[6lo] Fwd: I-D Action: draft-ietf-6lo-use-cases-07.txt

Yong-Geun Hong <yonggeun.hong@gmail.com> Wed, 11 September 2019 04:13 UTC

Return-Path: <yonggeun.hong@gmail.com>
X-Original-To: 6lo@ietfa.amsl.com
Delivered-To: 6lo@ietfa.amsl.com
Received: from localhost (localhost []) by ietfa.amsl.com (Postfix) with ESMTP id 8C94B120814 for <6lo@ietfa.amsl.com>; Tue, 10 Sep 2019 21:13:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.997
X-Spam-Status: No, score=-1.997 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([]) by localhost (ietfa.amsl.com []) (amavisd-new, port 10024) with ESMTP id gDwHefa75Gu8 for <6lo@ietfa.amsl.com>; Tue, 10 Sep 2019 21:13:11 -0700 (PDT)
Received: from mail-lj1-x22e.google.com (mail-lj1-x22e.google.com [IPv6:2a00:1450:4864:20::22e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AEC5B1200C7 for <6lo@ietf.org>; Tue, 10 Sep 2019 21:13:10 -0700 (PDT)
Received: by mail-lj1-x22e.google.com with SMTP id j16so18593818ljg.6 for <6lo@ietf.org>; Tue, 10 Sep 2019 21:13:10 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to; bh=0E9nT63ni8t8Od8dm78YtIJhp1RLQp8tZ9KSmHUXNJY=; b=uwVzct5HQymbWf4mUhvQq7bjkW7ux1b9EhDK9WoAb2ap5ipCl9u3vwPjMofyV5xSVm 6SZpO6rJjo5gDNf4JUiR0LZsXIXXFsWPgKREYmIUG5zSh1jm1qE/BpGDro2WLVowzehK LSQYo+e++ZJzCpj5WQpnaOhHhrRemENd1Aj0J2molDVdNkOg/xvh005izK06Ch6o2+Kz ScTnJWZz+FwUt2ojFYeQBuNfk65n97Vf3QzUfjPsEMyQVkRzSufmPduqAK5P3/8gNmqf tRuYo4gkl1I0tZpV5J/pJDPov/oz1JNxpY753z5WuFCERfTuc6cqH+LeA5jWl8oXROj1 U4/Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to; bh=0E9nT63ni8t8Od8dm78YtIJhp1RLQp8tZ9KSmHUXNJY=; b=XYzV3wCDy1OL0KslpzB9jH0kFZZvsi2EmeMIkk2cpD0p88rC6mvBYhRWQGsYNSF+bd qzvwaUt672alW/ncbktpGmAfZhHe5BXTYBSc9IAZ1z4OtRrCYzjUsIYdXlLitVp5VZDd 44TebWmu5DLhTeHCfXBB3/QFHXdssDnApOzik/vu18qpkG/GsEOZbWyNgxsgdqumxW4x Q5UvperHMnVbfQc/cmOvpDyJi9QE6tjEIb9xLG6QPg82KV4hbqmdFGACImUemqJ2ELlO n9p3b6kpuGqtYBEIGhxz2GnnPGhIo/B64Zx2/WcUti5DljSXzpBqR7q4CsbccSss0k7T nqwQ==
X-Gm-Message-State: APjAAAUj/lR6t1eBGP1oCINNSpxRrbactcQQjY0gPucFzDQBApoNaD9b bvt0ZwDMt2OTL3k1CvP77ZDr52Ve3SNSFa4Kj6z6xWzU
X-Google-Smtp-Source: APXvYqwYHTuJsXqZN++m0xdxjyTeuy19IQJk8WoCdP+7Mmi8gKBIFkvUk0yu+h275xGI7QbJm56RPPGK1DLP0LXOiI8=
X-Received: by 2002:a2e:861a:: with SMTP id a26mr16335224lji.163.1568175188581; Tue, 10 Sep 2019 21:13:08 -0700 (PDT)
MIME-Version: 1.0
References: <156817332050.22468.10581099459643843624@ietfa.amsl.com>
In-Reply-To: <156817332050.22468.10581099459643843624@ietfa.amsl.com>
From: Yong-Geun Hong <yonggeun.hong@gmail.com>
Date: Wed, 11 Sep 2019 13:12:57 +0900
Message-ID: <CACt2foEVRM2qwUU9AZH+MED_rrZcvAQBDFQVT7M0Xvw5y0zv7w@mail.gmail.com>
To: lo <6lo@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000000fa20b05923f3d3b"
Archived-At: <https://mailarchive.ietf.org/arch/msg/6lo/_fIgC0p9NYpev8avoCg-xp12N5c>
Subject: [6lo] Fwd: I-D Action: draft-ietf-6lo-use-cases-07.txt
X-BeenThere: 6lo@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Mailing list for the 6lo WG for Internet Area issues in IPv6 over constrained node networks." <6lo.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/6lo>, <mailto:6lo-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/6lo/>
List-Post: <mailto:6lo@ietf.org>
List-Help: <mailto:6lo-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/6lo>, <mailto:6lo-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 11 Sep 2019 04:13:13 -0000


We have submitted the updated version of 6lo use cases draft.
The goal of this draft is to help 6lo stack adaptation by a
L2-constrained technology and help a newcomer understand how 6lo
stack can be applicable in practice. In the last meeting, there was a
comment that this draft should be more focused and narrowed down. To solve
this comment, we updated this draft. The following are the updated parts
from the previous version.

- Remove related part with IEEE 802.15.4 and IEEE 802.15.4e
. In previous 06-version draft, section 3.7, 4.1, 4.2, and A.6 are removed
. Update Table 2, Comparing between 6lo link layer technologies
- Rename of the title of section 3 to “6lo Link layer technologies”
- Remove "specified" from the subsection titles in section 3
- Reduce section 5 to only section 5.2 and rename of the title of section 5
to “Guidelines for adopting IPv6 stack (6lo/6LoWPAN)”
- Move original contents of section 5.1 (Design Space Dimensions for 6lo
Deployment) into Appendix
- Move other 6lo use cases examples in Appendix A into Section 6.

It is appreciate to review and comment.

Best regards.


IOT@IETF.---------- Forwarded message ---------
From: <internet-drafts@ietf.org>
Date: Wed, Sep 11, 2019 at 12:42 PM
Subject: [6lo] I-D Action: draft-ietf-6lo-use-cases-07.txt
To: <i-d-announce@ietf.org>
Cc: <6lo@ietf.org>

A New Internet-Draft is available from the on-line Internet-Drafts
This draft is a work item of the IPv6 over Networks of Resource-constrained
Nodes WG of the IETF.

        Title           : IPv6 over Constrained Node Networks (6lo)
Applicability & Use cases
        Authors         : Yong-Geun Hong
                          Carles Gomez
                          Abdur Rashid Sangi
                          Take Aanstoot
                          Samita Chakrabarti
        Filename        : draft-ietf-6lo-use-cases-07.txt
        Pages           : 23
        Date            : 2019-09-10

   This document describes the applicability of IPv6 over constrained
   node networks (6lo) and provides practical deployment examples.  In
   addition to IEEE 802.15.4, various link layer technologies such as
   ITU-T G.9959 (Z-Wave), BLE, DECT-ULE, MS/TP, NFC, and PLC (IEEE
   1901.2) are used as examples.  The document targets an audience who
   like to understand and evaluate running end-to-end IPv6 over the
   constrained node networks connecting devices to each other or to
   other devices on the Internet (e.g. cloud infrastructure).

The IETF datatracker status page for this draft is:

There are also htmlized versions available at:

A diff from the previous version is available at:

Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:

6lo mailing list