ISO IEC 16317:2011 pdf – lnformation technology – Telecommunications and information exchange between systems -proxZzzy for sleeping hosts.
ARP Is important to the proxy because In order for other entities to be able to send an lPv4 packet to a proxy. they must be able to translate the IP address to the corresponding MAC address. The proxy responds to ARP requests for its MAC address(s) to maintain IPv4 connectivity on the IPv4 network.
ARP is an unreliable network protocol and other endpoints on the network do not assume that every ARt’ request arrives at the destination. Therefore, the short delay (2-10 seconds) on transitions to and from proxy operation should not affect the behaviour of the other endpoints on the network
5.5.2 Link Local Auto-IP Address Allocation
Link-Local Auto-lP Address allocation uses ARt’ to allocate an lPv4 address In the absence of a DHCP server
(or other allocation methods). A proxy defends a Lwik-Local Auto-IP Addre5s using algorithms listed in RFC
5227 (except where a new address is required: at that pornt the proxy must stop Supporting the interface and
optionally wake the host).
5.5.3 lPv4 Address Conflict Detection
Duplicate address detection (RFC 5227) is requwed to keep the proxy from using an address thai is in use by
another node on the network,
5.5.4 IGMP — Internet Group Management Protocol
IGMP (RFC 1112 IGMP version 1, RFC 2236 IGMP version 2. RFC 3376 IGMP version 3) allows network interfaces to participate m multicast groups (these are controlled by the router).
5.5.5 UDP — User Datagram Protocol
A proxy that supports UDP may wake the host on receiving specific UDP datagrams or may respond directly
to the datagram.
5.5.6 TCP — Transmission Control Protocol
TCP (RFC 793) provides a stateful and reliable transport layer connection between network endpoints, The proxy may handle accepting connections, originating connections, and waking the host on a connection attempt (TCP SYN) or incoming data.
5.5.7 DNS – Domain Name System
The proxy may need to issue DNS Queries liii provides UDP or TCP connectivity and allows the host to specify Internet compatible host names for the remote endpoint and not direct lPv4 addresses. This International Standard addresses the DNS Client only.
5.6 Internet Protocol v6 BasIc Framework (lPv6)
Network presence for IPv6 is maintained by the proxy when the host is asleep by implementing the Neighbor Solicitation function of Neighbor Discovery The proxy uses lPv global addresses, link local addresses, and temporary addresses. Address auto-configuration is handled by the host. ND – Neighbor Discovery.
Neighbor Discovery is a set of five message types implemented on ICMPv6 (RFC 4861), of wilictl the proxy uses four for resolving lPv6 addresses to the MAC address: Router Solicitation, Router Advertisement. Neighbor Solicitation and Neighbor Advertisement.
The proxy should support multiple address sets. Typically, there are three sets in an lPv6 network: the global address, the local address, and possibly a temporary address.
5.6.1 MID — Mutticast Listener Discovery
MID (RFC 2710) allows endpowit nodes to report their membeship in IPv6 multicast groups. MID is updated for source.address selection by RFC 3590 and for source.specific multicast by RFC 3810.
A prnxy maintains a table of lPv6 multicast addresses to wti.ch the host is subscribed, and the poxy maintains its membership in each mulbcast group by responding to MID Query messages with MLD Report messages. The proxy need not send unsolicited MID Report or MLD Done messages. Because the host is not a multicasi router, the proxy does not send MID Query messages or process MID Report or MID Done messages.
5.7 Remote Access using SIP and IPv4
In this International Standard, SIP (RFC 3261) is used by a remote entity to wake a host. SIP proxies along the path can facilitate the traversal of NATe and firewalls. The reason for waking the host (i.e., the particular host application that needs to be used) is outside the scope of this International Standard. SIP methods and responses used In the remote wake functionality are REGISTER. INVITE. ACK, and SIP Status Codes.
The following diagram shows a sample SIP implementation that may be used by the proxy to wake the host. Only the messages into and out of the Device Network Proxy are induded in this specification. All other messages and entities are a possible implementation and not covered by this specification.