<?xml version='1.0' encoding='utf-8'?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" version="3" category="std" consensus="true" docName="draft-ietf-6lo-plc-12" indexInclude="true" ipr="trust200902" number="9354" prepTime="2023-01-13T17:39:17" scripts="Common,Latin" sortRefs="true" submissionType="IETF" symRefs="true" tocDepth="3" tocInclude="true" xml:lang="en">
  <link href="https://datatracker.ietf.org/doc/draft-ietf-6lo-plc-12" rel="prev"/>
  <link href="https://dx.doi.org/10.17487/rfc9354" rel="alternate"/>
  <link href="urn:issn:2070-1721" rel="alternate"/>
  <front>
    <title abbrev="IPv6 over PLC">Transmission of IPv6 Packets over Power Line Communication (PLC) Networks</title>
    <seriesInfo name="RFC" value="9354" stream="IETF"/>
    <author fullname="Jianqiang Hou" initials="J." surname="Hou">
      <organization showOnFrontPage="true">Huawei Technologies</organization>
      <address>
        <postal>
          <street>101 Software Avenue,</street>
          <city>Nanjing</city>
          <code>210012</code>
          <country>China</country>
        </postal>
        <email>houjianqiang@huawei.com</email>
      </address>
    </author>
    <author fullname="Bing Liu" initials="B." surname="Liu">
      <organization showOnFrontPage="true">Huawei Technologies</organization>
      <address>
        <postal>
          <extaddr>Haidian District</extaddr>
          <street>No. 156 Beiqing Rd.</street>
          <city>Beijing</city>
          <code>100095</code>
          <country>China</country>
        </postal>
        <email>remy.liubing@huawei.com</email>
      </address>
    </author>
    <author fullname="Yong-Geun Hong" initials="Y-G." surname="Hong">
      <organization showOnFrontPage="true">Daejeon University</organization>
      <address>
        <postal>
          <extaddr>Dong-gu</extaddr>
          <street>62 Daehak-ro</street>
          <city>Daejeon</city>
          <code>34520</code>
          <country>Republic of Korea</country>
        </postal>
        <email>yonggeun.hong@gmail.com</email>
      </address>
    </author>
    <author fullname="Xiaojun Tang" initials="X." surname="Tang">
      <organization abbrev="SGEPRI" showOnFrontPage="true">State Grid Electric Power Research Institute</organization>
      <address>
        <postal>
          <street>19 Chengxin Avenue</street>
          <city>Nanjing</city>
          <code>211106</code>
          <country>China</country>
        </postal>
        <email>itc@sgepri.sgcc.com.cn</email>
      </address>
    </author>
    <author fullname="Charles E. Perkins" initials="C." surname="Perkins">
      <organization showOnFrontPage="true">Lupin Lodge</organization>
      <address>
        <phone/>
        <email>charliep@computer.org</email>
      </address>
    </author>
    <date month="01" year="2023"/>
    <area>int</area>
    <workgroup>6lo</workgroup>
    <keyword>6lo</keyword>
    <keyword>6lowpan</keyword>
    <keyword>6lo-plc</keyword>
    <keyword>6loplc</keyword>
    <keyword>plc</keyword>
    <abstract pn="section-abstract">
      <t indent="0" pn="section-abstract-1">
	Power Line Communication (PLC), namely using electric power lines
	for indoor and outdoor communications, has been widely applied to
	support Advanced Metering Infrastructure (AMI), especially smart
	meters for electricity.  The existing electricity infrastructure
	facilitates the expansion of PLC deployments due to its potential
	advantages in terms of cost and convenience.  Moreover, a wide variety
	of accessible devices raises the potential demand of IPv6 for future
	applications. This document describes how IPv6 packets are transported
	over constrained PLC networks, such as those described in ITU-T G.9903,
        IEEE 1901.1, and IEEE 1901.2.
      </t>
    </abstract>
    <boilerplate>
      <section anchor="status-of-memo" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.1">
        <name slugifiedName="name-status-of-this-memo">Status of This Memo</name>
        <t indent="0" pn="section-boilerplate.1-1">
            This is an Internet Standards Track document.
        </t>
        <t indent="0" pn="section-boilerplate.1-2">
            This document is a product of the Internet Engineering Task Force
            (IETF).  It represents the consensus of the IETF community.  It has
            received public review and has been approved for publication by
            the Internet Engineering Steering Group (IESG).  Further
            information on Internet Standards is available in Section 2 of 
            RFC 7841.
        </t>
        <t indent="0" pn="section-boilerplate.1-3">
            Information about the current status of this document, any
            errata, and how to provide feedback on it may be obtained at
            <eref target="https://www.rfc-editor.org/info/rfc9354" brackets="none"/>.
        </t>
      </section>
      <section anchor="copyright" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.2">
        <name slugifiedName="name-copyright-notice">Copyright Notice</name>
        <t indent="0" pn="section-boilerplate.2-1">
            Copyright (c) 2023 IETF Trust and the persons identified as the
            document authors. All rights reserved.
        </t>
        <t indent="0" pn="section-boilerplate.2-2">
            This document is subject to BCP 78 and the IETF Trust's Legal
            Provisions Relating to IETF Documents
            (<eref target="https://trustee.ietf.org/license-info" brackets="none"/>) in effect on the date of
            publication of this document. Please review these documents
            carefully, as they describe your rights and restrictions with
            respect to this document. Code Components extracted from this
            document must include Revised BSD License text as described in
            Section 4.e of the Trust Legal Provisions and are provided without
            warranty as described in the Revised BSD License.
        </t>
      </section>
    </boilerplate>
    <toc>
      <section anchor="toc" numbered="false" removeInRFC="false" toc="exclude" pn="section-toc.1">
        <name slugifiedName="name-table-of-contents">Table of Contents</name>
        <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1">
          <li pn="section-toc.1-1.1">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.1"><xref derivedContent="1" format="counter" sectionFormat="of" target="section-1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-introduction">Introduction</xref></t>
          </li>
          <li pn="section-toc.1-1.2">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.2.1"><xref derivedContent="2" format="counter" sectionFormat="of" target="section-2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-requirements-notation-and-t">Requirements Notation and Terminology</xref></t>
          </li>
          <li pn="section-toc.1-1.3">
            <t indent="0" pn="section-toc.1-1.3.1"><xref derivedContent="3" format="counter" sectionFormat="of" target="section-3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-overview-of-plc">Overview of PLC</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.3.2">
              <li pn="section-toc.1-1.3.2.1">
                <t indent="0" keepWithNext="true" pn="section-toc.1-1.3.2.1.1"><xref derivedContent="3.1" format="counter" sectionFormat="of" target="section-3.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-protocol-stack">Protocol Stack</xref></t>
              </li>
              <li pn="section-toc.1-1.3.2.2">
                <t indent="0" pn="section-toc.1-1.3.2.2.1"><xref derivedContent="3.2" format="counter" sectionFormat="of" target="section-3.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-addressing-modes">Addressing Modes</xref></t>
              </li>
              <li pn="section-toc.1-1.3.2.3">
                <t indent="0" pn="section-toc.1-1.3.2.3.1"><xref derivedContent="3.3" format="counter" sectionFormat="of" target="section-3.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-maximum-transmission-unit">Maximum Transmission Unit</xref></t>
              </li>
              <li pn="section-toc.1-1.3.2.4">
                <t indent="0" pn="section-toc.1-1.3.2.4.1"><xref derivedContent="3.4" format="counter" sectionFormat="of" target="section-3.4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-routing-protocol">Routing Protocol</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.4">
            <t indent="0" pn="section-toc.1-1.4.1"><xref derivedContent="4" format="counter" sectionFormat="of" target="section-4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-ipv6-over-plc">IPv6 over PLC</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.4.2">
              <li pn="section-toc.1-1.4.2.1">
                <t indent="0" pn="section-toc.1-1.4.2.1.1"><xref derivedContent="4.1" format="counter" sectionFormat="of" target="section-4.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-stateless-address-autoconfi">Stateless Address Autoconfiguration</xref></t>
              </li>
              <li pn="section-toc.1-1.4.2.2">
                <t indent="0" pn="section-toc.1-1.4.2.2.1"><xref derivedContent="4.2" format="counter" sectionFormat="of" target="section-4.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-ipv6-link-local-address">IPv6 Link-Local Address</xref></t>
              </li>
              <li pn="section-toc.1-1.4.2.3">
                <t indent="0" pn="section-toc.1-1.4.2.3.1"><xref derivedContent="4.3" format="counter" sectionFormat="of" target="section-4.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-unicast-address-mapping">Unicast Address Mapping</xref></t>
                <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.4.2.3.2">
                  <li pn="section-toc.1-1.4.2.3.2.1">
                    <t indent="0" pn="section-toc.1-1.4.2.3.2.1.1"><xref derivedContent="4.3.1" format="counter" sectionFormat="of" target="section-4.3.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-unicast-address-mapping-for">Unicast Address Mapping for IEEE 1901.1</xref></t>
                  </li>
                  <li pn="section-toc.1-1.4.2.3.2.2">
                    <t indent="0" pn="section-toc.1-1.4.2.3.2.2.1"><xref derivedContent="4.3.2" format="counter" sectionFormat="of" target="section-4.3.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-unicast-address-mapping-for-i">Unicast Address Mapping for IEEE 1901.2 and ITU-T G.9903</xref></t>
                  </li>
                </ul>
              </li>
              <li pn="section-toc.1-1.4.2.4">
                <t indent="0" pn="section-toc.1-1.4.2.4.1"><xref derivedContent="4.4" format="counter" sectionFormat="of" target="section-4.4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-neighbor-discovery">Neighbor Discovery</xref></t>
              </li>
              <li pn="section-toc.1-1.4.2.5">
                <t indent="0" pn="section-toc.1-1.4.2.5.1"><xref derivedContent="4.5" format="counter" sectionFormat="of" target="section-4.5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-header-compression">Header Compression</xref></t>
              </li>
              <li pn="section-toc.1-1.4.2.6">
                <t indent="0" pn="section-toc.1-1.4.2.6.1"><xref derivedContent="4.6" format="counter" sectionFormat="of" target="section-4.6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-fragmentation-and-reassembl">Fragmentation and Reassembly</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.5">
            <t indent="0" pn="section-toc.1-1.5.1"><xref derivedContent="5" format="counter" sectionFormat="of" target="section-5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-internet-connectivity-scena">Internet Connectivity Scenarios and Topologies</xref></t>
          </li>
          <li pn="section-toc.1-1.6">
            <t indent="0" pn="section-toc.1-1.6.1"><xref derivedContent="6" format="counter" sectionFormat="of" target="section-6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-operations-and-manageabilit">Operations and Manageability Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.7">
            <t indent="0" pn="section-toc.1-1.7.1"><xref derivedContent="7" format="counter" sectionFormat="of" target="section-7"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-iana-considerations">IANA Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.8">
            <t indent="0" pn="section-toc.1-1.8.1"><xref derivedContent="8" format="counter" sectionFormat="of" target="section-8"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-security-considerations">Security Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.9">
            <t indent="0" pn="section-toc.1-1.9.1"><xref derivedContent="9" format="counter" sectionFormat="of" target="section-9"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-references">References</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.9.2">
              <li pn="section-toc.1-1.9.2.1">
                <t indent="0" pn="section-toc.1-1.9.2.1.1"><xref derivedContent="9.1" format="counter" sectionFormat="of" target="section-9.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-normative-references">Normative References</xref></t>
              </li>
              <li pn="section-toc.1-1.9.2.2">
                <t indent="0" pn="section-toc.1-1.9.2.2.1"><xref derivedContent="9.2" format="counter" sectionFormat="of" target="section-9.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-informative-references">Informative References</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.10">
            <t indent="0" pn="section-toc.1-1.10.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.a"/><xref derivedContent="" format="title" sectionFormat="of" target="name-acknowledgements">Acknowledgements</xref></t>
          </li>
          <li pn="section-toc.1-1.11">
            <t indent="0" pn="section-toc.1-1.11.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.b"/><xref derivedContent="" format="title" sectionFormat="of" target="name-authors-addresses">Authors' Addresses</xref></t>
          </li>
        </ul>
      </section>
    </toc>
  </front>
  <middle>
    <section anchor="Intro" numbered="true" toc="include" removeInRFC="false" pn="section-1">
      <name slugifiedName="name-introduction">Introduction</name>
      <t indent="0" pn="section-1-1">
	The idea of using power lines for both electricity supply and
	communication can be traced back to the beginning of the last century.
	Using the existing power grid to transmit messages, Power Line
	Communication (PLC) is a good candidate for supporting various service
	scenarios such as in houses and offices, in trains and vehicles, in
	smart grids, and in Advanced Metering Infrastructure (AMI) <xref target="SCENA" format="default" sectionFormat="of" derivedContent="SCENA"/>.  The data-acquisition devices in
	these scenarios share common features such as fixed position, large
	quantity of nodes, low data rate, and low power consumption.</t>
      <t indent="0" pn="section-1-2">
	Although PLC technology has evolved over several decades, it has not
	been fully adapted for IPv6-based constrained networks.  The
	resource-constrained scenarios related to the Internet of Things (IoT)
	lie in the low voltage PLC networks with most applications in the area
	of AMI, vehicle-to-grid communications, in-home energy management, and
	smart street lighting.  IPv6 is important for PLC networks, due to its
	large address space and efficient address autoconfiguration.
      </t>
      <t indent="0" pn="section-1-3">
	This document provides a brief overview of PLC technologies. Some of
	them have LLN (Low-Power and Lossy Network) characteristics, i.e.,
	limited power consumption, memory, and processing resources. This
	document specifies the transmission of IPv6 packets over those
	constrained PLC networks.  The general approach is to adapt elements
	of the 6LoWPAN (IPv6 over Low-Power Wireless Personal Area Network)
	and 6lo (IPv6 over Networks of Resource-constrained Nodes)
	specifications, such as those described in <xref target="RFC4944" format="default" sectionFormat="of" derivedContent="RFC4944"/>, <xref target="RFC6282" format="default" sectionFormat="of" derivedContent="RFC6282"/>, <xref target="RFC6775" format="default" sectionFormat="of" derivedContent="RFC6775"/>, and <xref target="RFC8505" format="default" sectionFormat="of" derivedContent="RFC8505"/>, to constrained PLC networks.
      </t>
    </section>
    <section anchor="Term" numbered="true" toc="include" removeInRFC="false" pn="section-2">
      <name slugifiedName="name-requirements-notation-and-t">Requirements Notation and Terminology</name>
      <t indent="0" pn="section-2-1">
    The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
    "<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
    described in BCP 14 <xref target="RFC2119" format="default" sectionFormat="of" derivedContent="RFC2119"/> <xref target="RFC8174" format="default" sectionFormat="of" derivedContent="RFC8174"/> 
    when, and only when, they appear in all capitals, as shown here.
      </t>
      <t indent="0" pn="section-2-2"> This document uses the following acronyms and terminologies:
      </t>
      <dl newline="false" spacing="normal" indent="3" pn="section-2-3">
        <dt pn="section-2-3.1">6BBR:</dt>
        <dd pn="section-2-3.2"> 6LoWPAN Backbone Router </dd>
        <dt pn="section-2-3.3">6LBR:</dt>
        <dd pn="section-2-3.4"> 6LoWPAN Border Router</dd>
        <dt pn="section-2-3.5">6lo:</dt>
        <dd pn="section-2-3.6"> IPv6 over Networks of Resource-constrained Nodes </dd>
        <dt pn="section-2-3.7">6LoWPAN:</dt>
        <dd pn="section-2-3.8"> IPv6 over Low-Power Wireless Personal Area Network </dd>
        <dt pn="section-2-3.9">6LR:</dt>
        <dd pn="section-2-3.10"> 6LoWPAN Router</dd>
        <dt pn="section-2-3.11">AMI:</dt>
        <dd pn="section-2-3.12"> Advanced Metering Infrastructure </dd>
        <dt pn="section-2-3.13">BBPLC:</dt>
        <dd pn="section-2-3.14"> Broadband Power Line Communication </dd>
        <dt pn="section-2-3.15">Coordinator:</dt>
        <dd pn="section-2-3.16"> A device capable of relaying messages</dd>
        <dt pn="section-2-3.17">DAD:</dt>
        <dd pn="section-2-3.18"> Duplicate Address Detection </dd>
        <dt pn="section-2-3.19">EUI:</dt>
        <dd pn="section-2-3.20">Extended Unique Identifier</dd>
        <dt pn="section-2-3.21">IID:</dt>
        <dd pn="section-2-3.22">Interface Identifier </dd>
        <dt pn="section-2-3.23">LLN:</dt>
        <dd pn="section-2-3.24"> Low-Power and Lossy Network </dd>
        <dt pn="section-2-3.25">MTU:</dt>
        <dd pn="section-2-3.26"> Maximum Transmission Unit </dd>
        <dt pn="section-2-3.27">NBPLC:</dt>
        <dd pn="section-2-3.28"> Narrowband Power Line Communication </dd>
        <dt pn="section-2-3.29">PAN:</dt>
        <dd pn="section-2-3.30"> Personal Area Network </dd>
        <dt pn="section-2-3.31">PANC:</dt>
        <dd pn="section-2-3.32"> PAN Coordinator, a coordinator that also acts as the
		primary controller of a PAN</dd>
        <dt pn="section-2-3.33">PLC:</dt>
        <dd pn="section-2-3.34"> Power Line Communication </dd>
        <dt pn="section-2-3.35">PLC device:</dt>
        <dd pn="section-2-3.36"> An entity that follows the PLC standards and
		implements the protocol stack described in this document</dd>
        <dt pn="section-2-3.37">RA:</dt>
        <dd pn="section-2-3.38"> Router Advertisement </dd>
        <dt pn="section-2-3.39">RPL:</dt>
        <dd pn="section-2-3.40">Routing Protocol for Low-Power
				and Lossy Networks </dd>
      </dl>
      <t keepWithNext="true" indent="0" pn="section-2-4">Below is a mapping table of the terminology between
          <xref target="IEEE_1901.2" format="default" sectionFormat="of" derivedContent="IEEE_1901.2"/>, <xref target="IEEE_1901.1" format="default" sectionFormat="of" derivedContent="IEEE_1901.1"/>, <xref target="ITU-T_G.9903" format="default" sectionFormat="of" derivedContent="ITU-T_G.9903"/>, and this document.</t>
      <table anchor="Term_mapping" align="center" pn="table-1">
        <name slugifiedName="name-terminology-mapping-between">Terminology Mapping between PLC Standards</name>
        <thead>
          <tr>
            <th align="center" colspan="1" rowspan="1">IEEE 1901.2</th>
            <th align="center" colspan="1" rowspan="1">IEEE 1901.1</th>
            <th align="center" colspan="1" rowspan="1">ITU-T G.9903</th>
            <th align="center" colspan="1" rowspan="1">This document</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="center" colspan="1" rowspan="1">PAN Coordinator</td>
            <td align="center" colspan="1" rowspan="1">Central Coordinator</td>
            <td align="center" colspan="1" rowspan="1">PAN Coordinator</td>
            <td align="center" colspan="1" rowspan="1">PAN Coordinator</td>
          </tr>
          <tr>
            <td align="center" colspan="1" rowspan="1">Coordinator</td>
            <td align="center" colspan="1" rowspan="1">Proxy Coordinator</td>
            <td align="center" colspan="1" rowspan="1">Full-Function Device</td>
            <td align="center" colspan="1" rowspan="1">Coordinator</td>
          </tr>
          <tr>
            <td align="center" colspan="1" rowspan="1">Device</td>
            <td align="center" colspan="1" rowspan="1">Station</td>
            <td align="center" colspan="1" rowspan="1">PAN Device</td>
            <td align="center" colspan="1" rowspan="1">PLC Device</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="Overview" numbered="true" toc="include" removeInRFC="false" pn="section-3">
      <name slugifiedName="name-overview-of-plc">Overview of PLC</name>
      <t indent="0" pn="section-3-1">

	PLC technology enables convenient two-way communications for home
	users and utility companies to monitor and control electrically connected
	devices such as electricity meters and street lights. PLC can also be
	used in smart home scenarios, such as the control of indoor lights and
	switches. Due to the large range of communication frequencies, PLC is
	generally classified into two categories: Narrowband PLC (NBPLC) for
	automation of sensors (which have a low frequency band and low power
	cost) and Broadband PLC (BBPLC) for home and industry networking
	applications.
      </t>
      <t indent="0" pn="section-3-2">
	Various standards have been addressed on the
	Media Access Control (MAC) and Physical (PHY) layers. For example, standards for BBPLC (1.8-250
        MHz) include IEEE 1901 and ITU-T G.hn, and standards for
	NBPLC (3-500 kHz) include ITU-T G.9902 (G.hnem), ITU-T G.9903
	(G3-PLC) <xref target="ITU-T_G.9903" format="default" sectionFormat="of" derivedContent="ITU-T_G.9903"/>, ITU-T G.9904
	(PRIME), IEEE 1901.2  (a
	combination of G3-PLC and PRIME PLC) <xref target="IEEE_1901.2" format="default" sectionFormat="of" derivedContent="IEEE_1901.2"/>, and IEEE 1901.2a (an amendment to IEEE
	1901.2) <xref target="IEEE_1901.2a" format="default" sectionFormat="of" derivedContent="IEEE_1901.2a"/>.
      </t>
      <t indent="0" pn="section-3-3">
	IEEE 1901.1 <xref target="IEEE_1901.1" format="default" sectionFormat="of" derivedContent="IEEE_1901.1"/>, a PLC standard that is aimed at the medium frequency band of less
	than 12 MHz, was published by the IEEE standard for Smart Grid
	Powerline Communication Working Group (SGPLC WG). IEEE 1901.1 balances
	the needs for bandwidth versus communication range and is thus a
	promising option for 6lo applications. 
      </t>
      <t indent="0" pn="section-3-4">
	This specification is focused on IEEE 1901.1, IEEE 1901.2, and ITU-T G.9903.
      </t>
      <section anchor="stack" numbered="true" toc="include" removeInRFC="false" pn="section-3.1">
        <name slugifiedName="name-protocol-stack">Protocol Stack</name>
        <t indent="0" pn="section-3.1-1">
	The protocol stack for IPv6 over PLC is illustrated in <xref target="fig-stack" format="default" sectionFormat="of" derivedContent="Figure 1"/>.  The PLC MAC and PLC PHY layers
	correspond to the layers described in IEEE 1901.1, IEEE 1901.2, or ITU-T G.9903.  The 6lo
	adaptation layer for PLC is illustrated in <xref target="v6overPLC" format="default" sectionFormat="of" derivedContent="Section 4"/>.  For multihop tree and mesh topologies, a routing
	protocol is likely to be necessary.  The routes can be built in
	mesh-under mode at Layer 2 or in route-over mode at Layer 3, as
	explained in Sections <xref target="Routing" format="counter" sectionFormat="of" derivedContent="3.4"/> and <xref target="nd" format="counter" sectionFormat="of" derivedContent="4.4"/>. </t>
        <figure anchor="fig-stack" align="left" suppress-title="false" pn="figure-1">
          <name slugifiedName="name-plc-protocol-stack">PLC Protocol Stack</name>
          <artwork name="" type="" align="left" alt="" pn="section-3.1-2.1">
                 +----------------------------------------+
                 |           Application Layer            |
                 +----------------------------------------+
                 |            Transport Layer             |
                 +----------------------------------------+
                 |                                        |
                 |               IPv6 Layer               |
                 |                                        |
                 +----------------------------------------+
                 |   Adaptation Layer for IPv6 over PLC   |
                 +----------------------------------------+
                 |             PLC MAC Layer              |
                 +----------------------------------------+
                 |             PLC PHY Layer              |
                 +----------------------------------------+
</artwork>
        </figure>
      </section>
      <section anchor="Addressing" numbered="true" toc="include" removeInRFC="false" pn="section-3.2">
        <name slugifiedName="name-addressing-modes">Addressing Modes</name>
        <t indent="0" pn="section-3.2-1">
	Each PLC device has a globally unique long address of 48 bits <xref target="IEEE_1901.1" format="default" sectionFormat="of" derivedContent="IEEE_1901.1"/> or 64 bits <xref target="IEEE_1901.2" format="default" sectionFormat="of" derivedContent="IEEE_1901.2"/> <xref target="ITU-T_G.9903" format="default" sectionFormat="of" derivedContent="ITU-T_G.9903"/> and a short address of 12 bits <xref target="IEEE_1901.1" format="default" sectionFormat="of" derivedContent="IEEE_1901.1"/> or 16 bits <xref target="IEEE_1901.2" format="default" sectionFormat="of" derivedContent="IEEE_1901.2"/> <xref target="ITU-T_G.9903" format="default" sectionFormat="of" derivedContent="ITU-T_G.9903"/>.  The long address is set by the manufacturer
	according to the IEEE EUI-48 MAC address
	or the IEEE EUI-64 address.  Each PLC device joins the network by
	using the long address and communicates with other devices by using
	the short address after joining the network. Short addresses can be
	assigned during the onboarding process, by the PANC or the JRC (join
	registrar/coordinator) in CoJP (Constrained Join Protocol) <xref target="RFC9031" format="default" sectionFormat="of" derivedContent="RFC9031"/>.
        </t>
      </section>
      <section anchor="mtu" numbered="true" toc="include" removeInRFC="false" pn="section-3.3">
        <name slugifiedName="name-maximum-transmission-unit">Maximum Transmission Unit</name>
        <t indent="0" pn="section-3.3-1">
	The Maximum Transmission Unit (MTU) of the MAC layer determines whether
	fragmentation and reassembly are needed at the adaptation layer of
	IPv6 over PLC.  IPv6 requires an MTU of 1280 octets or greater; thus,
	for a MAC layer with an MTU lower than this limit,
	fragmentation and reassembly at the adaptation layer are required.
        </t>
        <t indent="0" pn="section-3.3-2">
	The IEEE 1901.1 MAC supports upper-layer packets up to 2031 octets.
	The IEEE 1901.2 MAC layer supports an MTU of 1576 octets (the original
	value of 1280 bytes was updated in 2015 <xref target="IEEE_1901.2a" format="default" sectionFormat="of" derivedContent="IEEE_1901.2a"/>).  Though these two technologies can support
	IPv6 originally without fragmentation and reassembly, it is possible
	to configure a smaller MTU in a high-noise communication environment.
	Thus, the 6lo functions, including header compression, fragmentation,
	and reassembly, are still applicable and useful.
        </t>
        <t indent="0" pn="section-3.3-3">
	The MTU for ITU-T G.9903 is 400 octets, which is insufficient for
	supporting IPv6's MTU.  For this reason, fragmentation and reassembly
	are required for G.9903-based networks to carry IPv6.
        </t>
      </section>
      <section anchor="Routing" numbered="true" toc="include" removeInRFC="false" pn="section-3.4">
        <name slugifiedName="name-routing-protocol">Routing Protocol</name>
        <t indent="0" pn="section-3.4-1">
	Routing protocols suitable for use in PLC networks include:
        </t>
        <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-3.4-2">
          <li pn="section-3.4-2.1">RPL (Routing Protocol for Low-Power and Lossy Networks) <xref target="RFC6550" format="default" sectionFormat="of" derivedContent="RFC6550"/> is a Layer 3 routing protocol.
          AODV-RPL <xref target="I-D.ietf-roll-aodv-rpl" format="default" sectionFormat="of" derivedContent="AODV-RPL"/>
          updates RPL to include reactive, point-to-point, and asymmetric
          routing.  IEEE 1901.2 specifies Information Elements (IEs) with MAC
          layer metrics, which can be provided to a Layer 3 routing protocol for
          parent selection.</li>
          <li pn="section-3.4-2.2">IEEE 1901.1 supports the mesh-under routing scheme.  Each PLC
          node maintains a routing table, in which each route entry comprises
          the short addresses of the destination and the related next hop.
          The route entries are built during the network establishment via a
          pair of association request/confirmation messages.  The route
          entries can be changed via a pair of proxy change
          request/confirmation messages. These association and proxy change
          messages must be approved by the central coordinator (PANC in this
          document).
	</li>
          <li pn="section-3.4-2.3">LOADng (Lightweight On-demand Ad hoc Distance vector
          routing protocol, Next Generation) is a reactive protocol operating
          at Layer 2 or Layer 3.  Currently, LOADng is supported in ITU-T
          G.9903 <xref target="ITU-T_G.9903" format="default" sectionFormat="of" derivedContent="ITU-T_G.9903"/>, and the IEEE
          1901.2 standard refers to ITU-T G.9903 for LOAD-based networks.
	</li>
        </ul>
      </section>
    </section>
    <section anchor="v6overPLC" numbered="true" toc="include" removeInRFC="false" pn="section-4">
      <name slugifiedName="name-ipv6-over-plc">IPv6 over PLC</name>
      <t indent="0" pn="section-4-1">
    A PLC node distinguishes between an IPv6 PDU and a non-IPv6 PDU based on
    the equivalent of an Ethertype in a Layer 2 PLC PDU. <xref target="RFC7973" format="default" sectionFormat="of" derivedContent="RFC7973"/> defines an Ethertype of "A0ED" for LoWPAN encapsulation,
    and this information can be carried in the IE field in the MAC header of
    <xref target="IEEE_1901.2" format="default" sectionFormat="of" derivedContent="IEEE_1901.2"/> or <xref target="ITU-T_G.9903" format="default" sectionFormat="of" derivedContent="ITU-T_G.9903"/>.  And regarding <xref target="IEEE_1901.1" format="default" sectionFormat="of" derivedContent="IEEE_1901.1"/>, the IP packet type has been
    defined with the corresponding MAC Service Data Unit (MSDU) type value 49.
    And the 4-bit Internet Protocol version number in the IP header helps to
    distinguish between an IPv4 PDU and an IPv6 PDU.
</t>
      <t indent="0" pn="section-4-2">
    6LoWPAN and 6lo standards, as described in <xref target="RFC4944" format="default" sectionFormat="of" derivedContent="RFC4944"/>, <xref target="RFC6282" format="default" sectionFormat="of" derivedContent="RFC6282"/>, <xref target="RFC6775" format="default" sectionFormat="of" derivedContent="RFC6775"/>, and <xref target="RFC8505" format="default" sectionFormat="of" derivedContent="RFC8505"/>, provide useful functionality, including link-local IPv6
    addresses, stateless address autoconfiguration, neighbor discovery,
    header compression, fragmentation, and reassembly.  However, due to the
    different characteristics of the PLC media, the 6LoWPAN adaptation layer,
    as it is, cannot perfectly fulfill the requirements of PLC
    environments. These considerations suggest the need for a dedicated
    adaptation layer for PLC, which is detailed in the following
    subsections.</t>
      <section anchor="slaac" numbered="true" toc="include" removeInRFC="false" pn="section-4.1">
        <name slugifiedName="name-stateless-address-autoconfi">Stateless Address Autoconfiguration</name>
        <t indent="0" pn="section-4.1-1">
	To obtain an IPv6 Interface Identifier (IID), a PLC device performs
	stateless address autoconfiguration <xref target="RFC4944" format="default" sectionFormat="of" derivedContent="RFC4944"/>.  The autoconfiguration can be based on either a
	long or short link-layer address.
        </t>
        <t indent="0" pn="section-4.1-2">
	The IID can be based on the device's 48-bit MAC address or its EUI-64
	identifier <xref target="EUI-64" format="default" sectionFormat="of" derivedContent="EUI-64"/>.  A 48-bit MAC
	address <bcp14>MUST</bcp14> first be extended to a 64-bit IID
	by inserting 0xFFFE at the fourth and fifth octets as specified in
	<xref target="RFC2464" format="default" sectionFormat="of" derivedContent="RFC2464"/>.  The IPv6 IID is derived
	from the 64-bit IID by inverting the U/L (Universal/Local)
	bit <xref target="RFC4291" format="default" sectionFormat="of" derivedContent="RFC4291"/>.
        </t>
        <t indent="0" pn="section-4.1-3">
	For IEEE 1901.2 and ITU-T G.9903, a 48-bit "pseudo-address" is formed
	by the 16-bit PAN ID, 16 zero bits, and the 16-bit short address as
	follows:
        </t>
        <t indent="3" pn="section-4.1-4"> 16_bit_PAN:0000:16_bit_short_address </t>
        <t indent="0" pn="section-4.1-5">
	Then, the 64-bit IID <bcp14>MUST</bcp14> be derived by inserting the 16-bit
	0xFFFE into as follows:
        </t>
        <t indent="3" pn="section-4.1-6"> 16_bit_PAN:00FF:FE00:16_bit_short_address </t>
        <t indent="0" pn="section-4.1-7">
	For the 12-bit short addresses used by IEEE 1901.1, the 48-bit
	pseudo-address is formed by a 24-bit NID (Network Identifier, YYYYYY),
	12 zero bits, and a 12-bit TEI (Terminal Equipment Identifier, XXX) as follows:
        </t>
        <t indent="3" pn="section-4.1-8"> YYYY:YY00:0XXX </t>
        <t indent="0" pn="section-4.1-9">
	The 64-bit IID <bcp14>MUST</bcp14> be derived by inserting the 16-bit 0xFFFE
	into this 48-bit pseudo-address as follows:
        </t>
        <t indent="3" pn="section-4.1-10"> YYYY:YYFF:FE00:0XXX </t>
        <t indent="0" pn="section-4.1-11">
	As investigated in <xref target="RFC7136" format="default" sectionFormat="of" derivedContent="RFC7136"/>, aside from the method discussed in
	<xref target="RFC4291" format="default" sectionFormat="of" derivedContent="RFC4291"/>, other 
	IID-generation methods defined by the IETF do not imply any additional semantics for the
	Universal/Local (U/L) bit (bit 6) and the Individual/Group bit (bit
	7). Therefore, these two bits are not reliable indicators.  Thus, when using an IID derived by a short address,
	the operators of the PLC network can choose whether or not to comply with the original
	meaning of these two bits.  If they choose to
  comply with the original meaning, these two bits <bcp14>MUST</bcp14>
	both be set to zero, since the IID derived from the short address is not global. In order to avoid any ambiguity in the derived
	IID, these two bits <bcp14>MUST NOT</bcp14> be a valid part
	of the PAN ID (for IEEE 1901.2 and ITU-T G.9903) or NID (for IEEE
	1901.1). For example, the PAN ID or NID must always be chosen so that
	the two bits are zeros or the high six bits in PAN ID or NID are left
	shifted by two bits. If they choose not to comply with the original meaning, the operator must be aware that these two
	bits are not reliable indicators, and the IID cannot be transformed
	back into a short link-layer address via a reverse operation of the
	mechanism presented above. However, the short address can still be
	obtained via the Unicast Address Mapping mechanism described in <xref target="unicast-map" format="default" sectionFormat="of" derivedContent="Section 4.3"/>.
        </t>
        <t indent="0" pn="section-4.1-12">
	For privacy reasons, the IID derived from the MAC address (with
	padding and bit clamping) <bcp14>SHOULD</bcp14> only be used for
	link-local address configuration.  A PLC host <bcp14>SHOULD</bcp14>
	use the IID derived from the short link-layer address to configure
	IPv6 addresses used for communication with the public network;
	otherwise, the host's MAC address is exposed. As per <xref target="RFC8065" format="default" sectionFormat="of" derivedContent="RFC8065"/>, when short addresses are used on
	PLC links, a shared secret key or version number from the
	Authoritative Border Router Option <xref target="RFC6775" format="default" sectionFormat="of" derivedContent="RFC6775"/> can be used to improve the entropy of the hash
	input. Thus, the generated IID can be spread out to the full range of
	the IID address space while stateless address compression is still
	allowed. By default, the hash algorithm 
	<bcp14>SHOULD</bcp14> be SHA256, using the version number, the
	PAN ID or NID, and the short address as the input arguments, and the
	256-bit hash output is truncated into the IID by taking the high 64
	bits.
        </t>
      </section>
      <section anchor="link-local" numbered="true" toc="include" removeInRFC="false" pn="section-4.2">
        <name slugifiedName="name-ipv6-link-local-address">IPv6 Link-Local Address</name>
        <t indent="0" pn="section-4.2-1">
	The IPv6 link-local address <xref target="RFC4291" format="default" sectionFormat="of" derivedContent="RFC4291"/> for a PLC
	interface is formed by appending the IID, as defined
	above, to the prefix FE80::/64 (see <xref target="fig-link-local" format="default" sectionFormat="of" derivedContent="Figure 2"/>).
        </t>
        <figure anchor="fig-link-local" align="left" suppress-title="false" pn="figure-2">
          <name slugifiedName="name-ipv6-link-local-address-for">IPv6 Link-Local Address for a PLC Interface</name>
          <artwork name="" type="" align="left" alt="" pn="section-4.2-2.1">
    10 bits           54 bits                   64 bits
  +----------+-----------------------+----------------------------+
  |1111111010|        (zeros)        |    Interface Identifier    |
  +----------+-----------------------+----------------------------+
</artwork>
        </figure>
      </section>
      <section anchor="unicast-map" numbered="true" toc="include" removeInRFC="false" pn="section-4.3">
        <name slugifiedName="name-unicast-address-mapping">Unicast Address Mapping</name>
        <t indent="0" pn="section-4.3-1">
	The address-resolution procedure for mapping IPv6 unicast addresses
	into PLC link-layer addresses follows the general description in <xref target="RFC4861" sectionFormat="of" section="7.2" format="default" derivedLink="https://rfc-editor.org/rfc/rfc4861#section-7.2" derivedContent="RFC4861"/>. <xref target="RFC6775" format="default" sectionFormat="of" derivedContent="RFC6775"/> improves this procedure by
	eliminating usage of multicast NS (Neighbor Solicitation). The
	resolution is realized by the NCEs (neighbor cache entries) created
	during the address registration at the routers.  <xref target="RFC8505" format="default" sectionFormat="of" derivedContent="RFC8505"/> further improves the registration
	procedure by enabling multiple LLNs to form an IPv6 subnet and by
	inserting a link-local address registration to better serve proxy
	registration of new devices.
        </t>
        <section anchor="Unicast-1901.1" numbered="true" toc="include" removeInRFC="false" pn="section-4.3.1">
          <name slugifiedName="name-unicast-address-mapping-for">Unicast Address Mapping for IEEE 1901.1</name>
          <t indent="0" pn="section-4.3.1-1">
	    The Source Link-Layer Address and Target Link-Layer Address
	    options for IEEE_1901.1 used in the NS and Neighbor
	    Advertisement (NA) have the following form.
          </t>
          <figure anchor="fig-unicast-1901.1" align="left" suppress-title="false" pn="figure-3">
            <name slugifiedName="name-unicast-address-mapping-for-">Unicast Address Mapping for IEEE 1901.1</name>
            <artwork name="" type="" align="left" alt="" pn="section-4.3.1-2.1">
  0                   1                   2                   3
  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |     Type      |    Length=1   |              NID              :
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 :NID (continued)|  Padding (all zeros)  |          TEI          |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 </artwork>
          </figure>
          <t indent="0" pn="section-4.3.1-3"> Option fields:
          </t>
          <dl newline="false" spacing="normal" indent="3" pn="section-4.3.1-4">
            <dt pn="section-4.3.1-4.1">Type:</dt>
            <dd pn="section-4.3.1-4.2">1 for Source Link-Layer Address and 2 for Target Link-Layer Address. </dd>
            <dt pn="section-4.3.1-4.3">Length:</dt>
            <dd pn="section-4.3.1-4.4">The length of this option (including Type and Length fields)
            in units of 8 octets.  The value of this field is 1 for the 12-bit
            IEEE 1901.1 PLC short addresses. </dd>
            <dt pn="section-4.3.1-4.5">NID:</dt>
            <dd pn="section-4.3.1-4.6">24-bit Network Identifier</dd>
            <dt pn="section-4.3.1-4.7">Padding:</dt>
            <dd pn="section-4.3.1-4.8">12 zero bits </dd>
            <dt pn="section-4.3.1-4.9">TEI:</dt>
            <dd pn="section-4.3.1-4.10">12-bit Terminal Equipment Identifier</dd>
          </dl>
        </section>
        <section anchor="Unicast-1901.2" numbered="true" toc="include" removeInRFC="false" pn="section-4.3.2">
          <name slugifiedName="name-unicast-address-mapping-for-i">Unicast Address Mapping for IEEE 1901.2 and ITU-T G.9903</name>
          <t indent="0" pn="section-4.3.2-1">
	    The Source Link-Layer Address and Target Link-Layer Address options for IEEE_1901.2 and ITU-T G.9903 used in the
	    NS and NA have the following form.
          </t>
          <figure anchor="fig-unicast-1901.2" align="left" suppress-title="false" pn="figure-4">
            <name slugifiedName="name-unicast-address-mapping-for-ie">Unicast Address Mapping for IEEE 1901.2</name>
            <artwork name="" type="" align="left" alt="" pn="section-4.3.2-2.1">
   0                   1                   2                   3
   0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  |     Type      |    Length=1   |             PAN ID            |
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  |       Padding (all zeros)     |         Short Address         |
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
</artwork>
          </figure>
          <t indent="0" pn="section-4.3.2-3">Option fields:
          </t>
          <dl newline="false" spacing="normal" indent="3" pn="section-4.3.2-4">
            <dt pn="section-4.3.2-4.1">Type:</dt>
            <dd pn="section-4.3.2-4.2">1 for Source Link-Layer Address and 2 for Target Link-Layer Address.</dd>
            <dt pn="section-4.3.2-4.3">Length:</dt>
            <dd pn="section-4.3.2-4.4">The length of this option (including Type and Length fields)
            in units of 8 octets.  The value of this field is 1 for the 16-bit
            IEEE 1901.2 PLC short addresses. </dd>
            <dt pn="section-4.3.2-4.5">PAN ID:</dt>
            <dd pn="section-4.3.2-4.6">16-bit PAN IDentifier</dd>
            <dt pn="section-4.3.2-4.7">Padding:</dt>
            <dd pn="section-4.3.2-4.8">16 zero bits</dd>
            <dt pn="section-4.3.2-4.9">Short Address:</dt>
            <dd pn="section-4.3.2-4.10">16-bit short address</dd>
          </dl>
        </section>
      </section>
      <section anchor="nd" numbered="true" toc="include" removeInRFC="false" pn="section-4.4">
        <name slugifiedName="name-neighbor-discovery">Neighbor Discovery</name>
        <t indent="0" pn="section-4.4-1">
	Neighbor discovery procedures for 6LoWPAN networks are described in
	<xref target="RFC6775" format="default" sectionFormat="of" derivedContent="RFC6775"/> and <xref target="RFC8505" format="default" sectionFormat="of" derivedContent="RFC8505"/>.
	These optimizations support the registration of sleeping hosts.
	Although PLC devices are electrically powered, sleeping mode
	<bcp14>SHOULD</bcp14> still be used for power saving.
        </t>
        <t indent="0" pn="section-4.4-2">
	For IPv6 prefix dissemination, Router Solicitations (RSs) and Router
	Advertisements (RAs) <bcp14>MAY</bcp14> be used as per <xref target="RFC6775" format="default" sectionFormat="of" derivedContent="RFC6775"/>. If the PLC network uses
	route-over mode, the IPv6 prefix <bcp14>MAY</bcp14> be disseminated by
	the Layer 3 routing protocol, such as RPL, which may include the
	prefix in the DIO (DODAG Information Object) message. As per <xref target="RFC9010" format="default" sectionFormat="of" derivedContent="RFC9010"/>, it is possible to have PLC
	devices configured as RPL-unaware leaves, which do not participate in
	RPL at all, along with RPL-aware PLC devices. In this case, the prefix
	dissemination <bcp14>SHOULD</bcp14> use the RS/RA messages.
        </t>
        <t indent="0" pn="section-4.4-3">
	For dissemination of context information, RAs <bcp14>MUST</bcp14> be used
	as per <xref target="RFC6775" format="default" sectionFormat="of" derivedContent="RFC6775"/>. The 6LoWPAN context
	option (6CO) <bcp14>MUST</bcp14> be included in the RA to disseminate
	the Context IDs used for prefix and/or address compression.
        </t>
        <t indent="0" pn="section-4.4-4">
	For address registration in route-over mode, a PLC device
	<bcp14>MUST</bcp14> register its addresses by sending a unicast
	link-local NS to the 6LR. If the registered address is link local, the
	6LR <bcp14>SHOULD NOT</bcp14> further register it to the registrar
	(6LBR or 6BBR). Otherwise, the address <bcp14>MUST</bcp14> be registered
	via an ARO (Address Registration Option) or EARO (Extended Address
	Registration Option) included in the DAR (Duplicate Address Request)
	<xref target="RFC6775" format="default" sectionFormat="of" derivedContent="RFC6775"/> or EDAR (Extended Duplicate
	Address Request) <xref target="RFC8505" format="default" sectionFormat="of" derivedContent="RFC8505"/>
	messages. For PLC devices compliant with <xref target="RFC8505" format="default" sectionFormat="of" derivedContent="RFC8505"/>, the
	'R' flag in the EARO <bcp14>MUST</bcp14> be set when sending NSs in
	order to extract the status information in the replied NAs from the
	6LR. If DHCPv6 is used to assign addresses or the IPv6 address is
	derived from the unique long or short link-layer address, Duplicate
	Address Detection (DAD) <bcp14>SHOULD NOT</bcp14> be utilized.
	Otherwise, DAD <bcp14>MUST</bcp14> be performed at the 6LBR (as per
	<xref target="RFC6775" format="default" sectionFormat="of" derivedContent="RFC6775"/>) or proxied by the routing
	registrar (as per <xref target="RFC8505" format="default" sectionFormat="of" derivedContent="RFC8505"/>). The
	registration status is fed back via the DAC (Duplicate Address
	Confirmation) or EDAC (Extended Duplicate Address Confirmation)
	message from the 6LBR and the NA from the 6LR.  <xref target="RFC8505" sectionFormat="of" section="6" format="default" derivedLink="https://rfc-editor.org/rfc/rfc8505#section-6" derivedContent="RFC8505"/> shows how devices that only behave as specified in <xref target="RFC6775" format="default" sectionFormat="of" derivedContent="RFC6775"/> can work
	with devices that have been updated per <xref target="RFC8505" format="default" sectionFormat="of" derivedContent="RFC8505"/>.
        </t>
        <t indent="0" pn="section-4.4-5">
	For address registration in mesh-under mode, since all the PLC devices
	are link-local neighbors to the 6LBR, DAR/DAC or EDAR/EDAC messages
	are not required. A PLC device <bcp14>MUST</bcp14> register its
	addresses by sending a unicast NS message with an ARO or EARO. The
	registration status is fed back via the NA message from the 6LBR.
        </t>
      </section>
      <section anchor="Compression" numbered="true" toc="include" removeInRFC="false" pn="section-4.5">
        <name slugifiedName="name-header-compression">Header Compression</name>
        <t indent="0" pn="section-4.5-1">
        IPv6 header compression in PLC is based on <xref target="RFC6282" format="default" sectionFormat="of" derivedContent="RFC6282"/> (which updates <xref target="RFC4944" format="default" sectionFormat="of" derivedContent="RFC4944"/>). <xref target="RFC6282" format="default" sectionFormat="of" derivedContent="RFC6282"/> specifies
        the compression format for IPv6 datagrams on top of IEEE 802.15.4;
        therefore, this format is used for compression of IPv6 datagrams within
        PLC MAC frames. For situations when the PLC
	MAC MTU cannot support the 1280-octet IPv6 packet, the headers
	<bcp14>MUST</bcp14> be compressed according to the encoding formats
	specified in <xref target="RFC6282" format="default" sectionFormat="of" derivedContent="RFC6282"/>, including the
	Dispatch Header, the LOWPAN_IPHC, and the compression residue carried
	inline.
        </t>
        <t indent="0" pn="section-4.5-2">
	For IEEE 1901.2 and ITU-T G.9903, the IP header compression follows the
	instruction in <xref target="RFC6282" format="default" sectionFormat="of" derivedContent="RFC6282"/>. However,
	additional adaptation <bcp14>MUST</bcp14> be considered for IEEE
	1901.1 since it has a short address of 12 bits instead of 16 bits. The
	only modification is the semantics of the "Source Address Mode" and
	the "Destination Address Mode" when set as "10" in <xref target="RFC6282" sectionFormat="of" section="3.1" format="default" derivedLink="https://rfc-editor.org/rfc/rfc6282#section-3.1" derivedContent="RFC6282"/>, which is
	illustrated as follows.
        </t>
        <t indent="0" pn="section-4.5-3">SAM: Source Address Mode:</t>
        <t indent="0" pn="section-4.5-4">If SAC=0: Stateless compression</t>
        <dl newline="false" spacing="normal" indent="6" pn="section-4.5-5">
          <dt pn="section-4.5-5.1">10:</dt>
          <dd pn="section-4.5-5.2">16 bits. The first 112 bits of the address are elided. The value
          of the first 64 bits is the link-local prefix padded with zeros. The
          following 64 bits are 0000:00ff:fe00:0XXX, where 0XXX are the 16
          bits carried inline, in which the first 4 bits are zero. </dd>
        </dl>
        <t indent="0" pn="section-4.5-6">If SAC=1: Stateful context-based compression</t>
        <dl newline="false" spacing="normal" indent="6" pn="section-4.5-7">
          <dt pn="section-4.5-7.1">10:</dt>
          <dd pn="section-4.5-7.2">16 bits. The address is derived using context information and
          the 16 bits carried inline. Bits covered by context information are
          always used. Any IID bits not covered by context information are
          taken directly from their corresponding bits in the mapping between the
          16-bit short address and the IID as provided by 0000:00ff:fe00:0XXX,
          where 0XXX are the 16 bits
          carried inline, in which the first 4 bits are zero. Any remaining
          bits are zero. </dd>
        </dl>
        <t indent="0" pn="section-4.5-8">DAM: Destination Address Mode:</t>
        <t indent="0" pn="section-4.5-9">If M=0 and DAC=0: Stateless compression</t>
        <dl newline="false" spacing="normal" indent="6" pn="section-4.5-10">
          <dt pn="section-4.5-10.1">10:</dt>
          <dd pn="section-4.5-10.2">16 bits. The first 112 bits of the address are elided.  The
          value of the first 64 bits is the link-local prefix padded with
          zeros.  The following 64 bits are 0000:00ff:fe00:0XXX, where 0XXX
          are the 16 bits carried inline, in which the first 4 bits are zero.
          </dd>
        </dl>
        <t indent="0" pn="section-4.5-11">If M=0 and DAC=1: Stateful context-based compression</t>
        <dl newline="false" spacing="normal" indent="6" pn="section-4.5-12">
          <dt pn="section-4.5-12.1">10:</dt>
          <dd pn="section-4.5-12.2">16 bits. The address is derived using context information and
          the 16 bits carried inline.  Bits covered by context information
          are always used.  Any IID bits not covered by context information
          are taken directly from their corresponding bits in the mapping between
          the 16-bit short address and the IID as provided by 0000:00ff:fe00:0XXX,
          where 0XXX are the 16 bits
          carried inline, in which the first 4 bits are zero.  Any remaining
          bits are zero. </dd>
        </dl>
      </section>
      <section anchor="frag" numbered="true" toc="include" removeInRFC="false" pn="section-4.6">
        <name slugifiedName="name-fragmentation-and-reassembl">Fragmentation and Reassembly</name>
        <t indent="0" pn="section-4.6-1">
	The constrained PLC MAC layer provides the functions of fragmentation
	and reassembly.  However, fragmentation and reassembly are still
	required at the adaptation layer if the MAC layer cannot support the
	minimum MTU demanded by IPv6, which is 1280 octets.  </t>
        <t indent="0" pn="section-4.6-2">
	In IEEE 1901.1 and IEEE 1901.2, the MAC layer supports payloads as big
	as 2031 octets and 1576 octets, respectively. However, when the
	channel condition is noisy, smaller packets have a higher transmission
	success rate, and the operator can choose to configure smaller MTU at
	the MAC layer. If the configured MTU is smaller than 1280 octets, the
	fragmentation and reassembly defined in <xref target="RFC4944" format="default" sectionFormat="of" derivedContent="RFC4944"/> <bcp14>MUST</bcp14> be used.
        </t>
        <t indent="0" pn="section-4.6-3">
	In ITU-T G.9903, the maximum MAC payload size is fixed to 400 octets,
	so to cope with the required MTU of 1280 octets by IPv6,
	fragmentation and reassembly at the 6lo adaptation layer <bcp14>MUST</bcp14> be provided
	as specified in <xref target="RFC4944" format="default" sectionFormat="of" derivedContent="RFC4944"/>.
        </t>
        <t indent="0" pn="section-4.6-4">
	<xref target="RFC4944" format="default" sectionFormat="of" derivedContent="RFC4944"/> uses a 16-bit datagram tag
	to identify the fragments of the same IP packet. <xref target="RFC4963" format="default" sectionFormat="of" derivedContent="RFC4963"/> specifies that at high data rates,
	the 16-bit IP identification field is not large enough to prevent
	frequent incorrectly assembled IP fragments. 
For constrained PLC, the data rate is much lower than the situation mentioned
in <xref target="RFC4963" format="default" sectionFormat="of" derivedContent="RFC4963"/>; thus, the 16-bit tag is sufficient to assemble
the fragments correctly.
        </t>
      </section>
    </section>
    <section anchor="Topologies" numbered="true" toc="include" removeInRFC="false" pn="section-5">
      <name slugifiedName="name-internet-connectivity-scena">Internet Connectivity Scenarios and Topologies</name>
      <t indent="0" pn="section-5-1">
    The PLC network model can be simplified to two kinds of network devices:
    PAN Coordinator (PANC) and PLC device.  The PANC is the primary
    coordinator of the PLC subnet and can be seen as a primary node; PLC
    devices are typically PLC meters and sensors.  The address registration
    and DAD features can also be deployed on the PANC, for example, the 6LBR
    <xref target="RFC6775" format="default" sectionFormat="of" derivedContent="RFC6775"/> or the routing registrar
    <xref target="RFC8505" format="default" sectionFormat="of" derivedContent="RFC8505"/>. IPv6 over PLC networks are
    built as tree, mesh, or star topologies according to the use cases.
    Generally, each PLC network has one PANC. In some cases, the PLC network
    can have alternate coordinators to replace the PANC when the PANC leaves
    the network for some reason.  Note that the PLC topologies in this section
    are based on logical connectivity, not physical links. The term "PLC
    subnet" refers to a multilink subnet, in which the PLC devices share the
    same address prefix.
</t>
      <t indent="0" pn="section-5-2">
    The star topology is common in current PLC scenarios.  In single-hop star
    topologies, communication at the link layer only takes place between a PLC
    device and a PANC.  The PANC typically collects data (e.g., a meter
    reading) from the PLC devices and then concentrates and uploads the data
    through Ethernet or cellular networks (see <xref target="fig-plc-star" format="default" sectionFormat="of" derivedContent="Figure 5"/>).  The collected data is transmitted by the smart
    meters through PLC, aggregated by a concentrator, and sent to the utility and
    then to a Meter Data Management System for data storage, analysis, and
    billing.  This topology has been widely applied in the deployment of smart
    meters, especially in apartment buildings.
</t>
      <figure anchor="fig-plc-star" align="left" suppress-title="false" pn="figure-5">
        <name slugifiedName="name-plc-star-network-connected-">PLC Star Network Connected to the Internet</name>
        <artwork name="" type="" align="left" alt="" pn="section-5-3.1">
                PLC Device   PLC Device
                      \        /           +---------
                       \      /           /
                        \    /           +
                         \  /            |
       PLC Device ------ PANC ===========+  Internet
                         /  \            |
                        /    \           +
                       /      \           \
                      /        \           +---------
                PLC Device   PLC Device

             &lt;----------------------&gt;
            PLC subnet (IPv6 over PLC)
</artwork>
      </figure>
      <t indent="0" pn="section-5-4">
    A tree topology is useful when the distance between a device A and the PANC is
    beyond the PLC-allowed limit and there is another device B in between
    able to communicate with both sides.  Device B in this case acts as both 
    a PLC device and a Coordinator.

    For this scenario, the link-layer
    communications take place between device A and device B, and between
    device B and PANC.  An example of a PLC tree network is depicted
    in <xref target="fig-plc-tree" format="default" sectionFormat="of" derivedContent="Figure 6"/>.  This topology can be applied in 
    smart street lighting, where the lights adjust the brightness to reduce
    energy consumption while sensors are deployed on the street lights to
    provide information such as light intensity, temperature, and humidity.
    The data-transmission distance in the street lighting scenario is normally
    above several kilometers; thus, a PLC tree network is required.  A more
    sophisticated AMI network may also be constructed into the tree topology
    that is depicted in <xref target="RFC8036" format="default" sectionFormat="of" derivedContent="RFC8036"/>.  A tree topology is suitable
    for AMI scenarios that require large coverage but low density,
    e.g., the deployment of smart meters in rural areas.  RPL is suitable
    for maintenance of a tree topology in which there is no need for
    communication directly between PAN devices.
</t>
      <figure anchor="fig-plc-tree" align="left" suppress-title="false" pn="figure-6">
        <name slugifiedName="name-plc-tree-network-connected-">PLC Tree Network Connected to the Internet</name>
        <artwork name="" type="" align="left" alt="" pn="section-5-5.1">
                       PLC Device
                            \                   +---------
            PLC Device A     \                 /
                    \         \               +
                     \         \              |
              PLC Device B -- PANC ===========+  Internet
                     /         /              |
                    /         /               +
   PLC Device---PLC Device   /                 \
                            /                   +---------
           PLC Device---PLC Device

         &lt;-------------------------&gt;
         PLC subnet (IPv6 over PLC)
</artwork>
      </figure>
      <t indent="0" pn="section-5-6">
   Mesh networking in PLC has many potential applications and has been
   studied for several years.  By connecting all nodes with their neighbors
   in communication range (see <xref target="fig-plc-mesh" format="default" sectionFormat="of" derivedContent="Figure 7"/>), a mesh
   topology dramatically enhances the communication efficiency and thus
   expands the size of PLC networks.  A simple use case is the smart home
   scenario where the ON/OFF state of air conditioning is controlled by
   the state of home lights (ON/OFF) and doors (OPEN/CLOSE). AODV-RPL <xref target="I-D.ietf-roll-aodv-rpl" format="default" sectionFormat="of" derivedContent="AODV-RPL"/>
   enables direct communication between PLC devices, without being obliged
   to transmit frames through the PANC, which is a requirement often cited
   for the AMI infrastructure. 

</t>
      <figure anchor="fig-plc-mesh" align="left" suppress-title="false" pn="figure-7">
        <name slugifiedName="name-plc-mesh-network-connected-">PLC Mesh Network Connected to the Internet</name>
        <artwork name="" type="" align="left" alt="" pn="section-5-7.1">
             PLC Device---PLC Device
                 / \        / \                   +---------
                /   \      /   \                 /
               /     \    /     \               +
              /       \  /       \              |
       PLC Device--PLC Device---PANC ===========+  Internet
              \       /  \       /              |
               \     /    \     /               +
                \   /      \   /                 \
                 \ /        \ /                   +---------
             PLC Device---PLC Device

     &lt;-------------------------------&gt;
         PLC subnet (IPv6 over PLC)
</artwork>
      </figure>
    </section>
    <section anchor="OAM" numbered="true" toc="include" removeInRFC="false" pn="section-6">
      <name slugifiedName="name-operations-and-manageabilit">Operations and Manageability Considerations</name>
      <t indent="0" pn="section-6-1">
	Constrained PLC networks are not managed in the same way as
	enterprise networks or carrier networks. Constrained PLC networks,
	like the other IoT networks, are designed to be self-organized and
	self-managed. The software or firmware is flashed into the devices
	before deployment by the vendor or operator. And during the deployment
	process, the devices are bootstrapped, and no extra configuration is
	needed to get the devices connected to each other. Once a device
	becomes offline, it goes back to the bootstrapping stage and tries to
	rejoin the network. The onboarding status of the devices and the
	topology of the PLC network can be visualized via the PANC. The
	recently formed IOTOPS WG in the IETF aims to identify the
	requirements in IoT network management, and operational practices will
	be published. Developers and operators of PLC networks should be able
	to learn operational experiences from this WG.
      </t>
    </section>
    <section anchor="IANA" numbered="true" toc="include" removeInRFC="false" pn="section-7">
      <name slugifiedName="name-iana-considerations">IANA Considerations</name>
      <t indent="0" pn="section-7-1">
	This document has no IANA actions.
      </t>
    </section>
    <section anchor="Security" numbered="true" toc="include" removeInRFC="false" pn="section-8">
      <name slugifiedName="name-security-considerations">Security Considerations</name>
      <t indent="0" pn="section-8-1">
	Due to the high accessibility of power grids, PLC might be susceptible
	to eavesdropping within its communication coverage, e.g., one
	apartment tenant may have the chance to monitor the other smart
	meters in the same apartment building. Link-layer security mechanisms, 
	such as payload encryption and device authentication, 
	are designed in the PLC technologies mentioned in this document. 
	Additionally, an on-path malicious PLC device could eavesdrop or modify 
	packets sent through it if appropriate confidentiality and integrity 
	mechanisms are not implemented.
      </t>
      <t indent="0" pn="section-8-2">
	Malicious PLC devices could paralyze the whole network via DoS
	attacks, e.g., keep joining and leaving the network frequently or
	sending multicast routing messages containing fake metrics. A device
	may also inadvertently join a wrong or even malicious network,
	exposing its data to malicious users. When communicating with a device
	outside the PLC network, the traffic has to go through the PANC. Thus,
	the PANC must be a trusted entity. Moreover, the PLC network must
	prevent malicious devices from joining the network. Thus, mutual
	authentication of a PLC network and a new device is important, and it
	can be conducted during the onboarding process of the new
	device. Methods include protocols such as the TLS/DTLS Profile <xref target="RFC7925" format="default" sectionFormat="of" derivedContent="RFC7925"/> (exchanging pre-installed certificates over DTLS),
	the Constrained Join Protocol (CoJP) <xref target="RFC9031" format="default" sectionFormat="of" derivedContent="RFC9031"/> (which uses pre-shared
	keys), and Zero-Touch Secure Join <xref target="I-D.ietf-6tisch-dtsecurity-zerotouch-join" format="default" sectionFormat="of" derivedContent="ZEROTOUCH"/> (an IoT version of the Bootstrapping Remote Secure Key Infrastructure (BRSKI), which uses an Initial
	Device Identifier (IDevID) and a Manufacturer Authorized Signing
	Authority (MASA) service to facilitate authentication). It is also
	possible to use Extensible Authentication Protocol (EAP) methods such
	as the one defined in <xref target="RFC9140" format="default" sectionFormat="of" derivedContent="RFC9140"/> via transports like
	Protocol for Carrying Authentication for Network Access (PANA) <xref target="RFC5191" format="default" sectionFormat="of" derivedContent="RFC5191"/>. No specific mechanism is
	specified by this document, as an appropriate mechanism will depend
	upon deployment circumstances. In some cases, the PLC devices can be
	deployed in uncontrolled places, where the devices may be accessed
	physically and be compromised via key extraction. The compromised
	device may be still able to join in the network since its credentials
	are still valid. When group-shared symmetric keys are used in the
	network, the consequence is even more severe, i.e., the whole network
	or a large part of the network is at risk. Thus, in scenarios where
	physical attacks are considered to be relatively highly possible,
	per-device credentials <bcp14>SHOULD</bcp14> be used. Moreover,
	additional end-to-end security services are complementary to the
	network-side security mechanisms, e.g., if a device is compromised and
	has joined in the network, and then it claims itself as the PANC and
	tries to make the rest of the devices join its network. In this
	situation, the real PANC can send an alarm to the operator to
	acknowledge the risk.  Other behavior-analysis mechanisms can be
	deployed to recognize the malicious PLC devices by inspecting the
	packets and the data.
      </t>
      <t indent="0" pn="section-8-3">
	IP addresses may be used to track devices on the Internet; such
	devices can often in turn be linked to individuals and their
	activities.  Depending on the application and the actual use pattern,
	this may be undesirable.  To impede tracking, globally unique and
	non-changing characteristics of IP addresses should be avoided, e.g.,
	by frequently changing the global prefix and avoiding unique
	link-layer derived IIDs in addresses. <xref target="RFC8065" format="default" sectionFormat="of" derivedContent="RFC8065"/> discusses the privacy threats when an IID is generated without sufficient entropy, including
	correlation of activities over time, location tracking,
	device-specific vulnerability exploitation, and address scanning. And
	an effective way to deal with these threats is to have enough entropy
	in the IID compared to the link lifetime.  Consider a PLC network
	with 1024 devices and a link lifetime is 8 years, according to
	the formula in <xref target="RFC8065" format="default" sectionFormat="of" derivedContent="RFC8065"/>, an entropy
	of 40 bits is sufficient.  Padding the short address (12 or 16 bits)
	to generate the IID of a routable IPv6 address in the public network
	may be vulnerable to deal with address scans.  Thus, as suggested in
	<xref target="slaac" format="default" sectionFormat="of" derivedContent="Section 4.1"/>, a hash function can be used to generate a 64-bit
	IID.  When the version number of the PLC network is changed, the
	IPv6 addresses can be changed as well.  Other schemes such as limited
	lease period in DHCPv6 <xref target="RFC8415" format="default" sectionFormat="of" derivedContent="RFC8415"/>,
	Cryptographically Generated Addresses (CGAs) <xref target="RFC3972" format="default" sectionFormat="of" derivedContent="RFC3972"/>, Temporary Address Extensions <xref target="RFC8981" format="default" sectionFormat="of" derivedContent="RFC8981"/>, Hash-Based Addresses (HBAs) <xref target="RFC5535" format="default" sectionFormat="of" derivedContent="RFC5535"/>, or semantically opaque addresses
	<xref target="RFC7217" format="default" sectionFormat="of" derivedContent="RFC7217"/> <bcp14>SHOULD</bcp14> be
	used to enhance the IID privacy.
      </t>
    </section>
  </middle>
  <back>
    <displayreference target="I-D.ietf-roll-aodv-rpl" to="AODV-RPL"/>
    <displayreference target="I-D.ietf-6tisch-dtsecurity-zerotouch-join" to="ZEROTOUCH"/>
    <references pn="section-9">
      <name slugifiedName="name-references">References</name>
      <references pn="section-9.1">
        <name slugifiedName="name-normative-references">Normative References</name>
        <reference anchor="IEEE_1901.1" target="https://ieeexplore.ieee.org/document/8360785" quoteTitle="true" derivedAnchor="IEEE_1901.1">
          <front>
            <title>IEEE Standard for Medium Frequency (less than 12 MHz) Power Line Communications for Smart Grid Applications</title>
            <author>
              <organization showOnFrontPage="true">IEEE</organization>
            </author>
            <date month="May" year="2018"/>
          </front>
          <seriesInfo name="DOI" value="10.1109/IEEESTD.2018.8360785"/>
          <seriesInfo name="IEEE Std" value="1901.1"/>
        </reference>
        <reference anchor="IEEE_1901.2" target="https://ieeexplore.ieee.org/document/6679210" quoteTitle="true" derivedAnchor="IEEE_1901.2">
          <front>
            <title>IEEE Standard for Low-Frequency (less than 500 kHz) Narrowband Power Line Communications for Smart Grid Applications</title>
            <author>
              <organization showOnFrontPage="true">IEEE</organization>
            </author>
            <date month="December" year="2013"/>
          </front>
          <seriesInfo name="DOI" value="10.1109/IEEESTD.2013.6679210"/>
          <seriesInfo name="IEEE Std" value="1901.2"/>
        </reference>
        <reference anchor="ITU-T_G.9903" target="https://www.itu.int/rec/T-REC-G.9903" quoteTitle="true" derivedAnchor="ITU-T_G.9903">
          <front>
            <title>Narrowband orthogonal frequency division multiplexing power line communication transceivers for G3-PLC networks</title>
            <author>
              <organization showOnFrontPage="true">ITU-T</organization>
            </author>
            <date month="August" year="2017"/>
          </front>
          <seriesInfo name="ITU-T Recommendation" value="G.9903"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" quoteTitle="true" derivedAnchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t indent="0">In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized.  This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
          <format target="https://www.rfc-editor.org/info/rfc2119" type="TXT"/>
        </reference>
        <reference anchor="RFC2464" target="https://www.rfc-editor.org/info/rfc2464" quoteTitle="true" derivedAnchor="RFC2464">
          <front>
            <title>Transmission of IPv6 Packets over Ethernet Networks</title>
            <author fullname="M. Crawford" initials="M." surname="Crawford"/>
            <date month="December" year="1998"/>
            <abstract>
              <t indent="0">This document specifies the frame format for transmission of IPv6 packets and the method of forming IPv6 link-local addresses and statelessly autoconfigured addresses on Ethernet networks.  It also specifies the content of the Source/Target Link-layer Address option used in Router Solicitation, Router Advertisement, Neighbor Solicitation, Neighbor Advertisement and Redirect messages when those messages are transmitted on an Ethernet. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2464"/>
          <seriesInfo name="DOI" value="10.17487/RFC2464"/>
          <format target="https://www.rfc-editor.org/info/rfc2464" type="TXT"/>
        </reference>
        <reference anchor="RFC4291" target="https://www.rfc-editor.org/info/rfc4291" quoteTitle="true" derivedAnchor="RFC4291">
          <front>
            <title>IP Version 6 Addressing Architecture</title>
            <author fullname="R. Hinden" initials="R." surname="Hinden"/>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <date month="February" year="2006"/>
            <abstract>
              <t indent="0">This specification defines the addressing architecture of the IP Version 6 (IPv6) protocol. The document includes the IPv6 addressing model, text representations of IPv6 addresses, definition of IPv6 unicast addresses, anycast addresses, and multicast addresses, and an IPv6 node's required addresses.</t>
              <t indent="0">This document obsoletes RFC 3513, "IP Version 6 Addressing Architecture". [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4291"/>
          <seriesInfo name="DOI" value="10.17487/RFC4291"/>
          <format target="https://www.rfc-editor.org/info/rfc4291" type="TXT"/>
        </reference>
        <reference anchor="RFC4861" target="https://www.rfc-editor.org/info/rfc4861" quoteTitle="true" derivedAnchor="RFC4861">
          <front>
            <title>Neighbor Discovery for IP version 6 (IPv6)</title>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <author fullname="W. Simpson" initials="W." surname="Simpson"/>
            <author fullname="H. Soliman" initials="H." surname="Soliman"/>
            <date month="September" year="2007"/>
            <abstract>
              <t indent="0">This document specifies the Neighbor Discovery protocol for IP Version 6.  IPv6 nodes on the same link use Neighbor Discovery to discover each other's presence, to determine each other's link-layer addresses, to find routers, and to maintain reachability information about the paths to active neighbors. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4861"/>
          <seriesInfo name="DOI" value="10.17487/RFC4861"/>
          <format target="https://www.rfc-editor.org/info/rfc4861" type="TXT"/>
        </reference>
        <reference anchor="RFC4944" target="https://www.rfc-editor.org/info/rfc4944" quoteTitle="true" derivedAnchor="RFC4944">
          <front>
            <title>Transmission of IPv6 Packets over IEEE 802.15.4 Networks</title>
            <author fullname="G. Montenegro" initials="G." surname="Montenegro"/>
            <author fullname="N. Kushalnagar" initials="N." surname="Kushalnagar"/>
            <author fullname="J. Hui" initials="J." surname="Hui"/>
            <author fullname="D. Culler" initials="D." surname="Culler"/>
            <date month="September" year="2007"/>
            <abstract>
              <t indent="0">This document describes the frame format for transmission of IPv6 packets and the method of forming IPv6 link-local addresses and statelessly autoconfigured addresses on IEEE 802.15.4 networks.  Additional specifications include a simple header compression scheme using shared context and provisions for packet delivery in IEEE 802.15.4 meshes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4944"/>
          <seriesInfo name="DOI" value="10.17487/RFC4944"/>
          <format target="https://www.rfc-editor.org/info/rfc4944" type="TXT"/>
        </reference>
        <reference anchor="RFC6282" target="https://www.rfc-editor.org/info/rfc6282" quoteTitle="true" derivedAnchor="RFC6282">
          <front>
            <title>Compression Format for IPv6 Datagrams over IEEE 802.15.4-Based Networks</title>
            <author fullname="J. Hui" initials="J." role="editor" surname="Hui"/>
            <author fullname="P. Thubert" initials="P." surname="Thubert"/>
            <date month="September" year="2011"/>
            <abstract>
              <t indent="0">This document updates RFC 4944, "Transmission of IPv6 Packets over IEEE 802.15.4 Networks".  This document specifies an IPv6 header compression format for IPv6 packet delivery in Low Power Wireless Personal Area Networks (6LoWPANs).  The compression format relies on shared context to allow compression of arbitrary prefixes.  How the information is maintained in that shared context is out of scope.  This document specifies compression of multicast addresses and a framework for compressing next headers.  UDP header compression is specified within this framework. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6282"/>
          <seriesInfo name="DOI" value="10.17487/RFC6282"/>
          <format target="https://www.rfc-editor.org/info/rfc6282" type="TXT"/>
        </reference>
        <reference anchor="RFC6550" target="https://www.rfc-editor.org/info/rfc6550" quoteTitle="true" derivedAnchor="RFC6550">
          <front>
            <title>RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks</title>
            <author fullname="T. Winter" initials="T." role="editor" surname="Winter"/>
            <author fullname="P. Thubert" initials="P." role="editor" surname="Thubert"/>
            <author fullname="A. Brandt" initials="A." surname="Brandt"/>
            <author fullname="J. Hui" initials="J." surname="Hui"/>
            <author fullname="R. Kelsey" initials="R." surname="Kelsey"/>
            <author fullname="P. Levis" initials="P." surname="Levis"/>
            <author fullname="K. Pister" initials="K." surname="Pister"/>
            <author fullname="R. Struik" initials="R." surname="Struik"/>
            <author fullname="JP. Vasseur" initials="JP." surname="Vasseur"/>
            <author fullname="R. Alexander" initials="R." surname="Alexander"/>
            <date month="March" year="2012"/>
            <abstract>
              <t indent="0">Low-Power and Lossy Networks (LLNs) are a class of network in which both the routers and their interconnect are constrained.  LLN routers typically operate with constraints on processing power, memory, and energy (battery power).  Their interconnects are characterized by high loss rates, low data rates, and instability.  LLNs are comprised of anything from a few dozen to thousands of routers.  Supported traffic flows include point-to-point (between devices inside the LLN), point-to-multipoint (from a central control point to a subset of devices inside the LLN), and multipoint-to-point (from devices inside the LLN towards a central control point).  This document specifies the IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL), which provides a mechanism whereby multipoint-to-point traffic from devices inside the LLN towards a central control point as well as point-to-multipoint traffic from the central control point to the devices inside the LLN are supported.  Support for point-to-point traffic is also available. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6550"/>
          <seriesInfo name="DOI" value="10.17487/RFC6550"/>
          <format target="https://www.rfc-editor.org/info/rfc6550" type="TXT"/>
        </reference>
        <reference anchor="RFC6775" target="https://www.rfc-editor.org/info/rfc6775" quoteTitle="true" derivedAnchor="RFC6775">
          <front>
            <title>Neighbor Discovery Optimization for IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs)</title>
            <author fullname="Z. Shelby" initials="Z." role="editor" surname="Shelby"/>
            <author fullname="S. Chakrabarti" initials="S." surname="Chakrabarti"/>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="November" year="2012"/>
            <abstract>
              <t indent="0">The IETF work in IPv6 over Low-power Wireless Personal Area Network (6LoWPAN) defines 6LoWPANs such as IEEE 802.15.4.  This and other similar link technologies have limited or no usage of multicast signaling due to energy conservation.  In addition, the wireless network may not strictly follow the traditional concept of IP subnets and IP links.  IPv6 Neighbor Discovery was not designed for non- transitive wireless links, as its reliance on the traditional IPv6 link concept and its heavy use of multicast make it inefficient and sometimes impractical in a low-power and lossy network.  This document describes simple optimizations to IPv6 Neighbor Discovery, its addressing mechanisms, and duplicate address detection for Low- power Wireless Personal Area Networks and similar networks.  The document thus updates RFC 4944 to specify the use of the optimizations defined here. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6775"/>
          <seriesInfo name="DOI" value="10.17487/RFC6775"/>
          <format target="https://www.rfc-editor.org/info/rfc6775" type="TXT"/>
        </reference>
        <reference anchor="RFC7136" target="https://www.rfc-editor.org/info/rfc7136" quoteTitle="true" derivedAnchor="RFC7136">
          <front>
            <title>Significance of IPv6 Interface Identifiers</title>
            <author fullname="B. Carpenter" initials="B." surname="Carpenter"/>
            <author fullname="S. Jiang" initials="S." surname="Jiang"/>
            <date month="February" year="2014"/>
            <abstract>
              <t indent="0">The IPv6 addressing architecture includes a unicast interface identifier that is used in the creation of many IPv6 addresses.  Interface identifiers are formed by a variety of methods.  This document clarifies that the bits in an interface identifier have no meaning and that the entire identifier should be treated as an opaque value.  In particular, RFC 4291 defines a method by which the Universal and Group bits of an IEEE link-layer address are mapped into an IPv6 unicast interface identifier.  This document clarifies that those two bits are significant only in the process of deriving interface identifiers from an IEEE link-layer address, and it updates RFC 4291 accordingly.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7136"/>
          <seriesInfo name="DOI" value="10.17487/RFC7136"/>
          <format target="https://www.rfc-editor.org/info/rfc7136" type="TXT"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" quoteTitle="true" derivedAnchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t indent="0">RFC 2119 specifies common key words that may be used in protocol specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
          <format target="https://www.rfc-editor.org/info/rfc8174" type="TXT"/>
        </reference>
        <reference anchor="RFC8505" target="https://www.rfc-editor.org/info/rfc8505" quoteTitle="true" derivedAnchor="RFC8505">
          <front>
            <title>Registration Extensions for IPv6 over Low-Power Wireless Personal Area Network (6LoWPAN) Neighbor Discovery</title>
            <author fullname="P. Thubert" initials="P." role="editor" surname="Thubert"/>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <author fullname="S. Chakrabarti" initials="S." surname="Chakrabarti"/>
            <author fullname="C. Perkins" initials="C." surname="Perkins"/>
            <date month="November" year="2018"/>
            <abstract>
              <t indent="0">This specification updates RFC 6775 -- the Low-Power Wireless Personal Area Network (6LoWPAN) Neighbor Discovery specification -- to clarify the role of the protocol as a registration technique and simplify the registration operation in 6LoWPAN routers, as well as to provide enhancements to the registration capabilities and mobility detection for different network topologies, including the Routing Registrars performing routing for host routes and/or proxy Neighbor Discovery in a low-power network.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8505"/>
          <seriesInfo name="DOI" value="10.17487/RFC8505"/>
          <format target="https://www.rfc-editor.org/info/rfc8505" type="TXT"/>
        </reference>
      </references>
      <references pn="section-9.2">
        <name slugifiedName="name-informative-references">Informative References</name>
        <reference anchor="I-D.ietf-roll-aodv-rpl" target="https://datatracker.ietf.org/doc/html/draft-ietf-roll-aodv-rpl-15" quoteTitle="true" derivedAnchor="AODV-RPL">
          <front>
            <title>Supporting Asymmetric Links in Low Power Networks: AODV-RPL</title>
            <author initials="C. E." surname="Perkins" fullname="Charles E. Perkins">
              <organization showOnFrontPage="true">Lupin Lodge</organization>
            </author>
            <author initials="S.V.R." surname="Anand" fullname="S.V.R Anand">
              <organization showOnFrontPage="true">Indian Institute of Science</organization>
            </author>
            <author initials="S." surname="Anamalamudi" fullname="Satish Anamalamudi">
              <organization showOnFrontPage="true">SRM University-AP</organization>
            </author>
            <author initials="B." surname="Liu" fullname="Bing Liu">
              <organization showOnFrontPage="true">Huawei Technologies</organization>
            </author>
            <date month="September" day="30" year="2022"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-roll-aodv-rpl-15"/>
          <refcontent>Work in Progress</refcontent>
        </reference>
        <reference anchor="EUI-64" target="https://standards.ieee.org/wp-content/uploads/import/documents/tutorials/eui.pdf" quoteTitle="true" derivedAnchor="EUI-64">
          <front>
            <title>Guidelines for Use of Extended Unique Identifier (EUI), Organizationally Unique Identifier (OUI), and Company ID (CID)</title>
            <author>
              <organization showOnFrontPage="true">IEEE Standards Association</organization>
            </author>
            <date month="August" year="2017"/>
          </front>
        </reference>
        <reference anchor="IEEE_1901.2a" target="https://ieeexplore.ieee.org/document/7286946" quoteTitle="true" derivedAnchor="IEEE_1901.2a">
          <front>
            <title>IEEE Standard for Low-Frequency (less than 500 kHz) Narrowband Power Line Communications for Smart Grid Applications - Amendment 1</title>
            <author>
              <organization showOnFrontPage="true">IEEE</organization>
            </author>
            <date month="October" year="2015"/>
          </front>
          <seriesInfo name="DOI" value="10.1109/IEEESTD.2013.6679210"/>
          <seriesInfo name="IEEE Std" value="1901.2a"/>
        </reference>
        <reference anchor="RFC3972" target="https://www.rfc-editor.org/info/rfc3972" quoteTitle="true" derivedAnchor="RFC3972">
          <front>
            <title>Cryptographically Generated Addresses (CGA)</title>
            <author fullname="T. Aura" initials="T." surname="Aura"/>
            <date month="March" year="2005"/>
            <abstract>
              <t indent="0">This document describes a method for binding a public signature key to an IPv6 address in the Secure Neighbor Discovery (SEND) protocol.  Cryptographically Generated Addresses (CGA) are IPv6 addresses for which the interface identifier is generated by computing a cryptographic one-way hash function from a public key and auxiliary parameters.  The binding between the public key and the address can be verified by re-computing the hash value and by comparing the hash with the interface identifier.  Messages sent from an IPv6 address can be protected by attaching the public key and auxiliary parameters and by signing the message with the corresponding private key.  The protection works without a certification authority or any security infrastructure. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3972"/>
          <seriesInfo name="DOI" value="10.17487/RFC3972"/>
          <format target="https://www.rfc-editor.org/info/rfc3972" type="TXT"/>
        </reference>
        <reference anchor="RFC4963" target="https://www.rfc-editor.org/info/rfc4963" quoteTitle="true" derivedAnchor="RFC4963">
          <front>
            <title>IPv4 Reassembly Errors at High Data Rates</title>
            <author fullname="J. Heffner" initials="J." surname="Heffner"/>
            <author fullname="M. Mathis" initials="M." surname="Mathis"/>
            <author fullname="B. Chandler" initials="B." surname="Chandler"/>
            <date month="July" year="2007"/>
            <abstract>
              <t indent="0">IPv4 fragmentation is not sufficiently robust for use under some conditions in today's Internet.  At high data rates, the 16-bit IP identification field is not large enough to prevent frequent incorrectly assembled IP fragments, and the TCP and UDP checksums are insufficient to prevent the resulting corrupted datagrams from being delivered to higher protocol layers.  This note describes some easily reproduced experiments demonstrating the problem, and discusses some of the operational implications of these observations.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4963"/>
          <seriesInfo name="DOI" value="10.17487/RFC4963"/>
          <format target="https://www.rfc-editor.org/info/rfc4963" type="TXT"/>
        </reference>
        <reference anchor="RFC5191" target="https://www.rfc-editor.org/info/rfc5191" quoteTitle="true" derivedAnchor="RFC5191">
          <front>
            <title>Protocol for Carrying Authentication for Network Access (PANA)</title>
            <author fullname="D. Forsberg" initials="D." surname="Forsberg"/>
            <author fullname="Y. Ohba" initials="Y." role="editor" surname="Ohba"/>
            <author fullname="B. Patil" initials="B." surname="Patil"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="A. Yegin" initials="A." surname="Yegin"/>
            <date month="May" year="2008"/>
            <abstract>
              <t indent="0">This document defines the Protocol for Carrying Authentication for Network Access (PANA), a network-layer transport for Extensible Authentication Protocol (EAP) to enable network access authentication between clients and access networks.  In EAP terms, PANA is a UDP-based EAP lower layer that runs between the EAP peer and the EAP authenticator. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5191"/>
          <seriesInfo name="DOI" value="10.17487/RFC5191"/>
          <format target="https://www.rfc-editor.org/info/rfc5191" type="TXT"/>
        </reference>
        <reference anchor="RFC5535" target="https://www.rfc-editor.org/info/rfc5535" quoteTitle="true" derivedAnchor="RFC5535">
          <front>
            <title>Hash-Based Addresses (HBA)</title>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <date month="June" year="2009"/>
            <abstract>
              <t indent="0">This memo describes a mechanism to provide a secure binding between the multiple addresses with different prefixes available to a host within a multihomed site.  This mechanism employs either Cryptographically Generated Addresses (CGAs) or a new variant of the same theme that uses the same format in the addresses.  The main idea in the new variant is that information about the multiple prefixes is included within the addresses themselves.  This is achieved by generating the interface identifiers of the addresses of a host as hashes of the available prefixes and a random number.  Then, the multiple addresses are generated by prepending the different prefixes to the generated interface identifiers.  The result is a set of addresses, called Hash-Based Addresses (HBAs), that are inherently bound to each other. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5535"/>
          <seriesInfo name="DOI" value="10.17487/RFC5535"/>
          <format target="https://www.rfc-editor.org/info/rfc5535" type="TXT"/>
        </reference>
        <reference anchor="RFC7217" target="https://www.rfc-editor.org/info/rfc7217" quoteTitle="true" derivedAnchor="RFC7217">
          <front>
            <title>A Method for Generating Semantically Opaque Interface Identifiers with IPv6 Stateless Address Autoconfiguration (SLAAC)</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <date month="April" year="2014"/>
            <abstract>
              <t indent="0">This document specifies a method for generating IPv6 Interface Identifiers to be used with IPv6 Stateless Address Autoconfiguration (SLAAC), such that an IPv6 address configured using this method is stable within each subnet, but the corresponding Interface Identifier changes when the host moves from one network to another.  This method is meant to be an alternative to generating Interface Identifiers based on hardware addresses (e.g., IEEE LAN Media Access Control (MAC) addresses), such that the benefits of stable addresses can be achieved without sacrificing the security and privacy of users.  The method specified in this document applies to all prefixes a host may be employing, including link-local, global, and unique-local prefixes (and their corresponding addresses).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7217"/>
          <seriesInfo name="DOI" value="10.17487/RFC7217"/>
          <format target="https://www.rfc-editor.org/info/rfc7217" type="TXT"/>
        </reference>
        <reference anchor="RFC7925" target="https://www.rfc-editor.org/info/rfc7925" quoteTitle="true" derivedAnchor="RFC7925">
          <front>
            <title>Transport Layer Security (TLS) / Datagram Transport Layer Security (DTLS) Profiles for the Internet of Things</title>
            <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="July" year="2016"/>
            <abstract>
              <t indent="0">A common design pattern in Internet of Things (IoT) deployments is the use of a constrained device that collects data via sensors or controls actuators for use in home automation, industrial control systems, smart cities, and other IoT deployments.</t>
              <t indent="0">This document defines a Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) 1.2 profile that offers communications security for this data exchange thereby preventing eavesdropping, tampering, and message forgery. The lack of communication security is a common vulnerability in IoT products that can easily be solved by using these well-researched and widely deployed Internet security protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7925"/>
          <seriesInfo name="DOI" value="10.17487/RFC7925"/>
          <format target="https://www.rfc-editor.org/info/rfc7925" type="TXT"/>
        </reference>
        <reference anchor="RFC7973" target="https://www.rfc-editor.org/info/rfc7973" quoteTitle="true" derivedAnchor="RFC7973">
          <front>
            <title>Assignment of an Ethertype for IPv6 with Low-Power Wireless Personal Area Network (LoWPAN) Encapsulation</title>
            <author fullname="R. Droms" initials="R." surname="Droms"/>
            <author fullname="P. Duffy" initials="P." surname="Duffy"/>
            <date month="November" year="2016"/>
            <abstract>
              <t indent="0">When carried over Layer 2 technologies such as Ethernet, IPv6 datagrams using Low-Power Wireless Personal Area Network (LoWPAN) encapsulation as defined in RFC 4944 must be identified so the receiver can correctly interpret the encoded IPv6 datagram.  The IETF officially requested the assignment of an Ethertype for that purpose and this document reports that assignment.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7973"/>
          <seriesInfo name="DOI" value="10.17487/RFC7973"/>
          <format target="https://www.rfc-editor.org/info/rfc7973" type="TXT"/>
        </reference>
        <reference anchor="RFC8036" target="https://www.rfc-editor.org/info/rfc8036" quoteTitle="true" derivedAnchor="RFC8036">
          <front>
            <title>Applicability Statement for the Routing Protocol for Low-Power and Lossy Networks (RPL) in Advanced Metering Infrastructure (AMI) Networks</title>
            <author fullname="N. Cam-Winget" initials="N." role="editor" surname="Cam-Winget"/>
            <author fullname="J. Hui" initials="J." surname="Hui"/>
            <author fullname="D. Popa" initials="D." surname="Popa"/>
            <date month="January" year="2017"/>
            <abstract>
              <t indent="0">This document discusses the applicability of the Routing Protocol for Low-Power and Lossy Networks (RPL) in Advanced Metering Infrastructure (AMI) networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8036"/>
          <seriesInfo name="DOI" value="10.17487/RFC8036"/>
          <format target="https://www.rfc-editor.org/info/rfc8036" type="TXT"/>
        </reference>
        <reference anchor="RFC8065" target="https://www.rfc-editor.org/info/rfc8065" quoteTitle="true" derivedAnchor="RFC8065">
          <front>
            <title>Privacy Considerations for IPv6 Adaptation-Layer Mechanisms</title>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <date month="February" year="2017"/>
            <abstract>
              <t indent="0">This document discusses how a number of privacy threats apply to technologies designed for IPv6 over various link-layer protocols, and it provides advice to protocol designers on how to address such threats in adaptation-layer specifications for IPv6 over such links.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8065"/>
          <seriesInfo name="DOI" value="10.17487/RFC8065"/>
          <format target="https://www.rfc-editor.org/info/rfc8065" type="TXT"/>
        </reference>
        <reference anchor="RFC8415" target="https://www.rfc-editor.org/info/rfc8415" quoteTitle="true" derivedAnchor="RFC8415">
          <front>
            <title>Dynamic Host Configuration Protocol for IPv6 (DHCPv6)</title>
            <author fullname="T. Mrugalski" initials="T." surname="Mrugalski"/>
            <author fullname="M. Siodelski" initials="M." surname="Siodelski"/>
            <author fullname="B. Volz" initials="B." surname="Volz"/>
            <author fullname="A. Yourtchenko" initials="A." surname="Yourtchenko"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="S. Jiang" initials="S." surname="Jiang"/>
            <author fullname="T. Lemon" initials="T." surname="Lemon"/>
            <author fullname="T. Winters" initials="T." surname="Winters"/>
            <date month="November" year="2018"/>
            <abstract>
              <t indent="0">This document describes the Dynamic Host Configuration Protocol for IPv6 (DHCPv6): an extensible mechanism for configuring nodes with network configuration parameters, IP addresses, and prefixes. Parameters can be provided statelessly, or in combination with stateful assignment of one or more IPv6 addresses and/or IPv6 prefixes. DHCPv6 can operate either in place of or in addition to stateless address autoconfiguration (SLAAC).</t>
              <t indent="0">This document updates the text from RFC 3315 (the original DHCPv6 specification) and incorporates prefix delegation (RFC 3633), stateless DHCPv6 (RFC 3736), an option to specify an upper bound for how long a client should wait before refreshing information (RFC 4242), a mechanism for throttling DHCPv6 clients when DHCPv6 service is not available (RFC 7083), and relay agent handling of unknown messages (RFC 7283). In addition, this document clarifies the interactions between models of operation (RFC 7550). As such, this document obsoletes RFC 3315, RFC 3633, RFC 3736, RFC 4242, RFC 7083, RFC 7283, and RFC 7550.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8415"/>
          <seriesInfo name="DOI" value="10.17487/RFC8415"/>
          <format target="https://www.rfc-editor.org/info/rfc8415" type="TXT"/>
        </reference>
        <reference anchor="RFC8981" target="https://www.rfc-editor.org/info/rfc8981" quoteTitle="true" derivedAnchor="RFC8981">
          <front>
            <title>Temporary Address Extensions for Stateless Address Autoconfiguration in IPv6</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <author fullname="R. Draves" initials="R." surname="Draves"/>
            <date month="February" year="2021"/>
            <abstract>
              <t indent="0">This document describes an extension to IPv6 Stateless Address Autoconfiguration that causes hosts to generate temporary addresses with randomized interface identifiers for each prefix advertised with autoconfiguration enabled.  Changing addresses over time limits the window of time during which eavesdroppers and other information collectors may trivially perform address-based network-activity correlation when the same address is employed for multiple transactions by the same host.  Additionally, it reduces the window of exposure of a host as being accessible via an address that becomes revealed as a result of active communication.  This document obsoletes RFC 4941.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8981"/>
          <seriesInfo name="DOI" value="10.17487/RFC8981"/>
          <format target="https://www.rfc-editor.org/info/rfc8981" type="TXT"/>
        </reference>
        <reference anchor="RFC9010" target="https://www.rfc-editor.org/info/rfc9010" quoteTitle="true" derivedAnchor="RFC9010">
          <front>
            <title>Routing for RPL (Routing Protocol for Low-Power and Lossy Networks) Leaves</title>
            <author fullname="P. Thubert" initials="P." role="editor" surname="Thubert"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <date month="April" year="2021"/>
            <abstract>
              <t indent="0">This specification provides a mechanism for a host that implements a routing-agnostic interface based on IPv6 over Low-Power Wireless Personal Area Network (6LoWPAN) Neighbor Discovery to obtain reachability services across a network that leverages RFC 6550 for its routing operations.  It updates RFCs 6550, 6775, and 8505.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9010"/>
          <seriesInfo name="DOI" value="10.17487/RFC9010"/>
          <format target="https://www.rfc-editor.org/info/rfc9010" type="TXT"/>
        </reference>
        <reference anchor="RFC9031" target="https://www.rfc-editor.org/info/rfc9031" quoteTitle="true" derivedAnchor="RFC9031">
          <front>
            <title>Constrained Join Protocol (CoJP) for 6TiSCH</title>
            <author fullname="M. Vučinić" initials="M." role="editor" surname="Vučinić"/>
            <author fullname="J. Simon" initials="J." surname="Simon"/>
            <author fullname="K. Pister" initials="K." surname="Pister"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <date month="May" year="2021"/>
            <abstract>
              <t indent="0">This document describes the minimal framework required for a new device, called a "pledge", to securely join a 6TiSCH (IPv6 over the Time-Slotted Channel Hopping mode of IEEE 802.15.4) network.  The framework requires that the pledge and the JRC (Join Registrar/Coordinator, a central entity), share a symmetric key.  How this key is provisioned is out of scope of this document.  Through a single CoAP (Constrained Application Protocol) request-response exchange secured by OSCORE (Object Security for Constrained RESTful Environments), the pledge requests admission into the network, and the JRC configures it with link-layer keying material and other parameters.  The JRC may at any time update the parameters through another request-response exchange secured by OSCORE.  This specification defines the Constrained Join Protocol and its CBOR (Concise Binary Object Representation) data structures, and it describes how to configure the rest of the 6TiSCH communication stack for this join process to occur in a secure manner.  Additional security mechanisms may be added on top of this minimal framework.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9031"/>
          <seriesInfo name="DOI" value="10.17487/RFC9031"/>
          <format target="https://www.rfc-editor.org/info/rfc9031" type="TXT"/>
        </reference>
        <reference anchor="RFC9140" target="https://www.rfc-editor.org/info/rfc9140" quoteTitle="true" derivedAnchor="RFC9140">
          <front>
            <title>Nimble Out-of-Band Authentication for EAP (EAP-NOOB)</title>
            <author fullname="T. Aura" initials="T." surname="Aura"/>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <author fullname="A. Peltonen" initials="A." surname="Peltonen"/>
            <date month="December" year="2021"/>
            <abstract>
              <t indent="0">The Extensible Authentication Protocol (EAP) provides support for multiple authentication methods.  This document defines the EAP-NOOB authentication method for nimble out-of-band (OOB) authentication and key derivation.  The EAP method is intended for bootstrapping all kinds of Internet-of-Things (IoT) devices that have no preconfigured authentication credentials.  The method makes use of a user-assisted, one-directional, out-of-band (OOB) message between the peer device and authentication server to authenticate the in-band key exchange.  The device must have a nonnetwork input or output interface, such as a display, microphone, speaker, or blinking light, that can send or receive dynamically generated messages of tens of bytes in length.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9140"/>
          <seriesInfo name="DOI" value="10.17487/RFC9140"/>
          <format target="https://www.rfc-editor.org/info/rfc9140" type="TXT"/>
        </reference>
        <reference anchor="SCENA" target="https://ieeexplore.ieee.org/document/7467440" quoteTitle="true" derivedAnchor="SCENA">
          <front>
            <title>State of the Art in Power Line Communications: From the Applications to the Medium</title>
            <author initials="C." surname="Cano" fullname="Cristina Cano">
              <organization showOnFrontPage="true">IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS</organization>
            </author>
            <author initials="A." surname="Pittolo" fullname="Alberto Pittolo">
              <organization showOnFrontPage="true">IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS</organization>
            </author>
            <author initials="D." surname="Malone" fullname="David Malone">
              <organization showOnFrontPage="true">IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS</organization>
            </author>
            <author initials="L." surname="Lampe" fullname="Lutz Lampe">
              <organization showOnFrontPage="true">IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS</organization>
            </author>
            <author initials="A." surname="Tonello" fullname="Andrea M. Tonello">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A." surname="Dabak" fullname="Anand G. Dabak">
              <organization showOnFrontPage="true"/>
            </author>
            <date month="July" year="2016"/>
          </front>
          <seriesInfo name="DOI" value="10.1109/JSAC.2016.2566018"/>
          <refcontent>IEEE Journal on Selected Areas in Communications, Volume 34, Issue 7</refcontent>
        </reference>
        <reference anchor="I-D.ietf-6tisch-dtsecurity-zerotouch-join" quoteTitle="true" target="https://datatracker.ietf.org/doc/html/draft-ietf-6tisch-dtsecurity-zerotouch-join-04" derivedAnchor="ZEROTOUCH">
          <front>
            <title>6tisch Zero-Touch Secure Join protocol</title>
            <author initials="M." surname="Richardson" fullname="Michael Richardson">
              <organization showOnFrontPage="true">Sandelman Software Works</organization>
            </author>
            <date month="July" day="8" year="2019"/>
            <abstract>
              <t indent="0">   This document describes a Zero-touch Secure Join (ZSJ) mechanism to
   enroll a new device (the "pledge") into a IEEE802.15.4 TSCH network
   using the 6tisch signaling mechanisms.  The resulting device will
   obtain a domain specific credential that can be used with either
   802.15.9 per-host pair keying protocols, or to obtain the network-
   wide key from a coordinator.  The mechanism describe here is an
   augmentation to the one-touch mechanism described in
   [I-D.ietf-6tisch-minimal-security], and is a profile of the
   constrained voucher mechanism [I-D.ietf-anima-constrained-voucher].

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-6tisch-dtsecurity-zerotouch-join-04"/>
          <format type="TXT" target="https://www.ietf.org/archive/id/draft-ietf-6tisch-dtsecurity-zerotouch-join-04.txt"/>
          <refcontent>Work in Progress</refcontent>
        </reference>
      </references>
    </references>
    <section anchor="Ack" numbered="false" toc="include" removeInRFC="false" pn="section-appendix.a">
      <name slugifiedName="name-acknowledgements">Acknowledgements</name>
      <t indent="0" pn="section-appendix.a-1">
	We gratefully acknowledge suggestions from the members of the IETF 6lo
	Working Group.  Great thanks to <contact fullname="Samita  Chakrabarti"/> and <contact fullname="Gabriel Montenegro"/> for their
	feedback and support in connecting the IEEE and ITU-T sides.  The
	authors thank <contact fullname="Scott Mansfield"/>, <contact fullname="Ralph Droms"/>, and <contact fullname="Pat Kinney"/> for
	their guidance in the liaison process.  The authors wish to thank
	<contact fullname="Stefano Galli"/>, <contact fullname="Thierry  Lys"/>, <contact fullname="Yizhou Li"/>, <contact fullname="Yuefeng  Wu"/>, and <contact fullname="Michael Richardson"/> for their valuable
	comments and contributions.  The authors wish to thank <contact fullname="Carles Gomez"/> for shepherding this document. The authors
	also thank <contact fullname="Paolo Volpato"/> for delivering the
	presentation at IETF 113.  Sincere acknowledgements to the valuable
	comments from the following reviewers: <contact fullname="Dave Thaler"/>, <contact fullname="Dan Romascanu"/>, <contact fullname="Murray Kucherawy"/>,
	<contact fullname="Benjamin Kaduk"/>, <contact fullname="Alvaro  Retana"/>, <contact fullname="Éric Vyncke"/>, <contact fullname="Meral  Shirazipour"/>, <contact fullname="Roman Danyliw"/>, and <contact fullname="Lars Eggert"/>.
      </t>
    </section>
    <section anchor="authors-addresses" numbered="false" removeInRFC="false" toc="include" pn="section-appendix.b">
      <name slugifiedName="name-authors-addresses">Authors' Addresses</name>
      <author fullname="Jianqiang Hou" initials="J." surname="Hou">
        <organization showOnFrontPage="true">Huawei Technologies</organization>
        <address>
          <postal>
            <street>101 Software Avenue,</street>
            <city>Nanjing</city>
            <code>210012</code>
            <country>China</country>
          </postal>
          <email>houjianqiang@huawei.com</email>
        </address>
      </author>
      <author fullname="Bing Liu" initials="B." surname="Liu">
        <organization showOnFrontPage="true">Huawei Technologies</organization>
        <address>
          <postal>
            <extaddr>Haidian District</extaddr>
            <street>No. 156 Beiqing Rd.</street>
            <city>Beijing</city>
            <code>100095</code>
            <country>China</country>
          </postal>
          <email>remy.liubing@huawei.com</email>
        </address>
      </author>
      <author fullname="Yong-Geun Hong" initials="Y-G." surname="Hong">
        <organization showOnFrontPage="true">Daejeon University</organization>
        <address>
          <postal>
            <extaddr>Dong-gu</extaddr>
            <street>62 Daehak-ro</street>
            <city>Daejeon</city>
            <code>34520</code>
            <country>Republic of Korea</country>
          </postal>
          <email>yonggeun.hong@gmail.com</email>
        </address>
      </author>
      <author fullname="Xiaojun Tang" initials="X." surname="Tang">
        <organization abbrev="SGEPRI" showOnFrontPage="true">State Grid Electric Power Research Institute</organization>
        <address>
          <postal>
            <street>19 Chengxin Avenue</street>
            <city>Nanjing</city>
            <code>211106</code>
            <country>China</country>
          </postal>
          <email>itc@sgepri.sgcc.com.cn</email>
        </address>
      </author>
      <author fullname="Charles E. Perkins" initials="C." surname="Perkins">
        <organization showOnFrontPage="true">Lupin Lodge</organization>
        <address>
          <phone/>
          <email>charliep@computer.org</email>
        </address>
      </author>
    </section>
  </back>
</rfc>
