--- 1/draft-ietf-v6ops-rfc3316bis-05.txt 2013-09-15 02:14:24.486440374 -0700 +++ 2/draft-ietf-v6ops-rfc3316bis-06.txt 2013-09-15 02:14:24.526441398 -0700 @@ -1,23 +1,23 @@ IPv6 Operations (V6OPS) J. Korhonen, Ed. Internet-Draft Renesas Mobile Obsoletes: 3316 (if approved) J. Arkko, Ed. Intended status: Informational Ericsson -Expires: March 18, 2014 T. Savolainen +Expires: March 19, 2014 T. Savolainen Nokia S. Krishnan Ericsson - September 14, 2013 + September 15, 2013 IPv6 for 3GPP Cellular Hosts - draft-ietf-v6ops-rfc3316bis-05.txt + draft-ietf-v6ops-rfc3316bis-06.txt Abstract As the deployment of third and fourth generation cellular networks progresses, a large number of cellular hosts are being connected to the Internet. Standardization organizations have made Internet Protocol version 6 (IPv6) mandatory in their specifications. However, the concept of IPv6 covers many aspects and numerous specifications. In addition, the characteristics of cellular links in terms of bandwidth, cost and delay put special requirements on how @@ -38,21 +38,21 @@ Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at http://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." - This Internet-Draft will expire on March 18, 2014. + This Internet-Draft will expire on March 19, 2014. Copyright Notice Copyright (c) 2013 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents @@ -528,24 +528,20 @@ be used for additional privacy during the time the host is on and in the same area. The privacy features can also be used to e.g., make different transport sessions appear to come from different IP addresses. However, it is not clear that these additional efforts confuse potential observers any further, as they could monitor only the network prefix part. o The use and recommendations of various security services such as IPsec or TLS [RFC5246] in the connection of typical applications that also apply to cellular hosts are discussed in Section 11 of [RFC6434]. - o The use of various security services such as IPsec or TLS in the - connection of typical applications in cellular hosts is discussed - in Section 3 and further pointer for recommendations are given - there. o The airtime used by cellular hosts is expensive. In some cases, users are billed according to the amount of data they transfer to and from their host. It is crucial for both the network and the users that the airtime is used correctly and no extra charges are applied to users due to misbehaving third parties. The cellular links also have a limited capacity, which means that they may not necessarily be able to accommodate more traffic than what the user selected, such as a multimedia call. Additional traffic might interfere with the service level experienced by the user. While Quality of Service mechanisms mitigate these problems to an