Re: [ipwave] draft-ietf-ipwave-ipv6-over-80211ocb-39

"Sri Gundavelli (sgundave)" <sgundave@cisco.com> Tue, 16 April 2019 03:12 UTC

Return-Path: <sgundave@cisco.com>
X-Original-To: its@ietfa.amsl.com
Delivered-To: its@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 061BC12013E; Mon, 15 Apr 2019 20:12:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.5
X-Spam-Level:
X-Spam-Status: No, score=-14.5 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=AkRT1gQ0; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=JKUCexaq
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 96jvL4li6Mp6; Mon, 15 Apr 2019 20:12:01 -0700 (PDT)
Received: from alln-iport-8.cisco.com (alln-iport-8.cisco.com [173.37.142.95]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EB30812004E; Mon, 15 Apr 2019 20:12:00 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=11129; q=dns/txt; s=iport; t=1555384321; x=1556593921; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=teknst1munwXBAyhU5SUGFtX/Tu2kMvh/oFJSv73Xds=; b=AkRT1gQ0hro5fW2gPymXQGg2kHjujlIlqawWhP8UL4yoYL27mdXS/d7h Pd+KrEtyczROwjXfPg7QTgYa9Kwb0livuZgZuWpoMQVuM58FRK7E1SehR +qqTmUb080mjfBWGDxNGq0vNtKdSlz4OqgMQPKltzVncch3FCo9Kl4UBM g=;
IronPort-PHdr: 9a23:BKEsvRdUia++Mikg7sIanNEjlGMj4e+mNxMJ6pchl7NFe7ii+JKnJkHE+PFxlwGQD57D5adCjOzb++D7VGoM7IzJkUhKcYcEFnpnwd4TgxRmBceEDUPhK/u/dCMnGshLSlJN9HCgOk8TE8H7NBXf
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0B3AABwR7Vc/4YNJK1mDg4BAQEEAQEHBAEBgVEHAQELAYE9KScDgTUIIAQLKAqHSwOEUopGgleJOY1hgS4UgWcOAQEthEAChXojNAkOAQMBAQoBAgECbRwMhUoBAQEDAUABASUEDgEECwIBCBgnByERFBECBAENBRuEcQMNDwECnRICihSCIIJ5AQEFhQgNC4INCYEyAYtJF4FAP4ERgxI+ghqBbhYKHIVhjH2YViw2CQKCBo5Og0kblHOLZodyjCkCBAIEBQIOAQEFgU84gVZwFYMnggoMF4EBAQeCQ4oYO3IBgSiMeIEwAYEgAQE
X-IronPort-AV: E=Sophos;i="5.60,355,1549929600"; d="scan'208";a="260431118"
Received: from alln-core-12.cisco.com ([173.36.13.134]) by alln-iport-8.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 16 Apr 2019 03:11:59 +0000
Received: from XCH-ALN-012.cisco.com (xch-aln-012.cisco.com [173.36.7.22]) by alln-core-12.cisco.com (8.15.2/8.15.2) with ESMTPS id x3G3Bx7I017063 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Tue, 16 Apr 2019 03:11:59 GMT
Received: from xhs-rtp-002.cisco.com (64.101.210.229) by XCH-ALN-012.cisco.com (173.36.7.22) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Mon, 15 Apr 2019 22:11:58 -0500
Received: from xhs-rcd-001.cisco.com (173.37.227.246) by xhs-rtp-002.cisco.com (64.101.210.229) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Mon, 15 Apr 2019 23:11:57 -0400
Received: from NAM04-CO1-obe.outbound.protection.outlook.com (72.163.14.9) by xhs-rcd-001.cisco.com (173.37.227.246) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Mon, 15 Apr 2019 22:11:57 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector1-cisco-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Wa48/fVR0UXG1uy79hRam3ogNJZjKyANbr/JgtWJn8U=; b=JKUCexaq0GDFvdai5VOzEEwsRFQlNADSAnnB+0pi9Pe9Sua+b4vswuyNOnWEA+lUs3mt7c4m96PvGT6o34+zDuoAIVJl/z2ZUqixYOHwcHzU2ZBB16SN+SEhQ/4DZG4rhlKXL8NRWJkYyrAUKzTTdzmF48tFuJEZQqtU1xd8+D4=
Received: from BYAPR11MB3558.namprd11.prod.outlook.com (20.178.206.75) by BYAPR11MB3685.namprd11.prod.outlook.com (20.178.237.158) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1792.17; Tue, 16 Apr 2019 03:11:56 +0000
Received: from BYAPR11MB3558.namprd11.prod.outlook.com ([fe80::95c3:573a:8b16:fb20]) by BYAPR11MB3558.namprd11.prod.outlook.com ([fe80::95c3:573a:8b16:fb20%4]) with mapi id 15.20.1792.018; Tue, 16 Apr 2019 03:11:56 +0000
From: "Sri Gundavelli (sgundave)" <sgundave@cisco.com>
To: Brian E Carpenter <brian.e.carpenter@gmail.com>, Alexandre Petrescu <alexandre.petrescu@gmail.com>, NABIL BENAMAR <n.benamar@est.umi.ac.ma>
CC: nabil benamar <benamar73@gmail.com>, "Pascal Thubert (pthubert)" <pthubert@cisco.com>, "ietf@ietf.org" <ietf@ietf.org>, "its@ietf.org" <its@ietf.org>, "int-dir@ietf.org" <int-dir@ietf.org>, "draft-ietf-ipwave-ipv6-over-80211ocb.all@ietf.org" <draft-ietf-ipwave-ipv6-over-80211ocb.all@ietf.org>
Thread-Topic: draft-ietf-ipwave-ipv6-over-80211ocb-39
Thread-Index: AQHU9AIlTztjrP866E+66324eQ5vqQ==
Date: Tue, 16 Apr 2019 03:11:55 +0000
Message-ID: <D8DA8E15.2F2F73%sgundave@cisco.com>
References: <155169869045.5118.3508360720339540639@ietfa.amsl.com> <a8aad636-069c-4451-dbf1-72c1db2204ef@gmail.com> <CAD8vqFfx_FVi5NobrR1p6xEKjkSNa1_ZejgrEs3JPDHJQoxD7A@mail.gmail.com> <MN2PR11MB356570FDBC5798F155DDEE25D82C0@MN2PR11MB3565.namprd11.prod.outlook.com> <CAMugd_Xce5cWLtVB4DbR1ZEaFbdfiRpXre9oq61ukRC+n+3cZw@mail.gmail.com> <D8D5F0B7.2F2BB8%sgundave@cisco.com> <D8D5F510.2F2BC8%sgundave@cisco.com> <3e716b4b-8236-0488-309c-7cd3a54db7b5@gmail.com> <D8D7B1E7.2F2CA2%sgundave@cisco.com> <CAD8vqFfSGKhw_ou3VB98C8r1gq=4WD8+f8C5P53C46k-0V+XuA@mail.gmail.com> <66e7c810-45a5-5244-59dc-4b764b6fb346@gmail.com> <1a6599ee-88f9-42d9-a208-918ba6711612@gmail.com> <11645738-6f95-82e5-48f1-ebc3ce54423e@gmail.com> <0ae10089-4b1a-f85c-1a3d-15e712cb7547@gmail.com> <084449fd-2693-0cfb-6589-0cf67cf9ffe6@gmail.com>
In-Reply-To: <084449fd-2693-0cfb-6589-0cf67cf9ffe6@gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/14.7.7.170905
authentication-results: spf=none (sender IP is ) smtp.mailfrom=sgundave@cisco.com;
x-originating-ip: [128.107.241.164]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 51b415e2-4e8c-42f7-23e0-08d6c219482e
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(5600140)(711020)(4605104)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(2017052603328)(7193020); SRVR:BYAPR11MB3685;
x-ms-traffictypediagnostic: BYAPR11MB3685:
x-microsoft-antispam-prvs: <BYAPR11MB36851AE792848D31B740B5C6D9240@BYAPR11MB3685.namprd11.prod.outlook.com>
x-forefront-prvs: 000947967F
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(346002)(376002)(136003)(396003)(366004)(39860400002)(199004)(189003)(51444003)(110136005)(8936002)(54906003)(2906002)(53936002)(6246003)(81156014)(81166006)(58126008)(8676002)(316002)(6486002)(5660300002)(30864003)(68736007)(25786009)(66574012)(4326008)(229853002)(6436002)(6512007)(106356001)(486006)(256004)(105586002)(14444005)(186003)(66066001)(478600001)(93886005)(446003)(11346002)(14454004)(2616005)(476003)(86362001)(7736002)(76176011)(305945005)(36756003)(6116002)(99286004)(3846002)(102836004)(26005)(97736004)(6506007)(53546011)(71190400001)(71200400001); DIR:OUT; SFP:1101; SCL:1; SRVR:BYAPR11MB3685; H:BYAPR11MB3558.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: nNjEfkFfPSsrbww53InMlMg5UNm8OzerrM6GL2ZODFI7sFB8dMnJPm5O2mfG//9AMJlXVhhrF/dbbpmtzMvROwd1KhYcMMNDcp8CKRtI7pWzaAmjisPMRQ6oDBb9Rp6YOBMfP8iCDKpWffxGIRqFFJpxslzPwzkO0eqjnH5N6BWWo4tv955fWlyKEN2y+xL73HxnUyzuLoaFtNJdCKHGEF5JCDBnTUVhkTCJ3tWrlZspbxTfSUiO/82xyRiytDfXUtF8nriPasHaJ0Jxl61XBqktvfBWv4omU/5SdWEJ4Ij2d7u1PgW3BG9WkS832ZQ4tH5z4XrsmvycsR4sXKauq5eBkcoOlE67rO+TRwB0OyiisONCSYhTtzwgrZleo/w08GQks0kXuAmAWlov7EHiVzzN/dY52DJDnr29V4Rqo/M=
Content-Type: text/plain; charset="windows-1254"
Content-ID: <02A9C552362A4844A4939603364029EF@namprd11.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 51b415e2-4e8c-42f7-23e0-08d6c219482e
X-MS-Exchange-CrossTenant-originalarrivaltime: 16 Apr 2019 03:11:55.7936 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR11MB3685
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.22, xch-aln-012.cisco.com
X-Outbound-Node: alln-core-12.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/its/8tU50_f7pMNddlQeHTe9y7moMSA>
Subject: Re: [ipwave] draft-ietf-ipwave-ipv6-over-80211ocb-39
X-BeenThere: its@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IPWAVE - IP Wireless Access in Vehicular Environments WG at IETF <its.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/its>, <mailto:its-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/its/>
List-Post: <mailto:its@ietf.org>
List-Help: <mailto:its-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/its>, <mailto:its-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 16 Apr 2019 03:12:04 -0000

> I am no expert, but I do know some physics, and it seems pretty clear to
>me that if there are multiple lanes of traffic, a large truck can easily
>shield signals between two cars and the shielding will be intermittent,
>regardless of how much wireless power is allowed, depending on traffic
>movement. So it's a highly dynamic mesh network.


Part of the problem is that we have not clearly put some limits on the
use-cases. These unbounded limits is opening up these discussions on
ad-hoc full mesh network formations and the resulting challenging ND
scenarios. But, again I always assumed this discussion is for the ND
document and there should be no bearing on this document.

V2X communications involves V2V, V2I and V2P communication modes. From the
point of view of vehicular safety, its about exchange of BSM (Basic Safety
Messages) between vehicles as per SAEJ735 standard. These safety
communications is always one-hop communication and for very good reason
IEEE WAVE standards did not bother to require IPv6 transport for carrying
these messages. The WSMP message which carries these safety elements are
defined to be carried over layer-2 payloads. Personally, I never thought
we will replace this L2 safety communication mode with layer-3 mode
(IPv6-over-80211-OCB). But the use of IPv6 is more for allowing
applications in the vehicle to communicate with the infrastructure. For
example, a vehicle using DSRC radio to access some traffic application in
the cloud. 

In one sense, this is like a mobile node using 802.11-OCB like any other
radio technology (CDMA, LTE, Wi-Fi), and use IPv6 for its communications.
In this context, its always about vehicle to infrastructure
communications. Now, there are other interesting peer to peer use-cases,
where one vehicle is streaming some video to another vehicle without using
any infrastructure. While these later examples are very cool, personally,
I did not expect this WG to solve those use-cases day-1. For us to support
those use-cases, we need to figure out many more things including
approaches for exchanges prefixes between two vehicles that come in
proximity. In my mind, these are very forward looking and the only
relevant application is platooning. I am not interested in solving this
V2V problem, but was more interested to enable V2I communications, where
the focus is about link model, prefix hosting approaches, mobility support
(building a large L2 domain over RSU’s, or routed approaches with mobile
IP type protocols) ..etc. In one realization, there may be a P2P link
assumption between the vehicle and the RSU, eliminating most of these ND
issues. But, those discussions are for the other document and that clearly
should remove these ND concerns from this document.

Sri






On 4/15/19, 2:04 PM, "Brian E Carpenter" <brian.e.carpenter@gmail.com>
wrote:

>Excuse top posting.
>
>As I've said, I am no expert, but I do know some physics, and
>it seems pretty clear to me that if there are multiple lanes
>of traffic, a large truck can easily shield signals between
>two cars and the shielding will be intermittent, regardless
>of how much wireless power is allowed, depending on traffic
>movement. So it's a highly dynamic mesh network. That's a very
>interesting problem that has been much studied, and it's
>fundamentally different from the ND design scenario.
>
>So I find it hard to believe that nobody can write the TBD
>text.
>
>Regards
>   Brian
>
>On 15-Apr-19 23:26, Alexandre Petrescu wrote:
>> Hi Brian,
>> 
>> Le 14/04/2019 à 22:49, Brian E Carpenter a écrit :
>>> Hi Alexandre,
>>>
>>> On 15-Apr-19 04:38, Alexandre Petrescu wrote:
>>>> Brian,
>>>>
>>>> Le 14/04/2019 à 04:20, Brian E Carpenter a écrit :
>>>>>>> All we need is a simple statement in the spec which puts some scope
>>>>>>> limits, w.r.t the missing ND pieces and issues.
>>>>>
>>>>> Yes, that is clearly essential, as well as an associated health
>>>>> warning that implementers must not rush ahead because of the risk
>>>>> of non-interoperability.
>>>>
>>>> There is already paragraph, and an Appendix, about potential ND
>>>>issues.
>>>> I think that text qualifies as an associated health warning.
>>>>
>>>> I do not know what do you mean about the risk of interoperability.
>>>>This
>>>> ND that works is interoperable between several OCB cards, IP Road Side
>>>> Units, and linuces. (I can cite brands that I al familiar with and
>>>>that
>>>> interoperate.
>>>>
>>>> This is the current paragraph and Appendix that qualify as a warning
>>>> that you suggest:
>>>>
>>>>>     The baseline Neighbor Discovery protocol (ND) [RFC4861] MUST be
>>>>>used
>>>>>     over 802.11-OCB links.  Transmitting ND packets may prove to have
>>>>>     some performance issues.  These issues may be exacerbated in OCB
>>>>>     mode.  Solutions for these problems SHOULD consider the OCB mode
>>>>>of
>>>>>     operation.  The best of current knowledge indicates the kinds of
>>>>>     issues that may arise with ND in OCB mode; they are described in
>>>>>     Appendix J.
>>>
>>> That's exactly the text that I find problematic. I can't write a new
>>> version because I lack your expert knowledge, but IMHO it should be
>>> more specific:
>>>
>>>      The baseline Neighbor Discovery protocol (ND) [RFC4861] MUST be
>>>used
>>>      over 802.11-OCB links.  However, as on any wireless link,
>>>transmission
>>>      of multicast ND packets may fail in OCB. In particular, scenarios
>>>      where TBD TBD TBD are likely to be unreliable and SHOULD NOT be
>>>      deployed until an alternative standardised solution is available.
>>>      The best of current knowledge indicates the kinds of issues that
>>>      may arise with ND in OCB mode; they are described in Appendix J.
>> 
>> I can agree with that formulation and put it in the text.
>> 
>> But I need an indicat that TBD is defined soon.  The time commitments
>>of 
>> Pascal seem to be saying he is no longer interested in writing that TBD.
>> 
>> I wait a little for this to clarify.
>> 
>>> Also I don't like this phrasing in Appendix J:
>>>
>>>     Early experiences indicate that it should be possible to exchange
>>>     IPv6 packets over OCB while relying on IPv6 ND alone for DAD and AR
>>>     (Address Resolution).
>>>
>>> Could you rather say the opposite:
>>>
>>>     Early experience indicates that it is possible to exchange
>>>     IPv6 packets over OCB while relying on IPv6 ND alone for DAD and AR
>>>     (Address Resolution) in good conditions. However, this does not
>>>     apply if TBD TBD TBD...
>> 
>> This is an appendix.  I could put TBD there now.
>> 
>> Alex
>> 
>>>
>>> Regards
>>>      Brian
>>>
>>>
>>>>
>>>>
>>>> Alex
>>>>
>>>>>
>>>>> Regards
>>>>>      Brian
>>>>>
>>>>> On 14-Apr-19 13:58, NABIL BENAMAR wrote:
>>>>>> +1 Sri
>>>>>>
>>>>>> On Sun, Apr 14, 2019, 00:06 Sri Gundavelli (sgundave)
>>>>>><sgundave@cisco.com <mailto:sgundave@cisco.com>> wrote:
>>>>>>
>>>>>>       I understand your point Brian, but IMO there are enough
>>>>>>reasons not to
>>>>>>       delay this work.
>>>>>>
>>>>>>       There are many use-cases/applications where there is a stable
>>>>>>topology of
>>>>>>       RSU¹s and OBU¹s. The regulations around 5.9 Ghz (DSRC) band
>>>>>>allows the
>>>>>>       channel use for non-priority/non-traffic safety related
>>>>>>applications. For
>>>>>>       example, a vehicle in a gas station can receive a coupon from
>>>>>>the
>>>>>>       802.11-OCB radio (AP/RSU) in the gas station. There, its a
>>>>>>stable topology
>>>>>>       that classic ND is designed for. In this operating mode, its
>>>>>>perfectly
>>>>>>       reasonable to use classic ND and it works. The authors have
>>>>>>shown enough
>>>>>>       lab data on the same.
>>>>>>
>>>>>>       Ideally, I agree with you that it makes lot more sense to
>>>>>>publish both the
>>>>>>       specs at the same time. But, for what ever reasons the WG
>>>>>>went on this
>>>>>>       path. Authors have spent incredible amount of efforts in
>>>>>>getting the draft
>>>>>>       this far and we cannot ignore that. You can see the efforts
>>>>>>from the
>>>>>>       version number; when did we last see a draft version -037?
>>>>>>
>>>>>>       We also need to distill the recent ND discussions and filter
>>>>>>out the
>>>>>>       threads that are clearly motivated to insert a ND protocol
>>>>>>that is
>>>>>>       designed for a totally different operating environment. An
>>>>>>argument that a
>>>>>>       protocol designed for low-power environments is the solution
>>>>>>for vehicular
>>>>>>       environments requires some serious vetting. Looking at the
>>>>>>       characteristics, always-sleeping, occasional internet
>>>>>>connectivity,
>>>>>>       low-power, no memory, no processing power, no mobility ..etc,
>>>>>>meeting
>>>>>>       vehicular requirements is some thing most people in the WG do
>>>>>>not get it.
>>>>>>
>>>>>>       Bottom line, IMO, we should move this forward and publish the
>>>>>>document.
>>>>>>       All we need is a simple statement in the spec which puts some
>>>>>>scope
>>>>>>       limits, w.r.t the missing ND pieces and issues. There are
>>>>>>other proposals
>>>>>>       in the WG that will address the gaps and bring closure to the
>>>>>>work.
>>>>>>
>>>>>>       Sri
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>>       On 4/12/19, 1:28 PM, "Brian E Carpenter"
>>>>>><brian.e.carpenter@gmail.com <mailto:brian.e.carpenter@gmail.com>>
>>>>>>       wrote:
>>>>>>
>>>>>>       >On 13-Apr-19 02:59, Sri Gundavelli (sgundave) wrote:
>>>>>>       >>If you go back and check 2017 archives, I did raise many of
>>>>>>these
>>>>>>       >>issues.  But, we clearly decided to limit the scope
>>>>>>excluding address
>>>>>>       >>configuration, DAD, ND aspect, link models. When there is
>>>>>>such a scope
>>>>>>       >>statement, it should clearly move these comments to the
>>>>>>draft that
>>>>>>       >>defines how ND works for 802.11-OCB links.
>>>>>>       >
>>>>>>       >This is of course possible. In general the IETF hasn't done
>>>>>>that, but has
>>>>>>       >followed the lead set by RFC 2464 with the complete
>>>>>>specification of
>>>>>>       >IPv6-over-foo in one document.
>>>>>>       >
>>>>>>       >However, I don't believe that publishing an RFC about the
>>>>>>frame format
>>>>>>       >without *simultaneously* publishing an RFC about ND etc
>>>>>>would be a good
>>>>>>       >idea. That would leave developers absolutely unable to write
>>>>>>useful
>>>>>>       >code, and might easily lead to incompatible implementations.
>>>>>>Since
>>>>>>       >we'd presumably like Fords to be able to communicate with
>>>>>>Peugeots,
>>>>>>       >that seems like a bad idea.
>>>>>>       >
>>>>>>       >Regards
>>>>>>       >   Brian
>>>>>>
>>>>>
>>>>>
>>>> .
>>>>
>>>
>>>
>> 
>