Re: [6lowapp] Proposed charter for 6LoWAPP BOF

Jonathan Hui <jhui@archrock.com> Fri, 30 October 2009 05:08 UTC

Return-Path: <jhui@archrock.com>
X-Original-To: 6lowapp@core3.amsl.com
Delivered-To: 6lowapp@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B9F1F3A6961 for <6lowapp@core3.amsl.com>; Thu, 29 Oct 2009 22:08:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tAy84MMdFLsJ for <6lowapp@core3.amsl.com>; Thu, 29 Oct 2009 22:08:05 -0700 (PDT)
Received: from mail.sf.archrock.com (mail.sf.archrock.com [216.121.16.71]) by core3.amsl.com (Postfix) with ESMTP id 2D2DE3A6952 for <6lowapp@ietf.org>; Thu, 29 Oct 2009 22:08:05 -0700 (PDT)
Received: from localhost (localhost.localdomain [127.0.0.1]) by mail.sf.archrock.com (Postfix) with ESMTP id 1AAF0AFA42; Thu, 29 Oct 2009 22:08:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at
Received: from mail.sf.archrock.com ([127.0.0.1]) by localhost (mail.sf.archrock.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DQnbkGpVV-p0; Thu, 29 Oct 2009 22:08:17 -0700 (PDT)
Received: from [10.0.1.199] (adsl-71-142-89-42.dsl.pltn13.pacbell.net [71.142.89.42]) by mail.sf.archrock.com (Postfix) with ESMTP id 372B4AFA3F; Thu, 29 Oct 2009 22:08:17 -0700 (PDT)
Message-Id: <21B63CBB-3197-4985-A2FA-1214F159ADFC@archrock.com>
From: Jonathan Hui <jhui@archrock.com>
To: Cullen Jennings <fluffy@cisco.com>
In-Reply-To: <C93E77B9-349F-451C-BAED-273555EEE5DE@cisco.com>
Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes
Content-Transfer-Encoding: 7bit
Mime-Version: 1.0 (Apple Message framework v936)
Date: Thu, 29 Oct 2009 22:08:16 -0700
References: <B27B00F8-1A4F-4258-86FC-C02E78778E45@cisco.com> <184E130A-881A-4E1F-8408-FB03A7849A82@sensinode.com> <CE5B892A-3699-4CBF-8B6A-588F5A7DE99A@cisco.com> <EB735931-0D15-4017-94F1-3B10A0EC814D@sensinode.com> <843F0B9E-8C62-47A6-AFEC-4BE31D62CDB5@cisco.com> <2AA1E2A3-9EA9-4B94-85BA-834C66826A85@tzi.org> <C93E77B9-349F-451C-BAED-273555EEE5DE@cisco.com>
X-Mailer: Apple Mail (2.936)
Cc: Don Sturek <donsturek@grid2home.com>, 6lowapp@ietf.org
Subject: Re: [6lowapp] Proposed charter for 6LoWAPP BOF
X-BeenThere: 6lowapp@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Application protocols for constrained nodes and networks <6lowapp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/6lowapp>, <mailto:6lowapp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/6lowapp>
List-Post: <mailto:6lowapp@ietf.org>
List-Help: <mailto:6lowapp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/6lowapp>, <mailto:6lowapp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 30 Oct 2009 05:08:06 -0000

Hi Cullen,

This is a good start.  Generally, I think it covers the necessary work  
items.  But while its important to have a focused charter that  
constrains the work, I'd rather have the charter focus on one or more  
target applications rather than a particular solution.  Doing so will  
let the application requirements guide the solutions.  See below:

On Oct 28, 2009, at 11:42 PM, Cullen Jennings wrote:

> 1) A requirements and architecture document that documents the high  
> level boxes and arrows view of the protocol along with high level  
> description of how the security, particular for commissioning of new  
> devices into the network will work. The WG may also produce a  
> document that describes various uses cases that help motivate the  
> requirements.

Generating requirements is the most important first step.  Though, I  
would suggest generating a set of application-specific requirements  
documents for a small and carefully chosen set of applications.  The  
charter should indicate what applications we will work on first.  It  
is useful to call out different applications due to their diversity.   
We did this in ROLL and it allowed us identify a base set of common  
features and those outside the base.  It drives what we work on and  
the solutions.  Just as important, it helped to bring other WG members  
up to speed on the variety of application requirements.  Fortunately,  
we already have a number of individual submissions - but are there  
other not-yet-represented application areas that people want to work on?

I would drop the "and architecture" from "requirements and  
architecture document".  I'd prefer that the requirements docs drive  
the architecture, not specify it.

> 2) Specification of the framework for defining interface profiles  
> and the defining the CoAP. The CoAP will be able to set and query a  
> resource on a Device. It will allow a device to publish a value or  
> event to another Device. It will support a  non-reliable multicast  
> message to be sent to a group of devices to manipulate a resource on  
> all the devices simultaneously (roughly within 50 ms of each other).  
> The protocol will operate over UDP assuming a TBD byte payload and  
> assume an underlying network bandwidth of approximately TBD kbps.  
> The payload will be based on interface profile specific XML document  
> compressed with EXI.

I would drop all the "it will do X, Y, Z".  Let the requirements  
documents guide what the protocol/framework will support.

> 3) Specification on how to use the CoAP to discover Devices on the  
> LoPAN and to interrogate them to find out which interface profiles  
> they support.

Good.

> 4) Specification for the HTTP REST based API on the PEP to  
> communicate with Devices.
>
> 4a) Possibly specify a separate specifications with mappings to  
> SNMP. [[NOte: In the BOF it would be nice to figure out if this is  
> in the charter or not.]]

A REST/HTTP interface to the nodes is useful.  But based on my  
experience, such a device provides the most benefit as a full-blown  
gateway, not just a proxy.  In particular, just intercepting requests  
is not sufficient.  For example, the gateway may queue data/events  
sent periodically by a node which are slurped up by a REST/HTTP  
client.  The gateway may also provide additional metadata about the  
data (e.g. when it was received).  There's a number of additional non- 
proxy-like functions I can think of.  So I'd suggest changing the name  
to indicate gateway.

> 5) A small set of basic interface profiles to illustrate how this is  
> done. Interface profiles will be done for a power meter, a light and  
> light switch, and temperature sensor.

Again, let the set of application requirements drive the specific  
interface profiles we develop.

> 6) A document with operation and management advice about running a  
> network using these applications.

Good.

> Security, particularly keying of new Devices, is very challenging  
> for these applications. On one hand this needs to support models  
> where an end user can introduce a new device onto their network that  
> may have no display or not input capability's. On the other end this  
> may transport information about alarm systems or controlling door  
> locks to a building over a wireless network.

Important as well.  Though I wouldn't go so far as to say what is  
mandatory and what is not in the charter.

--
Jonathan Hui