►
From YouTube: IETF99-IPWAVE-20170720-1550
Description
IPWAVE meeting session at IETF99
2017/07/20 1550
https://datatracker.ietf.org/meeting/99/proceedings/
A
A
B
B
B
C
B
B
B
B
B
E
E
Yeah
I
have
this
screen
look
down
from
time
to
time
the
presentation
is
advancement
of
our
internet
draft,
which
is
transmission
of
ipv6
packets,
of
RIT
pollito
2.11
networks
in
mode
outside
the
context
of
a
basic
service
set.
The
present
the
slot
is
relatively
brief,
because
there
are
not
many
issues.
You
will
see
the
issues
from
next
slide.
Please
the
issues
from
some
minor
textual
issues
that
took
the
most
time
to
fix,
and
then
some
issues
that
were
discussed
around
Chicago
meeting
and
one
issue
that
is
still
on
the
table
on
the
last
slide.
E
Yeah
so
I
believe
it's
very
small
for
people
at
the
end
of
the
room.
The
slides
are
also
on
the
ITF
website
in
the
proceedings
you
could,
you
could
download
them,
and
this
is
a
suggestion
about
the
alt
text,
saying
that
ipv6
works
over
802
dot.
11
OC
be
in
the
same
manner
as
over
802
11,
Wi-Fi
wear
as
well.
The
commenter
says
it
is
not
true,
and
there
are
some
exceptions
in
OCB
as
such.
E
E
This
definition
applies
to
this
document
and
an
RSU.
Maybe
connect
may
be
connected
to
the
Internet,
maybe
equipped
with
additional
wired
or
wireless
network
interfaces
that
run
IP
and
an
RSU,
maybe
an
IP,
router.
Okay.
This
is
as
a
result
of
a
comment
we
had
that
said
that
in
some
particular
context,
DRS
shoes
are
not
routers
at
all
and
they
really
want
it
disconnected
from
the
internet
for
some
security
reason.
So
at
this
time
this
is
our
new
definition
that
is
in
the
draft
next
slide,
please
on
slide.
Four.
E
E
You
will
see
more
in
the
last
slide,
the
bodies,
another
correction
that
was
suggested
was
about
this
notation
of
F
F,
:,
F,
F
and
so
on.
It
was
suggested
that
the
base
16
numerical
notation,
is
zero
X
and
then
many
FS
instead
of
F
F,
colon
F
F,
so
in
at
some
place
we
use
this
0x
notation
of
a
hexadecimal
number
next
slide.
Please.
E
Is
there
are
some
channels
that
are
reserved
for
safety,
communications
and
ipv6
packets
should
not
be
sent
on
these
channels.
At
the
time
of
writing.
The
prohibition
is
explicit
at
higher
layer
protocols
that
provide
services
to
the
application.
These
higher
layer
protocols
are
specified
in
ieee,
tea-party,
16
online
documents
and
that
national
original
specifications
and
regression
specified
the
use
of
different
channels,
and
this
regression
must
be
followed.
That's
our
new
text
about
the
prohibition
of
ipv6
yeah
next
slide.
Please.
E
There
was
a
misunderstanding
about
Intel
face
the
world
Intel
Phase
two
I
saw
people
and
whitey
poly.
An
interface
may
signify
interface
between
layers,
but
in
the
text
that
we
wrote
here
is
interface
means
a
network
interface
like
an
interface
card.
So
this
text
clarifies
this
and
then
in
the
bottom
half
there
is
a
discussion
about
using
multiple
such
interfaces
in
a
vehicle,
and
some
vehicles
may
use
one
interface
that
is
dedicated
for
non
IP
communication,
but
still
802,
11
o
CB
communications.
E
So
the
comment
was
that
this
is
not
a
must
and
that,
whereas
some
vehicles
may
have
several
OCB
interfaces,
it
is
not
necessarily
a
must
that
one
of
them
should
be
completely
allocated
to
non
IP
communications.
As
such,
the
new
text
is
the
following:
there
are
considerations
for
two
or
more
OCB
interface
cards
per
vehicle
for
each
vehicle
taking
part
in
road
traffic.
One
Asif
interface
could
be
fully
allocated
for
non
IP
safety-critical
communication,
any
other
OCB
may
be
used
for
other
types
of
traffic.
So
that's
the
resolution
of
this
multiple
interfaces
issue
next
slide.
E
E
We
clarified
the
figure
that
shows
infrastructure
mode
and
OCB
mode
side
by
side
added
a
reference
to
the
IP
security
RFC
added
a
section
address,
mapping
unicast
that
I
will
show
next,
are
the
the
dot
11
trailer
to
pictures
of
dot,
11
frames
and
added
some
text
snap
carrying
the
answer?
Type
next
slide,
please!
This
is
the
section
we
added.
That
is
the
address
mapping
unicast.
It
is
practically
a
copy/paste
from
RFC
2464
and,
except
that
the
ethernet
address
down
the
slide
there
is.
The
text
about
this
Ethernet
address
is
much
reduced.
Okay.
E
E
We
make
reference
to
a
number
of
standards
outside
IETF
in
this
draft
and
since
we
started
this
effort,
many
of
these
documents
have
evolved,
especially,
we
received
an
explicit
request
from
Michele
and
from
I
Triple
E
that
we
should
mention
these
standards
in
their
most
recent
format.
As
you
see,
the
802
dot
11
TM
is
now
2016
version,
1609,
dot,
2,
TM,
2016
and
so
forth.
We
need
to
add
this
in
the
draft
at
this
time.
That's
an
a
specific
request
from
my
Tripoli.
F
E
So
yeah
ten
minutes,
okay,
so
I
think
I
still
have
one
or
two
minutes.
I
wanted
to
say
that
this
draft
is
very
important
and
it
is
a
basis
for
many
prototypes
or
trials
on
which
some
people
are
involved,
but
we
I
think
we
need
more.
Reviewing
of
this,
and
I
would
like
to
try
to
think
Weathers
who
would
like
actually
to
to
help
with
reviewing
the
document
and
give
a
external
view
of
this
or
and
help
make
improvements
of
the
drafts.
E
H
H
I
H
H
H
This
is
the
list
of
the
traffic
for
vehicle
networking
address,
IP,
address
of
the
compilation,
the
kinetic
architecture,
network,
routing
and
the
management
mobility
moment
management,
and
also
the
picture
of
network
security
and
also
standardization
activities
the
for
vehicle
networks.
Also,
this
time
we
included
the
user
cases
for
the
Pixlr
networking
next
slide.
Please
those
cases
first
category
is
for
v2i
networking,
so
you
can
see
our
navigation
system
intersection
management,
which
means
the
vicar's
passing
through
the
intersection
without
schedule
or
without
waiting
for
the
tripping
light
in
the
picture:
sub
driving
environment.
H
I
H
Time
which
lane
Coast
route,
which
direction
so
this
paper
are
explained,
the
kind
of
thing
and
emergency
network
systems,
the
first
responder
Network
Authority,
is
already
provided
in
the
United
States
for
emergency
service
so
and
also
the
next
one,
is
a
pedestrian
protection
system.
Now
these
many
people
carry
a
smartphone
looking
as
map
on
working
eating,
something
like
that.
So
we
can
protect
the
pedestrian
using
with
white
communication
next
slide,
please.
The
second
category
is
feature
low
on
networking.
H
For
me
to
be
the
first
one
is
a
driving
safety
system
such
as
we
can
say,
contacts
aware
navigator,
which
means
line
now
our
navigator
doesn't
have
any
context,
which
means
there
is
no
neighbor
thicker
neighbor
pedestrian
in
the
future.
The
vehicle
over
pedestrian
can
communicate
each
other
and
they
can
aware
of
each
other,
and
then
we
can
avoid
accident
second
categories,
automated
the
driving
systems
for
a
cooperative
adaptive
cruise
control
and
also
automated
the
truck
threatening
this.
H
Those
are
implemented
by
UC
Berkeley
test
project,
and
so
the
one
is
a
beaker
to
beaker
running
system
in
quarter.
This
is
a
french
the
service,
which
means
the
speed
limit
information.
Also,
traffic
hazard
information
shared
by
the
social
networking
over
GPRS
with
the
IP
networking
the
secondly,
the
in
the
united
states
away
the
TomTom
ride
services
can
used
for
the
community
for
the
picture
law
network
next
slide.
Please
so.
H
Actually
the
contents
of
artists
of
sabe
trapped-
I
put
the
contents
a
summary
in
the
appendix
so
audience
can
refer
to
the
detailed
information
appendix
but
aligner.
I
just
a
summary,
so
this
also,
I
present
here
last
the
ITF
meeting,
so
we
discussed
the
suitability
of
IP
thousand
six
over
wave
and
also
we
needed
to
adapt
labor
discovery,
a
protocol
for
fast
moving
the
vehicle
environment
next
slide.
H
Also
the
IP
was
a
six-link
concert
case.
Remember
the
beakers
construct
mobile
or
vehicle
other
network,
so
the
link
concept
is
different
from
traditional
legacy.
Ip
version
6
link,
so
we
needed
to
support
link
using
the
env
neighbor
discovery
proxy
over
the
Gannet
mobile
of
PQ
laredo
network
routing
and
also
to
faciliate
address
comparation.
We
can
using
table
discovery
over
tcp
next
slide.
Please
also
the
bicular
on
ethyl
case.
H
If
we
are
using
v2,
I
communication
we
consider
traffic
control
center
or
traffic
management,
the
center
being
the
trajectory
information,
because
in
the
future
many
pker
are
learning
the
navigation
system,
especially
are
the
selfie
driving
environment
case.
The
beakers
are
robot
right,
so
they
are
moving
according
to
an
aviation
system.
They
share
them
moving
trajectory,
so
we
we
can
take
all
the
banne
TZ
orbital
trajectory
information
for
which
UI
networking
such
as
a
handover,
or
something
like
that
next
slide.
H
Please,
the
next
steps
we
try
to
include
the
more
paper
and
also
use
of
cases
and
industry
activities
such
as
the
automotive
companies.
Nowadays,
GM
BMW,
there
are
Honda
Hyundai
or
they
are
working
for
the
automotive
company
for
self-driving,
also,
the
cut
to
car
European
project
consortium.
Also,
recently,
the
five
5og
automotive,
Association
European
automotive
telecom
Alliance
are
established
for
automated
on
the
driving
environment
and
also
we
can
refer
to
the
user
cases
already
developed
by
the
ETSI
European
standardization
body,
so
they
having
this
add
GTR.
H
This
number
providing
the
basic
set
of
use,
cases
that
we
can
be
put
to
them
and
also
we
can
include
the
taxonomy
table
summarize
each
technical
on
the
toffee,
so
each
technical
section
will
have
a
taxonomy
table
categorize
the
technology
according
to
protocols
and
schemes
for
the
easiness.
For
the
audience,
our
plan
is
according
to
the
milestone,
our
working
group.
We
try
to
work
in
coral
last
call
recast
max
the
Singapore
meeting.
So
please
review
our
draft
and
they
give
me
a
your
Peter
back.
Welcome
your
comments.
Thank
you.
H
I
A
H
F
J
H
J
J
H
Think
this
a
problem
statement
is
very
important
document
for
our
working
guru,
because,
according
to
this
statement,
our
next
step
will
be
decided.
So,
okay
next
slide,
please.
This
is
a
problem
statement
so
recently
our
this
dropped.
What
up
today,
as
working
with
dropped
from
the
merging
at
the
Alex,
the
with
you
we
to
be
tracked
and
my
twittle
I
are
trapped
next
right.
H
The
objective
of
this
document
is
to
specify
the
problem
statement
for
the
IP
version:
6
based
RP,
2,
I
and
P
2
P,
not
talking
so
the
assumptions
are
similar
to
previous
the
survey.
The
pocos
of
this
document
is,
and
now
we
focus
on
networking
issue
in
one
of
I
P
communications,
not
multi
hub.
However
internetworking
between
internal
network
of
cars
over
RS,
you
are
considered
next
slide.
This
figure
shows
a
future
network
operation,
so
we
have
the
beakers
and
the
beaker
can
talk
to
Archie
Eugene
with
y1
of
IP
communication.
H
Also
pker
can
talk
to
Eugene
P
to
be
one
of
communication,
and
also
the
are
you
connected
to
the
Internet
or
so.
Traffic
control
center
is
for
the
central
load
or
Manatee
the
vehicle
information.
Such
as
the
rock
a
trajectory
next
slide,
please
so
this
next
right
speakers
are
shows
the
each
beaker
or
beaker
and
rotor
side
unit
has
its
own
network.
H
Remember
nowadays,
BMW
manufacturer
automotive,
but
they
try
to
do
place
again.
That
will
read
the
Ethernet,
which
means
the
internal
vehicle
data
will
be
replaced.
Isn't
it
so
we
can
have
a
multi
subnet
environment,
so
this
one
is
a
edge
router,
so
it
allowed
to
providing
external.
So
this
link
will
be
the
OSHA
B
mode,
mainly
probably
other
link
can
be
used,
so
they
can
talk
to
each
other.
First,
remember
the
pker
passing
through
intersection
overload
or
segment.
So
the
speed
is
very
important
sort
of
setup.
This
the
linker,
should
be
fast
next
slide.
H
The
second
layer
are
this:
one
is
a
peeker
two
beaker
communications,
so
the
beaker
Picard
communication
case
we
can
consider
one
scenario
is
the
host
2.
We
can
say
this
is
some
navigator
out
this
also
navigator,
so
they
try
to
exchange
information
contacts,
so
it
provided
some
context,
aware
navigation
system
avoid
accident,
also
the
beaker
to
maybe
the
pedestrian,
so
they
can
exchange
information.
Picker
driver
like
denied
pedestrian
existence
and
then
avoid
accident
next
slide
please.
So
the
issues
are
for
the
IP
version.
H
6
tequila
talking
first
one
either
addressing
issue
so
the
breed
2i
case.
We
can
consider
the
publishable
addressing
local
global
the
local
case.
We
can
consider
the
dedicated
locker
isolated,
addressing
can
be
used
otherwise
to
provide
some
Internet
services.
We
needed
to
consider
global
IP,
so
also
the
policy
for
global
IP
case.
We
can
consider
some
scenario
to
which
means
the
multiple
arrests,
new
cars
for
the
multi-link,
a
subnet,
which
means
that
they
can
construct
extended
a
subnet
now.
Secondly,
the
poor
RCU
they
provide
the
individual
subnet.
H
Secondly,
this
one
is
a
debatably
addressing
issue,
so
we
to
be
case
address
comparation,
can
pre-configured
or
dynamically
configured.
Ok,
using
the
neighboring
discovery
or
@hp
some
some
picker
or
perform
the
song
master,
teaches
piece
over
something
like
they
allocate
the.
Secondly,
communication
path,
setup
problem,
so
the
question
is
how
to
establish
IP
communication
paths
between
the
computer.
You
know
one
beaker
remember
the
beaker
has
internal
network.
Ok,
second,
one
is
the
discovery
of
exchanging
arm
sort
of
problem,
which
means
that
thought
discover.
H
Absorber
problem
means
the
edge
router
should
recognize
piccoli
neighbor
and
secondly,
the
prefix
exchanges
should
be
done
to
communicate
each
other
next
slide,
please
so
the
adaptation
of
auditory
some
okay
gentleman
mentioned
we
can
refer
to
a
6-row,
maybe,
and
secondly,
the
address
of
the
computation.
So
we
need
to
consider
for
adapted
the
version
for
pickle
network
next
slide.
Please
they
make
our
service
so
recently,
the
sixth
man
or
six
upstate.
This
cost
a
lot
about
naming
a
host
name,
DNS
comparation,
so
paste
our
a
over
the
teachers
be
something
like
that.
H
So
looks
like
many
people
prefer
to
the
simple
implementation.
As
long
as
I
understand,
I
think
re
based
is
the
simple
approach
and,
secondly,
the
DNS
name
of
the
compression.
So
this
is
related
to
the
soviet
discovery.
So
remember,
the
one
beaker
has
many
equipment
issue
or
some
other
achievement
within
vehicle.
So
in
that
case,
when
you
configure
for
the
weaker
equipment,
especially
domain
name-
is
a
very
hazard
over
discomfort
right.
H
So
we
try
to
provide
you
a
comparison
approach,
okay,
so
the
first
approach
is
the
TNS,
and
this
is
my
the
individual
draft
and
second
one
is
the
multicast
dns,
okay,
the
they
providing
the
computer
auto
configure
approach,
also
using
the
energy
dynamic
date.
We
can
register
the
DNS
name
to
the
authoritative
of
the
DNS
server
next
slide.
Please
the
mobility
support
for
with
UI,
so
we
can
think
of
the
DMM
approach
or
tradition,
mobile,
IP
or
proxy
mobile
ipv6
over
the
team.
Based
so
also,
we
can
consider
the
high
speed
the
Vickers.
H
So
in
the
past
the
mobile
IP
case
he
attorney
Park
is
he
is
the
expert
he's
an
inventor
of
them
all
right
here
right?
So
probably
he
can
provide
some
good
direction
for
these
issues
next
slide
for
the
next
slide
and
that
service
discovery
case
I
mentioned
the
beaker
learning
some
cooperative
that
typical
cruise
control
or
so
context,
aware
navigation
system,
something
like
that
in
decades,
that
kind
of
service
should
be
exchanged.
So
we
we
need
to
think
about
how
to
provide
efficient,
a
service
discovery.
H
H
So
this
one
day
my
ok
proposals
of
the
services
are
registered
into
internal
some
database,
such
as
the
DNS
server,
authoritative,
DNS,
server
within
picker,
and
then
that
information
later
all
ties
to
neighbor
Picard
next
slide,
and
then
they
can
change
the
message
next
slide.
Please,
so
you
can
see
let
reference
I.
This
is
a
bigger.
This
beaker
they
exchanged
the
service
information
using
the
the
picture
extending
the
neighbor
discovery
message.
The
idea
is
a
neighbor
discovery.
H
Message
have
been
prefix
information
within
internal
network
and
also
service
from
the
authoritative
rocker
DNS
server
they
encapsulated
by
the
neighbor
discovery
message:
they
can
quickly
recognize
neighborhood,
so
appendix
I
explained
in
detail.
You
can
dove
deeper
to
the
appendix
next
slide.
Please
so.
Security
is
very
important,
authentication
and
access
a
controller,
so
I
think
of
the
three
and
I
discussed
about
this
one.
So
the
bigger
case
we
first
over,
we
need
to
trust
each
other,
such
as
location,
driving,
speed.
Something
like
that.
H
So
the
question
is
how
to
provide
the
fast
or
a
reliable,
some
authentication
method
for
pick
your
network
next
slide.
Please,
and
also
we
can
are
using
periodic
change
of
MAC,
address
and
IP
address
and
try
to
prevent
the
tracking
of
the
vicar.
So
we
can
consider
privacy
or
sport
next
slide.
Please
also:
okay,
yeah,
three
shrinking.
H
E
Well,
there
are
many
IP
messages
that
include
MAC
addresses,
especially
in
a
bursary
station
where
the
advertisement
routers
or
station
or
other
person,
and
they
are
really
over
the
air
between
two
cars
or
between
a
car
in
the
roadside
unit.
So
basically,
anybody
along
the
road
with
a
laptop
could
just
listen
and
hear
all
these
IP
packets
and
all
these
MAC.
L
M
H
L
K
I
H
I
M
1609
that
rotating
MAC
addresses
doesn't
really
solve
privacy.
Okay,
so
I
would
question
why
we
believe
rotating
IP
MAC
addresses
may
provide
privacy,
but
to
the
question
of
the
messaging.
That's
here
I
think
we
need
to
be
very
careful
and
saying
head
unit
right,
because
that
has
connotation
so
I
think
from
my
purposes
in
this
group.
We
should
think
about
it
as
a
car
conversing
with
another
car
and
not
speak
of
it
in
terms
of.
Is
it
a
head
unit?
M
Is
it
a
because
architectural
II
that
head
unit
may
be
instantiated
differently
in
one
type
of
car
versus
another
yeah
and
then
to
the
comment
of
the
users
I'm
sure
how
a
human
user
would
come
into
play
again
from
the
conversations
of
what
we're
referring
to
here
being
a
vehicle
to
another
vehicle
or
a
vehicle
to
an
infrastructure,
those
aren't
human
I.
Think
of
them
as
a
car.
B
I
Nancy
suresh
krisshnan.
So
are
you
saying
this
is
not
needed
or
like
I'm
trying
to
understand
like
what
are
you
going
for,
like
so
I
think
the
point
like
okay,
adding
the
rest,
this
point
right,
like
so
there's
a
human
associated
with
the
car
who
can
be
tracked
by
the
car.
So
that's.
Why
I
like
it's
important
in
this
case
right?
I
So
it's
not
the
tracking
of
the
car
itself,
you're
worried
per
se,
but
like
a
human
associated
with
the
car
right,
you
can
make
a
connection
between
a
human
and
a
car
at
some
point
and
then
caught
on
something
else
at
that
point.
So
this
this
thing
will
like
break
that
link.
That
was
the
idea,
so
so.
M
N
M
O
H
H
O
O
H
O
But
identification
is
a
really
important
issue.
I
mean
how
can
you
make
sure
that
it's
yeah
I
mean
especially
if
someone
is
messing
with
the
can
Network
I
mean
by
often
it's
assumed
that
if
they
can
network
I
mean
very
often
it
the
OEM
say?
Okay,
if
someone
has
access
to
the
can
network,
everything
is
over
anyway,
because.
H
So
line
now
automotive
or
the
company
they
consider
the
ECM
controlled
at
work
should
be
pre
a
kind
of
a
blocked
outside
because
they
prevented
the
accident,
so
probably
entertainment
or
some
navigation
case
it
not
closely
related
to
them.
We
connect
some
movements,
so
probably
we
can
focus
on
that.
I
think,
okay
or
the
try
being
case,
probably
very
important.
The
dangerous
I
think
right.
So
so,
because
Academical.
H
E
E
N
I
think
you
shoot,
we
shouldn't
worry
about
tracking
MAC
addresses
the
relatively
opaque
addresses
and
you
can't
associate
with
them
human,
because
there's
too
many
humans
driving
the
car
does
that
example:
I
think
what
we
should
worry
about
is
das,
attacking
the
MAC
address
and
what
the
roadside
units
are
doing
to
keep
the
channel
open.
A
communication
channel
open
to
the
MAC
addresses
so
can
do
real
things.
Okay,.
P
H
H
Please
so
next
step
is
we
try
to
improve
our
content
or
with
the
melanie's
discussion
and
also
try
to
take
a
more
texture
on
the
the
Alex
draft
for
p2p,
and
also
we
needed
to
synchronize
with
the
other
standardization
document
such
as,
for
example,
the
Alex,
the
OCB
and
the
ISIL
and
efficacy,
the
FHWA
K,
for
example.
Rs,
you
see
the
definition
are
different,
so
we
needed
to
clarify
which
definition
is
for
our
working
group
and
also
we
work
or
welcome
to
your
comment
and
then
we
moving
forward.
Thank
you.
Okay.
Any
questions
comments.
A
Yes,
I
have
a
couple
of
questions.
One
is
on
this
document
supposed
to
be
a
problem
statement,
but
from
a
quick
look,
there
are
some
section
that
are
seems
to
me
more
like
a
survey
kind
of
thing
like
IP
mobility.
This
can
be
solved
with
this
this
and
this,
so
is
there
any
problem
to
solve,
because
if
not
maybe
I
mean
shouldn't
be
a
section
on
the
problem
statement.
Okay,.
I
A
I
mean
one
example
not
take
IP
mobility,
but
so
I
think
that
we
need
to
take
care
of
or
take
a
look
at
that
and
I
recommend
have.
Is
that
I
think
that
the
sections
are
maybe
mean
we
are
trying
to
cover
many
things,
but
the
level
of
detail
we
are
covering
those
to
me
seem
not
to
be
in
knots
because,
for
example,
one
critical
part
is
the
authentication,
the
privacy
and
security.
A
This
is
one
of
the
key
content
that
is
supposed
to
be
in
this
document
and
it's
just
half
a
page
of
the
whole
thing,
and
we
have
got
a
lot
of
discussion
on
this.
So
I
think
that
deserves
more
attention,
specifically
with
that,
and
I
think
we
need
to
work
into
more
into
that
into
that
specific
specification.