draft-ietf-6lo-nfc-14.txt   draft-ietf-6lo-nfc-15.txt 
skipping to change at page 1, line 15 skipping to change at page 1, line 15
Intended status: Standards Track ETRI Intended status: Standards Track ETRI
Expires: January 9, 2020 J-S. Youn Expires: January 9, 2020 J-S. Youn
Dongeui Univ Dongeui Univ
D-K. Kim D-K. Kim
KNU KNU
J-H. Choi J-H. Choi
Samsung Electronics Co., Samsung Electronics Co.,
July 8, 2019 July 8, 2019
Transmission of IPv6 Packets over Near Field Communication Transmission of IPv6 Packets over Near Field Communication
draft-ietf-6lo-nfc-14 draft-ietf-6lo-nfc-15
Abstract Abstract
Near field communication (NFC) is a set of standards for smartphones Near field communication (NFC) is a set of standards for smartphones
and portable devices to establish radio communication with each other and portable devices to establish radio communication with each other
by touching them together or bringing them into proximity, usually no by touching them together or bringing them into proximity, usually no
more than 10 cm. NFC standards cover communications protocols and more than 10 cm apart. NFC standards cover communications protocols
data exchange formats, and are based on existing radio-frequency and data exchange formats, and are based on existing radio-frequency
identification (RFID) standards including ISO/IEC 14443 and FeliCa. identification (RFID) standards including ISO/IEC 14443 and FeliCa.
The standards include ISO/IEC 18092 and those defined by the NFC The standards include ISO/IEC 18092 and those defined by the NFC
Forum. The NFC technology has been widely implemented and available Forum. The NFC technology has been widely implemented and available
in mobile phones, laptop computers, and many other devices. This in mobile phones, laptop computers, and many other devices. This
document describes how IPv6 is transmitted over NFC using 6LowPAN document describes how IPv6 is transmitted over NFC using 6LoWPAN
techniques. techniques.
Status of This Memo Status of This Memo
This Internet-Draft is submitted in full conformance with the This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79. provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet- working documents as Internet-Drafts. The list of current Internet-
skipping to change at page 3, line 11 skipping to change at page 3, line 11
NFC is a set of short-range wireless technologies, typically NFC is a set of short-range wireless technologies, typically
requiring a distance of 10 cm or less. NFC operates at 13.56 MHz on requiring a distance of 10 cm or less. NFC operates at 13.56 MHz on
ISO/IEC 18000-3 air interface and at rates ranging from 106 kbit/s to ISO/IEC 18000-3 air interface and at rates ranging from 106 kbit/s to
424 kbit/s [ECMA-340]. NFC always involves an initiator and a 424 kbit/s [ECMA-340]. NFC always involves an initiator and a
target; the initiator actively generates an RF field that can power a target; the initiator actively generates an RF field that can power a
passive target. This enables NFC targets to take very simple form passive target. This enables NFC targets to take very simple form
factors such as tags, stickers, key fobs, or cards that do not factors such as tags, stickers, key fobs, or cards that do not
require batteries. NFC peer-to-peer communication is possible, require batteries. NFC peer-to-peer communication is possible,
provided both devices are powered. NFC builds upon RFID systems by provided both devices are powered. NFC builds upon RFID systems by
allowing two-way communication between endpoints. At the time of allowing two-way communication between endpoints. At the time of
this writing, it had been used in devices such as mobile phones, this writing, it has been used in devices such as mobile phones,
running Android operating system, named with a feature called running Android operating system, named with a feature called
"Android Beam". It was expected for the other mobile phones, running "Android Beam". It is expected for the other mobile phones, running
the other operating systems (e.g., iOS, etc.) to be equipped with NFC other operating systems (e.g., iOS, etc.) to be equipped with NFC
technology in the near future. technology in the near future.
Considering the potential for exponential growth in the number of Considering exponential growth in the number of heterogeneous air
heterogeneous air interface technologies, NFC has been widely used interface technologies, NFC has been widely used like Bluetooth Low
like Bluetooth Low Energy (BT-LE), Wi-Fi, and so on. Each of the Energy (BT-LE), Wi-Fi, and so on. Each of the heterogeneous air
heterogeneous air interface technologies has its own characteristics, interface technologies has its own characteristics, which cannot be
which cannot be covered by the other technologies, so various kinds covered by the other technologies, so various kinds of air interface
of air interface technologies would co-exist together. NFC can technologies would co-exist together. NFC can provide secured
provide secured communications with its short transmission range. communications with its short transmission range.
When the number of devices and things having different air interface When the number of devices and things having different air interface
technologies communicate with each other, IPv6 is an ideal internet technologies communicate with each other, IPv6 is an ideal internet
protocol owing to its large address space. Also, NFC would be one of protocol owing to its large address space. Also, NFC would be one of
the endpoints using IPv6. Therefore, this document describes how the endpoints using IPv6. Therefore, this document describes how
IPv6 is transmitted over NFC using 6LoWPAN techniques. IPv6 is transmitted over NFC using 6LoWPAN techniques.
[RFC4944] specifies the transmission of IPv6 over IEEE 802.15.4. The [RFC4944] specifies the transmission of IPv6 over IEEE 802.15.4. The
NFC link also has similar characteristics to that of IEEE 802.15.4. NFC link also has similar characteristics to that of IEEE 802.15.4.
Many of the mechanisms defined in [RFC4944] can be applied to the Many of the mechanisms defined in [RFC4944] can be applied to the
skipping to change at page 13, line 18 skipping to change at page 13, line 18
transmitting IPv6 packets because the RF distance between 6LN and transmitting IPv6 packets because the RF distance between 6LN and
6LBR is typically within 10 cm. If any third party wants to hack 6LBR is typically within 10 cm. If any third party wants to hack
into the RF between them, it must come to nearly touch them. into the RF between them, it must come to nearly touch them.
Applications can choose which kinds of air interfaces (e.g., BT-LE, Applications can choose which kinds of air interfaces (e.g., BT-LE,
Wi-Fi, NFC, etc.) to send data depending on the characteristics of Wi-Fi, NFC, etc.) to send data depending on the characteristics of
the data. the data.
Figure 10 illustrates an example of an NFC-enabled device network Figure 10 illustrates an example of an NFC-enabled device network
connected to the Internet. The distance between 6LN and 6LBR is connected to the Internet. The distance between 6LN and 6LBR is
typically 10 cm or less. If there is any laptop computers close to a typically 10 cm or less. If there is any laptop computers close to a
user, it will become the a 6LBR. Additionally, when the user mounts user, it will become a 6LBR. Additionally, when the user mounts an
an NFC-enabled air interface adapter (e.g., portable NFC dongle) on NFC-enabled air interface adapter (e.g., portable NFC dongle) on the
the close laptop PC, the user's NFC-enabled device (6LN) can close laptop PC, the user's NFC-enabled device (6LN) can communicate
communicate with the laptop PC (6LBR) within 10 cm distance. with the laptop PC (6LBR) within 10 cm distance.
************ ************
6LN ------------------- 6LBR -----* Internet *------- CN 6LN ------------------- 6LBR -----* Internet *------- CN
| (dis. 10 cm or less) | ************ | | (dis. 10 cm or less) | ************ |
| | | | | |
| <-------- NFC -------> | <----- IPv6 packet ------> | | <-------- NFC -------> | <----- IPv6 packet ------> |
| (IPv6 over NFC packet) | | | (IPv6 over NFC packet) | |
Figure 10: NFC-enabled device network connected to the Internet Figure 10: NFC-enabled device network connected to the Internet
Two or more LNs are connected with a 6LBR, but each connection uses a Two or more 6LNs are connected with a 6LBR, but each connection uses
different subnet. The 6LBR is acting as a router and forwarding a different subnet. The 6LBR is acting as a router and forwarding
packets between 6LNs and the Internet. Also, the 6LBR MUST ensure packets between 6LNs and the Internet. Also, the 6LBR MUST ensure
address collisions do not occur and forwards packets sent by one 6LN address collisions do not occur and forwards packets sent by one 6LN
to another. to another.
5.2. Isolated NFC-enabled Device Network 5.2. Isolated NFC-enabled Device Network
In some scenarios, the NFC-enabled device network may transiently be In some scenarios, the NFC-enabled device network may transiently be
a simple isolated network as shown in the Figure 11. a simple isolated network as shown in the Figure 11.
6LN ---------------------- 6LR ---------------------- 6LN 6LN ---------------------- 6LR ---------------------- 6LN
| (10 cm or less) | (10 cm or less) | | (10 cm or less) | (10 cm or less) |
| | | | | |
| <--------- NFC --------> | <--------- NFC --------> | | <--------- NFC --------> | <--------- NFC --------> |
| (IPv6 over NFC packet) | (IPv6 over NFC packet) | | (IPv6 over NFC packet) | (IPv6 over NFC packet) |
Figure 11: Isolated NFC-enabled device network Figure 11: Isolated NFC-enabled device network
In mobile phone markets, applications are designed and made by user In mobile phone markets, applications are designed and made by user
developers. They may image interesting applications, where three or developers. They may image interesting applications, where three or
more mobile phones touch or attach each other to accomplish more mobile phones touch or attach each other to work achieve a
performance. In an isolated NFC-enabled device network, when two or common objective. In an isolated NFC-enabled device network, when
more LRs are connected with each other, and then they are acting like two or more 6LRs are connected with each other, and then they are
routers, the 6LR MUST ensure address collisions do not occur. acting like routers, the 6LR MUST ensure address collisions do not
occur.
6. IANA Considerations 6. IANA Considerations
There are no IANA considerations related to this document. There are no IANA considerations related to this document.
7. Security Considerations 7. Security Considerations
This document does not RECOMMEND sending NFC packets over the This document does not RECOMMEND sending NFC packets over the
Internet or any unsecured network. Internet or any unsecured network.
 End of changes. 9 change blocks. 
24 lines changed or deleted 25 lines changed or added

This html diff was produced by rfcdiff 1.47. The latest version is available from http://tools.ietf.org/tools/rfcdiff/