Re: [6lowapp] Proposed charter for 6LoWAPP BOF

Arjun Roychowdhury <arjun.lists@hsc.com> Thu, 29 October 2009 18:11 UTC

Return-Path: <arjunrc@gmail.com>
X-Original-To: 6lowapp@core3.amsl.com
Delivered-To: 6lowapp@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 9941A3A68FF for <6lowapp@core3.amsl.com>; Thu, 29 Oct 2009 11:11:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.976
X-Spam-Level:
X-Spam-Status: No, score=-1.976 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PbbFNEQYyoAZ for <6lowapp@core3.amsl.com>; Thu, 29 Oct 2009 11:11:47 -0700 (PDT)
Received: from mail-qy0-f203.google.com (mail-qy0-f203.google.com [209.85.221.203]) by core3.amsl.com (Postfix) with ESMTP id 704293A67A8 for <6lowapp@ietf.org>; Thu, 29 Oct 2009 11:11:46 -0700 (PDT)
Received: by qyk41 with SMTP id 41so1351671qyk.29 for <6lowapp@ietf.org>; Thu, 29 Oct 2009 11:11:59 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:sender:reply-to:received :in-reply-to:references:from:date:x-google-sender-auth:message-id :subject:to:cc:content-type; bh=38q+iTsVM3bEkLJv1SjmF1kQseuJyy0p79CX20++Dtc=; b=T24aC/QjsUrCe53HNd7N3EXzb8H66Si/+1RgK9b/dGkhtv9gGMHURr0mUSa0v4lJU+ vW5ZwUz8ek+t7hjV42Njh6v3xIPR4hOKGLU1A+7GlVEdoQ+xeo8RonIIzhSFluuo1JaH TkomDd7UHQQwm5wnZP2iTtYBHTKm/9V6YUGyc=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:sender:reply-to:in-reply-to:references:from:date :x-google-sender-auth:message-id:subject:to:cc:content-type; b=CJ6FL1yKvZaBxFD+IGZ2XdzajfoqGfhaEW9hvGk/3AX9Cr7E6Ly0YCDuBrCDWQp4BI dgeuiNRBr/P0BKmvfGkZTc4K13qrQAUvb9LV8Eai89w3DVtsrj/nI5TyULDIsvN0HSMo 8d3nOAsJaDDNtA9Ybdur6xVskFQ6mTc64zAj4=
MIME-Version: 1.0
Sender: arjunrc@gmail.com
Received: by 10.224.52.144 with SMTP id i16mr234147qag.210.1256839919166; Thu, 29 Oct 2009 11:11:59 -0700 (PDT)
In-Reply-To: <C93E77B9-349F-451C-BAED-273555EEE5DE@cisco.com>
References: <B27B00F8-1A4F-4258-86FC-C02E78778E45@cisco.com> <184E130A-881A-4E1F-8408-FB03A7849A82@sensinode.com> <CE5B892A-3699-4CBF-8B6A-588F5A7DE99A@cisco.com> <EB735931-0D15-4017-94F1-3B10A0EC814D@sensinode.com> <843F0B9E-8C62-47A6-AFEC-4BE31D62CDB5@cisco.com> <2AA1E2A3-9EA9-4B94-85BA-834C66826A85@tzi.org> <C93E77B9-349F-451C-BAED-273555EEE5DE@cisco.com>
From: Arjun Roychowdhury <arjun.lists@hsc.com>
Date: Thu, 29 Oct 2009 14:11:39 -0400
X-Google-Sender-Auth: f5483239cf06eb4b
Message-ID: <a9994e940910291111r5523e6eer581313f8fee12cba@mail.gmail.com>
To: Cullen Jennings <fluffy@cisco.com>
Content-Type: multipart/alternative; boundary=00c09f89999bebe76c047716d87a
Cc: Don Sturek <donsturek@grid2home.com>, 6lowapp@ietf.org
Subject: Re: [6lowapp] Proposed charter for 6LoWAPP BOF
X-BeenThere: 6lowapp@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: arjun.lists@hsc.com
List-Id: Application protocols for constrained nodes and networks <6lowapp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/6lowapp>, <mailto:6lowapp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/6lowapp>
List-Post: <mailto:6lowapp@ietf.org>
List-Help: <mailto:6lowapp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/6lowapp>, <mailto:6lowapp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 29 Oct 2009 18:11:48 -0000

My comments:

The charter seems to combine goals as well as architecture together in one
go. Probably can be simplified ? Specific comments below:


On Thu, Oct 29, 2009 at 2:42 AM, Cullen Jennings <fluffy@cisco.com> wrote:

>
>
> Applications are being developed for networks that have very limed packets
> sizes, have high degree of packet loss, and where a substantial number of
> devices that may be powered of at any point in time but periodically "wake
> up" for beef periods of time. These Networks are referred to as Constrained
> Networks (CNEets). Low-Power Wireless Personal Area Networks (LoWPANs) are
> an example of this type of network. These networks are becoming increasing
> important for applications such as home automation, energy management, and
> the Internet of Things. This working group will define a framework a limited
> class of applications that deal with manipulation of simple resources on
> devices on a CNet. This includes applications to monitor simple sensors such
> as a temperature gauge, light switch, or power meter and control an actuator
> such as a light switch, heating system, or door lock. Typical uses include
> power management and reporting, and home automation.
>

ARC> We are implicitly stating that devices in a lowpan will have simple
management requirements (kind of like set/get mostly). I'd like to see this
group also consider (in terms of usecases) what are the various control
functions that are desirable, given an internet connect ecosystem? I don't
think we should assume that just because most home control was mostly about
simple on/off/read  till date, that is what we should architect for. It is a
minimal requirement, but not complete by itself.



>
> The general architecture consists of nodes on the CNet, called Devices,
> that have one or more Resources that represent sensors and actuators.
> Devices send message to change and query resources on other devices. Devices
> can send notifications about changed resource values to subscribed Devices.
> In other words, the architecture requires push, pull and and a notify
> approach to manipulating resources. As part of the framework for building
> these applications, the WG will define a CNet Application Protocol (CoAP)
> for manipulation or Resources on Devices. The framework will also specify a
> way to define new interface profiles that can be defined by vendors and
> other standards bodies to define the particular Resources on a Device and
> what manipulation are possible.
>
> There are also nodes called PEPs (Performance Enhancing Proxy) that gateway
> between the protocols typically used by the applications on the Internet and
> the protocol used on the CNet. An application on the general network can use
> HTTP REST to communicate with the PEP which will use CoAP to manipulate the
> Resource on the Device. The WG will define a mapping on the PEP from the
> CoAP to the a HTTP  REST API. Each interface profile will define the
> Resources on the device that application can manipulate and what
> manipulations are possible.  This will determine the HTTP REST APIs on the
> PEPs and the CoAP protocol encoding to manipulate the Resources on the
> Device it will also specify an XML MINE type for each class of Device that
> can be used to described the Resource state in the the body of HTTP REST
> messages. The WG may also work on a mapping to SNMP on the PEP. It is worth
> noting that the PEP does not have to be deployed at the boundary of the CNet
> and the more general network but can be deployed at various location in the
> network.
>

ARC> I don't think HTTP to XX mapping should be assumed at this stage. HTTP
may be a popular protocol, but there could be others. So a general goal of
internet protocols to device control protocol mapping is more suitable


>
> The PEP boxes can provide various forms of "caching". For example, if a
> temperature sensor is normally asleep but wakes up every five minutes and
> sends the current temperature to the a PEP that subscribed, when the PEP
> receives a request over HTTP for that temperature resource, it can respond
> with the last seen value instead of trying to query the Device which is
> currently asleep. The PEPs may also provide support for discovering devices
> that may not be currently responding as they are temporarily asleep.
>

ARC> Is this needed as a part of the charter?


>
> The initial work item of the WG are to define:
>
>
>
>
> The CoAP protocol will support three commissioning methodologies.
>
> 1) Duckling mode. One device is put in a "mother duck" mode where it
> listens for broadcasts of Devices trying to imprint. Other Devices are put
> in a "duckling" mode where they broad cast to the "mother duck" Device then
> "imprint" by forming a new shared secret between the two Devices. Once this
> is complete the devices are taken out of this mode and can be use in a
> secure fashion.
>

<etc>

ARC> This seems to be a requirement specification of what a CoAP should be.
I think it should be left for a dedicated req doc, not as part of a charter.


>
> --
Arjun Roychowdhury