draft-ietf-v6ops-rfc3316bis-05.txt   draft-ietf-v6ops-rfc3316bis-06.txt 
IPv6 Operations (V6OPS) J. Korhonen, Ed. IPv6 Operations (V6OPS) J. Korhonen, Ed.
Internet-Draft Renesas Mobile Internet-Draft Renesas Mobile
Obsoletes: 3316 (if approved) J. Arkko, Ed. Obsoletes: 3316 (if approved) J. Arkko, Ed.
Intended status: Informational Ericsson Intended status: Informational Ericsson
Expires: March 18, 2014 T. Savolainen Expires: March 19, 2014 T. Savolainen
Nokia Nokia
S. Krishnan S. Krishnan
Ericsson Ericsson
September 14, 2013 September 15, 2013
IPv6 for 3GPP Cellular Hosts IPv6 for 3GPP Cellular Hosts
draft-ietf-v6ops-rfc3316bis-05.txt draft-ietf-v6ops-rfc3316bis-06.txt
Abstract Abstract
As the deployment of third and fourth generation cellular networks As the deployment of third and fourth generation cellular networks
progresses, a large number of cellular hosts are being connected to progresses, a large number of cellular hosts are being connected to
the Internet. Standardization organizations have made Internet the Internet. Standardization organizations have made Internet
Protocol version 6 (IPv6) mandatory in their specifications. Protocol version 6 (IPv6) mandatory in their specifications.
However, the concept of IPv6 covers many aspects and numerous However, the concept of IPv6 covers many aspects and numerous
specifications. In addition, the characteristics of cellular links specifications. In addition, the characteristics of cellular links
in terms of bandwidth, cost and delay put special requirements on how in terms of bandwidth, cost and delay put special requirements on how
skipping to change at page 2, line 4 skipping to change at page 2, line 4
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet- working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/. Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
This Internet-Draft will expire on March 18, 2014. This Internet-Draft will expire on March 19, 2014.
Copyright Notice Copyright Notice
Copyright (c) 2013 IETF Trust and the persons identified as the Copyright (c) 2013 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of (http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
skipping to change at page 13, line 32 skipping to change at page 13, line 32
be used for additional privacy during the time the host is on and be used for additional privacy during the time the host is on and
in the same area. The privacy features can also be used to e.g., in the same area. The privacy features can also be used to e.g.,
make different transport sessions appear to come from different IP make different transport sessions appear to come from different IP
addresses. However, it is not clear that these additional efforts addresses. However, it is not clear that these additional efforts
confuse potential observers any further, as they could monitor confuse potential observers any further, as they could monitor
only the network prefix part. only the network prefix part.
o The use and recommendations of various security services such as o The use and recommendations of various security services such as
IPsec or TLS [RFC5246] in the connection of typical applications IPsec or TLS [RFC5246] in the connection of typical applications
that also apply to cellular hosts are discussed in Section 11 of that also apply to cellular hosts are discussed in Section 11 of
[RFC6434]. [RFC6434].
o The use of various security services such as IPsec or TLS in the
connection of typical applications in cellular hosts is discussed
in Section 3 and further pointer for recommendations are given
there.
o The airtime used by cellular hosts is expensive. In some cases, o The airtime used by cellular hosts is expensive. In some cases,
users are billed according to the amount of data they transfer to users are billed according to the amount of data they transfer to
and from their host. It is crucial for both the network and the and from their host. It is crucial for both the network and the
users that the airtime is used correctly and no extra charges are users that the airtime is used correctly and no extra charges are
applied to users due to misbehaving third parties. The cellular applied to users due to misbehaving third parties. The cellular
links also have a limited capacity, which means that they may not links also have a limited capacity, which means that they may not
necessarily be able to accommodate more traffic than what the user necessarily be able to accommodate more traffic than what the user
selected, such as a multimedia call. Additional traffic might selected, such as a multimedia call. Additional traffic might
interfere with the service level experienced by the user. While interfere with the service level experienced by the user. While
Quality of Service mechanisms mitigate these problems to an Quality of Service mechanisms mitigate these problems to an
 End of changes. 5 change blocks. 
8 lines changed or deleted 4 lines changed or added

This html diff was produced by rfcdiff 1.41. The latest version is available from http://tools.ietf.org/tools/rfcdiff/