<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.17 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc symrefs="yes"?>
<?rfc sortrefs="yes"?>
<?rfc strict="yes"?>
<?rfc compact="yes"?>
<?rfc toc="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-lpwan-architecture-02" category="info">

  <front>
    <title abbrev="LPWAN Architecture">LPWAN Static Context Header Compression (SCHC) Architecture</title>

    <author initials="A." surname="Pelov" fullname="Alexander Pelov">
      <organization>Acklio</organization>
      <address>
        <postal>
          <street>1137A avenue des Champs Blancs</street>
          <city>35510 Cesson-Sevigne Cedex</city>
          <country>France</country>
        </postal>
        <email>a@ackl.io</email>
      </address>
    </author>
    <author initials="P." surname="Thubert" fullname="Pascal Thubert">
      <organization>Cisco Systems</organization>
      <address>
        <postal>
          <street>45 Allee des Ormes - BP1200</street>
          <city>06254 Mougins - Sophia Antipolis</city>
          <country>France</country>
        </postal>
        <email>pthubert@cisco.com</email>
      </address>
    </author>
    <author initials="A." surname="Minaburo" fullname="Ana Minaburo">
      <organization>Acklio</organization>
      <address>
        <postal>
          <street>1137A avenue des Champs Blancs</street>
          <city>35510 Cesson-Sevigne Cedex</city>
          <country>France</country>
        </postal>
        <email>ana@ackl.io</email>
      </address>
    </author>

    <date year="2022" month="June" day="30"/>

    <area>Internet</area>
    <workgroup>LPWAN Working Group</workgroup>
    

    <abstract>


<t>This document defines the LPWAN SCHC architecture.</t>



    </abstract>



  </front>

  <middle>


<section anchor="Introduction" title="Introduction">

<t>The IETF LPWAN WG defined the necessary operations to enable IPv6 over
selected Low-Power Wide Area Networking (LPWAN) radio technologies.
<xref target="rfc8376"/> presents an overview of those technologies.</t>

<t>The Static Context Header Compression (SCHC) <xref target="rfc8724"/> technology is the core
product of the IETF LPWAN working group. <xref target="rfc8724"/> defines a generic framework
for header compression and fragmentation, based on a static context that is pre-installed on the SCHC endpoints.</t>

<t>This document details the constitutive elements of a SCHC-based solution, and
how the solution can be deployed. It provides a general architecture for a SCHC
deployment, positioning the required specifications, describing the possible
deployment types, and indicating models whereby the rules can be distributed and
installed to enable reliable and scalable operations.</t>

<!--
# Requirements Language

The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 {{RFC2119}} {{RFC8174}} when, and only when, they
appear in all capitals, as shown here.

-->

</section>
<section anchor="lpwan-technologies-and-profiles" title="LPWAN Technologies and Profiles">

<t>Because LPWAN technologies <xref target="rfc8376"/> have strict yet distinct constraints,
e.g., in terms of maximum frame size, throughput, and/or directionality, a SCHC
instance must be profiled to adapt to the specific necessities of the technology
to which it is applied.</t>

<t>Appendix D. “SCHC Parameters” of <xref target="rfc8724"/> lists the information that an LPWAN
technology-specific document must provide to profile SCHC for that technology.</t>

<t>As an example, <xref target="rfc9011"/> provides the SCHC profile for LoRaWAN networks.</t>

</section>
<section anchor="the-static-context-header-compression" title="The Static Context Header Compression">

<t><xref target="rfc8724">SCHC</xref> specifies an extreme compression capability based on a state
that must match on the compressor and decompressor side.
This state comprises a set of Compression/Decompression (C/D) rules.</t>

<t>The SCHC Parser analyzes incoming packets and creates a list of fields that it
matches against the compression rules.
The rule that matches best is used to compress the packet, and the rule
identifier (RuleID) is transmitted together with the compression residue to the decompressor.
Based on the RuleID and the residue, the decompressor can rebuild the original packet and forward it in its uncompressed form over the Internet.</t>

<t><xref target="rfc8724"/> also provides a Fragmentation/Reassembly (F/R) capability to cope
with the maximum and/or variable frame size of a Link, which is extremely constrained in the
case of an LPWAN network.</t>

<t>If a SCHC-compressed packet is too large to be sent in a single Link-Layer PDU,
the SCHC fragmentation can be applied on the compressed packet.
The process of SCHC fragmentation is similar to that of compression;
the fragmentation rules that are programmed for this Device are checked to find
the most appropriate one, regarding the SCHC packet size, the link error rate,
and the reliability level required by the application.</t>

<t>The ruleID allows to determine if it is a compression or
fragmentation rule.</t>

</section>
<section anchor="schc-applicability" title="SCHC Applicability">

<section anchor="lpwan-overview" title="LPWAN Overview">

</section>
<section anchor="compressing-serial-streams" title="Compressing Serial Streams">

<t><xref target="rfc8724"/> was defined to compress <xref target="rfc8200">IPv6</xref> and UDP;
but SCHC really is a generic compression and fragmentation technology.
As such, SCHC is agnostic to which
protocol it compresses and at which layer it is operated. The C/D peers may be
hosted by different entities for different layers, and the F/R operation may
also be performed between different parties, or different sub-layers in the same
stack, and/or managed by different organizations.</t>

<t>If a protocol or a layer requires additional capabilities, it is always possible
to document more specifically how to use SCHC in that context, or to specify
additional behaviours.
For instance, <xref target="rfc8824"/> extends the compression to CoAP <xref target="RFC7252"/> and
OSCORE <xref target="RFC8613"/>.</t>

</section>
<section anchor="example-goose-and-dlms" title="Example: Goose and DLMS">

</section>
</section>
<section anchor="schc-architecture" title="SCHC Architecture">

<section anchor="schc-endpoints" title="SCHC Endpoints">

<!--
[//]: # (to Eric's point, how do we ensure that both ends have the same rule set)
-->
<t>Section 3 of <xref target="rfc8724"/> depicts a typical network architecture for
an LPWAN network, simplified from that shown in <xref target="rfc8376"/> and reproduced in
<xref target="Fig-LPWANnetarch"/>.</t>

<figure title="Typical LPWAN Network Architecture" anchor="Fig-LPWANnetarch"><artwork><![CDATA[
 ()   ()   ()       |
  ()  () () ()     / \       +---------+
() () () () () () /   \======|    ^    |             +-----------+
 ()  ()   ()     |           | <--|--> |             |Application|
()  ()  ()  ()  / \==========|    v    |=============|   Server  |
  ()  ()  ()   /   \         +---------+             +-----------+
 Dev            RGWs             NGW                      App
]]></artwork></figure>

<t>Typically, an LPWAN network topology is star-oriented, which means that all
packets between the same source-destination pair follow the same path from/to a
central point. In that model, highly constrained Devices (Dev) exchange
information with LPWAN Application Servers (App) through a central Network
Gateway (NGW), which can be powered and is typically a lot less constrained than
the Devices.
Because Devices embed built-in applications, the traffic flows to be compressed
are known in advance and the location of the C/D and F/R functions
(e.g., at the Dev and NGW), and the associated rules, can be pre provisioned
 in the system before use.</t>

<t>The SCHC operation requires a shared sense of which SCHC Device is Uplink
(Dev to App) and which is Downlink (App to Dev), see <xref target="rfc8376"/>.
In a star deployment, the hub is always considered Uplink and the spokes are
Downlink. The expectation is that the hub and spoke derive knowledge of their
role from the network configuration and SCHC does not need to signal which is
hub thus Uplink vs. which is spoke thus Downlink. In other words, the link
direction is determined from extrinsic properties, and is not advertised in the
protocol.</t>

<t>Nevertheless, SCHC is very generic and its applicability is not limited to
star-oriented deployments and/or to use cases where applications are very static
and the state provisioned in advance.
In particular, a peer-to-peer (P2P) SCHC Instance (see <xref target="Instances"/>) may be set
up between peers of equivalent capabilities, and the link direction cannot be
inferred, either from the network topology nor from the device capability.</t>

<t>In that case, by convention, the device that initiates the donnection that
sustains the SCHC Instance is considered as being Downlink, IOW it plays the
role of the Dev in <xref target="rfc8724"/>.</t>

<t>This convention can be reversed, e.g., by configuration,
but for proper SCHC operation, it is required that the method used ensures that
both ends are aware of their role, and then again this determination is based
on extrinsic properties.</t>

</section>
<section anchor="Instances" title="SCHC Instances">

<t><xref target="rfc8724"/> defines a protocol operation between a pair of peers. A session
called a SCHC Instance is established and SCHC maintains a state and timers
associated to that Instance.</t>

<t>When the SCHC Device is a highly constrained unit, there is typically only one
Instance for that Device, and all the traffic from and to the device is
exchanged with the same Network Gateway. All the traffic can thus be implicitly
associated with the single Instance that the device supports, and the Device
does not need to manipulate the concept. For that reason, SCHC avoids to signal
explicitly the Instance identification in its data packets.</t>

<t>The Network Gateway, on the other hand, maintains multiple Instances, one per
SCHC Device. The Instance is derived from the lower layer, typically the source
of an incoming SCHC packet. The Instance is used in particular to select from
the rule database the set of rules that apply to the SCHC Device, and the
current state of their exchange, e.g., timers and previous fragments.</t>

<t>This architecture generalizes the model to any kind of peers. In the case of
more capable devices, a SCHC Device may maintain more than one Instance with the
same peer, or a set of different peers.
Since SCHC does not signal the Instance in its packets, the information must be
derived from a lower layer point to point information.
For instance, the SCHC session can be associated one-to-one with a tunnel, a TLS
session, or a TCP or a PPP connection.</t>

<t>For instance, <xref target="I-D.thubert-intarea-schc-over-ppp"/> describes a type of deployment where
the C/D and/or F/R operations are performed between peers of equal capabilities
over a PPP <xref target="rfc2516"/> connection. SCHC over PPP illustrates that with SCHC,
the protocols that are compressed can be discovered dynamically and the
rules can be fetched on-demand by both parties from the same Uniform Resource
Name (URN) <xref target="rfc8141"/>, ensuring that the peers use the exact same set of rules.</t>

<figure title="PPP-based SCHC Deployment" anchor="Fig-PPPnetarch"><artwork><![CDATA[
    +----------+  Wi-Fi /   +----------+                ....
    |    IP    |  Ethernet  |    IP    |            ..          )
    |   Host   +-----/------+  Router  +----------(   Internet   )
    | SCHC C/D |  Serial    | SCHC C/D |            (         )
    +----------+            +----------+               ...
                <-- SCHC -->
                  over PPP
]]></artwork></figure>

<t>In that case, the SCHC Instance is derived from the PPP connection. This
means that there can be only one Instance per PPP connection, and that all the
flow and only the flow of that Instance is exchanged within the PPP connection.</t>

</section>
<section anchor="layering-with-schc-instances" title="Layering with SCHC Instances">

<t><xref target="rfc8724"/> states that a SCHC instance needs the rules to process
C/D and F/R before the session starts, and that rules cannot be modified during
the session.</t>

<t>As represented figure <xref target="Fig-SCHCCOAP2"/>, the compression
of the IP and UDP headers may be operated by a network SCHC instance whereas the
end-to-end compression of the application payload happens between the Device and
the application. The compression of the application payload may be split in two
instances to deal with the encrypted portion of the application PDU. Fragmentation
applies before LPWAN transportation layer.</t>

<figure title="Different SCHC instances in a global system" anchor="Fig-SCHCCOAP2"><artwork><![CDATA[
         (Device)            (NGW)                              (App)

         +--------+                                           +--------+
  A S    |  CoAP  |                                           |  CoAP  |
  p C    |  inner |                                           |  inner |
  p H    +--------+                                           +--------+
  . C    |  SCHC  |                                           |  SCHC  |
         |  inner |   cryptographical boundary                |  inner |
 -._.-._.-._.-._.-._.-._.-._.-._.-._.-._.-._.-._.-._.-._.-._.-._.-._.-._
  A S    |  CoAP  |                                           |  CoAP  |
  p C    |  outer |                                           |  outer |
  p H    +--------+                                           +--------+
  . C    |  SCHC  |                                           |  SCHC  |
         |  outer |   layer / functional boundary             |  outer |
 -._.-._.-._.-._.-._.-._.-._.-._.-._.-._.-._.-._.-._.-._.-._.-._.-._.-._
  N      .  UDP   .                                           .  UDP   .
  e      ..........     ..................                    ..........
  t      .  IPv6  .     .      IPv6      .                    .  IPv6  .
  w S    ..........     ..................                    ..........
  o C    .SCHC/L3 .     . SCHC/L3.       .                    .        .
  r H    ..........     ..........       .                    .        .
  k C    .  LPWAN .     . LPWAN  .       .                    .        .
         ..........     ..................                    ..........
             ((((LPWAN))))             ------   Internet  ------
]]></artwork></figure>

<t>This document defines a generic architecture for SCHC that can be used at any of these levels.
The goal of the architectural document is to orchestrate the different protocols and data model
defined by the LPWAN working group to design an operational and interoperable
framework for allowing IP application over contrained networks.</t>

</section>
</section>
<section anchor="schc-data-model" title="SCHC Data Model">

<t>A SCHC instance, summarized in the <xref target="Fig-Glob-Arch1"/>, implies C/D and/or F/R present in both end and that both ends are provisioned with the same set of rules.</t>

<figure title="Summarized SCHC elements" anchor="Fig-Glob-Arch1"><artwork><![CDATA[
       (-------)                                (-------)
       ( Rules )                                ( Rules )
       (-------)                                (-------)
        . read                                   . read
        .                                        .
       +-------+                                +-------+
   <===| R & D |<===                        <===| C & F |<===
   ===>| C & F |===>                        ===>| R & D |===>
       +-------+
]]></artwork></figure>

<t>A common rule representation that expresses the SCHC rules in an interoperable
fashion is needed yo be able to provision end-points from different vendors
To that effect, <xref target="I-D.ietf-lpwan-schc-yang-data-model"/> defines a rule representation using the
<xref target="rfc7950">YANG</xref> formalism.</t>

<t><xref target="I-D.ietf-lpwan-schc-yang-data-model"/> defines an YANG data model to represent the rules. This enables the use of several protocols for rule management, such as NETCONF<xref target="RFC6241"/>, RESTCONF<xref target="RFC8040"/>, and CORECONF<xref target="I-D.ietf-core-comi"/>. NETCONF uses SSH, RESTCONF uses HTTPS, and CORECONF uses CoAP(s) as their respective transport layer protocols. The data is represented in XML under NETCONF, in JSON<xref target="RFC8259"/> under RESTCONF and in CBOR<xref target="RFC8949"/> under CORECONF.</t>

<figure title="Summerized SCHC elements" anchor="Fig-RM"><artwork><![CDATA[
                  create
       (-------)  read   +=======+ *
       ( rules )<------->|Rule   |<--|-------->
       (-------)  update |Manager|   NETCONF, RESTCONF or CORECONF
          . read  delete +=======+   request
          .
       +-------+
   <===| R & D |<===
   ===>| C & F |===>
       +-------+
]]></artwork></figure>

<t>The Rule Manager (RM) is in charge of handling data derived from the YANG Data
Model and apply changes to the rules database <xref target="Fig-RM"/>.</t>

<t>The RM is an Application using the Internet to exchange information, therefore:</t>

<t><list style="symbols">
  <t>for the network-level SCHC, the communication does not require routing. Each of the end-points having an RM and both RMs can be viewed on the same link, therefore wellknown Link Local addresses can be used to identify the Device and the core RM. L2 security MAY be deemed as sufficient, if it provides the necessary level of protection.</t>
  <t>for application-level SCHC, routing is involved and global IP addresses SHOULD be used. End-to-end encryption is RECOMMENDED.</t>
</list></t>

<t>Management messages can also be carried in the negotiation protocol as proposed in <xref target="I-D.thubert-intarea-schc-over-ppp"/>.
The RM traffic may be itself compressed by SCHC: if CORECONF protocol is used, <xref target="rfc8824"/> can be applied.</t>

</section>
<section anchor="schc-device-lifecycle" title="SCHC Device Lifecycle">
<t>In the context of LPWANs, the expectation is that SCHC rules are associated with a
physical device that is deployed in a network. This section describes the actions
taken to enable an autimatic commissioning of the device in the network.
SCHC</t>

<section anchor="device-development" title="Device Development">

<t>The expectation for the development cycle is that message formats are documented as a data model that is used to generate rules. Several models are possible:</t>

<t><list style="numbers">
  <t>In the application model, an interface definition language and binary communication protocol such as Apache Thrift is used, and the serialization code includes the SCHC operation. This model imposes that both ends are compiled with the generated structures and linked with generated code that represents the rule operation.</t>
  <t>In the device model, the rules are generated separately. Only the device-side code is linked with generated code. The Rules are published separately to be used by a generic SCHC engine that operates in a middle box such as a SCHC gateway.</t>
  <t>In the protocol model, both endpoint generate a packet format that is imposed by a protocol. In that case, the protocol itself is the source to generate the Rules. Both ends of the SCHC compression are operated in middle boxes, and special attention must be taken to ensure that they operate on the compatible Rule sets, basically the same major version of the same Rule Set.</t>
</list></t>

<t>Depending on the deployment, the tools thar generate the Rules should provide knobs to optimize the Rule set, e.g., more rules vs. larger residue.</t>

</section>
<section anchor="rules-publication" title="Rules Publication">

<t>In the device model and in the protocol model, at least one of the endpoints must obtain the rule set dynamically. The expectation is that the Rule Sets are published to a reachable repository and versionned (minor, major). Each rule set should have its own Uniform Resource Names (URN) <xref target="RFC8141"/> and a version.</t>

<t>The Rule Set should be authenticated to ensure that it is genuine, or obtained from a trusted app store.
A corrupted Rule Set may be used for multiple forms of attacks, more in <xref target="Security"/>.</t>

</section>
<section anchor="schc-device-deployment" title="SCHC Device Deployment">
<!--
[//]: # (how to provision the GW with the security and the rule set for the new device?)
-->

<t>The device and the network should mutually authenticate themselves. The autonomic approach <xref target="RFC8993"/> provides a model to achieve this at scale with zero touchn, in networks where enough bandwidth and compute are available. In highly constrained networks, one touch is usually necessary to program keys in the devices.</t>

<t>The initial handshake between the SCHC endpoints should comprise a capability exchange whereby URN and the version of the rule set are obtained or compared. SCHC may not be used if both ends can not agree on an URN and a major version.  Manufacturer Usage Descriptions (MUD) <xref target="RFC8520"/> may be used for that purpose in the device model.</t>

<t>Upon the handshake, both ends can agree on a rule set, their role when the rules are asymmetrical, and fetch the rule set if necessary. Optionally, a node that fetwhed a rule set may inform the other end that it is reacy from transmission.</t>

</section>
<section anchor="schc-device-maintenance" title="SCHC Device Maintenance">

<t>URN update without device update (bug fix)
FUOTA =&gt; new URN =&gt; reprovisioning</t>

</section>
<section anchor="schc-device-decommissionning" title="SCHC Device Decommissionning">

<t>Signal from device/vendor/network admin</t>

</section>
</section>
<section anchor="Security" title="Security Considerations">

<t>SCHC is sensitive to the rules that could be abused to form arbitrary long
messages or as a form of attack against the C/D and/or F/R functions, say to
generate a buffer overflow and either modify the Device or crash it. It is
thus critical to ensure that the rules are distributed in a fashion that is
protected against tempering, e.g., encrypted and signed.</t>

<!--
[//]: # (Ben Kaduk comment on SCHC CoAP; compression may leak information ???)
[//]: # (Add text to say that this is not effective because not dictionary based)
-->

</section>
<section anchor="iana-consideration" title="IANA Consideration">

<t>This document has no request to IANA</t>

</section>
<section anchor="acknowledgements" title="Acknowledgements">

<t>The authors would like to thank (in alphabetic order):</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference anchor='rfc8724' target='https://www.rfc-editor.org/info/rfc8724'>
<front>
<title>SCHC: Generic Framework for Static Context Header Compression and Fragmentation</title>
<author fullname='A. Minaburo' initials='A.' surname='Minaburo'><organization/></author>
<author fullname='L. Toutain' initials='L.' surname='Toutain'><organization/></author>
<author fullname='C. Gomez' initials='C.' surname='Gomez'><organization/></author>
<author fullname='D. Barthel' initials='D.' surname='Barthel'><organization/></author>
<author fullname='JC. Zuniga' initials='JC.' surname='Zuniga'><organization/></author>
<date month='April' year='2020'/>
<abstract><t>This document defines the Static Context Header Compression and fragmentation (SCHC) framework, which provides both a header compression mechanism and an optional fragmentation mechanism. SCHC has been designed with Low-Power Wide Area Networks (LPWANs) in mind.</t><t>SCHC compression is based on a common static context stored both in the LPWAN device and in the network infrastructure side. This document defines a generic header compression mechanism and its application to compress IPv6/UDP headers.</t><t>This document also specifies an optional fragmentation and reassembly mechanism. It can be used to support the IPv6 MTU requirement over the LPWAN technologies. Fragmentation is needed for IPv6 datagrams that, after SCHC compression or when such compression was not possible, still exceed the Layer 2 maximum payload size.</t><t>The SCHC header compression and fragmentation mechanisms are independent of the specific LPWAN technology over which they are used. This document defines generic functionalities and offers flexibility with regard to parameter settings and mechanism choices. This document standardizes the exchange over the LPWAN between two SCHC entities. Settings and choices specific to a technology or a product are expected to be grouped into profiles, which are specified in other documents. Data models for the context and profiles are out of scope.</t></abstract>
</front>
<seriesInfo name='RFC' value='8724'/>
<seriesInfo name='DOI' value='10.17487/RFC8724'/>
</reference>



<reference anchor='rfc8824' target='https://www.rfc-editor.org/info/rfc8824'>
<front>
<title>Static Context Header Compression (SCHC) for the Constrained Application Protocol (CoAP)</title>
<author fullname='A. Minaburo' initials='A.' surname='Minaburo'><organization/></author>
<author fullname='L. Toutain' initials='L.' surname='Toutain'><organization/></author>
<author fullname='R. Andreasen' initials='R.' surname='Andreasen'><organization/></author>
<date month='June' year='2021'/>
<abstract><t>This document defines how to compress Constrained Application Protocol (CoAP) headers using the Static Context Header Compression and fragmentation (SCHC) framework. SCHC defines a header compression mechanism adapted for Constrained Devices. SCHC uses a static description of the header to reduce the header's redundancy and size. While RFC 8724 describes the SCHC compression and fragmentation framework, and its application for IPv6/UDP headers, this document applies SCHC to CoAP headers. The CoAP header structure differs from IPv6 and UDP, since CoAP uses a flexible header with a variable number of options, themselves of variable length. The CoAP message format is asymmetric: the request messages have a header format different from the format in the response messages. This specification gives guidance on applying SCHC to flexible headers and how to leverage the asymmetry for more efficient compression Rules.</t></abstract>
</front>
<seriesInfo name='RFC' value='8824'/>
<seriesInfo name='DOI' value='10.17487/RFC8824'/>
</reference>



<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='March' year='1997'/>
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor='RFC8174' target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author fullname='B. Leiba' initials='B.' surname='Leiba'><organization/></author>
<date month='May' year='2017'/>
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>



<reference anchor='rfc9011' target='https://www.rfc-editor.org/info/rfc9011'>
<front>
<title>Static Context Header Compression and Fragmentation (SCHC) over LoRaWAN</title>
<author fullname='O. Gimenez' initials='O.' role='editor' surname='Gimenez'><organization/></author>
<author fullname='I. Petrov' initials='I.' role='editor' surname='Petrov'><organization/></author>
<date month='April' year='2021'/>
<abstract><t>The Static Context Header Compression and fragmentation (SCHC) specification (RFC 8724) describes generic header compression and fragmentation techniques for Low-Power Wide Area Network (LPWAN) technologies. SCHC is a generic mechanism designed for great flexibility so that it can be adapted for any of the LPWAN technologies.</t><t>This document defines a profile of SCHC (RFC 8724) for use in LoRaWAN networks and provides elements such as efficient parameterization and modes of operation.</t></abstract>
</front>
<seriesInfo name='RFC' value='9011'/>
<seriesInfo name='DOI' value='10.17487/RFC9011'/>
</reference>



<reference anchor='RFC8141' target='https://www.rfc-editor.org/info/rfc8141'>
<front>
<title>Uniform Resource Names (URNs)</title>
<author fullname='P. Saint-Andre' initials='P.' surname='Saint-Andre'><organization/></author>
<author fullname='J. Klensin' initials='J.' surname='Klensin'><organization/></author>
<date month='April' year='2017'/>
<abstract><t>A Uniform Resource Name (URN) is a Uniform Resource Identifier (URI) that is assigned under the &quot;urn&quot; URI scheme and a particular URN namespace, with the intent that the URN will be a persistent, location-independent resource identifier.  With regard to URN syntax, this document defines the canonical syntax for URNs (in a way that is consistent with URI syntax), specifies methods for determining URN-equivalence, and discusses URI conformance.  With regard to URN namespaces, this document specifies a method for defining a URN namespace and associating it with a namespace identifier, and it describes procedures for registering namespace identifiers with the Internet Assigned Numbers Authority (IANA).  This document obsoletes both RFCs 2141 and 3406.</t></abstract>
</front>
<seriesInfo name='RFC' value='8141'/>
<seriesInfo name='DOI' value='10.17487/RFC8141'/>
</reference>



<reference anchor='RFC8993' target='https://www.rfc-editor.org/info/rfc8993'>
<front>
<title>A Reference Model for Autonomic Networking</title>
<author fullname='M. Behringer' initials='M.' role='editor' surname='Behringer'><organization/></author>
<author fullname='B. Carpenter' initials='B.' surname='Carpenter'><organization/></author>
<author fullname='T. Eckert' initials='T.' surname='Eckert'><organization/></author>
<author fullname='L. Ciavaglia' initials='L.' surname='Ciavaglia'><organization/></author>
<author fullname='J. Nobre' initials='J.' surname='Nobre'><organization/></author>
<date month='May' year='2021'/>
<abstract><t>This document describes a reference model for Autonomic Networking for managed networks. It defines the behavior of an autonomic node, how the various elements in an autonomic context work together, and how autonomic services can use the infrastructure.</t></abstract>
</front>
<seriesInfo name='RFC' value='8993'/>
<seriesInfo name='DOI' value='10.17487/RFC8993'/>
</reference>



<reference anchor='RFC8520' target='https://www.rfc-editor.org/info/rfc8520'>
<front>
<title>Manufacturer Usage Description Specification</title>
<author fullname='E. Lear' initials='E.' surname='Lear'><organization/></author>
<author fullname='R. Droms' initials='R.' surname='Droms'><organization/></author>
<author fullname='D. Romascanu' initials='D.' surname='Romascanu'><organization/></author>
<date month='March' year='2019'/>
<abstract><t>This memo specifies a component-based architecture for Manufacturer Usage Descriptions (MUDs).  The goal of MUD is to provide a means for end devices to signal to the network what sort of access and network functionality they require to properly function.  The initial focus is on access control.  Later work can delve into other aspects.</t><t>This memo specifies two YANG modules, IPv4 and IPv6 DHCP options, a Link Layer Discovery Protocol (LLDP) TLV, a URL, an X.509 certificate extension, and a means to sign and verify the descriptions.</t></abstract>
</front>
<seriesInfo name='RFC' value='8520'/>
<seriesInfo name='DOI' value='10.17487/RFC8520'/>
</reference>




    </references>

    <references title='Informative References'>





<reference anchor='rfc8376' target='https://www.rfc-editor.org/info/rfc8376'>
<front>
<title>Low-Power Wide Area Network (LPWAN) Overview</title>
<author fullname='S. Farrell' initials='S.' role='editor' surname='Farrell'><organization/></author>
<date month='May' year='2018'/>
<abstract><t>Low-Power Wide Area Networks (LPWANs) are wireless technologies with characteristics such as large coverage areas, low bandwidth, possibly very small packet and application-layer data sizes, and long battery life operation.  This memo is an informational overview of the set of LPWAN technologies being considered in the IETF and of the gaps that exist between the needs of those technologies and the goal of running IP in LPWANs.</t></abstract>
</front>
<seriesInfo name='RFC' value='8376'/>
<seriesInfo name='DOI' value='10.17487/RFC8376'/>
</reference>



<reference anchor='rfc8200' target='https://www.rfc-editor.org/info/rfc8200'>
<front>
<title>Internet Protocol, Version 6 (IPv6) Specification</title>
<author fullname='S. Deering' initials='S.' surname='Deering'><organization/></author>
<author fullname='R. Hinden' initials='R.' surname='Hinden'><organization/></author>
<date month='July' year='2017'/>
<abstract><t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t></abstract>
</front>
<seriesInfo name='STD' value='86'/>
<seriesInfo name='RFC' value='8200'/>
<seriesInfo name='DOI' value='10.17487/RFC8200'/>
</reference>



<reference anchor='rfc7950' target='https://www.rfc-editor.org/info/rfc7950'>
<front>
<title>The YANG 1.1 Data Modeling Language</title>
<author fullname='M. Bjorklund' initials='M.' role='editor' surname='Bjorklund'><organization/></author>
<date month='August' year='2016'/>
<abstract><t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols.  This document describes the syntax and semantics of version 1.1 of the YANG language.  YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification.  There are a small number of backward incompatibilities from YANG version 1.  This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t></abstract>
</front>
<seriesInfo name='RFC' value='7950'/>
<seriesInfo name='DOI' value='10.17487/RFC7950'/>
</reference>


<reference anchor='I-D.ietf-lpwan-schc-yang-data-model'>
   <front>
      <title>Data Model for Static Context Header Compression (SCHC)</title>
      <author fullname='Ana Minaburo'>
	 <organization>Acklio</organization>
      </author>
      <author fullname='Laurent Toutain'>
	 <organization>Institut MINES TELECOM; IMT Atlantique</organization>
      </author>
      <date day='25' month='May' year='2022'/>
      <abstract>
	 <t>   This document describes a YANG data model for the SCHC (Static
   Context Header Compression) compression and fragmentation rules.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-lpwan-schc-yang-data-model-12'/>
   <format target='https://www.ietf.org/archive/id/draft-ietf-lpwan-schc-yang-data-model-12.txt' type='TXT'/>
</reference>


<reference anchor='I-D.thubert-intarea-schc-over-ppp'>
   <front>
      <title>SCHC over PPP</title>
      <author fullname='Pascal Thubert'>
	 <organization>Cisco Systems, Inc</organization>
      </author>
      <date day='21' month='April' year='2021'/>
      <abstract>
	 <t>   This document extends RFC 5172 to signal the use of SCHC as the
   compression method between a pair of nodes over PPP.  Combined with
   RFC 2516, this enables the use of SCHC over Ethernet and Wi-Fi.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-thubert-intarea-schc-over-ppp-03'/>
   <format target='https://www.ietf.org/archive/id/draft-thubert-intarea-schc-over-ppp-03.txt' type='TXT'/>
</reference>


<reference anchor='I-D.ietf-core-comi'>
   <front>
      <title>CoAP Management Interface (CORECONF)</title>
      <author fullname='Michel Veillette'>
	 <organization>Trilliant Networks Inc.</organization>
      </author>
      <author fullname='Peter van der Stok'>
	 <organization>consultant</organization>
      </author>
      <author fullname='Alexander Pelov'>
	 <organization>Acklio</organization>
      </author>
      <author fullname='Andy Bierman'>
	 <organization>YumaWorks</organization>
      </author>
      <author fullname='Ivaylo Petrov'>
	 <organization>Acklio</organization>
      </author>
      <date day='17' month='January' year='2021'/>
      <abstract>
	 <t>   This document describes a network management interface for
   constrained devices and networks, called CoAP Management Interface
   (CORECONF).  The Constrained Application Protocol (CoAP) is used to
   access datastore and data node resources specified in YANG, or SMIv2
   converted to YANG.  CORECONF uses the YANG to CBOR mapping and
   converts YANG identifier strings to numeric identifiers for payload
   size reduction.  CORECONF extends the set of YANG based protocols,
   NETCONF and RESTCONF, with the capability to manage constrained
   devices and networks.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-core-comi-11'/>
   <format target='https://www.ietf.org/archive/id/draft-ietf-core-comi-11.txt' type='TXT'/>
</reference>



<reference anchor='RFC7252' target='https://www.rfc-editor.org/info/rfc7252'>
<front>
<title>The Constrained Application Protocol (CoAP)</title>
<author fullname='Z. Shelby' initials='Z.' surname='Shelby'><organization/></author>
<author fullname='K. Hartke' initials='K.' surname='Hartke'><organization/></author>
<author fullname='C. Bormann' initials='C.' surname='Bormann'><organization/></author>
<date month='June' year='2014'/>
<abstract><t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks.  The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s.  The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t><t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types.  CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t></abstract>
</front>
<seriesInfo name='RFC' value='7252'/>
<seriesInfo name='DOI' value='10.17487/RFC7252'/>
</reference>



<reference anchor='RFC8613' target='https://www.rfc-editor.org/info/rfc8613'>
<front>
<title>Object Security for Constrained RESTful Environments (OSCORE)</title>
<author fullname='G. Selander' initials='G.' surname='Selander'><organization/></author>
<author fullname='J. Mattsson' initials='J.' surname='Mattsson'><organization/></author>
<author fullname='F. Palombini' initials='F.' surname='Palombini'><organization/></author>
<author fullname='L. Seitz' initials='L.' surname='Seitz'><organization/></author>
<date month='July' year='2019'/>
<abstract><t>This document defines Object Security for Constrained RESTful Environments (OSCORE), a method for application-layer protection of the Constrained Application Protocol (CoAP), using CBOR Object Signing and Encryption (COSE).  OSCORE provides end-to-end protection between endpoints communicating using CoAP or CoAP-mappable HTTP. OSCORE is designed for constrained nodes and networks supporting a range of proxy operations, including translation between different transport protocols.</t><t>Although an optional functionality of CoAP, OSCORE alters CoAP options processing and IANA registration.  Therefore, this document updates RFC 7252.</t></abstract>
</front>
<seriesInfo name='RFC' value='8613'/>
<seriesInfo name='DOI' value='10.17487/RFC8613'/>
</reference>



<reference anchor='rfc2516' target='https://www.rfc-editor.org/info/rfc2516'>
<front>
<title>A Method for Transmitting PPP Over Ethernet (PPPoE)</title>
<author fullname='L. Mamakos' initials='L.' surname='Mamakos'><organization/></author>
<author fullname='K. Lidl' initials='K.' surname='Lidl'><organization/></author>
<author fullname='J. Evarts' initials='J.' surname='Evarts'><organization/></author>
<author fullname='D. Carrel' initials='D.' surname='Carrel'><organization/></author>
<author fullname='D. Simone' initials='D.' surname='Simone'><organization/></author>
<author fullname='R. Wheeler' initials='R.' surname='Wheeler'><organization/></author>
<date month='February' year='1999'/>
<abstract><t>This document describes how to build PPP sessions and encapsulate PPP packets over Ethernet. This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name='RFC' value='2516'/>
<seriesInfo name='DOI' value='10.17487/RFC2516'/>
</reference>



<reference anchor='rfc8141' target='https://www.rfc-editor.org/info/rfc8141'>
<front>
<title>Uniform Resource Names (URNs)</title>
<author fullname='P. Saint-Andre' initials='P.' surname='Saint-Andre'><organization/></author>
<author fullname='J. Klensin' initials='J.' surname='Klensin'><organization/></author>
<date month='April' year='2017'/>
<abstract><t>A Uniform Resource Name (URN) is a Uniform Resource Identifier (URI) that is assigned under the &quot;urn&quot; URI scheme and a particular URN namespace, with the intent that the URN will be a persistent, location-independent resource identifier.  With regard to URN syntax, this document defines the canonical syntax for URNs (in a way that is consistent with URI syntax), specifies methods for determining URN-equivalence, and discusses URI conformance.  With regard to URN namespaces, this document specifies a method for defining a URN namespace and associating it with a namespace identifier, and it describes procedures for registering namespace identifiers with the Internet Assigned Numbers Authority (IANA).  This document obsoletes both RFCs 2141 and 3406.</t></abstract>
</front>
<seriesInfo name='RFC' value='8141'/>
<seriesInfo name='DOI' value='10.17487/RFC8141'/>
</reference>



<reference anchor='RFC6241' target='https://www.rfc-editor.org/info/rfc6241'>
<front>
<title>Network Configuration Protocol (NETCONF)</title>
<author fullname='R. Enns' initials='R.' role='editor' surname='Enns'><organization/></author>
<author fullname='M. Bjorklund' initials='M.' role='editor' surname='Bjorklund'><organization/></author>
<author fullname='J. Schoenwaelder' initials='J.' role='editor' surname='Schoenwaelder'><organization/></author>
<author fullname='A. Bierman' initials='A.' role='editor' surname='Bierman'><organization/></author>
<date month='June' year='2011'/>
<abstract><t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices.  It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages.  The NETCONF protocol operations are realized as remote procedure calls (RPCs).  This document obsoletes RFC 4741.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6241'/>
<seriesInfo name='DOI' value='10.17487/RFC6241'/>
</reference>



<reference anchor='RFC8040' target='https://www.rfc-editor.org/info/rfc8040'>
<front>
<title>RESTCONF Protocol</title>
<author fullname='A. Bierman' initials='A.' surname='Bierman'><organization/></author>
<author fullname='M. Bjorklund' initials='M.' surname='Bjorklund'><organization/></author>
<author fullname='K. Watsen' initials='K.' surname='Watsen'><organization/></author>
<date month='January' year='2017'/>
<abstract><t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t></abstract>
</front>
<seriesInfo name='RFC' value='8040'/>
<seriesInfo name='DOI' value='10.17487/RFC8040'/>
</reference>



<reference anchor='RFC8259' target='https://www.rfc-editor.org/info/rfc8259'>
<front>
<title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
<author fullname='T. Bray' initials='T.' role='editor' surname='Bray'><organization/></author>
<date month='December' year='2017'/>
<abstract><t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format.  It was derived from the ECMAScript Programming Language Standard.  JSON defines a small set of formatting rules for the portable representation of structured data.</t><t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t></abstract>
</front>
<seriesInfo name='STD' value='90'/>
<seriesInfo name='RFC' value='8259'/>
<seriesInfo name='DOI' value='10.17487/RFC8259'/>
</reference>



<reference anchor='RFC8949' target='https://www.rfc-editor.org/info/rfc8949'>
<front>
<title>Concise Binary Object Representation (CBOR)</title>
<author fullname='C. Bormann' initials='C.' surname='Bormann'><organization/></author>
<author fullname='P. Hoffman' initials='P.' surname='Hoffman'><organization/></author>
<date month='December' year='2020'/>
<abstract><t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t><t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049.  It does not create a new version of the format.</t></abstract>
</front>
<seriesInfo name='STD' value='94'/>
<seriesInfo name='RFC' value='8949'/>
<seriesInfo name='DOI' value='10.17487/RFC8949'/>
</reference>




    </references>




  </back>

<!-- ##markdown-source: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-->

</rfc>

