Re: [6lowapp] CORE charter sent for IESG review

Zach Shelby <zach@sensinode.com> Mon, 15 February 2010 10:34 UTC

Return-Path: <zach@sensinode.com>
X-Original-To: 6lowapp@core3.amsl.com
Delivered-To: 6lowapp@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id BD3B93A7B40 for <6lowapp@core3.amsl.com>; Mon, 15 Feb 2010 02:34:11 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.509
X-Spam-Level:
X-Spam-Status: No, score=-3.509 tagged_above=-999 required=5 tests=[AWL=0.090, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 26TG9lNZFXcd for <6lowapp@core3.amsl.com>; Mon, 15 Feb 2010 02:34:10 -0800 (PST)
Received: from auth-smtp.nebula.fi (auth-smtp.nebula.fi [217.30.180.105]) by core3.amsl.com (Postfix) with ESMTP id EA9133A69F3 for <6lowapp@ietf.org>; Mon, 15 Feb 2010 02:34:09 -0800 (PST)
Received: from [62.145.172.51] ([62.145.172.51]) (authenticated bits=0) by auth-smtp.nebula.fi (8.13.4/8.13.4) with ESMTP id o1FAZWwa018770 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Mon, 15 Feb 2010 12:35:32 +0200
Mime-Version: 1.0 (Apple Message framework v1077)
Content-Type: text/plain; charset="us-ascii"
From: Zach Shelby <zach@sensinode.com>
In-Reply-To: <6DFD7877-9E5A-4E08-906E-90859608473D@cisco.com>
Date: Mon, 15 Feb 2010 12:35:33 +0200
Content-Transfer-Encoding: quoted-printable
Message-Id: <89491867-CB97-4E82-96CB-B95C69419CA8@sensinode.com>
References: <ca722a9e1002121551i58f2575m589d6eba15663c50@mail.gmail.com> <6DFD7877-9E5A-4E08-906E-90859608473D@cisco.com>
To: Cullen Jennings <fluffy@cisco.com>
X-Mailer: Apple Mail (2.1077)
Cc: 6lowapp@ietf.org
Subject: Re: [6lowapp] CORE charter sent for IESG review
X-BeenThere: 6lowapp@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Application protocols for constrained nodes and networks <6lowapp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/6lowapp>, <mailto:6lowapp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/6lowapp>
List-Post: <mailto:6lowapp@ietf.org>
List-Help: <mailto:6lowapp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/6lowapp>, <mailto:6lowapp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 15 Feb 2010 10:34:11 -0000

I updated the Wiki with the updated charter text:

http://trac.tools.ietf.org/area/app/trac/wiki/6LowApp

Zach

On Feb 13, 2010, at 2:55 , Cullen Jennings wrote:

> 
> Lisa sent the following charter to the IESG for review. That review will likely happen next thursday. The IESG may have some comments and/or changes then they will send it out for IETF Last Call. At that point, folks on this list and everyone else can suggest any final changes they think are critical to make. After that it will go back to the IESG and the IESG will make a decision about approving the WG or not. (I think this is highly likely to be approved, it's more an issue in what changes might be needed before it is approved).
> 
> Thanks everyone for all work on this charter. 
> 
> Cullen
> 
> 
> Begin forwarded message:
> 
>> 
>> CoRE (Constrained RESTful Environments)
>> 
>> CoRE is providing a framework for resource-oriented applications
>> intended to run on constrained IP networks.  A constrained IP network
>> has limited packet sizes, may exhibit a high degree of packet loss, and
>> may have a substantial number of devices that may be powered off at any
>> point in time but periodically "wake up" for brief periods of time.
>> These networks and the nodes within them are characterized by severe
>> limits on throughput, available power, and particularly on the
>> complexity that can be supported with limited code size and limited RAM
>> per node.  More generally, we speak of constrained networks whenever at
>> least some of the nodes and networks involved exhibit these
>> characteristics.  Low-Power Wireless Personal Area Networks (LoWPANs)
>> are an example of this type of network.  Constrained networks can occur
>> as part of home and building automation, energy management, and the
>> Internet of Things.
>> 
>> The CoRE working group will define a framework for a limited class of
>> applications: those that deal with the manipulation of simple resources
>> on constrained networks. This includes applications to monitor simple
>> sensors (e.g. temperature sensors, light switches, and power meters), to
>> control actuators (e.g. light switches, heating controllers, and door
>> locks), and to manage devices.
>> 
>> The general architecture consists of nodes on the constrained network,
>> called Devices, that are responsible for one or more Resources that may
>> represent sensors, actuators, combinations of values or other
>> information.  Devices send messages to change and query resources on
>> other Devices. Devices can send notifications about changed resource
>> values to Devices that have subscribed to receive notification about
>> changes. A Device can also publish or be queried about its
>> resources. (Typically a single physical host on the network would have
>> just one Device but a host might represent multiple logical Devices.
>> The specific terminology to be used here is to be decided by the WG.)
>> As part of the framework for building these applications, the WG will
>> define a Constrained Application Protocol (CoAP) for the manipulation of
>> Resources on a Device.
>> 
>> CoAP will be designed for use between Devices on the same constrained
>> network, between Devices and general nodes on the Internet, and between
>> Devices on different constrained networks both joined by an
>> internet. CoAP targets the type of operating environments defined in the
>> ROLL and 6LOWPAN working groups which have additional constraints
>> compared to normal IP networks, but the CoAP protocol will also operate
>> over traditional IP networks.
>> 
>> There also may be proxies that interconnect between other Internet
>> protocols and the Devices using the CoAP protocol.  The WG will define a
>> mapping from CoAP to an HTTP REST API; this mapping will not depend on a
>> specific application. It is worth noting that proxy does not have to
>> occur at the boundary between the constrained network and the more
>> general network, but can be deployed at various locations in the
>> unconstrained network.
>> 
>> CoAP will support various forms of "caching".  For example, if a
>> temperature sensor is normally asleep but wakes up every five minutes
>> and sends the current temperature to a proxy that has subscribed, when
>> the proxy receives a request over HTTP for that temperature resource, it
>> can respond with the last seen value instead of trying to query the
>> Device which is currently asleep.
>> 
>> The initial work item of the WG is to define a protocol specification
>> for CoAP that includes:
>> 
>> 1) The ability to create, read, update and delete a Resource on a
>>  Device.
>> 
>> 2) The ability to allow a Device to publish a value or event to another
>>  Device that has subscribed to be notified of changes, as well as the
>>  way for a Device to subscribe to receive publishes from another
>>  Device.
>> 
>> 3) The ability to support a non-reliable multicast message to be sent to
>>  a group of Devices to manipulate a resource on all the Devices in the
>>  group.
>> 
>> 4) The core CoAP functionality MUST operate well over UDP and UDP MUST
>>  be implemented on CoAP Devices.  There may be OPTIONAL functions in
>>  CoAP (e.g. delivery of larger chunks of data) which if implemented are
>>  implemented over TCP. Applications which require the optional TCP
>>  features will limit themselves to a narrower subset of deployment
>>  cases.
>> 
>> 5) A definition of how to use CoAP to advertise about or query for a
>>  Device's description. This description may include the device name and
>>  a list of its Resources, each with a URL, an interface description URI
>>  (pointing e.g. to a Web Application Description Language (WADL)
>>  document) and an optional name or identifier.  The name taxonomy used
>>  for this description will be consistent with other IETF work,
>>  e.g. draft-cheshire-dnsext-dns-sd.
>> 
>> 6) Specification for the HTTP REST based API and translation to
>>  communicate with Devices. Translation should make use of Device
>>  description information and should not need code updates to deal with
>>  new Devices.
>> 
>> 7) Consider operational and manageability aspects of the protocol and at
>>  a minimum provide a way to tell if a Device is powered on or not.
>> 
>> The working group will not develop a reliable multicast solution, and
>> will not develop a general service discovery solution. There is a desire
>> for discovery and configuration features, but the working group has not
>> yet closed in on an specific approach. Thus, the WG may explore these
>> topics and adopt drafts that define requirements or set problem
>> statements, but will not adopt implementable specifications without a
>> recharter.
>> 
>> Security, particularly keying of new Devices, is very challenging for
>> these applications. The WG will work to select approaches to security
>> bootstrapping which are realistic given the constraints and requirements
>> of the network.  To ensure that any two nodes can join together, all
>> nodes must implement at least one universal bootstrapping method.
>> 
>> Security can be achieved using either session security or object
>> security.  For both object and session security, the WG will work with
>> the security area to select appropriate security framework and protocol
>> as well as selecting a minimal required to implement cipher suite. CoAP
>> will initially look at CMS (RFC 5652), TLS/DTLS, and EAP.
>> 
>> The WG will coordinate on requirements from many organizations including
>> OpenSG/NIST, ZigBee/HomePlug, IPSO Alliance, OASIS, SENSEI,
>> ASHRAE/BACnet; other SDOs and organizations. The WG will closely
>> coordinate with other IETF WGs including ROLL, 6LoWPAN, and appropriate
>> groups in the IETF OPS and Security areas.
>> 
>> Milestones:
>> 
>> Apr 2010 - Select WG document for basis of the CoAP protocol
>> 
>> Dec 2010 - CoAP protocol specification with mapping to HTTP Rest API
>>          submitted to IESG as PS
>> 
>> Dec 2010 - Constrained security bootstrapping specification submitted to
>>          IESG as PS
>> 
>> Jan 2011 - Recharter to add things reduced out of initial scope
> 
> 
> Cullen Jennings
> For corporate legal information go to:
> http://www.cisco.com/web/about/doing_business/legal/cri/index.html
> 
> 
> 
> _______________________________________________
> 6lowapp mailing list
> 6lowapp@ietf.org
> https://www.ietf.org/mailman/listinfo/6lowapp

-- 
http://www.sensinode.com
http://zachshelby.org - My blog "On the Internet of Things"
http://6lowpan.net - New book - "6LoWPAN: The Wireless Embedded Internet"
Mobile: +358 40 7796297

Zach Shelby
Head of Research
Sensinode Ltd.
Kidekuja 2
88610 Vuokatti, FINLAND

This e-mail and all attached material are confidential and may contain legally privileged information. If you are not the intended recipient, please contact the sender and delete the e-mail from your system without producing, distributing or retaining copies thereof.