Re: [6lowapp] Architecture Sketch in Charter

Shidan <shidan@gmail.com> Tue, 03 November 2009 22:57 UTC

Return-Path: <shidan@gmail.com>
X-Original-To: 6lowapp@core3.amsl.com
Delivered-To: 6lowapp@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id BA91B3A68F3 for <6lowapp@core3.amsl.com>; Tue, 3 Nov 2009 14:57:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.324
X-Spam-Level:
X-Spam-Status: No, score=-2.324 tagged_above=-999 required=5 tests=[AWL=0.274, BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id m3GJZlHPsD8X for <6lowapp@core3.amsl.com>; Tue, 3 Nov 2009 14:57:54 -0800 (PST)
Received: from mail-ew0-f207.google.com (mail-ew0-f207.google.com [209.85.219.207]) by core3.amsl.com (Postfix) with ESMTP id 7E8813A6897 for <6lowapp@ietf.org>; Tue, 3 Nov 2009 14:57:54 -0800 (PST)
Received: by ewy3 with SMTP id 3so2534473ewy.37 for <6lowapp@ietf.org>; Tue, 03 Nov 2009 14:58:12 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:cc:content-type; bh=ECGy7oD5iz5Jlk0RzT1yjWJqoHzdCuR7UuDzVFSgPt8=; b=h7dadlAsAMVEKdlAOFFLw7/Y0+M1BAD7seAzS4R1xAYaIUGxF38JkwMQ5LBs2QiPFv ARr1ZchrIVulnQ35I9pA8rz4zwWViDBLspOOoM7kw0bYN3LLyJOesjBwmjd0jRz/DBAB 5s/oSB5ev1GV5Q9FG5awVb5cne/iASGVqpYRA=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; b=taye8yY1cbUk/ym11gtIHbu0pETtLYRzJdX6AryEpG4qKvlSyBWznoC5mkKcWIjbhD czRG4z2ZlLfw3HyGk2M2lUT7rvnsC5YJd6ntGBcmNTxVJklaG5Hp9wOgKmvzYMNhkH/r ttte/NJSMp+ZBhbbhlNGnItyj0xOuoqLJW5qM=
MIME-Version: 1.0
Received: by 10.216.86.201 with SMTP id w51mr221537wee.8.1257289092260; Tue, 03 Nov 2009 14:58:12 -0800 (PST)
In-Reply-To: <429b380e0911031456y67a2e95cx1151de4403a5eda5@mail.gmail.com>
References: <D53A5549-FE08-460B-91D9-673DB9C81720@cisco.com> <429b380e0910311541ve2666fcjdc27d63aaddb696@mail.gmail.com> <DBFDAD96-5F5D-41DE-9BA0-B0326BFDFF73@cisco.com> <429b380e0911031348x4c9985a8sd554f5c322836c24@mail.gmail.com> <F4612C4F-98F4-4D1C-B81E-E683FAA0448C@tzi.org> <429b380e0911031456y67a2e95cx1151de4403a5eda5@mail.gmail.com>
Date: Tue, 3 Nov 2009 17:58:12 -0500
Message-ID: <429b380e0911031458m5695fef9id013c885c41fc21@mail.gmail.com>
From: Shidan <shidan@gmail.com>
To: Carsten Bormann <cabo@tzi.org>
Content-Type: multipart/alternative; boundary=0016e6d99d05b9626f04777f6dab
Cc: 6lowapp@ietf.org
Subject: Re: [6lowapp] Architecture Sketch in Charter
X-BeenThere: 6lowapp@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Application protocols for constrained nodes and networks <6lowapp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/6lowapp>, <mailto:6lowapp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/6lowapp>
List-Post: <mailto:6lowapp@ietf.org>
List-Help: <mailto:6lowapp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/6lowapp>, <mailto:6lowapp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 03 Nov 2009 22:57:55 -0000

"Also, if we can avoid creating something from scratch, that in itself is
doing the simplest thing that could possibly work."

Or I should say could be, not is.

On Tue, Nov 3, 2009 at 5:56 PM, Shidan <shidan@gmail.com> wrote:

> Hi Carsten, I definitely agree and thats an interesting Google search. But
> we should do no less than is required as well. Also, if we can avoid
> creating something from scratch, that in itself is doing the simplest thing
> that could possibly work.
>
> Shidan Gouran
>
>
> On Tue, Nov 3, 2009 at 5:18 PM, Carsten Bormann <cabo@tzi.org> wrote:
>
>> On Nov 3, 2009, at 22:48, Shidan wrote:
>>
>>  Everything
>>>
>>
>> The idea behind CoAP (Constrained-node/network Application Protocol) is to
>> have something very simple, very basic, that can be used to run applications
>> that involve constrained IP nodes on constrained networks.  "Everything" is
>> not the first word that comes to my mind here.  I'd prefer "Do the simplest
>> thing that could possibly work".  (That is actually a googleable phrase.)
>>
>> Gruesse, Carsten
>>
>>
>