
From dromasca@avaya.com  Tue Oct 19 09:17:47 2010
Return-Path: <dromasca@avaya.com>
X-Original-To: smartpowerdir@core3.amsl.com
Delivered-To: smartpowerdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0FC0E3A689C for <smartpowerdir@core3.amsl.com>; Tue, 19 Oct 2010 09:17:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.528
X-Spam-Level: 
X-Spam-Status: No, score=-102.528 tagged_above=-999 required=5 tests=[AWL=0.071, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id g9BtJS0PySRF for <smartpowerdir@core3.amsl.com>; Tue, 19 Oct 2010 09:17:46 -0700 (PDT)
Received: from p-us1-iereast-outbound-tmp.us1.avaya.com (p-us1-iereast-outbound-tmp.us1.avaya.com [135.11.29.16]) by core3.amsl.com (Postfix) with ESMTP id 0952D3A682C for <smartpowerdir@ietf.org>; Tue, 19 Oct 2010 09:17:45 -0700 (PDT)
X-IronPort-AV: E=Sophos;i="4.57,351,1283745600"; d="scan'208";a="39703830"
Received: from unknown (HELO co300216-co-erhwest.avaya.com) ([198.152.7.5]) by p-us1-iereast-outbound-tmp.us1.avaya.com with ESMTP; 19 Oct 2010 12:19:16 -0400
X-IronPort-AV: E=Sophos;i="4.57,351,1283745600"; d="scan'208";a="527925470"
Received: from unknown (HELO 307622ANEX5.global.avaya.com) ([135.64.140.12]) by co300216-co-erhwest-out.avaya.com with ESMTP; 19 Oct 2010 12:19:16 -0400
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
Date: Tue, 19 Oct 2010 18:19:07 +0200
Message-ID: <EDC652A26FB23C4EB6384A4584434A040260FD70@307622ANEX5.global.avaya.com>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: Meeting in Beijing? 
Thread-Index: ActvqVr9ceY7Ni0RSjOcLdSMUkoLUw==
From: "Romascanu, Dan (Dan)" <dromasca@avaya.com>
To: "IETF SmartPower Directorate" <smartpowerdir@ietf.org>
Subject: [smartpowerdir] Meeting in Beijing?
X-BeenThere: smartpowerdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Members of the Smart Power Directorate <smartpowerdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/smartpowerdir>, <mailto:smartpowerdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/smartpowerdir>
List-Post: <mailto:smartpowerdir@ietf.org>
List-Help: <mailto:smartpowerdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/smartpowerdir>, <mailto:smartpowerdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 19 Oct 2010 16:17:47 -0000

Are we planning for a meeting of smartpowerdir in Beijing? My meeting
slots fade out quickly, but I still have Thursday breakfast free if we
decide to meet at the same time as in Maastricht.=20

Dan

From jari.arkko@piuha.net  Wed Oct 20 10:42:12 2010
Return-Path: <jari.arkko@piuha.net>
X-Original-To: smartpowerdir@core3.amsl.com
Delivered-To: smartpowerdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 814E33A68C8 for <smartpowerdir@core3.amsl.com>; Wed, 20 Oct 2010 10:42:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.45
X-Spam-Level: 
X-Spam-Status: No, score=-102.45 tagged_above=-999 required=5 tests=[AWL=0.149, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vZxj4F-9k9fX for <smartpowerdir@core3.amsl.com>; Wed, 20 Oct 2010 10:42:11 -0700 (PDT)
Received: from p130.piuha.net (p130.piuha.net [IPv6:2001:14b8:400::130]) by core3.amsl.com (Postfix) with ESMTP id 58C573A689C for <smartpowerdir@ietf.org>; Wed, 20 Oct 2010 10:42:11 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by p130.piuha.net (Postfix) with ESMTP id 58EEA2CC32; Wed, 20 Oct 2010 20:43:44 +0300 (EEST)
X-Virus-Scanned: amavisd-new at piuha.net
Received: from p130.piuha.net ([127.0.0.1]) by localhost (p130.piuha.net [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4oigr6NJ+TAQ; Wed, 20 Oct 2010 20:43:44 +0300 (EEST)
Received: from [IPv6:::1] (unknown [IPv6:2001:14b8:400::130]) by p130.piuha.net (Postfix) with ESMTP id DF5D52CC2F; Wed, 20 Oct 2010 20:43:43 +0300 (EEST)
Message-ID: <4CBF2A4F.1030109@piuha.net>
Date: Wed, 20 Oct 2010 20:43:43 +0300
From: Jari Arkko <jari.arkko@piuha.net>
User-Agent: Thunderbird 2.0.0.24 (X11/20100411)
MIME-Version: 1.0
To: "Romascanu, Dan (Dan)" <dromasca@avaya.com>
References: <EDC652A26FB23C4EB6384A4584434A040260FD70@307622ANEX5.global.avaya.com>
In-Reply-To: <EDC652A26FB23C4EB6384A4584434A040260FD70@307622ANEX5.global.avaya.com>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Cc: IETF SmartPower Directorate <smartpowerdir@ietf.org>
Subject: Re: [smartpowerdir] Meeting in Beijing?
X-BeenThere: smartpowerdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Members of the Smart Power Directorate <smartpowerdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/smartpowerdir>, <mailto:smartpowerdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/smartpowerdir>
List-Post: <mailto:smartpowerdir@ietf.org>
List-Help: <mailto:smartpowerdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/smartpowerdir>, <mailto:smartpowerdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Oct 2010 17:42:12 -0000

That would be a good time for me as well.

I would like to have a meeting.

Jari

Romascanu, Dan (Dan) kirjoitti:
> Are we planning for a meeting of smartpowerdir in Beijing? My meeting
> slots fade out quickly, but I still have Thursday breakfast free if we
> decide to meet at the same time as in Maastricht. 
>
> Dan
>
>   


From ted.ietf@gmail.com  Wed Oct 20 11:33:52 2010
Return-Path: <ted.ietf@gmail.com>
X-Original-To: smartpowerdir@core3.amsl.com
Delivered-To: smartpowerdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 4B0033A680D for <smartpowerdir@core3.amsl.com>; Wed, 20 Oct 2010 11:33:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.181
X-Spam-Level: 
X-Spam-Status: No, score=-2.181 tagged_above=-999 required=5 tests=[AWL=0.418,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QBUuUnCVh0Sj for <smartpowerdir@core3.amsl.com>; Wed, 20 Oct 2010 11:33:50 -0700 (PDT)
Received: from mail-qw0-f44.google.com (mail-qw0-f44.google.com [209.85.216.44]) by core3.amsl.com (Postfix) with ESMTP id 155423A6802 for <smartpowerdir@ietf.org>; Wed, 20 Oct 2010 11:33:47 -0700 (PDT)
Received: by qwc9 with SMTP id 9so2704146qwc.31 for <smartpowerdir@ietf.org>; Wed, 20 Oct 2010 11:35:21 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:received:in-reply-to :references:date:message-id:subject:from:to:cc:content-type; bh=dSTEaG8Ym5qE5/75v0P0Tnl/tfBzuCzd4L53p1ORfho=; b=SR9VKMKTlcWbsC93lEFQCM4KB4nqb24dZgJCg80jx0tiC4fAVffaHdFtkBQi6uStYn Lt8ZVyvMwsPQzQyQT0F1l7aWvDQRPH9+NTi/TJ2wKlOLAdBoQPmqmzFkoIBFfy2N+MlO W23Ph54h6qLwXT/3dPoLQcCVbWbPRWMDk1kpM=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; b=kvT2s1AMc2KDe42Pyw3geoEhxzA52hLzvnEO1Xp7YQ0N/WoVCHgcjNKXGTJ/+UcO1Q Hec+TEWGfiVKYTRvVbxOFUnhA6HnsKIyuvI3hSNVwmUyMoJTHlN469DRaZyctK+MD83T Cbf8mXmxr0TpdovsbjSqOnxzulkxW9kVVHpyk=
MIME-Version: 1.0
Received: by 10.229.182.205 with SMTP id cd13mr6813078qcb.30.1287599721290; Wed, 20 Oct 2010 11:35:21 -0700 (PDT)
Received: by 10.229.213.69 with HTTP; Wed, 20 Oct 2010 11:35:20 -0700 (PDT)
In-Reply-To: <4CBF2A4F.1030109@piuha.net>
References: <EDC652A26FB23C4EB6384A4584434A040260FD70@307622ANEX5.global.avaya.com> <4CBF2A4F.1030109@piuha.net>
Date: Wed, 20 Oct 2010 11:35:20 -0700
Message-ID: <AANLkTimdg0OKtNNp-aedo3hDcBo6=mMXoHB54iqw1yMN@mail.gmail.com>
From: Ted Hardie <ted.ietf@gmail.com>
To: Jari Arkko <jari.arkko@piuha.net>
Content-Type: text/plain; charset=ISO-8859-1
Cc: IETF SmartPower Directorate <smartpowerdir@ietf.org>
Subject: Re: [smartpowerdir] Meeting in Beijing?
X-BeenThere: smartpowerdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Members of the Smart Power Directorate <smartpowerdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/smartpowerdir>, <mailto:smartpowerdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/smartpowerdir>
List-Post: <mailto:smartpowerdir@ietf.org>
List-Help: <mailto:smartpowerdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/smartpowerdir>, <mailto:smartpowerdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Oct 2010 18:33:52 -0000

I am available at this time, and I'll hold it for this
until any further word comes in.

Ted

On Wed, Oct 20, 2010 at 10:43 AM, Jari Arkko <jari.arkko@piuha.net> wrote:
> That would be a good time for me as well.
>
> I would like to have a meeting.
>
> Jari
>
> Romascanu, Dan (Dan) kirjoitti:
>>
>> Are we planning for a meeting of smartpowerdir in Beijing? My meeting
>> slots fade out quickly, but I still have Thursday breakfast free if we
>> decide to meet at the same time as in Maastricht.
>> Dan
>>
>>
>
>

From zach@sensinode.com  Wed Oct 20 12:41:45 2010
Return-Path: <zach@sensinode.com>
X-Original-To: smartpowerdir@core3.amsl.com
Delivered-To: smartpowerdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 456FB3A6838 for <smartpowerdir@core3.amsl.com>; Wed, 20 Oct 2010 12:41:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.507
X-Spam-Level: 
X-Spam-Status: No, score=-3.507 tagged_above=-999 required=5 tests=[AWL=0.092,  BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iZYz8rhP3+ax for <smartpowerdir@core3.amsl.com>; Wed, 20 Oct 2010 12:41:42 -0700 (PDT)
Received: from auth-smtp.nebula.fi (auth-smtp.nebula.fi [217.30.180.105]) by core3.amsl.com (Postfix) with ESMTP id D36D33A68B1 for <smartpowerdir@ietf.org>; Wed, 20 Oct 2010 12:41:38 -0700 (PDT)
Received: from [192.168.1.3] (line-6222.dyn.kponet.fi [85.29.70.165]) (authenticated bits=0) by auth-smtp.nebula.fi (8.13.4/8.13.4) with ESMTP id o9KJh6mx030499 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Wed, 20 Oct 2010 22:43:06 +0300
Mime-Version: 1.0 (Apple Message framework v1081)
Content-Type: multipart/signed; boundary=Apple-Mail-84-58942633; protocol="application/pkcs7-signature"; micalg=sha1
From: Zach Shelby <zach@sensinode.com>
In-Reply-To: <AANLkTimdg0OKtNNp-aedo3hDcBo6=mMXoHB54iqw1yMN@mail.gmail.com>
Date: Wed, 20 Oct 2010 22:43:07 +0300
Message-Id: <1F7C6415-9D86-4DD6-AFD0-63796509EE61@sensinode.com>
References: <EDC652A26FB23C4EB6384A4584434A040260FD70@307622ANEX5.global.avaya.com> <4CBF2A4F.1030109@piuha.net> <AANLkTimdg0OKtNNp-aedo3hDcBo6=mMXoHB54iqw1yMN@mail.gmail.com>
To: Ted Hardie <ted.ietf@gmail.com>
X-Mailer: Apple Mail (2.1081)
Cc: IETF SmartPower Directorate <smartpowerdir@ietf.org>
Subject: Re: [smartpowerdir] Meeting in Beijing?
X-BeenThere: smartpowerdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Members of the Smart Power Directorate <smartpowerdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/smartpowerdir>, <mailto:smartpowerdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/smartpowerdir>
List-Post: <mailto:smartpowerdir@ietf.org>
List-Help: <mailto:smartpowerdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/smartpowerdir>, <mailto:smartpowerdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Oct 2010 19:41:45 -0000

--Apple-Mail-84-58942633
Content-Transfer-Encoding: 7bit
Content-Type: text/plain;
	charset=us-ascii

Thursday morning works for me as well. 

Zach

On Oct 20, 2010, at 9:35 PM, Ted Hardie wrote:

> I am available at this time, and I'll hold it for this
> until any further word comes in.
> 
> Ted
> 
> On Wed, Oct 20, 2010 at 10:43 AM, Jari Arkko <jari.arkko@piuha.net> wrote:
>> That would be a good time for me as well.
>> 
>> I would like to have a meeting.
>> 
>> Jari
>> 
>> Romascanu, Dan (Dan) kirjoitti:
>>> 
>>> Are we planning for a meeting of smartpowerdir in Beijing? My meeting
>>> slots fade out quickly, but I still have Thursday breakfast free if we
>>> decide to meet at the same time as in Maastricht.
>>> Dan
>>> 
>>> 
>> 
>> 

-- 
Zach Shelby, Chief Nerd, Sensinode Ltd.
http://zachshelby.org  - My blog "On the Internet of Things"
http://6lowpan.net - My book "6LoWPAN: The Wireless Embedded Internet"
Mobile: +358 40 7796297


--Apple-Mail-84-58942633
Content-Disposition: attachment;
	filename=smime.p7s
Content-Type: application/pkcs7-signature;
	name=smime.p7s
Content-Transfer-Encoding: base64
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=

--Apple-Mail-84-58942633--

From rdroms.ietf@gmail.com  Wed Oct 20 15:35:59 2010
Return-Path: <rdroms.ietf@gmail.com>
X-Original-To: smartpowerdir@core3.amsl.com
Delivered-To: smartpowerdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 321643A6990 for <smartpowerdir@core3.amsl.com>; Wed, 20 Oct 2010 15:35:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.577
X-Spam-Level: 
X-Spam-Status: No, score=-102.577 tagged_above=-999 required=5 tests=[AWL=0.022, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FzixHwZMnX3q for <smartpowerdir@core3.amsl.com>; Wed, 20 Oct 2010 15:35:54 -0700 (PDT)
Received: from mail-qw0-f44.google.com (mail-qw0-f44.google.com [209.85.216.44]) by core3.amsl.com (Postfix) with ESMTP id 78D503A69FF for <smartpowerdir@ietf.org>; Wed, 20 Oct 2010 15:34:51 -0700 (PDT)
Received: by qwc9 with SMTP id 9so2963092qwc.31 for <smartpowerdir@ietf.org>; Wed, 20 Oct 2010 15:36:22 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:subject:mime-version :content-type:from:in-reply-to:date:cc:content-transfer-encoding :message-id:references:to:x-mailer; bh=Qp+UtqecICGBV7zQY9YrbMSR2i/YJAVjW9pgxFt2GBg=; b=Uga2zFHKPNhE4fekW0U7fINlojv1OrlK3lNywUjPZ5FC0cpoZw3dN8Y9CrqdSyLLGx /JPMahXr2iIjOM5TVio4N0wRiiq6qhlhNl7ARM1LDQoNdQvzomG9u569slvBzAPHJXoU gRPOnZClGo0ZmzsbFAJTt8ABXPZvtPOpuiwZY=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=subject:mime-version:content-type:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to:x-mailer; b=Vii8PERcQlmFrk50T2jdO+8YLL5yFUgyddpHtTwlM8DgP+UsGASmR5xkuI/7IWNgFk pYDYZhZ1BbqSv/cxuSoyekQe1SfP1+Y2rsIzOa3/8UfzdkN+gWmfFEsVIRCtfj5CJ30I EVwVrFqP8gNXvBEU89xnhcSkReiD1IPwgusWk=
Received: by 10.229.185.137 with SMTP id co9mr6947527qcb.189.1287614181619; Wed, 20 Oct 2010 15:36:21 -0700 (PDT)
Received: from bxb-rdroms-8712.cisco.com (198-135-0-233.cisco.com [198.135.0.233]) by mx.google.com with ESMTPS id m7sm661582qck.37.2010.10.20.15.36.19 (version=TLSv1/SSLv3 cipher=RC4-MD5); Wed, 20 Oct 2010 15:36:20 -0700 (PDT)
Mime-Version: 1.0 (Apple Message framework v1081)
Content-Type: text/plain; charset=us-ascii
From: Ralph Droms <rdroms.ietf@gmail.com>
In-Reply-To: <4CBF2A4F.1030109@piuha.net>
Date: Wed, 20 Oct 2010 18:36:17 -0400
Content-Transfer-Encoding: 7bit
Message-Id: <6AA76962-7777-424A-95AA-4A4D4F2312F6@gmail.com>
References: <EDC652A26FB23C4EB6384A4584434A040260FD70@307622ANEX5.global.avaya.com> <4CBF2A4F.1030109@piuha.net>
To: Dan Romascanu <dromasca@avaya.com>
X-Mailer: Apple Mail (2.1081)
Cc: IETF SmartPower Directorate <smartpowerdir@ietf.org>
Subject: Re: [smartpowerdir] Meeting in Beijing?
X-BeenThere: smartpowerdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Members of the Smart Power Directorate <smartpowerdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/smartpowerdir>, <mailto:smartpowerdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/smartpowerdir>
List-Post: <mailto:smartpowerdir@ietf.org>
List-Help: <mailto:smartpowerdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/smartpowerdir>, <mailto:smartpowerdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Oct 2010 22:35:59 -0000

I'm available Thu AM and will keep the slot open.

- Ralph

On Oct 20, 2010, at 1:43 PM 10/20/10, Jari Arkko wrote:

> That would be a good time for me as well.
> 
> I would like to have a meeting.
> 
> Jari
> 
> Romascanu, Dan (Dan) kirjoitti:
>> Are we planning for a meeting of smartpowerdir in Beijing? My meeting
>> slots fade out quickly, but I still have Thursday breakfast free if we
>> decide to meet at the same time as in Maastricht. 
>> Dan
>> 
>>  
> 


From vint@google.com  Wed Oct 20 16:33:59 2010
Return-Path: <vint@google.com>
X-Original-To: smartpowerdir@core3.amsl.com
Delivered-To: smartpowerdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E1F6E3A6900 for <smartpowerdir@core3.amsl.com>; Wed, 20 Oct 2010 16:33:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -105.977
X-Spam-Level: 
X-Spam-Status: No, score=-105.977 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id p6XII+5qAhO6 for <smartpowerdir@core3.amsl.com>; Wed, 20 Oct 2010 16:33:58 -0700 (PDT)
Received: from smtp-out.google.com (smtp-out.google.com [74.125.121.35]) by core3.amsl.com (Postfix) with ESMTP id 4C45F3A6875 for <smartpowerdir@ietf.org>; Wed, 20 Oct 2010 16:33:58 -0700 (PDT)
Received: from hpaq5.eem.corp.google.com (hpaq5.eem.corp.google.com [172.25.149.5]) by smtp-out.google.com with ESMTP id o9KNZVxG016831 for <smartpowerdir@ietf.org>; Wed, 20 Oct 2010 16:35:31 -0700
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=google.com; s=beta; t=1287617731; bh=sxWCsokdONO7tYOXet3vZrMKHFI=; h=MIME-Version:In-Reply-To:References:Date:Message-ID:Subject:From: To:Cc:Content-Type; b=lTPTCblTKxvwqrFafWvjq6LvlF1hhLpo2PpiYfUimX2ta3KDxFvVQtl7MtktS/Djd E4Z7UWlAMTcIrvPkTGfsw==
Received: from gwaa20 (gwaa20.prod.google.com [10.200.27.20]) by hpaq5.eem.corp.google.com with ESMTP id o9KNZUaG016019 for <smartpowerdir@ietf.org>; Wed, 20 Oct 2010 16:35:30 -0700
Received: by gwaa20 with SMTP id a20so2556784gwa.10 for <smartpowerdir@ietf.org>; Wed, 20 Oct 2010 16:35:30 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=beta; h=domainkey-signature:mime-version:received:received:in-reply-to :references:date:message-id:subject:from:to:cc:content-type; bh=u8q1IQjp+FxVub0DEjw71zEd97W4mhm+5pmgvznrsZo=; b=HEWD7EnlNfQFEsbLOQdTodMaznZHKa3OgKUNlLN2eqJvBGx3JIXGfwgL0kZ9zByJ3X Xz61fJlVtx0e5y5xpW0w==
DomainKey-Signature: a=rsa-sha1; c=nofws; d=google.com; s=beta; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; b=tskF2mF5lDuEiT6oND+ut9h3/laGadzmWbJ4sISnNYDAXOP9IdJAOWDfGEHx1mZ6eo zdie1yhVzkVBg5vURKvw==
MIME-Version: 1.0
Received: by 10.150.99.3 with SMTP id w3mr2313276ybb.97.1287617729772; Wed, 20 Oct 2010 16:35:29 -0700 (PDT)
Received: by 10.150.133.9 with HTTP; Wed, 20 Oct 2010 16:35:29 -0700 (PDT)
In-Reply-To: <6AA76962-7777-424A-95AA-4A4D4F2312F6@gmail.com>
References: <EDC652A26FB23C4EB6384A4584434A040260FD70@307622ANEX5.global.avaya.com> <4CBF2A4F.1030109@piuha.net> <6AA76962-7777-424A-95AA-4A4D4F2312F6@gmail.com>
Date: Wed, 20 Oct 2010 19:35:29 -0400
Message-ID: <AANLkTikiR99ervo6rL8mTZGbde_h5yFMhkO1bJO7OmPq@mail.gmail.com>
From: Vint Cerf <vint@google.com>
To: Ralph Droms <rdroms.ietf@gmail.com>
Content-Type: text/plain; charset=ISO-8859-1
X-System-Of-Record: true
Cc: IETF SmartPower Directorate <smartpowerdir@ietf.org>
Subject: Re: [smartpowerdir] Meeting in Beijing?
X-BeenThere: smartpowerdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Members of the Smart Power Directorate <smartpowerdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/smartpowerdir>, <mailto:smartpowerdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/smartpowerdir>
List-Post: <mailto:smartpowerdir@ietf.org>
List-Help: <mailto:smartpowerdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/smartpowerdir>, <mailto:smartpowerdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Oct 2010 23:34:00 -0000

i am unable to go to beijing but would greatly appreciate any advice
emerging from your discussions.

v


On Wed, Oct 20, 2010 at 6:36 PM, Ralph Droms <rdroms.ietf@gmail.com> wrote:
> I'm available Thu AM and will keep the slot open.
>
> - Ralph
>
> On Oct 20, 2010, at 1:43 PM 10/20/10, Jari Arkko wrote:
>
>> That would be a good time for me as well.
>>
>> I would like to have a meeting.
>>
>> Jari
>>
>> Romascanu, Dan (Dan) kirjoitti:
>>> Are we planning for a meeting of smartpowerdir in Beijing? My meeting
>>> slots fade out quickly, but I still have Thursday breakfast free if we
>>> decide to meet at the same time as in Maastricht.
>>> Dan
>>>
>>>
>>
>
>

From mehmet.ersue@nsn.com  Thu Oct 21 01:23:12 2010
Return-Path: <mehmet.ersue@nsn.com>
X-Original-To: smartpowerdir@core3.amsl.com
Delivered-To: smartpowerdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B18E23A69DD for <smartpowerdir@core3.amsl.com>; Thu, 21 Oct 2010 01:23:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.436
X-Spam-Level: 
X-Spam-Status: No, score=-102.436 tagged_above=-999 required=5 tests=[AWL=0.163, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pEnLFCKQfm67 for <smartpowerdir@core3.amsl.com>; Thu, 21 Oct 2010 01:23:11 -0700 (PDT)
Received: from demumfd002.nsn-inter.net (demumfd002.nsn-inter.net [93.183.12.31]) by core3.amsl.com (Postfix) with ESMTP id A12A53A69C7 for <smartpowerdir@ietf.org>; Thu, 21 Oct 2010 01:23:11 -0700 (PDT)
Received: from demuprx016.emea.nsn-intra.net ([10.150.129.55]) by demumfd002.nsn-inter.net (8.12.11.20060308/8.12.11) with ESMTP id o9L8Oc7N026473 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Thu, 21 Oct 2010 10:24:38 +0200
Received: from demuexc025.nsn-intra.net (demuexc025.nsn-intra.net [10.159.32.12]) by demuprx016.emea.nsn-intra.net (8.12.11.20060308/8.12.11) with ESMTP id o9L8ObcA011447; Thu, 21 Oct 2010 10:24:38 +0200
Received: from DEMUEXC006.nsn-intra.net ([10.150.128.18]) by demuexc025.nsn-intra.net with Microsoft SMTPSVC(6.0.3790.4675);  Thu, 21 Oct 2010 10:24:37 +0200
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
Date: Thu, 21 Oct 2010 10:24:35 +0200
Message-ID: <80A0822C5E9A4440A5117C2F4CD36A64011B6E91@DEMUEXC006.nsn-intra.net>
In-Reply-To: <6AA76962-7777-424A-95AA-4A4D4F2312F6@gmail.com>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: [smartpowerdir] Meeting in Beijing?
Thread-Index: Actwp3hwsuXwgXwBTiy4kxBCpLcpHAAUbxag
References: <EDC652A26FB23C4EB6384A4584434A040260FD70@307622ANEX5.global.avaya.com><4CBF2A4F.1030109@piuha.net> <6AA76962-7777-424A-95AA-4A4D4F2312F6@gmail.com>
From: "Ersue, Mehmet (NSN - DE/Munich)" <mehmet.ersue@nsn.com>
To: "ext Ralph Droms" <rdroms.ietf@gmail.com>, "Dan Romascanu" <dromasca@avaya.com>
X-OriginalArrivalTime: 21 Oct 2010 08:24:37.0116 (UTC) FILETIME=[660803C0:01CB70F9]
Cc: IETF SmartPower Directorate <smartpowerdir@ietf.org>
Subject: Re: [smartpowerdir] Meeting in Beijing?
X-BeenThere: smartpowerdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Members of the Smart Power Directorate <smartpowerdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/smartpowerdir>, <mailto:smartpowerdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/smartpowerdir>
List-Post: <mailto:smartpowerdir@ietf.org>
List-Help: <mailto:smartpowerdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/smartpowerdir>, <mailto:smartpowerdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Oct 2010 08:23:12 -0000

Thursday morning works.

Mehmet


> -----Original Message-----
> From: smartpowerdir-bounces@ietf.org [mailto:smartpowerdir-
> bounces@ietf.org] On Behalf Of ext Ralph Droms
> Sent: Thursday, October 21, 2010 12:36 AM
> To: Dan Romascanu
> Cc: IETF SmartPower Directorate
> Subject: Re: [smartpowerdir] Meeting in Beijing?
>=20
> I'm available Thu AM and will keep the slot open.
>=20
> - Ralph
>=20
> On Oct 20, 2010, at 1:43 PM 10/20/10, Jari Arkko wrote:
>=20
> > That would be a good time for me as well.
> >
> > I would like to have a meeting.
> >
> > Jari
> >
> > Romascanu, Dan (Dan) kirjoitti:
> >> Are we planning for a meeting of smartpowerdir in Beijing? My
> meeting
> >> slots fade out quickly, but I still have Thursday breakfast free if
> we
> >> decide to meet at the same time as in Maastricht.
> >> Dan
> >>
> >>
> >


From fred@cisco.com  Thu Oct 21 05:01:12 2010
Return-Path: <fred@cisco.com>
X-Original-To: smartpowerdir@core3.amsl.com
Delivered-To: smartpowerdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 7E0503A6767 for <smartpowerdir@core3.amsl.com>; Thu, 21 Oct 2010 05:01:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -110.412
X-Spam-Level: 
X-Spam-Status: No, score=-110.412 tagged_above=-999 required=5 tests=[AWL=0.188, BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hyiQMtrayvUh for <smartpowerdir@core3.amsl.com>; Thu, 21 Oct 2010 05:01:11 -0700 (PDT)
Received: from rtp-iport-1.cisco.com (rtp-iport-1.cisco.com [64.102.122.148]) by core3.amsl.com (Postfix) with ESMTP id E2F033A69A1 for <smartpowerdir@ietf.org>; Thu, 21 Oct 2010 05:01:10 -0700 (PDT)
Authentication-Results: rtp-iport-1.cisco.com; dkim=neutral (message not signed) header.i=none
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AvsEAFrIv0xAZnwN/2dsb2JhbAChVnGjZZwthUoEikuDBA
X-IronPort-AV: E=Sophos;i="4.58,216,1286150400"; d="scan'208";a="173123172"
Received: from rtp-core-2.cisco.com ([64.102.124.13]) by rtp-iport-1.cisco.com with ESMTP; 21 Oct 2010 12:02:46 +0000
Received: from Freds-Computer.local (rtp-vpn4-695.cisco.com [10.82.210.183]) by rtp-core-2.cisco.com (8.13.8/8.14.3) with ESMTP id o9LC2Zaa029182; Thu, 21 Oct 2010 12:02:39 GMT
Received: from [127.0.0.1] by Freds-Computer.local (PGP Universal service); Thu, 21 Oct 2010 08:02:45 -0400
X-PGP-Universal: processed; by Freds-Computer.local on Thu, 21 Oct 2010 08:02:45 -0400
Mime-Version: 1.0 (Apple Message framework v1081)
From: Fred Baker <fred@cisco.com>
In-Reply-To: <80A0822C5E9A4440A5117C2F4CD36A64011B6E91@DEMUEXC006.nsn-intra.net>
Date: Thu, 21 Oct 2010 08:02:25 -0400
Message-Id: <D3F37F17-C741-429E-A9BA-4CAF31538E7A@cisco.com>
References: <EDC652A26FB23C4EB6384A4584434A040260FD70@307622ANEX5.global.avaya.com><4CBF2A4F.1030109@piuha.net> <6AA76962-7777-424A-95AA-4A4D4F2312F6@gmail.com> <80A0822C5E9A4440A5117C2F4CD36A64011B6E91@DEMUEXC006.nsn-intra.net>
To: "Ersue, Mehmet (NSN - DE/Munich)" <mehmet.ersue@nsn.com>, IETF SmartPower Directorate <smartpowerdir@ietf.org>
X-Mailer: Apple Mail (2.1081)
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: quoted-printable
Subject: Re: [smartpowerdir] Meeting in Beijing?
X-BeenThere: smartpowerdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Members of the Smart Power Directorate <smartpowerdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/smartpowerdir>, <mailto:smartpowerdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/smartpowerdir>
List-Post: <mailto:smartpowerdir@ietf.org>
List-Help: <mailto:smartpowerdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/smartpowerdir>, <mailto:smartpowerdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Oct 2010 12:01:12 -0000

Great. Let's have breakfast together Thursday of the IETF. Thanks for =
bringing it up, Dan.

What's a good time? 7:30 with a view to running away by 9:00?

On Oct 21, 2010, at 4:24 AM, Ersue, Mehmet (NSN - DE/Munich) wrote:

> Thursday morning works.
>=20
> Mehmet
>=20
>=20
>> -----Original Message-----
>> From: smartpowerdir-bounces@ietf.org [mailto:smartpowerdir-
>> bounces@ietf.org] On Behalf Of ext Ralph Droms
>> Sent: Thursday, October 21, 2010 12:36 AM
>> To: Dan Romascanu
>> Cc: IETF SmartPower Directorate
>> Subject: Re: [smartpowerdir] Meeting in Beijing?
>>=20
>> I'm available Thu AM and will keep the slot open.
>>=20
>> - Ralph
>>=20
>> On Oct 20, 2010, at 1:43 PM 10/20/10, Jari Arkko wrote:
>>=20
>>> That would be a good time for me as well.
>>>=20
>>> I would like to have a meeting.
>>>=20
>>> Jari
>>>=20
>>> Romascanu, Dan (Dan) kirjoitti:
>>>> Are we planning for a meeting of smartpowerdir in Beijing? My
>> meeting
>>>> slots fade out quickly, but I still have Thursday breakfast free if
>> we
>>>> decide to meet at the same time as in Maastricht.
>>>> Dan
>>>>=20
>>>>=20
>>>=20
>=20


From rdroms.ietf@gmail.com  Thu Oct 21 05:09:27 2010
Return-Path: <rdroms.ietf@gmail.com>
X-Original-To: smartpowerdir@core3.amsl.com
Delivered-To: smartpowerdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D1B3D3A6934 for <smartpowerdir@core3.amsl.com>; Thu, 21 Oct 2010 05:09:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.579
X-Spam-Level: 
X-Spam-Status: No, score=-102.579 tagged_above=-999 required=5 tests=[AWL=0.020, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Fmxb7OGusbSc for <smartpowerdir@core3.amsl.com>; Thu, 21 Oct 2010 05:09:27 -0700 (PDT)
Received: from mail-px0-f172.google.com (mail-px0-f172.google.com [209.85.212.172]) by core3.amsl.com (Postfix) with ESMTP id E228C3A68DE for <smartpowerdir@ietf.org>; Thu, 21 Oct 2010 05:09:26 -0700 (PDT)
Received: by pxi9 with SMTP id 9so1018024pxi.31 for <smartpowerdir@ietf.org>; Thu, 21 Oct 2010 05:11:02 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:subject:mime-version :content-type:from:in-reply-to:date:cc:content-transfer-encoding :message-id:references:to:x-mailer; bh=ya0ze0pD5DhPuYuM0FmmNMlCMqFOW0OUmlhuangphAY=; b=P0Oi0VP6WahWvFUsqXLRQla6CDwCZUSpeurskRRqpFn8rnevToF6ujx9jSJy+r6hm8 Mn88GmI5hK1+4mUxyI7tWxytNXrHcYVjhMhCwpCzyeMFYR+nMtMJVWsIMxya9oanYcga JvKhYHGFkzhuKoAaL1EVN7s8WlrvLaM/efTeE=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=subject:mime-version:content-type:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to:x-mailer; b=oUY/GykEv7NrqPeCpIx1wLZOKMojznvJMBjBcoWk8z3416vKbzYZh+XB19QNkxGRV9 048ddyZsbdlgKUTBxuJiMa6WLc1Jc8zc0NwhSkIKNftDTH9obx4VC5otHX3/YDA40urt jDXjju2Xgc44TNbda8lFJYW5JVhJlpSB5v/mg=
Received: by 10.142.238.5 with SMTP id l5mr524694wfh.337.1287663062306; Thu, 21 Oct 2010 05:11:02 -0700 (PDT)
Received: from bxb-rdroms-8712.cisco.com (198-135-0-233.cisco.com [198.135.0.233]) by mx.google.com with ESMTPS id h28sm528221vcr.43.2010.10.21.05.11.00 (version=TLSv1/SSLv3 cipher=RC4-MD5); Thu, 21 Oct 2010 05:11:01 -0700 (PDT)
Mime-Version: 1.0 (Apple Message framework v1081)
Content-Type: text/plain; charset=us-ascii
From: Ralph Droms <rdroms.ietf@gmail.com>
In-Reply-To: <D3F37F17-C741-429E-A9BA-4CAF31538E7A@cisco.com>
Date: Thu, 21 Oct 2010 08:11:00 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <B2AE713D-8340-4EF5-BED8-96356D9CE048@gmail.com>
References: <EDC652A26FB23C4EB6384A4584434A040260FD70@307622ANEX5.global.avaya.com><4CBF2A4F.1030109@piuha.net> <6AA76962-7777-424A-95AA-4A4D4F2312F6@gmail.com> <80A0822C5E9A4440A5117C2F4CD36A64011B6E91@DEMUEXC006.nsn-intra.net> <D3F37F17-C741-429E-A9BA-4CAF31538E7A@cisco.com>
To: Fred Baker <fred@cisco.com>
X-Mailer: Apple Mail (2.1081)
Cc: IETF SmartPower Directorate <smartpowerdir@ietf.org>
Subject: Re: [smartpowerdir] Meeting in Beijing?
X-BeenThere: smartpowerdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Members of the Smart Power Directorate <smartpowerdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/smartpowerdir>, <mailto:smartpowerdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/smartpowerdir>
List-Post: <mailto:smartpowerdir@ietf.org>
List-Help: <mailto:smartpowerdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/smartpowerdir>, <mailto:smartpowerdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Oct 2010 12:09:27 -0000

OK with me; it's in my calendar.

- Ralph

On Oct 21, 2010, at 8:02 AM 10/21/10, Fred Baker wrote:

> Great. Let's have breakfast together Thursday of the IETF. Thanks for =
bringing it up, Dan.
>=20
> What's a good time? 7:30 with a view to running away by 9:00?
>=20
> On Oct 21, 2010, at 4:24 AM, Ersue, Mehmet (NSN - DE/Munich) wrote:
>=20
>> Thursday morning works.
>>=20
>> Mehmet
>>=20
>>=20
>>> -----Original Message-----
>>> From: smartpowerdir-bounces@ietf.org [mailto:smartpowerdir-
>>> bounces@ietf.org] On Behalf Of ext Ralph Droms
>>> Sent: Thursday, October 21, 2010 12:36 AM
>>> To: Dan Romascanu
>>> Cc: IETF SmartPower Directorate
>>> Subject: Re: [smartpowerdir] Meeting in Beijing?
>>>=20
>>> I'm available Thu AM and will keep the slot open.
>>>=20
>>> - Ralph
>>>=20
>>> On Oct 20, 2010, at 1:43 PM 10/20/10, Jari Arkko wrote:
>>>=20
>>>> That would be a good time for me as well.
>>>>=20
>>>> I would like to have a meeting.
>>>>=20
>>>> Jari
>>>>=20
>>>> Romascanu, Dan (Dan) kirjoitti:
>>>>> Are we planning for a meeting of smartpowerdir in Beijing? My
>>> meeting
>>>>> slots fade out quickly, but I still have Thursday breakfast free =
if
>>> we
>>>>> decide to meet at the same time as in Maastricht.
>>>>> Dan
>>>>>=20
>>>>>=20
>>>>=20
>>=20
>=20


From mehmet.ersue@nsn.com  Thu Oct 21 05:25:30 2010
Return-Path: <mehmet.ersue@nsn.com>
X-Original-To: smartpowerdir@core3.amsl.com
Delivered-To: smartpowerdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 6EEFE3A6767 for <smartpowerdir@core3.amsl.com>; Thu, 21 Oct 2010 05:25:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.438
X-Spam-Level: 
X-Spam-Status: No, score=-102.438 tagged_above=-999 required=5 tests=[AWL=0.161, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pG3UT421kKpR for <smartpowerdir@core3.amsl.com>; Thu, 21 Oct 2010 05:25:26 -0700 (PDT)
Received: from demumfd002.nsn-inter.net (demumfd002.nsn-inter.net [93.183.12.31]) by core3.amsl.com (Postfix) with ESMTP id 450183A66B4 for <smartpowerdir@ietf.org>; Thu, 21 Oct 2010 05:25:26 -0700 (PDT)
Received: from demuprx017.emea.nsn-intra.net ([10.150.129.56]) by demumfd002.nsn-inter.net (8.12.11.20060308/8.12.11) with ESMTP id o9LCQsdV002614 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Thu, 21 Oct 2010 14:26:54 +0200
Received: from demuexc025.nsn-intra.net (demuexc025.nsn-intra.net [10.159.32.12]) by demuprx017.emea.nsn-intra.net (8.12.11.20060308/8.12.11) with ESMTP id o9LCQnsU010230; Thu, 21 Oct 2010 14:26:54 +0200
Received: from DEMUEXC006.nsn-intra.net ([10.150.128.18]) by demuexc025.nsn-intra.net with Microsoft SMTPSVC(6.0.3790.4675);  Thu, 21 Oct 2010 14:26:47 +0200
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
Date: Thu, 21 Oct 2010 14:26:46 +0200
Message-ID: <80A0822C5E9A4440A5117C2F4CD36A64011E5146@DEMUEXC006.nsn-intra.net>
In-Reply-To: <D3F37F17-C741-429E-A9BA-4CAF31538E7A@cisco.com>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: [smartpowerdir] Meeting in Beijing?
Thread-Index: ActxF+Ee+qfwyM4uTviCZCv177mUCgAA1EvA
References: <EDC652A26FB23C4EB6384A4584434A040260FD70@307622ANEX5.global.avaya.com><4CBF2A4F.1030109@piuha.net> <6AA76962-7777-424A-95AA-4A4D4F2312F6@gmail.com> <80A0822C5E9A4440A5117C2F4CD36A64011B6E91@DEMUEXC006.nsn-intra.net> <D3F37F17-C741-429E-A9BA-4CAF31538E7A@cisco.com>
From: "Ersue, Mehmet (NSN - DE/Munich)" <mehmet.ersue@nsn.com>
To: "ext Fred Baker" <fred@cisco.com>, "IETF SmartPower Directorate" <smartpowerdir@ietf.org>
X-OriginalArrivalTime: 21 Oct 2010 12:26:47.0726 (UTC) FILETIME=[3AF324E0:01CB711B]
Subject: Re: [smartpowerdir] Meeting in Beijing?
X-BeenThere: smartpowerdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Members of the Smart Power Directorate <smartpowerdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/smartpowerdir>, <mailto:smartpowerdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/smartpowerdir>
List-Post: <mailto:smartpowerdir@ietf.org>
List-Help: <mailto:smartpowerdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/smartpowerdir>, <mailto:smartpowerdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Oct 2010 12:25:30 -0000

ACK.

Cheers,
Mehmet


> -----Original Message-----
> From: ext Fred Baker [mailto:fred@cisco.com]
> Sent: Thursday, October 21, 2010 2:02 PM
> To: Ersue, Mehmet (NSN - DE/Munich); IETF SmartPower Directorate
> Cc: ext Ralph Droms; Dan Romascanu
> Subject: Re: [smartpowerdir] Meeting in Beijing?
>=20
> Great. Let's have breakfast together Thursday of the IETF. Thanks for
> bringing it up, Dan.
>=20
> What's a good time? 7:30 with a view to running away by 9:00?
>=20
> On Oct 21, 2010, at 4:24 AM, Ersue, Mehmet (NSN - DE/Munich) wrote:
>=20
> > Thursday morning works.
> >
> > Mehmet
> >
> >
> >> -----Original Message-----
> >> From: smartpowerdir-bounces@ietf.org [mailto:smartpowerdir-
> >> bounces@ietf.org] On Behalf Of ext Ralph Droms
> >> Sent: Thursday, October 21, 2010 12:36 AM
> >> To: Dan Romascanu
> >> Cc: IETF SmartPower Directorate
> >> Subject: Re: [smartpowerdir] Meeting in Beijing?
> >>
> >> I'm available Thu AM and will keep the slot open.
> >>
> >> - Ralph
> >>
> >> On Oct 20, 2010, at 1:43 PM 10/20/10, Jari Arkko wrote:
> >>
> >>> That would be a good time for me as well.
> >>>
> >>> I would like to have a meeting.
> >>>
> >>> Jari
> >>>
> >>> Romascanu, Dan (Dan) kirjoitti:
> >>>> Are we planning for a meeting of smartpowerdir in Beijing? My
> >> meeting
> >>>> slots fade out quickly, but I still have Thursday breakfast free
> if
> >> we
> >>>> decide to meet at the same time as in Maastricht.
> >>>> Dan
> >>>>
> >>>>
> >>>
> >


From dromasca@avaya.com  Thu Oct 21 07:53:02 2010
Return-Path: <dromasca@avaya.com>
X-Original-To: smartpowerdir@core3.amsl.com
Delivered-To: smartpowerdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 09E9E3A6A2C for <smartpowerdir@core3.amsl.com>; Thu, 21 Oct 2010 07:53:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.531
X-Spam-Level: 
X-Spam-Status: No, score=-102.531 tagged_above=-999 required=5 tests=[AWL=0.068, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NEFoo7J7KGb4 for <smartpowerdir@core3.amsl.com>; Thu, 21 Oct 2010 07:53:01 -0700 (PDT)
Received: from co300216-co-outbound.net.avaya.com (co300216-co-outbound.net.avaya.com [198.152.13.100]) by core3.amsl.com (Postfix) with ESMTP id BB2C63A6A2E for <smartpowerdir@ietf.org>; Thu, 21 Oct 2010 07:53:00 -0700 (PDT)
X-IronPort-AV: E=Sophos;i="4.58,217,1286164800"; d="scan'208";a="243879221"
Received: from unknown (HELO co300216-co-erhwest.avaya.com) ([198.152.7.5]) by co300216-co-outbound.net.avaya.com with ESMTP; 21 Oct 2010 10:54:36 -0400
X-IronPort-AV: E=Sophos;i="4.58,217,1286164800"; d="scan'208";a="528740723"
Received: from unknown (HELO 307622ANEX5.global.avaya.com) ([135.64.140.12]) by co300216-co-erhwest-out.avaya.com with ESMTP; 21 Oct 2010 10:54:35 -0400
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
Date: Thu, 21 Oct 2010 16:54:20 +0200
Message-ID: <EDC652A26FB23C4EB6384A4584434A0402664653@307622ANEX5.global.avaya.com>
In-Reply-To: <D3F37F17-C741-429E-A9BA-4CAF31538E7A@cisco.com>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: [smartpowerdir] Meeting in Beijing?
Thread-Index: ActxF+JCdON9EBJBQeSCLMQTFLwSEAAF+R1Q
References: <EDC652A26FB23C4EB6384A4584434A040260FD70@307622ANEX5.global.avaya.com><4CBF2A4F.1030109@piuha.net> <6AA76962-7777-424A-95AA-4A4D4F2312F6@gmail.com> <80A0822C5E9A4440A5117C2F4CD36A64011B6E91@DEMUEXC006.nsn-intra.net> <D3F37F17-C741-429E-A9BA-4CAF31538E7A@cisco.com>
From: "Romascanu, Dan (Dan)" <dromasca@avaya.com>
To: "Fred Baker" <fred@cisco.com>, "Ersue, Mehmet (NSN - DE/Munich)" <mehmet.ersue@nsn.com>, "IETF SmartPower Directorate" <smartpowerdir@ietf.org>
Subject: Re: [smartpowerdir] Meeting in Beijing?
X-BeenThere: smartpowerdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Members of the Smart Power Directorate <smartpowerdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/smartpowerdir>, <mailto:smartpowerdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/smartpowerdir>
List-Post: <mailto:smartpowerdir@ietf.org>
List-Help: <mailto:smartpowerdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/smartpowerdir>, <mailto:smartpowerdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Oct 2010 14:53:02 -0000

7:30 to 9AM is fine - I put it in my schedule.=20

Dan
=20

> -----Original Message-----
> From: Fred Baker [mailto:fred@cisco.com]=20
> Sent: Thursday, October 21, 2010 2:02 PM
> To: Ersue, Mehmet (NSN - DE/Munich); IETF SmartPower Directorate
> Cc: ext Ralph Droms; Romascanu, Dan (Dan)
> Subject: Re: [smartpowerdir] Meeting in Beijing?
>=20
> Great. Let's have breakfast together Thursday of the IETF.=20
> Thanks for bringing it up, Dan.
>=20
> What's a good time? 7:30 with a view to running away by 9:00?
>=20
> On Oct 21, 2010, at 4:24 AM, Ersue, Mehmet (NSN - DE/Munich) wrote:
>=20
> > Thursday morning works.
> >=20
> > Mehmet
> >=20
> >=20
> >> -----Original Message-----
> >> From: smartpowerdir-bounces@ietf.org [mailto:smartpowerdir-=20
> >> bounces@ietf.org] On Behalf Of ext Ralph Droms
> >> Sent: Thursday, October 21, 2010 12:36 AM
> >> To: Dan Romascanu
> >> Cc: IETF SmartPower Directorate
> >> Subject: Re: [smartpowerdir] Meeting in Beijing?
> >>=20
> >> I'm available Thu AM and will keep the slot open.
> >>=20
> >> - Ralph
> >>=20
> >> On Oct 20, 2010, at 1:43 PM 10/20/10, Jari Arkko wrote:
> >>=20
> >>> That would be a good time for me as well.
> >>>=20
> >>> I would like to have a meeting.
> >>>=20
> >>> Jari
> >>>=20
> >>> Romascanu, Dan (Dan) kirjoitti:
> >>>> Are we planning for a meeting of smartpowerdir in Beijing? My
> >> meeting
> >>>> slots fade out quickly, but I still have Thursday=20
> breakfast free if
> >> we
> >>>> decide to meet at the same time as in Maastricht.
> >>>> Dan
> >>>>=20
> >>>>=20
> >>>=20
> >=20
>=20
>=20

From fred@cisco.com  Mon Oct 25 11:46:02 2010
Return-Path: <fred@cisco.com>
X-Original-To: smartpowerdir@core3.amsl.com
Delivered-To: smartpowerdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 800FA3A697F for <smartpowerdir@core3.amsl.com>; Mon, 25 Oct 2010 11:46:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0
X-Spam-Level: 
X-Spam-Status: No, score=x tagged_above=-999 required=5 tests=[]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RRJf-S6cqm3D for <smartpowerdir@core3.amsl.com>; Mon, 25 Oct 2010 11:46:02 -0700 (PDT)
Received: from sj-iport-1.cisco.com (sj-iport-1.cisco.com [171.71.176.70]) by core3.amsl.com (Postfix) with ESMTP id 61DB03A682F for <smartpowerdir@ietf.org>; Mon, 25 Oct 2010 11:45:59 -0700 (PDT)
Authentication-Results: sj-iport-1.cisco.com; dkim=neutral (message not signed) header.i=none
X-IronPort-AV: E=Sophos;i="4.58,236,1286150400";  d="scan'208,217";a="374355716"
Received: from sj-core-5.cisco.com ([171.71.177.238]) by sj-iport-1.cisco.com with ESMTP; 25 Oct 2010 18:47:44 +0000
Received: from stealth-10-32-244-222.cisco.com (stealth-10-32-244-222.cisco.com [10.32.244.222]) by sj-core-5.cisco.com (8.13.8/8.14.3) with ESMTP id o9PIlNeN019476 for <smartpowerdir@ietf.org>; Mon, 25 Oct 2010 18:47:25 GMT
Received: from [127.0.0.1] by stealth-10-32-244-222.cisco.com (PGP Universal service); Mon, 25 Oct 2010 11:47:30 -0700
X-PGP-Universal: processed; by stealth-10-32-244-222.cisco.com on Mon, 25 Oct 2010 11:47:30 -0700
From: Fred Baker <fred@cisco.com>
Date: Mon, 25 Oct 2010 11:47:16 -0700
Message-Id: <1144520E-FC10-4A67-AE2D-95584E1A9D8D@cisco.com>
To: IETF SmartPower Directorate <smartpowerdir@ietf.org>
Mime-Version: 1.0 (Apple Message framework v1081)
X-Mailer: Apple Mail (2.1081)
Content-Type: multipart/alternative; boundary=Apple-Mail-46-487591200
Subject: [smartpowerdir] Diff: draft-baker-ietf-core-07.txt - sg-ietf-compendium.txt
X-BeenThere: smartpowerdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Members of the Smart Power Directorate <smartpowerdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/smartpowerdir>, <mailto:smartpowerdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/smartpowerdir>
List-Post: <mailto:smartpowerdir@ietf.org>
List-Help: <mailto:smartpowerdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/smartpowerdir>, <mailto:smartpowerdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 25 Oct 2010 18:46:03 -0000

--Apple-Mail-46-487591200
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii


On Oct 25, 2010, at 11:29 AM, IETF I-D Submission Tool wrote:

>=20
> A new version of I-D, draft-baker-ietf-core-09.txt has been =
successfully submitted by Fred Baker and posted to the IETF repository.
>=20
> Filename:	 draft-baker-ietf-core
> Revision:	 09
> Title:		 Internet Protocols for the Smart Grid
> Creation_date:	 2010-10-25
> WG ID:		 Independent Submission
> Number_of_pages: 57
>=20
> Abstract:
> This note identifies the key protocols of the Internet Protocol Suite
> for use in the Smart Grid.  The target audience is those people
> seeking guidance on how to construct an appropriate Internet Protocol
> Suite profile for the Smart Grid.  In practice, such a profile would
> consist of selecting what is needed for Smart Grid deployment from
> the picture presented here.

< draft-baker-ietf-core-07.txt 		 sg-ietf-compendium.txt =09
 	=09
Network Working Group                                           F. Baker	=
 	Network Working Group                                           =
F. Baker=09
Internet-Draft                                                  D. Meyer	=
 	Internet-Draft                                                  =
D. Meyer=09
Intended status: Informational                             Cisco Systems	=
 	Intended status: Informational                             Cisco =
Systems=09
Expires: February 18, 2011                               August 17, 2010	=
 	Expires: April 28, 2011                                 October =
25, 2010=09
 	=09
                 Internet Protocols for the Smart Grid	 	         =
        Internet Protocols for the Smart Grid=09
                        draft-baker-ietf-core-07	 	         =
               draft-baker-ietf-core-09=09
 	=09
Abstract	 	Abstract=09
 	=09
   This note identifies the key protocols of the Internet Protocol Suite	=
 	   This note identifies the key protocols of the Internet =
Protocol Suite=09
   for use in the Smart Grid.  The target audience is those people	 =
	   for use in the Smart Grid.  The target audience is those =
people=09
   seeking guidance on how to construct an appropriate Internet Protocol	=
 	   seeking guidance on how to construct an appropriate Internet =
Protocol=09
   Suite profile for the Smart Grid.  In practice, such a profile would	 =
	   Suite profile for the Smart Grid.  In practice, such a =
profile would=09
   consist of selecting what is needed for Smart Grid deployment from	 =
	   consist of selecting what is needed for Smart Grid deployment =
from=09
   the picture presented here.	 	   the picture presented here.=09=

 	=09
 	=09
skipping to change at page 1, line 35		skipping to change at =
page 1, line 35=09
   Internet-Drafts are working documents of the Internet Engineering	 =
	   Internet-Drafts are working documents of the Internet =
Engineering=09
   Task Force (IETF).  Note that other groups may also distribute	 =
	   Task Force (IETF).  Note that other groups may also =
distribute=09
   working documents as Internet-Drafts.  The list of current Internet-	 =
	   working documents as Internet-Drafts.  The list of current =
Internet-=09
   Drafts is at http://datatracker.ietf.org/drafts/current/.	 	 =
  Drafts is at http://datatracker.ietf.org/drafts/current/.=09
 	=09
   Internet-Drafts are draft documents valid for a maximum of six months	=
 	   Internet-Drafts are draft documents valid for a maximum of =
six months=09
   and may be updated, replaced, or obsoleted by other documents at any	 =
	   and may be updated, replaced, or obsoleted by other documents =
at any=09
   time.  It is inappropriate to use Internet-Drafts as reference	 =
	   time.  It is inappropriate to use Internet-Drafts as =
reference=09
   material or to cite them other than as "work in progress."	 	 =
  material or to cite them other than as "work in progress."=09
 	=09
   This Internet-Draft will expire on February 18, 2011.	 	 =
  This Internet-Draft will expire on April 28, 2011.=09
 	=09
Copyright Notice	 	Copyright Notice=09
 	=09
   Copyright (c) 2010 IETF Trust and the persons identified as the	 =
	   Copyright (c) 2010 IETF Trust and the persons identified as =
the=09
   document authors.  All rights reserved.	 	   document =
authors.  All rights reserved.=09
 	=09
   This document is subject to BCP 78 and the IETF Trust's Legal	 =
	   This document is subject to BCP 78 and the IETF Trust's Legal=09=

   Provisions Relating to IETF Documents	 	   Provisions =
Relating to IETF Documents=09
   (http://trustee.ietf.org/license-info) in effect on the date of	 =
	   (http://trustee.ietf.org/license-info) in effect on the date =
of=09
   publication of this document.  Please review these documents	 	 =
  publication of this document.  Please review these documents=09
 	=09
skipping to change at page 2, line 19		skipping to change at =
page 2, line 19=09
   2.  The Internet Protocol Suite  . . . . . . . . . . . . . . . . .  5	=
 	   2.  The Internet Protocol Suite  . . . . . . . . . . . . . . =
. . .  5=09
     2.1.  Internet Protocol Layers . . . . . . . . . . . . . . . . .  5	=
 	     2.1.  Internet Protocol Layers . . . . . . . . . . . . . . =
. . .  5=09
       2.1.1.  Application  . . . . . . . . . . . . . . . . . . . . .  6	=
 	       2.1.1.  Application  . . . . . . . . . . . . . . . . . . =
. . .  6=09
       2.1.2.  Transport  . . . . . . . . . . . . . . . . . . . . . .  7	=
 	       2.1.2.  Transport  . . . . . . . . . . . . . . . . . . . =
. . .  7=09
       2.1.3.  Network  . . . . . . . . . . . . . . . . . . . . . . .  7	=
 	       2.1.3.  Network  . . . . . . . . . . . . . . . . . . . . =
. . .  7=09
         2.1.3.1.  Internet Protocol  . . . . . . . . . . . . . . . .  8	=
 	         2.1.3.1.  Internet Protocol  . . . . . . . . . . . . . =
. . .  8=09
         2.1.3.2.  Lower layer networks . . . . . . . . . . . . . . .  8	=
 	         2.1.3.2.  Lower layer networks . . . . . . . . . . . . =
. . .  8=09
       2.1.4.  Media layers: Physical and Link  . . . . . . . . . . .  8	=
 	       2.1.4.  Media layers: Physical and Link  . . . . . . . . =
. . .  8=09
     2.2.  Security issues  . . . . . . . . . . . . . . . . . . . . .  8	=
 	     2.2.  Security issues  . . . . . . . . . . . . . . . . . . =
. . .  8=09
       2.2.1.  Physical security  . . . . . . . . . . . . . . . . . .  9	=
 	       2.2.1.  Physical security  . . . . . . . . . . . . . . . =
. . .  9=09
       2.2.2.  Session identification . . . . . . . . . . . . . . . .  9	=
 	       2.2.2.  Session Authentication . . . . . . . . . . . . . =
. . .  9=09
       2.2.3.  Confidentiality  . . . . . . . . . . . . . . . . . . . 10	=
 	       2.2.3.  Confidentiality  . . . . . . . . . . . . . . . . =
. . . 10=09
     2.3.  Network Infrastructure . . . . . . . . . . . . . . . . . . 11	=
 	     2.3.  Network Infrastructure . . . . . . . . . . . . . . . =
. . . 11=09
       2.3.1.  Domain Name System (DNS) . . . . . . . . . . . . . . . 11	=
 	       2.3.1.  Domain Name System (DNS) . . . . . . . . . . . . =
. . . 11=09
       2.3.2.  Network Management . . . . . . . . . . . . . . . . . . 11	=
 	       2.3.2.  Network Management . . . . . . . . . . . . . . . =
. . . 11=09
   3.  Specific protocols . . . . . . . . . . . . . . . . . . . . . . 11	=
 	   3.  Specific protocols . . . . . . . . . . . . . . . . . . . =
. . . 11=09
     3.1.  Security solutions . . . . . . . . . . . . . . . . . . . . 12	=
 	     3.1.  Security solutions . . . . . . . . . . . . . . . . . =
. . . 12=09
       3.1.1.  Session identification, authentication,	 	       =
3.1.1.  Session identification, authentication,=09
               authorization, and accounting  . . . . . . . . . . . . 12	=
 	               authorization, and accounting  . . . . . . . . . =
. . . 12=09
       3.1.2.  IP Security Architecture (IPsec) . . . . . . . . . . . 12	=
 	       3.1.2.  IP Security Architecture (IPsec) . . . . . . . . =
. . . 12=09
       3.1.3.  Transport Layer Security (TLS) . . . . . . . . . . . . 12	=
 	       3.1.3.  Transport Layer Security (TLS) . . . . . . . . . =
. . . 13=09
       3.1.4.  Secure/Multipurpose Internet Mail Extensions	 	 =
      3.1.4.  Secure/Multipurpose Internet Mail Extensions=09
               (S/MIME) . . . . . . . . . . . . . . . . . . . . . . . 13	=
 	               (S/MIME) . . . . . . . . . . . . . . . . . . . . =
. . . 14=09
     3.2.  Network Layer  . . . . . . . . . . . . . . . . . . . . . . 13	=
 	     3.2.  Network Layer  . . . . . . . . . . . . . . . . . . . =
. . . 14=09
       3.2.1.  IPv4/IPv6 Coexistence Advice . . . . . . . . . . . . . 13	=
 	       3.2.1.  IPv4/IPv6 Coexistence Advice . . . . . . . . . . =
. . . 14=09
         3.2.1.1.  Dual Stack Coexistence . . . . . . . . . . . . . . 14	=
 	         3.2.1.1.  Dual Stack Coexistence . . . . . . . . . . . =
. . . 14=09
         3.2.1.2.  Tunneling Mechanism  . . . . . . . . . . . . . . . 14	=
 	         3.2.1.2.  Tunneling Mechanism  . . . . . . . . . . . . =
. . . 15=09
         3.2.1.3.  Translation between IPv4 and IPv6 Networks . . . . 14	=
 	         3.2.1.3.  Translation between IPv4 and IPv6 Networks . =
. . . 15=09
       3.2.2.  Internet Protocol Version 4  . . . . . . . . . . . . . 15	=
 	       3.2.2.  Internet Protocol Version 4  . . . . . . . . . . =
. . . 16=09
         3.2.2.1.  IPv4 Address Allocation and Assignment . . . . . . 16	=
 	         3.2.2.1.  IPv4 Address Allocation and Assignment . . . =
. . . 17=09
         3.2.2.2.  IPv4 Unicast Routing . . . . . . . . . . . . . . . 16	=
 	         3.2.2.2.  IPv4 Unicast Routing . . . . . . . . . . . . =
. . . 17=09
         3.2.2.3.  IPv4 Multicast Forwarding and Routing  . . . . . . 16	=
 	         3.2.2.3.  IPv4 Multicast Forwarding and Routing  . . . =
. . . 17=09
       3.2.3.  Internet Protocol Version 6  . . . . . . . . . . . . . 17	=
 	       3.2.3.  Internet Protocol Version 6  . . . . . . . . . . =
. . . 18=09
         3.2.3.1.  IPv6 Address Allocation and Assignment . . . . . . 17	=
 	         3.2.3.1.  IPv6 Address Allocation and Assignment . . . =
. . . 18=09
         3.2.3.2.  IPv6 Routing . . . . . . . . . . . . . . . . . . . 18	=
 	         3.2.3.2.  IPv6 Routing . . . . . . . . . . . . . . . . =
. . . 19=09
       3.2.4.  Routing for IPv4 and IPv6  . . . . . . . . . . . . . . 18	=
 	       3.2.4.  Routing for IPv4 and IPv6  . . . . . . . . . . . =
. . . 19=09
         3.2.4.1.  Routing Information Protocol . . . . . . . . . . . 18	=
 	         3.2.4.1.  Routing Information Protocol . . . . . . . . =
. . . 19=09
         3.2.4.2.  Open Shortest Path First . . . . . . . . . . . . . 19	=
 	         3.2.4.2.  Open Shortest Path First . . . . . . . . . . =
. . . 19=09
         3.2.4.3.  ISO Intermediate System to Intermediate System . . 19	=
 	         3.2.4.3.  ISO Intermediate System to Intermediate =
System . . 20=09
         3.2.4.4.  Border Gateway Protocol  . . . . . . . . . . . . . 19	=
 	         3.2.4.4.  Border Gateway Protocol  . . . . . . . . . . =
. . . 20=09
         3.2.4.5.  Dynamic MANET On-demand (DYMO) Routing . . . . . . 20	=
 	         3.2.4.5.  Dynamic MANET On-demand (DYMO) Routing . . . =
. . . 20=09
         3.2.4.6.  Optimized Link State Routing Protocol  . . . . . . 20	=
 	         3.2.4.6.  Optimized Link State Routing Protocol  . . . =
. . . 21=09
         3.2.4.7.  Routing for Low power and Lossy Networks . . . . . 20	=
 	         3.2.4.7.  Routing for Low power and Lossy Networks . . =
. . . 21=09
       3.2.5.  IPv6 Multicast Forwarding and Routing  . . . . . . . . 20	=
 	       3.2.5.  IPv6 Multicast Forwarding and Routing  . . . . . =
. . . 22=09
         3.2.5.1.  Protocol-Independent Multicast Routing . . . . . . 21	=
 	         3.2.5.1.  Protocol-Independent Multicast Routing . . . =
. . . 22=09
       3.2.6.  Adaptation to lower layer networks and link layer	 =
	       3.2.6.  Adaptation to lower layer networks and link layer=09=

               protocols  . . . . . . . . . . . . . . . . . . . . . . 21	=
 	               protocols  . . . . . . . . . . . . . . . . . . . =
. . . 23=09
     3.3.  Transport Layer  . . . . . . . . . . . . . . . . . . . . . 22	=
 	     3.3.  Transport Layer  . . . . . . . . . . . . . . . . . . =
. . . 23=09
       3.3.1.  User Datagram Protocol (UDP) . . . . . . . . . . . . . 22	=
 	       3.3.1.  User Datagram Protocol (UDP) . . . . . . . . . . =
. . . 23=09
       3.3.2.  Transmission Control Protocol (TCP)  . . . . . . . . . 22	=
 	       3.3.2.  Transmission Control Protocol (TCP)  . . . . . . =
. . . 24=09
       3.3.3.  Stream Control Transmission Protocol (SCTP)  . . . . . 23	=
 	       3.3.3.  Stream Control Transmission Protocol (SCTP)  . . =
. . . 24=09
       3.3.4.  Datagram Congestion Control Protocol (DCCP)  . . . . . 23	=
 	       3.3.4.  Datagram Congestion Control Protocol (DCCP)  . . =
. . . 25=09
     3.4.  Infrastructure . . . . . . . . . . . . . . . . . . . . . . 24	=
 	     3.4.  Infrastructure . . . . . . . . . . . . . . . . . . . =
. . . 25=09
       3.4.1.  Domain Name System . . . . . . . . . . . . . . . . . . 24	=
 	       3.4.1.  Domain Name System . . . . . . . . . . . . . . . =
. . . 25=09
       3.4.2.  Dynamic Host Configuration . . . . . . . . . . . . . . 24	=
 	       3.4.2.  Dynamic Host Configuration . . . . . . . . . . . =
. . . 26=09
     3.5.  Service and Resource Discovery . . . . . . . . . . . . . . 24	=
 	       3.4.3.  Network Time . . . . . . . . . . . . . . . . . . =
. . . 26=09
       3.5.1.  Service Discovery  . . . . . . . . . . . . . . . . . . 24	=
 	     3.5.  Network Management . . . . . . . . . . . . . . . . . =
. . . 26=09
       3.5.2.  Resource     Discovery . . . . . . . . . . . . . . . . 25	=
 	       3.5.1.  Simple Network Management Protocol (SNMP)  . . . =
. . . 26=09
     3.6.  Other Applications . . . . . . . . . . . . . . . . . . . . 26	=
 	       3.5.2.  Network Configuration (NETCONF) Protocol . . . . =
. . . 27=09
       3.6.1.  Network Time . . . . . . . . . . . . . . . . . . . . . 26	=
 	     3.6.  Service and Resource Discovery . . . . . . . . . . . =
. . . 28=09
       3.6.2.  Session Initiation Protocol  . . . . . . . . . . . . . 26	=
 	       3.6.1.  Service Discovery  . . . . . . . . . . . . . . . =
. . . 28=09
       3.6.3.  Calendaring  . . . . . . . . . . . . . . . . . . . . . 27	=
 	       3.6.2.  Resource Discovery . . . . . . . . . . . . . . . =
. . . 28=09
   4.  A simplified view of the business architecture . . . . . . . . 27	=
 	     3.7.  Other Applications . . . . . . . . . . . . . . . . . =
. . . 29=09
   5.  IANA Considerations  . . . . . . . . . . . . . . . . . . . . . 31	=
 	       3.7.1.  Session Initiation Protocol  . . . . . . . . . . =
. . . 29=09
   6.  Security Considerations  . . . . . . . . . . . . . . . . . . . 32	=
 	       3.7.2.  Calendaring  . . . . . . . . . . . . . . . . . . =
. . . 30=09
   7.  Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 32	=
 	   4.  A simplified view of the business architecture . . . . . =
. . . 30=09
   8.  References . . . . . . . . . . . . . . . . . . . . . . . . . . 32	=
 	   5.  IANA Considerations  . . . . . . . . . . . . . . . . . . =
. . . 34=09
     8.1.  Normative References . . . . . . . . . . . . . . . . . . . 32	=
 	   6.  Security Considerations  . . . . . . . . . . . . . . . . =
. . . 35=09
     8.2.  Informative References . . . . . . . . . . . . . . . . . . 32	=
 	   7.  Acknowledgements . . . . . . . . . . . . . . . . . . . . =
. . . 35=09
   Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 44	=
 	   8.  References . . . . . . . . . . . . . . . . . . . . . . . =
. . . 35=09
 	     8.1.  Normative References . . . . . . . . . . . . . . . . =
. . . 35=09
 	     8.2.  Informative References . . . . . . . . . . . . . . . =
. . . 35=09
 	   Appendix A.  Example: Advanced Metering Infrastructure . . . =
. . . 49=09
 	     A.1.  How to structure a network . . . . . . . . . . . . . =
. . . 51=09
 	       A.1.1.  HAN Routing  . . . . . . . . . . . . . . . . . . =
. . . 53=09
 	       A.1.2.  HAN Security . . . . . . . . . . . . . . . . . . =
. . . 53=09
 	     A.2.  Model 1: AMI with separated domains  . . . . . . . . =
. . . 54=09
 	     A.3.  Model 2: AMI with neighborhood access to the home  . =
. . . 55=09
 	     A.4.  Model 3: Collector is an IP router . . . . . . . . . =
. . . 56=09
 	   Authors' Addresses . . . . . . . . . . . . . . . . . . . . . =
. . . 57=09
 	=09
1.  Introduction	 	1.  Introduction=09
 	=09
   This document provides Smart Grid designers with advice on how to	 =
	   This document provides Smart Grid designers with advice on =
how to=09
   best "profile" the Internet Protocol Suite (IPS) for use on with	 =
	   best "profile" the Internet Protocol Suite (IPS) for use on =
with=09
   Smart Grids.  It provides an overview of the IPS and the key	 	 =
  Smart Grids.  It provides an overview of the IPS and the key=09
   protocols that are critical in integrating Smart Grid devices into an	=
 	   protocols that are critical in integrating Smart Grid devices =
into an=09
   IP-based infrastructure.	 	   IP-based infrastructure.=09
 	=09
   The IPS provides options for several key architectural components.	 =
	   The IPS provides options for several key architectural =
components.=09
 	=09
skipping to change at page 4, line 45		skipping to change at =
page 4, line 45=09
 	=09
   o  IPv6 Node Requirements [RFC4294],	 	   o  IPv6 Node =
Requirements [RFC4294],=09
 	=09
   At this writing, RFC 4294 is in the process of being updated, in	 =
	   At this writing, RFC 4294 is in the process of being updated, =
in=09
   [I-D.ietf-6man-node-req-bis].	 	   =
[I-D.ietf-6man-node-req-bis].=09
 	=09
   This document is intended to provide Smart Grid architects and	 =
	   This document is intended to provide Smart Grid architects =
and=09
   designers with a compendium of relevant RFCs (and to some extent	 =
	   designers with a compendium of relevant RFCs (and to some =
extent=09
   Internet Drafts), and is organized as an annotated list of RFCs.  To	 =
	   Internet Drafts), and is organized as an annotated list of =
RFCs.  To=09
   that end, the remainder of this document is organized as follows:	 =
	   that end, the remainder of this document is organized as =
follows:=09
   Section 2 describes the Internet Architecture and its protocol suite.	=
 	                                                                 =
        =09
   Section 3 outlines the set of protocols that will be useful in Smart	 =
	   o  Section 2 describes the Internet Architecture and its =
protocol=09
   Grid deployment.  Finally, Section 4 provides an overview of the	 =
	      suite.=09
   business architecture embodied in the design and deployment of the	 =
	                                                                 =
        =09
   IPS.	 	   o  Section 3 outlines the set of protocols that will =
be useful in=09
 	      Smart Grid deployment.=09
 	                                                                 =
        =09
 	   o  Finally, Section 4 provides an overview of the business=09
 	      architecture embodied in the design and deployment of the =
IPS.=09
 	=09
2.  The Internet Protocol Suite	 	2.  The Internet Protocol Suite=09=

 	=09
   Before enumerating the list of Internet protocols relevant to Smart	 =
	   Before enumerating the list of Internet protocols relevant to =
Smart=09
   Grid, we discuss the layered architecture of the IPS, the functions	 =
	   Grid, we discuss the layered architecture of the IPS, the =
functions=09
   of the various layers, and their associated protocols.	 	 =
  of the various layers, and their associated protocols.=09
 	=09
2.1.  Internet Protocol Layers	 	2.1.  Internet Protocol Layers=09=

 	=09
   While Internet architecture uses the definitions and language similar	=
 	   While Internet architecture uses the definitions and language =
similar=09
 	=09
skipping to change at page 8, line 49		skipping to change at =
page 8, line 49=09
   At the lowest layer of the IP architecture, data is encoded in	 =
	   At the lowest layer of the IP architecture, data is encoded =
in=09
   messages and transmitted over the physical media.  While the IETF	 =
	   messages and transmitted over the physical media.  While the =
IETF=09
   specifies algorithms for carrying IPv4 and IPv6 various media types,	 =
	   specifies algorithms for carrying IPv4 and IPv6 various media =
types,=09
   it rarely actually defines the media - it happily uses specifications	=
 	   it rarely actually defines the media - it happily uses =
specifications=09
   from IEEE, ITU, and other sources.	 	   from IEEE, ITU, and =
other sources.=09
 	=09
2.2.  Security issues	 	2.2.  Security issues=09
 	=09
   While it is popular to complain about the security of the Internet,	 =
	   While it is popular to complain about the security of the =
Internet,=09
   solutions to many Internet security problems already exist but have	 =
	   solutions to many Internet security problems already exist =
but have=09
   not been widely deployed.  Internet security solutions attempt to	 =
	   either not been widely deployed, may impact critical =
performance=09
   mitigate a set of known threats at a specified cost; addressing	 =
	   criteria, or require security measures outside the IPS.  =
Internet=09
   security issues requires first a threat analysis and assessment and a	=
 	   security solutions attempt to mitigate a set of known threats =
within=09
   set of mitigations appropriate to the threats.  Since we have threats	=
 	   the IPS domain at a specified cost; addressing security =
issues=09
   at every layer, we should expect to find mitigations at every layer.	 =
	   requires first a threat analysis and assessment and a set of=09=

 	   mitigations appropriate to the threats.  Since we have =
threats at=09
 	   every layer, we should expect to find mitigations at every =
layer.=09
 	=09
2.2.1.  Physical security	 	2.2.1.  Physical security=09
 	=09
   At the physical and data link layers, threats generally center on	 =
	   At the physical and data link layers, threats generally =
center on=09
   physical attacks on the network - the effects of backhoes,	 	 =
  physical attacks on the network - the effects of backhoes,=09
   deterioration of physical media, and various kinds of environmental	 =
	   deterioration of physical media, and various kinds of =
environmental=09
   noise.  Radio-based networks are subject to signal fade due to	 =
	   noise.  Radio-based networks are subject to signal fade due =
to=09
   distance, interference, and environmental factors; it is widely noted	=
 	   distance, interference, and environmental factors; it is =
widely noted=09
   that IEEE 802.15.4 networks frequently place a metal ground plate	 =
	   that IEEE 802.15.4 networks frequently place a metal ground =
plate=09
   between the meter and the device that manages it.  Fiber was at one	 =
	   between the meter and the device that manages it.  Fiber was =
at one=09
 	=09
skipping to change at page 9, line 26		skipping to change at =
page 9, line 28=09
   learned to tap it by bending the fiber and collecting incidental	 =
	   learned to tap it by bending the fiber and collecting =
incidental=09
   light, and we have learned about backhoes.  As a result, some	 =
	   light, and we have learned about backhoes.  As a result, some=09=

   installations encase fiber optic cable in a pressurized sheath, both	 =
	   installations encase fiber optic cable in a pressurized =
sheath, both=09
   to quickly identify the location of a cut and to make it more	 =
	   to quickly identify the location of a cut and to make it more=09=

   difficult to tap.	 	   difficult to tap.=09
 	=09
   While there are protocol behaviors that can detect certain classes of	=
 	   While there are protocol behaviors that can detect certain =
classes of=09
   physical faults, such as keep-alive exchanges, physical security is	 =
	   physical faults, such as keep-alive exchanges, physical =
security is=09
   generally not considered to be a protocol problem.	 	   =
generally not considered to be a protocol problem.=09
 	=09
2.2.2.  Session identification	 	2.2.2.  Session Authentication=09=

 	=09
   At the transport and application layers and in lower layer networks	 =
	   At the transport and application layers and in lower layer =
networks=09
   where dynamic connectivity such as ATM Switched Virtual Circuits	 =
	   where dynamic connectivity such as ATM Switched Virtual =
Circuits=09
   (SVCs) or "dial" connectivity are in use, there tend to be several	 =
	   (SVCs) or "dial" connectivity are in use, there tend to be =
several=09
   different classes of authentication/authorization requirements.  The	 =
	   different classes of authentication/authorization =
requirements.  The=09
   basic requirements that must be satisfied are:	 	   basic =
requirements that must be satisfied are:=09
 	=09
   1.  Verify that peers are appropriate partners; this generally means	 =
	   1.  Verify that peers are appropriate partners; this =
generally means=09
       knowing "who" they are and that they have a "need to know" or are	=
 	       knowing "who" they are and that they have a "need to =
know" or are=09
       trusted sources.	 	       trusted sources.=09
 	=09
skipping to change at page 10, line 9		skipping to change at =
page 10, line 11=09
       against modification attacks.	 	       against =
modification attacks.=09
 	=09
   In other words, both the communications channel itself and message	 =
	   In other words, both the communications channel itself and =
message=09
   exchanges (both by knowing the source of the information and to have	 =
	   exchanges (both by knowing the source of the information and =
to have=09
   proof of its validity) must be secured.  Three examples suffice to	 =
	   proof of its validity) must be secured.  Three examples =
suffice to=09
   illustrate the challenges.	 	   illustrate the challenges.=09
 	=09
   One common attack against a TCP session is to bombard the session	 =
	   One common attack against a TCP session is to bombard the =
session=09
   with reset messages.  Other attacks against TCP include the "SYN	 =
	   with reset messages.  Other attacks against TCP include the =
"SYN=09
   flooding" attack, in which an attacker attempts to exhaust the memory	=
 	   flooding" attack, in which an attacker attempts to exhaust =
the memory=09
   of the target by creating TCP state.  Experience has shown that by	 =
	   of the target by creating TCP state.  In particular, the =
attacker=09
   including information in the transport header or a related protocol	 =
	   attempts to exhaust the target's memory by opening a large =
number of=09
   like the IPsec (Section 3.1.2) or TLS (Section 3.1.3), a host can	 =
	   unique TCP connections, each of which is represented by a=09
   identify legitimate messages and discard mitigate any damage that may	=
 	   Transmission Control Block (TCB).  The attack is successful =
if the=09
   have been caused by the attack.	 	   attacker can cause =
the target to fill its memory with TCBs.=09
 	   Experience has shown that by including information in the =
transport=09
 	   header or a related protocol like the IPsec (Section 3.1.2) =
or TLS=09
 	   (Section 3.1.3), a host can identify legitimate messages and =
discard=09
 	   the others, thus mitigating any damage that may have been =
caused by=09
 	   the attack.=09
 	=09
   Another common attack involves unauthorized communication with a	 =
	   Another common attack involves unauthorized communication =
with a=09
   router or a service.  For example, an unauthorized party might try to	=
 	   router or a service.  For example, an unauthorized party =
might try to=09
   join the routing system.  To protect against such attacks, an	 =
	   join the routing system.  To protect against such attacks, an=09=

   Internet Service Provider (ISP) should not accept information from	 =
	   Internet Service Provider (ISP) should not accept information =
from=09
   new peers without verifying that the peer is who it claims to be and	 =
	   new peers without verifying that the peer is who it claims to =
be and=09
   that the peer is authorized to carry on the exchange of information.	 =
	   that the peer is authorized to carry on the exchange of =
information.=09
 	=09
   More generally, in order to secure a communications channel, it must	 =
	   More generally, in order to secure a communications channel, =
it must=09
   be possible to verify that messages putatively received from a peer	 =
	   be possible to verify that messages putatively received from =
a peer=09
 	=09
skipping to change at page 11, line 7		skipping to change at =
page 11, line 11=09
   there frequently a requirement for confidentiality.  Confidentiality	 =
	   there frequently a requirement for confidentiality.  =
Confidentiality=09
   arises at several layers, sometimes simultaneously.  For example,	 =
	   arises at several layers, sometimes simultaneously.  For =
example,=09
   providers of credit card transaction services want application layer	 =
	   providers of credit card transaction services want =
application layer=09
   privacy, which can be supplied by encrypting application data or by	 =
	   privacy, which can be supplied by encrypting application data =
or by=09
   an encrypted transport layer.  If an ISP (or other entity) wants to	 =
	   an encrypted transport layer.  If an ISP (or other entity) =
wants to=09
   hide its network structure, it can to encrypt the network layer	 =
	   hide its network structure, it can to encrypt the network =
layer=09
   header.	 	   header.=09
 	=09
2.3.  Network Infrastructure	 	2.3.  Network Infrastructure=09
 	=09
   While these are not critical to the design of a specific system, they	=
 	   While the following protocols are not critical to the design =
of a=09
   are important to running a network, and as such are surveyed here.	 =
	   specific system, they are important to running a network, and =
as such=09
 	   are surveyed here.=09
 	=09
2.3.1.  Domain Name System (DNS)	 	2.3.1.  Domain Name =
System (DNS)=09
 	=09
   The DNS' main function is translating names to numeric IP addresses.	 =
	   The DNS' main function is translating names to numeric IP =
addresses.=09
   While this is not critical to running a network, certain functions	 =
	   While this is not critical to running a network, certain =
functions=09
   are made a lot easier if numeric addresses can be replaced with	 =
	   are made a lot easier if numeric addresses can be replaced =
with=09
   mnemonic names.  This facilitates renumbering of networks and	 =
	   mnemonic names.  This facilitates renumbering of networks and=09=

   generally improves the manageability and serviceability of the	 =
	   generally improves the manageability and serviceability of =
the=09
   network.  DNS has a set of security extensions called DNSSEC, which	 =
	   network.  DNS has a set of security extensions called DNSSEC, =
which=09
   can be used to provide strong cryptographic authentication to that	 =
	   can be used to provide strong cryptographic authentication to =
the=09
   protocol.  DNS and DNSSEC are discussed further in Section 3.4.1.	 =
	   DNS.  DNS and DNSSEC are discussed further in Section 3.4.1.=09=

 	=09
2.3.2.  Network Management	 	2.3.2.  Network Management=09
 	=09
   Network management has proven to be a difficult problem.  As such,	 =
	   Network management has proven to be a difficult problem.  As =
such,=09
   various solutions have been proposed, implemented, and deployed.	 =
	   various solutions have been proposed, implemented, and =
deployed.=09
   Each solution has its proponents, all of whom have solid arguments	 =
	   Each solution has its proponents, all of whom have solid =
arguments=09
   for their viewpoints.  The IETF has two major network management	 =
	   for their viewpoints.  The IETF has two major network =
management=09
   solutions for device operation: SNMP, which is ASN.1-encoded and is	 =
	   solutions for device operation: SNMP, which is ASN.1-encoded =
and is=09
   primarily used for monitoring of system variables and is a polled	 =
	   primarily used for monitoring of system variables and is a =
polled=09
   architecture, and NetConf [RFC4741], which is XML-encoded and	 =
	   architecture, and NetConf [RFC4741], which is XML-encoded and=09=

 	=09
skipping to change at page 11, line 47		skipping to change at =
page 12, line 5=09
   While the IP Protocol Suite does not have specific solutions for	 =
	   While the IP Protocol Suite does not have specific solutions =
for=09
   secure provisioning and configuration, these problems have been	 =
	   secure provisioning and configuration, these problems have =
been=09
   solved using IP protocols in specifications such as DOCSIS 3.0	 =
	   solved using IP protocols in specifications such as DOCSIS =
3.0=09
   [SP-MULPIv3.0].	 	   [SP-MULPIv3.0].=09
 	=09
3.  Specific protocols	 	3.  Specific protocols=09
 	=09
   In this section, having briefly laid out the IP architecture and some	=
 	   In this section, having briefly laid out the IP architecture =
and some=09
   of the problems that the architecture tries to address, we introduce	 =
	   of the problems that the architecture tries to address, we =
introduce=09
   specific protocols that might be appropriate to various Smart Grid	 =
	   specific protocols that might be appropriate to various Smart =
Grid=09
   use cases.  Use cases should be analyzed along privacy, AAA,	 	 =
  use cases.  Use cases should be analyzed along privacy,=09
   transport and network solution dimensions.  The following sections	 =
	   Authentication, Authorization, and Accounting (AAA), =
transport and=09
   provide guidance for such analyzes.	 	   network solution =
dimensions.  The following sections provide guidance=09
 	   for such analyzes.=09
 	=09
3.1.  Security solutions	 	3.1.  Security solutions=09
 	=09
   As noted, a key consideration in security solutions is a good threat	 =
	   As noted, a key consideration in security solutions is a good =
threat=09
   analysis coupled with appropriate mitigation strategies at each	 =
	   analysis coupled with appropriate mitigation strategies at =
each=09
   layer.  The following sections outline the security features of the	 =
	   layer.  The following sections outline the security features =
of the=09
   IPS.	 	   IPS.=09
 	=09
3.1.1.  Session identification, authentication, authorization, and	 =
	3.1.1.  Session identification, authentication, authorization, =
and=09
        accounting	 	        accounting=09
 	=09
skipping to change at page 12, line 34		skipping to change at =
page 12, line 39=09
 	=09
   The Security Architecture for the Internet Protocol (IPsec) [RFC4301]	=
 	   The Security Architecture for the Internet Protocol (IPsec) =
[RFC4301]=09
   is a set of control and data protocols that are implemented between	 =
	   is a set of control and data protocols that are implemented =
between=09
   IPv4 and the chosen transport layer, or in IPv6's security extension	 =
	   IPv4 and the chosen transport layer, or in IPv6's security =
extension=09
   header.  It allows transport layer sessions to communicate in a way	 =
	   header.  It allows transport layer sessions to communicate in =
a way=09
   that is designed to prevent eavesdropping, tampering, or message	 =
	   that is designed to prevent eavesdropping, tampering, or =
message=09
   forgery.  As is typical with IETF specifications, the architecture is	=
 	   forgery.  As is typical with IETF specifications, the =
architecture is=09
   spelled out in a number of documents which specify the specific	 =
	   spelled out in a number of documents which specify the =
specific=09
   components: the IP Authentication Header (AH) [RFC4302] Encapsulating	=
 	   components: the IP Authentication Header (AH) [RFC4302] =
Encapsulating=09
   Security Payload (ESP) [RFC4303], Internet Key Exchange (IKEv2)	 =
	   Security Payload (ESP) [RFC4303], Internet Key Exchange =
(IKEv2)=09
   [RFC4306], Cryptographic Algorithms [RFC4307], Cryptographic	 	 =
  [RFC5996], Cryptographic Algorithms [RFC4307], Cryptographic=09
   Algorithm Implementation Requirements for ESP and AH [RFC4835], and	 =
	   Algorithm Implementation Requirements for ESP and AH =
[RFC4835], and=09
   the use of Advanced Encryption Standard (AES) [RFC4309].	 	 =
  the use of Advanced Encryption Standard (AES) [RFC4309].=09
 	=09
   IPsec provides two modes: Transport mode and tunnel mode.  In	 =
	   IPsec provides two modes: Transport mode and tunnel mode.  In=09=

   transport mode, IPsec ESP encrypts the transport layer and the	 =
	   transport mode, IPsec ESP encrypts the transport layer and =
the=09
   application data.  In tunnel mode, the source IP datagram is	 	 =
  application data.  In tunnel mode, the source IP datagram is=09
   encrypted and encapsulated in a second IP header addressed to the	 =
	   encrypted and encapsulated in a second IP header addressed to =
the=09
   intended decryptor.  As might be expected, tunnel mode is frequently	 =
	   intended decryptor.  As might be expected, tunnel mode is =
frequently=09
   used for virtual private networks which need to securely transmit	 =
	   used for virtual private networks which need to securely =
transmit=09
   data across networks with unknown (or no) other security properties.	 =
	   data across networks with unknown (or no) other security =
properties.=09
   In both cases, authentication, authorization, and confidentiality	 =
	   In both cases, authentication, authorization, and =
confidentiality=09
   extend from system to system, and apply to all applications that the	 =
	   extend from system to system, and apply to all applications =
that the=09
   two systems use.	 	   two systems use.=09
 	=09
 	   Note that IPsec can provide non-repudiation when an =
asymmetric=09
 	   authentication algorithm is used with the AH header and both =
sender=09
 	   and receiver keys are used in the authentication calculation.=09=

 	   However, the default authentication algorithm is keyed MD5, =
which=09
 	   like all symmetric algorithms cannot provide non-repudiation =
by=09
 	   itself (since the sender's key is not used in the =
computation).  So=09
 	   while IPsec provides a means of authenticating network level =
objects=09
 	   (packets), these objects are are ephemeral and not directly=09=

 	   correlated with a particular application.  As a result non-=09=

 	   repudiation is not generally applicable to network level =
objects such=09
 	   as packets.=09
 	                                                                 =
        =09
3.1.3.  Transport Layer Security (TLS)	 	3.1.3.  Transport Layer =
Security (TLS)=09
 	=09
   Transport Layer Security [RFC5246] and Datagram Transport Layer	 =
	   Transport Layer Security [RFC5246] and Datagram Transport =
Layer=09
   Security [RFC4347][I-D.ietf-tls-rfc4347-bis] are mechanisms that	 =
	   Security [RFC4347][I-D.ietf-tls-rfc4347-bis] are mechanisms =
that=09
   travel within the transport layer protocol data unit, meaning that	 =
	   travel within the transport layer protocol data unit, meaning =
that=09
   they readily traverse network address translators and secure the	 =
	   they readily traverse network address translators and secure =
the=09
   information exchanges without securing the datagrams exchanged or the	=
 	   information exchanges without securing the datagrams =
exchanged or the=09
   transport layer itself.  Each allows client/server applications to	 =
	   transport layer itself.  Each allows client/server =
applications to=09
   communicate in a way that is designed to prevent eavesdropping,	 =
	   communicate in a way that is designed to prevent =
eavesdropping,=09
   tampering, or message forgery.  Authentication, authorization, and	 =
	   tampering, or message forgery.  Authentication, =
authorization, and=09
   confidentiality exist for a session between specific applications.	 =
	   confidentiality exist for a session between specific =
applications.=09
 	=09
   When used in conjunction with IEEE 802.1X [IEEE802.1X], EAP-TLS	 =
	   In order to communicate securely, an TLS client and TLS =
server must=09
   [RFC5216] is widely considered to offer excellent access security to	 =
	   agree on the cryptographic algorithms and keys that they will =
use on=09
   a wired or wireless IEEE 802 LAN (IEEE 802.1X in conjunction with	 =
	   the secured connection.  In particular, they must agree on =
these=09
   EAP-TLS is the baseline for Zigbee SEP 2.0).  Note that one potential	=
 	   items:=09
   drawback of 802.1X technology is that it requires deployment of	 =
	=09
   client-side certificates, which is frequently seen as a deployment	 =
	   o  Key Establishment Algorithm=09
   barrier.	 	=09
 	   o  Peer Authentication Algorithm=09
 	=09
 	   o  Bulk Data Encryption Algorithm and key size=09
 	=09
 	   o  Digest Algorithm=09
 	=09
 	   Since each categories has multiple options, the number of =
possible=09
 	   combinations is large.  As a result, TLS does not allow all =
possible=09
 	   combinations of choices; rather it only allows certain =
well-defined=09
 	   combinations known as Cipher Suites.  [IEC62351-3] outlines =
the use=09
 	   of different TLS Cipher Suites for use in the Smart Grid.=09
 	                                                                 =
        =09
 	   When used in conjunction with IEEE 802.1X [IEEE802.1X], both =
EAP-TLS=09
 	   [RFC5216] and the Protocol for Carrying Authentication for =
Network=09
 	   Access (PANA) [RFC5193] are widely considered to offer =
excellent=09
 	   access security to a wired or wireless IEEE 802 LAN (IEEE =
802.1X in=09
 	   conjunction with EAP-TLS is the baseline for Zigbee SEP 2.0).=09=

 	=09
3.1.4.  Secure/Multipurpose Internet Mail Extensions (S/MIME)	 	=
3.1.4.  Secure/Multipurpose Internet Mail Extensions (S/MIME)=09
 	=09
   The S/MIME [RFC2045] [RFC2046] [RFC2047] [RFC4289] [RFC2049]	 	 =
  The S/MIME [RFC2045] [RFC2046] [RFC2047] [RFC4289] [RFC2049]=09
   [RFC5750] [RFC5751] [RFC4262] specification was originally designed	 =
	   [RFC5750] [RFC5751] [RFC4262] specification was originally =
designed=09
   as an extension to SMTP Mail to provide evidence that the putative	 =
	   as an extension to SMTP Mail to provide evidence that the =
putative=09
   sender of an email message in fact sent it, and that the content	 =
	   sender of an email message in fact sent it, and that the =
content=09
   received was in fact the content that was sent.  As its name	 	 =
  received was in fact the content that was sent.  As its name=09
   suggests, by extension this is a way of securing any object that can	 =
	   suggests, by extension this is a way of securing any object =
that can=09
   be exchanged, by any means, and has become one of the most common	 =
	   be exchanged, by any means, and has become one of the most =
common=09
 	=09
skipping to change at page 15, line 19		skipping to change at =
page 16, line 6=09
      [I-D.ietf-behave-address-format]	 	      =
[I-D.ietf-behave-address-format]=09
 	=09
   o  DNS extensions [I-D.ietf-behave-dns64]	 	   o  DNS =
extensions [I-D.ietf-behave-dns64]=09
 	=09
   o  IP/ICMP Translation Algorithm [I-D.ietf-behave-v6v4-xlate]	 =
	   o  IP/ICMP Translation Algorithm [I-D.ietf-behave-v6v4-xlate]=09=

 	=09
   o  Translation from IPv6 Clients to IPv4 Servers	 	   o  =
Translation from IPv6 Clients to IPv4 Servers=09
      [I-D.ietf-behave-v6v4-xlate-stateful]	 	      =
[I-D.ietf-behave-v6v4-xlate-stateful]=09
 	=09
   As with IPv4/IPv4 Network Address Translation, translation between	 =
	   As with IPv4/IPv4 Network Address Translation, translation =
between=09
   IPv4 and IPv6 has limited real world applicability: any application	 =
	   IPv4 and IPv6 has limited real world applicability for an =
application=09
   protocol that carries IP addresses and expects them to be meaningful	 =
	   protocol which carry IP addresses in its payload and expects =
those=09
   to both client and server or to both peers will have trouble when the	=
 	   addresses to be meaningful to both client and server.  =
However, for=09
   addresses are transparently translated.  However, for those protocols	=
 	   those protocols that do not, protocol translation can provide =
a=09
   that do not, protocol translation can provide a useful network	 =
	   useful network extension.=09
   extension.	 	=09
 	=09
   Network-based translation provides for two types of services:	 =
	   Network-based translation provides for two types of services:=09=

   stateless (and therefore scalable and load-sharable) translation	 =
	   stateless (and therefore scalable and load-sharable) =
translation=09
   between IPv4 and IPv6 addresses that embed an IPv4 address in them,	 =
	   between IPv4 and IPv6 addresses that embed an IPv4 address in =
them,=09
   and stateful translation similar to IPv4/IPv4 translation between	 =
	   and stateful translation similar to IPv4/IPv4 translation =
between=09
   IPv4 addresses.  The stateless mode is straightforward to implement,	 =
	   IPv4 addresses.  The stateless mode is straightforward to =
implement,=09
   but due to the embedding, requires IPv4 addresses to be allocated to	 =
	   but due to the embedding, requires IPv4 addresses to be =
allocated to=09
   an otherwise IPv6-only network, and is primarily useful for IPv4-	 =
	   an otherwise IPv6-only network, and is primarily useful for =
IPv4-=09
   accessible servers implemented in the IPv6 network.  The stateful	 =
	   accessible servers implemented in the IPv6 network.  The =
stateful=09
   mode allows clients in the IPv6 network to access servers in the IPv4	=
 	   mode allows clients in the IPv6 network to access servers in =
the IPv4=09
   network, but does not provide such service for IPv4 clients accessing	=
 	   network, but does not provide such service for IPv4 clients =
accessing=09
   IPv6 peers or servers with general addresses; it does however have	 =
	   IPv6 peers or servers with general addresses; it does however =
have=09
   the advantage that it does not require that a unique IPv4 address be	 =
	   the advantage that it does not require that a unique IPv4 =
address be=09
   embedded in the IPv6 address of hosts using this mechanism.	 	 =
  embedded in the IPv6 address of hosts using this mechanism.=09
 	=09
 	   Finally, note that some networks site networks are IPv6 only =
while=09
 	   some transits networks are IPv4 only.  In these cases it may =
be=09
 	   necessary to tunnel IPv6 over IPv4 or translate between IPv6 =
and=09
 	   IPv4.=09
 	                                                                 =
        =09
3.2.2.  Internet Protocol Version 4	 	3.2.2.  Internet =
Protocol Version 4=09
 	=09
   IPv4 [RFC0791] and the Internet Control Message Protocol [RFC0792]	 =
	   IPv4 [RFC0791] and the Internet Control Message Protocol =
[RFC0792]=09
   comprise the IPv4 network layer.  IPv4 provides unreliable delivery	 =
	   comprise the IPv4 network layer.  IPv4 provides unreliable =
delivery=09
   of datagrams.	 	   of datagrams.=09
 	=09
   IPv4 also provides for fragmentation and reassembly of long datagrams	=
 	   IPv4 also provides for fragmentation and reassembly of long =
datagrams=09
   for transmission through networks with small Maximum Transmission	 =
	   for transmission through networks with small Maximum =
Transmission=09
   Units (MTU).  The MTU is the largest packet size that can be	 	 =
  Units (MTU).  The MTU is the largest packet size that can be=09
   delivered across the network.  In addition, the IPS provides the	 =
	   delivered across the network.  In addition, the IPS provides =
the=09
 	=09
skipping to change at page 16, line 15		skipping to change at =
page 17, line 6=09
   IPv4 originally supported an experimental type of service field that	 =
	   IPv4 originally supported an experimental type of service =
field that=09
   identified eight levels of operational precedence styled after the	 =
	   identified eight levels of operational precedence styled =
after the=09
   requirements of military telephony, plus three and later four bit	 =
	   requirements of military telephony, plus three and later four =
bit=09
   flags that OSI IS-IS for IPv4 (IS-IS) [RFC1195] and OSPF Version 2	 =
	   flags that OSI IS-IS for IPv4 (IS-IS) [RFC1195] and OSPF =
Version 2=09
   [RFC2328] interpreted as control traffic; this control traffic is	 =
	   [RFC2328] interpreted as control traffic; this control =
traffic is=09
   assured of not being dropped when queued or upon receipt even if	 =
	   assured of not being dropped when queued or upon receipt even =
if=09
   other traffic is being dropped..  These control bits turned out to be	=
 	   other traffic is being dropped..  These control bits turned =
out to be=09
   less useful than the designers had hoped.  They were replaced by the	 =
	   less useful than the designers had hoped.  They were replaced =
by the=09
   Differentiated Services Architecture [RFC2474][RFC2475], which	 =
	   Differentiated Services Architecture [RFC2474][RFC2475], =
which=09
   contains a six bit code point used to select an algorithm (a "per-hop	=
 	   contains a six bit code point used to select an algorithm (a =
"per-hop=09
   behavior") to be applied to the datagram.	 	   behavior") to =
be applied to the datagram.  The IETF has also produced=09
 	   a set of Configuration Guidelines for DiffServ Service =
Classes=09
 	   [RFC4594], which describes a set of service classes that may =
be=09
 	   useful to a network operator.=09
 	=09
3.2.2.1.  IPv4 Address Allocation and Assignment	 	3.2.2.1. =
 IPv4 Address Allocation and Assignment=09
 	=09
   IPv4 addresses are administratively assigned, usually using automated	=
 	   IPv4 addresses are administratively assigned, usually using =
automated=09
   methods, and assigned using the Dynamic Host Configuration Protocol	 =
	   methods, and assigned using the Dynamic Host Configuration =
Protocol=09
   (DHCP) [RFC2131].  On most interface types, neighboring equipment	 =
	   (DHCP) [RFC2131].  On most interface types, neighboring =
equipment=09
   identify each other's addresses using Address Resolution Protocol	 =
	   identify each other's addresses using Address Resolution =
Protocol=09
   (ARP) [RFC0826].	 	   (ARP) [RFC0826].=09
 	=09
3.2.2.2.  IPv4 Unicast Routing	 	3.2.2.2.  IPv4 Unicast Routing=09=

 	=09
skipping to change at page 20, line 41		skipping to change at =
page 21, line 32=09
   can be used in other forms of ad hoc networks.  It provides arbitrary	=
 	   can be used in other forms of ad hoc networks.  It provides =
arbitrary=09
   connectivity between device within a distributed subnet.  As with	 =
	   connectivity between device within a distributed subnet.  As =
with=09
   protocols designed for wired networks, routing is calculated and	 =
	   protocols designed for wired networks, routing is calculated =
and=09
   maintained whenever changes are detected, and maintained in each	 =
	   maintained whenever changes are detected, and maintained in =
each=09
   router's tables.  The set of nodes that operate as routers within the	=
 	   router's tables.  The set of nodes that operate as routers =
within the=09
   subnet, however, are fairly fluid, and dependent on this	 	 =
  subnet, however, are fairly fluid, and dependent on this=09
   instantaneous topology of the subnet.	 	   instantaneous =
topology of the subnet.=09
 	=09
3.2.4.7.  Routing for Low power and Lossy Networks	 	3.2.4.7. =
 Routing for Low power and Lossy Networks=09
 	=09
   The RPL: IPv6 Routing Protocol for Low power and Lossy Networks	 =
	   The IPv6 Routing Protocol for Low power and Lossy Networks =
(RPL)=09
   [I-D.ietf-roll-rpl] xxx	 	   [I-D.ietf-roll-rpl] is a =
reactive routing protocol designed for use=09
 	   in resource constrained networks.  Requirements for resource=09=

 	   constrained networks are defined in [RFC5548], [RFC5673], =
[RFC5826],=09
 	   and [RFC5867].=09
 	=09
 	   Briefly, a constrained network is comprised of nodes that:=09
 	=09
 	   o  Are built with limited processing power and memory, and =
sometimes=09
 	      energy when operating on batteries.=09
 	=09
 	   o  Are interconnected through a low-data-rate network =
interface and=09
 	      potentially vulnerable to communication instability and =
low packet=09
 	      delivery rates.=09
 	=09
 	   o  Potentially have a mix of roles such as being able to act =
as a=09
 	      host (i.e., generating traffic) and/or a router (i.e., =
both=09
 	      forwarding and generating RPL traffic).=09
 	=09
3.2.5.  IPv6 Multicast Forwarding and Routing	 	3.2.5.  IPv6 =
Multicast Forwarding and Routing=09
 	=09
   IPv6 specifies both unicast and multicast datagram exchange.  This	 =
	   IPv6 specifies both unicast and multicast datagram exchange.  =
This=09
   uses the Multicast Listener Discovery Protocol (MLDv2) [RFC2710]	 =
	   uses the Multicast Listener Discovery Protocol (MLDv2) =
[RFC2710]=09
   [RFC3590] [RFC3810] [RFC4604] to enable applications to join	 	 =
  [RFC3590] [RFC3810] [RFC4604] to enable applications to join=09
   multicast groups, and for most applications uses Source-Specific	 =
	   multicast groups, and for most applications uses =
Source-Specific=09
   Multicast [RFC4607] for routing and delivery of multicast messages.	 =
	   Multicast [RFC4607] for routing and delivery of multicast =
messages.=09
 	=09
   The mechanisms experimentally developed for reliable multicast in	 =
	   The mechanisms experimentally developed for reliable =
multicast in=09
   IPv4, discussed in Section 3.2.2.3, can be used in IPv6 as well.	 =
	   IPv4, discussed in Section 3.2.2.3, can be used in IPv6 as =
well.=09
 	=09
3.2.5.1.  Protocol-Independent Multicast Routing	 	3.2.5.1. =
 Protocol-Independent Multicast Routing=09
 	=09
   xxx Protocol Independent Multicast - Dense Mode (PIM-DM): Protocol	 =
	   A multicast routing protocol has two basic functions: =
Building the=09
   Specification (Revised) [RFC3973] xxx Protocol Independent Multicast	 =
	   multicast distribution tree and forwarding multicast traffic.=09=

 	   Multicast routing protocols generally contain a control plane =
for=09
 	   building distribution trees, and a forwarding plane that uses =
the=09
 	   distribution tree when forwarding multicast traffic.=09
 	=09
 	   A the highest level, the multicast model works as follows: =
hosts=09
 	   express their interest in receiving multicast traffic from a =
source=09
 	   by sending a Join message to their first hop router.  That =
router in=09
 	   turn sends a Join message upstream towards the root of the =
tree,=09
 	   grafting the router (leaf node) onto the distribution tree =
for the=09
 	   group.  Data is delivered down the tree toward the leaf =
nodes, which=09
 	   forward it onto the local network for delivery.=09
 	=09
 	   The initial multicast model deployed in the Internet was =
known as=09
 	   Any-Source Multicast (ASM).  In the ASM model any host could =
send to=09
 	   the group, and inter-domain multicast was difficult.  =
Protocols such=09
 	   as Protocol Independent Multicast - Dense Mode (PIM-DM): =
Protocol=09
 	   Specification (Revised) [RFC3973] and Protocol Independent =
Multicast=09
   - Sparse Mode (PIM-SM): Protocol Specification (Revised) [RFC4601]	 =
	   - Sparse Mode (PIM-SM): Protocol Specification (Revised) =
[RFC4601]=09
   xxx Source-Specific Multicast (SSM) [RFC3569] xxx Source-Specific	 =
	   were designed for the ASM model.=09
   Protocol Independent Multicast [RFC4608] xxx Authentication and	 =
	=09
   Confidentiality in Protocol Independent Multicast Sparse Mode	 =
	   Many modern multicast deployments use Source-Specific =
Multicast (PIM-=09
   (PIM-SM) Link-Local Messages [RFC5796] xxx	 	   SSM) =
[RFC3569][RFC4608].  In the SSM model, a host expresses interest=09
 	   in a "channel", which is comprised of a source (S) and a =
group (G).=09
 	   Distribution tress are rooted the sending host (called an =
"(S,G)=09
 	   tree").  Since only the source S can send on to the group, =
SSM has=09
 	   inherent anti-jamming capability.  In addition, inter-domain=09=

 	   multicast is simplified since it is the responsibility of the=09=

 	   receivers (rather than the network) to find the (S,G) channel =
they=09
 	   are interested in receiving.  This implies that SSM requires =
some=09
 	   form of directory service so that receivers can find the =
(S,G)=09
 	   channels.=09
 	=09
3.2.6.  Adaptation to lower layer networks and link layer protocols	 =
	3.2.6.  Adaptation to lower layer networks and link layer =
protocols=09
 	=09
   In general, the layered architecture of the Internet enables the IPS	 =
	   In general, the layered architecture of the Internet enables =
the IPS=09
   to run over any appropriate layer two architecture.  The ability to	 =
	   to run over any appropriate layer two architecture.  The =
ability to=09
   change the link or physical layer without having to rethink the	 =
	   change the link or physical layer without having to rethink =
the=09
   network layer, transports, or applications has been a great benefit	 =
	   network layer, transports, or applications has been a great =
benefit=09
   in the Internet.	 	   in the Internet.=09
 	=09
   Examples of link layer adaptation technology include:	 	 =
  Examples of link layer adaptation technology include:=09
 	=09
skipping to change at page 24, line 40		skipping to change at =
page 26, line 25=09
   [RFC2131] or DHCPv6 [RFC3315].  The best argument for the use of	 =
	   [RFC2131] or DHCPv6 [RFC3315].  The best argument for the use =
of=09
   autoconfiguration is a large number of systems that require little	 =
	   autoconfiguration is a large number of systems that require =
little=09
   more than a random number as an address; the argument for DHCP is	 =
	   more than a random number as an address; the argument for =
DHCP is=09
   administrative control.	 	   administrative control.=09
 	=09
   There are other parameters that may need to be allocated to hosts	 =
	   There are other parameters that may need to be allocated to =
hosts=09
   which require administrative configuration; examples include the	 =
	   which require administrative configuration; examples include =
the=09
   addresses of DNS servers, keys for Secure DNS and Network Time	 =
	   addresses of DNS servers, keys for Secure DNS and Network =
Time=09
   servers.	 	   servers.=09
 	=09
3.5.  Service and Resource Discovery	 	3.4.3.  Network Time=09
 	=09
 	   The Network Time Protocol was originally designed by Dave =
Mills of=09
 	   the University of Delaware and CSNET, for the purpose of =
implementing=09
 	   a temporal metric in the Fuzzball Routing Protocol and =
generally=09
 	   coordinating time experiments.  The current versions of the =
time=09
 	   protocol are the Network Time Protocol [RFC5905].=09
 	                                                                 =
        =09
 	3.5.  Network Management=09
 	=09
 	   The IETF has developed two protocols for network management: =
SNMP and=09
 	   NETCONF.  SNMP is discussed in Section 3.5.1, and NETCONF is=09=

 	   discussed in Section 3.5.2.=09
 	=09
 	3.5.1.  Simple Network Management Protocol (SNMP)=09
 	=09
 	   The Simple Network Management Protocol, originally specified =
in the=09
 	   late 1980's and having passed through several revisions, is =
specified=09
 	   in several documents:=09
 	=09
 	   o  An Architecture for Describing Simple Network Management =
Protocol=09
 	      (SNMP) Management Frameworks [RFC3411]=09
 	=09
 	   o  Message Processing and Dispatching [RFC3412]=09
 	=09
 	   o  SNMP Applications [RFC3413]=09
 	   o  User-based Security Model (USM) for SNMP version 3 =
[RFC3414]=09
 	=09
 	   o  View-based Access Control Model (VACM) [RFC3415]=09
 	=09
 	   o  Version 2 of the SNMP Protocol Operations [RFC3416]=09
 	=09
 	   o  Transport Mappings [RFC3417]=09
 	=09
 	   o  Management Information Base (MIB) [RFC3418]=09
 	=09
 	   It provides capabilities for polled and event-driven =
activities, and=09
 	   for both monitoring and configuration of systems in the =
field.=09
 	   Historically, it has been used primarily for monitoring nodes =
in a=09
 	   network.  Messages and their constituent data are encoded =
using a=09
 	   profile of ASN.1.=09
 	=09
 	3.5.2.  Network Configuration (NETCONF) Protocol=09
 	=09
 	   The NETCONF Configuration Protocol is specified in one basic=09=

 	   document, with supporting documents for carrying it over the =
IPS.=09
 	   These documents include:=09
 	=09
 	   o  NETCONF Configuration Protocol [RFC4741]=09
 	=09
 	   o  Using the NETCONF Configuration Protocol over Secure SHell =
(SSH)=09
 	      [RFC4742]=09
 	=09
 	   o  Using NETCONF over the Simple Object Access Protocol =
(SOAP)=09
 	      [RFC4743]=09
 	=09
 	   o  Using the NETCONF Protocol over the Blocks Extensible =
Exchange=09
 	      Protocol (BEEP) [RFC4744]=09
 	=09
 	   o  NETCONF Event Notifications [RFC5277]=09
 	=09
 	   o  NETCONF over Transport Layer Security (TLS) [RFC5539]=09
 	=09
 	   o  Partial Lock Remote Procedure Call (RPC) for NETCONF =
[RFC5717]=09
 	=09
 	   NETCONF was developed in response to operator requests for a =
common=09
 	   configuration protocol based on ASCII text as opposed to =
ASN.1.  In=09
 	   essence, it carries XML-encoded remote procedure call (RPC) =
data.  In=09
 	   response to Smart Grid requirements, there is consideration =
of a=09
 	   variant of the protocol that could be used for polled and =
event-=09
 	   driven management activities, and for both monitoring and=09
 	   configuration of systems in the field.=09
 	=09
 	3.6.  Service and Resource Discovery=09
 	=09
   Service and resource discovery are among the most important protocols	=
 	   Service and resource discovery are among the most important =
protocols=09
   for constrained resource self-organizing networks.  These include	 =
	   for constrained resource self-organizing networks.  These =
include=09
   various sensor networks as well as the Home Area Networks (HANs),	 =
	   various sensor networks as well as the Home Area Networks =
(HANs),=09
   Building Area Networks (BANs) and Field Area Networks (FANs)	 	 =
  Building Area Networks (BANs) and Field Area Networks (FANs)=09
   envisioned by Smart Grid architects.	 	   envisioned by Smart =
Grid architects.=09
 	=09
3.5.1.  Service Discovery	 	3.6.1.  Service Discovery=09
 	=09
   Service discovery protocols are designed for the automatic	 	 =
  Service discovery protocols are designed for the automatic=09
   configuration and detection of devices, and the services offered by	 =
	   configuration and detection of devices, and the services =
offered by=09
   the discovered devices.  In many cases service discovery is performed	=
 	   the discovered devices.  In many cases service discovery is =
performed=09
   by so-called "constrained resource" devices (i.e., those with limited	=
 	   by so-called "constrained resource" devices (i.e., those with =
limited=09
   processing power, memory, and power resources).	 	   =
processing power, memory, and power resources).=09
 	=09
   In general, service discovery is concerned with the assignment of	 =
	   In general, service discovery is concerned with the =
resolution and=09
   network addresses (perhaps via Stateless Address Autoconfiguration	 =
	   distribution of hostnames via multicast DNS=09
   [RFC4862]), resolution and distribution of hostnames via multicast	 =
	   [I-D.cheshire-dnsext-multicastdns] and the automatic location =
of=09
   DNS [I-D.cheshire-dnsext-multicastdns] and the automatic location of	 =
	=09
   network services via DHCP (Section 3.4.2), the DNS Service Discovery	 =
	   network services via DHCP (Section 3.4.2), the DNS Service =
Discovery=09
   (DNS-SD) [I-D.cheshire-dnsext-dns-sd] (part of Apple's Bonjour	 =
	   (DNS-SD) [I-D.cheshire-dnsext-dns-sd] (part of Apple's =
Bonjour=09
   technology), and the Service Location Protocol (SLP) [RFC2608].	 =
	   technology) and the Service Location Protocol (SLP) =
[RFC2608].=09
 	=09
3.5.2.  Resource     Discovery	 	3.6.2.  Resource Discovery=09
 	=09
   Resource Discovery is concerned with the discovery resources offered	 =
	   Resource Discovery is concerned with the discovery of =
resources=09
   by end-points and is extremely important in machine-to-machine	 =
	   offered by end-points and is extremely important in =
machine-to-=09
   closed-loop applications (i.e., those with no humans in the loop).	 =
	   machine closed-loop applications (i.e., those with no humans =
in the=09
   The goals of resource discover protocols include:	 	   =
loop).  The goals of resource discover protocols include:=09
 	=09
      Simplicity of creation and maintenance of resources	 	 =
     Simplicity of creation and maintenance of resources=09
 	=09
      Commonly understood semantics	 	      Commonly =
understood semantics=09
 	=09
      Conformance to existing and emerging standards	 	      =
Conformance to existing and emerging standards=09
 	=09
      International scope and applicability	 	      =
International scope and applicability=09
 	=09
      Extensibility	 	      Extensibility=09
 	=09
      Interoperability among collections and indexing systems	 	 =
     Interoperability among collections and indexing systems=09
 	=09
   The Constrained Application Protocol (CoAP) [I-D.ietf-core-coap] is	 =
	   The Constrained Application Protocol (CoAP) =
[I-D.ietf-core-coap] is=09
   being developed in IETF with these goals in mind.  In particular,	 =
	   being developed in IETF with these goals in mind.  In =
particular,=09
   CoAP is designed for use in constrained resource networks and for	 =
	   CoAP is designed for use in constrained resource networks and =
for=09
   machine-to-machine applications such as smart energy and building	 =
	   machine-to-machine applications such as smart energy and =
building=09
   automation.  It provides a RESTful transfer protocol, a built-in	 =
	   automation.  It provides a RESTful transfer protocol =
[RESTFUL], a=09
   resource discovery protocol, and includes web concepts such as URIs	 =
	   built-in resource discovery protocol, and includes web =
concepts such=09
   and content-types.  CoAP provides both unicast and multicast resource	=
 	   as URIs and content-types.  CoAP provides both unicast and =
multicast=09
   discovery and includes the ability to filter on attributes of	 =
	   resource discovery and includes the ability to filter on =
attributes=09
   resource descriptions.  Finally, CoAP resource discovery can also be	 =
	   of resource descriptions.  Finally, CoAP resource discovery =
can also=09
   used to discovery HTTP resources.	 	   be used to discovery =
HTTP resources.=09
 	=09
   For simplicity, CoAP makes the assumption that all CoAP servers	 =
	   For simplicity, CoAP makes the assumption that all CoAP =
servers=09
   listen on the default CoAP port or otherwise have been configured or	 =
	   listen on the default CoAP port or otherwise have been =
configured or=09
   discovered using some general service discovery mechanism such as DNS	=
 	   discovered using some general service discovery mechanism =
such as DNS=09
   Service Discovery (DNS-SD) [I-D.cheshire-dnsext-dns-sd].	 	 =
  Service Discovery (DNS-SD) [I-D.cheshire-dnsext-dns-sd].=09
 	=09
   Resource discovery in CoAP is accomplished through the use of well-	 =
	   Resource discovery in CoAP is accomplished through the use of =
well-=09
   known resources which describe the links offered by a CoAP server.	 =
	   known resources which describe the links offered by a CoAP =
server.=09
   CoAP defines a well-known URI for discovery: "/.well-known/r"	 =
	   CoAP defines a well-known URI for discovery: "/.well-known/r"=09=

   [RFC5785].  For example, the query [GET /.well-known/r] returns a	 =
	   [RFC5785].  For example, the query [GET /.well-known/r] =
returns a=09
   list of links (representing resources) available from the queried	 =
	   list of links (representing resources) available from the =
queried=09
   CoAP server.  A query such as [GET /.well-known/r?n=3DVoltage] =
returns	 	   CoAP server.  A query such as [GET =
/.well-known/r?n=3DVoltage] returns=09
   the resources with the name Voltage.	 	   the resources with =
the name Voltage.=09
 	=09
3.6.  Other Applications	 	3.7.  Other Applications=09
 	=09
   There are several applications that are widely used but are not	 =
	   There are several applications that are widely used but are =
not=09
   properly thought of as infrastructure.	 	   properly =
thought of as infrastructure.=09
 	=09
3.6.1.  Network Time	 	3.7.1.  Session Initiation Protocol=09
 	=09
   The Network Time Protocol was originally designed by Dave Mills of	 =
	=09
   the University of Delaware and CSNET, for the purpose of implementing	=
 	=09
   a temporal metric in the Fuzzball Routing Protocol and generally	 =
	=09
   coordinating time experiments.  The current versions of the time	 =
	=09
   protocol are the Network Time Protocol [RFC5905].	 	=09
 	=09
   NTP is currently being updated in [RFC5905].	 	=09
 	=09
3.6.2.  Session Initiation Protocol	 	=09
 	=09
   The Session Initiation Protocol	 	   The Session =
Initiation Protocol=09
   [RFC3261][RFC3265][RFC3853][RFC4320][RFC4916][RFC5393][RFC5621] is an	=
 	   =
[RFC3261][RFC3265][RFC3853][RFC4320][RFC4916][RFC5393][RFC5621] is an=09
   application layer control (signaling) protocol for creating,	 	 =
  application layer control (signaling) protocol for creating,=09
   modifying and terminating multimedia sessions on the Internet, meant	 =
	   modifying and terminating multimedia sessions on the =
Internet, meant=09
   to be more scalable than H.323.  Multimedia sessions can be voice,	 =
	   to be more scalable than H.323.  Multimedia sessions can be =
voice,=09
   video, instant messaging, shared data, and/or subscriptions of	 =
	   video, instant messaging, shared data, and/or subscriptions =
of=09
   events.  SIP can run on top of TCP, UDP, SCTP, or TLS over TCP.  SIP	 =
	   events.  SIP can run on top of TCP, UDP, SCTP, or TLS over =
TCP.  SIP=09
   is independent of the transport layer, and independent of the	 =
	   is independent of the transport layer, and independent of the=09=

   underlying IPv4/v6 version.  In fact, the transport protocol used can	=
 	   underlying IPv4/v6 version.  In fact, the transport protocol =
used can=09
 	=09
skipping to change at page 27, line 10		skipping to change at =
page 30, line 11=09
   designed to be SDP aware (i.e., looking into each packet far enough	 =
	   designed to be SDP aware (i.e., looking into each packet far =
enough=09
   to discover what the IP address and port number is for this	 	 =
  to discover what the IP address and port number is for this=09
   particular session - and resetting it based on the Session Traversal	 =
	   particular session - and resetting it based on the Session =
Traversal=09
   Utilities for NAT [RFC5389], the session established by SIP will not	 =
	   Utilities for NAT [RFC5389], the session established by SIP =
will not=09
   result in RTP packets being sent to the proper endpoint (in SIP	 =
	   result in RTP packets being sent to the proper endpoint (in =
SIP=09
   called a user agent, or UA).  It should be noted that SIP messaging	 =
	   called a user agent, or UA).  It should be noted that SIP =
messaging=09
   has no issues with NATs, it is just the UA's inability to generally	 =
	   has no issues with NATs, it is just the UA's inability to =
generally=09
   learn about the presence of the NATs that prevent the RTP packets	 =
	   learn about the presence of the NATs that prevent the RTP =
packets=09
   from being received by the UA establishing the session.	 	 =
  from being received by the UA establishing the session.=09
 	=09
3.6.3.  Calendaring	 	3.7.2.  Calendaring=09
 	=09
   Internet calendaring, as implemented in Apple iCal, Microsoft Outlook	=
 	   Internet calendaring, as implemented in Apple iCal, Microsoft =
Outlook=09
   and Entourage, and Google Calendar, is specified in Internet	 	 =
  and Entourage, and Google Calendar, is specified in Internet=09
   Calendaring and Scheduling Core Object Specification (iCalendar)	 =
	   Calendaring and Scheduling Core Object Specification =
(iCalendar)=09
   [RFC5545] and is in the process of being updated to an XML schema in	 =
	   [RFC5545] and is in the process of being updated to an XML =
schema in=09
   iCalendar XML Representation [I-D.daboo-et-al-icalendar-in-xml]	 =
	   iCalendar XML Representation =
[I-D.daboo-et-al-icalendar-in-xml]=09
   Several protocols exist to carry calendar events, including iCalendar	=
 	   Several protocols exist to carry calendar events, including =
iCalendar=09
   Transport-Independent Interoperability Protocol (iTIP) [RFC5546], the	=
 	   Transport-Independent Interoperability Protocol (iTIP) =
[RFC5546], the=09
   Message-Based Interoperability Protocol (iMIP) [RFC2447] , and open	 =
	   Message-Based Interoperability Protocol (iMIP) [RFC2447] , =
and open=09
   source work on the Atom Publishing Protocol [RFC5023].	 	 =
  source work on the Atom Publishing Protocol [RFC5023].=09
 	=09
skipping to change at page 32, line 17		skipping to change at =
page 35, line 17=09
   therefore be removed upon publication as an RFC at the RFC Editor's	 =
	   therefore be removed upon publication as an RFC at the RFC =
Editor's=09
   discretion.	 	   discretion.=09
 	=09
6.  Security Considerations	 	6.  Security Considerations=09
 	=09
   Security is addressed in some detail in Section 2.2 and Section 3.1.	 =
	   Security is addressed in some detail in Section 2.2 and =
Section 3.1.=09
 	=09
7.  Acknowledgements	 	7.  Acknowledgements=09
 	=09
   Review comments were made by Andrew Yourtchenko, Ashok Narayanan,	 =
	   Review comments were made by Andrew Yourtchenko, Ashok =
Narayanan,=09
   Bernie Volz, Chris Lonvick, Dave McGrew, Dave Oran, David Su, Hemant	 =
	   Bernie Volz, Chris Lonvick, Dave McGrew, Dave Oran, David Su, =
Don=09
   Singh, James Polk, John Meylor, Joseph Salowey, Julien Abeille, Kerry	=
 	   Sturek, Francis Cleveland, Hemant Singh, James Polk, John =
Meylor,=09
   Lynn, Magnus Westerlund, Murtaza Chiba, Paul Duffy, Paul Hoffman,	 =
	   Joseph Salowey, Julien Abeille, Kerry Lynn, Magnus =
Westerlund,=09
   Ralph Droms, Russ White, Sheila Frankel, and Toerless Eckert.  Dave	 =
	   Murtaza Chiba, Paul Duffy, Paul Hoffman, Ralph Droms, Russ =
White,=09
   McGrew, Vint Cerf, and Ralph Droms suggested text.	 	   =
Sheila Frankel, Tom Herbst, and Toerless Eckert.  Dave McGrew, Vint=09
 	   Cerf, and Ralph Droms suggested text.=09
 	=09
8.  References	 	8.  References=09
 	=09
8.1.  Normative References	 	8.1.  Normative References=09
 	=09
   [RFC1122]  Braden, R., "Requirements for Internet Hosts -	 	 =
  [RFC1122]  Braden, R., "Requirements for Internet Hosts -=09
              Communication Layers", STD 3, RFC 1122, October 1989.	 =
	              Communication Layers", STD 3, RFC 1122, October =
1989.=09
 	=09
   [RFC1123]  Braden, R., "Requirements for Internet Hosts - Application	=
 	   [RFC1123]  Braden, R., "Requirements for Internet Hosts - =
Application=09
              and Support", STD 3, RFC 1123, October 1989.	 	 =
             and Support", STD 3, RFC 1123, October 1989.=09
 	=09
   [RFC1812]  Baker, F., "Requirements for IP Version 4 Routers",	 =
	   [RFC1812]  Baker, F., "Requirements for IP Version 4 =
Routers",=09
              RFC 1812, June 1995.	 	              RFC 1812, =
June 1995.=09
 	=09
   [RFC4294]  Loughney, J., "IPv6 Node Requirements", RFC 4294,	 	 =
  [RFC4294]  Loughney, J., "IPv6 Node Requirements", RFC 4294,=09
              April 2006.	 	              April 2006.=09
 	=09
8.2.  Informative References	 	8.2.  Informative References=09
 	=09
 	   [1822]     Bolt Beranek and Newman Inc., "Interface Message =
Processor=09
 	              -- Specifications for the interconnection of a =
host and a=09
 	              IMP, Report No. 1822", January 1976.=09
 	                                                                 =
        =09
   [I-D.arkko-ipv6-transition-guidelines]	 	   =
[I-D.arkko-ipv6-transition-guidelines]=09
              Arkko, J. and F. Baker, "Guidelines for Using IPv6	 =
	              Arkko, J. and F. Baker, "Guidelines for Using IPv6=09=

              Transition Mechanisms",	 	              Transition =
Mechanisms during IPv6 Deployment",=09
              draft-arkko-ipv6-transition-guidelines-03 (work in	 =
	              draft-arkko-ipv6-transition-guidelines-06 (work in=09=

              progress), July 2010.	 	              progress), =
August 2010.=09
 	=09
   [I-D.cheshire-dnsext-dns-sd]	 	   [I-D.cheshire-dnsext-dns-sd]=09=

              Cheshire, S. and M. Krochmal, "DNS-Based Service	 	 =
             Cheshire, S. and M. Krochmal, "DNS-Based Service=09
              Discovery", draft-cheshire-dnsext-dns-sd-06 (work in	 =
	              Discovery", draft-cheshire-dnsext-dns-sd-06 (work =
in=09
              progress), March 2010.	 	              progress), =
March 2010.=09
 	=09
   [I-D.cheshire-dnsext-multicastdns]	 	   =
[I-D.cheshire-dnsext-multicastdns]=09
              Cheshire, S. and M. Krochmal, "Multicast DNS",	 	 =
             Cheshire, S. and M. Krochmal, "Multicast DNS",=09
              draft-cheshire-dnsext-multicastdns-11 (work in progress),	 =
	              draft-cheshire-dnsext-multicastdns-11 (work in =
progress),=09
              March 2010.	 	              March 2010.=09
 	=09
   [I-D.daboo-et-al-icalendar-in-xml]	 	   =
[I-D.daboo-et-al-icalendar-in-xml]=09
              Daboo, C., Douglass, M., and S. Lees, "xCal: The XML	 =
	              Daboo, C., Douglass, M., and S. Lees, "xCal: The =
XML=09
              format for iCalendar",	 	              format for =
iCalendar",=09
              draft-daboo-et-al-icalendar-in-xml-05 (work in progress),	 =
	              draft-daboo-et-al-icalendar-in-xml-06 (work in =
progress),=09
              July 2010.	 	              September 2010.=09
 	=09
   [I-D.ietf-6lowpan-hc]	 	   [I-D.ietf-6lowpan-hc]=09
              Hui, J. and P. Thubert, "Compression Format for IPv6	 =
	              Hui, J. and P. Thubert, "Compression Format for =
IPv6=09
              Datagrams in 6LoWPAN Networks", draft-ietf-6lowpan-hc-08	 =
	              Datagrams in 6LoWPAN Networks", =
draft-ietf-6lowpan-hc-12=09
              (work in progress), July 2010.	 	              =
(work in progress), September 2010.=09
 	=09
   [I-D.ietf-6man-node-req-bis]	 	   [I-D.ietf-6man-node-req-bis]=09=

              Jankiewicz, E., Loughney, J., and T. Narten, "IPv6 Node	 =
	              Jankiewicz, E., Loughney, J., and T. Narten, "IPv6 =
Node=09
              Requirements RFC 4294-bis",	 	              =
Requirements RFC 4294-bis",=09
              draft-ietf-6man-node-req-bis-05 (work in progress),	 =
	              draft-ietf-6man-node-req-bis-05 (work in =
progress),=09
              July 2010.	 	              July 2010.=09
 	=09
   [I-D.ietf-behave-address-format]	 	   =
[I-D.ietf-behave-address-format]=09
              Bao, C., Huitema, C., Bagnulo, M., Boucadair, M., and X.	 =
	              Bao, C., Huitema, C., Bagnulo, M., Boucadair, M., =
and X.=09
              Li, "IPv6 Addressing of IPv4/IPv6 Translators",	 	 =
             Li, "IPv6 Addressing of IPv4/IPv6 Translators",=09
              draft-ietf-behave-address-format-10 (work in progress),	 =
	              draft-ietf-behave-address-format-10 (work in =
progress),=09
              August 2010.	 	              August 2010.=09
 	=09
   [I-D.ietf-behave-dns64]	 	   [I-D.ietf-behave-dns64]=09
              Bagnulo, M., Sullivan, A., Matthews, P., and I. Beijnum,	 =
	              Bagnulo, M., Sullivan, A., Matthews, P., and I. =
Beijnum,=09
              "DNS64: DNS extensions for Network Address Translation	 =
	              "DNS64: DNS extensions for Network Address =
Translation=09
              from IPv6 Clients to IPv4 Servers",	 	         =
     from IPv6 Clients to IPv4 Servers",=09
              draft-ietf-behave-dns64-10 (work in progress), July 2010.	 =
	              draft-ietf-behave-dns64-11 (work in progress),=09
 	              October 2010.=09
 	=09
   [I-D.ietf-behave-v6v4-framework]	 	   =
[I-D.ietf-behave-v6v4-framework]=09
              Baker, F., Li, X., Bao, C., and K. Yin, "Framework for	 =
	              Baker, F., Li, X., Bao, C., and K. Yin, "Framework =
for=09
              IPv4/IPv6 Translation",	 	              IPv4/IPv6 =
Translation",=09
              draft-ietf-behave-v6v4-framework-10 (work in progress),	 =
	              draft-ietf-behave-v6v4-framework-10 (work in =
progress),=09
              August 2010.	 	              August 2010.=09
 	=09
   [I-D.ietf-behave-v6v4-xlate]	 	   [I-D.ietf-behave-v6v4-xlate]=09=

              Li, X., Bao, C., and F. Baker, "IP/ICMP Translation	 =
	              Li, X., Bao, C., and F. Baker, "IP/ICMP =
Translation=09
              Algorithm", draft-ietf-behave-v6v4-xlate-21 (work in	 =
	              Algorithm", draft-ietf-behave-v6v4-xlate-23 (work =
in=09
              progress), August 2010.	 	              progress), =
September 2010.=09
 	=09
   [I-D.ietf-behave-v6v4-xlate-stateful]	 	   =
[I-D.ietf-behave-v6v4-xlate-stateful]=09
              Bagnulo, M., Matthews, P., and I. Beijnum, "Stateful	 =
	              Bagnulo, M., Matthews, P., and I. Beijnum, =
"Stateful=09
              NAT64: Network Address and Protocol Translation from IPv6	 =
	              NAT64: Network Address and Protocol Translation =
from IPv6=09
              Clients to IPv4 Servers",	 	              Clients to =
IPv4 Servers",=09
              draft-ietf-behave-v6v4-xlate-stateful-12 (work in	 	 =
             draft-ietf-behave-v6v4-xlate-stateful-12 (work in=09
              progress), July 2010.	 	              progress), =
July 2010.=09
 	=09
   [I-D.ietf-core-coap]	 	   [I-D.ietf-core-coap]=09
              Shelby, Z., Frank, B., and D. Sturek, "Constrained	 =
	              Shelby, Z., Frank, B., and D. Sturek, "Constrained=09=

              Application Protocol (CoAP)", draft-ietf-core-coap-01	 =
	              Application Protocol (CoAP)", =
draft-ietf-core-coap-02=09
              (work in progress), July 2010.	 	              =
(work in progress), September 2010.=09
 	=09
   [I-D.ietf-manet-dymo]	 	   [I-D.ietf-manet-dymo]=09
              Chakeres, I. and C. Perkins, "Dynamic MANET On-demand	 =
	              Chakeres, I. and C. Perkins, "Dynamic MANET =
On-demand=09
              (DYMO) Routing", draft-ietf-manet-dymo-21 (work in	 =
	              (DYMO) Routing", draft-ietf-manet-dymo-21 (work in=09=

              progress), July 2010.	 	              progress), =
July 2010.=09
 	=09
   [I-D.ietf-roll-rpl]	 	   [I-D.ietf-roll-rpl]=09
              Winter, T., Thubert, P., and R. Team, "RPL: IPv6 Routing	 =
	              Winter, T., Thubert, P., and R. Team, "RPL: IPv6 =
Routing=09
              Protocol for Low power and Lossy Networks",	 	 =
             Protocol for Low power and Lossy Networks",=09
              draft-ietf-roll-rpl-11 (work in progress), July 2010.	 =
	              draft-ietf-roll-rpl-11 (work in progress), July =
2010.=09
 	=09
   [I-D.ietf-tls-rfc4347-bis]	 	   [I-D.ietf-tls-rfc4347-bis]=09
              Rescorla, E. and N. Modadugu, "Datagram Transport Layer	 =
	              Rescorla, E. and N. Modadugu, "Datagram Transport =
Layer=09
              Security version 1.2", draft-ietf-tls-rfc4347-bis-04 (work	=
 	              Security version 1.2", =
draft-ietf-tls-rfc4347-bis-04 (work=09
              in progress), July 2010.	 	              in =
progress), July 2010.=09
 	=09
 	   [IEC62351-3]=09
 	              International Electrotechnical Commission =
Technical=09
 	              Committee 57, "POWER SYSTEMS MANAGEMENT AND =
ASSOCIATED=09
 	              INFORMATION EXCHANGE. DATA AND COMMUNICATIONS =
SECURITY --=09
 	              Part 3: Communication network and system security =
Profiles=09
 	              including TCP/IP", May 2007.=09
 	                                                                 =
        =09
   [IEEE802.1X]	 	   [IEEE802.1X]=09
              Institute of Electrical and Electronics Engineers, "IEEE	 =
	              Institute of Electrical and Electronics Engineers, =
"IEEE=09
              Standard for Local and Metropolitan Area Networks - Port	 =
	              Standard for Local and Metropolitan Area Networks =
- Port=09
              based Network Access Control", IEEE Standard 802.1X-2010,	 =
	              based Network Access Control", IEEE Standard =
802.1X-2010,=09
              February 2010.	 	              February 2010.=09
 	=09
 	   [RESTFUL]  Fielding, "Architectural Styles and the Design of =
Network-=09
 	              based Software Architectures", 2000.=09
 	                                                                 =
        =09
   [RFC0768]  Postel, J., "User Datagram Protocol", STD 6, RFC 768,	 =
	   [RFC0768]  Postel, J., "User Datagram Protocol", STD 6, RFC =
768,=09
              August 1980.	 	              August 1980.=09
 	=09
   [RFC0791]  Postel, J., "Internet Protocol", STD 5, RFC 791,	 	 =
  [RFC0791]  Postel, J., "Internet Protocol", STD 5, RFC 791,=09
              September 1981.	 	              September 1981.=09
 	=09
   [RFC0792]  Postel, J., "Internet Control Message Protocol", STD 5,	 =
	   [RFC0792]  Postel, J., "Internet Control Message Protocol", =
STD 5,=09
              RFC 792, September 1981.	 	              RFC 792, =
September 1981.=09
 	=09
   [RFC0793]  Postel, J., "Transmission Control Protocol", STD 7,	 =
	   [RFC0793]  Postel, J., "Transmission Control Protocol", STD =
7,=09
 	=09
skipping to change at page 38, line 37		skipping to change at =
page 42, line 5=09
              March 2002.	 	              March 2002.=09
 	=09
   [RFC3315]  Droms, R., Bound, J., Volz, B., Lemon, T., Perkins, C.,	 =
	   [RFC3315]  Droms, R., Bound, J., Volz, B., Lemon, T., =
Perkins, C.,=09
              and M. Carney, "Dynamic Host Configuration Protocol for	 =
	              and M. Carney, "Dynamic Host Configuration =
Protocol for=09
              IPv6 (DHCPv6)", RFC 3315, July 2003.	 	         =
     IPv6 (DHCPv6)", RFC 3315, July 2003.=09
 	=09
   [RFC3376]  Cain, B., Deering, S., Kouvelas, I., Fenner, B., and A.	 =
	   [RFC3376]  Cain, B., Deering, S., Kouvelas, I., Fenner, B., =
and A.=09
              Thyagarajan, "Internet Group Management Protocol, Version	 =
	              Thyagarajan, "Internet Group Management Protocol, =
Version=09
              3", RFC 3376, October 2002.	 	              =
3", RFC 3376, October 2002.=09
 	=09
 	   [RFC3411]  Harrington, D., Presuhn, R., and B. Wijnen, "An=09
 	              Architecture for Describing Simple Network =
Management=09
 	              Protocol (SNMP) Management Frameworks", STD 62, =
RFC 3411,=09
 	              December 2002.=09
 	=09
 	   [RFC3412]  Case, J., Harrington, D., Presuhn, R., and B. =
Wijnen,=09
 	              "Message Processing and Dispatching for the Simple =
Network=09
 	              Management Protocol (SNMP)", STD 62, RFC 3412,=09
 	              December 2002.=09
 	=09
 	   [RFC3413]  Levi, D., Meyer, P., and B. Stewart, "Simple =
Network=09
 	              Management Protocol (SNMP) Applications", STD 62,=09=

 	              RFC 3413, December 2002.=09
 	=09
 	   [RFC3414]  Blumenthal, U. and B. Wijnen, "User-based Security =
Model=09
 	              (USM) for version 3 of the Simple Network =
Management=09
 	              Protocol (SNMPv3)", STD 62, RFC 3414, December =
2002.=09
 	=09
 	   [RFC3415]  Wijnen, B., Presuhn, R., and K. McCloghrie, =
"View-based=09
 	              Access Control Model (VACM) for the Simple Network=09=

 	              Management Protocol (SNMP)", STD 62, RFC 3415,=09
 	              December 2002.=09
 	=09
 	   [RFC3416]  Presuhn, R., "Version 2 of the Protocol Operations =
for the=09
 	              Simple Network Management Protocol (SNMP)", STD =
62,=09
 	              RFC 3416, December 2002.=09
 	=09
 	   [RFC3417]  Presuhn, R., "Transport Mappings for the Simple =
Network=09
 	              Management Protocol (SNMP)", STD 62, RFC 3417,=09
 	              December 2002.=09
 	=09
 	   [RFC3418]  Presuhn, R., "Management Information Base (MIB) =
for the=09
 	              Simple Network Management Protocol (SNMP)", STD =
62,=09
 	              RFC 3418, December 2002.=09
 	                                                                 =
        =09
   [RFC3424]  Daigle, L. and IAB, "IAB Considerations for UNilateral	 =
	   [RFC3424]  Daigle, L. and IAB, "IAB Considerations for =
UNilateral=09
              Self-Address Fixing (UNSAF) Across Network Address	 =
	              Self-Address Fixing (UNSAF) Across Network Address=09=

              Translation", RFC 3424, November 2002.	 	         =
     Translation", RFC 3424, November 2002.=09
 	=09
   [RFC3436]  Jungmaier, A., Rescorla, E., and M. Tuexen, "Transport	 =
	   [RFC3436]  Jungmaier, A., Rescorla, E., and M. Tuexen, =
"Transport=09
              Layer Security over Stream Control Transmission Protocol",	=
 	              Layer Security over Stream Control Transmission =
Protocol",=09
              RFC 3436, December 2002.	 	              RFC 3436, =
December 2002.=09
 	=09
   [RFC3453]  Luby, M., Vicisano, L., Gemmell, J., Rizzo, L., Handley,	 =
	   [RFC3453]  Luby, M., Vicisano, L., Gemmell, J., Rizzo, L., =
Handley,=09
              M., and J. Crowcroft, "The Use of Forward Error Correction	=
 	              M., and J. Crowcroft, "The Use of Forward Error =
Correction=09
 	=09
skipping to change at page 40, line 34		skipping to change at =
page 44, line 36=09
 	=09
   [RFC4301]  Kent, S. and K. Seo, "Security Architecture for the	 =
	   [RFC4301]  Kent, S. and K. Seo, "Security Architecture for =
the=09
              Internet Protocol", RFC 4301, December 2005.	 	 =
             Internet Protocol", RFC 4301, December 2005.=09
 	=09
   [RFC4302]  Kent, S., "IP Authentication Header", RFC 4302,	 	 =
  [RFC4302]  Kent, S., "IP Authentication Header", RFC 4302,=09
              December 2005.	 	              December 2005.=09
 	=09
   [RFC4303]  Kent, S., "IP Encapsulating Security Payload (ESP)",	 =
	   [RFC4303]  Kent, S., "IP Encapsulating Security Payload =
(ESP)",=09
              RFC 4303, December 2005.	 	              RFC 4303, =
December 2005.=09
 	=09
   [RFC4306]  Kaufman, C., "Internet Key Exchange (IKEv2) Protocol",	 =
	=09
              RFC 4306, December 2005.	 	=09
                                                                         =
	 	=09
   [RFC4307]  Schiller, J., "Cryptographic Algorithms for Use in the	 =
	   [RFC4307]  Schiller, J., "Cryptographic Algorithms for Use in =
the=09
              Internet Key Exchange Version 2 (IKEv2)", RFC 4307,	 =
	              Internet Key Exchange Version 2 (IKEv2)", RFC =
4307,=09
              December 2005.	 	              December 2005.=09
 	=09
   [RFC4309]  Housley, R., "Using Advanced Encryption Standard (AES) CCM	=
 	   [RFC4309]  Housley, R., "Using Advanced Encryption Standard =
(AES) CCM=09
              Mode with IPsec Encapsulating Security Payload (ESP)",	 =
	              Mode with IPsec Encapsulating Security Payload =
(ESP)",=09
              RFC 4309, December 2005.	 	              RFC 4309, =
December 2005.=09
 	=09
   [RFC4320]  Sparks, R., "Actions Addressing Identified Issues with the	=
 	   [RFC4320]  Sparks, R., "Actions Addressing Identified Issues =
with the=09
              Session Initiation Protocol's (SIP) Non-INVITE	 	 =
             Session Initiation Protocol's (SIP) Non-INVITE=09
 	=09
skipping to change at page 41, line 23		skipping to change at =
page 45, line 23=09
              Message Protocol (ICMPv6) for the Internet Protocol	 =
	              Message Protocol (ICMPv6) for the Internet =
Protocol=09
              Version 6 (IPv6) Specification", RFC 4443, March 2006.	 =
	              Version 6 (IPv6) Specification", RFC 4443, March =
2006.=09
 	=09
   [RFC4487]  Le, F., Faccin, S., Patil, B., and H. Tschofenig, "Mobile	 =
	   [RFC4487]  Le, F., Faccin, S., Patil, B., and H. Tschofenig, =
"Mobile=09
              IPv6 and Firewalls: Problem Statement", RFC 4487,	 	 =
             IPv6 and Firewalls: Problem Statement", RFC 4487,=09
              May 2006.	 	              May 2006.=09
 	=09
   [RFC4566]  Handley, M., Jacobson, V., and C. Perkins, "SDP: Session	 =
	   [RFC4566]  Handley, M., Jacobson, V., and C. Perkins, "SDP: =
Session=09
              Description Protocol", RFC 4566, July 2006.	 	 =
             Description Protocol", RFC 4566, July 2006.=09
 	=09
 	   [RFC4594]  Babiarz, J., Chan, K., and F. Baker, =
"Configuration=09
 	              Guidelines for DiffServ Service Classes", RFC =
4594,=09
 	              August 2006.=09
 	                                                                 =
        =09
   [RFC4601]  Fenner, B., Handley, M., Holbrook, H., and I. Kouvelas,	 =
	   [RFC4601]  Fenner, B., Handley, M., Holbrook, H., and I. =
Kouvelas,=09
              "Protocol Independent Multicast - Sparse Mode (PIM-SM):	 =
	              "Protocol Independent Multicast - Sparse Mode =
(PIM-SM):=09
              Protocol Specification (Revised)", RFC 4601, August 2006.	 =
	              Protocol Specification (Revised)", RFC 4601, =
August 2006.=09
 	=09
   [RFC4604]  Holbrook, H., Cain, B., and B. Haberman, "Using Internet	 =
	   [RFC4604]  Holbrook, H., Cain, B., and B. Haberman, "Using =
Internet=09
              Group Management Protocol Version 3 (IGMPv3) and Multicast	=
 	              Group Management Protocol Version 3 (IGMPv3) and =
Multicast=09
              Listener Discovery Protocol Version 2 (MLDv2) for Source-	 =
	              Listener Discovery Protocol Version 2 (MLDv2) for =
Source-=09
              Specific Multicast", RFC 4604, August 2006.	 	 =
             Specific Multicast", RFC 4604, August 2006.=09
 	=09
   [RFC4607]  Holbrook, H. and B. Cain, "Source-Specific Multicast for	 =
	   [RFC4607]  Holbrook, H. and B. Cain, "Source-Specific =
Multicast for=09
 	=09
skipping to change at page 41, line 46		skipping to change at =
page 45, line 50=09
              Protocol Independent Multicast in 232/8", BCP 120,	 =
	              Protocol Independent Multicast in 232/8", BCP 120,=09=

              RFC 4608, August 2006.	 	              RFC 4608, =
August 2006.=09
 	=09
   [RFC4614]  Duke, M., Braden, R., Eddy, W., and E. Blanton, "A Roadmap	=
 	   [RFC4614]  Duke, M., Braden, R., Eddy, W., and E. Blanton, "A =
Roadmap=09
              for Transmission Control Protocol (TCP) Specification	 =
	              for Transmission Control Protocol (TCP) =
Specification=09
              Documents", RFC 4614, September 2006.	 	         =
     Documents", RFC 4614, September 2006.=09
 	=09
   [RFC4741]  Enns, R., "NETCONF Configuration Protocol", RFC 4741,	 =
	   [RFC4741]  Enns, R., "NETCONF Configuration Protocol", RFC =
4741,=09
              December 2006.	 	              December 2006.=09
 	=09
 	   [RFC4742]  Wasserman, M. and T. Goddard, "Using the NETCONF=09=

 	              Configuration Protocol over Secure SHell (SSH)", =
RFC 4742,=09
 	              December 2006.=09
 	=09
 	   [RFC4743]  Goddard, T., "Using NETCONF over the Simple Object =
Access=09
 	              Protocol (SOAP)", RFC 4743, December 2006.=09
 	=09
 	   [RFC4744]  Lear, E. and K. Crozier, "Using the NETCONF =
Protocol over=09
 	              the Blocks Extensible Exchange Protocol (BEEP)", =
RFC 4744,=09
 	              December 2006.=09
 	                                                                 =
        =09
   [RFC4760]  Bates, T., Chandra, R., Katz, D., and Y. Rekhter,	 	 =
  [RFC4760]  Bates, T., Chandra, R., Katz, D., and Y. Rekhter,=09
              "Multiprotocol Extensions for BGP-4", RFC 4760,	 	 =
             "Multiprotocol Extensions for BGP-4", RFC 4760,=09
              January 2007.	 	              January 2007.=09
 	=09
   [RFC4787]  Audet, F. and C. Jennings, "Network Address Translation	 =
	   [RFC4787]  Audet, F. and C. Jennings, "Network Address =
Translation=09
              (NAT) Behavioral Requirements for Unicast UDP", BCP 127,	 =
	              (NAT) Behavioral Requirements for Unicast UDP", =
BCP 127,=09
              RFC 4787, January 2007.	 	              RFC 4787, =
January 2007.=09
 	=09
   [RFC4835]  Manral, V., "Cryptographic Algorithm Implementation	 =
	   [RFC4835]  Manral, V., "Cryptographic Algorithm =
Implementation=09
              Requirements for Encapsulating Security Payload (ESP) and	 =
	              Requirements for Encapsulating Security Payload =
(ESP) and=09
 	=09
skipping to change at page 43, line 10		skipping to change at =
page 47, line 25=09
              PPP", RFC 5072, September 2007.	 	              =
PPP", RFC 5072, September 2007.=09
 	=09
   [RFC5128]  Srisuresh, P., Ford, B., and D. Kegel, "State of Peer-to-	 =
	   [RFC5128]  Srisuresh, P., Ford, B., and D. Kegel, "State of =
Peer-to-=09
              Peer (P2P) Communication across Network Address	 	 =
             Peer (P2P) Communication across Network Address=09
              Translators (NATs)", RFC 5128, March 2008.	 	 =
             Translators (NATs)", RFC 5128, March 2008.=09
 	=09
   [RFC5135]  Wing, D. and T. Eckert, "IP Multicast Requirements for a	 =
	   [RFC5135]  Wing, D. and T. Eckert, "IP Multicast Requirements =
for a=09
              Network Address Translator (NAT) and a Network Address	 =
	              Network Address Translator (NAT) and a Network =
Address=09
              Port Translator (NAPT)", BCP 135, RFC 5135, February 2008.	=
 	              Port Translator (NAPT)", BCP 135, RFC 5135, =
February 2008.=09
 	=09
 	   [RFC5193]  Jayaraman, P., Lopez, R., Ohba, Y., Parthasarathy, =
M., and=09
 	              A. Yegin, "Protocol for Carrying Authentication =
for=09
 	              Network Access (PANA) Framework", RFC 5193, May =
2008.=09
 	                                                                 =
        =09
   [RFC5207]  Stiemerling, M., Quittek, J., and L. Eggert, "NAT and	 =
	   [RFC5207]  Stiemerling, M., Quittek, J., and L. Eggert, "NAT =
and=09
              Firewall Traversal Issues of Host Identity Protocol (HIP)	 =
	              Firewall Traversal Issues of Host Identity =
Protocol (HIP)=09
              Communication", RFC 5207, April 2008.	 	         =
     Communication", RFC 5207, April 2008.=09
 	=09
   [RFC5216]  Simon, D., Aboba, B., and R. Hurst, "The EAP-TLS	 	 =
  [RFC5216]  Simon, D., Aboba, B., and R. Hurst, "The EAP-TLS=09
              Authentication Protocol", RFC 5216, March 2008.	 	 =
             Authentication Protocol", RFC 5216, March 2008.=09
 	=09
   [RFC5238]  Phelan, T., "Datagram Transport Layer Security (DTLS) over	=
 	   [RFC5238]  Phelan, T., "Datagram Transport Layer Security =
(DTLS) over=09
              the Datagram Congestion Control Protocol (DCCP)",	 	 =
             the Datagram Congestion Control Protocol (DCCP)",=09
              RFC 5238, May 2008.	 	              RFC 5238, =
May 2008.=09
 	=09
   [RFC5246]  Dierks, T. and E. Rescorla, "The Transport Layer Security	 =
	   [RFC5246]  Dierks, T. and E. Rescorla, "The Transport Layer =
Security=09
              (TLS) Protocol Version 1.2", RFC 5246, August 2008.	 =
	              (TLS) Protocol Version 1.2", RFC 5246, August =
2008.=09
 	=09
 	   [RFC5277]  Chisholm, S. and H. Trevino, "NETCONF Event=09
 	              Notifications", RFC 5277, July 2008.=09
 	                                                                 =
        =09
   [RFC5308]  Hopps, C., "Routing IPv6 with IS-IS", RFC 5308,	 	 =
  [RFC5308]  Hopps, C., "Routing IPv6 with IS-IS", RFC 5308,=09
              October 2008.	 	              October 2008.=09
 	=09
   [RFC5340]  Coltun, R., Ferguson, D., Moy, J., and A. Lindem, "OSPF	 =
	   [RFC5340]  Coltun, R., Ferguson, D., Moy, J., and A. Lindem, =
"OSPF=09
              for IPv6", RFC 5340, July 2008.	 	              =
for IPv6", RFC 5340, July 2008.=09
 	=09
   [RFC5389]  Rosenberg, J., Mahy, R., Matthews, P., and D. Wing,	 =
	   [RFC5389]  Rosenberg, J., Mahy, R., Matthews, P., and D. =
Wing,=09
              "Session Traversal Utilities for NAT (STUN)", RFC 5389,	 =
	              "Session Traversal Utilities for NAT (STUN)", RFC =
5389,=09
              October 2008.	 	              October 2008.=09
 	=09
   [RFC5393]  Sparks, R., Lawrence, S., Hawrylyshen, A., and B. Campen,	 =
	   [RFC5393]  Sparks, R., Lawrence, S., Hawrylyshen, A., and B. =
Campen,=09
              "Addressing an Amplification Vulnerability in Session	 =
	              "Addressing an Amplification Vulnerability in =
Session=09
              Initiation Protocol (SIP) Forking Proxies", RFC 5393,	 =
	              Initiation Protocol (SIP) Forking Proxies", RFC =
5393,=09
              December 2008.	 	              December 2008.=09
 	=09
   [RFC5405]  Eggert, L. and G. Fairhurst, "Unicast UDP Usage Guidelines	=
 	   [RFC5405]  Eggert, L. and G. Fairhurst, "Unicast UDP Usage =
Guidelines=09
              for Application Designers", BCP 145, RFC 5405,	 	 =
             for Application Designers", BCP 145, RFC 5405,=09
              November 2008.	 	              November 2008.=09
 	=09
 	   [RFC5539]  Badra, M., "NETCONF over Transport Layer Security =
(TLS)",=09
 	              RFC 5539, May 2009.=09
 	                                                                 =
        =09
   [RFC5545]  Desruisseaux, B., "Internet Calendaring and Scheduling	 =
	   [RFC5545]  Desruisseaux, B., "Internet Calendaring and =
Scheduling=09
              Core Object Specification (iCalendar)", RFC 5545,	 	 =
             Core Object Specification (iCalendar)", RFC 5545,=09
              September 2009.	 	              September 2009.=09
 	=09
   [RFC5546]  Daboo, C., "iCalendar Transport-Independent	 	 =
  [RFC5546]  Daboo, C., "iCalendar Transport-Independent=09
              Interoperability Protocol (iTIP)", RFC 5546,	 	 =
             Interoperability Protocol (iTIP)", RFC 5546,=09
              December 2009.	 	              December 2009.=09
 	=09
 	   [RFC5548]  Dohler, M., Watteyne, T., Winter, T., and D. =
Barthel,=09
 	              "Routing Requirements for Urban Low-Power and =
Lossy=09
 	              Networks", RFC 5548, May 2009.=09
 	                                                                 =
        =09
   [RFC5569]  Despres, R., "IPv6 Rapid Deployment on IPv4	 	 =
  [RFC5569]  Despres, R., "IPv6 Rapid Deployment on IPv4=09
              Infrastructures (6rd)", RFC 5569, January 2010.	 	 =
             Infrastructures (6rd)", RFC 5569, January 2010.=09
 	=09
   [RFC5621]  Camarillo, G., "Message Body Handling in the Session	 =
	   [RFC5621]  Camarillo, G., "Message Body Handling in the =
Session=09
              Initiation Protocol (SIP)", RFC 5621, September 2009.	 =
	              Initiation Protocol (SIP)", RFC 5621, September =
2009.=09
 	=09
 	   [RFC5673]  Pister, K., Thubert, P., Dwars, S., and T. =
Phinney,=09
 	              "Industrial Routing Requirements in Low-Power and =
Lossy=09
 	              Networks", RFC 5673, October 2009.=09
 	                                                                 =
        =09
   [RFC5681]  Allman, M., Paxson, V., and E. Blanton, "TCP Congestion	 =
	   [RFC5681]  Allman, M., Paxson, V., and E. Blanton, "TCP =
Congestion=09
              Control", RFC 5681, September 2009.	 	         =
     Control", RFC 5681, September 2009.=09
 	=09
 	   [RFC5717]  Lengyel, B. and M. Bjorklund, "Partial Lock Remote=09=

 	              Procedure Call (RPC) for NETCONF", RFC 5717,=09
 	              December 2009.=09
 	                                                                 =
        =09
   [RFC5740]  Adamson, B., Bormann, C., Handley, M., and J. Macker,	 =
	   [RFC5740]  Adamson, B., Bormann, C., Handley, M., and J. =
Macker,=09
              "NACK-Oriented Reliable Multicast (NORM) Transport	 =
	              "NACK-Oriented Reliable Multicast (NORM) Transport=09=

              Protocol", RFC 5740, November 2009.	 	         =
     Protocol", RFC 5740, November 2009.=09
 	=09
   [RFC5750]  Ramsdell, B. and S. Turner, "Secure/Multipurpose Internet	 =
	   [RFC5750]  Ramsdell, B. and S. Turner, "Secure/Multipurpose =
Internet=09
              Mail Extensions (S/MIME) Version 3.2 Certificate	 	 =
             Mail Extensions (S/MIME) Version 3.2 Certificate=09
              Handling", RFC 5750, January 2010.	 	         =
     Handling", RFC 5750, January 2010.=09
 	=09
   [RFC5751]  Ramsdell, B. and S. Turner, "Secure/Multipurpose Internet	 =
	   [RFC5751]  Ramsdell, B. and S. Turner, "Secure/Multipurpose =
Internet=09
              Mail Extensions (S/MIME) Version 3.2 Message	 	 =
             Mail Extensions (S/MIME) Version 3.2 Message=09
              Specification", RFC 5751, January 2010.	 	         =
     Specification", RFC 5751, January 2010.=09
 	=09
   [RFC5785]  Nottingham, M. and E. Hammer-Lahav, "Defining Well-Known	 =
	   [RFC5785]  Nottingham, M. and E. Hammer-Lahav, "Defining =
Well-Known=09
              Uniform Resource Identifiers (URIs)", RFC 5785,	 	 =
             Uniform Resource Identifiers (URIs)", RFC 5785,=09
              April 2010.	 	              April 2010.=09
 	=09
   [RFC5796]  Atwood, W., Islam, S., and M. Siami, "Authentication and	 =
	   [RFC5826]  Brandt, A., Buron, J., and G. Porcu, "Home =
Automation=09
              Confidentiality in Protocol Independent Multicast Sparse	 =
	              Routing Requirements in Low-Power and Lossy =
Networks",=09
              Mode (PIM-SM) Link-Local Messages", RFC 5796, March 2010.	 =
	              RFC 5826, April 2010.=09
 	=09
   [RFC5838]  Lindem, A., Mirtorabi, S., Roy, A., Barnes, M., and R.	 =
	   [RFC5838]  Lindem, A., Mirtorabi, S., Roy, A., Barnes, M., =
and R.=09
              Aggarwal, "Support of Address Families in OSPFv3",	 =
	              Aggarwal, "Support of Address Families in OSPFv3",=09=

              RFC 5838, April 2010.	 	              RFC 5838, =
April 2010.=09
 	=09
 	   [RFC5867]  Martocci, J., De Mil, P., Riou, N., and W. =
Vermeylen,=09
 	              "Building Automation Routing Requirements in =
Low-Power and=09
 	              Lossy Networks", RFC 5867, June 2010.=09
 	                                                                 =
        =09
   [RFC5905]  Mills, D., Martin, J., Burbank, J., and W. Kasch, "Network	=
 	   [RFC5905]  Mills, D., Martin, J., Burbank, J., and W. Kasch, =
"Network=09
              Time Protocol Version 4: Protocol and Algorithms	 	 =
             Time Protocol Version 4: Protocol and Algorithms=09
              Specification", RFC 5905, June 2010.	 	         =
     Specification", RFC 5905, June 2010.=09
 	=09
 	   [RFC5996]  Kaufman, C., Hoffman, P., Nir, Y., and P. Eronen,=09=

 	              "Internet Key Exchange Protocol Version 2 =
(IKEv2)",=09
 	              RFC 5996, September 2010.=09
 	                                                                 =
        =09
   [SP-MULPIv3.0]	 	   [SP-MULPIv3.0]=09
              CableLabs, "DOCSIS 3.0 MAC and Upper Layer Protocols	 =
	              CableLabs, "DOCSIS 3.0 MAC and Upper Layer =
Protocols=09
              Interface Specification, CM-SP-MULPIv3.0-I10-090529",	 =
	              Interface Specification, =
CM-SP-MULPIv3.0-I10-090529",=09
              May 2009.	 	              May 2009.=09
 	=09
 	Appendix A.  Example: Advanced Metering Infrastructure=09
 	=09
 	   This appendix provides a worked example of the use of the =
Internet=09
 	   Protocol Suite in a network such as the Smart Grid's Advanced=09=

 	   Metering Infrastructure (AMI).  There are several possible =
models.=09
 	=09
 	   Figure 6 shows the structure of the AMI as it reaches out =
towards a=09
 	   set of residences.  In this structure, we have the home =
itself and=09
 	   its Home Area Network (HAN), the Neighborhood Area Network =
(NAN) that=09
 	   the utility uses to access the meter at the home, and the =
utility=09
 	   access network that connects a set of NANs to the utility =
itself.=09
 	   For the purposes of this discussion, assume that the NAN =
contains a=09
 	   distributed application in a set collectors, which is of =
course only=09
 	   one way the application could be implemented.=09
 	=09
 	    ---=09
 	    A        thermostats, appliances, etc=09
 	    |  ------+-----------------------------------=09
 	    |        |=09
 	    |"HAN"   | <--- Energy Services Interface (ESI)=09
 	    |    +---+---+=09
 	    |    | Meter | Meter is generally an ALG between the AMI and =
the HAN=09
 	    |    +---+---+=09
 	    V         \=09
 	    ---        \=09
 	    A           \   |   /=09
 	    |            \  |  /=09
 	    | "NAN"    +--+-+-+---+  Likely a router but could=09
 	    |          |Collector |  be an front-end application=09
 	    V          +----+-----+  gateway for utility=09
 	    ---              \=09
 	    A                 \   |   /=09
 	    |                  \  |  /=09
 	    |"AMI"           +--+-+-+--+=09
 	    |                |   AMI   |=09
 	    |                | Headend |=09
 	    V                +---------+=09
 	    ---=09
 	=09
 	       Figure 6: The HAN, NAN, and Utility in the Advanced =
Metering=09
 	                              Infrastructure=09
 	=09
 	   There are several questions that have to be answered in =
describing=09
 	   this picture, which given possible answers yield different =
possible=09
 	   models.  They include at least:=09
 	=09
 	   o  How does Demand Response work?  Either:=09
 	=09
 	      *  The utility presents pricing signals to the home,=09
 	=09
 	      *  The utility presents pricing signals individual devices =
(e.g.,=09
 	         a Pluggable Electric Vehicle),=09
 	=09
 	      *  The utility adjusts settings on individual appliances =
within=09
 	         the home.=09
 	=09
 	   o  How does the utility access meters at the home?=09
 	=09
 	      *  The AMI Headend manages the interfaces with the meters,=09=

 	         collecting metering data and passing it on to the =
appropriate=09
 	         applications over the Enterprise Bus, or=09
 	=09
 	      *  Distributed application support (collectors") might =
access and=09
 	         summarize the information; this device might be managed =
by the=09
 	         utility or by a service between the utility and its =
customers.=09
 	=09
 	   In implementation, these models are idealized; reality may =
include=09
 	   some aspects of each model in specified cases.=09
 	=09
 	   The examples include:=09
 	=09
 	   1.  Appendix A.2 presumes that the HAN, the NAN, and the =
utility's=09
 	       network are separate administrative domains and speak =
application=09
 	       to application across those domains.=09
 	=09
 	   2.  Appendix A.3 repeats the first example, but presuming =
that the=09
 	       utility directly accesses appliances within the HAN from =
the=09
 	       collector".=09
 	=09
 	   3.  Appendix A.4 repeats the first example, but presuming =
that the=09
 	       collector directly forwards traffic as a router in =
addition to=09
 	       distributed application chores.  Note that this case =
implies=09
 	       numerous privacy and security concerns and as such is =
considered=09
 	       a less likely deployment model.=09
 	=09
 	A.1.  How to structure a network=09
 	=09
 	   A key consideration in the Internet has been the development =
of new=09
 	   link layer technologies over time.  The ARPANET originally =
used a BBN=09
 	   proprietary link layer called BBN 1822 [1822].  In the late =
1970's,=09
 	   the ARPANET switched to X.25 as an interface to the 1822 =
network.=09
 	   With the deployment of the IEEE 802 series technologies in =
the early=09
 	   1980's, IP was deployed on Ethernet (IEEE 802.3), Token Ring =
(IEEE=09
 	   802.5) and WiFi (IEEE 802.11), as well as Arcnet, serial =
lines of=09
 	   various kinds, Frame Relay, and ATM.  A key issue in this =
evolution=09
 	   was that the applications developed to run on the Internet =
use APIs=09
 	   related to the IPS, and as a result require little or no =
change to=09
 	   continue to operate in a new link layer architecture or a =
mixture of=09
 	   them.=09
 	=09
 	   The Smart Grid is likely to see a similar evolution over =
time.=09
 	   Consider the Home Area Network (HAN) as a readily =
understandable=09
 	   small network.  At this juncture, technologies proposed for=09=

 	   residential networks include IEEE P1901 (Homeplug), IEEE =
802.15.4g=09
 	   (Zigbee), and IEEE 802.11 (WiFi, commonly deployed today and =
used by=09
 	   some high end appliances).  It is reasonable to expect other=09=

 	   technologies to be developed in the future.  As the Zigbee =
Alliance=09
 	   has learned (and as a resulted incorporated the IPS in Secure =
Energy=09
 	   Profile 2.0), there is significant value in providing a =
virtual=09
 	   address that is mapped to interfaces or nodes attached to =
each of=09
 	   those technologies.=09
 	=09
 	   There are two possible communication models within the HAN, =
both of=09
 	   which are likely to be useful.  Devices may communicate =
directly with=09
 	   each other, or they may be managed by some central =
controller.  An=09
 	   example of direct communications might be a light switch that=09=

 	   directly commands a lamp to turn on or off.  An example of =
indirect=09
 	   communications might be a control application in a Customer =
or=09
 	   Building that accepts telemetry from a thermostat, applies =
some form=09
 	   of policy, and controls the heating and air conditioning =
systems.  In=09
 	   addition, there are high end appliances in the market today =
that use=09
 	   residential broadband to communicate with their =
manufacturers, and=09
 	   obviously the meter needs to communicate with the utility.=09
 	=09
 	                    Utility NAN=09
 	                       /=09
 	                      /=09
 	                +----+-----+ +--+ +--+ +--+=09
 	                |  Meter   | |D1| |D2| |D3|=09
 	                +-----+----+ ++-+ ++-+ ++-+=09
 	                      |       |    |    |=09
 	                ----+-+-------+----+----+---- IEEE 802.15.4=09
 	                    |=09
 	                 +--+---+=09
 	                 |Router+------/------ Residential Broadband=09
 	                 +--+---+=09
 	                    |=09
 	                ----+---------+----+----+---- IEEE P1901=09
 	                              |    |    |=09
 	                             ++-+ ++-+ ++-+=09
 	                             |D4| |D5| |D6|=09
 	                             +--+ +--+ +--+=09
 	=09
 	                        Figure 7: Home Area Network=09
 	=09
 	   Figure 7 shows a simple network containing IEEE 802.15.4 and =
IEEE=09
 	   1901 domains.  It shows the connectivity between them as a =
router=09
 	   separate from the EMS.  This is for clarity; the two could of =
course=09
 	   be incorporated into a single system, and one could imagine=09=

 	   appliances that want to communicate with their manufacturers=09=

 	   supporting both a HAN interface and a WiFi interface rather =
than=09
 	   depending on the router.  These are all manufacturer design=09=

 	   decisions.=09
 	=09
 	A.1.1.  HAN Routing=09
 	=09
 	   The HAN can be seen as communicating with two kinds of =
non-HAN=09
 	   networks.  One is the home LAN, which may in turn be attached =
to the=09
 	   Internet, and will generally either derive its prefix from =
the=09
 	   upstream ISP or use a self-generated ULA.  Another is the =
utility's=09
 	   NAN, which through an ESI provides utility connectivity to =
the HAN;=09
 	   in this case the HAN will be addressed by a self-generated =
ULA (note,=09
 	   however, that in some cases ESI may also provide a prefix via =
DHCP=09
 	   [RFC3315]).  In addition, the HAN will have link-local =
addresses that=09
 	   can be used between neighboring nodes.  In general, an HAN =
will be=09
 	   comprised of both 802.15.4, 802.11 (and possibly other) =
networks.=09
 	=09
 	   The ESI is node on the user's residential network, and will =
not=09
 	   typically provide stateful packet forwarding or firewall =
services=09
 	   between the HAN and the utility network(s).  In general, the =
meter/=09
 	   ESI is just a node on the home network.  However, the ESI =
must be=09
 	   capable of understanding that most home networks are not =
802.15.4=09
 	   enabled (rather, they are typically 802.11 networks), and =
that it=09
 	   must be capable of setting up ad-hoc networks between various =
sensors=09
 	   in the home (e.g., betweeen the meter and say, a thermostat) =
in the=09
 	   event there aren't other networks available.=09
 	=09
 	A.1.2.  HAN Security=09
 	=09
 	   In any network, we have a variety of threats and a variety of=09=

 	   possible mitigations.  These include, at minimum:=09
 	=09
 	   Link Layer:  Why is your machine able to talk in my network?  =
The=09
 	      WiFi SSIDs often use some form of authenticated access =
control,=09
 	      which may be a simple encrypted password mechanism or may =
use a=09
 	      combination of encryption and IEEE 802.1X+EAP-TLS =
Authentication/=09
 	      Authorization to ensure that only authorized communicants =
can use=09
 	      it.  If a LAN has a router attached, the router may also =
implement=09
 	      a firewall to filter remote accesses.=09
 	=09
 	   Network Layer:  Given that your machine is authorized access =
to my=09
 	      network, why is your machine talking with my machine?  =
IPsec is a=09
 	      way of ensuring that computers that can use a network are =
allowed=09
 	      to talk with each other, may also enforce confidentiality, =
and may=09
 	      provide VPN services to make a device or network appear to =
be part=09
 	      of a remote network.=09
 	=09
 	   Application:  Given that your machine is authorized access to =
my=09
 	      network and my machine, why is your application talking =
with my=09
 	      application?  The fact that your machine and mine are =
allowed to=09
 	      talk for some applications doesn't mean they are allowed =
to for=09
 	      all applications.  (D)TLS, https, and other such =
mechanisms enable=09
 	      an application to impose application-to-application =
controls=09
 	      similar to the network layer controls provided by IPsec.=09=

 	=09
 	   Remote Application:  How do I know that the data I received =
is the=09
 	      data you sent?  Especially in applications like electronic =
mail,=09
 	      where data passes through a number of intermediaries that =
one may=09
 	      or may not really want munging it (how many times have you =
seen a=09
 	      URL broken by a mail server?), we have tools (DKIM, =
S/MIME, and=09
 	      W3C XML Signatures to name a few) to provide =
non-repudiability and=09
 	      integrity verification.  This may also have legal =
ramifications:=09
 	      if a record of a meter reading is to be used in billing, =
and the=09
 	      bill is disputed in court, one could imagine the court =
wanting=09
 	      proof that the record in fact came from that meter at that =
time=09
 	      and contained that data.=09
 	=09
 	   Application-specific security:  In addition, applications =
often=09
 	      provide security services of their own.  The fact that I =
can=09
 	      access a file system, for example, doesn't mean that I am=09=

 	      authorized to access everything in it; the file system may =
well=09
 	      prevent my access to some of its contents.  Routing =
protocols like=09
 	      BGP obsess with the question "what statements that my peer =
made am=09
 	      I willing to believe".  And monitoring protocols like SNMP =
may not=09
 	      be willing to answer every question they are asked, =
depending on=09
 	      access configuration.=09
 	=09
 	   Devices in the HAN want controlled access to the LAN in =
question for=09
 	   obvious reasons.  In addition, there should be some form of =
mutual=09
 	   authentication between devices - the lamp controller will =
want to=09
 	   know that the light switch telling it to change state is the =
right=09
 	   light switch, for example.  The EMS may well want strong=09
 	   authentication of accesses - the parents may not want the =
children=09
 	   changing the settings, and while the utility and the customer =
are=09
 	   routinely granted access, other parties (especially parties =
with=09
 	   criminal intent) need to be excluded.=09
 	=09
 	A.2.  Model 1: AMI with separated domains=09
 	=09
 	   With the background given in Appendix A.1, we can now discuss =
the use=09
 	   of IP (IPv4 or IPv6) in the AMI.=09
 	=09
 	   In this first model, consider the three domains in Figure 6 =
to=09
 	   literally be separate administrative domains, potentially =
operated by=09
 	   different entities.  For example, the NAN could be a WiMAX =
network=09
 	   operated by a traditional telecom operator, the utility's =
network=09
 	   (including the collector) is its own, and the residential =
network is=09
 	   operated by the resident.  In this model, while =
communications=09
 	   between the collector and the Meter are normal, the utility =
has no=09
 	   other access to appliances in the home, and the collector =
doesn't=09
 	   directly forward messages from the NAN upstream.=09
 	=09
 	   In this case, as shown in Figure 7, it would make the most =
sense to=09
 	   design the collector, the Meter, and the EMS as hosts on the =
NAN -=09
 	   design them as systems whose applications can originate and =
terminate=09
 	   exchanges or sessions in the NAN, but not forward traffic =
from or to=09
 	   other devices.=09
 	=09
 	   In such a configuration, Demand Response has to be performed =
by=09
 	   having the EMS accept messages such as price signals from the =
"pole=09
 	   top", apply some form of policy, and then orchestrate actions =
within=09
 	   the home.  Another possibility is to have the EMS communicate =
with=09
 	   the ESI located in the meter.  If the thermostat has high =
demand and=09
 	   low demand (day/night or morning/day/evening/night) settings, =
Demand=09
 	   Response might result in it moving to a lower demand setting, =
and the=09
 	   EMS might also turn off specified circuits in the home to =
diminish=09
 	   lighting.=09
 	=09
 	   In this scenario, QoS issues reportedly arise when high =
precedence=09
 	   messages must be sent through the collector to the home; if =
the=09
 	   collector is occupied polling the meters or doing some other =
task,=09
 	   the application may not yield control of the processor to the=09=

 	   application that services the message.  Clearly, this is =
either an=09
 	   application or an OS problem; applications need to be =
designed in a=09
 	   manner that doesn't block high precedence messages.  The =
collector=09
 	   also needs to use appropriate NAN services, if they exist, to =
provide=09
 	   the NAN QoS it needs.  For example, if WiMax is in use, it =
might use=09
 	   a routine-level service for normal exchanges but a higher =
precedence=09
 	   service for these messages.=09
 	=09
 	A.3.  Model 2: AMI with neighborhood access to the home=09
 	=09
 	   In this second model, let's imagine that the utility directly=09=

 	   accesses appliances within the HAN.  Rather than expect an =
EMS to=09
 	   respond to price signals in Demand Response, it directly =
commands=09
 	   devices like air conditioners to change state, or throws =
relays on=09
 	   circuits to or within the home.=09
 	=09
 	                +----------+ +--+ +--+ +--+=09
 	                |  Meter   | |D1| |D2| |D3|=09
 	                +-----+----+ ++-+ ++-+ ++-+=09
 	                      |       |    |    |=09
 	                ----+-+-------+----+----+---- IEEE 802.15.4=09
 	                    |=09
 	                 +--+---+=09
 	                 |      +------/------ NAN=09
 	                 |Router|=09
 	                 |      +------/------ Residential Broadband=09
 	                 +--+---+=09
 	                    |=09
 	                ----+---------+----+----+---- IEEE P1901=09
 	                              |    |    |=09
 	                             ++-+ ++-+ ++-+=09
 	                             |D4| |D5| |D6|=09
 	                             +--+ +--+ +--+=09
 	=09
 	                        Figure 8: Home Area Network=09
 	=09
 	   In this case, as shown in Figure 8, the Meter, and EMS as =
hosts on=09
 	   the HAN, and there is a router between the HAN and the NAN.=09=

 	=09
 	   As one might imagine, there are serious security =
considerations in=09
 	   this model.  Traffic between the NAN and the residential =
broadband=09
 	   network should be filtered, and the issues raised in Appendix =
A.1.2=09
 	   take on a new level of meaning.  One of the biggest threats =
may be a=09
 	   legal or at least a public relations issue; if the utility=09
 	   intentionally disables a circuit in a manner or at a time =
that=09
 	   threatens life (the resident's kidney dialysis machine is on =
it, or a=09
 	   respirator, for example) the matter might make the papers.=09
 	   Unauthorized access could be part of juvenile pranks or other =
things=09
 	   as well.  So one really wants the appliances to only obey =
commands=09
 	   under strict authentication/authorization controls.=09
 	=09
 	   In addition to the QoS issues raised in Appendix A.2, there =
is the=09
 	   possibility of queuing issues in the router.  In such a case, =
the IP=09
 	   datagrams should probably use the Low-Latency Data Service =
Class=09
 	   described in [RFC4594], and let other traffic use the =
Standard=09
 	   Service Class or other service classes.=09
 	=09
 	A.4.  Model 3: Collector is an IP router=09
 	=09
 	   In this third model, the relationship between the NAN and the =
HAN is=09
 	   either as in Appendix A.2 or Appendix A.3; what is different =
is that=09
 	   the collector may be an IP router.  In addition to whatever=09=

 	   autonomous activities it is doing, it forwards traffic as an =
IP=09
 	   router in some cases.=09
 	=09
 	   As and analogous to Appendix A.3, there are serious security=09=

 	   considerations in this model.  Traffic being forwarded should =
be=09
 	   filtered, and the issues raised in Appendix A.1.2 take on a =
new level=09
 	   of meaning - but this time at the utility mainframe.  =
Unauthorized=09
 	   access is likely similar to other financially-motivated =
attacks that=09
 	   happen in the Internet, but presumably would be coming from =
devices=09
 	   in the HAN that have been co-opted in some way.  One really =
wants the=09
 	   appliances to only obey commands under strict authentication/=09=

 	   authorization controls.=09
 	=09
 	   In addition to the QoS issues raised in Appendix A.2, there =
is the=09
 	   possibility of queuing issues in the collector.  In such a =
case, the=09
 	   IP datagrams should probably use the Low-Latency Data Service =
Class=09
 	   described in [RFC4594], and let other traffic use the =
Standard=09
 	   Service Class or other service classes.=09
 	                                                                 =
        =09
Authors' Addresses	 	Authors' Addresses=09
 	=09
   Fred Baker	 	   Fred Baker=09
   Cisco Systems	 	   Cisco Systems=09
   Santa Barbara, California  93117	 	   Santa Barbara, =
California  93117=09
   USA	 	   USA=09
 	=09
   Email: fred@cisco.com	 	   Email: fred@cisco.com=09
 	=09
   David Meyer	 	   David Meyer=09
 	=09
 End of changes. 60 change blocks.=20
149 lines changed or deleted		758 lines changed or added=09

This html diff was produced by rfcdiff 1.40. The latest version is =
available from http://tools.ietf.org/tools/rfcdiff/=20


--Apple-Mail-46-487591200
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=us-ascii

<html><head><base href=3D"http://tools.ietf.org/rfcdiff">=20
  <meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Diso-8859-1">=20
  <meta http-equiv=3D"Content-Style-Type" content=3D"text/css">=20
  <title>Diff: draft-baker-ietf-core-07.txt - =
sg-ietf-compendium.txt</title>=20
  <style type=3D"text/css">=20
    body    { margin: 0.4ex; margin-right: auto; }=20
    tr      { }=20
    td      { white-space: pre; font-family: monospace; vertical-align: =
top; font-size: 0.86em;}=20
    th      { font-size: 0.86em; }=20
    .small  { font-size: 0.6em; font-style: italic; font-family: =
Verdana, Helvetica, sans-serif; }=20
    .left   { background-color: #EEE; }=20
    .right  { background-color: #FFF; }=20
    .diff   { background-color: #CCF; }=20
    .lblock { background-color: #BFB; }=20
    .rblock { background-color: #FF8; }=20
    .insert { background-color: #8FF; }=20
    .delete { background-color: #ACF; }=20
    .void   { background-color: #FFB; }=20
    .cont   { background-color: #EEE; }=20
    .linebr { background-color: #AAA; }=20
    .lineno { color: red; background-color: #FFF; font-size: 0.7em; =
text-align: right; padding: 0 2px; }=20
    .elipsis{ background-color: #AAA; }=20
    .left .cont { background-color: #DDD; }=20
    .right .cont { background-color: #EEE; }=20
    .lblock .cont { background-color: #9D9; }=20
    .rblock .cont { background-color: #DD6; }=20
    .insert .cont { background-color: #0DD; }=20
    .delete .cont { background-color: #8AD; }=20
    .stats, .stats td, .stats th { background-color: #EEE; padding: 2px =
0; }=20
  </style>=20
</head><body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; =
-webkit-line-break: after-white-space; "><base =
href=3D"http://tools.ietf.org/rfcdiff"><div style=3D"font-family: =
Helvetica; font-size: 12px; color: black; text-align: left; "><span =
class=3D"Apple-style-span" style=3D"font-size: medium; font-family: =
monospace; "><br>On Oct 25, 2010, at 11:29 AM, IETF I-D Submission Tool =
wrote:<br><br><blockquote type=3D"cite"><br>A new version of I-D, =
draft-baker-ietf-core-09.txt has been successfully submitted by Fred =
Baker and posted to the IETF repository.<br><br>Filename:<span =
class=3D"Apple-tab-span" style=3D"white-space: pre; ">	=
</span>&nbsp;draft-baker-ietf-core<br>Revision:<span =
class=3D"Apple-tab-span" style=3D"white-space: pre; ">	=
</span>&nbsp;09<br>Title:<span class=3D"Apple-tab-span" =
style=3D"white-space: pre; ">	</span><span class=3D"Apple-tab-span" =
style=3D"white-space: pre; ">	</span>&nbsp;Internet Protocols for the =
Smart Grid<br>Creation_date:<span class=3D"Apple-tab-span" =
style=3D"white-space: pre; ">	</span>&nbsp;2010-10-25<br>WG ID:<span =
class=3D"Apple-tab-span" style=3D"white-space: pre; ">	</span><span =
class=3D"Apple-tab-span" style=3D"white-space: pre; ">	=
</span>&nbsp;Independent Submission<br>Number_of_pages: =
57<br><br>Abstract:<br>This note identifies the key protocols of the =
Internet Protocol Suite<br>for use in the Smart Grid. &nbsp;The target =
audience is those people<br>seeking guidance on how to construct an =
appropriate Internet Protocol<br>Suite profile for the Smart Grid. =
&nbsp;In practice, such a profile would<br>consist of selecting what is =
needed for Smart Grid deployment from<br>the picture presented =
here.<br></blockquote><br></span></div>=20
  <table border=3D"0" cellpadding=3D"0" cellspacing=3D"0">=20
  <tbody><tr bgcolor=3D"orange"><th></th><th><a =
href=3D"/rfcdiff?url2=3Ddraft-baker-ietf-core-07.txt" style=3D"color:#008;=
 text-decoration:none;">&lt;</a>&nbsp;<a =
href=3D"/html/draft-baker-ietf-core-07.txt" =
style=3D"color:#008">draft-baker-ietf-core-07.txt</a>&nbsp;</th><th> =
</th><th>&nbsp;sg-ietf-compendium.txt&nbsp;</th><th></th></tr>=20
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left">Network Working Group                                     =
      F. Baker</td><td> </td><td class=3D"right">Network Working Group   =
                                        F. Baker</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left">Internet-Draft                                            =
      D. Meyer</td><td> </td><td class=3D"right">Internet-Draft          =
                                        D. Meyer</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left">Intended status: Informational                            =
 Cisco Systems</td><td> </td><td class=3D"right">Intended status: =
Informational                             Cisco Systems</td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td><a name=3D"diff0001"></a></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock">Expires: <span class=3D"delete">February 18, 2011       =
                        August 17</span>, 2010</td><td> </td><td =
class=3D"rblock">Expires: <span class=3D"insert">April 28, 2011          =
                       October 25</span>, 2010</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
              Internet Protocols for the Smart Grid</td><td> </td><td =
class=3D"right">                 Internet Protocols for the Smart =
Grid</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td><a name=3D"diff0002"></a></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
                       draft-baker-ietf-core-0<span =
class=3D"delete">7</span></td><td> </td><td class=3D"rblock">            =
            draft-baker-ietf-core-0<span class=3D"insert">9</span></td><td=
 class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left">Abstract</td><td> </td><td class=3D"right">Abstract</td><td=
 class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
This note identifies the key protocols of the Internet Protocol =
Suite</td><td> </td><td class=3D"right">   This note identifies the key =
protocols of the Internet Protocol Suite</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
for use in the Smart Grid.  The target audience is those people</td><td> =
</td><td class=3D"right">   for use in the Smart Grid.  The target =
audience is those people</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
seeking guidance on how to construct an appropriate Internet =
Protocol</td><td> </td><td class=3D"right">   seeking guidance on how to =
construct an appropriate Internet Protocol</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
Suite profile for the Smart Grid.  In practice, such a profile =
would</td><td> </td><td class=3D"right">   Suite profile for the Smart =
Grid.  In practice, such a profile would</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
consist of selecting what is needed for Smart Grid deployment =
from</td><td> </td><td class=3D"right">   consist of selecting what is =
needed for Smart Grid deployment from</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
the picture presented here.</td><td> </td><td class=3D"right">   the =
picture presented here.</td><td class=3D"lineno" valign=3D"top"></td></tr>=

      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr bgcolor=3D"gray"><td></td><th><a =
name=3D"part-l2"><small>skipping to change at</small><em> page 1, line =
35</em></a></th><th> </th><th><a name=3D"part-r2"><small>skipping to =
change at</small><em> page 1, line 35</em></a></th><td></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
Internet-Drafts are working documents of the Internet =
Engineering</td><td> </td><td class=3D"right">   Internet-Drafts are =
working documents of the Internet Engineering</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
Task Force (IETF).  Note that other groups may also distribute</td><td> =
</td><td class=3D"right">   Task Force (IETF).  Note that other groups =
may also distribute</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
working documents as Internet-Drafts.  The list of current =
Internet-</td><td> </td><td class=3D"right">   working documents as =
Internet-Drafts.  The list of current Internet-</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
Drafts is at <a =
href=3D"http://datatracker.ietf.org/drafts/current/">http://datatracker.ie=
tf.org/drafts/current/</a>.</td><td> </td><td class=3D"right">   Drafts =
is at <a =
href=3D"http://datatracker.ietf.org/drafts/current/">http://datatracker.ie=
tf.org/drafts/current/</a>.</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
Internet-Drafts are draft documents valid for a maximum of six =
months</td><td> </td><td class=3D"right">   Internet-Drafts are draft =
documents valid for a maximum of six months</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
and may be updated, replaced, or obsoleted by other documents at =
any</td><td> </td><td class=3D"right">   and may be updated, replaced, =
or obsoleted by other documents at any</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
time.  It is inappropriate to use Internet-Drafts as reference</td><td> =
</td><td class=3D"right">   time.  It is inappropriate to use =
Internet-Drafts as reference</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
material or to cite them other than as "work in progress."</td><td> =
</td><td class=3D"right">   material or to cite them other than as "work =
in progress."</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td><a name=3D"diff0003"></a></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  This Internet-Draft will expire on <span class=3D"delete">February =
1</span>8, 2011.</td><td> </td><td class=3D"rblock">   This =
Internet-Draft will expire on <span class=3D"insert">April 2</span>8, =
2011.</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left">Copyright Notice</td><td> </td><td =
class=3D"right">Copyright Notice</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
Copyright (c) 2010 IETF Trust and the persons identified as the</td><td> =
</td><td class=3D"right">   Copyright (c) 2010 IETF Trust and the =
persons identified as the</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
document authors.  All rights reserved.</td><td> </td><td class=3D"right">=
   document authors.  All rights reserved.</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
This document is subject to BCP 78 and the IETF Trust's Legal</td><td> =
</td><td class=3D"right">   This document is subject to BCP 78 and the =
IETF Trust's Legal</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
Provisions Relating to IETF Documents</td><td> </td><td class=3D"right"> =
  Provisions Relating to IETF Documents</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
(<a =
href=3D"http://trustee.ietf.org/license-info">http://trustee.ietf.org/lice=
nse-info</a>) in effect on the date of</td><td> </td><td class=3D"right"> =
  (<a =
href=3D"http://trustee.ietf.org/license-info">http://trustee.ietf.org/lice=
nse-info</a>) in effect on the date of</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
publication of this document.  Please review these documents</td><td> =
</td><td class=3D"right">   publication of this document.  Please review =
these documents</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr bgcolor=3D"gray"><td></td><th><a =
name=3D"part-l3"><small>skipping to change at</small><em> page 2, line =
19</em></a></th><th> </th><th><a name=3D"part-r3"><small>skipping to =
change at</small><em> page 2, line 19</em></a></th><td></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
2.  The Internet Protocol Suite  . . . . . . . . . . . . . . . . .  =
5</td><td> </td><td class=3D"right">   2.  The Internet Protocol Suite  =
. . . . . . . . . . . . . . . . .  5</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
  2.1.  Internet Protocol Layers . . . . . . . . . . . . . . . . .  =
5</td><td> </td><td class=3D"right">     2.1.  Internet Protocol Layers =
. . . . . . . . . . . . . . . . .  5</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
    2.1.1.  Application  . . . . . . . . . . . . . . . . . . . . .  =
6</td><td> </td><td class=3D"right">       2.1.1.  Application  . . . . =
. . . . . . . . . . . . . . . . .  6</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
    2.1.2.  Transport  . . . . . . . . . . . . . . . . . . . . . .  =
7</td><td> </td><td class=3D"right">       2.1.2.  Transport  . . . . . =
. . . . . . . . . . . . . . . . .  7</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
    2.1.3.  Network  . . . . . . . . . . . . . . . . . . . . . . .  =
7</td><td> </td><td class=3D"right">       2.1.3.  Network  . . . . . . =
. . . . . . . . . . . . . . . . .  7</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
      2.1.3.1.  Internet Protocol  . . . . . . . . . . . . . . . .  =
8</td><td> </td><td class=3D"right">         2.1.3.1.  Internet Protocol =
 . . . . . . . . . . . . . . . .  8</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
      2.1.3.2.  Lower layer networks . . . . . . . . . . . . . . .  =
8</td><td> </td><td class=3D"right">         2.1.3.2.  Lower layer =
networks . . . . . . . . . . . . . . .  8</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
    2.1.4.  Media layers: Physical and Link  . . . . . . . . . . .  =
8</td><td> </td><td class=3D"right">       2.1.4.  Media layers: =
Physical and Link  . . . . . . . . . . .  8</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
  2.2.  Security issues  . . . . . . . . . . . . . . . . . . . . .  =
8</td><td> </td><td class=3D"right">     2.2.  Security issues  . . . . =
. . . . . . . . . . . . . . . . .  8</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
    2.2.1.  Physical security  . . . . . . . . . . . . . . . . . .  =
9</td><td> </td><td class=3D"right">       2.2.1.  Physical security  . =
. . . . . . . . . . . . . . . . .  9</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td><a name=3D"diff0004"></a></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
      2.2.2.  Session <span class=3D"delete">identif</span>ication . . . =
. . . . . . . . . . . . .  9</td><td> </td><td class=3D"rblock">       =
2.2.2.  Session <span class=3D"insert">Authent</span>ication . . . . . . =
. . . . . . . . . .  9</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
    2.2.3.  Confidentiality  . . . . . . . . . . . . . . . . . . . =
10</td><td> </td><td class=3D"right">       2.2.3.  Confidentiality  . . =
. . . . . . . . . . . . . . . . . 10</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
  2.3.  Network Infrastructure . . . . . . . . . . . . . . . . . . =
11</td><td> </td><td class=3D"right">     2.3.  Network Infrastructure . =
. . . . . . . . . . . . . . . . . 11</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
    2.3.1.  Domain Name System (DNS) . . . . . . . . . . . . . . . =
11</td><td> </td><td class=3D"right">       2.3.1.  Domain Name System =
(DNS) . . . . . . . . . . . . . . . 11</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
    2.3.2.  Network Management . . . . . . . . . . . . . . . . . . =
11</td><td> </td><td class=3D"right">       2.3.2.  Network Management . =
. . . . . . . . . . . . . . . . . 11</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
3.  Specific protocols . . . . . . . . . . . . . . . . . . . . . . =
11</td><td> </td><td class=3D"right">   3.  Specific protocols . . . . . =
. . . . . . . . . . . . . . . . . 11</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
  3.1.  Security solutions . . . . . . . . . . . . . . . . . . . . =
12</td><td> </td><td class=3D"right">     3.1.  Security solutions . . . =
. . . . . . . . . . . . . . . . . 12</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
    3.1.1.  Session identification, authentication,</td><td> </td><td =
class=3D"right">       3.1.1.  Session identification, =
authentication,</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
            authorization, and accounting  . . . . . . . . . . . . =
12</td><td> </td><td class=3D"right">               authorization, and =
accounting  . . . . . . . . . . . . 12</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
    3.1.2.  IP Security Architecture (IPsec) . . . . . . . . . . . =
12</td><td> </td><td class=3D"right">       3.1.2.  IP Security =
Architecture (IPsec) . . . . . . . . . . . 12</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td><a name=3D"diff0005"></a></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
      3.1.3.  Transport Layer Security (TLS) . . . . . . . . . . . . =
1<span class=3D"delete">2</span></td><td> </td><td class=3D"rblock">     =
  3.1.3.  Transport Layer Security (TLS) . . . . . . . . . . . . 1<span =
class=3D"insert">3</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
    3.1.4.  Secure/Multipurpose Internet Mail Extensions</td><td> =
</td><td class=3D"right">       3.1.4.  Secure/Multipurpose Internet =
Mail Extensions</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td><a name=3D"diff0006"></a></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
              (S/MIME) . . . . . . . . . . . . . . . . . . . . . . . =
<span class=3D"delete">13</span></td><td> </td><td class=3D"rblock">     =
          (S/MIME) . . . . . . . . . . . . . . . . . . . . . . . <span =
class=3D"insert">14</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
    3.2.  Network Layer  . . . . . . . . . . . . . . . . . . . . . . =
<span class=3D"delete">13</span></td><td> </td><td class=3D"rblock">     =
3.2.  Network Layer  . . . . . . . . . . . . . . . . . . . . . . <span =
class=3D"insert">14</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
      3.2.1.  IPv4/IPv6 Coexistence Advice . . . . . . . . . . . . . =
<span class=3D"delete">13</span></td><td> </td><td class=3D"rblock">     =
  3.2.1.  IPv4/IPv6 Coexistence Advice . . . . . . . . . . . . . <span =
class=3D"insert">14</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
      3.2.1.1.  Dual Stack Coexistence . . . . . . . . . . . . . . =
14</td><td> </td><td class=3D"right">         3.2.1.1.  Dual Stack =
Coexistence . . . . . . . . . . . . . . 14</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td><a name=3D"diff0007"></a></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
        3.2.1.2.  Tunneling Mechanism  . . . . . . . . . . . . . . . =
<span class=3D"delete">14</span></td><td> </td><td class=3D"rblock">     =
    3.2.1.2.  Tunneling Mechanism  . . . . . . . . . . . . . . . <span =
class=3D"insert">15</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
        3.2.1.3.  Translation between IPv4 and IPv6 Networks . . . . =
<span class=3D"delete">14</span></td><td> </td><td class=3D"rblock">     =
    3.2.1.3.  Translation between IPv4 and IPv6 Networks . . . . <span =
class=3D"insert">15</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
      3.2.2.  Internet Protocol Version 4  . . . . . . . . . . . . . =
<span class=3D"delete">15</span></td><td> </td><td class=3D"rblock">     =
  3.2.2.  Internet Protocol Version 4  . . . . . . . . . . . . . <span =
class=3D"insert">16</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
        3.2.2.1.  IPv4 Address Allocation and Assignment . . . . . . =
<span class=3D"delete">16</span></td><td> </td><td class=3D"rblock">     =
    3.2.2.1.  IPv4 Address Allocation and Assignment . . . . . . <span =
class=3D"insert">17</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
        3.2.2.2.  IPv4 Unicast Routing . . . . . . . . . . . . . . . =
<span class=3D"delete">16</span></td><td> </td><td class=3D"rblock">     =
    3.2.2.2.  IPv4 Unicast Routing . . . . . . . . . . . . . . . <span =
class=3D"insert">17</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
        3.2.2.3.  IPv4 Multicast Forwarding and Routing  . . . . . . =
<span class=3D"delete">16</span></td><td> </td><td class=3D"rblock">     =
    3.2.2.3.  IPv4 Multicast Forwarding and Routing  . . . . . . <span =
class=3D"insert">17</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
      3.2.3.  Internet Protocol Version 6  . . . . . . . . . . . . . =
<span class=3D"delete">17</span></td><td> </td><td class=3D"rblock">     =
  3.2.3.  Internet Protocol Version 6  . . . . . . . . . . . . . <span =
class=3D"insert">18</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
        3.2.3.1.  IPv6 Address Allocation and Assignment . . . . . . =
<span class=3D"delete">17</span></td><td> </td><td class=3D"rblock">     =
    3.2.3.1.  IPv6 Address Allocation and Assignment . . . . . . <span =
class=3D"insert">18</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
        3.2.3.2.  IPv6 Routing . . . . . . . . . . . . . . . . . . . =
<span class=3D"delete">18</span></td><td> </td><td class=3D"rblock">     =
    3.2.3.2.  IPv6 Routing . . . . . . . . . . . . . . . . . . . <span =
class=3D"insert">19</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
      3.2.4.  Routing for IPv4 and IPv6  . . . . . . . . . . . . . . =
<span class=3D"delete">18</span></td><td> </td><td class=3D"rblock">     =
  3.2.4.  Routing for IPv4 and IPv6  . . . . . . . . . . . . . . <span =
class=3D"insert">19</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
        3.2.4.1.  Routing Information Protocol . . . . . . . . . . . =
<span class=3D"delete">18</span></td><td> </td><td class=3D"rblock">     =
    3.2.4.1.  Routing Information Protocol . . . . . . . . . . . <span =
class=3D"insert">19</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
      3.2.4.2.  Open Shortest Path First . . . . . . . . . . . . . =
19</td><td> </td><td class=3D"right">         3.2.4.2.  Open Shortest =
Path First . . . . . . . . . . . . . 19</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td><a name=3D"diff0008"></a></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
        3.2.4.3.  ISO Intermediate System to Intermediate System . . =
<span class=3D"delete">19</span></td><td> </td><td class=3D"rblock">     =
    3.2.4.3.  ISO Intermediate System to Intermediate System . . <span =
class=3D"insert">20</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
        3.2.4.4.  Border Gateway Protocol  . . . . . . . . . . . . . =
<span class=3D"delete">19</span></td><td> </td><td class=3D"rblock">     =
    3.2.4.4.  Border Gateway Protocol  . . . . . . . . . . . . . <span =
class=3D"insert">20</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
      3.2.4.5.  Dynamic MANET On-demand (DYMO) Routing . . . . . . =
20</td><td> </td><td class=3D"right">         3.2.4.5.  Dynamic MANET =
On-demand (DYMO) Routing . . . . . . 20</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td><a name=3D"diff0009"></a></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
        3.2.4.6.  Optimized Link State Routing Protocol  . . . . . . =
<span class=3D"delete">20</span></td><td> </td><td class=3D"rblock">     =
    3.2.4.6.  Optimized Link State Routing Protocol  . . . . . . <span =
class=3D"insert">21</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
        3.2.4.7.  Routing for Low power and Lossy Networks . . . . . =
<span class=3D"delete">20</span></td><td> </td><td class=3D"rblock">     =
    3.2.4.7.  Routing for Low power and Lossy Networks . . . . . <span =
class=3D"insert">21</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
      3.2.5.  IPv6 Multicast Forwarding and Routing  . . . . . . . . =
<span class=3D"delete">20</span></td><td> </td><td class=3D"rblock">     =
  3.2.5.  IPv6 Multicast Forwarding and Routing  . . . . . . . . <span =
class=3D"insert">22</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
        3.2.5.1.  Protocol-Independent Multicast Routing . . . . . . =
<span class=3D"delete">21</span></td><td> </td><td class=3D"rblock">     =
    3.2.5.1.  Protocol-Independent Multicast Routing . . . . . . <span =
class=3D"insert">22</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
    3.2.6.  Adaptation to lower layer networks and link layer</td><td> =
</td><td class=3D"right">       3.2.6.  Adaptation to lower layer =
networks and link layer</td><td class=3D"lineno" valign=3D"top"></td></tr>=

      <tr><td><a name=3D"diff0010"></a></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
              protocols  . . . . . . . . . . . . . . . . . . . . . . =
<span class=3D"delete">21</span></td><td> </td><td class=3D"rblock">     =
          protocols  . . . . . . . . . . . . . . . . . . . . . . <span =
class=3D"insert">23</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
    3.3.  Transport Layer  . . . . . . . . . . . . . . . . . . . . . =
<span class=3D"delete">22</span></td><td> </td><td class=3D"rblock">     =
3.3.  Transport Layer  . . . . . . . . . . . . . . . . . . . . . <span =
class=3D"insert">23</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
      3.3.1.  User Datagram Protocol (UDP) . . . . . . . . . . . . . =
<span class=3D"delete">22</span></td><td> </td><td class=3D"rblock">     =
  3.3.1.  User Datagram Protocol (UDP) . . . . . . . . . . . . . <span =
class=3D"insert">23</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
      3.3.2.  Transmission Control Protocol (TCP)  . . . . . . . . . =
<span class=3D"delete">22</span></td><td> </td><td class=3D"rblock">     =
  3.3.2.  Transmission Control Protocol (TCP)  . . . . . . . . . <span =
class=3D"insert">24</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
      3.3.3.  Stream Control Transmission Protocol (SCTP)  . . . . . =
<span class=3D"delete">23</span></td><td> </td><td class=3D"rblock">     =
  3.3.3.  Stream Control Transmission Protocol (SCTP)  . . . . . <span =
class=3D"insert">24</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
      3.3.4.  Datagram Congestion Control Protocol (DCCP)  . . . . . =
<span class=3D"delete">23</span></td><td> </td><td class=3D"rblock">     =
  3.3.4.  Datagram Congestion Control Protocol (DCCP)  . . . . . <span =
class=3D"insert">25</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
    3.4.  Infrastructure . . . . . . . . . . . . . . . . . . . . . . =
<span class=3D"delete">24</span></td><td> </td><td class=3D"rblock">     =
3.4.  Infrastructure . . . . . . . . . . . . . . . . . . . . . . <span =
class=3D"insert">25</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
      3.4.1.  Domain Name System . . . . . . . . . . . . . . . . . . =
<span class=3D"delete">24</span></td><td> </td><td class=3D"rblock">     =
  3.4.1.  Domain Name System . . . . . . . . . . . . . . . . . . <span =
class=3D"insert">25</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
      3.4.2.  Dynamic Host Configuration . . . . . . . . . . . . . . =
<span class=3D"delete">24</span></td><td> </td><td class=3D"rblock">     =
  3.4.2.  Dynamic Host Configuration . . . . . . . . . . . . . . <span =
class=3D"insert">26</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"><span class=3D"delete">     3.5.  Service and Resource =
Discovery</span> . . . . . . . . . . . . . . <span =
class=3D"delete">24</span></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">       3.4.3.  Network Time .</span> . . . . . . . . . =
. . . . . . . . . . . <span class=3D"insert">26</span></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"><span class=3D"delete">       3.5.1.  Service =
Discovery</span>  . . . . . . . . . . . . . . . . . . <span =
class=3D"delete">24</span></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">     3.5.  Network Management</span> . . . . . . . . . =
. . . <span class=3D"insert">. . . . . . . . 26</span></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
      3.5.2.  Resource     Discovery . . . . . . . . . . . . . . . . =
<span class=3D"delete">25</span></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">       3.5.1.  Simple Network Management Protocol =
(SNMP)  . . . . . . 26</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"><span class=3D"delete">     3.6.  Other =
Applications</span> . . . . . . . . . . . . . . . . . . . . <span =
class=3D"delete">26</span></td><td> </td><td class=3D"rblock">       =
3.5.2.  <span class=3D"insert">Network Configuration (NETCONF) Protocol =
. . . . . . . 27</span></td><td class=3D"lineno" valign=3D"top"></td></tr>=

      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"><span class=3D"delete">       3.6.1.  Network =
Time</span> . . . . . . . . . . . . . . . . . . . . . <span =
class=3D"delete">26</span></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">     3.6.  Service and</span> Resource Discovery . . . =
. . . . . . . . . . . <span class=3D"insert">28</span></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"><span class=3D"delete">       3.6.2.</span>  Session =
Initiation Protocol  . . . . . . . . . . . . . <span =
class=3D"delete">26</span></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">       3.6.1.  Service Discovery  . .</span> . . . . . =
. . . . . . . . . . . <span class=3D"insert">28</span></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"><span class=3D"delete">       3.6.3.</span>  =
Calendaring  . . . . . . . . . . . . . . . . . . . . . <span =
class=3D"delete">27</span></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">       3.6.2.  Resource Discovery .</span> . . . . . . =
. . . . . . . . . . . <span class=3D"insert">28</span></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  4.  A simplified view of the business architecture . . . . . . . . =
<span class=3D"delete">27</span></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">     3.7.  Other Applications</span> . . . . . . . . . =
. <span class=3D"insert">. . . . . . . . . . 29</span></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  5.  IANA Considerations  . . . . . . . . . . . . . . . . . . . . . =
<span class=3D"delete">31</span></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">       3.7.1.</span>  Session Initiation Protocol  . . =
. . . . . . . . . . . <span class=3D"insert">29</span></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  6.  Security Considerations  . . . . . . . . . . . . . . . . . . . =
<span class=3D"delete">32</span></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">       3.7.2.</span>  Calendaring  . . . . . . . . . . =
. . . . . . . . . . . <span class=3D"insert">30</span></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  7.  Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . =
<span class=3D"delete">32</span></td><td> </td><td class=3D"rblock">   =
4.  A simplified view of the business architecture . . . . . . . . <span =
class=3D"insert">30</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  8.  References . . . . . . . . . . . . . . . . . . . . . . . . . . =
<span class=3D"delete">32</span></td><td> </td><td class=3D"rblock">   =
5.  IANA Considerations  . . . . . . . . . . . . . . . . . . . . . <span =
class=3D"insert">34</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
    8.1.  Normative References . . . . . . . . . . . . . . . . . . . =
<span class=3D"delete">32</span></td><td> </td><td class=3D"rblock">   =
6.  Security Considerations  . . . . . . . . . . . . . . . . . . . <span =
class=3D"insert">35</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
    8.2.  Informative References . . . . . . . . . . . . . . . . . . =
<span class=3D"delete">32</span></td><td> </td><td class=3D"rblock">   =
7.  Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . <span =
class=3D"insert">35</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . =
<span class=3D"delete">44</span></td><td> </td><td class=3D"rblock">   =
8.  References . . . . . . . . . . . . . . . . . . . . . . . . . . <span =
class=3D"insert">35</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock">     8.1.  =
Normative References . . . . . . . . . . . . . . . . . . . <span =
class=3D"insert">35</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock">     8.2.  =
Informative References . . . . . . . . . . . . . . . . . . <span =
class=3D"insert">35</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   Appendix A.  Example: Advanced Metering =
Infrastructure . . . . . . 49</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">     A.1.  How to structure a network . . . . . . . . . =
. . . . . . . 51</span></td><td class=3D"lineno" valign=3D"top"></td></tr>=

      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">       A.1.1.  HAN Routing  . . . . . . . . . . . . . . =
. . . . . . . 53</span></td><td class=3D"lineno" valign=3D"top"></td></tr>=

      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">       A.1.2.  HAN Security . . . . . . . . . . . . . . =
. . . . . . . 53</span></td><td class=3D"lineno" valign=3D"top"></td></tr>=

      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">     A.2.  Model 1: AMI with separated domains  . . . . =
. . . . . . . 54</span></td><td class=3D"lineno" valign=3D"top"></td></tr>=

      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">     A.3.  Model 2: AMI with neighborhood access to the =
home  . . . . 55</span></td><td class=3D"lineno" valign=3D"top"></td></tr>=

      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">     A.4.  Model 3: Collector is an IP router . . . . . =
. . . . . . . 56</span></td><td class=3D"lineno" valign=3D"top"></td></tr>=

      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock">   Authors' =
Addresses . . . . . . . . . . . . . . . . . . . . . . . . <span =
class=3D"insert">57</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">1. =
 Introduction</td><td> </td><td class=3D"right">1.  Introduction</td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
This document provides Smart Grid designers with advice on how =
to</td><td> </td><td class=3D"right">   This document provides Smart =
Grid designers with advice on how to</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
best "profile" the Internet Protocol Suite (IPS) for use on =
with</td><td> </td><td class=3D"right">   best "profile" the Internet =
Protocol Suite (IPS) for use on with</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
Smart Grids.  It provides an overview of the IPS and the key</td><td> =
</td><td class=3D"right">   Smart Grids.  It provides an overview of the =
IPS and the key</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
protocols that are critical in integrating Smart Grid devices into =
an</td><td> </td><td class=3D"right">   protocols that are critical in =
integrating Smart Grid devices into an</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
IP-based infrastructure.</td><td> </td><td class=3D"right">   IP-based =
infrastructure.</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
The IPS provides options for several key architectural =
components.</td><td> </td><td class=3D"right">   The IPS provides =
options for several key architectural components.</td><td class=3D"lineno"=
 valign=3D"top"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr bgcolor=3D"gray"><td></td><th><a =
name=3D"part-l4"><small>skipping to change at</small><em> page 4, line =
45</em></a></th><th> </th><th><a name=3D"part-r4"><small>skipping to =
change at</small><em> page 4, line 45</em></a></th><td></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
o  IPv6 Node Requirements [RFC4294],</td><td> </td><td class=3D"right">  =
 o  IPv6 Node Requirements [RFC4294],</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
At this writing, RFC 4294 is in the process of being updated, =
in</td><td> </td><td class=3D"right">   At this writing, RFC 4294 is in =
the process of being updated, in</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[I-D.ietf-6man-node-req-bis].</td><td> </td><td class=3D"right">   =
[I-D.ietf-6man-node-req-bis].</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
This document is intended to provide Smart Grid architects and</td><td> =
</td><td class=3D"right">   This document is intended to provide Smart =
Grid architects and</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
designers with a compendium of relevant RFCs (and to some =
extent</td><td> </td><td class=3D"right">   designers with a compendium =
of relevant RFCs (and to some extent</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
Internet Drafts), and is organized as an annotated list of RFCs.  =
To</td><td> </td><td class=3D"right">   Internet Drafts), and is =
organized as an annotated list of RFCs.  To</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
that end, the remainder of this document is organized as =
follows:</td><td> </td><td class=3D"right">   that end, the remainder of =
this document is organized as follows:</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td><a name=3D"diff0011"></a></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  Section 2 describes the Internet Architecture and its protocol =
suite.</td><td> </td><td class=3D"rblock">                               =
                                          </td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  Section 3 outlines the set of protocols that will be useful in =
Smart</td><td> </td><td class=3D"rblock">   <span =
class=3D"insert">o</span>  Section 2 describes the Internet Architecture =
and its protocol</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  Grid deployment.  Finally, Section 4 provides an overview of =
the</td><td> </td><td class=3D"rblock">      suite.</td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  business architecture embodied in the design and deployment of =
the</td><td> </td><td class=3D"rblock">                                  =
                                       </td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  IPS.</td><td> </td><td class=3D"rblock">   <span =
class=3D"insert">o</span>  Section 3 outlines the set of protocols that =
will be useful in</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock">      Smart Grid =
deployment.</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock">                    =
                                                     </td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock">   <span =
class=3D"insert">o</span>  Finally, Section 4 provides an overview of =
the business</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock">      architecture =
embodied in the design and deployment of the IPS.</td><td class=3D"lineno"=
 valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">2. =
 The Internet Protocol Suite</td><td> </td><td class=3D"right">2.  The =
Internet Protocol Suite</td><td class=3D"lineno" valign=3D"top"></td></tr>=

      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
Before enumerating the list of Internet protocols relevant to =
Smart</td><td> </td><td class=3D"right">   Before enumerating the list =
of Internet protocols relevant to Smart</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
Grid, we discuss the layered architecture of the IPS, the =
functions</td><td> </td><td class=3D"right">   Grid, we discuss the =
layered architecture of the IPS, the functions</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
of the various layers, and their associated protocols.</td><td> </td><td =
class=3D"right">   of the various layers, and their associated =
protocols.</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">2.1.=
  Internet Protocol Layers</td><td> </td><td class=3D"right">2.1.  =
Internet Protocol Layers</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
While Internet architecture uses the definitions and language =
similar</td><td> </td><td class=3D"right">   While Internet architecture =
uses the definitions and language similar</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr bgcolor=3D"gray"><td></td><th><a =
name=3D"part-l5"><small>skipping to change at</small><em> page 8, line =
49</em></a></th><th> </th><th><a name=3D"part-r5"><small>skipping to =
change at</small><em> page 8, line 49</em></a></th><td></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
At the lowest layer of the IP architecture, data is encoded in</td><td> =
</td><td class=3D"right">   At the lowest layer of the IP architecture, =
data is encoded in</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
messages and transmitted over the physical media.  While the =
IETF</td><td> </td><td class=3D"right">   messages and transmitted over =
the physical media.  While the IETF</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
specifies algorithms for carrying IPv4 and IPv6 various media =
types,</td><td> </td><td class=3D"right">   specifies algorithms for =
carrying IPv4 and IPv6 various media types,</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
it rarely actually defines the media - it happily uses =
specifications</td><td> </td><td class=3D"right">   it rarely actually =
defines the media - it happily uses specifications</td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
from IEEE, ITU, and other sources.</td><td> </td><td class=3D"right">   =
from IEEE, ITU, and other sources.</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">2.2.=
  Security issues</td><td> </td><td class=3D"right">2.2.  Security =
issues</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
While it is popular to complain about the security of the =
Internet,</td><td> </td><td class=3D"right">   While it is popular to =
complain about the security of the Internet,</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
solutions to many Internet security problems already exist but =
have</td><td> </td><td class=3D"right">   solutions to many Internet =
security problems already exist but have</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td><a name=3D"diff0012"></a></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  not been widely <span class=3D"delete">deployed.</span>  Internet =
security solutions attempt to</td><td> </td><td class=3D"rblock">   =
<span class=3D"insert">either</span> not been widely <span =
class=3D"insert">deployed, may impact critical =
performance</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  mitigate a set of known threats at a specified cost; =
addressing</td><td> </td><td class=3D"rblock"><span class=3D"insert">   =
criteria, or require security measures outside the IPS.</span>  =
Internet</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  security issues requires first a threat analysis and assessment and =
a</td><td> </td><td class=3D"rblock">   security solutions attempt to =
mitigate a set of known threats <span =
class=3D"insert">within</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  set of mitigations appropriate to the threats.  Since we have =
threats</td><td> </td><td class=3D"rblock"><span class=3D"insert">   the =
IPS domain</span> at a specified cost; addressing security =
issues</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  at every layer, we should expect to find mitigations at every =
layer.</td><td> </td><td class=3D"rblock">   requires first a threat =
analysis and assessment and a set of</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock">   mitigations =
appropriate to the threats.  Since we have threats at</td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock">   every layer, we =
should expect to find mitigations at every layer.</td><td class=3D"lineno"=
 valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left">2.2.1.  Physical security</td><td> </td><td =
class=3D"right">2.2.1.  Physical security</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
At the physical and data link layers, threats generally center =
on</td><td> </td><td class=3D"right">   At the physical and data link =
layers, threats generally center on</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
physical attacks on the network - the effects of backhoes,</td><td> =
</td><td class=3D"right">   physical attacks on the network - the =
effects of backhoes,</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
deterioration of physical media, and various kinds of =
environmental</td><td> </td><td class=3D"right">   deterioration of =
physical media, and various kinds of environmental</td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
noise.  Radio-based networks are subject to signal fade due to</td><td> =
</td><td class=3D"right">   noise.  Radio-based networks are subject to =
signal fade due to</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
distance, interference, and environmental factors; it is widely =
noted</td><td> </td><td class=3D"right">   distance, interference, and =
environmental factors; it is widely noted</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
that IEEE 802.15.4 networks frequently place a metal ground =
plate</td><td> </td><td class=3D"right">   that IEEE 802.15.4 networks =
frequently place a metal ground plate</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
between the meter and the device that manages it.  Fiber was at =
one</td><td> </td><td class=3D"right">   between the meter and the =
device that manages it.  Fiber was at one</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr bgcolor=3D"gray"><td></td><th><a =
name=3D"part-l6"><small>skipping to change at</small><em> page 9, line =
26</em></a></th><th> </th><th><a name=3D"part-r6"><small>skipping to =
change at</small><em> page 9, line 28</em></a></th><td></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
learned to tap it by bending the fiber and collecting =
incidental</td><td> </td><td class=3D"right">   learned to tap it by =
bending the fiber and collecting incidental</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
light, and we have learned about backhoes.  As a result, some</td><td> =
</td><td class=3D"right">   light, and we have learned about backhoes.  =
As a result, some</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
installations encase fiber optic cable in a pressurized sheath, =
both</td><td> </td><td class=3D"right">   installations encase fiber =
optic cable in a pressurized sheath, both</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
to quickly identify the location of a cut and to make it more</td><td> =
</td><td class=3D"right">   to quickly identify the location of a cut =
and to make it more</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
difficult to tap.</td><td> </td><td class=3D"right">   difficult to =
tap.</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
While there are protocol behaviors that can detect certain classes =
of</td><td> </td><td class=3D"right">   While there are protocol =
behaviors that can detect certain classes of</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
physical faults, such as keep-alive exchanges, physical security =
is</td><td> </td><td class=3D"right">   physical faults, such as =
keep-alive exchanges, physical security is</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
generally not considered to be a protocol problem.</td><td> </td><td =
class=3D"right">   generally not considered to be a protocol =
problem.</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td><a name=3D"diff0013"></a></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock">2.2.2.  Session <span =
class=3D"delete">identif</span>ication</td><td> </td><td =
class=3D"rblock">2.2.2.  Session <span =
class=3D"insert">Authent</span>ication</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
At the transport and application layers and in lower layer =
networks</td><td> </td><td class=3D"right">   At the transport and =
application layers and in lower layer networks</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
where dynamic connectivity such as ATM Switched Virtual =
Circuits</td><td> </td><td class=3D"right">   where dynamic connectivity =
such as ATM Switched Virtual Circuits</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
(SVCs) or "dial" connectivity are in use, there tend to be =
several</td><td> </td><td class=3D"right">   (SVCs) or "dial" =
connectivity are in use, there tend to be several</td><td class=3D"lineno"=
 valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
different classes of authentication/authorization requirements.  =
The</td><td> </td><td class=3D"right">   different classes of =
authentication/authorization requirements.  The</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
basic requirements that must be satisfied are:</td><td> </td><td =
class=3D"right">   basic requirements that must be satisfied =
are:</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
1.  Verify that peers are appropriate partners; this generally =
means</td><td> </td><td class=3D"right">   1.  Verify that peers are =
appropriate partners; this generally means</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
    knowing "who" they are and that they have a "need to know" or =
are</td><td> </td><td class=3D"right">       knowing "who" they are and =
that they have a "need to know" or are</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
    trusted sources.</td><td> </td><td class=3D"right">       trusted =
sources.</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr bgcolor=3D"gray"><td></td><th><a =
name=3D"part-l7"><small>skipping to change at</small><em> page 10, line =
9</em></a></th><th> </th><th><a name=3D"part-r7"><small>skipping to =
change at</small><em> page 10, line 11</em></a></th><td></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
    against modification attacks.</td><td> </td><td class=3D"right">     =
  against modification attacks.</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
In other words, both the communications channel itself and =
message</td><td> </td><td class=3D"right">   In other words, both the =
communications channel itself and message</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
exchanges (both by knowing the source of the information and to =
have</td><td> </td><td class=3D"right">   exchanges (both by knowing the =
source of the information and to have</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
proof of its validity) must be secured.  Three examples suffice =
to</td><td> </td><td class=3D"right">   proof of its validity) must be =
secured.  Three examples suffice to</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
illustrate the challenges.</td><td> </td><td class=3D"right">   =
illustrate the challenges.</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
One common attack against a TCP session is to bombard the =
session</td><td> </td><td class=3D"right">   One common attack against a =
TCP session is to bombard the session</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
with reset messages.  Other attacks against TCP include the =
"SYN</td><td> </td><td class=3D"right">   with reset messages.  Other =
attacks against TCP include the "SYN</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
flooding" attack, in which an attacker attempts to exhaust the =
memory</td><td> </td><td class=3D"right">   flooding" attack, in which =
an attacker attempts to exhaust the memory</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td><a name=3D"diff0014"></a></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  of the target by creating TCP state.  Experience has shown that =
by</td><td> </td><td class=3D"rblock">   of the target by creating TCP =
state.  <span class=3D"insert">In particular, the =
attacker</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  including information in the transport header or a related =
protocol</td><td> </td><td class=3D"rblock"><span class=3D"insert">   =
attempts to exhaust the target's memory by opening a large number =
of</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  like the IPsec (Section 3.1.2) or TLS (Section 3.1.3), a host =
can</td><td> </td><td class=3D"rblock"><span class=3D"insert">   unique =
TCP connections, each of which is represented by a</span></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  identify legitimate messages and discard <span =
class=3D"delete">mitigate</span> any damage that may</td><td> </td><td =
class=3D"rblock"><span class=3D"insert">   Transmission Control Block =
(TCB).  The attack is successful if the</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  have been caused by the attack.</td><td> </td><td class=3D"rblock"><span=
 class=3D"insert">   attacker can cause the target to fill its memory =
with TCBs.</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock">   Experience has =
shown that by including information in the transport</td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock">   header or a =
related protocol like the IPsec (Section 3.1.2) or TLS</td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock">   (Section 3.1.3), =
a host can identify legitimate messages and discard</td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock">   <span =
class=3D"insert">the others, thus mitigating</span> any damage that may =
have been caused by</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock">   the =
attack.</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
Another common attack involves unauthorized communication with =
a</td><td> </td><td class=3D"right">   Another common attack involves =
unauthorized communication with a</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
router or a service.  For example, an unauthorized party might try =
to</td><td> </td><td class=3D"right">   router or a service.  For =
example, an unauthorized party might try to</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
join the routing system.  To protect against such attacks, an</td><td> =
</td><td class=3D"right">   join the routing system.  To protect against =
such attacks, an</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
Internet Service Provider (ISP) should not accept information =
from</td><td> </td><td class=3D"right">   Internet Service Provider =
(ISP) should not accept information from</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
new peers without verifying that the peer is who it claims to be =
and</td><td> </td><td class=3D"right">   new peers without verifying =
that the peer is who it claims to be and</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
that the peer is authorized to carry on the exchange of =
information.</td><td> </td><td class=3D"right">   that the peer is =
authorized to carry on the exchange of information.</td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
More generally, in order to secure a communications channel, it =
must</td><td> </td><td class=3D"right">   More generally, in order to =
secure a communications channel, it must</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
be possible to verify that messages putatively received from a =
peer</td><td> </td><td class=3D"right">   be possible to verify that =
messages putatively received from a peer</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr bgcolor=3D"gray"><td></td><th><a =
name=3D"part-l8"><small>skipping to change at</small><em> page 11, line =
7</em></a></th><th> </th><th><a name=3D"part-r8"><small>skipping to =
change at</small><em> page 11, line 11</em></a></th><td></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
there frequently a requirement for confidentiality.  =
Confidentiality</td><td> </td><td class=3D"right">   there frequently a =
requirement for confidentiality.  Confidentiality</td><td class=3D"lineno"=
 valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
arises at several layers, sometimes simultaneously.  For =
example,</td><td> </td><td class=3D"right">   arises at several layers, =
sometimes simultaneously.  For example,</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
providers of credit card transaction services want application =
layer</td><td> </td><td class=3D"right">   providers of credit card =
transaction services want application layer</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
privacy, which can be supplied by encrypting application data or =
by</td><td> </td><td class=3D"right">   privacy, which can be supplied =
by encrypting application data or by</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
an encrypted transport layer.  If an ISP (or other entity) wants =
to</td><td> </td><td class=3D"right">   an encrypted transport layer.  =
If an ISP (or other entity) wants to</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
hide its network structure, it can to encrypt the network layer</td><td> =
</td><td class=3D"right">   hide its network structure, it can to =
encrypt the network layer</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
header.</td><td> </td><td class=3D"right">   header.</td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">2.3.=
  Network Infrastructure</td><td> </td><td class=3D"right">2.3.  Network =
Infrastructure</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td><a name=3D"diff0015"></a></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  While <span class=3D"delete">these</span> are not critical to the =
design of a specific system, they</td><td> </td><td class=3D"rblock">   =
While <span class=3D"insert">the following protocols</span> are not =
critical to the design of a</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  are important to running a network, and as such are surveyed =
here.</td><td> </td><td class=3D"rblock">   specific system, they are =
important to running a network, and as such</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock">   are surveyed =
here.</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left">2.3.1.  Domain Name System (DNS)</td><td> </td><td =
class=3D"right">2.3.1.  Domain Name System (DNS)</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
The DNS' main function is translating names to numeric IP =
addresses.</td><td> </td><td class=3D"right">   The DNS' main function =
is translating names to numeric IP addresses.</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
While this is not critical to running a network, certain =
functions</td><td> </td><td class=3D"right">   While this is not =
critical to running a network, certain functions</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
are made a lot easier if numeric addresses can be replaced with</td><td> =
</td><td class=3D"right">   are made a lot easier if numeric addresses =
can be replaced with</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
mnemonic names.  This facilitates renumbering of networks and</td><td> =
</td><td class=3D"right">   mnemonic names.  This facilitates =
renumbering of networks and</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
generally improves the manageability and serviceability of the</td><td> =
</td><td class=3D"right">   generally improves the manageability and =
serviceability of the</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
network.  DNS has a set of security extensions called DNSSEC, =
which</td><td> </td><td class=3D"right">   network.  DNS has a set of =
security extensions called DNSSEC, which</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td><a name=3D"diff0016"></a></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  can be used to provide strong cryptographic authentication to <span =
class=3D"delete">that</span></td><td> </td><td class=3D"rblock">   can =
be used to provide strong cryptographic authentication to <span =
class=3D"insert">the</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"><span class=3D"delete">   protocol.</span>  DNS and =
DNSSEC are discussed further in Section 3.4.1.</td><td> </td><td =
class=3D"rblock"><span class=3D"insert">   DNS.</span>  DNS and DNSSEC =
are discussed further in Section 3.4.1.</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left">2.3.2.  Network Management</td><td> </td><td =
class=3D"right">2.3.2.  Network Management</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
Network management has proven to be a difficult problem.  As =
such,</td><td> </td><td class=3D"right">   Network management has proven =
to be a difficult problem.  As such,</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
various solutions have been proposed, implemented, and =
deployed.</td><td> </td><td class=3D"right">   various solutions have =
been proposed, implemented, and deployed.</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
Each solution has its proponents, all of whom have solid =
arguments</td><td> </td><td class=3D"right">   Each solution has its =
proponents, all of whom have solid arguments</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
for their viewpoints.  The IETF has two major network =
management</td><td> </td><td class=3D"right">   for their viewpoints.  =
The IETF has two major network management</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
solutions for device operation: SNMP, which is ASN.1-encoded and =
is</td><td> </td><td class=3D"right">   solutions for device operation: =
SNMP, which is ASN.1-encoded and is</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
primarily used for monitoring of system variables and is a =
polled</td><td> </td><td class=3D"right">   primarily used for =
monitoring of system variables and is a polled</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
architecture, and NetConf [RFC4741], which is XML-encoded and</td><td> =
</td><td class=3D"right">   architecture, and NetConf [RFC4741], which =
is XML-encoded and</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr bgcolor=3D"gray"><td></td><th><a =
name=3D"part-l9"><small>skipping to change at</small><em> page 11, line =
47</em></a></th><th> </th><th><a name=3D"part-r9"><small>skipping to =
change at</small><em> page 12, line 5</em></a></th><td></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
While the IP Protocol Suite does not have specific solutions =
for</td><td> </td><td class=3D"right">   While the IP Protocol Suite =
does not have specific solutions for</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
secure provisioning and configuration, these problems have been</td><td> =
</td><td class=3D"right">   secure provisioning and configuration, these =
problems have been</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
solved using IP protocols in specifications such as DOCSIS 3.0</td><td> =
</td><td class=3D"right">   solved using IP protocols in specifications =
such as DOCSIS 3.0</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[SP-MULPIv3.0].</td><td> </td><td class=3D"right">   =
[SP-MULPIv3.0].</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">3. =
 Specific protocols</td><td> </td><td class=3D"right">3.  Specific =
protocols</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
In this section, having briefly laid out the IP architecture and =
some</td><td> </td><td class=3D"right">   In this section, having =
briefly laid out the IP architecture and some</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
of the problems that the architecture tries to address, we =
introduce</td><td> </td><td class=3D"right">   of the problems that the =
architecture tries to address, we introduce</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
specific protocols that might be appropriate to various Smart =
Grid</td><td> </td><td class=3D"right">   specific protocols that might =
be appropriate to various Smart Grid</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td><a name=3D"diff0017"></a></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  use cases.  Use cases should be analyzed along privacy, <span =
class=3D"delete">AAA,</span></td><td> </td><td class=3D"rblock">   use =
cases.  Use cases should be analyzed along privacy,</td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  transport and network solution dimensions.  The following =
sections</td><td> </td><td class=3D"rblock">   <span =
class=3D"insert">Authentication, Authorization, and Accounting =
(AAA),</span> transport and</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  provide guidance for such analyzes.</td><td> </td><td class=3D"rblock"> =
  network solution dimensions.  The following sections provide =
guidance</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock">   for such =
analyzes.</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">3.1.=
  Security solutions</td><td> </td><td class=3D"right">3.1.  Security =
solutions</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
As noted, a key consideration in security solutions is a good =
threat</td><td> </td><td class=3D"right">   As noted, a key =
consideration in security solutions is a good threat</td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
analysis coupled with appropriate mitigation strategies at each</td><td> =
</td><td class=3D"right">   analysis coupled with appropriate mitigation =
strategies at each</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
layer.  The following sections outline the security features of =
the</td><td> </td><td class=3D"right">   layer.  The following sections =
outline the security features of the</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
IPS.</td><td> </td><td class=3D"right">   IPS.</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left">3.1.1.  Session identification, authentication, =
authorization, and</td><td> </td><td class=3D"right">3.1.1.  Session =
identification, authentication, authorization, and</td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
     accounting</td><td> </td><td class=3D"right">        =
accounting</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr bgcolor=3D"gray"><td></td><th><a =
name=3D"part-l10"><small>skipping to change at</small><em> page 12, line =
34</em></a></th><th> </th><th><a name=3D"part-r10"><small>skipping to =
change at</small><em> page 12, line 39</em></a></th><td></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
The Security Architecture for the Internet Protocol (IPsec) =
[RFC4301]</td><td> </td><td class=3D"right">   The Security Architecture =
for the Internet Protocol (IPsec) [RFC4301]</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
is a set of control and data protocols that are implemented =
between</td><td> </td><td class=3D"right">   is a set of control and =
data protocols that are implemented between</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
IPv4 and the chosen transport layer, or in IPv6's security =
extension</td><td> </td><td class=3D"right">   IPv4 and the chosen =
transport layer, or in IPv6's security extension</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
header.  It allows transport layer sessions to communicate in a =
way</td><td> </td><td class=3D"right">   header.  It allows transport =
layer sessions to communicate in a way</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
that is designed to prevent eavesdropping, tampering, or =
message</td><td> </td><td class=3D"right">   that is designed to prevent =
eavesdropping, tampering, or message</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
forgery.  As is typical with IETF specifications, the architecture =
is</td><td> </td><td class=3D"right">   forgery.  As is typical with =
IETF specifications, the architecture is</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
spelled out in a number of documents which specify the specific</td><td> =
</td><td class=3D"right">   spelled out in a number of documents which =
specify the specific</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
components: the IP Authentication Header (AH) [RFC4302] =
Encapsulating</td><td> </td><td class=3D"right">   components: the IP =
Authentication Header (AH) [RFC4302] Encapsulating</td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
Security Payload (ESP) [RFC4303], Internet Key Exchange (IKEv2)</td><td> =
</td><td class=3D"right">   Security Payload (ESP) [RFC4303], Internet =
Key Exchange (IKEv2)</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td><a name=3D"diff0018"></a></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  [RFC<span class=3D"delete">430</span>6], Cryptographic Algorithms =
[RFC4307], Cryptographic</td><td> </td><td class=3D"rblock">   [RFC<span =
class=3D"insert">599</span>6], Cryptographic Algorithms [RFC4307], =
Cryptographic</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
Algorithm Implementation Requirements for ESP and AH [RFC4835], =
and</td><td> </td><td class=3D"right">   Algorithm Implementation =
Requirements for ESP and AH [RFC4835], and</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
the use of Advanced Encryption Standard (AES) [RFC4309].</td><td> =
</td><td class=3D"right">   the use of Advanced Encryption Standard =
(AES) [RFC4309].</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
IPsec provides two modes: Transport mode and tunnel mode.  In</td><td> =
</td><td class=3D"right">   IPsec provides two modes: Transport mode and =
tunnel mode.  In</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
transport mode, IPsec ESP encrypts the transport layer and the</td><td> =
</td><td class=3D"right">   transport mode, IPsec ESP encrypts the =
transport layer and the</td><td class=3D"lineno" valign=3D"top"></td></tr>=

      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
application data.  In tunnel mode, the source IP datagram is</td><td> =
</td><td class=3D"right">   application data.  In tunnel mode, the =
source IP datagram is</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
encrypted and encapsulated in a second IP header addressed to =
the</td><td> </td><td class=3D"right">   encrypted and encapsulated in a =
second IP header addressed to the</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
intended decryptor.  As might be expected, tunnel mode is =
frequently</td><td> </td><td class=3D"right">   intended decryptor.  As =
might be expected, tunnel mode is frequently</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
used for virtual private networks which need to securely =
transmit</td><td> </td><td class=3D"right">   used for virtual private =
networks which need to securely transmit</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
data across networks with unknown (or no) other security =
properties.</td><td> </td><td class=3D"right">   data across networks =
with unknown (or no) other security properties.</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
In both cases, authentication, authorization, and =
confidentiality</td><td> </td><td class=3D"right">   In both cases, =
authentication, authorization, and confidentiality</td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
extend from system to system, and apply to all applications that =
the</td><td> </td><td class=3D"right">   extend from system to system, =
and apply to all applications that the</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
two systems use.</td><td> </td><td class=3D"right">   two systems =
use.</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td><a name=3D"diff0019"></a></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock">   <span =
class=3D"insert">Note that IPsec can provide non-repudiation when an =
asymmetric</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   authentication algorithm is used with the AH header =
and both sender</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   and receiver keys are used in the authentication =
calculation.</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   However, the default authentication algorithm is =
keyed MD5, which</span></td><td class=3D"lineno" valign=3D"top"></td></tr>=

      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   like all symmetric algorithms cannot provide =
non-repudiation by</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   itself (since the sender's key is not used in the =
computation).  So</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   while IPsec provides a means of authenticating =
network level objects</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   (packets), these objects are are ephemeral and not =
directly</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   correlated with a particular application.  As a =
result non-</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   repudiation is not generally applicable to network =
level objects such</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   as packets.</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock">                    =
                                                     </td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left">3.1.3.  Transport Layer Security (TLS)</td><td> </td><td =
class=3D"right">3.1.3.  Transport Layer Security (TLS)</td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
Transport Layer Security [RFC5246] and Datagram Transport Layer</td><td> =
</td><td class=3D"right">   Transport Layer Security [RFC5246] and =
Datagram Transport Layer</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
Security [RFC4347][I-D.ietf-tls-rfc4347-bis] are mechanisms =
that</td><td> </td><td class=3D"right">   Security =
[RFC4347][I-D.ietf-tls-rfc4347-bis] are mechanisms that</td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
travel within the transport layer protocol data unit, meaning =
that</td><td> </td><td class=3D"right">   travel within the transport =
layer protocol data unit, meaning that</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
they readily traverse network address translators and secure =
the</td><td> </td><td class=3D"right">   they readily traverse network =
address translators and secure the</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
information exchanges without securing the datagrams exchanged or =
the</td><td> </td><td class=3D"right">   information exchanges without =
securing the datagrams exchanged or the</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
transport layer itself.  Each allows client/server applications =
to</td><td> </td><td class=3D"right">   transport layer itself.  Each =
allows client/server applications to</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
communicate in a way that is designed to prevent eavesdropping,</td><td> =
</td><td class=3D"right">   communicate in a way that is designed to =
prevent eavesdropping,</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
tampering, or message forgery.  Authentication, authorization, =
and</td><td> </td><td class=3D"right">   tampering, or message forgery.  =
Authentication, authorization, and</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
confidentiality exist for a session between specific =
applications.</td><td> </td><td class=3D"right">   confidentiality exist =
for a session between specific applications.</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td><a name=3D"diff0020"></a></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  When used in conjunction with IEEE 802.1X [IEEE802.1X], =
EAP-TLS</td><td> </td><td class=3D"rblock">   <span class=3D"insert">In =
order to communicate securely, an TLS client and TLS server =
must</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  [RFC5216] <span class=3D"delete">is</span> widely considered to offer =
excellent access security to</td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   agree on the cryptographic algorithms and keys that =
they will use on</span></td><td class=3D"lineno" valign=3D"top"></td></tr>=

      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  a wired or wireless IEEE 802 LAN (IEEE 802.1X in conjunction =
with</td><td> </td><td class=3D"rblock"><span class=3D"insert">   the =
secured connection.  In particular, they must agree on =
these</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  EAP-TLS is the baseline for Zigbee SEP 2.0).  <span =
class=3D"delete">Note that one potential</span></td><td> </td><td =
class=3D"rblock"><span class=3D"insert">   items:</span></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"><span class=3D"delete">   drawback of 802.1X technology =
is that it requires deployment of</span></td><td> </td><td =
class=3D"rblock"><span class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"><span class=3D"delete">   client-side certificates, =
which is frequently seen as a deployment</span></td><td> </td><td =
class=3D"rblock"><span class=3D"insert">   o  Key Establishment =
Algorithm</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"><span class=3D"delete">   barrier.</span></td><td> =
</td><td class=3D"rblock"><span class=3D"insert"></span></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   o  Peer Authentication Algorithm</span></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   o  Bulk Data Encryption Algorithm and key =
size</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   o  Digest Algorithm</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   Since each categories has multiple options, the =
number of possible</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   combinations is large.  As a result, TLS does not =
allow all possible</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   combinations of choices; rather it only allows =
certain well-defined</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   combinations known as Cipher Suites.  [IEC62351-3] =
outlines the use</span></td><td class=3D"lineno" valign=3D"top"></td></tr>=

      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   of different TLS Cipher Suites for use in the Smart =
Grid.</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock">                    =
                                                     </td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock">   When used in =
conjunction with IEEE 802.1X [IEEE802.1X], <span =
class=3D"insert">both</span> EAP-TLS</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock">   [RFC5216] <span =
class=3D"insert">and the Protocol for Carrying Authentication for =
Network</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   Access (PANA) [RFC5193] are</span> widely considered =
to offer excellent</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock">   access security =
to a wired or wireless IEEE 802 LAN (IEEE 802.1X in</td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock">   conjunction with =
EAP-TLS is the baseline for Zigbee SEP 2.0).</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left">3.1.4.  Secure/Multipurpose Internet Mail Extensions =
(S/MIME)</td><td> </td><td class=3D"right">3.1.4.  Secure/Multipurpose =
Internet Mail Extensions (S/MIME)</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
The S/MIME [RFC2045] [RFC2046] [RFC2047] [RFC4289] [RFC2049]</td><td> =
</td><td class=3D"right">   The S/MIME [RFC2045] [RFC2046] [RFC2047] =
[RFC4289] [RFC2049]</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[RFC5750] [RFC5751] [RFC4262] specification was originally =
designed</td><td> </td><td class=3D"right">   [RFC5750] [RFC5751] =
[RFC4262] specification was originally designed</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
as an extension to SMTP Mail to provide evidence that the =
putative</td><td> </td><td class=3D"right">   as an extension to SMTP =
Mail to provide evidence that the putative</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
sender of an email message in fact sent it, and that the =
content</td><td> </td><td class=3D"right">   sender of an email message =
in fact sent it, and that the content</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
received was in fact the content that was sent.  As its name</td><td> =
</td><td class=3D"right">   received was in fact the content that was =
sent.  As its name</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
suggests, by extension this is a way of securing any object that =
can</td><td> </td><td class=3D"right">   suggests, by extension this is =
a way of securing any object that can</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
be exchanged, by any means, and has become one of the most =
common</td><td> </td><td class=3D"right">   be exchanged, by any means, =
and has become one of the most common</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr bgcolor=3D"gray"><td></td><th><a =
name=3D"part-l11"><small>skipping to change at</small><em> page 15, line =
19</em></a></th><th> </th><th><a name=3D"part-r11"><small>skipping to =
change at</small><em> page 16, line 6</em></a></th><td></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
   [I-D.ietf-behave-address-format]</td><td> </td><td class=3D"right">   =
   [I-D.ietf-behave-address-format]</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
o  DNS extensions [I-D.ietf-behave-dns64]</td><td> </td><td =
class=3D"right">   o  DNS extensions [I-D.ietf-behave-dns64]</td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
o  IP/ICMP Translation Algorithm [I-D.ietf-behave-v6v4-xlate]</td><td> =
</td><td class=3D"right">   o  IP/ICMP Translation Algorithm =
[I-D.ietf-behave-v6v4-xlate]</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
o  Translation from IPv6 Clients to IPv4 Servers</td><td> </td><td =
class=3D"right">   o  Translation from IPv6 Clients to IPv4 =
Servers</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
   [I-D.ietf-behave-v6v4-xlate-stateful]</td><td> </td><td =
class=3D"right">      [I-D.ietf-behave-v6v4-xlate-stateful]</td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
As with IPv4/IPv4 Network Address Translation, translation =
between</td><td> </td><td class=3D"right">   As with IPv4/IPv4 Network =
Address Translation, translation between</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td><a name=3D"diff0021"></a></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  IPv4 and IPv6 has limited real world <span =
class=3D"delete">applicability: any</span> application</td><td> </td><td =
class=3D"rblock">   IPv4 and IPv6 has limited real world <span =
class=3D"insert">applicability for an</span> application</td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  protocol <span class=3D"delete">that carries</span> IP addresses and =
expects <span class=3D"delete">them</span> to be meaningful</td><td> =
</td><td class=3D"rblock">   protocol <span class=3D"insert">which =
carry</span> IP addresses <span class=3D"insert">in its payload</span> =
and expects <span class=3D"insert">those</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  to both client and <span class=3D"delete">server or to both peers will =
have trouble when the</span></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   addresses</span> to be meaningful to both client and =
<span class=3D"insert">server.</span>  However, for</td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"><span class=3D"delete">   addresses are transparently =
translated.</span>  However, for those protocols</td><td> </td><td =
class=3D"rblock">   those protocols that do not, protocol translation =
can provide a</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  that do not, protocol translation can provide a useful =
network</td><td> </td><td class=3D"rblock">   useful network =
extension.</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  extension.</td><td> </td><td class=3D"rblock"></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
Network-based translation provides for two types of services:</td><td> =
</td><td class=3D"right">   Network-based translation provides for two =
types of services:</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
stateless (and therefore scalable and load-sharable) =
translation</td><td> </td><td class=3D"right">   stateless (and =
therefore scalable and load-sharable) translation</td><td class=3D"lineno"=
 valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
between IPv4 and IPv6 addresses that embed an IPv4 address in =
them,</td><td> </td><td class=3D"right">   between IPv4 and IPv6 =
addresses that embed an IPv4 address in them,</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
and stateful translation similar to IPv4/IPv4 translation =
between</td><td> </td><td class=3D"right">   and stateful translation =
similar to IPv4/IPv4 translation between</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
IPv4 addresses.  The stateless mode is straightforward to =
implement,</td><td> </td><td class=3D"right">   IPv4 addresses.  The =
stateless mode is straightforward to implement,</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
but due to the embedding, requires IPv4 addresses to be allocated =
to</td><td> </td><td class=3D"right">   but due to the embedding, =
requires IPv4 addresses to be allocated to</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
an otherwise IPv6-only network, and is primarily useful for =
IPv4-</td><td> </td><td class=3D"right">   an otherwise IPv6-only =
network, and is primarily useful for IPv4-</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
accessible servers implemented in the IPv6 network.  The =
stateful</td><td> </td><td class=3D"right">   accessible servers =
implemented in the IPv6 network.  The stateful</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
mode allows clients in the IPv6 network to access servers in the =
IPv4</td><td> </td><td class=3D"right">   mode allows clients in the =
IPv6 network to access servers in the IPv4</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
network, but does not provide such service for IPv4 clients =
accessing</td><td> </td><td class=3D"right">   network, but does not =
provide such service for IPv4 clients accessing</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
IPv6 peers or servers with general addresses; it does however =
have</td><td> </td><td class=3D"right">   IPv6 peers or servers with =
general addresses; it does however have</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
the advantage that it does not require that a unique IPv4 address =
be</td><td> </td><td class=3D"right">   the advantage that it does not =
require that a unique IPv4 address be</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
embedded in the IPv6 address of hosts using this mechanism.</td><td> =
</td><td class=3D"right">   embedded in the IPv6 address of hosts using =
this mechanism.</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td><a name=3D"diff0022"></a></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock">   <span =
class=3D"insert">Finally, note that some networks site networks are IPv6 =
only while</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   some transits networks are IPv4 only.  In these =
cases it may be</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   necessary to tunnel IPv6 over IPv4 or translate =
between IPv6 and</span></td><td class=3D"lineno" valign=3D"top"></td></tr>=

      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   IPv4.</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock">                    =
                                                     </td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left">3.2.2.  Internet Protocol Version 4</td><td> </td><td =
class=3D"right">3.2.2.  Internet Protocol Version 4</td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
IPv4 [RFC0791] and the Internet Control Message Protocol =
[RFC0792]</td><td> </td><td class=3D"right">   IPv4 [RFC0791] and the =
Internet Control Message Protocol [RFC0792]</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
comprise the IPv4 network layer.  IPv4 provides unreliable =
delivery</td><td> </td><td class=3D"right">   comprise the IPv4 network =
layer.  IPv4 provides unreliable delivery</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
of datagrams.</td><td> </td><td class=3D"right">   of datagrams.</td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
IPv4 also provides for fragmentation and reassembly of long =
datagrams</td><td> </td><td class=3D"right">   IPv4 also provides for =
fragmentation and reassembly of long datagrams</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
for transmission through networks with small Maximum =
Transmission</td><td> </td><td class=3D"right">   for transmission =
through networks with small Maximum Transmission</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
Units (MTU).  The MTU is the largest packet size that can be</td><td> =
</td><td class=3D"right">   Units (MTU).  The MTU is the largest packet =
size that can be</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
delivered across the network.  In addition, the IPS provides =
the</td><td> </td><td class=3D"right">   delivered across the network.  =
In addition, the IPS provides the</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr bgcolor=3D"gray"><td></td><th><a =
name=3D"part-l12"><small>skipping to change at</small><em> page 16, line =
15</em></a></th><th> </th><th><a name=3D"part-r12"><small>skipping to =
change at</small><em> page 17, line 6</em></a></th><td></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
IPv4 originally supported an experimental type of service field =
that</td><td> </td><td class=3D"right">   IPv4 originally supported an =
experimental type of service field that</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
identified eight levels of operational precedence styled after =
the</td><td> </td><td class=3D"right">   identified eight levels of =
operational precedence styled after the</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
requirements of military telephony, plus three and later four =
bit</td><td> </td><td class=3D"right">   requirements of military =
telephony, plus three and later four bit</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
flags that OSI IS-IS for IPv4 (IS-IS) [RFC1195] and OSPF Version =
2</td><td> </td><td class=3D"right">   flags that OSI IS-IS for IPv4 =
(IS-IS) [RFC1195] and OSPF Version 2</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[RFC2328] interpreted as control traffic; this control traffic =
is</td><td> </td><td class=3D"right">   [RFC2328] interpreted as control =
traffic; this control traffic is</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
assured of not being dropped when queued or upon receipt even =
if</td><td> </td><td class=3D"right">   assured of not being dropped =
when queued or upon receipt even if</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
other traffic is being dropped..  These control bits turned out to =
be</td><td> </td><td class=3D"right">   other traffic is being dropped.. =
 These control bits turned out to be</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
less useful than the designers had hoped.  They were replaced by =
the</td><td> </td><td class=3D"right">   less useful than the designers =
had hoped.  They were replaced by the</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
Differentiated Services Architecture [RFC2474][RFC2475], which</td><td> =
</td><td class=3D"right">   Differentiated Services Architecture =
[RFC2474][RFC2475], which</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
contains a six bit code point used to select an algorithm (a =
"per-hop</td><td> </td><td class=3D"right">   contains a six bit code =
point used to select an algorithm (a "per-hop</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td><a name=3D"diff0023"></a></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  behavior") to be applied to the datagram.</td><td> </td><td =
class=3D"rblock">   behavior") to be applied to the datagram.  <span =
class=3D"insert">The IETF has also produced</span></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   a set of Configuration Guidelines for DiffServ =
Service Classes</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   [RFC4594], which describes a set of service classes =
that may be</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   useful to a network operator.</span></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left">3.2.2.1.  IPv4 Address Allocation and Assignment</td><td> =
</td><td class=3D"right">3.2.2.1.  IPv4 Address Allocation and =
Assignment</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
IPv4 addresses are administratively assigned, usually using =
automated</td><td> </td><td class=3D"right">   IPv4 addresses are =
administratively assigned, usually using automated</td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
methods, and assigned using the Dynamic Host Configuration =
Protocol</td><td> </td><td class=3D"right">   methods, and assigned =
using the Dynamic Host Configuration Protocol</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
(DHCP) [RFC2131].  On most interface types, neighboring =
equipment</td><td> </td><td class=3D"right">   (DHCP) [RFC2131].  On =
most interface types, neighboring equipment</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
identify each other's addresses using Address Resolution =
Protocol</td><td> </td><td class=3D"right">   identify each other's =
addresses using Address Resolution Protocol</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
(ARP) [RFC0826].</td><td> </td><td class=3D"right">   (ARP) =
[RFC0826].</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left">3.2.2.2.  IPv4 Unicast Routing</td><td> </td><td =
class=3D"right">3.2.2.2.  IPv4 Unicast Routing</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr bgcolor=3D"gray"><td></td><th><a =
name=3D"part-l13"><small>skipping to change at</small><em> page 20, line =
41</em></a></th><th> </th><th><a name=3D"part-r13"><small>skipping to =
change at</small><em> page 21, line 32</em></a></th><td></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
can be used in other forms of ad hoc networks.  It provides =
arbitrary</td><td> </td><td class=3D"right">   can be used in other =
forms of ad hoc networks.  It provides arbitrary</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
connectivity between device within a distributed subnet.  As =
with</td><td> </td><td class=3D"right">   connectivity between device =
within a distributed subnet.  As with</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
protocols designed for wired networks, routing is calculated =
and</td><td> </td><td class=3D"right">   protocols designed for wired =
networks, routing is calculated and</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
maintained whenever changes are detected, and maintained in =
each</td><td> </td><td class=3D"right">   maintained whenever changes =
are detected, and maintained in each</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
router's tables.  The set of nodes that operate as routers within =
the</td><td> </td><td class=3D"right">   router's tables.  The set of =
nodes that operate as routers within the</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
subnet, however, are fairly fluid, and dependent on this</td><td> =
</td><td class=3D"right">   subnet, however, are fairly fluid, and =
dependent on this</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
instantaneous topology of the subnet.</td><td> </td><td class=3D"right"> =
  instantaneous topology of the subnet.</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left">3.2.4.7.  Routing for Low power and Lossy =
Networks</td><td> </td><td class=3D"right">3.2.4.7.  Routing for Low =
power and Lossy Networks</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td><a name=3D"diff0024"></a></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  The <span class=3D"delete">RPL:</span> IPv6 Routing Protocol for Low =
power and Lossy Networks</td><td> </td><td class=3D"rblock">   The IPv6 =
Routing Protocol for Low power and Lossy Networks <span =
class=3D"insert">(RPL)</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  [I-D.ietf-roll-rpl] <span class=3D"delete">xxx</span></td><td> =
</td><td class=3D"rblock">   [I-D.ietf-roll-rpl] <span class=3D"insert">is=
 a reactive routing protocol designed for use</span></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   in resource constrained networks.  Requirements for =
resource</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   constrained networks are defined in [RFC5548], =
[RFC5673], [RFC5826],</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   and [RFC5867].</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   Briefly, a constrained network is comprised of nodes =
that:</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   o  Are built with limited processing power and =
memory, and sometimes</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">      energy when operating on =
batteries.</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   o  Are interconnected through a low-data-rate =
network interface and</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">      potentially vulnerable to communication =
instability and low packet</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">      delivery rates.</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   o  Potentially have a mix of roles such as being =
able to act as a</span></td><td class=3D"lineno" valign=3D"top"></td></tr>=

      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">      host (i.e., generating traffic) and/or a router =
(i.e., both</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">      forwarding and generating RPL =
traffic).</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left">3.2.5.  IPv6 Multicast Forwarding and Routing</td><td> =
</td><td class=3D"right">3.2.5.  IPv6 Multicast Forwarding and =
Routing</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
IPv6 specifies both unicast and multicast datagram exchange.  =
This</td><td> </td><td class=3D"right">   IPv6 specifies both unicast =
and multicast datagram exchange.  This</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
uses the Multicast Listener Discovery Protocol (MLDv2) =
[RFC2710]</td><td> </td><td class=3D"right">   uses the Multicast =
Listener Discovery Protocol (MLDv2) [RFC2710]</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[RFC3590] [RFC3810] [RFC4604] to enable applications to join</td><td> =
</td><td class=3D"right">   [RFC3590] [RFC3810] [RFC4604] to enable =
applications to join</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
multicast groups, and for most applications uses =
Source-Specific</td><td> </td><td class=3D"right">   multicast groups, =
and for most applications uses Source-Specific</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
Multicast [RFC4607] for routing and delivery of multicast =
messages.</td><td> </td><td class=3D"right">   Multicast [RFC4607] for =
routing and delivery of multicast messages.</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
The mechanisms experimentally developed for reliable multicast =
in</td><td> </td><td class=3D"right">   The mechanisms experimentally =
developed for reliable multicast in</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
IPv4, discussed in Section 3.2.2.3, can be used in IPv6 as =
well.</td><td> </td><td class=3D"right">   IPv4, discussed in Section =
3.2.2.3, can be used in IPv6 as well.</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left">3.2.5.1.  Protocol-Independent Multicast Routing</td><td> =
</td><td class=3D"right">3.2.5.1.  Protocol-Independent Multicast =
Routing</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td><a name=3D"diff0025"></a></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  <span class=3D"delete">xxx</span> Protocol Independent Multicast - =
Dense Mode (PIM-DM): Protocol</td><td> </td><td class=3D"rblock">   =
<span class=3D"insert">A multicast routing protocol has two basic =
functions: Building the</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  Specification (Revised) [RFC3973] <span class=3D"delete">xxx</span> =
Protocol Independent Multicast</td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   multicast distribution tree and forwarding multicast =
traffic.</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   Multicast routing protocols generally contain a =
control plane for</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   building distribution trees, and a forwarding plane =
that uses the</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   distribution tree when forwarding multicast =
traffic.</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   A the highest level, the multicast model works as =
follows: hosts</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   express their interest in receiving multicast =
traffic from a source</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   by sending a Join message to their first hop router. =
 That router in</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   turn sends a Join message upstream towards the root =
of the tree,</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   grafting the router (leaf node) onto the =
distribution tree for the</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   group.  Data is delivered down the tree toward the =
leaf nodes, which</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   forward it onto the local network for =
delivery.</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   The initial multicast model deployed in the Internet =
was known as</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   Any-Source Multicast (ASM).  In the ASM model any =
host could send to</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   the group, and inter-domain multicast was difficult. =
 Protocols such</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   as</span> Protocol Independent Multicast - Dense =
Mode (PIM-DM): Protocol</td><td class=3D"lineno" valign=3D"top"></td></tr>=

      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock">   Specification =
(Revised) [RFC3973] <span class=3D"insert">and</span> Protocol =
Independent Multicast</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
- Sparse Mode (PIM-SM): Protocol Specification (Revised) =
[RFC4601]</td><td> </td><td class=3D"right">   - Sparse Mode (PIM-SM): =
Protocol Specification (Revised) [RFC4601]</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td><a name=3D"diff0026"></a></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  <span class=3D"delete">xxx</span> Source-Specific Multicast <span =
class=3D"delete">(SSM) [RFC3569] xxx Source-Specific</span></td><td> =
</td><td class=3D"rblock">   <span class=3D"insert">were designed for =
the ASM model.</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"><span class=3D"delete">   Protocol Independent =
Multicast [RFC4608] xxx Authentication</span> and</td><td> </td><td =
class=3D"rblock"><span class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  <span class=3D"delete">Confidentiality</span> in <span =
class=3D"delete">Protocol Independent Multicast Sparse =
Mode</span></td><td> </td><td class=3D"rblock"><span class=3D"insert">   =
Many modern multicast deployments use</span> Source-Specific Multicast =
<span class=3D"insert">(PIM-</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"><span class=3D"delete">   (PIM-SM) Link-Local Messages =
[RFC5796] xxx</span></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   SSM) [RFC3569][RFC4608].  In the SSM model, a host =
expresses interest</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   in a "channel", which is comprised of a source =
(S)</span> and <span class=3D"insert">a group (G).</span></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   Distribution tress are rooted the sending host =
(called an "(S,G)</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   tree").  Since only the source S can send on to the =
group, SSM has</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   inherent anti-jamming capability.  In addition, =
inter-domain</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   multicast is simplified since it is the =
responsibility of the</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   receivers (rather than the network) to find the =
(S,G) channel they</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   are interested</span> in <span =
class=3D"insert">receiving.  This implies that SSM requires =
some</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   form of directory service so that receivers can find =
the (S,G)</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   channels.</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left">3.2.6.  Adaptation to lower layer networks and link layer =
protocols</td><td> </td><td class=3D"right">3.2.6.  Adaptation to lower =
layer networks and link layer protocols</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
In general, the layered architecture of the Internet enables the =
IPS</td><td> </td><td class=3D"right">   In general, the layered =
architecture of the Internet enables the IPS</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
to run over any appropriate layer two architecture.  The ability =
to</td><td> </td><td class=3D"right">   to run over any appropriate =
layer two architecture.  The ability to</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
change the link or physical layer without having to rethink the</td><td> =
</td><td class=3D"right">   change the link or physical layer without =
having to rethink the</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
network layer, transports, or applications has been a great =
benefit</td><td> </td><td class=3D"right">   network layer, transports, =
or applications has been a great benefit</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
in the Internet.</td><td> </td><td class=3D"right">   in the =
Internet.</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
Examples of link layer adaptation technology include:</td><td> </td><td =
class=3D"right">   Examples of link layer adaptation technology =
include:</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr bgcolor=3D"gray"><td></td><th><a =
name=3D"part-l14"><small>skipping to change at</small><em> page 24, line =
40</em></a></th><th> </th><th><a name=3D"part-r14"><small>skipping to =
change at</small><em> page 26, line 25</em></a></th><td></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[RFC2131] or DHCPv6 [RFC3315].  The best argument for the use =
of</td><td> </td><td class=3D"right">   [RFC2131] or DHCPv6 [RFC3315].  =
The best argument for the use of</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
autoconfiguration is a large number of systems that require =
little</td><td> </td><td class=3D"right">   autoconfiguration is a large =
number of systems that require little</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
more than a random number as an address; the argument for DHCP =
is</td><td> </td><td class=3D"right">   more than a random number as an =
address; the argument for DHCP is</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
administrative control.</td><td> </td><td class=3D"right">   =
administrative control.</td><td class=3D"lineno" valign=3D"top"></td></tr>=

      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
There are other parameters that may need to be allocated to =
hosts</td><td> </td><td class=3D"right">   There are other parameters =
that may need to be allocated to hosts</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
which require administrative configuration; examples include =
the</td><td> </td><td class=3D"right">   which require administrative =
configuration; examples include the</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
addresses of DNS servers, keys for Secure DNS and Network Time</td><td> =
</td><td class=3D"right">   addresses of DNS servers, keys for Secure =
DNS and Network Time</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
servers.</td><td> </td><td class=3D"right">   servers.</td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td><a name=3D"diff0027"></a></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock">3.5.  Service and Resource Discovery</td><td> </td><td =
class=3D"rblock"><span class=3D"insert">3.4.3.  Network =
Time</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   The Network Time Protocol was originally designed by =
Dave Mills of</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   the University of Delaware and CSNET, for the =
purpose of implementing</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   a temporal metric in the Fuzzball Routing Protocol =
and generally</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   coordinating time experiments.  The current versions =
of the time</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   protocol are the Network Time Protocol =
[RFC5905].</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock">                    =
                                                     </td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock">3.5.  <span =
class=3D"insert">Network Management</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   The IETF has developed two protocols for network =
management: SNMP and</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   NETCONF.  SNMP is discussed in Section 3.5.1, and =
NETCONF is</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   discussed in Section 3.5.2.</span></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">3.5.1.  Simple Network Management Protocol =
(SNMP)</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   The Simple Network Management Protocol, originally =
specified in the</span></td><td class=3D"lineno" valign=3D"top"></td></tr>=

      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   late 1980's and having passed through several =
revisions, is specified</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   in several documents:</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   o  An Architecture for Describing Simple Network =
Management Protocol</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">      (SNMP) Management Frameworks =
[RFC3411]</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   o  Message Processing and Dispatching =
[RFC3412]</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   o  SNMP Applications [RFC3413]</span></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   o  User-based Security Model (USM) for SNMP version =
3 [RFC3414]</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   o  View-based Access Control Model (VACM) =
[RFC3415]</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   o  Version 2 of the SNMP Protocol Operations =
[RFC3416]</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   o  Transport Mappings [RFC3417]</span></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   o  Management Information Base (MIB) =
[RFC3418]</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   It provides capabilities for polled and event-driven =
activities, and</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   for both monitoring and configuration of systems in =
the field.</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   Historically, it has been used primarily for =
monitoring nodes in a</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   network.  Messages and their constituent data are =
encoded using a</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   profile of ASN.1.</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">3.5.2.  Network Configuration (NETCONF) =
Protocol</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   The NETCONF Configuration Protocol is specified in =
one basic</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   document, with supporting documents for carrying it =
over the IPS.</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   These documents include:</span></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   o  NETCONF Configuration Protocol =
[RFC4741]</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   o  Using the NETCONF Configuration Protocol over =
Secure SHell (SSH)</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">      [RFC4742]</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   o  Using NETCONF over the Simple Object Access =
Protocol (SOAP)</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">      [RFC4743]</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   o  Using the NETCONF Protocol over the Blocks =
Extensible Exchange</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">      Protocol (BEEP) [RFC4744]</span></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   o  NETCONF Event Notifications =
[RFC5277]</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   o  NETCONF over Transport Layer Security (TLS) =
[RFC5539]</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   o  Partial Lock Remote Procedure Call (RPC) for =
NETCONF [RFC5717]</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   NETCONF was developed in response to operator =
requests for a common</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   configuration protocol based on ASCII text as =
opposed to ASN.1.  In</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   essence, it carries XML-encoded remote procedure =
call (RPC) data.  In</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   response to Smart Grid requirements, there is =
consideration of a</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   variant of the protocol that could be used for =
polled and event-</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   driven management activities, and for both =
monitoring and</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   configuration of systems in the =
field.</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">3.6.</span>  Service and Resource Discovery</td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
Service and resource discovery are among the most important =
protocols</td><td> </td><td class=3D"right">   Service and resource =
discovery are among the most important protocols</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
for constrained resource self-organizing networks.  These =
include</td><td> </td><td class=3D"right">   for constrained resource =
self-organizing networks.  These include</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
various sensor networks as well as the Home Area Networks =
(HANs),</td><td> </td><td class=3D"right">   various sensor networks as =
well as the Home Area Networks (HANs),</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
Building Area Networks (BANs) and Field Area Networks (FANs)</td><td> =
</td><td class=3D"right">   Building Area Networks (BANs) and Field Area =
Networks (FANs)</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
envisioned by Smart Grid architects.</td><td> </td><td class=3D"right">  =
 envisioned by Smart Grid architects.</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td><a name=3D"diff0028"></a></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock">3.<span class=3D"delete">5</span>.1.  Service =
Discovery</td><td> </td><td class=3D"rblock">3.<span =
class=3D"insert">6</span>.1.  Service Discovery</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
Service discovery protocols are designed for the automatic</td><td> =
</td><td class=3D"right">   Service discovery protocols are designed for =
the automatic</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
configuration and detection of devices, and the services offered =
by</td><td> </td><td class=3D"right">   configuration and detection of =
devices, and the services offered by</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
the discovered devices.  In many cases service discovery is =
performed</td><td> </td><td class=3D"right">   the discovered devices.  =
In many cases service discovery is performed</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
by so-called "constrained resource" devices (i.e., those with =
limited</td><td> </td><td class=3D"right">   by so-called "constrained =
resource" devices (i.e., those with limited</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
processing power, memory, and power resources).</td><td> </td><td =
class=3D"right">   processing power, memory, and power =
resources).</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td><a name=3D"diff0029"></a></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  In general, service discovery is concerned with the <span =
class=3D"delete">assignment of</span></td><td> </td><td class=3D"rblock"> =
  In general, service discovery is concerned with the resolution =
and</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"><span class=3D"delete">   network addresses (perhaps =
via Stateless Address Autoconfiguration</span></td><td> </td><td =
class=3D"rblock">   distribution of hostnames via multicast DNS</td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"><span class=3D"delete">   [RFC4862]),</span> resolution =
and distribution of hostnames via multicast</td><td> </td><td =
class=3D"rblock">   [I-D.cheshire-dnsext-multicastdns] and the automatic =
location of</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  DNS [I-D.cheshire-dnsext-multicastdns] and the automatic location =
of</td><td> </td><td class=3D"rblock"></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
network services via DHCP (Section 3.4.2), the DNS Service =
Discovery</td><td> </td><td class=3D"right">   network services via DHCP =
(Section 3.4.2), the DNS Service Discovery</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
(DNS-SD) [I-D.cheshire-dnsext-dns-sd] (part of Apple's Bonjour</td><td> =
</td><td class=3D"right">   (DNS-SD) [I-D.cheshire-dnsext-dns-sd] (part =
of Apple's Bonjour</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td><a name=3D"diff0030"></a></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  technology)<span class=3D"delete">,</span> and the Service Location =
Protocol (SLP) [RFC2608].</td><td> </td><td class=3D"rblock">   =
technology) and the Service Location Protocol (SLP) [RFC2608].</td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td><a name=3D"diff0031"></a></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock">3.<span class=3D"delete">5.2.  Resource    </span> =
Discovery</td><td> </td><td class=3D"rblock">3.<span class=3D"insert">6.2.=
  Resource</span> Discovery</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td><a name=3D"diff0032"></a></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  Resource Discovery is concerned with the discovery resources =
offered</td><td> </td><td class=3D"rblock">   Resource Discovery is =
concerned with the discovery <span class=3D"insert">of</span> =
resources</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  by end-points and is extremely important in <span =
class=3D"delete">machine-to-machine</span></td><td> </td><td =
class=3D"rblock">   offered by end-points and is extremely important in =
<span class=3D"insert">machine-to-</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  closed-loop applications (i.e., those with no humans in the =
loop).</td><td> </td><td class=3D"rblock"><span class=3D"insert">   =
machine</span> closed-loop applications (i.e., those with no humans in =
the</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  The goals of resource discover protocols include:</td><td> </td><td =
class=3D"rblock">   loop).  The goals of resource discover protocols =
include:</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
   Simplicity of creation and maintenance of resources</td><td> </td><td =
class=3D"right">      Simplicity of creation and maintenance of =
resources</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
   Commonly understood semantics</td><td> </td><td class=3D"right">      =
Commonly understood semantics</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
   Conformance to existing and emerging standards</td><td> </td><td =
class=3D"right">      Conformance to existing and emerging =
standards</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
   International scope and applicability</td><td> </td><td =
class=3D"right">      International scope and applicability</td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
   Extensibility</td><td> </td><td class=3D"right">      =
Extensibility</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
   Interoperability among collections and indexing systems</td><td> =
</td><td class=3D"right">      Interoperability among collections and =
indexing systems</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
The Constrained Application Protocol (CoAP) [I-D.ietf-core-coap] =
is</td><td> </td><td class=3D"right">   The Constrained Application =
Protocol (CoAP) [I-D.ietf-core-coap] is</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
being developed in IETF with these goals in mind.  In =
particular,</td><td> </td><td class=3D"right">   being developed in IETF =
with these goals in mind.  In particular,</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
CoAP is designed for use in constrained resource networks and =
for</td><td> </td><td class=3D"right">   CoAP is designed for use in =
constrained resource networks and for</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
machine-to-machine applications such as smart energy and =
building</td><td> </td><td class=3D"right">   machine-to-machine =
applications such as smart energy and building</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td><a name=3D"diff0033"></a></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  automation.  It provides a RESTful transfer <span =
class=3D"delete">protocol,</span> a built-in</td><td> </td><td =
class=3D"rblock">   automation.  It provides a RESTful transfer <span =
class=3D"insert">protocol [RESTFUL],</span> a</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  resource discovery protocol, and includes web concepts such as =
URIs</td><td> </td><td class=3D"rblock">   built-in resource discovery =
protocol, and includes web concepts such</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  and content-types.  CoAP provides both unicast and multicast =
resource</td><td> </td><td class=3D"rblock">   as URIs and =
content-types.  CoAP provides both unicast and multicast</td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  discovery and includes the ability to filter on attributes of</td><td> =
</td><td class=3D"rblock">   resource discovery and includes the ability =
to filter on attributes</td><td class=3D"lineno" valign=3D"top"></td></tr>=

      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  resource descriptions.  Finally, CoAP resource discovery can also =
be</td><td> </td><td class=3D"rblock">   of resource descriptions.  =
Finally, CoAP resource discovery can also</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  used to discovery HTTP resources.</td><td> </td><td class=3D"rblock">  =
 be used to discovery HTTP resources.</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
For simplicity, CoAP makes the assumption that all CoAP servers</td><td> =
</td><td class=3D"right">   For simplicity, CoAP makes the assumption =
that all CoAP servers</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
listen on the default CoAP port or otherwise have been configured =
or</td><td> </td><td class=3D"right">   listen on the default CoAP port =
or otherwise have been configured or</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
discovered using some general service discovery mechanism such as =
DNS</td><td> </td><td class=3D"right">   discovered using some general =
service discovery mechanism such as DNS</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
Service Discovery (DNS-SD) [I-D.cheshire-dnsext-dns-sd].</td><td> =
</td><td class=3D"right">   Service Discovery (DNS-SD) =
[I-D.cheshire-dnsext-dns-sd].</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
Resource discovery in CoAP is accomplished through the use of =
well-</td><td> </td><td class=3D"right">   Resource discovery in CoAP is =
accomplished through the use of well-</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
known resources which describe the links offered by a CoAP =
server.</td><td> </td><td class=3D"right">   known resources which =
describe the links offered by a CoAP server.</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
CoAP defines a well-known URI for discovery: "/.well-known/r"</td><td> =
</td><td class=3D"right">   CoAP defines a well-known URI for discovery: =
"/.well-known/r"</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[RFC5785].  For example, the query [GET /.well-known/r] returns =
a</td><td> </td><td class=3D"right">   [RFC5785].  For example, the =
query [GET /.well-known/r] returns a</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
list of links (representing resources) available from the =
queried</td><td> </td><td class=3D"right">   list of links (representing =
resources) available from the queried</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
CoAP server.  A query such as [GET /.well-known/r?n=3DVoltage] =
returns</td><td> </td><td class=3D"right">   CoAP server.  A query such =
as [GET /.well-known/r?n=3DVoltage] returns</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
the resources with the name Voltage.</td><td> </td><td class=3D"right">  =
 the resources with the name Voltage.</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td><a name=3D"diff0034"></a></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock">3.<span class=3D"delete">6</span>.  Other =
Applications</td><td> </td><td class=3D"rblock">3.<span =
class=3D"insert">7</span>.  Other Applications</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
There are several applications that are widely used but are not</td><td> =
</td><td class=3D"right">   There are several applications that are =
widely used but are not</td><td class=3D"lineno" valign=3D"top"></td></tr>=

      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
properly thought of as infrastructure.</td><td> </td><td class=3D"right"> =
  properly thought of as infrastructure.</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td><a name=3D"diff0035"></a></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"><span class=3D"delete">3.6.1.  Network =
Time</span></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">3.7.1.</span>  Session Initiation Protocol</td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"><span class=3D"delete"></span></td><td> </td><td =
class=3D"rblock"></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"><span class=3D"delete">   The Network Time Protocol was =
originally designed by Dave Mills of</span></td><td> </td><td =
class=3D"rblock"></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"><span class=3D"delete">   the University of Delaware =
and CSNET, for the purpose of implementing</span></td><td> </td><td =
class=3D"rblock"></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"><span class=3D"delete">   a temporal metric in the =
Fuzzball Routing Protocol and generally</span></td><td> </td><td =
class=3D"rblock"></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"><span class=3D"delete">   coordinating time =
experiments.  The current versions of the time</span></td><td> </td><td =
class=3D"rblock"></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"><span class=3D"delete">   protocol are the Network Time =
Protocol [RFC5905].</span></td><td> </td><td class=3D"rblock"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"><span class=3D"delete"></span></td><td> </td><td =
class=3D"rblock"></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"><span class=3D"delete">   NTP is currently being =
updated in [RFC5905].</span></td><td> </td><td class=3D"rblock"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"><span class=3D"delete"></span></td><td> </td><td =
class=3D"rblock"></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"><span class=3D"delete">3.6.2.</span>  Session =
Initiation Protocol</td><td> </td><td class=3D"rblock"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
The Session Initiation Protocol</td><td> </td><td class=3D"right">   The =
Session Initiation Protocol</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[RFC3261][RFC3265][RFC3853][RFC4320][RFC4916][RFC5393][RFC5621] is =
an</td><td> </td><td class=3D"right">   =
[RFC3261][RFC3265][RFC3853][RFC4320][RFC4916][RFC5393][RFC5621] is =
an</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
application layer control (signaling) protocol for creating,</td><td> =
</td><td class=3D"right">   application layer control (signaling) =
protocol for creating,</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
modifying and terminating multimedia sessions on the Internet, =
meant</td><td> </td><td class=3D"right">   modifying and terminating =
multimedia sessions on the Internet, meant</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
to be more scalable than H.323.  Multimedia sessions can be =
voice,</td><td> </td><td class=3D"right">   to be more scalable than =
H.323.  Multimedia sessions can be voice,</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
video, instant messaging, shared data, and/or subscriptions of</td><td> =
</td><td class=3D"right">   video, instant messaging, shared data, =
and/or subscriptions of</td><td class=3D"lineno" valign=3D"top"></td></tr>=

      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
events.  SIP can run on top of TCP, UDP, SCTP, or TLS over TCP.  =
SIP</td><td> </td><td class=3D"right">   events.  SIP can run on top of =
TCP, UDP, SCTP, or TLS over TCP.  SIP</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
is independent of the transport layer, and independent of the</td><td> =
</td><td class=3D"right">   is independent of the transport layer, and =
independent of the</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
underlying IPv4/v6 version.  In fact, the transport protocol used =
can</td><td> </td><td class=3D"right">   underlying IPv4/v6 version.  In =
fact, the transport protocol used can</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr bgcolor=3D"gray"><td></td><th><a =
name=3D"part-l15"><small>skipping to change at</small><em> page 27, line =
10</em></a></th><th> </th><th><a name=3D"part-r15"><small>skipping to =
change at</small><em> page 30, line 11</em></a></th><td></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
designed to be SDP aware (i.e., looking into each packet far =
enough</td><td> </td><td class=3D"right">   designed to be SDP aware =
(i.e., looking into each packet far enough</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
to discover what the IP address and port number is for this</td><td> =
</td><td class=3D"right">   to discover what the IP address and port =
number is for this</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
particular session - and resetting it based on the Session =
Traversal</td><td> </td><td class=3D"right">   particular session - and =
resetting it based on the Session Traversal</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
Utilities for NAT [RFC5389], the session established by SIP will =
not</td><td> </td><td class=3D"right">   Utilities for NAT [RFC5389], =
the session established by SIP will not</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
result in RTP packets being sent to the proper endpoint (in SIP</td><td> =
</td><td class=3D"right">   result in RTP packets being sent to the =
proper endpoint (in SIP</td><td class=3D"lineno" valign=3D"top"></td></tr>=

      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
called a user agent, or UA).  It should be noted that SIP =
messaging</td><td> </td><td class=3D"right">   called a user agent, or =
UA).  It should be noted that SIP messaging</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
has no issues with NATs, it is just the UA's inability to =
generally</td><td> </td><td class=3D"right">   has no issues with NATs, =
it is just the UA's inability to generally</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
learn about the presence of the NATs that prevent the RTP =
packets</td><td> </td><td class=3D"right">   learn about the presence of =
the NATs that prevent the RTP packets</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
from being received by the UA establishing the session.</td><td> =
</td><td class=3D"right">   from being received by the UA establishing =
the session.</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td><a name=3D"diff0036"></a></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock">3.<span class=3D"delete">6.3</span>.  =
Calendaring</td><td> </td><td class=3D"rblock">3.<span =
class=3D"insert">7.2</span>.  Calendaring</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
Internet calendaring, as implemented in Apple iCal, Microsoft =
Outlook</td><td> </td><td class=3D"right">   Internet calendaring, as =
implemented in Apple iCal, Microsoft Outlook</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
and Entourage, and Google Calendar, is specified in Internet</td><td> =
</td><td class=3D"right">   and Entourage, and Google Calendar, is =
specified in Internet</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
Calendaring and Scheduling Core Object Specification =
(iCalendar)</td><td> </td><td class=3D"right">   Calendaring and =
Scheduling Core Object Specification (iCalendar)</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[RFC5545] and is in the process of being updated to an XML schema =
in</td><td> </td><td class=3D"right">   [RFC5545] and is in the process =
of being updated to an XML schema in</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
iCalendar XML Representation [I-D.daboo-et-al-icalendar-in-xml]</td><td> =
</td><td class=3D"right">   iCalendar XML Representation =
[I-D.daboo-et-al-icalendar-in-xml]</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
Several protocols exist to carry calendar events, including =
iCalendar</td><td> </td><td class=3D"right">   Several protocols exist =
to carry calendar events, including iCalendar</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
Transport-Independent Interoperability Protocol (iTIP) [RFC5546], =
the</td><td> </td><td class=3D"right">   Transport-Independent =
Interoperability Protocol (iTIP) [RFC5546], the</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
Message-Based Interoperability Protocol (iMIP) [RFC2447] , and =
open</td><td> </td><td class=3D"right">   Message-Based Interoperability =
Protocol (iMIP) [RFC2447] , and open</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
source work on the Atom Publishing Protocol [RFC5023].</td><td> </td><td =
class=3D"right">   source work on the Atom Publishing Protocol =
[RFC5023].</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr bgcolor=3D"gray"><td></td><th><a =
name=3D"part-l16"><small>skipping to change at</small><em> page 32, line =
17</em></a></th><th> </th><th><a name=3D"part-r16"><small>skipping to =
change at</small><em> page 35, line 17</em></a></th><td></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
therefore be removed upon publication as an RFC at the RFC =
Editor's</td><td> </td><td class=3D"right">   therefore be removed upon =
publication as an RFC at the RFC Editor's</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
discretion.</td><td> </td><td class=3D"right">   discretion.</td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">6. =
 Security Considerations</td><td> </td><td class=3D"right">6.  Security =
Considerations</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
Security is addressed in some detail in Section 2.2 and Section =
3.1.</td><td> </td><td class=3D"right">   Security is addressed in some =
detail in Section 2.2 and Section 3.1.</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">7. =
 Acknowledgements</td><td> </td><td class=3D"right">7.  =
Acknowledgements</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
Review comments were made by Andrew Yourtchenko, Ashok =
Narayanan,</td><td> </td><td class=3D"right">   Review comments were =
made by Andrew Yourtchenko, Ashok Narayanan,</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td><a name=3D"diff0037"></a></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  Bernie Volz, Chris Lonvick, Dave McGrew, Dave Oran, David Su, =
Hemant</td><td> </td><td class=3D"rblock">   Bernie Volz, Chris Lonvick, =
Dave McGrew, Dave Oran, David Su, <span =
class=3D"insert">Don</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  Singh, James Polk, John Meylor, Joseph Salowey, Julien Abeille, =
Kerry</td><td> </td><td class=3D"rblock"><span class=3D"insert">   =
Sturek, Francis Cleveland,</span> Hemant Singh, James Polk, John =
Meylor,</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  Lynn, Magnus Westerlund, Murtaza Chiba, Paul Duffy, Paul =
Hoffman,</td><td> </td><td class=3D"rblock">   Joseph Salowey, Julien =
Abeille, Kerry Lynn, Magnus Westerlund,</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  Ralph Droms, Russ White, Sheila Frankel, and Toerless Eckert.  =
Dave</td><td> </td><td class=3D"rblock">   Murtaza Chiba, Paul Duffy, =
Paul Hoffman, Ralph Droms, Russ White,</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  McGrew, Vint Cerf, and Ralph Droms suggested text.</td><td> </td><td =
class=3D"rblock">   Sheila Frankel, <span class=3D"insert">Tom =
Herbst,</span> and Toerless Eckert.  Dave McGrew, Vint</td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock">   Cerf, and Ralph =
Droms suggested text.</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">8. =
 References</td><td> </td><td class=3D"right">8.  References</td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">8.1.=
  Normative References</td><td> </td><td class=3D"right">8.1.  Normative =
References</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[RFC1122]  Braden, R., "Requirements for Internet Hosts -</td><td> =
</td><td class=3D"right">   [RFC1122]  Braden, R., "Requirements for =
Internet Hosts -</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Communication Layers", STD 3, RFC 1122, October =
1989.</td><td> </td><td class=3D"right">              Communication =
Layers", STD 3, RFC 1122, October 1989.</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[RFC1123]  Braden, R., "Requirements for Internet Hosts - =
Application</td><td> </td><td class=3D"right">   [RFC1123]  Braden, R., =
"Requirements for Internet Hosts - Application</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           and Support", STD 3, RFC 1123, October 1989.</td><td> =
</td><td class=3D"right">              and Support", STD 3, RFC 1123, =
October 1989.</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[RFC1812]  Baker, F., "Requirements for IP Version 4 Routers",</td><td> =
</td><td class=3D"right">   [RFC1812]  Baker, F., "Requirements for IP =
Version 4 Routers",</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           RFC 1812, June 1995.</td><td> </td><td class=3D"right">       =
       RFC 1812, June 1995.</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[RFC4294]  Loughney, J., "IPv6 Node Requirements", RFC 4294,</td><td> =
</td><td class=3D"right">   [RFC4294]  Loughney, J., "IPv6 Node =
Requirements", RFC 4294,</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           April 2006.</td><td> </td><td class=3D"right">              =
April 2006.</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">8.2.=
  Informative References</td><td> </td><td class=3D"right">8.2.  =
Informative References</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td><a name=3D"diff0038"></a></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock">   <span =
class=3D"insert">[1822]     Bolt Beranek and Newman Inc., "Interface =
Message Processor</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">              -- Specifications for the interconnection =
of a host and a</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">              IMP, Report No. 1822", January =
1976.</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock">                    =
                                                     </td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[I-D.arkko-ipv6-transition-guidelines]</td><td> </td><td class=3D"right"> =
  [I-D.arkko-ipv6-transition-guidelines]</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Arkko, J. and F. Baker, "Guidelines for Using IPv6</td><td> =
</td><td class=3D"right">              Arkko, J. and F. Baker, =
"Guidelines for Using IPv6</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td><a name=3D"diff0039"></a></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
             Transition <span =
class=3D"delete">Mechanisms",</span></td><td> </td><td class=3D"rblock"> =
             Transition <span class=3D"insert">Mechanisms during IPv6 =
Deployment",</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"><span class=3D"delete">              =
draft-arkko-ipv6-transition-guidelines-03</span> (work in</td><td> =
</td><td class=3D"rblock"><span class=3D"insert">              =
draft-arkko-ipv6-transition-guidelines-06</span> (work in</td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
             progress), <span class=3D"delete">July</span> =
2010.</td><td> </td><td class=3D"rblock">              progress), <span =
class=3D"insert">August</span> 2010.</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[I-D.cheshire-dnsext-dns-sd]</td><td> </td><td class=3D"right">   =
[I-D.cheshire-dnsext-dns-sd]</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Cheshire, S. and M. Krochmal, "DNS-Based Service</td><td> =
</td><td class=3D"right">              Cheshire, S. and M. Krochmal, =
"DNS-Based Service</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Discovery", draft-cheshire-dnsext-dns-sd-06 (work in</td><td> =
</td><td class=3D"right">              Discovery", =
draft-cheshire-dnsext-dns-sd-06 (work in</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           progress), March 2010.</td><td> </td><td class=3D"right">     =
         progress), March 2010.</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[I-D.cheshire-dnsext-multicastdns]</td><td> </td><td class=3D"right">   =
[I-D.cheshire-dnsext-multicastdns]</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Cheshire, S. and M. Krochmal, "Multicast DNS",</td><td> =
</td><td class=3D"right">              Cheshire, S. and M. Krochmal, =
"Multicast DNS",</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           draft-cheshire-dnsext-multicastdns-11 (work in =
progress),</td><td> </td><td class=3D"right">              =
draft-cheshire-dnsext-multicastdns-11 (work in progress),</td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           March 2010.</td><td> </td><td class=3D"right">              =
March 2010.</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[I-D.daboo-et-al-icalendar-in-xml]</td><td> </td><td class=3D"right">   =
[I-D.daboo-et-al-icalendar-in-xml]</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Daboo, C., Douglass, M., and S. Lees, "xCal: The XML</td><td> =
</td><td class=3D"right">              Daboo, C., Douglass, M., and S. =
Lees, "xCal: The XML</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           format for iCalendar",</td><td> </td><td class=3D"right">     =
         format for iCalendar",</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td><a name=3D"diff0040"></a></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
             <span =
class=3D"delete">draft-daboo-et-al-icalendar-in-xml-05</span> (work in =
progress),</td><td> </td><td class=3D"rblock">              <span =
class=3D"insert">draft-daboo-et-al-icalendar-in-xml-06</span> (work in =
progress),</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
             <span class=3D"delete">July</span> 2010.</td><td> </td><td =
class=3D"rblock">              <span class=3D"insert">September</span> =
2010.</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[I-D.ietf-6lowpan-hc]</td><td> </td><td class=3D"right">   =
[I-D.ietf-6lowpan-hc]</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Hui, J. and P. Thubert, "Compression Format for IPv6</td><td> =
</td><td class=3D"right">              Hui, J. and P. Thubert, =
"Compression Format for IPv6</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td><a name=3D"diff0041"></a></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
             Datagrams in 6LoWPAN Networks", <span =
class=3D"delete">draft-ietf-6lowpan-hc-08</span></td><td> </td><td =
class=3D"rblock">              Datagrams in 6LoWPAN Networks", <span =
class=3D"insert">draft-ietf-6lowpan-hc-12</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
             (work in progress), <span class=3D"delete">July</span> =
2010.</td><td> </td><td class=3D"rblock">              (work in =
progress), <span class=3D"insert">September</span> 2010.</td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[I-D.ietf-6man-node-req-bis]</td><td> </td><td class=3D"right">   =
[I-D.ietf-6man-node-req-bis]</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Jankiewicz, E., Loughney, J., and T. Narten, "IPv6 =
Node</td><td> </td><td class=3D"right">              Jankiewicz, E., =
Loughney, J., and T. Narten, "IPv6 Node</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Requirements RFC 4294-bis",</td><td> </td><td class=3D"right"> =
             Requirements RFC 4294-bis",</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           draft-ietf-6man-node-req-bis-05 (work in progress),</td><td> =
</td><td class=3D"right">              draft-ietf-6man-node-req-bis-05 =
(work in progress),</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           July 2010.</td><td> </td><td class=3D"right">              =
July 2010.</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[I-D.ietf-behave-address-format]</td><td> </td><td class=3D"right">   =
[I-D.ietf-behave-address-format]</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Bao, C., Huitema, C., Bagnulo, M., Boucadair, M., and =
X.</td><td> </td><td class=3D"right">              Bao, C., Huitema, C., =
Bagnulo, M., Boucadair, M., and X.</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Li, "IPv6 Addressing of IPv4/IPv6 Translators",</td><td> =
</td><td class=3D"right">              Li, "IPv6 Addressing of IPv4/IPv6 =
Translators",</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           draft-ietf-behave-address-format-10 (work in =
progress),</td><td> </td><td class=3D"right">              =
draft-ietf-behave-address-format-10 (work in progress),</td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           August 2010.</td><td> </td><td class=3D"right">              =
August 2010.</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[I-D.ietf-behave-dns64]</td><td> </td><td class=3D"right">   =
[I-D.ietf-behave-dns64]</td><td class=3D"lineno" valign=3D"top"></td></tr>=

      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Bagnulo, M., Sullivan, A., Matthews, P., and I. =
Beijnum,</td><td> </td><td class=3D"right">              Bagnulo, M., =
Sullivan, A., Matthews, P., and I. Beijnum,</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           "DNS64: DNS extensions for Network Address =
Translation</td><td> </td><td class=3D"right">              "DNS64: DNS =
extensions for Network Address Translation</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           from IPv6 Clients to IPv4 Servers",</td><td> </td><td =
class=3D"right">              from IPv6 Clients to IPv4 =
Servers",</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td><a name=3D"diff0042"></a></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
             <span class=3D"delete">draft-ietf-behave-dns64-10</span> =
(work in progress), <span class=3D"delete">July</span> 2010.</td><td> =
</td><td class=3D"rblock">              <span =
class=3D"insert">draft-ietf-behave-dns64-11</span> (work in =
progress),</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock">              <span =
class=3D"insert">October</span> 2010.</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[I-D.ietf-behave-v6v4-framework]</td><td> </td><td class=3D"right">   =
[I-D.ietf-behave-v6v4-framework]</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Baker, F., Li, X., Bao, C., and K. Yin, "Framework =
for</td><td> </td><td class=3D"right">              Baker, F., Li, X., =
Bao, C., and K. Yin, "Framework for</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           IPv4/IPv6 Translation",</td><td> </td><td class=3D"right">    =
          IPv4/IPv6 Translation",</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           draft-ietf-behave-v6v4-framework-10 (work in =
progress),</td><td> </td><td class=3D"right">              =
draft-ietf-behave-v6v4-framework-10 (work in progress),</td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           August 2010.</td><td> </td><td class=3D"right">              =
August 2010.</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[I-D.ietf-behave-v6v4-xlate]</td><td> </td><td class=3D"right">   =
[I-D.ietf-behave-v6v4-xlate]</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Li, X., Bao, C., and F. Baker, "IP/ICMP Translation</td><td> =
</td><td class=3D"right">              Li, X., Bao, C., and F. Baker, =
"IP/ICMP Translation</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td><a name=3D"diff0043"></a></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
             Algorithm", <span =
class=3D"delete">draft-ietf-behave-v6v4-xlate-21</span> (work =
in</td><td> </td><td class=3D"rblock">              Algorithm", <span =
class=3D"insert">draft-ietf-behave-v6v4-xlate-23</span> (work in</td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
             progress), <span class=3D"delete">August</span> =
2010.</td><td> </td><td class=3D"rblock">              progress), <span =
class=3D"insert">September</span> 2010.</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[I-D.ietf-behave-v6v4-xlate-stateful]</td><td> </td><td class=3D"right"> =
  [I-D.ietf-behave-v6v4-xlate-stateful]</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Bagnulo, M., Matthews, P., and I. Beijnum, "Stateful</td><td> =
</td><td class=3D"right">              Bagnulo, M., Matthews, P., and I. =
Beijnum, "Stateful</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           NAT64: Network Address and Protocol Translation from =
IPv6</td><td> </td><td class=3D"right">              NAT64: Network =
Address and Protocol Translation from IPv6</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Clients to IPv4 Servers",</td><td> </td><td class=3D"right">  =
            Clients to IPv4 Servers",</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           draft-ietf-behave-v6v4-xlate-stateful-12 (work in</td><td> =
</td><td class=3D"right">              =
draft-ietf-behave-v6v4-xlate-stateful-12 (work in</td><td class=3D"lineno"=
 valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           progress), July 2010.</td><td> </td><td class=3D"right">      =
        progress), July 2010.</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[I-D.ietf-core-coap]</td><td> </td><td class=3D"right">   =
[I-D.ietf-core-coap]</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Shelby, Z., Frank, B., and D. Sturek, "Constrained</td><td> =
</td><td class=3D"right">              Shelby, Z., Frank, B., and D. =
Sturek, "Constrained</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td><a name=3D"diff0044"></a></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
             Application Protocol (CoAP)", <span =
class=3D"delete">draft-ietf-core-coap-01</span></td><td> </td><td =
class=3D"rblock">              Application Protocol (CoAP)", <span =
class=3D"insert">draft-ietf-core-coap-02</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
             (work in progress), <span class=3D"delete">July</span> =
2010.</td><td> </td><td class=3D"rblock">              (work in =
progress), <span class=3D"insert">September</span> 2010.</td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[I-D.ietf-manet-dymo]</td><td> </td><td class=3D"right">   =
[I-D.ietf-manet-dymo]</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Chakeres, I. and C. Perkins, "Dynamic MANET =
On-demand</td><td> </td><td class=3D"right">              Chakeres, I. =
and C. Perkins, "Dynamic MANET On-demand</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           (DYMO) Routing", draft-ietf-manet-dymo-21 (work in</td><td> =
</td><td class=3D"right">              (DYMO) Routing", =
draft-ietf-manet-dymo-21 (work in</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           progress), July 2010.</td><td> </td><td class=3D"right">      =
        progress), July 2010.</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[I-D.ietf-roll-rpl]</td><td> </td><td class=3D"right">   =
[I-D.ietf-roll-rpl]</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Winter, T., Thubert, P., and R. Team, "RPL: IPv6 =
Routing</td><td> </td><td class=3D"right">              Winter, T., =
Thubert, P., and R. Team, "RPL: IPv6 Routing</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Protocol for Low power and Lossy Networks",</td><td> </td><td =
class=3D"right">              Protocol for Low power and Lossy =
Networks",</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           draft-ietf-roll-rpl-11 (work in progress), July =
2010.</td><td> </td><td class=3D"right">              =
draft-ietf-roll-rpl-11 (work in progress), July 2010.</td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[I-D.ietf-tls-rfc4347-bis]</td><td> </td><td class=3D"right">   =
[I-D.ietf-tls-rfc4347-bis]</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Rescorla, E. and N. Modadugu, "Datagram Transport =
Layer</td><td> </td><td class=3D"right">              Rescorla, E. and =
N. Modadugu, "Datagram Transport Layer</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Security version 1.2", draft-ietf-tls-rfc4347-bis-04 =
(work</td><td> </td><td class=3D"right">              Security version =
1.2", draft-ietf-tls-rfc4347-bis-04 (work</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           in progress), July 2010.</td><td> </td><td class=3D"right">   =
           in progress), July 2010.</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td><a name=3D"diff0045"></a></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock">   <span =
class=3D"insert">[IEC62351-3]</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">              International Electrotechnical Commission =
Technical</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">              Committee 57, "POWER SYSTEMS MANAGEMENT =
AND ASSOCIATED</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">              INFORMATION EXCHANGE. DATA AND =
COMMUNICATIONS SECURITY --</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">              Part 3: Communication network and system =
security Profiles</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">              including TCP/IP", May =
2007.</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock">                    =
                                                     </td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[IEEE802.1X]</td><td> </td><td class=3D"right">   [IEEE802.1X]</td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Institute of Electrical and Electronics Engineers, =
"IEEE</td><td> </td><td class=3D"right">              Institute of =
Electrical and Electronics Engineers, "IEEE</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Standard for Local and Metropolitan Area Networks - =
Port</td><td> </td><td class=3D"right">              Standard for Local =
and Metropolitan Area Networks - Port</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           based Network Access Control", IEEE Standard =
802.1X-2010,</td><td> </td><td class=3D"right">              based =
Network Access Control", IEEE Standard 802.1X-2010,</td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           February 2010.</td><td> </td><td class=3D"right">             =
 February 2010.</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td><a name=3D"diff0046"></a></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock">   <span =
class=3D"insert">[RESTFUL]  Fielding, "Architectural Styles and the =
Design of Network-</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">              based Software Architectures", =
2000.</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock">                    =
                                                     </td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[RFC0768]  Postel, J., "User Datagram Protocol", STD 6, RFC =
768,</td><td> </td><td class=3D"right">   [RFC0768]  Postel, J., "User =
Datagram Protocol", STD 6, RFC 768,</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           August 1980.</td><td> </td><td class=3D"right">              =
August 1980.</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[RFC0791]  Postel, J., "Internet Protocol", STD 5, RFC 791,</td><td> =
</td><td class=3D"right">   [RFC0791]  Postel, J., "Internet Protocol", =
STD 5, RFC 791,</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           September 1981.</td><td> </td><td class=3D"right">            =
  September 1981.</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[RFC0792]  Postel, J., "Internet Control Message Protocol", STD =
5,</td><td> </td><td class=3D"right">   [RFC0792]  Postel, J., "Internet =
Control Message Protocol", STD 5,</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           RFC 792, September 1981.</td><td> </td><td class=3D"right">   =
           RFC 792, September 1981.</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[RFC0793]  Postel, J., "Transmission Control Protocol", STD 7,</td><td> =
</td><td class=3D"right">   [RFC0793]  Postel, J., "Transmission Control =
Protocol", STD 7,</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr bgcolor=3D"gray"><td></td><th><a =
name=3D"part-l17"><small>skipping to change at</small><em> page 38, line =
37</em></a></th><th> </th><th><a name=3D"part-r17"><small>skipping to =
change at</small><em> page 42, line 5</em></a></th><td></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           March 2002.</td><td> </td><td class=3D"right">              =
March 2002.</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[RFC3315]  Droms, R., Bound, J., Volz, B., Lemon, T., Perkins, =
C.,</td><td> </td><td class=3D"right">   [RFC3315]  Droms, R., Bound, =
J., Volz, B., Lemon, T., Perkins, C.,</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           and M. Carney, "Dynamic Host Configuration Protocol =
for</td><td> </td><td class=3D"right">              and M. Carney, =
"Dynamic Host Configuration Protocol for</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           IPv6 (DHCPv6)", RFC 3315, July 2003.</td><td> </td><td =
class=3D"right">              IPv6 (DHCPv6)", RFC 3315, July =
2003.</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[RFC3376]  Cain, B., Deering, S., Kouvelas, I., Fenner, B., and =
A.</td><td> </td><td class=3D"right">   [RFC3376]  Cain, B., Deering, =
S., Kouvelas, I., Fenner, B., and A.</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Thyagarajan, "Internet Group Management Protocol, =
Version</td><td> </td><td class=3D"right">              Thyagarajan, =
"Internet Group Management Protocol, Version</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           3", RFC 3376, October 2002.</td><td> </td><td class=3D"right"> =
             3", RFC 3376, October 2002.</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td><a name=3D"diff0047"></a></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock">   <span =
class=3D"insert">[RFC3411]  Harrington, D., Presuhn, R., and B. Wijnen, =
"An</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">              Architecture for Describing Simple =
Network Management</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">              Protocol (SNMP) Management Frameworks", =
STD 62, RFC 3411,</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">              December 2002.</span></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   [RFC3412]  Case, J., Harrington, D., Presuhn, R., =
and B. Wijnen,</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">              "Message Processing and Dispatching for =
the Simple Network</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">              Management Protocol (SNMP)", STD 62, RFC =
3412,</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">              December 2002.</span></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   [RFC3413]  Levi, D., Meyer, P., and B. Stewart, =
"Simple Network</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">              Management Protocol (SNMP) Applications", =
STD 62,</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">              RFC 3413, December 2002.</span></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   [RFC3414]  Blumenthal, U. and B. Wijnen, "User-based =
Security Model</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">              (USM) for version 3 of the Simple Network =
Management</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">              Protocol (SNMPv3)", STD 62, RFC 3414, =
December 2002.</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   [RFC3415]  Wijnen, B., Presuhn, R., and K. =
McCloghrie, "View-based</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">              Access Control Model (VACM) for the =
Simple Network</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">              Management Protocol (SNMP)", STD 62, RFC =
3415,</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">              December 2002.</span></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   [RFC3416]  Presuhn, R., "Version 2 of the Protocol =
Operations for the</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">              Simple Network Management Protocol =
(SNMP)", STD 62,</span></td><td class=3D"lineno" valign=3D"top"></td></tr>=

      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">              RFC 3416, December 2002.</span></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   [RFC3417]  Presuhn, R., "Transport Mappings for the =
Simple Network</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">              Management Protocol (SNMP)", STD 62, RFC =
3417,</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">              December 2002.</span></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   [RFC3418]  Presuhn, R., "Management Information Base =
(MIB) for the</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">              Simple Network Management Protocol =
(SNMP)", STD 62,</span></td><td class=3D"lineno" valign=3D"top"></td></tr>=

      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">              RFC 3418, December 2002.</span></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock">                    =
                                                     </td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[RFC3424]  Daigle, L. and IAB, "IAB Considerations for =
UNilateral</td><td> </td><td class=3D"right">   [RFC3424]  Daigle, L. =
and IAB, "IAB Considerations for UNilateral</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Self-Address Fixing (UNSAF) Across Network Address</td><td> =
</td><td class=3D"right">              Self-Address Fixing (UNSAF) =
Across Network Address</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Translation", RFC 3424, November 2002.</td><td> </td><td =
class=3D"right">              Translation", RFC 3424, November =
2002.</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[RFC3436]  Jungmaier, A., Rescorla, E., and M. Tuexen, =
"Transport</td><td> </td><td class=3D"right">   [RFC3436]  Jungmaier, =
A., Rescorla, E., and M. Tuexen, "Transport</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Layer Security over Stream Control Transmission =
Protocol",</td><td> </td><td class=3D"right">              Layer =
Security over Stream Control Transmission Protocol",</td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           RFC 3436, December 2002.</td><td> </td><td class=3D"right">   =
           RFC 3436, December 2002.</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[RFC3453]  Luby, M., Vicisano, L., Gemmell, J., Rizzo, L., =
Handley,</td><td> </td><td class=3D"right">   [RFC3453]  Luby, M., =
Vicisano, L., Gemmell, J., Rizzo, L., Handley,</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           M., and J. Crowcroft, "The Use of Forward Error =
Correction</td><td> </td><td class=3D"right">              M., and J. =
Crowcroft, "The Use of Forward Error Correction</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr bgcolor=3D"gray"><td></td><th><a =
name=3D"part-l18"><small>skipping to change at</small><em> page 40, line =
34</em></a></th><th> </th><th><a name=3D"part-r18"><small>skipping to =
change at</small><em> page 44, line 36</em></a></th><td></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[RFC4301]  Kent, S. and K. Seo, "Security Architecture for the</td><td> =
</td><td class=3D"right">   [RFC4301]  Kent, S. and K. Seo, "Security =
Architecture for the</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Internet Protocol", RFC 4301, December 2005.</td><td> =
</td><td class=3D"right">              Internet Protocol", RFC 4301, =
December 2005.</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[RFC4302]  Kent, S., "IP Authentication Header", RFC 4302,</td><td> =
</td><td class=3D"right">   [RFC4302]  Kent, S., "IP Authentication =
Header", RFC 4302,</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           December 2005.</td><td> </td><td class=3D"right">             =
 December 2005.</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[RFC4303]  Kent, S., "IP Encapsulating Security Payload (ESP)",</td><td> =
</td><td class=3D"right">   [RFC4303]  Kent, S., "IP Encapsulating =
Security Payload (ESP)",</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           RFC 4303, December 2005.</td><td> </td><td class=3D"right">   =
           RFC 4303, December 2005.</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td><a name=3D"diff0048"></a></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  <span class=3D"delete">[RFC4306]  Kaufman, C., "Internet Key Exchange =
(IKEv2) Protocol",</span></td><td> </td><td class=3D"rblock"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"><span class=3D"delete">              RFC 4306, December =
2005.</span></td><td> </td><td class=3D"rblock"></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
                                                                        =
</td><td> </td><td class=3D"rblock"></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[RFC4307]  Schiller, J., "Cryptographic Algorithms for Use in =
the</td><td> </td><td class=3D"right">   [RFC4307]  Schiller, J., =
"Cryptographic Algorithms for Use in the</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Internet Key Exchange Version 2 (IKEv2)", RFC 4307,</td><td> =
</td><td class=3D"right">              Internet Key Exchange Version 2 =
(IKEv2)", RFC 4307,</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           December 2005.</td><td> </td><td class=3D"right">             =
 December 2005.</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[RFC4309]  Housley, R., "Using Advanced Encryption Standard (AES) =
CCM</td><td> </td><td class=3D"right">   [RFC4309]  Housley, R., "Using =
Advanced Encryption Standard (AES) CCM</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Mode with IPsec Encapsulating Security Payload =
(ESP)",</td><td> </td><td class=3D"right">              Mode with IPsec =
Encapsulating Security Payload (ESP)",</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           RFC 4309, December 2005.</td><td> </td><td class=3D"right">   =
           RFC 4309, December 2005.</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[RFC4320]  Sparks, R., "Actions Addressing Identified Issues with =
the</td><td> </td><td class=3D"right">   [RFC4320]  Sparks, R., "Actions =
Addressing Identified Issues with the</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Session Initiation Protocol's (SIP) Non-INVITE</td><td> =
</td><td class=3D"right">              Session Initiation Protocol's =
(SIP) Non-INVITE</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr bgcolor=3D"gray"><td></td><th><a =
name=3D"part-l19"><small>skipping to change at</small><em> page 41, line =
23</em></a></th><th> </th><th><a name=3D"part-r19"><small>skipping to =
change at</small><em> page 45, line 23</em></a></th><td></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Message Protocol (ICMPv6) for the Internet Protocol</td><td> =
</td><td class=3D"right">              Message Protocol (ICMPv6) for the =
Internet Protocol</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Version 6 (IPv6) Specification", RFC 4443, March =
2006.</td><td> </td><td class=3D"right">              Version 6 (IPv6) =
Specification", RFC 4443, March 2006.</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[RFC4487]  Le, F., Faccin, S., Patil, B., and H. Tschofenig, =
"Mobile</td><td> </td><td class=3D"right">   [RFC4487]  Le, F., Faccin, =
S., Patil, B., and H. Tschofenig, "Mobile</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           IPv6 and Firewalls: Problem Statement", RFC 4487,</td><td> =
</td><td class=3D"right">              IPv6 and Firewalls: Problem =
Statement", RFC 4487,</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           May 2006.</td><td> </td><td class=3D"right">              May =
2006.</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[RFC4566]  Handley, M., Jacobson, V., and C. Perkins, "SDP: =
Session</td><td> </td><td class=3D"right">   [RFC4566]  Handley, M., =
Jacobson, V., and C. Perkins, "SDP: Session</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Description Protocol", RFC 4566, July 2006.</td><td> </td><td =
class=3D"right">              Description Protocol", RFC 4566, July =
2006.</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td><a name=3D"diff0049"></a></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock">   <span =
class=3D"insert">[RFC4594]  Babiarz, J., Chan, K., and F. Baker, =
"Configuration</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">              Guidelines for DiffServ Service Classes", =
RFC 4594,</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">              August 2006.</span></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock">                    =
                                                     </td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[RFC4601]  Fenner, B., Handley, M., Holbrook, H., and I. =
Kouvelas,</td><td> </td><td class=3D"right">   [RFC4601]  Fenner, B., =
Handley, M., Holbrook, H., and I. Kouvelas,</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           "Protocol Independent Multicast - Sparse Mode =
(PIM-SM):</td><td> </td><td class=3D"right">              "Protocol =
Independent Multicast - Sparse Mode (PIM-SM):</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Protocol Specification (Revised)", RFC 4601, August =
2006.</td><td> </td><td class=3D"right">              Protocol =
Specification (Revised)", RFC 4601, August 2006.</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[RFC4604]  Holbrook, H., Cain, B., and B. Haberman, "Using =
Internet</td><td> </td><td class=3D"right">   [RFC4604]  Holbrook, H., =
Cain, B., and B. Haberman, "Using Internet</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Group Management Protocol Version 3 (IGMPv3) and =
Multicast</td><td> </td><td class=3D"right">              Group =
Management Protocol Version 3 (IGMPv3) and Multicast</td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Listener Discovery Protocol Version 2 (MLDv2) for =
Source-</td><td> </td><td class=3D"right">              Listener =
Discovery Protocol Version 2 (MLDv2) for Source-</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Specific Multicast", RFC 4604, August 2006.</td><td> </td><td =
class=3D"right">              Specific Multicast", RFC 4604, August =
2006.</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[RFC4607]  Holbrook, H. and B. Cain, "Source-Specific Multicast =
for</td><td> </td><td class=3D"right">   [RFC4607]  Holbrook, H. and B. =
Cain, "Source-Specific Multicast for</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr bgcolor=3D"gray"><td></td><th><a =
name=3D"part-l20"><small>skipping to change at</small><em> page 41, line =
46</em></a></th><th> </th><th><a name=3D"part-r20"><small>skipping to =
change at</small><em> page 45, line 50</em></a></th><td></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Protocol Independent Multicast in 232/8", BCP 120,</td><td> =
</td><td class=3D"right">              Protocol Independent Multicast in =
232/8", BCP 120,</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           RFC 4608, August 2006.</td><td> </td><td class=3D"right">     =
         RFC 4608, August 2006.</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[RFC4614]  Duke, M., Braden, R., Eddy, W., and E. Blanton, "A =
Roadmap</td><td> </td><td class=3D"right">   [RFC4614]  Duke, M., =
Braden, R., Eddy, W., and E. Blanton, "A Roadmap</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           for Transmission Control Protocol (TCP) =
Specification</td><td> </td><td class=3D"right">              for =
Transmission Control Protocol (TCP) Specification</td><td class=3D"lineno"=
 valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Documents", RFC 4614, September 2006.</td><td> </td><td =
class=3D"right">              Documents", RFC 4614, September =
2006.</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[RFC4741]  Enns, R., "NETCONF Configuration Protocol", RFC =
4741,</td><td> </td><td class=3D"right">   [RFC4741]  Enns, R., "NETCONF =
Configuration Protocol", RFC 4741,</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           December 2006.</td><td> </td><td class=3D"right">             =
 December 2006.</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td><a name=3D"diff0050"></a></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock">   <span =
class=3D"insert">[RFC4742]  Wasserman, M. and T. Goddard, "Using the =
NETCONF</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">              Configuration Protocol over Secure SHell =
(SSH)", RFC 4742,</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">              December 2006.</span></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   [RFC4743]  Goddard, T., "Using NETCONF over the =
Simple Object Access</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">              Protocol (SOAP)", RFC 4743, December =
2006.</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   [RFC4744]  Lear, E. and K. Crozier, "Using the =
NETCONF Protocol over</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">              the Blocks Extensible Exchange Protocol =
(BEEP)", RFC 4744,</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">              December 2006.</span></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock">                    =
                                                     </td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[RFC4760]  Bates, T., Chandra, R., Katz, D., and Y. Rekhter,</td><td> =
</td><td class=3D"right">   [RFC4760]  Bates, T., Chandra, R., Katz, D., =
and Y. Rekhter,</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           "Multiprotocol Extensions for BGP-4", RFC 4760,</td><td> =
</td><td class=3D"right">              "Multiprotocol Extensions for =
BGP-4", RFC 4760,</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           January 2007.</td><td> </td><td class=3D"right">              =
January 2007.</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[RFC4787]  Audet, F. and C. Jennings, "Network Address =
Translation</td><td> </td><td class=3D"right">   [RFC4787]  Audet, F. =
and C. Jennings, "Network Address Translation</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           (NAT) Behavioral Requirements for Unicast UDP", BCP =
127,</td><td> </td><td class=3D"right">              (NAT) Behavioral =
Requirements for Unicast UDP", BCP 127,</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           RFC 4787, January 2007.</td><td> </td><td class=3D"right">    =
          RFC 4787, January 2007.</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[RFC4835]  Manral, V., "Cryptographic Algorithm Implementation</td><td> =
</td><td class=3D"right">   [RFC4835]  Manral, V., "Cryptographic =
Algorithm Implementation</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Requirements for Encapsulating Security Payload (ESP) =
and</td><td> </td><td class=3D"right">              Requirements for =
Encapsulating Security Payload (ESP) and</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr bgcolor=3D"gray"><td></td><th><a =
name=3D"part-l21"><small>skipping to change at</small><em> page 43, line =
10</em></a></th><th> </th><th><a name=3D"part-r21"><small>skipping to =
change at</small><em> page 47, line 25</em></a></th><td></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           PPP", RFC 5072, September 2007.</td><td> </td><td =
class=3D"right">              PPP", RFC 5072, September 2007.</td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[RFC5128]  Srisuresh, P., Ford, B., and D. Kegel, "State of =
Peer-to-</td><td> </td><td class=3D"right">   [RFC5128]  Srisuresh, P., =
Ford, B., and D. Kegel, "State of Peer-to-</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Peer (P2P) Communication across Network Address</td><td> =
</td><td class=3D"right">              Peer (P2P) Communication across =
Network Address</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Translators (NATs)", RFC 5128, March 2008.</td><td> </td><td =
class=3D"right">              Translators (NATs)", RFC 5128, March =
2008.</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[RFC5135]  Wing, D. and T. Eckert, "IP Multicast Requirements for =
a</td><td> </td><td class=3D"right">   [RFC5135]  Wing, D. and T. =
Eckert, "IP Multicast Requirements for a</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Network Address Translator (NAT) and a Network =
Address</td><td> </td><td class=3D"right">              Network Address =
Translator (NAT) and a Network Address</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Port Translator (NAPT)", BCP 135, RFC 5135, February =
2008.</td><td> </td><td class=3D"right">              Port Translator =
(NAPT)", BCP 135, RFC 5135, February 2008.</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td><a name=3D"diff0051"></a></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock">   <span =
class=3D"insert">[RFC5193]  Jayaraman, P., Lopez, R., Ohba, Y., =
Parthasarathy, M., and</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">              A. Yegin, "Protocol for Carrying =
Authentication for</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">              Network Access (PANA) Framework", RFC =
5193, May 2008.</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock">                    =
                                                     </td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[RFC5207]  Stiemerling, M., Quittek, J., and L. Eggert, "NAT =
and</td><td> </td><td class=3D"right">   [RFC5207]  Stiemerling, M., =
Quittek, J., and L. Eggert, "NAT and</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Firewall Traversal Issues of Host Identity Protocol =
(HIP)</td><td> </td><td class=3D"right">              Firewall Traversal =
Issues of Host Identity Protocol (HIP)</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Communication", RFC 5207, April 2008.</td><td> </td><td =
class=3D"right">              Communication", RFC 5207, April =
2008.</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[RFC5216]  Simon, D., Aboba, B., and R. Hurst, "The EAP-TLS</td><td> =
</td><td class=3D"right">   [RFC5216]  Simon, D., Aboba, B., and R. =
Hurst, "The EAP-TLS</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Authentication Protocol", RFC 5216, March 2008.</td><td> =
</td><td class=3D"right">              Authentication Protocol", RFC =
5216, March 2008.</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[RFC5238]  Phelan, T., "Datagram Transport Layer Security (DTLS) =
over</td><td> </td><td class=3D"right">   [RFC5238]  Phelan, T., =
"Datagram Transport Layer Security (DTLS) over</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           the Datagram Congestion Control Protocol (DCCP)",</td><td> =
</td><td class=3D"right">              the Datagram Congestion Control =
Protocol (DCCP)",</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           RFC 5238, May 2008.</td><td> </td><td class=3D"right">        =
      RFC 5238, May 2008.</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[RFC5246]  Dierks, T. and E. Rescorla, "The Transport Layer =
Security</td><td> </td><td class=3D"right">   [RFC5246]  Dierks, T. and =
E. Rescorla, "The Transport Layer Security</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           (TLS) Protocol Version 1.2", RFC 5246, August 2008.</td><td> =
</td><td class=3D"right">              (TLS) Protocol Version 1.2", RFC =
5246, August 2008.</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td><a name=3D"diff0052"></a></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock">   <span =
class=3D"insert">[RFC5277]  Chisholm, S. and H. Trevino, "NETCONF =
Event</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">              Notifications", RFC 5277, July =
2008.</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock">                    =
                                                     </td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[RFC5308]  Hopps, C., "Routing IPv6 with IS-IS", RFC 5308,</td><td> =
</td><td class=3D"right">   [RFC5308]  Hopps, C., "Routing IPv6 with =
IS-IS", RFC 5308,</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           October 2008.</td><td> </td><td class=3D"right">              =
October 2008.</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[RFC5340]  Coltun, R., Ferguson, D., Moy, J., and A. Lindem, =
"OSPF</td><td> </td><td class=3D"right">   [RFC5340]  Coltun, R., =
Ferguson, D., Moy, J., and A. Lindem, "OSPF</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           for IPv6", RFC 5340, July 2008.</td><td> </td><td =
class=3D"right">              for IPv6", RFC 5340, July 2008.</td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[RFC5389]  Rosenberg, J., Mahy, R., Matthews, P., and D. Wing,</td><td> =
</td><td class=3D"right">   [RFC5389]  Rosenberg, J., Mahy, R., =
Matthews, P., and D. Wing,</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           "Session Traversal Utilities for NAT (STUN)", RFC =
5389,</td><td> </td><td class=3D"right">              "Session Traversal =
Utilities for NAT (STUN)", RFC 5389,</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           October 2008.</td><td> </td><td class=3D"right">              =
October 2008.</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[RFC5393]  Sparks, R., Lawrence, S., Hawrylyshen, A., and B. =
Campen,</td><td> </td><td class=3D"right">   [RFC5393]  Sparks, R., =
Lawrence, S., Hawrylyshen, A., and B. Campen,</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           "Addressing an Amplification Vulnerability in =
Session</td><td> </td><td class=3D"right">              "Addressing an =
Amplification Vulnerability in Session</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Initiation Protocol (SIP) Forking Proxies", RFC =
5393,</td><td> </td><td class=3D"right">              Initiation =
Protocol (SIP) Forking Proxies", RFC 5393,</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           December 2008.</td><td> </td><td class=3D"right">             =
 December 2008.</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[RFC5405]  Eggert, L. and G. Fairhurst, "Unicast UDP Usage =
Guidelines</td><td> </td><td class=3D"right">   [RFC5405]  Eggert, L. =
and G. Fairhurst, "Unicast UDP Usage Guidelines</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           for Application Designers", BCP 145, RFC 5405,</td><td> =
</td><td class=3D"right">              for Application Designers", BCP =
145, RFC 5405,</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           November 2008.</td><td> </td><td class=3D"right">             =
 November 2008.</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td><a name=3D"diff0053"></a></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock">   <span =
class=3D"insert">[RFC5539]  Badra, M., "NETCONF over Transport Layer =
Security (TLS)",</span></td><td class=3D"lineno" valign=3D"top"></td></tr>=

      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">              RFC 5539, May 2009.</span></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock">                    =
                                                     </td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[RFC5545]  Desruisseaux, B., "Internet Calendaring and =
Scheduling</td><td> </td><td class=3D"right">   [RFC5545]  Desruisseaux, =
B., "Internet Calendaring and Scheduling</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Core Object Specification (iCalendar)", RFC 5545,</td><td> =
</td><td class=3D"right">              Core Object Specification =
(iCalendar)", RFC 5545,</td><td class=3D"lineno" valign=3D"top"></td></tr>=

      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           September 2009.</td><td> </td><td class=3D"right">            =
  September 2009.</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[RFC5546]  Daboo, C., "iCalendar Transport-Independent</td><td> </td><td =
class=3D"right">   [RFC5546]  Daboo, C., "iCalendar =
Transport-Independent</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Interoperability Protocol (iTIP)", RFC 5546,</td><td> =
</td><td class=3D"right">              Interoperability Protocol =
(iTIP)", RFC 5546,</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           December 2009.</td><td> </td><td class=3D"right">             =
 December 2009.</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td><a name=3D"diff0054"></a></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock">   <span =
class=3D"insert">[RFC5548]  Dohler, M., Watteyne, T., Winter, T., and D. =
Barthel,</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">              "Routing Requirements for Urban Low-Power =
and Lossy</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">              Networks", RFC 5548, May =
2009.</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock">                    =
                                                     </td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[RFC5569]  Despres, R., "IPv6 Rapid Deployment on IPv4</td><td> </td><td =
class=3D"right">   [RFC5569]  Despres, R., "IPv6 Rapid Deployment on =
IPv4</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Infrastructures (6rd)", RFC 5569, January 2010.</td><td> =
</td><td class=3D"right">              Infrastructures (6rd)", RFC 5569, =
January 2010.</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[RFC5621]  Camarillo, G., "Message Body Handling in the Session</td><td> =
</td><td class=3D"right">   [RFC5621]  Camarillo, G., "Message Body =
Handling in the Session</td><td class=3D"lineno" valign=3D"top"></td></tr>=

      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Initiation Protocol (SIP)", RFC 5621, September =
2009.</td><td> </td><td class=3D"right">              Initiation =
Protocol (SIP)", RFC 5621, September 2009.</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td><a name=3D"diff0055"></a></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock">   <span =
class=3D"insert">[RFC5673]  Pister, K., Thubert, P., Dwars, S., and T. =
Phinney,</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">              "Industrial Routing Requirements in =
Low-Power and Lossy</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">              Networks", RFC 5673, October =
2009.</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock">                    =
                                                     </td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[RFC5681]  Allman, M., Paxson, V., and E. Blanton, "TCP =
Congestion</td><td> </td><td class=3D"right">   [RFC5681]  Allman, M., =
Paxson, V., and E. Blanton, "TCP Congestion</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Control", RFC 5681, September 2009.</td><td> </td><td =
class=3D"right">              Control", RFC 5681, September =
2009.</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td><a name=3D"diff0056"></a></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock">   <span =
class=3D"insert">[RFC5717]  Lengyel, B. and M. Bjorklund, "Partial Lock =
Remote</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">              Procedure Call (RPC) for NETCONF", RFC =
5717,</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">              December 2009.</span></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock">                    =
                                                     </td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[RFC5740]  Adamson, B., Bormann, C., Handley, M., and J. =
Macker,</td><td> </td><td class=3D"right">   [RFC5740]  Adamson, B., =
Bormann, C., Handley, M., and J. Macker,</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           "NACK-Oriented Reliable Multicast (NORM) Transport</td><td> =
</td><td class=3D"right">              "NACK-Oriented Reliable Multicast =
(NORM) Transport</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Protocol", RFC 5740, November 2009.</td><td> </td><td =
class=3D"right">              Protocol", RFC 5740, November =
2009.</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[RFC5750]  Ramsdell, B. and S. Turner, "Secure/Multipurpose =
Internet</td><td> </td><td class=3D"right">   [RFC5750]  Ramsdell, B. =
and S. Turner, "Secure/Multipurpose Internet</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Mail Extensions (S/MIME) Version 3.2 Certificate</td><td> =
</td><td class=3D"right">              Mail Extensions (S/MIME) Version =
3.2 Certificate</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Handling", RFC 5750, January 2010.</td><td> </td><td =
class=3D"right">              Handling", RFC 5750, January 2010.</td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[RFC5751]  Ramsdell, B. and S. Turner, "Secure/Multipurpose =
Internet</td><td> </td><td class=3D"right">   [RFC5751]  Ramsdell, B. =
and S. Turner, "Secure/Multipurpose Internet</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Mail Extensions (S/MIME) Version 3.2 Message</td><td> =
</td><td class=3D"right">              Mail Extensions (S/MIME) Version =
3.2 Message</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Specification", RFC 5751, January 2010.</td><td> </td><td =
class=3D"right">              Specification", RFC 5751, January =
2010.</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[RFC5785]  Nottingham, M. and E. Hammer-Lahav, "Defining =
Well-Known</td><td> </td><td class=3D"right">   [RFC5785]  Nottingham, =
M. and E. Hammer-Lahav, "Defining Well-Known</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Uniform Resource Identifiers (URIs)", RFC 5785,</td><td> =
</td><td class=3D"right">              Uniform Resource Identifiers =
(URIs)", RFC 5785,</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           April 2010.</td><td> </td><td class=3D"right">              =
April 2010.</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td><a name=3D"diff0057"></a></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"lblock"> =
  <span class=3D"delete">[RFC5796]  Atwood, W., Islam, S.,</span> and =
<span class=3D"delete">M. Siami, "Authentication and</span></td><td> =
</td><td class=3D"rblock">   <span class=3D"insert">[RFC5826]  Brandt, =
A., Buron, J.,</span> and <span class=3D"insert">G. Porcu, "Home =
Automation</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"><span class=3D"delete">              =
Confidentiality</span> in <span class=3D"delete">Protocol Independent =
Multicast Sparse</span></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">              Routing Requirements</span> in <span =
class=3D"insert">Low-Power and Lossy Networks",</span></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"><span class=3D"delete">              Mode (PIM-SM) =
Link-Local Messages",</span> RFC <span class=3D"delete">5796, =
March</span> 2010.</td><td> </td><td class=3D"rblock">              RFC =
<span class=3D"insert">5826, April</span> 2010.</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[RFC5838]  Lindem, A., Mirtorabi, S., Roy, A., Barnes, M., and =
R.</td><td> </td><td class=3D"right">   [RFC5838]  Lindem, A., =
Mirtorabi, S., Roy, A., Barnes, M., and R.</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Aggarwal, "Support of Address Families in OSPFv3",</td><td> =
</td><td class=3D"right">              Aggarwal, "Support of Address =
Families in OSPFv3",</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           RFC 5838, April 2010.</td><td> </td><td class=3D"right">      =
        RFC 5838, April 2010.</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td><a name=3D"diff0058"></a></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock">   <span =
class=3D"insert">[RFC5867]  Martocci, J., De Mil, P., Riou, N., and W. =
Vermeylen,</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">              "Building Automation Routing Requirements =
in Low-Power and</span></td><td class=3D"lineno" valign=3D"top"></td></tr>=

      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">              Lossy Networks", RFC 5867, June =
2010.</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock">                    =
                                                     </td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[RFC5905]  Mills, D., Martin, J., Burbank, J., and W. Kasch, =
"Network</td><td> </td><td class=3D"right">   [RFC5905]  Mills, D., =
Martin, J., Burbank, J., and W. Kasch, "Network</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Time Protocol Version 4: Protocol and Algorithms</td><td> =
</td><td class=3D"right">              Time Protocol Version 4: Protocol =
and Algorithms</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Specification", RFC 5905, June 2010.</td><td> </td><td =
class=3D"right">              Specification", RFC 5905, June =
2010.</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td><a name=3D"diff0059"></a></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock">   <span =
class=3D"insert">[RFC5996]  Kaufman, C., Hoffman, P., Nir, Y., and P. =
Eronen,</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">              "Internet Key Exchange Protocol Version 2 =
(IKEv2)",</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">              RFC 5996, September 2010.</span></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock">                    =
                                                     </td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
[SP-MULPIv3.0]</td><td> </td><td class=3D"right">   =
[SP-MULPIv3.0]</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           CableLabs, "DOCSIS 3.0 MAC and Upper Layer Protocols</td><td> =
</td><td class=3D"right">              CableLabs, "DOCSIS 3.0 MAC and =
Upper Layer Protocols</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           Interface Specification, =
CM-SP-MULPIv3.0-I10-090529",</td><td> </td><td class=3D"right">          =
    Interface Specification, CM-SP-MULPIv3.0-I10-090529",</td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
           May 2009.</td><td> </td><td class=3D"right">              May =
2009.</td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td><a name=3D"diff0060"></a></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">Appendix A.  Example: Advanced Metering =
Infrastructure</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   This appendix provides a worked example of the use =
of the Internet</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   Protocol Suite in a network such as the Smart Grid's =
Advanced</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   Metering Infrastructure (AMI).  There are several =
possible models.</span></td><td class=3D"lineno" valign=3D"top"></td></tr>=

      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   Figure 6 shows the structure of the AMI as it =
reaches out towards a</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   set of residences.  In this structure, we have the =
home itself and</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   its Home Area Network (HAN), the Neighborhood Area =
Network (NAN) that</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   the utility uses to access the meter at the home, =
and the utility</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   access network that connects a set of NANs to the =
utility itself.</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   For the purposes of this discussion, assume that the =
NAN contains a</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   distributed application in a set collectors, which =
is of course only</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   one way the application could be =
implemented.</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">    ---</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">    A        thermostats, appliances, =
etc</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">    |  =
------+-----------------------------------</span></td><td class=3D"lineno"=
 valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">    |        |</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">    |"HAN"   | &lt;--- Energy Services Interface =
(ESI)</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">    |    +---+---+</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">    |    | Meter | Meter is generally an ALG between =
the AMI and the HAN</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">    |    +---+---+</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">    V         \</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">    ---        \</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">    A           \   |   /</span></td><td class=3D"lineno"=
 valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">    |            \  |  /</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">    | "NAN"    +--+-+-+---+  Likely a router but =
could</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">    |          |Collector |  be an front-end =
application</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">    V          +----+-----+  gateway for =
utility</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">    ---              \</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">    A                 \   |   /</span></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">    |                  \  |  /</span></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">    |"AMI"           +--+-+-+--+</span></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">    |                |   AMI   |</span></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">    |                | Headend |</span></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">    V                +---------+</span></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">    ---</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">       Figure 6: The HAN, NAN, and Utility in the =
Advanced Metering</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">                              =
Infrastructure</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   There are several questions that have to be answered =
in describing</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   this picture, which given possible answers yield =
different possible</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   models.  They include at least:</span></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   o  How does Demand Response work?  =
Either:</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">      *  The utility presents pricing signals to the =
home,</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">      *  The utility presents pricing signals =
individual devices (e.g.,</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">         a Pluggable Electric Vehicle),</span></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">      *  The utility adjusts settings on individual =
appliances within</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">         the home.</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   o  How does the utility access meters at the =
home?</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">      *  The AMI Headend manages the interfaces with =
the meters,</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">         collecting metering data and passing it on to =
the appropriate</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">         applications over the Enterprise Bus, =
or</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">      *  Distributed application support (collectors") =
might access and</span></td><td class=3D"lineno" valign=3D"top"></td></tr>=

      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">         summarize the information; this device might =
be managed by the</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">         utility or by a service between the utility =
and its customers.</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   In implementation, these models are idealized; =
reality may include</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   some aspects of each model in specified =
cases.</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   The examples include:</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   1.  Appendix A.2 presumes that the HAN, the NAN, and =
the utility's</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">       network are separate administrative domains and =
speak application</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">       to application across those =
domains.</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   2.  Appendix A.3 repeats the first example, but =
presuming that the</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">       utility directly accesses appliances within the =
HAN from the</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">       collector".</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   3.  Appendix A.4 repeats the first example, but =
presuming that the</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">       collector directly forwards traffic as a router =
in addition to</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">       distributed application chores.  Note that this =
case implies</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">       numerous privacy and security concerns and as =
such is considered</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">       a less likely deployment model.</span></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">A.1.  How to structure a network</span></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   A key consideration in the Internet has been the =
development of new</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   link layer technologies over time.  The ARPANET =
originally used a BBN</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   proprietary link layer called BBN 1822 [1822].  In =
the late 1970's,</span></td><td class=3D"lineno" valign=3D"top"></td></tr>=

      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   the ARPANET switched to X.25 as an interface to the =
1822 network.</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   With the deployment of the IEEE 802 series =
technologies in the early</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   1980's, IP was deployed on Ethernet (IEEE 802.3), =
Token Ring (IEEE</span></td><td class=3D"lineno" valign=3D"top"></td></tr>=

      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   802.5) and WiFi (IEEE 802.11), as well as Arcnet, =
serial lines of</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   various kinds, Frame Relay, and ATM.  A key issue in =
this evolution</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   was that the applications developed to run on the =
Internet use APIs</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   related to the IPS, and as a result require little =
or no change to</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   continue to operate in a new link layer architecture =
or a mixture of</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   them.</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   The Smart Grid is likely to see a similar evolution =
over time.</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   Consider the Home Area Network (HAN) as a readily =
understandable</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   small network.  At this juncture, technologies =
proposed for</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   residential networks include IEEE P1901 (Homeplug), =
IEEE 802.15.4g</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   (Zigbee), and IEEE 802.11 (WiFi, commonly deployed =
today and used by</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   some high end appliances).  It is reasonable to =
expect other</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   technologies to be developed in the future.  As the =
Zigbee Alliance</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   has learned (and as a resulted incorporated the IPS =
in Secure Energy</span></td><td class=3D"lineno" valign=3D"top"></td></tr>=

      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   Profile 2.0), there is significant value in =
providing a virtual</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   address that is mapped to interfaces or nodes =
attached to each of</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   those technologies.</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   There are two possible communication models within =
the HAN, both of</span></td><td class=3D"lineno" valign=3D"top"></td></tr>=

      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   which are likely to be useful.  Devices may =
communicate directly with</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   each other, or they may be managed by some central =
controller.  An</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   example of direct communications might be a light =
switch that</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   directly commands a lamp to turn on or off.  An =
example of indirect</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   communications might be a control application in a =
Customer or</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   Building that accepts telemetry from a thermostat, =
applies some form</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   of policy, and controls the heating and air =
conditioning systems.  In</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   addition, there are high end appliances in the =
market today that use</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   residential broadband to communicate with their =
manufacturers, and</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   obviously the meter needs to communicate with the =
utility.</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">                    Utility NAN</span></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">                       /</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">                      /</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">                +----+-----+ +--+ +--+ =
+--+</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">                |  Meter   | |D1| |D2| =
|D3|</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">                +-----+----+ ++-+ ++-+ =
++-+</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">                      |       |    |    =
|</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">                ----+-+-------+----+----+---- IEEE =
802.15.4</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">                    |</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">                 +--+---+</span></td><td class=3D"lineno"=
 valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">                 |Router+------/------ Residential =
Broadband</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">                 +--+---+</span></td><td class=3D"lineno"=
 valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">                    |</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">                ----+---------+----+----+---- IEEE =
P1901</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">                              |    |    =
|</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">                             ++-+ ++-+ =
++-+</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">                             |D4| |D5| =
|D6|</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">                             +--+ +--+ =
+--+</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">                        Figure 7: Home Area =
Network</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   Figure 7 shows a simple network containing IEEE =
802.15.4 and IEEE</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   1901 domains.  It shows the connectivity between =
them as a router</span></td><td class=3D"lineno" valign=3D"top"></td></tr>=

      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   separate from the EMS.  This is for clarity; the two =
could of course</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   be incorporated into a single system, and one could =
imagine</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   appliances that want to communicate with their =
manufacturers</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   supporting both a HAN interface and a WiFi interface =
rather than</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   depending on the router.  These are all manufacturer =
design</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   decisions.</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">A.1.1.  HAN Routing</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   The HAN can be seen as communicating with two kinds =
of non-HAN</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   networks.  One is the home LAN, which may in turn be =
attached to the</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   Internet, and will generally either derive its =
prefix from the</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   upstream ISP or use a self-generated ULA.  Another =
is the utility's</span></td><td class=3D"lineno" valign=3D"top"></td></tr>=

      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   NAN, which through an ESI provides utility =
connectivity to the HAN;</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   in this case the HAN will be addressed by a =
self-generated ULA (note,</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   however, that in some cases ESI may also provide a =
prefix via DHCP</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   [RFC3315]).  In addition, the HAN will have =
link-local addresses that</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   can be used between neighboring nodes.  In general, =
an HAN will be</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   comprised of both 802.15.4, 802.11 (and possibly =
other) networks.</span></td><td class=3D"lineno" valign=3D"top"></td></tr>=

      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   The ESI is node on the user's residential network, =
and will not</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   typically provide stateful packet forwarding or =
firewall services</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   between the HAN and the utility network(s).  In =
general, the meter/</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   ESI is just a node on the home network.  However, =
the ESI must be</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   capable of understanding that most home networks are =
not 802.15.4</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   enabled (rather, they are typically 802.11 =
networks), and that it</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   must be capable of setting up ad-hoc networks =
between various sensors</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   in the home (e.g., betweeen the meter and say, a =
thermostat) in the</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   event there aren't other networks =
available.</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">A.1.2.  HAN Security</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   In any network, we have a variety of threats and a =
variety of</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   possible mitigations.  These include, at =
minimum:</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   Link Layer:  Why is your machine able to talk in my =
network?  The</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">      WiFi SSIDs often use some form of authenticated =
access control,</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">      which may be a simple encrypted password =
mechanism or may use a</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">      combination of encryption and IEEE 802.1X+EAP-TLS =
Authentication/</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">      Authorization to ensure that only authorized =
communicants can use</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">      it.  If a LAN has a router attached, the router =
may also implement</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">      a firewall to filter remote =
accesses.</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   Network Layer:  Given that your machine is =
authorized access to my</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">      network, why is your machine talking with my =
machine?  IPsec is a</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">      way of ensuring that computers that can use a =
network are allowed</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">      to talk with each other, may also enforce =
confidentiality, and may</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">      provide VPN services to make a device or network =
appear to be part</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">      of a remote network.</span></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   Application:  Given that your machine is authorized =
access to my</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">      network and my machine, why is your application =
talking with my</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">      application?  The fact that your machine and mine =
are allowed to</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">      talk for some applications doesn't mean they are =
allowed to for</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">      all applications.  (D)TLS, https, and other such =
mechanisms enable</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">      an application to impose =
application-to-application controls</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">      similar to the network layer controls provided by =
IPsec.</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   Remote Application:  How do I know that the data I =
received is the</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">      data you sent?  Especially in applications like =
electronic mail,</span></td><td class=3D"lineno" valign=3D"top"></td></tr>=

      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">      where data passes through a number of =
intermediaries that one may</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">      or may not really want munging it (how many times =
have you seen a</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">      URL broken by a mail server?), we have tools =
(DKIM, S/MIME, and</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">      W3C XML Signatures to name a few) to provide =
non-repudiability and</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">      integrity verification.  This may also have legal =
ramifications:</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">      if a record of a meter reading is to be used in =
billing, and the</span></td><td class=3D"lineno" valign=3D"top"></td></tr>=

      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">      bill is disputed in court, one could imagine the =
court wanting</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">      proof that the record in fact came from that =
meter at that time</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">      and contained that data.</span></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   Application-specific security:  In addition, =
applications often</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">      provide security services of their own.  The fact =
that I can</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">      access a file system, for example, doesn't mean =
that I am</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">      authorized to access everything in it; the file =
system may well</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">      prevent my access to some of its contents.  =
Routing protocols like</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">      BGP obsess with the question "what statements =
that my peer made am</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">      I willing to believe".  And monitoring protocols =
like SNMP may not</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">      be willing to answer every question they are =
asked, depending on</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">      access configuration.</span></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   Devices in the HAN want controlled access to the LAN =
in question for</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   obvious reasons.  In addition, there should be some =
form of mutual</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   authentication between devices - the lamp controller =
will want to</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   know that the light switch telling it to change =
state is the right</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   light switch, for example.  The EMS may well want =
strong</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   authentication of accesses - the parents may not =
want the children</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   changing the settings, and while the utility and the =
customer are</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   routinely granted access, other parties (especially =
parties with</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   criminal intent) need to be excluded.</span></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">A.2.  Model 1: AMI with separated =
domains</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   With the background given in Appendix A.1, we can =
now discuss the use</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   of IP (IPv4 or IPv6) in the AMI.</span></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   In this first model, consider the three domains in =
Figure 6 to</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   literally be separate administrative domains, =
potentially operated by</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   different entities.  For example, the NAN could be a =
WiMAX network</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   operated by a traditional telecom operator, the =
utility's network</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   (including the collector) is its own, and the =
residential network is</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   operated by the resident.  In this model, while =
communications</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   between the collector and the Meter are normal, the =
utility has no</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   other access to appliances in the home, and the =
collector doesn't</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   directly forward messages from the NAN =
upstream.</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   In this case, as shown in Figure 7, it would make =
the most sense to</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   design the collector, the Meter, and the EMS as =
hosts on the NAN -</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   design them as systems whose applications can =
originate and terminate</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   exchanges or sessions in the NAN, but not forward =
traffic from or to</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   other devices.</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   In such a configuration, Demand Response has to be =
performed by</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   having the EMS accept messages such as price signals =
from the "pole</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   top", apply some form of policy, and then =
orchestrate actions within</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   the home.  Another possibility is to have the EMS =
communicate with</span></td><td class=3D"lineno" valign=3D"top"></td></tr>=

      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   the ESI located in the meter.  If the thermostat has =
high demand and</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   low demand (day/night or morning/day/evening/night) =
settings, Demand</span></td><td class=3D"lineno" valign=3D"top"></td></tr>=

      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   Response might result in it moving to a lower demand =
setting, and the</span></td><td class=3D"lineno" valign=3D"top"></td></tr>=

      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   EMS might also turn off specified circuits in the =
home to diminish</span></td><td class=3D"lineno" valign=3D"top"></td></tr>=

      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   lighting.</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   In this scenario, QoS issues reportedly arise when =
high precedence</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   messages must be sent through the collector to the =
home; if the</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   collector is occupied polling the meters or doing =
some other task,</span></td><td class=3D"lineno" valign=3D"top"></td></tr>=

      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   the application may not yield control of the =
processor to the</span></td><td class=3D"lineno" valign=3D"top"></td></tr>=

      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   application that services the message.  Clearly, =
this is either an</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   application or an OS problem; applications need to =
be designed in a</span></td><td class=3D"lineno" valign=3D"top"></td></tr>=

      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   manner that doesn't block high precedence messages.  =
The collector</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   also needs to use appropriate NAN services, if they =
exist, to provide</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   the NAN QoS it needs.  For example, if WiMax is in =
use, it might use</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   a routine-level service for normal exchanges but a =
higher precedence</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   service for these messages.</span></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">A.3.  Model 2: AMI with neighborhood access to the =
home</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   In this second model, let's imagine that the utility =
directly</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   accesses appliances within the HAN.  Rather than =
expect an EMS to</span></td><td class=3D"lineno" valign=3D"top"></td></tr>=

      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   respond to price signals in Demand Response, it =
directly commands</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   devices like air conditioners to change state, or =
throws relays on</span></td><td class=3D"lineno" valign=3D"top"></td></tr>=

      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   circuits to or within the home.</span></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">                +----------+ +--+ +--+ =
+--+</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">                |  Meter   | |D1| |D2| =
|D3|</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">                +-----+----+ ++-+ ++-+ =
++-+</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">                      |       |    |    =
|</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">                ----+-+-------+----+----+---- IEEE =
802.15.4</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">                    |</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">                 +--+---+</span></td><td class=3D"lineno"=
 valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">                 |      +------/------ =
NAN</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">                 |Router|</span></td><td class=3D"lineno"=
 valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">                 |      +------/------ Residential =
Broadband</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">                 +--+---+</span></td><td class=3D"lineno"=
 valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">                    |</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">                ----+---------+----+----+---- IEEE =
P1901</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">                              |    |    =
|</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">                             ++-+ ++-+ =
++-+</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">                             |D4| |D5| =
|D6|</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">                             +--+ +--+ =
+--+</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">                        Figure 8: Home Area =
Network</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   In this case, as shown in Figure 8, the Meter, and =
EMS as hosts on</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   the HAN, and there is a router between the HAN and =
the NAN.</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   As one might imagine, there are serious security =
considerations in</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   this model.  Traffic between the NAN and the =
residential broadband</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   network should be filtered, and the issues raised in =
Appendix A.1.2</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   take on a new level of meaning.  One of the biggest =
threats may be a</span></td><td class=3D"lineno" valign=3D"top"></td></tr>=

      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   legal or at least a public relations issue; if the =
utility</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   intentionally disables a circuit in a manner or at a =
time that</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   threatens life (the resident's kidney dialysis =
machine is on it, or a</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   respirator, for example) the matter might make the =
papers.</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   Unauthorized access could be part of juvenile pranks =
or other things</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   as well.  So one really wants the appliances to only =
obey commands</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   under strict authentication/authorization =
controls.</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   In addition to the QoS issues raised in Appendix =
A.2, there is the</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   possibility of queuing issues in the router.  In =
such a case, the IP</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   datagrams should probably use the Low-Latency Data =
Service Class</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   described in [RFC4594], and let other traffic use =
the Standard</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   Service Class or other service =
classes.</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">A.4.  Model 3: Collector is an IP router</span></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   In this third model, the relationship between the =
NAN and the HAN is</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   either as in Appendix A.2 or Appendix A.3; what is =
different is that</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   the collector may be an IP router.  In addition to =
whatever</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   autonomous activities it is doing, it forwards =
traffic as an IP</span></td><td class=3D"lineno" valign=3D"top"></td></tr>=

      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   router in some cases.</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   As and analogous to Appendix A.3, there are serious =
security</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   considerations in this model.  Traffic being =
forwarded should be</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   filtered, and the issues raised in Appendix A.1.2 =
take on a new level</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   of meaning - but this time at the utility mainframe. =
 Unauthorized</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   access is likely similar to other =
financially-motivated attacks that</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   happen in the Internet, but presumably would be =
coming from devices</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   in the HAN that have been co-opted in some way.  One =
really wants the</span></td><td class=3D"lineno" valign=3D"top"></td></tr>=

      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   appliances to only obey commands under strict =
authentication/</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   authorization controls.</span></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert"></span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   In addition to the QoS issues raised in Appendix =
A.2, there is the</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   possibility of queuing issues in the collector.  In =
such a case, the</span></td><td class=3D"lineno" valign=3D"top"></td></tr>=

      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   IP datagrams should probably use the Low-Latency =
Data Service Class</span></td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   described in [RFC4594], and let other traffic use =
the Standard</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">   Service Class or other service =
classes.</span></td><td class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"lblock"></td><td> </td><td class=3D"rblock">                    =
                                                     </td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left">Authors' Addresses</td><td> </td><td =
class=3D"right">Authors' Addresses</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
Fred Baker</td><td> </td><td class=3D"right">   Fred Baker</td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
Cisco Systems</td><td> </td><td class=3D"right">   Cisco Systems</td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
Santa Barbara, California  93117</td><td> </td><td class=3D"right">   =
Santa Barbara, California  93117</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
USA</td><td> </td><td class=3D"right">   USA</td><td class=3D"lineno" =
valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
Email: <a href=3D"mailto:fred@cisco.com">fred@cisco.com</a></td><td> =
</td><td class=3D"right">   Email: <a =
href=3D"mailto:fred@cisco.com">fred@cisco.com</a></td><td class=3D"lineno"=
 valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td =
class=3D"left"></td><td> </td><td class=3D"right"></td><td =
class=3D"lineno" valign=3D"top"></td></tr>
      <tr><td class=3D"lineno" valign=3D"top"></td><td class=3D"left">   =
David Meyer</td><td> </td><td class=3D"right">   David Meyer</td><td =
class=3D"lineno" valign=3D"top"></td></tr>

     <tr><td></td><td class=3D"left"></td><td> </td><td =
class=3D"right"></td><td></td></tr>
     <tr bgcolor=3D"gray"><th colspan=3D"5" align=3D"center"><a =
name=3D"end">&nbsp;End of changes. 60 change blocks.&nbsp;</a></th></tr>
     <tr class=3D"stats"><td></td><th><i>149 lines changed or =
deleted</i></th><th><i> </i></th><th><i>758 lines changed or =
added</i></th><td></td></tr>
     <tr><td colspan=3D"5" align=3D"center" class=3D"small"><br>This =
html diff was produced by rfcdiff 1.40. The latest version is available =
from <a =
href=3D"http://www.tools.ietf.org/tools/rfcdiff/">http://tools.ietf.org/to=
ols/rfcdiff/</a> </td></tr>
   </tbody></table>
  =20
  =20
<style =
type=3D"text/css">#AdContainer,#RadAd_Skyscraper,#ad-frame,#bbccom_leaderb=
oard,#center_banner,#footer_adcode,#hbBHeaderSpon,#hiddenHeaderSpon,#navba=
r_adcode,#rightAds,#rightcolumn_adcode,#top-advertising,#topMPU,#tracker_a=
dvertorial,.ad-now,.dfpad,.prWrap,[id^=3D"ad_block"],[id^=3D"adbrite"],[id=
^=3D"dclkAds"],[id^=3D"ew"][id$=3D"_bannerDiv"],[id^=3D"konaLayer"],[src*=3D=
"<a href=3D"http://sixsigmatraffic.com">sixsigmatraffic.com</a>"],a.kLink =
span[id^=3D"preLoadWrap"].preLoadWrap,a[href^=3D"http://ad."][href*=3D".do=
ubleclick.net/"],a[href^=3D"<a =
href=3D"http://adserver.adpredictive.com">http://adserver.adpredictive.com=
</a>"],div#FFN_Banner_Holder,div#FFN_imBox_Container,div#adxLeaderboard,di=
v#p360-format-box,div#rm_container,div#tooltipbox[class^=3D"itxt"],div.wnD=
VUtilityBlock,div[class^=3D"dms_ad_IDS"],div[id^=3D"adKontekst_"],div[id^=3D=
"google_ads_div"],div[id^=3D"kona_"][id$=3D"_wrapper"],div[id^=3D"sponsora=
ds"],div[id^=3D"y5_direct"],embed[flashvars*=3D"AdID"],iframe.chitikaAdBlo=
ck,iframe[id^=3D"dapIfM"],iframe[id^=3D"etarget"][id$=3D"banner"],iframe[n=
ame^=3D"AdBrite"],iframe[name^=3D"google_ads_"],iframe[src*=3D"<a =
href=3D"http://clicksor.com">clicksor.com</a>"],img[src*=3D"<a =
href=3D"http://clicksor.com">clicksor.com</a>"],img[src^=3D"<a =
href=3D"http://cdn.adnxs.com">http://cdn.adnxs.com</a>"],ispan#ab_pointer,=
object#flashad,object#ve_threesixty_swf[name=3D"ve_threesixty_swf"],div#di=
r_ads_site,div#rhs div#rhs_block table#mbEnd,div#tads =
table[align=3D"center"][width=3D"100%"],table[cellpadding=3D"0"][width=3D"=
100%"][style] > * > * > * > =
div#tpa1,#A9AdsMiddleBoxTop,#A9AdsOutOfStockWidgetTop,#A9AdsServicesWidget=
Top,#ADSLOT_1,#ADSLOT_2,#ADSLOT_3,#ADSLOT_4,#AD_CONTROL_22,#ADsmallWrapper=
,#Ad1,#Ad160x600,#Ad2,#Ad300x250,#Ad3Left,#Ad3Right,#Ad3TextAd,#AdBanner_F=
1,#AdBar,#AdBar1,#AdContainerTop,#AdContentModule_F,#AdDetails_GoogleLinks=
Bottom,#AdDetails_InsureWith,#AdFrame4,#AdHeader,#AdMiddle,#AdMobileLink,#=
AdRectangle,#AdSenseDiv,#AdServer,#AdShowcase_F1,#AdSky23,#AdSkyscraper,#A=
dSponsor_SF,#AdSubsectionShowcase_F1,#AdTargetControl1_iframe,#AdText,#AdT=
op,#Ad_Block,#Ad_Center1,#Ad_Right1,#Ad_Top,#Adbanner,#Adrectangle,#Ads,#A=
dsContent,#AdsRight,#AdsWrap,#Ads_BA_CAD,#Ads_BA_CAD2,#Ads_BA_CAD_box,#Ads=
_BA_SKY,#AdvertMPU23b,#AdvertPanel,#AdvertiseFrame,#Advertisement,#Adverti=
sements,#Advertorial,#Advertorials,#BannerAdvert,#BigBoxAd,#BodyAd,#Button=
Ad,#CompanyDetailsNarrowGoogleAdsPresentationControl,#CompanyDetailsWideGo=
ogleAdsPresentationControl,#ContentAd,#ContentAd1,#ContentAd2,#ContentAdPl=
aceHolder1,#ContentAdPlaceHolder2,#ContentAdXXL,#ContentPolepositionAds_Re=
sult,#DivAdEggHeadCafeTopBanner,#FooterAd,#FooterAdContainer,#GoogleAd1,#G=
oogleAd2,#GoogleAd3,#GoogleAdsPresentationControl,#GoogleAdsense,#Google_A=
dsense_Main,#HEADERAD,#HOME_TOP_RIGHT_BOXAD,#HeaderAdsBlock,#HeaderAdsBloc=
kFront,#HeaderBannerAdSpacer,#HeaderTextAd,#HeroAd,#HomeAd1,#HouseAd,#ID_A=
d_Sky,#Journal_Ad_125,#Journal_Ad_300,#KH-contentAd,#LeftAd,#LeftAdF1,#Lef=
tAdF2,#LftAd,#LoungeAdsDiv,#LowerContentAd,#MainSponsoredLinks,#Nightly_ad=
Container,#PREFOOTER_LEFT_BOXAD,#PREFOOTER_RIGHT_BOXAD,#PageLeaderAd,#Rele=
vantAds,#RgtAd1,#RightAd,#RightSponsoredAd,#SectionAd300-250,#SectionSpons=
orAd,#SidebarAdContainer,#SkyAd,#SpecialAds,#SponsoredAd,#SponsoredLinks,#=
TOP_ADROW,#TOP_RIGHT_BOXAD,#Tadspacehead,#TopAd,#TopAdContainer,#TopAdDiv,=
#TopAdPos,#VM-MPU-adspace,#VM-footer-adspace,#VM-header-adspace,#VM-header=
-adwrap,#XEadLeaderboard,#XEadSkyscraper,#_ads,#about_adsbottom,#ad-120x60=
0-sidebar,#ad-120x60Div,#ad-160x600,#ad-160x600-sidebar,#ad-250x300,#ad-30=
0,#ad-300x250,#ad-300x250-sidebar,#ad-300x250Div,#ad-728,#ad-728x90-leader=
board-top,#ad-article,#ad-banner,#ad-bottom,#ad-bottom-wrapper,#ad-boxes,#=
ad-bs,#ad-buttons,#ad-colB-1,#ad-column,#ad-container,#ad-content,#ad-cont=
entad,#ad-footer,#ad-footprint-160x600,#ad-front-footer,#ad-front-sponsore=
dlinks,#ad-halfpage,#ad-header,#ad-inner,#ad-label,#ad-leaderboard,#ad-lea=
derboard-bottom,#ad-leaderboard-container,#ad-leaderboard-spot,#ad-leaderb=
oard-top,#ad-left,#ad-list-row,#ad-lrec,#ad-medium-rectangle,#ad-medrec,#a=
d-middlethree,#ad-middletwo,#ad-module,#ad-mpu,#ad-mpu1-spot,#ad-mpu2,#ad-=
mpu2-spot,#ad-north,#ad-one,#ad-placard,#ad-placeholder,#ad-rectangle,#ad-=
right,#ad-righttop,#ad-row,#ad-side-text,#ad-sky,#ad-skyscraper,#ad-slug-w=
rapper,#ad-small-banner,#ad-space,#ad-splash,#ad-spot,#ad-target,#ad-targe=
t-Leaderbord,#ad-teaser,#ad-text,#ad-top,#ad-top-banner,#ad-top-text-low,#=
ad-tower,#ad-trailerboard-spot,#ad-typ1,#ad-west,#ad-wrap,#ad-wrap-right,#=
ad-wrapper,#ad-wrapper1,#ad-yahoo-simple,#ad1,#ad1006,#ad125BL,#ad125BR,#a=
d125TL,#ad125TR,#ad125x125,#ad160x600,#ad160x600right,#ad1Sp,#ad2,#ad2Sp,#=
ad3,#ad300,#ad300-250,#ad300X250,#ad300_x_250,#ad300x150,#ad300x250,#ad300=
x250Module,#ad300x60,#ad300x600,#ad300x600_callout,#ad336,#ad336x280,#ad37=
5x85,#ad4,#ad468,#ad468x60,#ad468x60_top,#ad526x250,#ad600,#ad7,#ad728,#ad=
728Mid,#ad728Top,#ad728Wrapper,#ad728x90,#adBadges,#adBanner,#adBanner120x=
600,#adBanner160x600,#adBanner336x280,#adBannerTable,#adBannerTop,#adBar,#=
adBlock125,#adBlocks,#adBox,#adBox350,#adBox390,#adComponentWrapper,#adCon=
tainer,#adContainer_1,#adContainer_2,#adContainer_3,#adDiv,#adFps,#adFtofr=
s,#adGallery,#adGroup1,#adHeader,#adIsland,#adL,#adLB,#adLabel,#adLayer,#a=
dLeaderTop,#adLeaderboard,#adMPU,#adMiddle0Frontpage,#adMiniPremiere,#adP,=
#adPlaceHolderRight,#adPlacer,#adRight,#adSenseModule,#adSenseWrapper,#adS=
erver_marginal,#adSidebar,#adSidebarSq,#adSky,#adSkyscraper,#adSlider,#adS=
pace,#adSpace3,#adSpace300_ifrMain,#adSpace4,#adSpace5,#adSpace6,#adSpace7=
,#adSpace_footer,#adSpace_right,#adSpace_top,#adSpacer,#adSpecial,#adSpot-=
Leader,#adSpot-banner,#adSpot-island,#adSpot-mrec1,#adSpot-sponsoredlinks,=
#adSpot-textbox1,#adSpot-widestrip,#adSpotAdvertorial,#adSpotIsland,#adSpo=
tSponsoredLinks,#adSquare,#adStaticA,#adStrip,#adSuperAd,#adSuperPremiere,=
#adSuperbanner,#adTableCell,#adTag1,#adTag2,#adText,#adText_container,#adT=
ile,#adTop,#adTopboxright,#adTower,#adUnit,#adWrapper,#adZoneTop,#ad_160x1=
60,#ad_160x600,#ad_190x90,#ad_300,#ad_300_250,#ad_300_250_1,#ad_300x250,#a=
d_300x90,#ad_468_60,#ad_5,#ad_728_foot,#ad_728x90,#ad_940,#ad_984,#ad_A,#a=
d_B,#ad_Banner,#ad_C,#ad_C2,#ad_D,#ad_E,#ad_F,#ad_G,#ad_H,#ad_I,#ad_J,#ad_=
K,#ad_L,#ad_M,#ad_N,#ad_O,#ad_P,#ad_YieldManager-300x250,#ad_anchor,#ad_ar=
ea,#ad_banner,#ad_banner_top,#ad_bar,#ad_bellow_post,#ad_block_1,#ad_block=
_2,#ad_bottom,#ad_box_colspan,#ad_branding,#ad_bs_area,#ad_center_monster,=
#ad_cont,#ad_container,#ad_container_marginal,#ad_container_side,#ad_conta=
iner_top,#ad_content_top,#ad_content_wrap,#ad_feature,#ad_firstpost,#ad_fo=
oter,#ad_front_three,#ad_fullbanner,#ad_global_below_navbar,#ad_global_hea=
der,#ad_haha_1,#ad_haha_4,#ad_halfpage,#ad_head,#ad_header,#ad_horizontal,=
#ad_horseshoe_left,#ad_horseshoe_right,#ad_horseshoe_spacer,#ad_horseshoe_=
top,#ad_hotpots,#ad_in_arti,#ad_island,#ad_label,#ad_lastpost,#ad_layer2,#=
ad_leader,#ad_leaderBoard,#ad_leaderboard,#ad_leaderboard_top,#ad_left,#ad=
_lrec,#ad_lwr_square,#ad_main,#ad_medium_rectangle,#ad_medium_rectangular,=
#ad_mediumrectangle,#ad_menu_header,#ad_middle,#ad_most_pop_234x60_req_wra=
pper,#ad_mpu,#ad_mpuav,#ad_mrcontent,#ad_overlay,#ad_play_300,#ad_rect,#ad=
_rect_body,#ad_rect_bottom,#ad_rectangle,#ad_rectangle_medium,#ad_related_=
links_div,#ad_related_links_div_program,#ad_replace_div_0,#ad_replace_div_=
1,#ad_report_leaderboard,#ad_report_rectangle,#ad_right,#ad_right_main,#ad=
_ros_tower,#ad_rr_1,#ad_sec,#ad_sec_div,#ad_sidebar,#ad_sidebar1,#ad_sideb=
ar2,#ad_sidebar3,#ad_skyscraper,#ad_skyscraper_text,#ad_slot_leaderboard,#=
ad_slot_livesky,#ad_slot_sky_top,#ad_space,#ad_square,#ad_ss,#ad_table,#ad=
_term_bottom_place,#ad_thread_first_post_content,#ad_top,#ad_top_holder,#a=
d_tp_banner_1,#ad_tp_banner_2,#ad_unit,#ad_vertical,#ad_widget,#ad_window,=
#ad_wrapper,#adbanner,#adbig,#adbnr,#adboard,#adbody,#adbottom,#adbox,#adb=
ox1,#adbox2,#adclear,#adcode,#adcode1,#adcode2,#adcode3,#adcode4,#adcolumn=
wrapper,#adcontainer,#adcontainerRight,#adcontainsm,#adcontent,#adcontrolP=
ushSite,#add_ciao2,#addbottomleft,#addiv-bottom,#addiv-top,#adfooter_728x9=
0,#adframe:not(frameset),#adhead,#adhead_g,#adheader,#adhome,#adiframe1_if=
rame,#adiframe2_iframe,#adiframe3_iframe,#adimg,#adition_content_ad,#adlab=
el,#adlabelFooter,#adlayerad,#adleaderboard,#adleft,#adlinks,#adlinkws,#ad=
lrec,#admid,#admiddle3center,#admiddle3left,#adposition,#adposition-C,#adp=
osition-FPMM,#adposition2,#adposition3,#adposition4,#adrectangle,#adrectan=
glea,#adrectangleb,#adrig,#adright,#adright2,#adrighthome,#ads,#ads-468,#a=
ds-area,#ads-block,#ads-bot,#ads-bottom,#ads-col,#ads-dell,#ads-horizontal=
,#ads-indextext,#ads-leaderboard1,#ads-lrec,#ads-menu,#ads-middle,#ads-pri=
ces,#ads-rhs,#ads-right,#ads-top,#ads-vers7,#ads160left,#ads2,#ads300,#ads=
300Bottom,#ads300Top,#ads336x280,#ads7,#ads728bottom,#ads728top,#ads790,#a=
dsDisplay,#adsID,#ads_160,#ads_300,#ads_728,#ads_banner,#ads_belowforumlis=
t,#ads_belownav,#ads_bottom_inner,#ads_bottom_outer,#ads_box,#ads_button,#=
ads_catDiv,#ads_footer,#ads_html1,#ads_html2,#ads_right,#ads_right_sidebar=
,#ads_sidebar_roadblock,#ads_top,#ads_watch_top_square,#ads_zone27,#adsbot=
tom,#adsbox,#adscolumn,#adsd_contentad_r1,#adsd_contentad_r2,#adsd_content=
ad_r3,#adsense,#adsense-tag,#adsense-text,#adsenseOne,#adsenseWrap,#adsens=
e_inline,#adsense_leaderboard,#adsense_overlay,#adsense_placeholder_2,#ads=
enseheader,#adsensetopplay,#adsensewidget-3,#adserv,#adsky,#adskyscraper,#=
adslot,#adsonar,#adspace,#adspace-300x250,#adspace300x250,#adspaceBox,#ads=
paceBox300,#adspace_header,#adspot-1,#adspot-149x170,#adspot-1x4,#adspot-2=
,#adspot-295x60,#adspot-2a,#adspot-2b,#adspot-300x250-pos-1,#adspot-300x25=
0-pos-2,#adspot-468x60-pos-2,#adspot-a,#adspot300x250,#adsright,#adstop,#a=
dt,#adtab,#adtag_right_side,#adtech_googleslot_03c,#adtech_takeover,#adtop=
,#adtxt,#adv-masthead,#adv_google_300,#adv_google_728,#adv_top_banner_wrap=
per,#adver1,#adver2,#adver3,#adver4,#adver5,#adver6,#adver7,#advert,#adver=
t-1,#advert-120,#advert-boomer,#advert-display,#advert-header,#advert-lead=
erboard,#advert-links-bottom,#advert-skyscraper,#advert-top,#advert1,#adve=
rtBanner,#advertRight,#advert_250x250,#advert_box,#advert_leaderboard,#adv=
ert_lrec_format,#advert_mid,#advert_mpu,#advert_right_skyscraper,#advertbo=
x,#advertbox2,#advertbox3,#advertbox4,#adverthome,#advertise,#advertise-no=
w,#advertise1,#advertiseHere,#advertisement,#advertisement160x600,#adverti=
sement728x90,#advertisementLigatus,#advertisementPrio2,#advertiser-contain=
er,#advertiserLinks,#advertising,#advertising-banner,#advertising-caption,=
#advertising-container,#advertising-control,#advertising-skyscraper,#adver=
tisingModule160x600,#advertisingModule728x90,#advertisment,#advertismentEl=
ementInUniversalbox,#advertorial,#adverts,#adverts-top-container,#adverts-=
top-left,#adverts-top-middle,#adverts-top-right,#advertsingle,#advt,#adwhi=
tepaperwidget,#adwin_rec,#adwith,#adwords-4-container,#adwrapper,#adxBigAd=
,#adxMiddle5,#adxSponLink,#adxSponLinkA,#adxtop,#adzbanner,#adzerk,#adzone=
BANNER,#affinityBannerAd,#agi-ad300x250,#agi-ad300x250overlay,#agi-sponsor=
ed,#alert_ads,#anchorAd,#annoying_ad,#ap_adframe,#apiBackgroundAd,#apiTopA=
dWrap,#apmNADiv,#araHealthSponsorAd,#article-ad-container,#article-box-ad,=
#articleAdReplacement,#articleLeftAdColumn,#articleSideAd,#article_ad,#art=
icle_box_ad,#asinglead,#atlasAdDivGame,#awds-nt1-ad,#banner-300x250,#banne=
r-ad,#banner-ad-container,#banner-ads,#banner250x250,#banner468x60,#banner=
728x90,#bannerAd,#bannerAdTop,#bannerAd_ctr,#banner_ad,#banner_ad_footer,#=
banner_admicro,#banner_ads,#banner_content_ad,#banner_topad,#bannerad,#ban=
nerad2,#bbccom_mpu,#bbccom_storyprintsponsorship,#bbo_ad1,#bg-footer-ads,#=
bg-footer-ads2,#bg_YieldManager-300x250,#bigAd,#bigBoxAd,#bigad300outer,#b=
igadbox,#bigadspot,#billboard_ad,#block-ad_cube-1,#block-openads-1,#block-=
openads-3,#block-openads-4,#block-openads-5,#block-thewrap_ads_250x300-0,#=
block_advert,#blog-ad,#blog_ad_content,#blog_ad_opa,#blox-big-ad,#blox-big=
-ad-bottom,#blox-big-ad-top,#blox-halfpage-ad,#blox-tile-ad,#blox-tower-ad=
,#book-ad,#botad,#bott_ad2,#bott_ad2_300,#bottom-ad,#bottom-ad-container,#=
bottom-ads,#bottomAd,#bottomAdCCBucket,#bottomAdContainer,#bottomAdSense,#=
bottomAdSenseDiv,#bottomAds,#bottomRightAd,#bottomRightAdSpace,#bottom_ad,=
#bottom_ad_area,#bottom_ads,#bottom_banner_ad,#bottom_overture,#bottom_spo=
nsor_ads,#bottom_sponsored_links,#bottom_text_ad,#bottomad,#bottomads,#bot=
tomadsense,#bottomadwrapper,#bottomleaderboardad,#box-content-ad,#box-goog=
leadsense-1,#box-googleadsense-r,#box1ad,#boxAd300,#boxAdContainer,#box_ad=
,#box_mod_googleadsense,#boxad1,#boxad2,#boxad3,#boxad4,#boxad5,#bpAd,#bps=
-header-ad-container,#btr_horiz_ad,#burn_header_ad,#button-ads-horizontal,=
#button-ads-vertical,#buttonAds,#buttonAdsContainer,#button_ad_container,#=
button_ad_wrap,#buttonad,#buy-sell-ads,#c4ad-Middle1,#caAdLarger,#catad,#c=
ellAd,#channel_ad,#channel_ads,#ciHomeRHSAdslot,#circ_ad,#cnnRR336ad,#cnnT=
opAd,#colRightAd,#collapseobj_adsection,#column4-google-ads,#commercial_ad=
s,#common_right_ad_wrapper,#common_right_lower_ad_wrapper,#common_right_lo=
wer_adspace,#common_right_lower_player_ad_wrapper,#common_right_lower_play=
er_adspace,#common_right_player_ad_wrapper,#common_right_player_adspace,#c=
ommon_right_right_adspace,#common_top_adspace,#companion-ad,#companionAdDi=
v,#containerLocalAds,#containerLocalAdsInner,#containerMrecAd,#content-ad-=
header,#content-header-ad,#contentAd,#contentTopAds2,#content_ad,#content_=
ad_square,#content_ad_top,#content_ads_content,#content_box_300body_sponso=
redoffers,#content_box_adright300_google,#content_mpu,#contentad,#contenta=
d_imtext,#contentad_right,#contentads,#contentinlineAd,#contextad,#context=
ual-ads,#contextual-ads-block,#contextualad,#coverads,#ctl00_Adspace_Top_H=
eight,#ctl00_BottomAd,#ctl00_ContentRightColumn_RightColumn_Ad1_BanManAd,#=
ctl00_ContentRightColumn_RightColumn_PremiumAd1_ucBanMan_BanManAd,#ctl00_L=
HTowerAd,#ctl00_LeftHandAd,#ctl00_MasterHolder_IBanner_adHolder,#ctl00_Top=
Ad,#ctl00_TowerAd,#ctl00_VBanner_adHolder,#ctl00_abot_bb,#ctl00_adFooter,#=
ctl00_atop_bt,#ctl00_cphMain_hlAd1,#ctl00_cphMain_hlAd2,#ctl00_cphMain_hlA=
d3,#ctl00_ctl00_MainPlaceHolder_itvAdSkyscraper,#ctl00_ctl00_ctl00_Main_Ma=
in_PlaceHolderGoogleTopBanner_MPTopBannerAd,#ctl00_ctl00_ctl00_Main_Main_S=
ideBar_MPSideAd,#ctl00_ctl00_ctl00_tableAdsTop,#ctl00_dlTilesAds,#ctl00_m_=
skinTracker_m_adLBL,#ctl00_phCrackerMain_ucAffiliateAdvertDisplayMiddle_pn=
lAffiliateAdvert,#ctl00_phCrackerMain_ucAffiliateAdvertDisplayRight_pnlAff=
iliateAdvert,#ctrlsponsored,#cubeAd,#cube_ads,#cube_ads_inner,#cubead,#cub=
ead-2,#dItemBox_ads,#dart_160x600,#dc-display-right-ad-1,#dcol-sponsored,#=
defer-adright,#detail_page_vid_topads,#divAd,#divAdBox,#divMenuAds,#divWNA=
dHeader,#divWrapper_Ad,#div_video_ads,#dlads,#dni-header-ad,#dnn_ad_banner=
,#download_ads,#ds-mpu,#editorsmpu,#evotopTen_advert,#ex-ligatus,#exads,#f=
eaturead,#featured-advertisements,#featuredAdContainer2,#featuredAds,#feed=
_links_ad_container,#first-300-ad,#first-adlayer,#first_ad_unit,#firstad,#=
fl_hdrAd,#flexiad,#footer-ad,#footer-advert,#footer-adverts,#footer-sponso=
red,#footerAd,#footerAdDiv,#footerAds,#footerAdvertisement,#footerAdverts,=
#footer_ad,#footer_ad_01,#footer_ad_block,#footer_ad_container,#footer_ads=
,#footer_adspace,#footer_text_ad,#footerad,#fr_ad_center,#frame_admain,#fr=
nAdSky,#frnBannerAd,#frnContentAd,#from_our_sponsors,#front_advert,#front_=
mpu,#ft-ad,#ft-ad-1,#ft-ad-container,#ft_mpu,#fusionad,#fw-advertisement,#=
g_ad,#g_adsense,#ga_300x250,#gad,#galleries-tower-ad,#gallery-ad-m0,#galle=
ry_ads,#game-info-ad,#gasense,#global_header_ad_area,#gmi-ResourcePageAd,#=
gmi-ResourcePageLowerAd,#goads,#google-ad,#google-ad-art,#google-ad-table-=
right,#google-ad-tower,#google-ads,#google-ads-bottom,#google-ads-header,#=
google-ads-left-side,#google-adsense-mpusize,#googleAd,#googleAds,#googleA=
dsSml,#googleAdsense,#googleAdsenseBanner,#googleAdsenseBannerBlog,#google=
AdwordsModule,#googleAfcContainer,#googleSearchAds,#googleShoppingAdsRight=
,#googleShoppingAdsTop,#googleSubAds,#google_ad,#google_ad_container,#goog=
le_ad_inline,#google_ad_test,#google_ads,#google_ads_frame1,#google_ads_fr=
ame1_anchor,#google_ads_test,#google_ads_top,#google_adsense_home_468x60_1=
,#googlead,#googleadbox,#googleads,#googleadsense,#googlesponsor,#grid_ad,=
#gsyadrectangleload,#gsyadrightload,#gsyadtop,#gsyadtopload,#gtopadvts,#ha=
lf-page-ad,#halfPageAd,#halfe-page-ad-box,#hdtv_ad_ss,#head-ad,#headAd,#he=
ad_advert,#headad,#header-ad,#header-ad-rectangle-container,#header-ads,#h=
eader-adspace,#header-advert,#header-advertisement,#header-advertising,#he=
aderAd,#headerAdBackground,#headerAdContainer,#headerAdWrap,#headerAds,#he=
aderAdsWrapper,#headerTopAd,#header_ad,#header_ad_728_90,#header_ad_contai=
ner,#header_adcode,#header_ads,#header_advertisement_top,#header_leaderboa=
rd_ad_container,#header_publicidad,#headerad,#headeradbox,#headerads,#head=
eradwrap,#headline_ad,#hiddenadAC,#hideads,#hl-sponsored-results,#homeTopR=
ightAd,#home_ad,#home_bottom_ad,#home_contentad,#home_mpu,#home_spensoredl=
inks,#homepage-ad,#homepageAdsTop,#homepage_right_ad,#homepage_right_ad_co=
ntainer,#homepage_top_ads,#hometop_234x60ad,#hor_ad,#horizontal-banner-ad,=
#horizontal_ad,#horizontal_ad_top,#horizontalads,#houseAd,#hp-header-ad,#h=
p-right-ad,#hp-store-ad,#hpV2_300x250Ad,#hpV2_googAds,#icePage_SearchLinks=
_AdRightDiv,#icePage_SearchLinks_DownloadToolbarAdRightDiv,#in_serp_ad,#in=
adspace,#indexad,#inlinead,#inlinegoogleads,#inlist-ad-block,#inner-advert=
-row,#insider_ad_wrapper,#instoryad,#int-ad,#interstitial_ad_wrapper,#isla=
ndAd,#j_ad,#ji_medShowAdBox,#jmp-ad-buttons,#joead,#joead2,#ka_adRightSkys=
craperWide,#landing-adserver,#largead,#lateAd,#layerTLDADSERV,#lb-sponsor-=
left,#lb-sponsor-right,#leader-board-ad,#leader-sponsor,#leaderAdContainer=
,#leader_board_ad,#leaderad,#leaderad_section,#leaderboard-ad,#leaderboard=
-bottom-ad,#leaderboard_ad,#left-ad-skin,#left-lower-adverts,#left-lower-a=
dverts-container,#leftAdContainer,#leftAd_rdr,#leftAdvert,#leftSectionAd30=
0-100,#left_ad,#left_adspace,#leftad,#leftads,#lg-banner-ad,#ligatus,#link=
Ads,#linkads,#live-ad,#longAdSpace,#lowerAdvertisementImg,#lowerads,#lower=
thirdad,#lowertop-adverts,#lowertop-adverts-container,#lrecad,#mBannerAd,#=
main-ad,#main-ad160x600,#main-ad160x600-img,#main-ad728x90,#main-bottom-ad=
,#mainAd,#mainAdUnit,#mainAdvert,#main_ad,#main_rec_ad,#main_top_ad_contai=
ner,#marketing-promo,#mastAdvert,#mastad,#mastercardAd,#masthead_ad,#masth=
ead_topad,#medRecAd,#media_ad,#mediumAdvertisement,#medrectad,#menuAds,#mi=
_story_assets_ad,#mid-ad300x250,#mid-table-ad,#midRightTextAds,#mid_ad_div=
,#mid_ad_title,#mid_mpu,#midadd,#midadspace,#middle-ad,#middlead,#middlead=
s,#midrect_ad,#midstrip_ad,#mini-ad,#module-google_ads,#module_ad,#module_=
box_ad,#module_sky_scraper,#monsterAd,#moogleAd,#most_popular_ad,#mpu,#mpu=
-advert,#mpuAd,#mpuDiv,#mpuSlot,#mpuWrapper,#mpuWrapperAd,#mpu_banner,#mpu=
_holder,#mpu_text_ad,#mpuad,#mrecAdContainer,#ms_ad,#msad,#multiLinkAdCont=
ainer,#myads_HeaderButton,#n_sponsor_ads,#namecom_ad_hosting_main,#narrow_=
ad_unit,#natadad300x250,#national_microlink_ads,#nationalad,#navi_banner_a=
d_780,#nba300Ad,#nbaMidAds,#nbaVid300Ad,#new_topad,#ng_rtcol_ad,#noresults=
ads,#northad,#oanda_ads,#onespot-ads,#online_ad,#p-googleadsense,#page-hea=
der-ad,#pageAds,#pageAdsDiv,#page_content_top_ad,#pagelet_adbox,#panelAd,#=
pb_report_ad,#pcworldAdBottom,#pcworldAdTop,#pinball_ad,#player-below-adve=
rt,#player_ad,#player_ads,#pod-ad-video-page,#populate_ad_bottom,#populate=
_ad_left,#portlet-advertisement-left,#portlet-advertisement-right,#post-pr=
omo-ad,#post5_adbox,#post_ad,#priceGrabberAd,#print_ads,#printads,#product=
-adsense,#promo-ad,#promoAds,#ps-vertical-ads,#pub468x60,#publicidad,#push=
down_ad,#qm-ad-big-box,#qm-ad-sky,#qm-dvdad,#r1SoftAd,#rail_ad1,#rail_ad2,=
#realEstateAds,#rectAd,#rect_ad,#rectangle-ad,#rectangle_ad,#refine-300-ad=
,#region-top-ad,#rh-ad-container,#rh_tower_ad,#rhs_ads,#rhsadvert,#right-a=
d,#right-ad-skin,#right-ad-title,#right-ads-3,#right-box-ad,#right-feature=
d-ad,#right-mpu-1-ad-container,#right-uppder-adverts,#right-uppder-adverts=
-container,#rightAd,#rightAd300x250,#rightAdColumn,#rightAd_rdr,#rightColA=
d,#rightColumnMpuAd,#rightColumnSkyAd,#right_ad,#right_ad_wrapper,#right_a=
ds,#right_advertisement,#right_advertising,#right_column_ads,#rightad,#rig=
htadContainer,#rightadvertbar-doubleclickads,#rightbar-ad,#rightside-ads,#=
rightside_ad,#righttop-adverts,#righttop-adverts-container,#rm_ad_text,#ro=
s_ad,#rotatingads,#row2AdContainer,#rt-ad,#rt-ad-top,#rt-ad468,#rtMod_ad,#=
rtmod_ad,#sAdsBox,#sb-ad-sq,#sb_advert,#sb_sponsors,#search-google-ads,#se=
archAdSenseBox,#searchAdSenseBoxAd,#searchAdSkyscraperBox,#search_ads,#sea=
rch_result_ad,#second-adlayer,#secondBoxAdContainer,#section-container-ddc=
_ads,#section-sponsors,#section_advertorial_feature,#servfail-ads,#sew-ad1=
,#shoppingads,#show-ad,#showAd,#showad,#side-ad,#side-ad-container,#sideAd=
,#sideAdSub,#sideBarAd,#side_ad,#side_ad_wrapper,#side_ads_by_google,#side=
_sky_ad,#sidead,#sideads,#sidebar-125x125-ads,#sidebar-125x125-ads-below-i=
ndex,#sidebar-ad,#sidebar-ad-boxes,#sidebar-ad-space,#sidebar-ad-wrap,#sid=
ebar-ad3,#sidebar-ads,#sidebar2ads,#sidebar_ad_widget,#sidebar_ads,#sideba=
r_ads_180,#sidebar_sponsoredresult_body,#sidebarad,#sideline-ad,#single-mp=
u,#singlead,#site-leaderboard-ads,#site_top_ad,#sitead,#sky-ad,#skyAd,#sky=
AdContainer,#skyScrapperAd,#sky_ad,#sky_advert,#skyads,#skyscraper-ad,#sky=
scraperAd,#skyscraperAdContainer,#skyscraper_ad,#skyscraper_advert,#skyscr=
aperad,#sliderAdHolder,#slideshow_ad_300x250,#sm-banner-ad,#small_ad,#smal=
lerAd,#specials_ads,#speeds_ads,#speeds_ads_fstitem,#speedtest_mrec_ad,#sp=
hereAd,#splinks,#sponLinkDiv_1,#sponlink,#sponsAds,#sponsLinks,#spons_left=
,#sponseredlinks,#sponsor-search,#sponsorAd1,#sponsorAd2,#sponsorAdDiv,#sp=
onsorLinks,#sponsorTextLink,#sponsor_banderole,#sponsor_box,#sponsor_deals=
,#sponsor_panSponsor,#sponsor_recommendations,#sponsorbar,#sponsorbox,#spo=
nsored,#sponsored-ads,#sponsored-features,#sponsored-links,#sponsored-reso=
urces,#sponsored1,#sponsoredBox1,#sponsoredBox2,#sponsoredLinks,#sponsored=
List,#sponsoredResults,#sponsoredSiteMainline,#sponsoredSiteSidebar,#spons=
ored_ads_v4,#sponsored_content,#sponsored_game_row_listing,#sponsored_link=
s,#sponsored_v12,#sponsoredlinks,#sponsoredlinks_cntr,#sponsoredresults_to=
p,#sponsoredwellcontainerbottom,#sponsoredwellcontainertop,#sponsorlink,#s=
ponsors,#sponsorshipBadge,#spotlightAds,#spotlightad,#sqAd,#square-sponsor=
s,#squareAd,#squareAdSpace,#squareAds,#square_ad,#start_middle_container_a=
dvertisment,#sticky-ad,#stickyBottomAd,#story-ad-a,#story-ad-b,#story-lead=
erboard-ad,#story-sponsoredlinks,#storyAd,#storyAdWrap,#storyad2,#subpage-=
ad-right,#subpage-ad-top,#swads,#synch-ad,#systemad_background,#tabAdverti=
sing,#takeoverad,#tblAd,#tbl_googlead,#tcwAd,#template_ad_leaderboard,#ter=
tiary_advertising,#text-ad,#text-ads,#textAd,#textAds,#text_ad,#text_ads,#=
text_advert,#textad,#textad3,#the-last-ad-standing,#thefooterad,#themis-ad=
s,#tile-ad,#tmglBannerAd,#top-ad,#top-ad-container,#top-ad-menu,#top-ads,#=
top-ads-tabs,#top-advertisement,#top-banner-ad,#top-search-ad-wrapper,#top=
Ad,#topAd728x90,#topAdBanner,#topAdContainer,#topAdSenseDiv,#topAdcontaine=
r,#topAds,#topAdsContainer,#topAdvert,#topBannerAd,#topNavLeaderboardAdHol=
der,#topRightBlockAdSense,#top_ad,#top_ad_area,#top_ad_game,#top_ad_wrappe=
r,#top_ads,#top_advertise,#top_advertising,#top_right_ad,#top_wide_ad,#top=
ad,#topad_left,#topad_right,#topadblock,#topaddwide,#topads,#topadsense,#t=
opadspace,#topadzone,#topcustomad,#topleaderboardad,#toprightAdvert,#topri=
ghtad,#topsponsored,#toptextad,#towerad,#ttp_ad_slot1,#ttp_ad_slot2,#twoga=
mesAd,#txt_link_ads,#undergameAd,#upperAdvertisementImg,#upperMpu,#upperad=
,#urban_contentad_1,#urban_contentad_2,#urban_contentad_article,#v_ad,#ver=
t_ad,#vert_ad_placeholder,#vertical_ad,#vertical_ads,#videoAd,#video_cnv_a=
d,#video_overlay_ad,#videoadlogo,#viewportAds,#walltopad,#weblink_ads_cont=
ainer,#welcomeAdsContainer,#welcome_ad_mrec,#welcome_advertisement,#wf_Con=
tentAd,#wf_FrontSingleAd,#wf_SingleAd,#wf_bottomContentAd,#wgtAd,#whatsnew=
s_top_ad,#whitepaper-ad,#whoisRightAdContainer,#wide_ad_unit_top,#widget_a=
dvertisement,#wrapAdRight,#wrapAdTop,#y-ad-units,#y708-ad-expedia,#y708-ad=
-lrec,#y708-ad-partners,#y708-ad-ysm,#y708-advertorial-marketplace,#yahoo-=
ads,#yahoo-sponsors,#yahooSponsored,#yahoo_ads,#yahoo_ads_2010,#yahooad-tb=
l,#yan-sponsored,#ybf-ads,#yfi_fp_ad_mort,#yfi_fp_ad_nns,#yfi_pf_ad_mort,#=
ygrp-sponsored-links,#ymap_adbanner,#yn-gmy-ad-lrec,#yreSponsoredLinks,#ys=
m_ad_iframe,#zoneAdserverMrec,#zoneAdserverSuper,.ADBAR,.ADPod,.AD_ALBUM_I=
TEMLIST,.AD_MOVIE_ITEM,.AD_MOVIE_ITEMLIST,.AD_MOVIE_ITEMROW,.Ad-MPU,.Ad120=
x600,.Ad160x600,.Ad160x600left,.Ad160x600right,.Ad247x90,.Ad300x250,.Ad300=
x250L,.Ad728x90,.AdBox,.AdBox7,.AdContainerBox308,.AdHeader,.AdHere,.AdInf=
o,.AdMedium,.AdPlaceHolder,.AdRingtone,.AdSense,.AdSpace,.AdTextSmallFont,=
.AdTitle,.AdUnit,.AdUnit300,.Ad_C,.Ad_D_Wrapper,.Ad_E_Wrapper,.Ad_Right,.A=
ds,.AdsBoxBottom,.AdsBoxSection,.AdsBoxTop,.AdsLinks1,.AdsLinks2,.Advert,.=
AdvertMidPage,.AdvertiseWithUs,.AdvertisementTextTag,.ArticleAd,.ArticleIn=
lineAd,.BannerAd,.BigBoxAd,.BlockAd,.BottomAdContainer,.BottomAffiliate,.B=
oxAd,.CG_adkit_leaderboard,.CG_details_ad_dropzone,.ComAread,.CommentAd,.C=
ontentAd,.ContentAds,.DAWRadvertisement,.DeptAd,.DisplayAd,.FT_Ad,.FlatAds=
,.GOOGLE_AD,.GoogleAd,.HPNewAdsBannerDiv,.HPRoundedAd,.HomeContentAd,.IABA=
dSpace,.LeftAd,.LeftTowerAd,.M2Advertisement,.MD_adZone,.MOS-ad-hack,.MPU,=
.MPUHolder,.MPUTitleWrapperClass,.MiddleAdContainer,.OpenXad,.PU_DoubleCli=
ckAdsContent,.Post5ad,.RBboxAd,.RectangleAd,.RelatedAds,.RightGoogleAFC,.R=
ightRailTop300x250Ad,.RightSponsoredAdTitle,.RightTowerAd,.SideAdCol,.Side=
barAd,.SkyAdContainer,.SponsorCFrame,.SponsoredAdTitle,.SponsoredContent,.=
SponsoredLinks,.SponsoredLinksGrayBox,.SponsorshipText,.SquareAd,.Standard=
AdLeft,.StandardAdRight,.TextAd,.TheEagleGoogleAdSense300x250,.TopAd,.TopA=
dContainer,.TopAdL,.TopAdR,.TopBannerAd,.UIStandardFrame_SidebarAds,.UIWas=
hFrame_SidebarAds,.UnderAd,.VerticalAd,.VideoAd,.WidgetAdvertiser,.a160x60=
0,.a728x90,.ad-120x600,.ad-160,.ad-160x600,.ad-250,.ad-300,.ad-300-block,.=
ad-300-blog,.ad-300x100,.ad-300x250,.ad-300x250-right0,.ad-350,.ad-355x75,=
.ad-600,.ad-635x40,.ad-728,.ad-728x90,.ad-728x90-1,.ad-above-header,.ad-ad=
link-bottom,.ad-adlink-side,.ad-background,.ad-banner,.ad-bigsize,.ad-bloc=
k,.ad-blog2biz,.ad-bottom,.ad-box,.ad-break,.ad-btn,.ad-btn-heading,.ad-bu=
tton,.ad-cell,.ad-container,.ad-disclaimer,.ad-display,.ad-div,.ad-enabled=
,.ad-feedback,.ad-filler,.ad-footer,.ad-footer-leaderboard,.ad-google,.ad-=
graphic-large,.ad-gray,.ad-hdr,.ad-head,.ad-holder,.ad-homeleaderboard,.ad=
-img,.ad-island,.ad-label,.ad-leaderboard,.ad-links,.ad-lrec,.ad-medium,.a=
d-medium-two,.ad-mpu,.ad-note,.ad-notice,.ad-other,.ad-permalink,.ad-place=
holder,.ad-postText,.ad-poster,.ad-priority,.ad-rect,.ad-rectangle,.ad-rec=
tangle-text,.ad-related,.ad-rh,.ad-ri,.ad-right,.ad-right-header,.ad-right=
-txt,.ad-row,.ad-section,.ad-sidebar300,.ad-sky,.ad-slot,.ad-slot-234-60,.=
ad-slot-300-250,.ad-slot-728-90,.ad-space,.ad-space-mpu-box,.ad-spot,.ad-s=
quares,.ad-statement,.ad-tabs,.ad-text,.ad-text-links,.ad-tile,.ad-title,.=
ad-top,.ad-top-left,.ad-unit,.ad-unit-300,.ad-unit-300-wrapper,.ad-unit-an=
chor,.ad-vert,.ad-vtu,.ad-wrap,.ad-wrapper,.ad-zone-s-q-l,.ad.super,.ad0,.=
ad1,.ad10,.ad120,.ad120x600,.ad125,.ad160,.ad160x600,.ad18,.ad19,.ad2,.ad2=
1,.ad250,.ad250c,.ad3,.ad300,.ad300250,.ad300_250,.ad300x100,.ad300x250,.a=
d300x250-hp-features,.ad300x250Top,.ad300x250_container,.ad300x250box,.ad3=
00x50-right,.ad300x600,.ad310,.ad336x280,.ad343x290,.ad4,.ad400right,.ad45=
0,.ad468,.ad468_60,.ad468x60,.ad6,.ad620x70,.ad626X35,.ad7,.ad728,.ad728_9=
0,.ad728x90,.ad728x90_container,.ad8,.ad90x780,.adAgate,.adArea674x60,.adB=
anner,.adBanner300x250,.adBanner728x90,.adBannerTyp1,.adBannerTypSortableL=
ist,.adBannerTypW300,.adBar,.adBgBottom,.adBgMId,.adBgTop,.adBottomboxrigh=
t,.adBox,.adBoxBody,.adBoxBorder,.adBoxContent,.adBoxInBignews,.adBoxSideb=
ar,.adBoxSingle,.adCMRight,.adColumn,.adCont,.adContTop,.adContainer,.adCo=
ntour,.adCreative,.adDiv,.adElement,.adFender3,.adFrame,.adFtr,.adFullWidt=
hMiddle,.adGoogle,.adHeader,.adHeadline,.adHolder,.adHome300x250,.adHoriso=
ntal,.adInNews,.adLabel,.adLeader,.adLeaderForum,.adLeaderboard,.adLeft,.a=
dLoaded,.adLocal,.adMastheadLeft,.adMastheadRight,.adMegaBoard,.adMkt2Colw=
,.adModule,.adMpu,.adNewsChannel,.adNoOutline,.adNoticeOut,.adObj,.adPageB=
orderL,.adPageBorderR,.adPanel,.adRect,.adRight,.adSelfServiceAdvertiseLin=
k,.adServer,.adSkyscraperHolder,.adSlot,.adSpBelow,.adSpace,.adSpacer,.adS=
ponsor,.adSpot,.adSpot-searchAd,.adSpot-textBox,.adSpot-twin,.adSpotIsland=
,.adSquare,.adSummary,.adSuperboard,.adSupertower,.adTD,.adTag,.adText,.ad=
TileWrap,.adTiler,.adTitle,.adTopboxright,.adTout,.adTxt,.adUnitHorz,.adUn=
itVert,.adUnitVert_noImage,.adWebBoard,.adWidget,.adWithTab,.adWrap,.adWra=
pper,.ad_0,.ad_1,.ad_120x90,.ad_125,.ad_130x90,.ad_160,.ad_160x600,.ad_2,.=
ad_200,.ad_200x200,.ad_250x250,.ad_250x250_w,.ad_3,.ad_300,.ad_300_250,.ad=
_300x250,.ad_300x250_box_right,.ad_336,.ad_336x280,.ad_350x100,.ad_350x250=
,.ad_400x200,.ad_468,.ad_468x60,.ad_600,.ad_728,.ad_728x90,.ad_Left,.ad_Ri=
ght,.ad_amazon,.ad_banner_border,.ad_biz,.ad_block_338,.ad_body,.ad_border=
,.ad_botbanner,.ad_bottom_leaderboard,.ad_box,.ad_box2,.ad_box_ad,.ad_box_=
div,.ad_callout,.ad_caption,.ad_contain,.ad_container,.ad_content,.ad_cont=
ent_wide,.ad_contents,.ad_descriptor,.ad_eyebrow,.ad_footer,.ad_framed,.ad=
_front_promo,.ad_head,.ad_header,.ad_hpm,.ad_info_block,.ad_inline,.ad_isl=
and,.ad_label,.ad_launchpad,.ad_leader,.ad_leaderboard,.ad_left,.ad_links,=
.ad_linkunit,.ad_loc,.ad_lrec,.ad_main,.ad_medrec,.ad_medrect,.ad_middle,.=
ad_mpu,.ad_mr,.ad_mrec,.ad_mrec_title_article,.ad_mrect,.ad_news,.ad_notic=
e,.ad_one,.ad_p360,.ad_partner,.ad_partners,.ad_plus,.ad_post,.ad_power,.a=
d_rectangle,.ad_right,.ad_right_col,.ad_row,.ad_sidebar,.ad_skyscraper,.ad=
_slug,.ad_slug_table,.ad_space,.ad_space_300_250,.ad_sponsor,.ad_sponsored=
section,.ad_spot_b,.ad_spot_c,.ad_square_r,.ad_square_top,.ad_text,.ad_tex=
t_w,.ad_title,.ad_top,.ad_top_leaderboard,.ad_topright,.ad_tower,.ad_unit,=
.ad_unit_rail,.ad_url,.ad_warning,.ad_wid300,.ad_wide,.ad_wrap,.ad_wrapper=
,.ad_wrapper_fixed,.ad_wrapper_top,.ad_zone,.adarea,.adarea-long,.adbanner=
,.adbannerbox,.adbannerright,.adbar,.adbg,.adborder,.adbot,.adbottom,.adbo=
ttomright,.adbox,.adbox-outer,.adbox_300x600,.adbox_366x280,.adbox_468X60,=
.adbox_bottom,.adboxclass,.adbuttons,.adcode,.adcol1,.adcol2,.adcolumn,.ad=
column_wrapper,.adcont,.adcontainer,.adcopy,.addiv,.adfoot,.adfootbox,.adf=
rame,.adhead,.adheader,.adheader100,.adhere,.adhered,.adhi,.adhint,.adhold=
er,.adhoriz,.adi,.adiframe,.adinfo,.adinside,.adjlink,.adkit,.adkit-advert=
,.adkit-lb-footer,.adlabel,.adlabel-horz,.adlabel-vert,.adleft,.adleft1,.a=
dline,.adlink,.adlinks,.adlist,.adlnklst,.admarker,.admedrec,.admessage,.a=
dmodule,.admpu,.adnation-banner,.adnotice,.adops,.adp-AdPrefix,.adpadding,=
.adpane,.adpic,.adprice,.adright,.adrotate_widget,.adrow,.adrow-post,.adru=
le,.ads-125,.ads-728x90-wrap,.ads-banner,.ads-below-content,.ads-categorie=
s-bsa,.ads-favicon,.ads-links-general,.ads-mpu,.ads-profile,.ads-right,.ad=
s-section,.ads-sidebar,.ads-sky,.ads-stripe,.ads-text,.ads-widget-partner-=
gallery,.ads2,.ads3,.ads300,.ads468,.ads728,.ads:not(body),.adsArea,.adsBe=
lowHeadingNormal,.adsBlock,.adsBox,.adsCont,.adsDiv,.adsFull,.adsImages,.a=
dsMPU,.adsRight,.adsTextHouse,.adsTop,.adsTower2,.adsTowerWrap,.adsWithUs,=
.ads_125_square,.ads_180,.ads_300,.ads_300x250,.ads_337x280,.ads_728x90,.a=
ds_big,.ads_big-half,.ads_brace,.ads_catDiv,.ads_container,.ads_disc_ancho=
r,.ads_disc_leader,.ads_disc_lwr_square,.ads_disc_skyscraper,.ads_disc_squ=
are,.ads_div,.ads_header,.ads_leaderboard,.ads_mpu,.ads_outer,.ads_rectang=
le,.ads_right,.ads_sc_bl_i,.ads_sc_tl_i,.ads_show_if,.ads_side,.ads_sideba=
r,.ads_singlepost,.ads_spacer,.ads_takeover,.ads_title,.ads_tr,.ads_widesk=
y,.ads_wrapperads_top,.adsblockvert,.adsborder,.adsbottom,.adsbyyahoo,.ads=
c,.adscaleAdvert,.adscontainer,.adscreen,.adsection_a2,.adsection_c2,.adse=
nse,.adsense-ad,.adsense-category,.adsense-category-bottom,.adsense-headin=
g,.adsense-right,.adsense-title,.adsense3,.adsenseAds,.adsenseBlock,.adsen=
seContainer,.adsenseGreenBox,.adsense_bdc_v2,.adsensebig,.adsenseblock,.ad=
senseblock_bottom,.adsenseblock_top,.adsenselr,.adsensem_widget,.adsensesq=
,.adset,.adsforums,.adside,.adsidebox,.adsider,.adsingle,.adsleft,.adsloga=
n,.adsmalltext,.adsmessage,.adspace,.adspace-MR,.adspace180,.adspace_botto=
m,.adspace_buysell,.adspace_rotate,.adspace_skyscraper,.adspacer,.adspot,.=
adspot728x90,.adstop,.adstrip,.adtable,.adtag,.adtech,.adtext,.adtext_gray=
,.adtext_horizontal,.adtext_onwhite,.adtext_vertical,.adtile,.adtips,.adti=
ps1,.adtop,.adtravel,.adtxt,.adv-mpu,.adverTag,.adver_cont_below,.advert,.=
advert-article-bottom,.advert-bannerad,.advert-box,.advert-head,.advert-ho=
rizontal,.advert-iab-300-250,.advert-iab-468-60,.advert-mpu,.advert-skyscr=
aper,.advert-text,.advert300,.advert4,.advert5,.advert8,.advertColumn,.adv=
ertCont,.advertContainer,.advertHeadline,.advertRight,.advertText,.advertT=
itleSky,.advert_468x60,.advert_box,.advert_cont,.advert_label,.advert_lead=
erboard,.advert_list,.advert_note,.advert_top,.advertheader-red,.advertise=
,.advertise-here,.advertise-homestrip,.advertise-horz,.advertise-leaderboa=
rd,.advertise-vert,.advertiseContainer,.advertiseText,.advertise_ads,.adve=
rtise_here,.advertise_link,.advertise_link_sidebar,.advertisement,.adverti=
sement-728x90,.advertisement-block,.advertisement-text,.advertisement-top,=
.advertisement468,.advertisementBox,.advertisementColumnGroup,.advertiseme=
ntContainer,.advertisementHeader,.advertisementLabel,.advertisementPanel,.=
advertisement_btm,.advertisement_caption,.advertisement_g,.advertisement_h=
eader,.advertisement_horizontal,.advertisement_top,.advertiser,.advertiser=
-links,.advertisespace_div,.advertising,.advertising-banner,.advertising-h=
eader,.advertising-local-links,.advertising2,.advertisingTable,.advertisin=
g_block,.advertising_images,.advertisment,.advertisment_two,.advertize,.ad=
vertorial,.advertorial-2,.advertorial-promo-box,.adverts,.advt,.advt-banne=
r-3,.advt-block,.advt300,.advt720,.adwordListings,.adwordsHeader,.adwrap,.=
adwrapper,.adwrapper-lrec,.adwrapper948,.affiliate,.affiliate-link,.affili=
ate-sidebar,.affiliateAdvertText,.affinityAdHeader,.agi-adsaleslinks,.alb-=
content-ad,.alt_ad,.anchorAd,.another_text_ad,.answer_ad_content,.aolSpons=
oredLinks,.aopsadvert,.apiAdMarkerAbove,.apiAds,.archive-ads,.art_ads,.art=
icle-ads,.articleAd,.articleAds,.articleAdsL,.articleEmbeddedAdBox,.articl=
e_ad,.article_adbox,.article_mpu_box,.articleads,.aseadn,.aux-ad-widget-2,=
.b-astro-sponsored-links_horizontal,.b-astro-sponsored-links_vertical,.ban=
ner-ad,.banner-ads,.banner-adverts,.banner300x100,.banner300x250,.banner46=
8,.bannerAd,.bannerAdWrapper300x250,.bannerAdWrapper730x86,.bannerRightAd,=
.banner_300x250,.banner_728x90,.banner_ad,.banner_ad_footer,.banner_ad_lea=
derboard,.bannerad,.barkerAd,.base-ad-mpu,.base_ad,.bgnavad,.big-ads,.bigA=
d,.big_ad,.big_ads,.bigad,.bigad2,.bigbox_ad,.bigboxad,.billboard_ad,.blk_=
advert,.block-ad,.block-ad300,.block-admanager,.block-ads-bottom,.block-ad=
s-top,.block-adsense,.block-openadstream,.block-openx,.block-thirdage-ads,=
.block_ad,.block_ad_sb_text,.block_ad_sponsored_links,.block_ad_sponsored_=
links-wrapper,.blocked-ads,.blog-ad-leader-inner,.blog-ads-container,.blog=
Ad,.blogAdvertisement,.blogBigAd,.blog_ad,.blogads,.blox3featuredAd,.body_=
ad,.body_sponsoredresults_bottom,.body_sponsoredresults_middle,.body_spons=
oredresults_top,.bookseller-header-advt,.bottomAd,.bottomAds,.bottom_ad,.b=
ottom_ad_block,.bottom_sponsor,.bottomad,.bottomadvert,.bottomrightrailAd,=
.bottomvidad,.box-ad,.box-ads,.box-adsense,.boxAd,.box_ad,.box_ads,.box_ad=
vertising,.box_advertisment_62_border,.box_content_ad,.box_content_ads,.bo=
xad,.boxyads,.bps-ad-wrapper,.bps-advertisement,.bps-advertisement-inline-=
ads,.br-ad,.bsa_ads,.btm_ad,.bullet-sponsored-links,.bullet-sponsored-link=
s-gray,.burstContentAdIndex,.buttonAd,.buttonAds,.buttonadbox,.bx_ad,.bx_a=
d_right,.cA-adStrap,.cColumn-TextAdsBox,.care2_adspace,.catalog_ads,.cb-ad=
-container,.cb_footer_sponsor,.cb_navigation_ad,.cbstv_ad_label,.cbzadvert=
,.cdAdTitle,.cdmainlineSearchAdParent,.cdsidebarSearchAdParent,.centerAd,.=
center_ad,.centerad,.centered-ad,.cinemabotad,.clearerad,.cm_ads,.cms-Adve=
rt,.cnbc_badge_banner_ad_area,.cnn160AdFooter,.cnnAd,.cnnMosaic160Containe=
r,.cnnSearchSponsorBox,.cnnStoreAd,.cnnStoryElementBoxAd,.cnnWCAdBox,.cnnW=
ireAdLtgBox,.cnn_728adbin,.cnn_adcntr300x100,.cnn_adcntr728x90,.cnn_adspc3=
36cntr,.cnn_adtitle,.column2-ad,.com-ad-server,.comment-advertisement,.com=
mon_advertisement_title,.communityAd,.conTSponsored,.conductor_ad,.confirm=
_ad_left,.confirm_ad_right,.confirm_leader_ad,.consoleAd,.container-adword=
s,.containerSqAd,.container_serendipity_plugin_google_adsense,.content-ad,=
.contentAd,.contentAdFoot,.contentAdsWrapper,.content_ad,.content_ad_728,.=
content_adsq,.contentad,.contentad300x250,.contentad_right_col,.contentadc=
ontainer,.contentadleft,.contenttextad,.contest_ad,.cp_ad,.cpmstarHeadline=
,.cpmstarText,.create_ad,.cs-mpu,.cscTextAd,.cse_ads,.cspAd,.ct_ad,.cube-a=
d,.cubeAd,.cube_ads,.currency_ad,.custom_ads,.darla_ad,.dartAdImage,.dart_=
ad,.dart_tag,.dartadvert,.dartiframe,.dc-ad,.dcAdvertHeader,.deckAd,.decka=
ds,.detail-ads,.detailMpu,.detail_top_advert,.divAd,.divad1,.divad2,.divad=
3,.divads,.divider_ad,.dmco_advert_iabrighttitle,.download_ad,.downloadad,=
.dynamic-ads,.dynamic_ad,.e-ad,.ec-ads,.em-ad,.embed-ad,.entry_sidebar_ads=
,.entryad,.ez-clientAd,.f_Ads,.featuredAds,.featuredadvertising,.flagads,.=
flash-advertisement,.flash_ad,.flash_advert,.flashad,.flexiad,.flipbook_v2=
_sponsor_ad,.floatad,.floated_right_ad,.footad,.footer-ad,.footerAd,.foote=
rAdModule,.footerAdslot,.footerTextAd,.footer_ad,.footer_ads,.footer_block=
_ad,.footer_bottomad,.footer_line_ad,.footer_text_ad,.footerad,.forumtopad=
,.frn_adbox,.frn_cont_adbox,.ft-ad,.ftdAdBar,.ftdContentAd,.full_ad_box,.f=
ullbannerad,.g3rtn-ad-site,.gAd,.gAdvertising,.g_ggl_ad,.ga-textads-bottom=
,.ga-textads-top,.gaTeaserAdsBox,.gads,.gads_cb,.gads_container,.gamesPage=
_ad_content,.gglAds,.global_banner_ad,.googad,.googads,.google-ad,.google-=
ad-container,.google-ads,.google-ads-boxout,.google-ads-slim,.google-right=
-ad,.google-sponsored-ads,.google-sponsored-link,.google468_60,.googleAd,.=
googleAd-content,.googleAd-list,.googleAdBox,.googleAdSense,.googleAdSense=
Module,.googleAd_body,.googleAds,.googleAds_article_page_above_comments,.g=
oogleAdsense,.googleContentAds,.googleProfileAd,.googleSearchAd_content,.g=
oogleSearchAd_sidebar,.google_ad,.google_add_container,.google_ads,.google=
_ads_bom_title,.google_ads_content,.googlead,.googleaddiv,.googleaddiv2,.g=
oogleads,.googleads_300x250,.googleads_title,.googley_ads,.gpAdBox,.gpAds,=
.gradientAd,.group_ad,.gsfAd,.gt_ad,.gt_ad_300x250,.gt_ad_728x90,.gt_adlab=
el,.gutter-ad-left,.gutter-ad-right,.h-ad-728x90-bottom,.h_Ads,.h_ad,.half=
-ad,.half_ad_box,.hd_advert,.hdr-ads,.header-ad,.header-advert,.headerAd,.=
headerAds,.headerAdvert,.header_ad,.header_ad_center,.header_ad_div,.heade=
r_advertisment,.headerad,.hi5-ad,.highlightsAd,.hm_advertisment,.home-ad-l=
inks,.homeAd,.homeAdBoxA,.homeAdBoxBetweenBlocks,.homeAdBoxInBignews,.home=
AdSection,.homeMediumAdGroup,.home_ad_bottom,.home_advertisement,.home_mre=
c_ad,.homead,.homepage-ad,.homepage300ad,.homepageFlexAdOuter,.homepageMPU=
,.homepage_middle_right_ad,.hor_ad,.horiz_adspace,.horizontalAd,.horizonta=
l_ad,.horizontal_ads,.horizontaltextadbox,.horizsponsoredlinks,.hortad,.ho=
useAdsStyle,.housead,.hp2-adtag,.hp_ad_cont,.hp_ad_text,.hp_t_ad,.hp_w_ad,=
.ic-ads,.ico-adv,.idMultiAd,.image-advertisement,.imageads,.imgad,.in-page=
-ad,.in-story-text-ad,.indie-sidead,.indy_googleads,.inline-ad,.inline-mpu=
-left,.inlineSideAd,.inline_ad,.inline_ad_title,.inlinead,.inlineadsense,.=
inlineadtitle,.inlist-ad,.inlistAd,.inner-advt-banner-3,.innerAds,.innerad=
,.inpostad,.insert_advertisement,.insertad,.is24-adplace,.islandAd,.island=
Advert,.islandad,.jimdoAdDisclaimer,.jp-advertisment-promotional,.js-adver=
t,.kw_advert,.kw_advert_pair,.l_ad_sub,.l_banner.ads_show_if,.labelads,.la=
rgeRectangleAd,.lastRowAd,.lcontentbox_ad,.leaderAdTop,.leaderAdvert,.lead=
er_ad,.leaderboardAd,.leaderboardad,.leaderboardadtop,.left-ad,.leftAd,.le=
ftAdColumn,.leftAds,.left_adlink,.left_ads,.leftad,.leftadtag,.leftbar_ad_=
160_600,.leftbarads,.leftnavad,.lgRecAd,.lg_ad,.ligatus,.linead,.link_adsl=
ider,.link_advertise,.live-search-list-ad-container,.ljad,.log_ads,.logoAd=
s,.longAd,.lowerAds,.m-ad-tvguide-box,.m4-adsbygoogle,.m_banner_ads,.macAd=
,.macad,.main-ad,.main-tabs-ad-block,.main_ad,.main_adbox,.main_intro_ad,.=
map_media_banner_ad,.marginadsthin,.marketing-ad,.masthead_topad,.mdl-ad,.=
media-advert,.mediaAd,.mediaAdContainer,.medium-rectangle-ad,.mediumRectan=
gleAdvert,.menuItemBannerAd,.messageBoardAd,.micro_ad,.mid_ad,.midad,.midd=
leAds,.middleads,.min_navi_ad,.miniad,.mobile-sponsoring,.mod-ad-lrec,.mod=
-ad-n,.mod-adopenx,.mod_admodule,.module-ad,.module-ad-small,.module-ads,.=
moduleAdvertContent,.module_ad,.module_box_ad,.modulegad,.moduletable-adve=
rt,.moduletable-googleads,.moduletablesquaread,.mpu,.mpu-ad,.mpu-advert,.m=
pu-footer,.mpu-fp,.mpu-title,.mpu-top-left,.mpu-top-left-banner,.mpu-top-r=
ight,.mpuAd,.mpuAdSlot,.mpuAdvert,.mpuArea,.mpuBox,.mpuContainer,.mpuHolde=
r,.mpuTextAd,.mpu_ad,.mpu_advert,.mpu_gold,.mpu_holder,.mpu_platinum,.mpu_=
text_ad,.mpuad,.mpuholderportalpage,.mrec_advert,.ms-ads-link,.msfg-shoppi=
ng-mpu,.mwaads,.nSponsoredLcContent,.nSponsoredLcTopic,.nadvt300,.narrow_a=
d_unit,.narrow_ads,.navAdsBanner,.navi_ad300,.naviad,.nba300Ad,.nbaT3Ad160=
,.nbaTVPodAd,.nbaTwo130Ads,.nbc_ad_carousel_wrp,.newTopAdContainer,.newad,=
.newsviewAdBoxInNews,.nf-adbox,.nn-mpu,.noAdForLead,.normalAds,.nrAds,.nsA=
dRow,.oas-ad,.oas-bottom-ads,.offer_sponsoredlinks,.oio-banner-zone,.oio-l=
ink-sidebar,.oio-zone-position,.on_single_ad_box,.onethirdadholder,.openad=
s,.openadstext_after,.openx,.openx-ad,.osan-ads,.other_adv2,.ovAdPromo,.ov=
AdSky,.ovAdartikel,.ov_spns,.pageGoogleAd,.pageGoogleAdFlat,.pageLeaderAd,=
.page_content_right_ad,.pagead,.pagenavindexcontentad,.partnersTextLinks,.=
pencil_ad,.player_ad_box,.player_page_ad_box,.pnp_ad,.pod-ad-300,.podRelat=
edAdLinksWidget,.podSponsoredLink,.portalCenterContentAdBottom,.portalCent=
erContentAdMiddle,.portalCenterContentAdTop,.portalcontentad,.post-ad,.pos=
t_ad,.post_sponsor_unit,.postbit_adbit_register,.postbit_adcode,.postgroup=
-ads,.postgroup-ads-middle,.prebodyads,.premium_ad_container,.promoAd,.pro=
moAds,.promo_ad,.publication-ad,.publicidad,.puff-advertorials,.qa_ad_left=
,.qm-ad-content,.qm-ad-content-news,.quigo-ad,.qzvAdDiv,.r_ad_box,.r_ads,.=
rad_container,.rect_ad_module,.rectad,.rectangleAd,.rectanglead,.redads_co=
nt,.regularad,.relatedAds,.related_post_google_ad,.remads,.result_ad,.resu=
lts_sponsor,.results_sponsor_right,.reviewMidAdvertAlign,.rght300x250,.rha=
ds,.rhs-ad,.rhs-ads-panel,.right-ad,.right-ad-holder,.right-ad2,.right-ads=
,.right-ads2,.rightAd,.rightColAd,.rightRailAd,.right_ad,.right_ad_text,.r=
ight_ad_top,.right_ads,.right_ads_column,.right_col_ad,.right_hand_advert_=
column,.rightad,.rightad_1,.rightad_2,.rightads,.rightadunit,.rightcol_box=
ad,.rightcoladvert,.rightcoltowerad,.rnav_ad,.rngtAd,.roundingrayboxads,.r=
t_ad1_300x90,.rt_ad_300x250,.rt_ad_call,.savvyad_unit,.sb-ad-sq-bg,.sbAd,.=
sbAdUnitContainer,.sb_adsN,.sb_adsNv2,.sb_adsW,.sb_adsWv2,.scanAd,.scc_adv=
ert,.sci-ad-main,.sci-ad-sub,.search-ad,.search-results-ad,.search-sponsor=
,.search-sponsored,.searchAd,.searchSponsoredResultsBox,.searchSponsoredRe=
sultsList,.search_column_results_sponsored,.search_results_sponsored_top,.=
section-ad2,.section-sponsor,.section_mpu_wrapper,.section_mpu_wrapper_wra=
pper,.selfServeAds,.serp_sponsored,.servsponserLinks,.shoppingGoogleAdSens=
e,.sidbaread,.side-ad,.side-ads,.sideAd,.sideBoxAd,.side_ad,.side_ad2,.sid=
e_ad_1,.side_ad_2,.side_ad_3,.sidead,.sideads,.sideadsbox,.sideadvert,.sid=
ebar-ad,.sidebar-ads,.sidebar-text-ad,.sidebarAd,.sidebarAdUnit,.sidebarAd=
vert,.sidebar_ad,.sidebar_ad_300_250,.sidebar_ads,.sidebar_ads_336,.sideba=
r_adsense,.sidebar_box_ad,.sidebarad,.sidebarad_bottom,.sidebaradbox,.side=
barboxad,.sideheadnarrowad,.sideheadsponsorsad,.singleAd,.singleAdsContain=
er,.singlead,.sitesponsor,.skinAd,.skin_ad_638,.sky-ad,.skyAd,.skyAdd,.sky=
_ad,.sky_scraper_ad,.skyad,.skyscraper-ad,.skyscraper_ad,.skyscraper_banne=
rAdHome,.slideshow-ad,.slpBigSlimAdUnit,.slpSquareAdUnit,.sm_ad,.smallSkyA=
d1,.smallSkyAd2,.small_ad,.small_ads,.smallad-left,.smallads,.smallsponsor=
ad,.smart_ads_bom_title,.specialAd175x90,.speedyads,.sphereAdContainer,.sp=
l-ads,.spl_ad,.spl_ad2,.spl_ad_plus,.splitAd,.sponlinkbox,.spons-link,.spo=
ns_links,.sponslink,.sponsor-ad,.sponsor-bottom,.sponsor-link,.sponsor-lin=
ks,.sponsor-right,.sponsor-services,.sponsor-top,.sponsorArea,.sponsorBox,=
.sponsorPost,.sponsorPostWrap,.sponsorStrip,.sponsorTop,.sponsor_ad_area,.=
sponsor_footer,.sponsor_horizontal,.sponsor_line,.sponsor_links,.sponsor_l=
ogo,.sponsor_top,.sponsor_units,.sponsoradtitle,.sponsorbox,.sponsored,.sp=
onsored-chunk,.sponsored-editorial,.sponsored-features,.sponsored-links,.s=
ponsored-links-alt-b,.sponsored-links-holder,.sponsored-links-right,.spons=
ored-post,.sponsored-post_ad,.sponsored-results,.sponsored-right-border,.s=
ponsored-text,.sponsoredInner,.sponsoredLinks,.sponsoredLinksHeader,.spons=
oredProduct,.sponsoredSideInner,.sponsored_ads,.sponsored_box,.sponsored_b=
ox_search,.sponsored_by,.sponsored_links,.sponsored_links_title_container,=
.sponsored_links_title_container_top,.sponsored_links_top,.sponsored_resul=
ts,.sponsored_well,.sponsoredibbox,.sponsoredlink,.sponsoredlinks,.sponsor=
edlinkscontainer,.sponsoredresults,.sponsoredtextlink_container,.sponsored=
textlink_container_ovt,.sponsorlink,.sponsorlink2,.sponsors,.sponsors-box,=
.sponsorshipbox,.spotlightAd,.squareAd,.square_ad,.squared_ad,.ss-ad-mpu,.=
staticAd,.stocks-ad-tag,.store-ads,.story_AD,.subad,.subcontent-ad,.super-=
ad,.supercommentad_left,.supercommentad_right,.supp-ads,.supportAdItem,.su=
rveyad,.t10ad,.tab_ad,.tab_ad_area,.tablebordersponsor,.tadsanzeige,.tadsb=
anner,.tadselement,.tallad,.tblTopAds,.tbl_ad,.tbox_ad,.teaser-sponsor,.te=
aserAdContainer,.teaser_adtiles,.text-ad-links,.text-g-advertisement,.text=
-g-group-short-rec-ad,.text-g-net-grp-google-ads-article-page,.textAd,.tex=
tAdBox,.textAds,.text_ad,.text_ads,.textad,.textadContainer,.textad_headli=
ne,.textadbox,.textads,.textadsfoot,.textlink-ads,.tf_page_ad_search,.this=
IsAd,.thisIsAnAd,.ticket-ad,.tileAds,.tips_advertisement,.title-ad,.title_=
adbig,.tncms-region-ads,.toolad,.toolbar-ad,.top-ad,.top-ad-space,.top-ads=
,.top-menu-ads,.top-sponsors,.topAd,.topAdWrap,.topAds,.topAdvertisement,.=
topBannerAd,.topLeaderboardAd,.top_Ad,.top_ad,.top_ad_728,.top_ad_728_90,.=
top_ad_disclaimer,.top_ad_div,.top_ad_post,.top_ad_wrapper,.top_ads,.top_a=
dvert,.top_advertising_lb,.top_container_ad,.top_sponsor,.topad,.topad-bar=
,.topadbox,.topads,.topadspot,.topadvertisementsegment,.topcontentadvertis=
ement,.topic_inad,.topstoriesad,.toptenAdBoxA,.towerAd,.towerAdLeft,.tower=
Ads,.tower_ad,.tower_ad_disclaimer,.towerad,.ts-ad_unit_bigbox,.ts-banner_=
ad,.ttlAdsensel,.tto-sponsored-element,.twoColumnAd,.twoadcoll,.twoadcolr,=
.tx_smartadserver_pi1,.txt-ads,.txtAds,.txt_ads,.txtadvertise,.type_adscon=
tainer,.type_miniad,.type_promoads,.ukAds,.undertimyads,.universalboxADVBO=
X01,.universalboxADVBOX03,.universalboxADVBOX04a,.usenext,.vertad,.videoAd=
,.videoBoxAd,.video_ad,.view-promo-mpu-right,.view_rig_ad,.virgin-mpu,.wa_=
adsbottom,.wide-ad,.wide-skyscraper-ad,.wideAdTable,.wide_ad,.wide_ad_unit=
_top,.wide_ads,.wide_google_ads,.widget-ad,.widget-ad300x250,.widget-entry=
-ads-160,.widget_ad,.widget_ad_rotator,.widget_island_ad,.widget_sdac_foot=
er_ads_widget,.wikia-ad,.wikia_ad_placeholder,.withAds,.wnMultiAd,.wp125ad=
,.wp125ad_2,.wpn_ad_content,.wrap-ads,.wsSponsoredLinksRight,.wsTopSposore=
dLinks,.x03-adunit,.x04-adunit,.xads-blk2,.xads-ojedn,.y-ads,.y-ads-wide,.=
y7-advertisement,.yahoo-sponsored,.yahoo-sponsored-links,.yahooAds,.yahoo_=
ads,.yan-sponsored,.ygrp-ad,.yrail_ad_wrap,.yrail_ads,.ysmsponsor,.ysponso=
r,.yw-ad,[id^=3D"MarketGid"],a[href^=3D"<a =
href=3D"http://ad.doubleclick.net/">http://ad.doubleclick.net/</a>"],a[hre=
f^=3D"<a =
href=3D"http://adserving.liveuniversenetwork.com/">http://adserving.liveun=
iversenetwork.com/</a>"],a[href^=3D"<a =
href=3D"http://galleries.pinballpublishernetwork.com/">http://galleries.pi=
nballpublishernetwork.com/</a>"],a[href^=3D"<a =
href=3D"http://galleries.securewebsiteaccess.com/">http://galleries.secure=
websiteaccess.com/</a>"],a[href^=3D"<a =
href=3D"http://install.securewebsiteaccess.com/">http://install.securewebs=
iteaccess.com/</a>"],a[href^=3D"<a =
href=3D"http://latestdownloads.net/download.php?">http://latestdownloads.n=
et/download.php?</a>"],a[href^=3D"<a =
href=3D"http://secure.signup-page.com/">http://secure.signup-page.com/</a>=
"],a[href^=3D"<a =
href=3D"http://secure.signup-way.com/">http://secure.signup-way.com/</a>"]=
,a[href^=3D"<a =
href=3D"http://www.FriendlyDuck.com/AF_">http://www.FriendlyDuck.com/AF_</=
a>"],a[href^=3D"<a =
href=3D"http://www.adbrite.com/mb/commerce/purchase_form.php?">http://www.=
adbrite.com/mb/commerce/purchase_form.php?</a>"],a[href^=3D"<a =
href=3D"http://www.friendlyduck.com/AF_">http://www.friendlyduck.com/AF_</=
a>"],a[href^=3D"<a =
href=3D"http://www.google.com/aclk?">http://www.google.com/aclk?</a>"],a[h=
ref^=3D"<a =
href=3D"http://www.liutilities.com/aff">http://www.liutilities.com/aff</a>=
"],a[href^=3D"<a =
href=3D"http://www.liutilities.com/products/campaigns/adv/">http://www.liu=
tilities.com/products/campaigns/adv/</a>"],a[href^=3D"<a =
href=3D"http://www.my-dirty-hobby.com/?sub=3D">http://www.my-dirty-hobby.c=
om/?sub=3D</a>"],a[href^=3D"<a =
href=3D"http://www.ringtonematcher.com/">http://www.ringtonematcher.com/</=
a>"],div#mclip_container:first-child:last-child,div#tads.c,table.ra[align=3D=
"left"][width=3D"30%"],table.ra[align=3D"right"][width=3D"30%"] { =
visibility:hidden !important;    display:none !important; }</style><div =
style=3D"font-family: Helvetica; font-size: 12px; color: black; =
text-align: left; "><br =
class=3D"webkit-block-placeholder"></div></body></html>=

--Apple-Mail-46-487591200--

From mehmet.ersue@nsn.com  Tue Oct 26 07:28:23 2010
Return-Path: <mehmet.ersue@nsn.com>
X-Original-To: smartpowerdir@core3.amsl.com
Delivered-To: smartpowerdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 35E9A3A67A1; Tue, 26 Oct 2010 07:28:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.443
X-Spam-Level: 
X-Spam-Status: No, score=-102.443 tagged_above=-999 required=5 tests=[AWL=0.155, BAYES_00=-2.599, HTML_MESSAGE=0.001, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id O-qpGGX2zPOy; Tue, 26 Oct 2010 07:28:20 -0700 (PDT)
Received: from demumfd002.nsn-inter.net (demumfd002.nsn-inter.net [93.183.12.31]) by core3.amsl.com (Postfix) with ESMTP id A4C993A6912; Tue, 26 Oct 2010 07:28:06 -0700 (PDT)
Received: from demuprx017.emea.nsn-intra.net ([10.150.129.56]) by demumfd002.nsn-inter.net (8.12.11.20060308/8.12.11) with ESMTP id o9QETr2e014387 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Tue, 26 Oct 2010 16:29:53 +0200
Received: from demuexc023.nsn-intra.net (demuexc023.nsn-intra.net [10.150.128.36]) by demuprx017.emea.nsn-intra.net (8.12.11.20060308/8.12.11) with ESMTP id o9QETnqc012344; Tue, 26 Oct 2010 16:29:53 +0200
Received: from DEMUEXC006.nsn-intra.net ([10.150.128.18]) by demuexc023.nsn-intra.net with Microsoft SMTPSVC(6.0.3790.4675);  Tue, 26 Oct 2010 16:29:52 +0200
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01CB751A.407201F6"
Date: Tue, 26 Oct 2010 16:29:50 +0200
Message-ID: <80A0822C5E9A4440A5117C2F4CD36A6401232486@DEMUEXC006.nsn-intra.net>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: Draft Version of the Document "IETF Network Management Framework and Standards"
Thread-Index: Act0d5HeOGmwjsYoRlC9J+vAmaLjQgAF6EKgACIDWjA=
From: "Ersue, Mehmet (NSN - DE/Munich)" <mehmet.ersue@nsn.com>
To: "IETF SmartPower Directorate" <smartpowerdir@ietf.org>, <smartpower-interest@ietf.org>
X-OriginalArrivalTime: 26 Oct 2010 14:29:52.0660 (UTC) FILETIME=[40C76540:01CB751A]
Subject: [smartpowerdir] FW: Draft Version of the Document "IETF Network Management Framework and Standards"
X-BeenThere: smartpowerdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Members of the Smart Power Directorate <smartpowerdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/smartpowerdir>, <mailto:smartpowerdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/smartpowerdir>
List-Post: <mailto:smartpowerdir@ietf.org>
List-Help: <mailto:smartpowerdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/smartpowerdir>, <mailto:smartpowerdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Oct 2010 14:28:23 -0000

This is a multi-part message in MIME format.

------_=_NextPart_001_01CB751A.407201F6
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Hi All,

as discussed in the SGIP PAP01 meeting in September I prepared a draft =
on "IETF Network Management Framework and Standards", which will be =
further updated and extended with the help of a few contributors for =
different topics. It is likely that the draft will be splitted after =
some time into two documents focusing on survey and applicability =
statement for SG environment.=20

I think such an overview and guideline document is useful not only at =
IETF but also in other SDOs planning to use IETF management technologies =
and data models.
The draft will be also discussed in the OPSAWG session in IETF #79.

Any comments and additional contributors are highly appreciated.=20
The next version is planned for end of November before the SGIP F2F =
meeting in Chicago.

Mehmet=20

From: Ersue, Mehmet (NSN - DE/Munich)=20
Sent: Tuesday, October 26, 2010 12:07 AM
To: SGIP-PAP01WG@SMARTGRIDLISTSERV.ORG
Subject: Draft Version of the Document "IETF Network Management =
Framework and Standards"

Hi All,

please find below the link to an early draft document I submitted aiming =
to address the action item from the St.Louis PAP01 meeting.
The document will be also discussed in the coming IETF meeting November =
8-12, 2010.

http://tools.ietf.org/id/draft-ersue-opsawg-management-fw=20

I and some invited contributors will work on the document in the coming =
weeks and update it with subsequent versions.
I would appreciate any comments.

Best Regards,=20
Mehmet Ersue
_____________________________________________________
Nokia Siemens Networks
CTO IE Internet
St.-Martinstrasse 76
81541 Munich
Germany
Mobile: +49 172 8432301
___________________________________________________________
Nokia Siemens Networks GmbH & Co. KG Sitz der Gesellschaft: M=FCnchen / =
Registered office: Munich
Registergericht: M=FCnchen / Commercial registry: Munich, HRA 88537 =
WEEE-Reg.-Nr.: DE 52984304
Pers=F6nlich haftende Gesellschafterin / General Partner: Nokia Siemens =
Networks Management GmbH
Gesch=E4ftsleitung / Board of Directors: Joachim Malterer, Lydia Sommer =
Sitz der Gesellschaft: M=FCnchen /
Registered office: Munich Registergericht: M=FCnchen / Commercial =
registry: Munich, HRB 163416=20


------_=_NextPart_001_01CB751A.407201F6
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40">

<head>
<meta http-equiv=3DContent-Type content=3D"text/html; =
charset=3Diso-8859-1">
<meta name=3DGenerator content=3D"Microsoft Word 12 (filtered medium)">
<base href=3D"http://tools.ietf.org/rfcdiff">
<title>Diff: draft-baker-ietf-core-07.txt - =
sg-ietf-compendium.txt</title>
<style>
<!--
 /* Font Definitions */
 @font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Verdana;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:"\@Arial Unicode MS";
	panose-1:2 11 6 4 2 2 2 2 2 4;}
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{mso-margin-top-alt:auto;
	margin-right:0cm;
	mso-margin-bottom-alt:auto;
	margin-left:0cm;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";
	mso-believe-normal-left:yes;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.small, li.small, div.small
	{mso-style-name:small;
	mso-margin-top-alt:auto;
	margin-right:0cm;
	mso-margin-bottom-alt:auto;
	margin-left:0cm;
	font-size:7.0pt;
	font-family:"Verdana","sans-serif";
	font-style:italic;}
p.left, li.left, div.left
	{mso-style-name:left;
	mso-margin-top-alt:auto;
	margin-right:0cm;
	mso-margin-bottom-alt:auto;
	margin-left:0cm;
	background:#EEEEEE;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
p.right, li.right, div.right
	{mso-style-name:right;
	mso-margin-top-alt:auto;
	margin-right:0cm;
	mso-margin-bottom-alt:auto;
	margin-left:0cm;
	background:white;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
p.diff, li.diff, div.diff
	{mso-style-name:diff;
	mso-margin-top-alt:auto;
	margin-right:0cm;
	mso-margin-bottom-alt:auto;
	margin-left:0cm;
	background:#CCCCFF;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
p.lblock, li.lblock, div.lblock
	{mso-style-name:lblock;
	mso-margin-top-alt:auto;
	margin-right:0cm;
	mso-margin-bottom-alt:auto;
	margin-left:0cm;
	background:#BBFFBB;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
p.rblock, li.rblock, div.rblock
	{mso-style-name:rblock;
	mso-margin-top-alt:auto;
	margin-right:0cm;
	mso-margin-bottom-alt:auto;
	margin-left:0cm;
	background:#FFFF88;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
p.insert, li.insert, div.insert
	{mso-style-name:insert;
	mso-margin-top-alt:auto;
	margin-right:0cm;
	mso-margin-bottom-alt:auto;
	margin-left:0cm;
	background:#88FFFF;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
p.delete, li.delete, div.delete
	{mso-style-name:delete;
	mso-margin-top-alt:auto;
	margin-right:0cm;
	mso-margin-bottom-alt:auto;
	margin-left:0cm;
	background:#AACCFF;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
p.void, li.void, div.void
	{mso-style-name:void;
	mso-margin-top-alt:auto;
	margin-right:0cm;
	mso-margin-bottom-alt:auto;
	margin-left:0cm;
	background:#FFFFBB;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
p.cont, li.cont, div.cont
	{mso-style-name:cont;
	mso-margin-top-alt:auto;
	margin-right:0cm;
	mso-margin-bottom-alt:auto;
	margin-left:0cm;
	background:#EEEEEE;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
p.linebr, li.linebr, div.linebr
	{mso-style-name:linebr;
	mso-margin-top-alt:auto;
	margin-right:0cm;
	mso-margin-bottom-alt:auto;
	margin-left:0cm;
	background:#AAAAAA;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
p.lineno, li.lineno, div.lineno
	{mso-style-name:lineno;
	mso-margin-top-alt:auto;
	margin-right:0cm;
	mso-margin-bottom-alt:auto;
	margin-left:0cm;
	text-align:right;
	background:white;
	font-size:8.5pt;
	font-family:"Times New Roman","serif";
	color:red;}
p.elipsis, li.elipsis, div.elipsis
	{mso-style-name:elipsis;
	mso-margin-top-alt:auto;
	margin-right:0cm;
	mso-margin-bottom-alt:auto;
	margin-left:0cm;
	background:#AAAAAA;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
p.stats, li.stats, div.stats
	{mso-style-name:stats;
	mso-margin-top-alt:auto;
	margin-right:0cm;
	mso-margin-bottom-alt:auto;
	margin-left:0cm;
	background:#EEEEEE;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
p.cont1, li.cont1, div.cont1
	{mso-style-name:cont1;
	mso-margin-top-alt:auto;
	margin-right:0cm;
	mso-margin-bottom-alt:auto;
	margin-left:0cm;
	background:#DDDDDD;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
p.cont2, li.cont2, div.cont2
	{mso-style-name:cont2;
	mso-margin-top-alt:auto;
	margin-right:0cm;
	mso-margin-bottom-alt:auto;
	margin-left:0cm;
	background:#EEEEEE;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
p.cont3, li.cont3, div.cont3
	{mso-style-name:cont3;
	mso-margin-top-alt:auto;
	margin-right:0cm;
	mso-margin-bottom-alt:auto;
	margin-left:0cm;
	background:#99DD99;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
p.cont4, li.cont4, div.cont4
	{mso-style-name:cont4;
	mso-margin-top-alt:auto;
	margin-right:0cm;
	mso-margin-bottom-alt:auto;
	margin-left:0cm;
	background:#DDDD66;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
p.cont5, li.cont5, div.cont5
	{mso-style-name:cont5;
	mso-margin-top-alt:auto;
	margin-right:0cm;
	mso-margin-bottom-alt:auto;
	margin-left:0cm;
	background:#00DDDD;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
p.cont6, li.cont6, div.cont6
	{mso-style-name:cont6;
	mso-margin-top-alt:auto;
	margin-right:0cm;
	mso-margin-bottom-alt:auto;
	margin-left:0cm;
	background:#88AADD;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
p.cont7, li.cont7, div.cont7
	{mso-style-name:cont7;
	mso-margin-top-alt:auto;
	margin-right:0cm;
	mso-margin-bottom-alt:auto;
	margin-left:0cm;
	background:#DDDDDD;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
p.cont8, li.cont8, div.cont8
	{mso-style-name:cont8;
	mso-margin-top-alt:auto;
	margin-right:0cm;
	mso-margin-bottom-alt:auto;
	margin-left:0cm;
	background:#EEEEEE;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
p.cont9, li.cont9, div.cont9
	{mso-style-name:cont9;
	mso-margin-top-alt:auto;
	margin-right:0cm;
	mso-margin-bottom-alt:auto;
	margin-left:0cm;
	background:#99DD99;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
p.cont10, li.cont10, div.cont10
	{mso-style-name:cont10;
	mso-margin-top-alt:auto;
	margin-right:0cm;
	mso-margin-bottom-alt:auto;
	margin-left:0cm;
	background:#DDDD66;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
p.cont11, li.cont11, div.cont11
	{mso-style-name:cont11;
	mso-margin-top-alt:auto;
	margin-right:0cm;
	mso-margin-bottom-alt:auto;
	margin-left:0cm;
	background:#00DDDD;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
p.cont12, li.cont12, div.cont12
	{mso-style-name:cont12;
	mso-margin-top-alt:auto;
	margin-right:0cm;
	mso-margin-bottom-alt:auto;
	margin-left:0cm;
	background:#88AADD;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
p.cont13, li.cont13, div.cont13
	{mso-style-name:cont13;
	mso-margin-top-alt:auto;
	margin-right:0cm;
	mso-margin-bottom-alt:auto;
	margin-left:0cm;
	background:#DDDDDD;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
p.cont14, li.cont14, div.cont14
	{mso-style-name:cont14;
	mso-margin-top-alt:auto;
	margin-right:0cm;
	mso-margin-bottom-alt:auto;
	margin-left:0cm;
	background:#EEEEEE;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
p.cont15, li.cont15, div.cont15
	{mso-style-name:cont15;
	mso-margin-top-alt:auto;
	margin-right:0cm;
	mso-margin-bottom-alt:auto;
	margin-left:0cm;
	background:#99DD99;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
p.cont16, li.cont16, div.cont16
	{mso-style-name:cont16;
	mso-margin-top-alt:auto;
	margin-right:0cm;
	mso-margin-bottom-alt:auto;
	margin-left:0cm;
	background:#DDDD66;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
p.cont17, li.cont17, div.cont17
	{mso-style-name:cont17;
	mso-margin-top-alt:auto;
	margin-right:0cm;
	mso-margin-bottom-alt:auto;
	margin-left:0cm;
	background:#00DDDD;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
p.cont18, li.cont18, div.cont18
	{mso-style-name:cont18;
	mso-margin-top-alt:auto;
	margin-right:0cm;
	mso-margin-bottom-alt:auto;
	margin-left:0cm;
	background:#88AADD;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
span.apple-style-span
	{mso-style-name:apple-style-span;}
span.apple-tab-span
	{mso-style-name:apple-tab-span;}
span.delete1
	{mso-style-name:delete1;
	background:#AACCFF;}
span.insert1
	{mso-style-name:insert1;
	background:#88FFFF;}
span.E-MailFormatvorlage53
	{mso-style-type:personal;
	font-family:"Verdana","sans-serif";
	color:blue;
	font-weight:normal;
	font-style:normal;
	text-decoration:none none;}
span.E-MailFormatvorlage55
	{mso-style-type:personal-reply;
	font-family:"Verdana","sans-serif";
	color:blue;
	font-weight:normal;
	font-style:normal;
	text-decoration:none none;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page Section1
	{size:612.0pt 792.0pt;
	margin:70.85pt 70.85pt 2.0cm 70.85pt;}
div.Section1
	{page:Section1;}
-->
</style>
<![if mso 9]>
<style>
p.MsoNormal
	{margin-left:2.4pt;}
</style>
<![endif]><!--[if gte mso 9]><xml>
 <o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
 <o:shapelayout v:ext=3D"edit">
  <o:idmap v:ext=3D"edit" data=3D"1" />
 </o:shapelayout></xml><![endif]-->
</head>

<body lang=3DDE link=3Dblue vlink=3Dpurple =
style=3D'margin-left:2.4pt;margin-top:2.4pt;
margin-bottom:2.4pt;word-wrap: break-word;-webkit-nbsp-mode: =
space;-webkit-line-break: after-white-space'>

<div class=3DSection1>

<p class=3DMsoNormal><span lang=3DEN-GB =
style=3D'font-size:10.0pt;font-family:"Verdana","sans-serif";
color:blue'>Hi All,<o:p></o:p></span></p>

<p class=3DMsoNormal><span lang=3DEN-GB =
style=3D'font-size:10.0pt;font-family:"Verdana","sans-serif";
color:blue'>as discussed in the SGIP PAP01 meeting in September I =
prepared a
draft on &quot;IETF Network Management Framework and Standards&quot;, =
which
will be further updated and extended with the help of a few contributors =
for
different topics. It is likely that the draft will be splitted after =
some time into
two documents focusing on survey and applicability statement for SG =
environment.
<o:p></o:p></span></p>

<p class=3DMsoNormal><span lang=3DEN-GB =
style=3D'font-size:10.0pt;font-family:"Verdana","sans-serif";
color:blue'>I think such an overview and guideline document is useful =
not only at
IETF but also in other SDOs planning to use IETF management technologies =
and
data models.<br>
The draft will be also discussed in the OPSAWG session in IETF =
#79.<o:p></o:p></span></p>

<p class=3DMsoNormal><span lang=3DEN-GB =
style=3D'font-size:10.0pt;font-family:"Verdana","sans-serif";
color:blue'>Any comments and additional contributors are highly =
appreciated. <br>
The next version is planned for end of November before the SGIP F2F =
meeting in
Chicago.<o:p></o:p></span></p>

<p class=3DMsoNormal><span lang=3DEN-GB =
style=3D'font-size:10.0pt;font-family:"Verdana","sans-serif";
color:blue'>Mehmet</span><span lang=3DEN-GB style=3D'color:blue'> =
</span><span
lang=3DEN-GB =
style=3D'font-size:10.0pt;font-family:"Verdana","sans-serif";
color:blue'><o:p></o:p></span></p>

<div>

<div style=3D'border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt =
0cm 0cm 0cm'>

<p class=3DMsoNormal style=3D'margin:0cm;margin-bottom:.0001pt'><b><span
lang=3DEN-GB =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>From:</span>=
</b><span
lang=3DEN-GB =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'> Ersue,
Mehmet (NSN - DE/Munich) <br>
<b>Sent:</b> Tuesday, October 26, 2010 12:07 AM<br>
<b>To:</b> SGIP-PAP01WG@SMARTGRIDLISTSERV.ORG<br>
<b>Subject:</b> </span><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>Draft
Version of the Document &quot;IETF Network Management Framework and
Standards&quot;<o:p></o:p></span></p>

</div>

</div>

<p class=3DMsoNormal><span lang=3DEN-GB =
style=3D'font-size:10.0pt;font-family:"Verdana","sans-serif";
color:blue'>Hi All,<o:p></o:p></span></p>

<p class=3DMsoNormal><span lang=3DEN-GB =
style=3D'font-size:10.0pt;font-family:"Verdana","sans-serif";
color:blue'>please find below the link to an early draft document I =
submitted
aiming to address the action item from the St.Louis PAP01 meeting.<br>
The document will be also discussed in the coming IETF meeting November =
8-12,
2010.<o:p></o:p></span></p>

<p class=3DMsoNormal><span lang=3DEN-GB =
style=3D'font-size:10.0pt;font-family:"Verdana","sans-serif";
color:blue'><a =
href=3D"http://tools.ietf.org/id/draft-ersue-opsawg-management-fw">http:/=
/tools.ietf.org/id/draft-ersue-opsawg-management-fw</a>
<o:p></o:p></span></p>

<p class=3DMsoNormal><span lang=3DEN-GB =
style=3D'font-size:10.0pt;font-family:"Verdana","sans-serif";
color:blue'>I and some invited contributors will work on the document in =
the
coming weeks and update it with subsequent versions.<br>
I would appreciate any comments.<o:p></o:p></span></p>

<div>

<p class=3DMsoNormal style=3D'margin:0cm;margin-bottom:.0001pt'><span =
lang=3DEN-GB
style=3D'font-size:10.0pt;font-family:"Verdana","sans-serif";color:blue'>=
Best
Regards, <br>
Mehmet Ersue<br>
</span><span lang=3DEN-GB style=3D'font-size:10.0pt;font-family:"@Arial =
Unicode MS","sans-serif";
color:gray'>_____________________________________________________<br>
</span><b><span lang=3DEN-GB =
style=3D'font-size:10.0pt;font-family:"Arial","sans-serif";
color:gray'>Nokia Siemens Networks</span></b><span lang=3DEN-GB =
style=3D'font-size:
11.0pt;font-family:"Calibri","sans-serif";color:blue'><br>
</span><b><span lang=3DEN-GB =
style=3D'font-size:10.0pt;font-family:"Arial","sans-serif";
color:gray'>CTO IE Internet</span></b><span lang=3DEN-GB =
style=3D'font-size:11.0pt;
font-family:"Calibri","sans-serif";color:blue'><br>
</span><b><span lang=3DEN-GB =
style=3D'font-size:10.0pt;font-family:"Arial","sans-serif";
color:gray'>St.-Martinstrasse 76</span></b><span lang=3DEN-GB =
style=3D'font-size:
11.0pt;font-family:"Calibri","sans-serif";color:blue'><br>
</span><b><span lang=3DEN-GB =
style=3D'font-size:10.0pt;font-family:"Arial","sans-serif";
color:gray'>81541 Munich</span></b><span lang=3DEN-GB =
style=3D'font-size:11.0pt;
font-family:"Calibri","sans-serif";color:blue'><br>
</span><b><span lang=3DEN-GB =
style=3D'font-size:10.0pt;font-family:"Arial","sans-serif";
color:gray'>Germany</span></b><span lang=3DEN-GB =
style=3D'font-size:11.0pt;
font-family:"Calibri","sans-serif";color:blue'><br>
</span><b><i><span lang=3DEN-GB =
style=3D'font-size:10.0pt;font-family:"Arial","sans-serif";
color:gray'>Mobile: +49 172 8432301</span></i></b><span lang=3DEN-GB
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:blue'>=
<br>
</span><span lang=3DEN-GB style=3D'font-size:10.0pt;font-family:"@Arial =
Unicode MS","sans-serif";
color:gray'>___________________________________________________________<b=
r>
</span><span lang=3DEN-GB =
style=3D'font-size:7.5pt;font-family:"Verdana","sans-serif";
color:gray'>Nokia Siemens Networks GmbH &amp; Co. </span><span
style=3D'font-size:7.5pt;font-family:"Verdana","sans-serif";color:gray'>K=
G Sitz
der Gesellschaft: M=FCnchen / Registered office: Munich<br>
Registergericht: M=FCnchen / Commercial registry: Munich, HRA 88537
WEEE-Reg.-Nr.: DE 52984304<br>
Pers=F6nlich haftende Gesellschafterin / General Partner: Nokia Siemens =
Networks
Management GmbH<br>
Gesch=E4ftsleitung / Board of Directors: Joachim Malterer, Lydia Sommer =
Sitz der
Gesellschaft: M=FCnchen /<br>
Registered office: Munich Registergericht: M=FCnchen / Commercial =
registry:
Munich, HRB 163416</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";
color:blue'> <o:p></o:p></span></p>

</div>

</div>

</body>

</html>

------_=_NextPart_001_01CB751A.407201F6--

From fred@cisco.com  Wed Oct 27 10:47:06 2010
Return-Path: <fred@cisco.com>
X-Original-To: smartpowerdir@core3.amsl.com
Delivered-To: smartpowerdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 5B1AA3A68B1 for <smartpowerdir@core3.amsl.com>; Wed, 27 Oct 2010 10:47:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -110.388
X-Spam-Level: 
X-Spam-Status: No, score=-110.388 tagged_above=-999 required=5 tests=[AWL=0.211, BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uK53Ew28mukw for <smartpowerdir@core3.amsl.com>; Wed, 27 Oct 2010 10:47:05 -0700 (PDT)
Received: from sj-iport-4.cisco.com (sj-iport-4.cisco.com [171.68.10.86]) by core3.amsl.com (Postfix) with ESMTP id 3C5E83A6888 for <smartpowerdir@ietf.org>; Wed, 27 Oct 2010 10:47:05 -0700 (PDT)
Authentication-Results: sj-iport-4.cisco.com; dkim=neutral (message not signed) header.i=none
X-IronPort-AV: E=Sophos;i="4.58,247,1286150400"; d="scan'208";a="207683342"
Received: from sj-core-1.cisco.com ([171.71.177.237]) by sj-iport-4.cisco.com with ESMTP; 27 Oct 2010 17:48:55 +0000
Received: from Freds-Computer.local (sjc-vpn6-486.cisco.com [10.21.121.230]) by sj-core-1.cisco.com (8.13.8/8.14.3) with ESMTP id o9RHmlkV021901; Wed, 27 Oct 2010 17:48:50 GMT
Received: from [127.0.0.1] by Freds-Computer.local (PGP Universal service); Wed, 27 Oct 2010 10:48:55 -0700
X-PGP-Universal: processed; by Freds-Computer.local on Wed, 27 Oct 2010 10:48:55 -0700
Mime-Version: 1.0 (Apple Message framework v1081)
From: Fred Baker <fred@cisco.com>
In-Reply-To: <4CC861F1.8020400@po.ntts.co.jp>
Date: Wed, 27 Oct 2010 10:48:40 -0700
Message-Id: <923C74C3-1949-4807-B98C-F9482663648E@cisco.com>
References: <4CC85CDF.6010702@po.ntts.co.jp> <10A1401B-0139-495E-AD2B-3734A0FC795F@cisco.com> <4CC861F1.8020400@po.ntts.co.jp>
To: IETF SmartPower Directorate <smartpowerdir@ietf.org>
X-Mailer: Apple Mail (2.1081)
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: quoted-printable
Cc: Satoru Kanno <kanno.satoru@po.ntts.co.jp>, David Meyer <dmm@cisco.com>
Subject: Re: [smartpowerdir] Internet Protocols for the Smart Grid
X-BeenThere: smartpowerdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Members of the Smart Power Directorate <smartpowerdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/smartpowerdir>, <mailto:smartpowerdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/smartpowerdir>
List-Post: <mailto:smartpowerdir@ietf.org>
List-Help: <mailto:smartpowerdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/smartpowerdir>, <mailto:smartpowerdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Oct 2010 17:47:06 -0000

Question - any opinions on NTT proprietary cipher suites in the =
draft-baker-ietf-core?

On Oct 27, 2010, at 10:31 AM, Satoru Kanno wrote:

> Dear Fred,
>=20
> Thank you for your reply.
>=20
> (2010/10/28 2:14), Fred Baker wrote:
>> What is the RFC number?
>>=20
>=20
> o TLS RFC
> RFC5932, Camellia Cipher Suites for TLS
> http://www.ietf.org/rfc/rfc5932.txt
>=20
> o IPsec RFC
> RFC 5529, Modes of Operation for Camellia for Use with IPsec
> http://www.ietf.org/rfc/rfc5529.txt
>=20
> RFC 4312, The Camellia Cipher Algorithm and Its Use With IPsec
> http://www.ietf.org/rfc/rfc4312.txt
>=20
> Regards,
> Satoru
>=20
>> On Oct 27, 2010, at 10:09 AM, Satoru Kanno wrote:
>>=20
>>> Dear Fred,
>>>=20
>>> My name is Satoru Kanno from NTT Software.
>>> I am working at standardization activity for Camellia cipher =
algorithm.
>>>=20
>>> I found your internet draft for 'Internet Protocol for the Smart =
Grid'.
>>>=20
>>> The your draft is referring to AES as suites as IPsec and TLS.
>>> We hope to add the Camellia's RFCs to your draft as OPTIONAL,
>>> because we strongly believe that Camellia has been specified in =
IPsec
>>> and TLS etc in IETF as well as AES.
>>>=20
>>> Additionally, the Smart Grid is important topics for NTT :)
>>>=20
>>> What do you think?
>>>=20
>>> o Camellia Information
>>>  http://info.isl.ntt.co.jp/crypt/eng/camellia/intro.html
>>>=20
>>> o Standardization related information
>>>  http://info.isl.ntt.co.jp/crypt/eng/camellia/standard.html
>>>=20
>>> Best regards,
>>>=20
>>> --
>>> Satoru Kanno
>>>=20
>>> Security Business Unit
>>> Mobile and Security Solution Business Group
>>> NTT Software Corporation
>>>=20
>>> e-mail: kanno.satoru@po.ntts.co.jp
>>>=20
>>=20
>>=20
>=20
>=20
> --=20
> Satoru Kanno
>=20
> Security Business Unit
> Mobile and Security Solution Business Group
> NTT Software Corporation
>=20
> e-mail: kanno.satoru@po.ntts.co.jp
>=20


From vint@google.com  Wed Oct 27 10:56:39 2010
Return-Path: <vint@google.com>
X-Original-To: smartpowerdir@core3.amsl.com
Delivered-To: smartpowerdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 7FF4E3A6888 for <smartpowerdir@core3.amsl.com>; Wed, 27 Oct 2010 10:56:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.477
X-Spam-Level: 
X-Spam-Status: No, score=-106.477 tagged_above=-999 required=5 tests=[AWL=-0.500, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RxpAqTG+VZeZ for <smartpowerdir@core3.amsl.com>; Wed, 27 Oct 2010 10:56:38 -0700 (PDT)
Received: from smtp-out.google.com (smtp-out.google.com [216.239.44.51]) by core3.amsl.com (Postfix) with ESMTP id 1DB823A6828 for <smartpowerdir@ietf.org>; Wed, 27 Oct 2010 10:56:37 -0700 (PDT)
Received: from hpaq1.eem.corp.google.com (hpaq1.eem.corp.google.com [172.25.149.1]) by smtp-out.google.com with ESMTP id o9RHwRVk022140 for <smartpowerdir@ietf.org>; Wed, 27 Oct 2010 10:58:27 -0700
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=google.com; s=beta; t=1288202307; bh=MhDYU+2oma2g7LqF5K9FBdNJVlY=; h=MIME-Version:In-Reply-To:References:Date:Message-ID:Subject:From: To:Cc:Content-Type:Content-Transfer-Encoding; b=EdYox5PN0xtIiRWLHv+AZSKw/PIxmfs324m8EyG6kj7WFMIoJVv2UoDbRi1uLoAYl DlRod3JxubHRU1VVvnvxw==
Received: from qwb7 (qwb7.prod.google.com [10.241.193.71]) by hpaq1.eem.corp.google.com with ESMTP id o9RHvFvi019725 for <smartpowerdir@ietf.org>; Wed, 27 Oct 2010 10:58:26 -0700
Received: by qwb7 with SMTP id 7so952864qwb.3 for <smartpowerdir@ietf.org>; Wed, 27 Oct 2010 10:58:25 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=beta; h=domainkey-signature:mime-version:received:received:in-reply-to :references:date:message-id:subject:from:to:cc:content-type :content-transfer-encoding; bh=8gVr7MnGB8UWsUmuOTT2sSVT/zDj3PFDYLkFwyUGdI8=; b=U2f9/rn9JNgvw/lhNEhM2ljdek+80vNOu+d5QiPFq1LGz07e+D5J4R9h6hUo1zp1KB 2VBN7iEnoQ4TJ4wkVvkw==
DomainKey-Signature: a=rsa-sha1; c=nofws; d=google.com; s=beta; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; b=pPEuMX3dYP9a594iy3+PTw/55MTjDnXHK8d0iJ5ULLHi+YjNyhpZi3S49ix/qZKQ+j 1OY7AqI/4uJXuCzFi9fg==
MIME-Version: 1.0
Received: by 10.224.32.151 with SMTP id c23mr3153790qad.275.1288202305403; Wed, 27 Oct 2010 10:58:25 -0700 (PDT)
Received: by 10.229.114.146 with HTTP; Wed, 27 Oct 2010 10:58:25 -0700 (PDT)
In-Reply-To: <923C74C3-1949-4807-B98C-F9482663648E@cisco.com>
References: <4CC85CDF.6010702@po.ntts.co.jp> <10A1401B-0139-495E-AD2B-3734A0FC795F@cisco.com> <4CC861F1.8020400@po.ntts.co.jp> <923C74C3-1949-4807-B98C-F9482663648E@cisco.com>
Date: Wed, 27 Oct 2010 13:58:25 -0400
Message-ID: <AANLkTi=a3y+_YeNA3C_9cvPxgi=scXhg0pvVYifRkVmX@mail.gmail.com>
From: Vint Cerf <vint@google.com>
To: Fred Baker <fred@cisco.com>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
X-System-Of-Record: true
Cc: David Meyer <dmm@cisco.com>, Satoru Kanno <kanno.satoru@po.ntts.co.jp>, IETF SmartPower Directorate <smartpowerdir@ietf.org>
Subject: Re: [smartpowerdir] Internet Protocols for the Smart Grid
X-BeenThere: smartpowerdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Members of the Smart Power Directorate <smartpowerdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/smartpowerdir>, <mailto:smartpowerdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/smartpowerdir>
List-Post: <mailto:smartpowerdir@ietf.org>
List-Help: <mailto:smartpowerdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/smartpowerdir>, <mailto:smartpowerdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Oct 2010 17:56:39 -0000

I would have thought it preferable to avoid proprietary technology if
at all possible unless it is provided gratis and in perpetuity to
everyone?

v


On Wed, Oct 27, 2010 at 1:48 PM, Fred Baker <fred@cisco.com> wrote:
> Question - any opinions on NTT proprietary cipher suites in the draft-bak=
er-ietf-core?
>
> On Oct 27, 2010, at 10:31 AM, Satoru Kanno wrote:
>
>> Dear Fred,
>>
>> Thank you for your reply.
>>
>> (2010/10/28 2:14), Fred Baker wrote:
>>> What is the RFC number?
>>>
>>
>> o TLS RFC
>> RFC5932, Camellia Cipher Suites for TLS
>> http://www.ietf.org/rfc/rfc5932.txt
>>
>> o IPsec RFC
>> RFC 5529, Modes of Operation for Camellia for Use with IPsec
>> http://www.ietf.org/rfc/rfc5529.txt
>>
>> RFC 4312, The Camellia Cipher Algorithm and Its Use With IPsec
>> http://www.ietf.org/rfc/rfc4312.txt
>>
>> Regards,
>> Satoru
>>
>>> On Oct 27, 2010, at 10:09 AM, Satoru Kanno wrote:
>>>
>>>> Dear Fred,
>>>>
>>>> My name is Satoru Kanno from NTT Software.
>>>> I am working at standardization activity for Camellia cipher algorithm=
.
>>>>
>>>> I found your internet draft for 'Internet Protocol for the Smart Grid'=
.
>>>>
>>>> The your draft is referring to AES as suites as IPsec and TLS.
>>>> We hope to add the Camellia's RFCs to your draft as OPTIONAL,
>>>> because we strongly believe that Camellia has been specified in IPsec
>>>> and TLS etc in IETF as well as AES.
>>>>
>>>> Additionally, the Smart Grid is important topics for NTT :)
>>>>
>>>> What do you think?
>>>>
>>>> o Camellia Information
>>>> =A0http://info.isl.ntt.co.jp/crypt/eng/camellia/intro.html
>>>>
>>>> o Standardization related information
>>>> =A0http://info.isl.ntt.co.jp/crypt/eng/camellia/standard.html
>>>>
>>>> Best regards,
>>>>
>>>> --
>>>> Satoru Kanno
>>>>
>>>> Security Business Unit
>>>> Mobile and Security Solution Business Group
>>>> NTT Software Corporation
>>>>
>>>> e-mail: kanno.satoru@po.ntts.co.jp
>>>>
>>>
>>>
>>
>>
>> --
>> Satoru Kanno
>>
>> Security Business Unit
>> Mobile and Security Solution Business Group
>> NTT Software Corporation
>>
>> e-mail: kanno.satoru@po.ntts.co.jp
>>
>
>

From fred@cisco.com  Thu Oct 28 10:45:21 2010
Return-Path: <fred@cisco.com>
X-Original-To: smartpowerdir@core3.amsl.com
Delivered-To: smartpowerdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id CEFF53A68EB for <smartpowerdir@core3.amsl.com>; Thu, 28 Oct 2010 10:45:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -110.394
X-Spam-Level: 
X-Spam-Status: No, score=-110.394 tagged_above=-999 required=5 tests=[AWL=0.205, BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eINYKI9LRa9P for <smartpowerdir@core3.amsl.com>; Thu, 28 Oct 2010 10:45:20 -0700 (PDT)
Received: from sj-iport-5.cisco.com (sj-iport-5.cisco.com [171.68.10.87]) by core3.amsl.com (Postfix) with ESMTP id EA03A3A686A for <smartpowerdir@ietf.org>; Thu, 28 Oct 2010 10:45:20 -0700 (PDT)
Authentication-Results: sj-iport-5.cisco.com; dkim=neutral (message not signed) header.i=none
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AvsEAHpTyUyrR7H+/2dsb2JhbAChSnGjTJwvhUgEhFeFfIMI
X-IronPort-AV: E=Sophos;i="4.58,253,1286150400"; d="scan'208";a="277349646"
Received: from sj-core-2.cisco.com ([171.71.177.254]) by sj-iport-5.cisco.com with ESMTP; 28 Oct 2010 17:47:13 +0000
Received: from stealth-10-32-244-222.cisco.com (stealth-10-32-244-222.cisco.com [10.32.244.222]) by sj-core-2.cisco.com (8.13.8/8.14.3) with ESMTP id o9SHkaHR011332 for <smartpowerdir@ietf.org>; Thu, 28 Oct 2010 17:47:08 GMT
Received: from [127.0.0.1] by stealth-10-32-244-222.cisco.com (PGP Universal service); Thu, 28 Oct 2010 10:47:13 -0700
X-PGP-Universal: processed; by stealth-10-32-244-222.cisco.com on Thu, 28 Oct 2010 10:47:13 -0700
From: Fred Baker <fred@cisco.com>
Date: Thu, 28 Oct 2010 10:47:08 -0700
References: <8D4701D4-6D03-445E-92E0-4FCBDD5F5EA8@cisco.com>
To: IETF SmartPower Directorate <smartpowerdir@ietf.org>
Message-Id: <E3D54400-6FC1-4C66-B43D-722B76E5BD8D@cisco.com>
Mime-Version: 1.0 (Apple Message framework v1081)
X-Mailer: Apple Mail (2.1081)
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: quoted-printable
Subject: [smartpowerdir] Fwd: PAP #1
X-BeenThere: smartpowerdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Members of the Smart Power Directorate <smartpowerdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/smartpowerdir>, <mailto:smartpowerdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/smartpowerdir>
List-Post: <mailto:smartpowerdir@ietf.org>
List-Help: <mailto:smartpowerdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/smartpowerdir>, <mailto:smartpowerdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Oct 2010 17:45:21 -0000

Begin forwarded message:

> From: Fred Baker <fred@cisco.com>
> Date: October 28, 2010 10:46:30 AM PDT
> To: Ron Ambrosio <rfa@us.ibm.com>
> Cc: SGIP-PAP01WG@SMARTGRIDLISTSERV.ORG
> Subject: PAP #1
>=20
> We had a meeting regarding PAP #1 this morning, primarily discussing=20=

>=20
> http://tools.ietf.org/html/draft-baker-ietf-core
>  "Internet Protocols for the Smart Grid", Fred Baker, Dave Meyer,
>  25-Oct-10
>=20
> which was written at David's request.=20
>=20
> In the meeting this morning, one change was requested, which was the =
citation of SG Networks' architectural picture of the Smart Grid as an =
example of the use of the Internet Protocol Suite in the Smart Grid. The =
IETF will need to review it and make sure it agrees that it is =
reasonable, of course, but I agreed in principle to include the citation =
if he sent the bibliographic information and a URL for an openly =
accessible version of the document.
>=20
> CSWG says it has reviewed it and finds it acceptable, and per the PAP =
closing process we need a similar statement from SGAC. I am also taking =
it into the document, when the above has been finalized, into the IETF =
final review and publication process.

