="https://www.rfc-editor.org/info/rfc6959" quoteTitle="true" derivedAnchor="RFC6959">
          <front>
            <title>Source Address Validation Improvement (SAVI) Threat Scope</title>
            <author initials="D." surname="McPherson" fullname="D. McPherson">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="F." surname="Baker" fullname="F. Baker">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Halpern" fullname="J. Halpern">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2013" month="May"/>
            <abstract>
              <t>The Source Address Validation Improvement (SAVI) effort aims to complement ingress filtering with finer-grained, standardized IP source address validation.  This document describes threats enabled by IP source address spoofing both in the global and finer-grained context, describes currently available solutions and challenges, and provides a starting point analysis for finer-grained (host granularity) anti-spoofing work.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6959"/>
          <seriesInfo name="DOI" value="10.17487/RFC6959"/>
        </reference>
        <reference anchor="RFC7721" target="https://www.rfc-editor.org/info/rfc7721" quoteTitle="true" derivedAnchor="RFC7721">
          <front>
            <title>Security and Privacy Considerations for IPv6 Address Generation Mechanisms</title>
            <author initials="A." surname="Cooper" fullname="A. Cooper">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="F." surname="Gont" fullname="F. Gont">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="D." surname="Thaler" fullname="D. Thaler">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2016" month="March"/>
            <abstract>
              <t>This document discusses privacy and security considerations for several IPv6 address generation mechanisms, both standardized and non-standardized.  It evaluates how different mechanisms mitigate different threats and the trade-offs that implementors, developers, and users face in choosing different addresses or address generation mechanisms.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7721"/>
          <seriesInfo name="DOI" value="10.17487/RFC7721"/>
        </reference>
        <reference anchor="RFC8065" target="https://www.rfc-editor.org/info/rfc8065" quoteTitle="true" derivedAnchor="RFC8065">
          <front>
            <title>Privacy Considerations for IPv6 Adaptation-Layer Mechanisms</title>
            <author initials="D." surname="Thaler" fullname="D. Thaler">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2017" month="February"/>
            <abstract>
              <t>This document discusses how a number of privacy threats apply to technologies designed for IPv6 over various link-layer protocols, and it provides advice to protocol designers on how to address such threats in adaptation-layer specifications for IPv6 over such links.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8065"/>
          <seriesInfo name="DOI" value="10.17487/RFC8065"/>
        </reference>
        <reference anchor="RFC8505" target="https://www.rfc-editor.org/info/rfc8505" quoteTitle="true" derivedAnchor="RFC8505">
          <front>
            <title>Registration Extensions for IPv6 over Low-Power Wireless Personal Area Network (6LoWPAN) Neighbor Discovery</title>
            <author initials="P." surname="Thubert" fullname="P. Thubert" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="E." surname="Nordmark" fullname="E. Nordmark">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Chakrabarti" fullname="S. Chakrabarti">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="C." surname="Perkins" fullname="C. Perkins">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2018" month="November"/>
            <abstract>
              <t>This specification updates RFC 6775 -- the Low-Power Wireless Personal Area Network (6LoWPAN) Neighbor Discovery specification -- to clarify the role of the protocol as a registration technique and simplify the registration operation in 6LoWPAN routers, as well as to provide enhancements to the registration capabilities and mobility detection for different network topologies, including the Routing Registrars performing routing for host routes and/or proxy Neighbor Discovery in a low-power network.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8505"/>
          <seriesInfo name="DOI" value="10.17487/RFC8505"/>
        </reference>
        <reference anchor="SHA256" target="https://csrc.nist.gov/publications/detail/fips/180/4/final" quoteTitle="true" derivedAnchor="SHA256">
          <front>
            <title>Secure Hash Standard (SHS)</title>
            <seriesInfo name="DOI" value="10.6028/NIST.FIPS.180-4"/>
            <seriesInfo name="FIPS" value="180-4"/>
            <author>
              <organization showOnFrontPage="true">National Institute of Standards and Technology</organization>
            </author>
            <date month="August" year="2015"/>
          </front>
        </reference>
      </references>
    </references>
    <section anchor="i802.11p" numbered="true" toc="include" removeInRFC="false" pn="section-appendix.a">
      <name slugifiedName="name-80211p">802.11p</name>
      <t pn="section-appendix.a-1">
        The term "802.11p" is an earlier definition.  The behavior of
        "802.11p" networks is rolled in <xref target="IEEE-802.11-2016" format="default" sectionFormat="of" derivedContent="IEEE-802.11-2016"/>.  In that document, the term "802.11p" disappears.
        Instead, each 802.11p feature is conditioned by the IEEE
        Management Information Base (MIB) attribute "OCBActivated"
        <xref target="IEEE-802.11-2016" format="default" sectionFormat="of" derivedContent="IEEE-802.11-2016"/>.  Whenever OCBActivated is
        set to "true", the IEEE Std 802.11-OCB state is activated.  For
        example, an 802.11 STAtion operating outside the context of a
        BSS has the OCBActivated flag set.  Such a
        station, when it has the flag set, uses a BSS identifier equal
        to ff:ff:ff:ff:ff:ff.
      </t>
    </section>
    <section anchor="introduced-by-OCB" numbered="true" toc="include" removeInRFC="false" pn="section-appendix.b">
      <name slugifiedName="name-aspects-introduced-by-ocb-m">Aspects Introduced by OCB Mode to 802.11</name>
      <t pn="section-appendix.b-1">
        In IEEE 802.11-OCB mode, all nodes in the wireless range
        can directly communicate with each other without involving
        authentication or association procedures.  In OCB mode, the
        manner in which channels are selected and used is simplified
        compared to when in BSS mode.  Contrary to BSS mode, at the link
        layer, it is necessary to statically set the same channel
        number (or frequency) on two stations that need to communicate
        with each other (in BSS mode, this channel set operation is
        performed automatically during 'scanning').  The manner in
        which stations set their channel number in OCB mode is not
        specified in this document.  Stations STA1 and STA2 can
        exchange IP packets only if they are set to the same channel.
        At the IP layer, they then discover each other by using the IPv6
        Neighbor Discovery protocol.  The allocation of a particular
        channel for a particular use is defined statically in
        standards authored by ETSI in Europe, the FCC in the United States of America, and
        similar organizations in South Korea, Japan, and other parts of
        the world.
      </t>
      <t pn="section-appendix.b-2">
	Briefly, the IEEE 802.11-OCB mode has the following
	properties:

      </t>
      <ul spacing="normal" bare="false" empty="false" pn="section-appendix.b-3">
        <li pn="section-appendix.b-3.1"> 
            The use by each node of a 'wildcard' BSS identifier (BSSID) (i.e., each bit
            of the BSSID is set to 1).
          </li>
        <li pn="section-appendix.b-3.2"> No IEEE 802.11 beacon frames are transmitted. </li>
        <li pn="section-appendix.b-3.3"> No authentication is required in order to be able to communicate.</li>
        <li pn="section-appendix.b-3.4"> No association is needed in order to be able to communicate.</li>
        <li pn="section-appendix.b-3.5"> No encryption is provided in order to be able to communicate.</li>
        <li pn="section-appendix.b-3.6"> Flag dot11OCBActivated is set to "true". </li>
      </ul>
      <t pn="section-appendix.b-4">

	All the nodes in the radio communication range (IP-OBU and IP-RSU)
	receive all the messages transmitted (IP-OBU and IP-RSU) within the
	radio communication range.  The MAC CDMA function resolves any
	eventual conflict(s).
      </t>
      <t pn="section-appendix.b-5">
        The message exchange diagram in <xref target="fig_mess-exch" format="default" sectionFormat="of" derivedContent="Figure 1"/>
        illustrates a comparison between traditional 802.11 and 802.11
        in OCB mode.  The 'Data' messages can be IP packets such as
        HTTP or others.  Other 802.11 management and control frames
        (non-IP) may be transmitted, as specified in the 802.11
        standard.  The names of these messages as
        currently specified by the 802.11 standard are listed in <xref target="OCB-messages" format="default" sectionFormat="of" derivedContent="Appendix F"/>.
      </t>
      <figure anchor="fig_mess-exch" align="left" suppress-title="false" pn="figure-1">
        <name slugifiedName="name-difference-between-messages">Difference between Messages Exchanged                         on 802.11 (Left) and 802.11-OCB (Right)</name>
        <artwork align="center" name="" type="" alt="" pn="section-appendix.b-6.1">
   STA                    AP              STA1                   STA2
   |                      |               |                      |
   |&lt;------ Beacon -------|               |&lt;------ Data --------&gt;|
   |                      |               |                      |
   |---- Probe Req. -----&gt;|               |&lt;------ Data --------&gt;|
   |&lt;--- Probe Res. ------|               |                      |
   |                      |               |&lt;------ Data --------&gt;|
   |---- Auth Req. ------&gt;|               |                      |
   |&lt;--- Auth Res. -------|               |&lt;------ Data --------&gt;|
   |                      |               |                      |
   |---- Asso Req. ------&gt;|               |&lt;------ Data --------&gt;|
   |&lt;--- Asso Res. -------|               |                      |
   |                      |               |&lt;------ Data --------&gt;|
   |&lt;------ Data --------&gt;|               |                      |
   |&lt;------ Data --------&gt;|               |&lt;------ Data --------&gt;|

      (i) 802.11 Infrastructure mode         (ii) 802.11-OCB mode </artwork>
      </figure>
      <t pn="section-appendix.b-7">
	The 802.11-OCB interface was specified in <xref target="IEEE-802.11p-2010" format="default" sectionFormat="of" derivedContent="IEEE-802.11p-2010"/>, Amendment 6: Wireless
	Access in Vehicular Environments, as an amendment
	to <xref target="IEEE-802.11-2007" format="default" sectionFormat="of" derivedContent="IEEE-802.11-2007"/>.  Since then, this amendment
	has been integrated into <xref target="IEEE-802.11-2012" format="default" sectionFormat="of" derivedContent="IEEE-802.11-2012"/> and <xref target="IEEE-802.11-2016" format="default" sectionFormat="of" derivedContent="IEEE-802.11-2016"/>.
      </t>
      <t pn="section-appendix.b-8">
	In <xref target="IEEE-802.11p-2010" format="default" sectionFormat="of" derivedContent="IEEE-802.11p-2010"/>, anything qualified specifically as
	"OCBActivated" or "outside the context of a basic service"
	that is set to be "true" actually refers to OCB aspects
	introduced to 802.11.
      </t>
      <t pn="section-appendix.b-9">
        In order to delineate the aspects introduced by 802.11-OCB to
        802.11, we refer to the earlier <xref target="IEEE-802.11p-2010" format="default" sectionFormat="of" derivedContent="IEEE-802.11p-2010"/>.  The amendment is concerned with
        vehicular communications, where the wireless link is similar
        to that of Wireless LAN (using a PHY layer specified by
        802.11a/b/g/n) but needs to cope with the high mobility
        factor inherent in scenarios of communications between moving
        vehicles and between vehicles and fixed infrastructure
        deployed along roads.  While 'p' is a letter identifying the
        Amendment, just like 'a', 'b', 'g', and 'n' are, 'p' is concerned
        more with MAC modifications and is slightly concerned with PHY
        modifications; the others are mainly about PHY modifications.
        It is possible in practice to combine a 'p' MAC with an 'a'
        PHY by operating outside the context of a BSS with Orthogonal
	Frequency Division
      Multiplexing (OFDM) at
        5.4 GHz and 5.9 GHz.
      </t>
      <t pn="section-appendix.b-10">
        The 802.11-OCB links are specified to be as compatible as
        possible with the behavior of 802.11a/b/g/n and future
        generation IEEE WLAN links.  From the IP perspective, an
        802.11-OCB MAC layer offers practically the same interface to
        IP as 802.11a/b/g/n and 802.3.  A packet sent by an IP-OBU
        may be received by one or multiple IP-RSUs.  The link-layer
        resolution is performed by using the IPv6 Neighbor Discovery
        protocol.
      </t>
      <t pn="section-appendix.b-11">
        To support this similarity statement (IPv6 is layered on top
        of LLC on top of 802.11-OCB in the same way that IPv6 is
        layered on top of LLC on top of 802.11a/b/g/n (for WLAN) or
        on top of LLC on top of 802.3 (for Ethernet)), it is
        useful to analyze the differences between the 802.11-OCB and
        802.11 specifications.  During this analysis, we note that
        whereas 802.11-OCB lists relatively complex and numerous
        changes to the MAC layer (and very few to the PHY layer),
        there are only a few characteristics that may be important
        for an implementation transmitting IPv6 packets on 802.11-OCB
        links.
      </t>
      <t pn="section-appendix.b-12">
        The most important 802.11-OCB aspect that influences the IPv6
        functioning is the OCB characteristic; an additional, less
        direct influence is the maximum bandwidth afforded by the PHY
        modulation/demodulation methods and channel access specified
        by 802.11-OCB.  The maximum bandwidth theoretically possible
        in 802.11-OCB is 54 Mbit/s (when using, for example, the
        following parameters: a 20 MHz channel; modulation of 64-QAM;
        a coding rate R of 3/4). With regard to IP over 802.11-OCB, in
	practice, a commonly observed figure is 12 Mbit/s; this bandwidth allows
        the operation of a wide range of protocols relying on IPv6.
      </t>
      <ul spacing="normal" bare="false" empty="false" pn="section-appendix.b-13">
        <li pn="section-appendix.b-13.1">
            Operation outside the context of a BSS (OCB): The 802.11-OCB links
	    (previously 802.11p) are operated without a BSS.  This means that IEEE 802.11
            beacon, Association Request/Response, Authentication
            Request/Response, and similar frames are not used. The used
            identifier of BSS (BSSID) always has a hexadecimal value of
            0xffffffffffff (48 '1' bits, represented as MAC address
            ff:ff:ff:ff:ff:ff; otherwise, the 'wildcard' BSSID), as
            opposed to an arbitrary BSSID value set by an administrator
            (e.g., 'My-Home-AccessPoint').  The OCB operation -- namely,
            the lack of beacon-based scanning and lack of
            authentication -- should be taken into account when the
            Mobile IPv6 protocol <xref target="RFC6275" format="default" sectionFormat="of" derivedContent="RFC6275"/> and the
            protocols for IP layer security <xref target="RFC4301" format="default" sectionFormat="of" derivedContent="RFC4301"/>
            are used.  The way these protocols adapt to OCB is not
            described in this document.
          </li>
        <li pn="section-appendix.b-13.2">
            Timing Advertisement: This is a new message defined in
            802.11-OCB that does not exist in 802.11a/b/g/n.  This
            message is used by stations to inform other stations about
            the value of time.  It is similar to the time delivered
            by a Global Navigation Satellite System (GNSS) (e.g., Galileo, GPS, etc.) or by a cellular
            system.  This message is optional for implementation.
          </li>
        <li pn="section-appendix.b-13.3">
            Frequency range: This is a characteristic of the PHY layer; it has
	    almost no impact on the interface between MAC and IP. However, it is worth considering that the
            frequency range is regulated by a regional authority
            (ARCEP, ECC/CEPT based on ENs from ETSI, FCC, etc.); as
            part of the regulation process, specific applications are
            associated with specific frequency ranges.  
   In the case of 802.11-OCB, the regulator associates a set of frequency
   ranges or slots within a band to the use of applications of vehicular
   communications in a band known as "5.9 GHz".
            The 5.9 GHz band is different from the 2.4 GHz and 5 GHz
            bands used by Wireless LAN. However, as with Wireless LAN, the
	    operation of 802.11-OCB in 5.9 GHz bands does not require a
	    license in the EU (in the US, the 5.9 GHz is a licensed band of
	    spectrum; for the fixed infrastructure, explicit FCC authorization
	    is required; for an on-board device, a 'licensed-by-rule' concept
	    applies, where rule certification conformity is required). Technical
            conditions are different from those of the "2.4 GHz"
            or "5 GHz" bands.  The allowed power levels and, implicitly, the
            maximum allowed distance between vehicles is 33 dBm for
            802.11-OCB (in Europe) compared to 20 dBm for Wireless
            LAN 802.11a/b/g/n; this leads to a maximum distance of
            approximately 1 km compared to approximately 50 m.
            Additionally, specific conditions related to congestion
            avoidance, jamming avoidance, and radar detection are
            imposed on the use of DSRC (in the US) and on the use of
            frequencies for Intelligent Transportation Systems (in
            the EU) compared to Wireless LAN (802.11a/b/g/n).
          </li>
        <li pn="section-appendix.b-13.4">
            'Half-rate' encoding: As the frequency range, this
            parameter is related to PHY and thus does not have much
            impact on the interface between the IP layer and the
            MAC layer.
          </li>
        <li pn="section-appendix.b-13.5">
            In vehicular communications using 802.11-OCB links, there
            are strong privacy requirements with respect to
            addressing.  While the 802.11-OCB standard does not
            specify anything in particular with respect to MAC
            addresses, in these settings, there is a strong need
            for a dynamic change of these addresses (as opposed to the
            non-vehicular settings -- real wall protection -- where
            fixed MAC addresses do not currently pose privacy
            risks).  This is further described in <xref target="Security" format="default" sectionFormat="of" derivedContent="Section 5"/>.  A relevant function is described in
            <xref target="IEEE-1609.3" format="default" sectionFormat="of" derivedContent="IEEE-1609.3"/>
            and <xref target="IEEE-1609.4" format="default" sectionFormat="of" derivedContent="IEEE-1609.4"/>.
          </li>
      </ul>
    </section>
    <section anchor="software-changes" numbered="true" toc="include" removeInRFC="false" pn="section-appendix.c">
      <name slugifiedName="name-changes-needed-on-an-80211a">Changes Needed on an 802.11a Software Driver to Become an 802.11-OCB Driver</name>
      <t pn="section-appendix.c-1">
        The 802.11p amendment modifies both the 802.11 stack's
        physical and MAC layers, but all the induced modifications
        can be quite easily obtained by modifying an existing
        802.11a ad hoc stack.
      </t>
      <t pn="section-appendix.c-2">
        The conditions for 802.11a hardware to be compliant with 802.11-OCB are as
	follows:
      </t>
      <ul spacing="normal" bare="false" empty="false" pn="section-appendix.c-3">
        <li pn="section-appendix.c-3.1">
	    The PHY entity shall be an OFDM system.  It must support the frequency
	    bands on which the regulator recommends the use of ITS
	    communications -- for example, using an IEEE 802.11-OCB layer of
	    5875 MHz to 5925 MHz in France.
          </li>
        <li pn="section-appendix.c-3.2">
	    The OFDM system must provide a "half-clocked" operation
	    using 10 MHz channel spacings.
          </li>
        <li pn="section-appendix.c-3.3">
            The chip transmit spectrum mask must be compliant with the
            "Transmit spectrum mask" from the IEEE 802.11p amendment
            (but experimental environments do not require compliance).
          </li>
        <li pn="section-appendix.c-3.4">
            The chip should be able to transmit up to 44.8 dBm when
            used in the United States and up to
            33 dBm in Europe; other regional conditions apply.
          </li>
      </ul>
      <t pn="section-appendix.c-4">
        Changes needed on the network stack in OCB mode are as follows:
      </t>
      <ul spacing="normal" bare="false" empty="false" pn="section-appendix.c-5">
        <li pn="section-appendix.c-5.1">
          <t pn="section-appendix.c-5.1.1">
            Physical layer:
          </t>
          <ul spacing="normal" bare="false" empty="false" pn="section-appendix.c-5.1.2">
            <li pn="section-appendix.c-5.1.2.1">
                Orthogonal frequency-division multiple access 
                The chip must use the Orthogonal Frequency Division Multiple
                Access (OFDMA) encoding mode.
              </li>
            <li pn="section-appendix.c-5.1.2.2">
                The chip must be set to half-mode rate mode (the
                internal clock frequency is divided by two).                
              </li>
            <li pn="section-appendix.c-5.1.2.3">
                The chip must use dedicated channels and should allow
                the use of higher emission powers.  This may require
                modifications to the local computer file that
                describes regulatory domains rules if used by the
                kernel to enforce local specific restrictions.  Such
                modifications to the local computer file must respect
                the location-specific regulatory rules.
              </li>
          </ul>
        </li>
        <li pn="section-appendix.c-5.2">
          <t pn="section-appendix.c-5.2.1">
MAC layer:
</t>
          <ul spacing="normal" bare="false" empty="false" pn="section-appendix.c-5.2.2">
            <li pn="section-appendix.c-5.2.2.1">
                All management frames (beacons, join, leave, and
                others) emission and reception must be disabled,
                except for frames of subtype Action and Timing
                Advertisement (defined below).
              </li>
            <li pn="section-appendix.c-5.2.2.2">
                No encryption key or method must be used.
              </li>
            <li pn="section-appendix.c-5.2.2.3">
                Packet emission and reception must be performed as in
                ad hoc mode using the wildcard BSSID
                (ff:ff:ff:ff:ff:ff).
              </li>
            <li pn="section-appendix.c-5.2.2.4">
                The functions related to joining a BSS (Association
                Request/Response) and authentication
                (Authentication Request/Reply, Challenge) are not
                called.
              </li>
            <li pn="section-appendix.c-5.2.2.5">
                The beacon interval is always set to 0 (zero).
              </li>
            <li pn="section-appendix.c-5.2.2.6">
                Timing Advertisement frames, defined in the
                amendment, should be supported.  The upper layer
                should be able to trigger such frames emission and retrieve
		information contained in the received Timing
                Advertisements.
              </li>
          </ul>
        </li>
      </ul>
    </section>
    <section anchor="epd" numbered="true" toc="include" removeInRFC="false" pn="section-appendix.d">
      <name slugifiedName="name-protocol-layering">Protocol Layering</name>
      <t pn="section-appendix.d-1">
        A more theoretical and detailed view of layer stacking and
        interfaces between the IP layer and 802.11-OCB layers is
        illustrated in <xref target="fig_epd" format="default" sectionFormat="of" derivedContent="Figure 2"/>.  The IP layer
        operates on top of EtherType Protocol Discrimination
        (EPD). This discrimination layer is described in <xref target="IEEE-802.3-2012" format="default" sectionFormat="of" derivedContent="IEEE-802.3-2012"/>. The interface between IPv6 and EPD is the LLC_SAP
        (Link Layer Control Service Access Point).
      </t>
      <figure anchor="fig_epd" align="left" suppress-title="false" pn="figure-2">
        <name slugifiedName="name-ethertype-protocol-discrimi">EtherType Protocol Discrimination</name>
        <artwork align="center" name="" type="" alt="" pn="section-appendix.d-2.1">
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                 IPv6                  |
 +-+-+-+-+-+-{            }+-+-+-+-+-+-+-+
             {   LLC_SAP  }                 802.11-OCB
 +-+-+-+-+-+-{            }+-+-+-+-+-+-+-+  Boundary
 |            EPD          |       |     |
 |                         | MLME  |     |
 +-+-+-{  MAC_SAP   }+-+-+-|  MLME_SAP   |
 |      MAC Sublayer       |       |     |  802.11-OCB
 |     and ch. coord.      |       | SME |  Services
 +-+-+-{   PHY_SAP  }+-+-+-+-+-+-+-|     |
 |                         | PLME  |     |
 |            PHY Layer    |   PLME_SAP  |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ </artwork>
      </figure>
    </section>
    <section anchor="design-considerations" numbered="true" toc="include" removeInRFC="false" pn="section-appendix.e">
      <name slugifiedName="name-design-considerations">Design Considerations</name>
      <t pn="section-appendix.e-1">
        The networks defined by 802.11-OCB are in many ways similar to
        other networks of the 802.11 family. In theory, the
        transportation of IPv6 over 802.11-OCB could be very similar to
        the operation of IPv6 over other networks of the 802.11
        family.  However, the high mobility, strong link asymmetry, and
        very short connection makes the 802.11-OCB link significantly
        different from other 802.11 networks. Also, automotive
        applications have specific requirements for reliability,
        security, and privacy, which further add to the particularity
        of the 802.11-OCB link.
      </t>
    </section>
    <section anchor="OCB-messages" numbered="true" toc="include" removeInRFC="false" pn="section-appendix.f">
      <name slugifiedName="name-ieee-80211-messages-transmi">IEEE 802.11 Messages Transmitted in OCB Mode</name>
      <t pn="section-appendix.f-1">
        At the time of writing, this is the list of
        IEEE 802.11 messages that may be transmitted in OCB mode,
        i.e., when dot11OCBActivated is true in a STA:

      </t>
      <ul spacing="normal" bare="false" empty="false" pn="section-appendix.f-2">
        <li pn="section-appendix.f-2.1">
            The STA may send management frames of subtype Action and,
            if the STA maintains a TSF Timer, subtype Timing
            Advertisement.
          </li>
        <li pn="section-appendix.f-2.2">
            The STA may send control frames except those of subtype
            PS-Poll, CF-End, and CF-End plus CFAck.
          </li>
        <li pn="section-appendix.f-2.3">
            The STA <bcp14>MUST</bcp14> send data frames of subtype QoS
            Data.
          </li>
      </ul>
    </section>
    <section anchor="example-packets" numbered="true" toc="include" removeInRFC="false" pn="section-appendix.g">
      <name slugifiedName="name-examples-of-packet-formats">Examples of Packet Formats</name>
      <t pn="section-appendix.g-1">
	This section describes an example of an IPv6 packet captured
	over an IEEE 802.11-OCB link.
      </t>
      <t pn="section-appendix.g-2">
        By way of example, we show that there is no modification in the
        headers when transmitted over 802.11-OCB networks -- they are
        transmitted like any other 802.11 and Ethernet packets.
      </t>
      <t pn="section-appendix.g-3">
        We describe an experiment for capturing an IPv6 packet on an
        802.11-OCB link.  In the topology depicted in <xref target="topo" format="default" sectionFormat="of" derivedContent="Figure 3"/>, the packet is an IPv6 Router Advertisement.
        This packet is emitted by a router on its 802.11-OCB
        interface.  The packet is captured on the host using a
        network protocol analyzer (e.g., Wireshark). The capture is
        performed in two different modes: direct mode and monitor
        mode.  The topology used during the capture is depicted below.
      </t>
      <t pn="section-appendix.g-4">
	The packet is captured on the host.  The host is an IP-OBU
	containing an 802.11 interface in Peripheral Component Interconnect
	(PCI) Express format (an Industrial Technology Research Institute
	(ITRI) product).  The kernel runs the ath5k software driver with
	modifications for OCB mode.  The capture tool is Wireshark.
	The file format for saving and analyzing is .pcap.  The packet is
	generated by the router, which is an IP-RSU (an ITRI
	product).
      </t>
      <figure anchor="topo" align="left" suppress-title="false" pn="figure-3">
        <name slugifiedName="name-topology-for-capturing-ip-p">Topology for Capturing IP Packets on 802.11-OCB</name>
        <artwork align="center" name="" type="" alt="" pn="section-appendix.g-5.1">
   +--------+                                +-------+
   |        |        802.11-OCB Link         |       |
---| Router |--------------------------------| Host  |
   |        |                                |       |
   +--------+                                +-------+  </artwork>
      </figure>
      <t pn="section-appendix.g-6">
        During several capture operations running from a few moments
        to several hours, no messages relevant to the BSSID contexts
        were captured (Association Request/Response, Authentication
        Req/Resp, or beacon).  This shows that the operation of
        802.11-OCB is outside the context of a BSSID.
      </t>
      <t pn="section-appendix.g-7">
        Overall, the captured message is identical to a capture of
        an IPv6 packet emitted on an 802.11b interface.  The contents
        are exactly the same.
      </t>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-g.1">
        <name slugifiedName="name-capture-in-monitor-mode">Capture in Monitor Mode</name>
        <t pn="section-g.1-1">
          The IPv6 RA packet captured in monitor mode is illustrated
          below.  The Radiotap header provides more flexibility for
          reporting the characteristics of frames.  The Radiotap header
          is prepended by this particular stack and operating system on
          the host machine to the RA packet received from the network
          (the Radiotap header is not present on the air).  The
          implementation-dependent Radiotap header is useful for
          piggybacking PHY information from the chip's registers as data
          in a packet that is understandable by userland applications using
          socket interfaces (the PHY interface can be, for example,
          power levels, data rate, or the ratio of signal to noise).
        </t>
        <t pn="section-g.1-2">
          The packet present on the air is formed by the IEEE 802.11 Data
          header, Logical Link Control header, IPv6 Base header, and
          ICMPv6 header.
        </t>
        <figure anchor="figA" align="left" suppress-title="false" pn="figure-4">
          <name slugifiedName="name-radiotap-header-v0">Radiotap Header v0</name>
          <artwork align="center" name="" type="" alt="" pn="section-g.1-3.1">
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|Header Revision|  Header Pad   |    Header Length              |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                         Present Flags                         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Data Rate     |             Pad                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
</artwork>
        </figure>
        <figure anchor="figB" align="left" suppress-title="false" pn="figure-5">
          <name slugifiedName="name-ieee-80211-data-header">IEEE 802.11 Data Header</name>
          <artwork align="center" name="" type="" alt="" pn="section-g.1-4.1">
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Type/Subtype and Frame Ctrl  |          Duration             | 
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                      Receiver Address...                       
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
... Receiver Address           |      Transmitter Address...    
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 ... Transmitter Address                                        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                            BSS ID...                           
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 ... BSS ID                     |  Frag Number and Seq Number   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+    
</artwork>
        </figure>
        <figure anchor="figC" align="left" suppress-title="false" pn="figure-6">
          <name slugifiedName="name-logical-link-control-header">Logical Link Control Header</name>
          <artwork align="center" name="" type="" alt="" pn="section-g.1-5.1">
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|      DSAP   |I|     SSAP    |C| Control Field | Org. Code...   
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 ... Organizational Code        |             Type              |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
</artwork>
        </figure>
        <figure anchor="figD" align="left" suppress-title="false" pn="figure-7">
          <name slugifiedName="name-ipv6-base-header">IPv6 Base Header</name>
          <artwork align="center" name="" type="" alt="" pn="section-g.1-6.1">
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|Version| Traffic Class |           Flow Label                  |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|         Payload Length        |  Next Header  |   Hop Limit   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
+                                                               +
|                                                               |
+                         Source Address                        +
|                                                               |
+                                                               +
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
+                                                               +
|                                                               |
+                      Destination Address                      +
|                                                               |
+                                                               +
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
</artwork>
        </figure>
        <figure anchor="figE" align="left" suppress-title="false" pn="figure-8">
          <name slugifiedName="name-router-advertisement">Router Advertisement</name>
          <artwork align="center" name="" type="" alt="" pn="section-g.1-7.1">
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     Type      |     Code      |          Checksum             |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Cur Hop Limit |M|O|  Reserved |       Router Lifetime         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                         Reachable Time                        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                          Retrans Timer                        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|   Options ...
+-+-+-+-+-+-+-+-+-+-+-+-  </artwork>
        </figure>
        <t pn="section-g.1-8">
          The value of the Data Rate field in the Radiotap header is set
          to 6 Mb/s.  This indicates the rate at which this RA was
          received.
        </t>
        <t pn="section-g.1-9">
          The value of the Transmitter Address in the IEEE 802.11 Data
          header is set to a 48-bit value.  The value of the destination
          address is 33:33:00:00:00:1 (all-nodes multicast address).
          The value of the BSS ID field is ff:ff:ff:ff:ff:ff, which is
          recognized by the network protocol analyzer as being
          "broadcast".  The Fragment number and Sequence number fields
          together are set to 0x90C6.
        </t>
        <t pn="section-g.1-10">
          The value of the Organization Code field in the
          Logical Link Control header is set to 0x0, recognized as
          "Encapsulated Ethernet".  The value of the Type field is
          0x86DD (hexadecimal 86DD; otherwise, #86DD), recognized
          as "IPv6".
        </t>
        <t pn="section-g.1-11">
          A Router Advertisement is periodically sent by the router to
          multicast group address ff02::1. It is ICMP packet type
          134. The IPv6 Neighbor Discovery's Router Advertisement
          message contains an 8-bit field reserved for single-bit flags,
          as described in <xref target="RFC4861" format="default" sectionFormat="of" derivedContent="RFC4861"/>.
        </t>
        <t pn="section-g.1-12">
          The IPv6 header contains the link-local address of the router
          (source) configured via the EUI-64 algorithm, and the destination
          address is set to ff02::1.
        </t>
        <t pn="section-g.1-13">
          The Ethernet Type field in the Logical Link Control header
          is set to 0x86dd, which indicates that the frame transports
          an IPv6 packet. In the IEEE 802.11 data, the destination
          address is 33:33:00:00:00:01, which is the corresponding
          multicast MAC address. The BSS ID is a broadcast address of
          ff:ff:ff:ff:ff:ff. Due to the short link duration between
          vehicles and the roadside infrastructure, there is no need in IEEE 802.11-OCB
	  to wait for the completion of association
          and authentication procedures before exchanging data. IEEE
          802.11-OCB enabled nodes use the wildcard BSSID (a value of
          all 1s) and may start communicating as soon as they arrive
          on the communication channel.
        </t>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-g.2">
        <name slugifiedName="name-capture-in-normal-mode">Capture in Normal Mode</name>
        <t pn="section-g.2-1">
          The same IPv6 Router Advertisement packet described above
          (monitor mode) is captured on the host in normal mode and is
	  depicted below.
        </t>
        <figure anchor="figF" align="left" suppress-title="false" pn="figure-9">
          <name slugifiedName="name-ethernet-ii-header">Ethernet II Header</name>
          <artwork align="center" name="" type="" alt="" pn="section-g.2-2.1">
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                       Destination...                           
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
...Destination                 |           Source...            
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
...Source                                                      |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|          Type                 |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
</artwork>
        </figure>
        <figure anchor="figG" align="left" suppress-title="false" pn="figure-10">
          <name slugifiedName="name-ipv6-base-header-2">IPv6 Base Header</name>
          <artwork align="center" name="" type="" alt="" pn="section-g.2-3.1">
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|Version| Traffic Class |           Flow Label                  |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|         Payload Length        |  Next Header  |   Hop Limit   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
+                                                               +
|                                                               |
+                         Source Address                        +
|                                                               |
+                                                               +
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
+                                                               +
|                                                               |
+                      Destination Address                      +
|                                                               |
+                                                               +
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
</artwork>
        </figure>
        <figure anchor="figH" align="left" suppress-title="false" pn="figure-11">
          <name slugifiedName="name-router-advertisement-2">Router Advertisement</name>
          <artwork align="center" name="" type="" alt="" pn="section-g.2-4.1">
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     Type      |     Code      |          Checksum             |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Cur Hop Limit |M|O|  Reserved |       Router Lifetime         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                         Reachable Time                        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                          Retrans Timer                        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|   Options ...
+-+-+-+-+-+-+-+-+-+-+-+-  </artwork>
        </figure>
        <t pn="section-g.2-5">
          One notices that the Radiotap header, the IEEE 802.11 Data
          header, and the Logical Link Control headers are not present.
          On the other hand, a new header named the Ethernet II header is
          present.
        </t>
        <t pn="section-g.2-6">
          The Destination and Source addresses in the Ethernet II header
          contain the same values as the Receiver Address and
          Transmitter Address fields present in the IEEE 802.11 Data header in
          the monitor mode capture.
        </t>
        <t pn="section-g.2-7">
          The value of the Type field in the Ethernet II header is
          0x86DD (recognized as "IPv6"); this value is the same as
          the value of the Type field in the Logical Link Control header
          in the monitor mode capture.
        </t>
        <t pn="section-g.2-8">
          The knowledgeable experimenter will no doubt notice the
          similarity of this Ethernet II header with a capture in normal
          mode on a pure Ethernet cable interface.
        </t>
        <t pn="section-g.2-9">
          A frame translation is inserted on top of a pure IEEE 802.11
          MAC layer in order to adapt packets before delivering the
          payload data to the applications.  It adapts 802.11 LLC/MAC
          headers to Ethernet II headers.  Specifically, this
          adaptation consists of the elimination of the Radiotap,
          802.11, and LLC headers and the insertion of the Ethernet
          II header.  In this way, IPv6 runs straight over LLC over
          the 802.11-OCB MAC layer; this is further confirmed by the
          use of the unique Type 0x86DD.
        </t>
      </section>
    </section>
    <section anchor="extra-terminology" numbered="true" toc="include" removeInRFC="false" pn="section-appendix.h">
      <name slugifiedName="name-extra-terminology">Extra Terminology</name>
      <t pn="section-appendix.h-1">
	The following terms are defined outside the IETF.  They are
	used to define the main terms in the terminology section (<xref target="terminology" format="default" sectionFormat="of" derivedContent="Section 2"/>).
      </t>
      <dl newline="true" spacing="normal" pn="section-appendix.h-2">
        <dt pn="section-appendix.h-2.1">DSRC (Dedicated Short Range Communication):</dt>
        <dd pn="section-appendix.h-2.2">The US Federal Communications Commission
	(FCC) Dedicated Short Range Communication (DSRC) is defined in
	the Code of Federal Regulations (CFR) 47, Parts 90 <xref target="CFR-90" format="default" sectionFormat="of" derivedContent="CFR-90"/> and 95 <xref target="CFR-95" format="default" sectionFormat="of" derivedContent="CFR-95"/>. 
	This Code is referenced in the definitions below.  At the time
	of the writing of this document, the last update of this
	Code was dated December 6, 2019.</dd>
        <dt pn="section-appendix.h-2.3">DSRCS (Dedicated Short-Range Communications Services):</dt>
        <dd pn="section-appendix.h-2.4">
   Radio techniques are used to transfer data over short distances between
   roadside and mobile units, between mobile units, and between portable and
   mobile units to perform operations related to the improvement of traffic
   flow, traffic safety, and other intelligent transportation service
   applications in a variety of environments. DSRCS systems may also transmit status and
	instructional messages related to the units involved. <xref target="CFR-90.7" format="default" sectionFormat="of" derivedContent="CFR-90.7"/></dd>
        <dt pn="section-appendix.h-2.5">OBU (On-Board Unit):</dt>
        <dd pn="section-appendix.h-2.6">An
	On-Board Unit is a DSRCS transceiver that is normally mounted
	in or on a vehicle or may be a portable unit in some instances.  An OBU can be operational while a vehicle or
	person is either mobile or stationary.  The OBUs receive and
	contend for time to transmit on one or more radio frequency
	(RF) channels.  Except where specifically excluded, OBU
	operation is permitted wherever vehicle operation or human
	passage is permitted.  The OBUs mounted in vehicles are
	licensed by rule under part 95 of <xref target="CFR-95" format="default" sectionFormat="of" derivedContent="CFR-95"/> and
	communicate with Roadside Units (RSUs) and other OBUs.
	Portable OBUs are also licensed by rule under part 95 of <xref target="CFR-95" format="default" sectionFormat="of" derivedContent="CFR-95"/>.  OBU operations in the Unlicensed National
	Information Infrastructure (U-NII) Bands follow the rules in
	those bands. <xref target="CFR-90.7" format="default" sectionFormat="of" derivedContent="CFR-90.7"/>
        </dd>
        <dt pn="section-appendix.h-2.7">RSU (Roadside Unit):</dt>
        <dd pn="section-appendix.h-2.8">A
	Roadside Unit is a DSRC transceiver that is mounted along a
	road or pedestrian passageway.  An RSU may also be mounted on
	a vehicle or may be hand carried, but it may only operate when the
	vehicle or hand-carried unit is stationary. Perhaps
        Furthermore, an RSU is restricted to the location where it is licensed
	to operate. However, portable
	or handheld RSUs are permitted to operate where they do not
	interfere with a site-licensed operation.  An RSU broadcasts
	data to OBUs or exchanges data with OBUs in its communications
	zone.  An RSU also provides channel assignments and operating
	instructions to OBUs in its communications zone when
	required. <xref target="CFR-90.7" format="default" sectionFormat="of" derivedContent="CFR-90.7"/>
        </dd>
      </dl>
    </section>
    <section anchor="nd-wireless" numbered="true" toc="include" removeInRFC="false" pn="section-appendix.i">
      <name slugifiedName="name-neighbor-discovery-nd-poten">Neighbor Discovery (ND) Potential Issues in Wireless Links</name>
      <t pn="section-appendix.i-1">
	IPv6 Neighbor Discovery (IPv6 ND) <xref target="RFC4861" format="default" sectionFormat="of" derivedContent="RFC4861"/> <xref target="RFC4862" format="default" sectionFormat="of" derivedContent="RFC4862"/> was
	designed for point-to-point and transit links, such as
	Ethernet, with the expectation of cheap and reliable support
	for multicast from the lower layer. <xref target="RFC4861" section="3.2" sectionFormat="of" format="default" derivedLink="https://rfc-editor.org/rfc/rfc4861#section-3.2" derivedContent="RFC4861"/> indicates that the operation on shared media and on
	NBMA networks require additional
	support, e.g., for AR and DAD, which depend on multicast. An
	infrastructureless radio network such as OCB shares properties
	with both shared media and NBMA networks and then adds its
	own complexity, e.g., from movement and interference that
	allow only transient and non-transitive reachability between
	any set of peers.
      </t>
      <t pn="section-appendix.i-2">
	The uniqueness of an address within a scoped domain is a key
	pillar of IPv6 and is the basis for unicast IP communication. <xref target="RFC4861" format="default" sectionFormat="of" derivedContent="RFC4861"/> details the DAD method to prevent an address from
	being duplicated. For a link-local address, the scope is the link,
	whereas for a globally reachable address, the scope is much
	larger.  The underlying assumption for DAD to operate
	correctly is that the node that owns an IPv6 address can reach
	any other node within the scope at the time it claims its
	address, which is done by sending a Neighbor Solicitation (NS) multicast message, and
	can hear any future claim for that address by another party
	within the scope for the duration of the address ownership.
      </t>
      <t pn="section-appendix.i-3">
   In the case of OCB, there is a potentially a need to define a scope that is
   compatible with DAD. The scope cannot be the set of nodes that a transmitter
   can reach at a particular time because that set varies all the time and
   does not meet the DAD requirements for a link-local address that can be
   used anytime and anywhere. The generic expectation of a reliable
	multicast is not ensured, and the operation of DAD and AR
	as specified by <xref target="RFC4861" format="default" sectionFormat="of" derivedContent="RFC4861"/> cannot be
	guaranteed.  Moreover, multicast transmissions that rely on
	broadcast are not only unreliable but are also often
	detrimental to unicast traffic (see <xref target="I-D.ietf-mboned-ieee802-mcast-problems" format="default" sectionFormat="of" derivedContent="IEEE802-MCAST"/>).
      </t>
      <t pn="section-appendix.i-4">
	Early experience indicates that it should be possible to
	exchange IPv6 packets over OCB while relying on IPv6 ND alone
	for DAD and AR (Address Resolution) in good conditions. In the absence
	of a correct DAD operation, a node that relies only on IPv6 ND
	for AR and DAD over OCB should ensure that the addresses that
	it uses are unique by means other than DAD. It must be noted
	that deriving an IPv6 address from a globally unique MAC
	address has this property but may yield privacy issues.
      </t>
      <t pn="section-appendix.i-5"><xref target="RFC8505" format="default" sectionFormat="of" derivedContent="RFC8505"/> provides a more recent approach to IPv6 ND, in
	particular DAD. <xref target="RFC8505" format="default" sectionFormat="of" derivedContent="RFC8505"/> is designed to fit wireless and
	otherwise constrained networks whereby multicast and/or
	continuous access to the medium may not be guaranteed. <xref target="RFC8505" sectionFormat="comma" section="5.6" format="default" derivedLink="https://rfc-editor.org/rfc/rfc8505#section-5.6" derivedContent="RFC8505"/> ("Link-Local Addresses and Registration")
	indicates that the scope of uniqueness for a link-local
	address is restricted to a pair of nodes that uses it to
	communicate and provides a method to assert the uniqueness
	and resolve the link-layer address using a unicast exchange.
      </t>
      <t pn="section-appendix.i-6"><xref target="RFC8505" format="default" sectionFormat="of" derivedContent="RFC8505"/> also enables a router (acting as a 6LR) to own a
	prefix and act as a registrar (acting as a 6LBR) for addresses
	within the associated subnet. A peer host (acting as a 6LN)
	registers an address derived from that prefix and can use it
	for the lifetime of the registration. The prefix is advertised
	as not on-link, which means that the 6LN uses the 6LR to relay
	its packets within the subnet, and participation to the subnet
	is constrained to the time of reachability to the 6LR. Note
	that an RSU that provides internet connectivity <bcp14>MAY</bcp14> announce a
	default router preference <xref target="RFC4191" format="default" sectionFormat="of" derivedContent="RFC4191"/>, whereas a car that does
	not provide that connectivity <bcp14>MUST NOT</bcp14> do so. This operation
	presents similarities to that of an access point, but at
	Layer 3. This is why <xref target="RFC8505" format="default" sectionFormat="of" derivedContent="RFC8505"/> is well suited for wireless in
	general.
      </t>
      <t pn="section-appendix.i-7">
	Support of <xref target="RFC8505" format="default" sectionFormat="of" derivedContent="RFC8505"/> may be implemented on OCB. OCB nodes
	that support <xref target="RFC8505" format="default" sectionFormat="of" derivedContent="RFC8505"/> <bcp14>SHOULD</bcp14> support the 6LN operation in order
	to act as a host and may support the 6LR and 6LBR operations
	in order to act as a router and in particular to own a prefix
	that can be used by hosts that are compliant with <xref target="RFC8505" format="default" sectionFormat="of" derivedContent="RFC8505"/> for address
	autoconfiguration and registration.
      </t>
    </section>
    <section anchor="Acknowledgements" numbered="false" toc="include" removeInRFC="false" pn="section-appendix.j">
      <name slugifiedName="name-acknowledgements">Acknowledgements</name>
      <t pn="section-appendix.j-1">
        The authors would like to thank <contact fullname="Alexandre Petrescu"/> for 
        initiating this work and for being the lead author up to draft version 43 of
	this document.
      </t>
      <t pn="section-appendix.j-2">
	    
        The authors would like to thank <contact fullname="Pascal Thubert"/> for reviewing, 
        proofreading, and suggesting modifications for this document.
      </t>
      <t pn="section-appendix.j-3">
            
        The authors would like to thank <contact fullname="Mohamed Boucadair"/> for 
        proofreading and suggesting modifications for this document.
      </t>
      <t pn="section-appendix.j-4">
            
        The authors would like to thank <contact fullname="Eric Vyncke"/> for 
        reviewing the suggesting modifications of this document.
      </t>
      <t pn="section-appendix.j-5">  
        The authors would like to thank <contact fullname="Witold Klaudel"/>, <contact fullname="Ryuji Wakikawa"/>, <contact fullname="Emmanuel Baccelli"/>, <contact fullname="John Kenney"/>, <contact fullname="John Moring"/>,
        <contact fullname="Francois Simon"/>, <contact fullname="Dan Romascanu"/>, <contact fullname="Konstantin Khait"/>, <contact fullname="Ralph Droms"/>,
        <contact fullname="Richard 'Dick' Roy"/>, <contact fullname="Ray Hunter"/>, <contact fullname="Tom Kurihara"/>, <contact fullname="Michal Sojka"/>,
        <contact fullname="Jan de Jongh"/>, <contact fullname="Suresh Krishnan"/>, <contact fullname="Dino Farinacci"/>, <contact fullname="Vincent Park"/>,
        <contact fullname="Jaehoon Paul Jeong"/>, <contact fullname="Gloria Gwynne"/>, <contact fullname="Hans-Joachim Fischer"/>, <contact fullname="Russ         Housley"/>, <contact fullname="Rex Buddenberg"/>, <contact fullname="Erik Nordmark"/>, <contact fullname="Bob Moskowitz"/>, <contact fullname="Andrew         Dryden"/>, <contact fullname="Georg Mayer"/>, <contact fullname="Dorothy Stanley"/>, <contact fullname="Sandra Cespedes"/>, <contact fullname="Mariano         Falcitelli"/>, <contact fullname="Sri Gundavelli"/>, <contact fullname="Abdussalam Baryun"/>, <contact fullname="Margaret Cullen"/>, <contact fullname="Erik Kline"/>, <contact fullname="Carlos Jesus Bernardos Cano"/>,
<contact fullname="Ronald in 't          Velt"/>, <contact fullname="Katrin Sjoberg"/>, <contact fullname="Roland Bless"/>, <contact fullname="Tijink Jasja"/>, <contact fullname="Kevin Smith"/>,
        <contact fullname="Brian Carpenter"/>, <contact fullname="Julian Reschke"/>, <contact fullname="Mikael Abrahamsson"/>, <contact fullname="Dirk von         Hugo"/>, <contact fullname="Lorenzo Colitti"/>, <contact fullname="Pascal Thubert"/>, <contact fullname="Ole Troan"/>, <contact fullname="Jinmei Tatuya"/>, <contact fullname="Joel Halpern"/>, <contact fullname="Eric Gray"/>, and <contact fullname="William Whyte"/>.  Their
        valuable comments clarified particular issues and generally
        helped to improve the document.
      </t>
      <t pn="section-appendix.j-6"><contact fullname="Pierre Pfister"/>, <contact fullname="Rostislav Lisovy"/>, and others wrote 802.11-OCB
        drivers for Linux.
      </t>
      <t pn="section-appendix.j-7">
        For the multicast discussion, the authors would like to thank
        <contact fullname="Owen DeLong"/>, <contact fullname="Joe Touch"/>,
<contact fullname="Jen Linkova"/>, <contact fullname="Erik Kline"/>, <contact fullname="Brian         Haberman"/>, and participants to discussions in network working
        groups.
      </t>
      <t pn="section-appendix.j-8">
        The authors would like to thank the participants of the
        Birds-of-a-Feather "Intelligent Transportation Systems"
        meetings held at IETF in 2016.
      </t>
      <t pn="section-appendix.j-9">
	The human rights protocol considerations review was done by <contact fullname="Amelia Andersdotter"/>.
      </t>
      <t pn="section-appendix.j-10">The work of <contact fullname="Jong-Hyouk Lee"/> was supported by the National Research Foundation
of Korea (NRF) grant funded by the Korea government (MSIT) (NRF-2018R1A4A1025632).</t>
      <t pn="section-appendix.j-11">The work of <contact fullname="Jérôme Härri"/> was supported by EURECOM industrial members,
namely BMW Group, IABG, Monaco Telecom, Orange, SAP and Symantec. This RFC
reflects the view of the IPWAVE WG and does not necessarily reflect the
official policy or position of EURECOM industrial members.</t>
    </section>
    <section anchor="Contributors" numbered="false" toc="include" removeInRFC="false" pn="section-appendix.k">
      <name slugifiedName="name-contributors">Contributors</name>
      <t pn="section-appendix.k-1"><contact fullname="Christian Huitema"/> and <contact fullname="Tony Li"/> contributed to this document.
      </t>
      <t pn="section-appendix.k-2"><contact fullname="Romain Kuntz"/> contributed extensively regarding IPv6 handovers
        between links running outside the context of a BSS (802.11-OCB
        links).
      </t>
      <t pn="section-appendix.k-3"><contact fullname="Tim Leinmueller"/> contributed the idea of the use of IPv6 over
        802.11-OCB for the distribution of certificates.
      </t>
      <t pn="section-appendix.k-4"><contact fullname="Marios Makassikis"/>, <contact fullname="Jose Santa Lozano"/>, <contact fullname="Albin Severinson"/>, and
        <contact fullname="Alexey Voronov"/> provided significant feedback on the experience
        of using IP messages over 802.11-OCB in initial trials.
      </t>
      <t pn="section-appendix.k-5"><contact fullname="Michelle Wetterwald"/> contributed extensively to the MTU
        discussion, offered the ETSI ITS perspective, and reviewed
        other parts of the document.
      </t>
    </section>
    <section anchor="authors-addresses" numbered="false" removeInRFC="false" toc="include" pn="section-appendix.l">
      <name slugifiedName="name-authors-addresses">Authors' Addresses</name>
      <author initials="N." surname="Benamar" fullname="Nabil Benamar">
        <organization showOnFrontPage="true">Moulay Ismail University of Meknes</organization>
        <address>
          <postal>
            <street></street>
            <city>
            </city>
            <region></region>
            <code></code>
            <country>Morocco</country>
          </postal>
          <phone>+212670832236</phone>
          <email>n.benamar@est.umi.ac.ma</email>
        </address>
      </author>
      <author initials="J." surname="Härri" fullname="Jérôme Härri">
        <organization showOnFrontPage="true">EURECOM</organization>
        <address>
          <postal>
            <street></street>
            <city>Sophia-Antipolis</city>
            <region></region>
            <code>06904</code>
            <country>France</country>
          </postal>
          <phone>+33493008134</phone>
          <email>Jerome.Haerri@eurecom.fr</email>
        </address>
      </author>
      <author fullname="Jong-Hyouk Lee" initials="J." surname="Lee">
        <organization showOnFrontPage="true">Sangmyung University</organization>
        <address>
          <postal>
            <street>31, Sangmyeongdae-gil, Dongnam-gu</street>
            <code>31066</code>
            <city>
            Cheonan
            </city>
            <country>Republic of Korea</country>
          </postal>
          <email>jonghyouk@smu.ac.kr</email>
        </address>
      </author>
      <author initials="T." surname="Ernst" fullname="Thierry ERNST">
        <organization showOnFrontPage="true">YoGoKo</organization>
        <address>
          <postal>
            <street>1137A Avenue des Champs-Blancs</street>
            <city>CESON-SEVIGNE</city>
            <region/>
            <code>35510</code>
            <country>France</country>
          </postal>
          <phone/>
          <email>thierry.ernst@yogoko.fr</email>
        </address>
      </author>
    </section>
  </back>
</rfc>
