Re: [6tisch] #35 (architecture): Last call comments: editorial
"6tisch issue tracker" <trac+6tisch@tools.ietf.org> Tue, 07 April 2015 15:41 UTC
Return-Path: <trac+6tisch@tools.ietf.org>
X-Original-To: 6tisch@ietfa.amsl.com
Delivered-To: 6tisch@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 388671B36D6 for <6tisch@ietfa.amsl.com>; Tue, 7 Apr 2015 08:41:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 2.889
X-Spam-Level: **
X-Spam-Status: No, score=2.889 tagged_above=-999 required=5 tests=[BAYES_40=-0.001, J_CHICKENPOX_46=0.6, MANGLED_LIST=2.3, T_RP_MATCHES_RCVD=-0.01] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qEedAprWz-vJ for <6tisch@ietfa.amsl.com>; Tue, 7 Apr 2015 08:41:47 -0700 (PDT)
Received: from zinfandel.tools.ietf.org (zinfandel.tools.ietf.org [IPv6:2001:1890:123a::1:2a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2684E1B3775 for <6tisch@ietf.org>; Tue, 7 Apr 2015 08:37:03 -0700 (PDT)
Received: from localhost ([::1]:51736 helo=zinfandel.tools.ietf.org) by zinfandel.tools.ietf.org with esmtp (Exim 4.82_1-5b7a7c0-XX) (envelope-from <trac+6tisch@tools.ietf.org>) id 1YfVYk-00026I-RK; Tue, 07 Apr 2015 08:37:02 -0700
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
From: 6tisch issue tracker <trac+6tisch@tools.ietf.org>
X-Trac-Version: 0.12.3
Precedence: bulk
Auto-Submitted: auto-generated
X-Mailer: Trac 0.12.3, by Edgewall Software
To: draft-ietf-6tisch-architecture@tools.ietf.org, pthubert@cisco.com
X-Trac-Project: 6tisch
Date: Tue, 07 Apr 2015 15:37:02 -0000
X-URL: http://tools.ietf.org/6tisch/
X-Trac-Ticket-URL: http://trac.tools.ietf.org/wg/6tisch/trac/ticket/35#comment:1
Message-ID: <074.f528eb9e2b43e50e87dec75a65e9a26b@tools.ietf.org>
References: <059.6eb5466618aec504ccb28f2186bd36a6@tools.ietf.org>
X-Trac-Ticket-ID: 35
In-Reply-To: <059.6eb5466618aec504ccb28f2186bd36a6@tools.ietf.org>
X-SA-Exim-Connect-IP: ::1
X-SA-Exim-Rcpt-To: draft-ietf-6tisch-architecture@tools.ietf.org, pthubert@cisco.com, 6tisch@ietf.org
X-SA-Exim-Mail-From: trac+6tisch@tools.ietf.org
X-SA-Exim-Scanned: No (on zinfandel.tools.ietf.org); SAEximRunCond expanded to false
Resent-To: draft-ietf-6tisch-architecture@ietf.org
Resent-Message-Id: <20150407153703.2684E1B3775@ietfa.amsl.com>
Resent-Date: Tue, 07 Apr 2015 08:37:03 -0700
Resent-From: trac+6tisch@tools.ietf.org
Archived-At: <http://mailarchive.ietf.org/arch/msg/6tisch/0WQ8xjpC8-2RicftLBI9oEK5f3w>
Cc: 6tisch@ietf.org
Subject: Re: [6tisch] #35 (architecture): Last call comments: editorial
X-BeenThere: 6tisch@ietf.org
X-Mailman-Version: 2.1.15
List-Id: "Discuss link layer model for Deterministic IPv6 over the TSCH mode of IEEE 802.15.4e, and impacts on RPL and 6LoWPAN such as resource allocation" <6tisch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/6tisch>, <mailto:6tisch-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/6tisch/>
List-Post: <mailto:6tisch@ietf.org>
List-Help: <mailto:6tisch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/6tisch>, <mailto:6tisch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 07 Apr 2015 15:41:51 -0000
#35: Last call comments: editorial Comment (by pthubert@cisco.com): Replying to [ticket:35 shwethab@…]: > '''Chonggang:''' > > · pp. 3, 2nd paragraph, “…control operations such industrial automation…” ---> ““…control operations such as industrial automation…” > · pp.3, 3rd paragraph, “…timeSlotted Channel Hopping …” ---> “…Time Slotted Channel Hopping…” > · pp.3, 4th paragraph, the fulling spelling of TSN was givning in the 2nd paragraph. Then, please put the acronym TSN in the 2nd paragraph > · pp.3, both “deterministic” and “Deterministic” are used in a few places. Better use one form if they mean the same thing throughout the draft. > · pp.4, 2nd paragraph “Route Computation may be achieved in a centralized fashion by a Path Computation Element (PCE), in a distributed fashion using the Routing Protocol for Low Power and Lossy Networks (RPL) [RFC6550], or in a mixed mode”, > o Is RPL claim to be a distributed route computation? I believe in the non-storing mode, the root calculates the route and use source routing to route the packet to the destination. > · pp.4, last two paragraphs from the bottom and a few other place in the draft, “…neighbor Discovery…” ---> “… Neighbor Discovery…” > · pp. 5, section 3, 1st paragraph, “Some aspects of this architecture derive from existing industrial standards for Process Control by its focus on Deterministic Networking, in particular with the use of the IEEE802.15.4e [IEEE802154e] TSCH MAC and a centralized PCE.” > o What are the “existing industrial standard”? WirelessHart? Certain references would help. > · pp.6, the title of Figure could be more complete by saying something like “Figure 1, Basic Configuration of 6TiSCH Network” > · pp. 6, the paragraph under Fig. 1, “neighbor Devices” ---> “neighbor devices” > · pp.6, 2nd paragraph from the bottom, “LLN Border Router (LBR)” were mentioned twice in one sentence. > · pp.8, Figure 3, suggest changing its title to “6TiSCH Protocol Stack” > · pp.8, Figure 3, “6LoWPAN HC” shows between IPv6 and 6top. It is correct but it could imply that only HC is used there – which is not true. Suggest changing 6LoWPAN HC to something like “6LoWPAN (e.g. adaptation, header compression)” > · pp.9, the 4th paragraph, “join process” was introduced all of a sudden. Wonder if it could read more smoothly by briefly mentioning these concepts (e.g. neighbor discovery, join process, track reservation, 6top, packet forwarding, etc.) together and their relationship from architectural perspective somewhere in Section 4 (e.g. at the beginning?). > · pp.9, 3rd paragraph, “TEAS protocol will be required to expose the device capabilities and the network peerings to the PCE, and a protocol such as a lightweight PCEP or an adaptation of CCAMP G-MPLS formats and procedures will be used to publish the tracks, computed by the PCE, to the devices.” > · Can you put the reference about “TEAS” and “CCAMP”? > · pp.10, 2nd paragraph, “should be portable only other LLN link types”. It reads a little awkward and maybe some words missing around “only” > · pp.10, 2nd paragraph, “A new version of the standard is expected in 2015”. What’s “the standard” refer to? > · pp.10, 4th paragraph, do you want to add a reference for ISA100.20? > · pp.16, 4th paragraph, “motes” was used. Can we change it to devices or nodes to make terms more consistent? > · pp.17, 2nd paragraph, “but also allows an upper layer like RPL.” This sentence seems not finished > · pp.18, 2nd paragraph, “that is is not capable of”. One “is” should be removed. > · pp.19, the last paragraph, “an higher layer” ---> “a higher layer” > · pp.19, the last paragraph, “DSCP can therefore be used”. Suggest giving the full spelling and reference to DSCP or removing this sentence. > · pp.19, 5th paragraph, “A 6TISCH Instance is associated to one slotFrame.”, > · Wonder what is a 6TiSCH Instance? Why associate to only “one” Slotframe? In previous paragraph, it mentions “Multiple slotFrames can coexist in a node schedule”. > · pp.21, section 9, both “Static Scheduling” and “Minimal Static Scheduling” are used. Are they the same? > · pp.22, 1st paragraph, “This scheduled can be” ---> “This schedule can be” > · pp.24, section 10.1, 1st paragraph, “A bundle of cells set to receive (RX-cells) is uniquely paired to a bundle of cells that are set to transmit (TX-cells), representing a layer-2 forwarding state that can be used regardless of the network layer protocol.” > · Is a Track uni-directional or bi-directional? Is there any ACK for the transmission? > · pp.27, Figure 6, suggest adding what is the value “set dmac to” and “restore dmac” > · pp.27, section 10.1.3, 1st paragraph, “If the tunnel egress point does not have a MAC address that matches the configuration, the Track installation fails.”, > · Wonder if it is ingress point or egress point that installs the Track > · pp.30, 1st paragraph, “Centralized routes can for example computed”. The word “be” was missing. > · pp.30, section 11, it will be helpful if the difference between routing discussed in this section and forwarding discussed in section 10 could be clarified a little bit > > > ---- > > > Anand: > > > There is just one observation which I could not resist mentioning. It has to do with > the coupling of real-time application demands with the rest of the architecture. There could be > application specific "time critical and sudden" events that might call for on-demand resource allocation. > While we can delegate such an event handling to NME and PCE, perhaps, bringing in an application awareness > to the overall architecture might be useful so that we are not leaving out this possible scenario. > > ---- > > > Maria Rita: > pag 8 LLN odes -> LLN nodes > pag. 19 6TISCH -> 6TiSCH > pag 23 as started -> has started > pag 19 in the definition of CDU matrix, I would specify height and width, and after the timeslot duration (in the current version timeslot duration is in the middle, and it makes a bit hard to read and clearly understand the CDU matrix structure) > pag 7 are we sure we want to mention in the next round of the document we will have evaluated PANA applicability? we may need/want to publish the second part of the architecture before that, we don’t know yet. So, we could skip that, if you agree. > > > ---- > > Rouhollah: > > Page 7 first paragraph. LLN odes > Page 9 end of third paragraph. foster > > 1-Do registration phase may work properly when network builds up, if when RPL tree grows up and extends like a complete tree (I mean in distributed manner). Maybe some additional controls needed later? > > 2-Do you think DICE(figure 3. page 7) should be defined in the Terminology draft. > > Typos: > Page 21. scheduled > > > ---- > > Guillaume: > > 1) The term reallocation/relocation of cells : > 8.1 p16 a cell reallocation > differs from > 9.2 p22 the relocation of a soft cell / relocation is done > => I am not sure if there has been a discussion on this term, but I vote for reallocation. > > 2) 8.2 p16 a set of quality metrics (RSSI, LQI) > I think you cannot be specific to just two metrics (RSSI, LQI). > The words "a set of" allows to define more metrics. And I think it is fine. > => what do you think of : "a set of quality metrics (e.g. RSSI, LQI, etc.) " ? > > 3) 8.2 p16 and used to compute a Rank Increment > The statistics of 6top may have other usages than incrementing the ranks, for upper layers, and for resource management. > => what about : "and used for instance to compute" ? > > 4) 10.2 p28 : a degree of flow control base on => I think it should be "based on". > > 5) (Already pointed out) 11 p 30 Centralized routes con for example computed => be computed > > > ---- > > Jonathan Simon: > 13 - Sending link-layer frames in the clear in the initial stage of joining is not providing any benefit. We should always use authentication, even if the key is not secret, as it provides the ability to reject similar frames from other 802.15.4-based protocols. It also isn’t necessary to discuss such a detail here. > > 13.1 - > * "Triage" - So the JCE decides which nodes are more important and assigns resources to them first? How? Note this term is not used in draft-richardson-6tisch-security-architecture-02. > * "arbitrage" should be “arbitrate” > > Other than that, it seem to be capturing the overall spirit of the security architecture and highlights the open areas of security discussion, e.g. that PANA is an open issue. > > Couple minor points: > > 1) Introduction and 3) Application and Goals sections need review. They kind of wander all over the place. > > 5.1) What does "volume" mean in this context? Is this referring to other as yet defined documents, or later revisions of this document? > > > ---- > > Rene: > One note: the second para of Clause 13 seems out of place and should be removed. > > > ---- > Answer ------ I addressed all the comments doing one commit per; and answer on the ML. The list of commits is in https://bitbucket.org/6tisch/draft-ietf-6tisch- architecture/commits/all , each with a diff. I made the following changes; based on Michael's comments Pascal Thubert ae7ea78 07 2015-03-10 https://bitbucket.org/6tisch /draft-ietf-6tisch- architecture/commits/ae7ea789ac066cb6b31fcdf9e6e8fdc2f6cf667e Pascal Thubert 62b2606 06 final 2015-03-09 https://bitbucket.org/6tisch/draft-ietf-6tisch- architecture/commits/62b2606b48d14cb83f4d1d87c600c3f333cc8f66 Pascal Thubert 2b29626 trailing whitespace removal 2015-02-24 https://bitbucket.org/6tisch/draft-ietf-6tisch- architecture/commits/2b296269f964eae8a7d47216ed90cf969c405a9d Pascal Thubert 28c6316 Maria-Rita's review 2015-02-24 https://bitbucket.org/6tisch/draft-ietf-6tisch- architecture/commits/28c6316289ff06e21adc340c962acca94277de22 Discussion ---------- typos to be fixed: pag 8 LLN odes -> LLN nodes pag. 19 6TISCH -> 6TiSCH pag 23 as started -> has started -> all fixed Moreover, page 19 in the definition of CDU matrix, I would specify height and width, and after the timeslot duration (in the current version timeslot duration is in the middle, and it makes a bit hard to read and clearly understand the CDU matrix structure) -> text now reads: In order to describe that formatting of time and frequencies, the 6TiSCH architecture defines a global concept that is called a Channel Distribution and Usage (CDU) matrix; a CDU matrix is a matrix of cells with an height equal to the number of available channels (indexed by ChannelOffsets) and a width (in timeSlots) that is the period of the network scheduling operation (indexed by slotOffsets) for that CDU matrix. The size of a cell is a timeSlot duration, and values of 10 to 15 milliseconds are typical in 802.15.4e TSCH to accommodate for the transmission of a frame and an ack, including the security validation on the receive side which may take up to a few milliseconds on some device architecture. pag 7 are we sure we want to mention in the next round of the document we will have evaluated PANA applicability? we may need/want to publish the second part of the architecture before that, we don’t know yet. So, we could skip that, if you agree. -> I’d like to leave things open. What about: Future work on 6TiSCH security and will examine in deeper detail how SACM, ACE, DICE, IEEE802.15.9 and eventually PANA and 802.1x may apply to 6TiSCH networks to perform Authentication and Authorization, to secure transactions end-to-end, and to maintain the security posture of a device over its lifetime. The result of that work will be described in a subsequent volume of this architecture. Pascal Thubert 0e07e72 René Struik's review 2015-02-24 https://bitbucket.org/6tisch/draft-ietf-6tisch- architecture/commits/0e07e721ce096cbd02f93c5cfbf9e58e576ac124 Comments: --------- I removed that section, and added an appendix that lists the 6TiSCH personal submissions that may impact the next volumes. The new text reads as follows Appendix A. Personal submissions relevant to the next volumes This volume only covers a portion of the total work that is needed to cover the full 6TiSCH architecture. Missing portions include Deterministic Networking with Track Forwarding, Dynamic Scheduling, and Security. [I-D.richardson-6tisch-security-architecture] elaborates on the potential use of 802.1AR certificates, and some options for the join process are presented in more details. [I-D.struik-6tisch-security-architecture-elements"] describes 6TiSCH security architectural elements with high level requirements and the security framework that are relevant for the design of the 6TiSCH security solution. [I-D.dujovne-6tisch-on-the-fly] discusses the use of the 6top sublayer [I-D.wang-6tisch-6top-sublayer] to adapt dynamically the number of cells between a RPL parent and a child to the needs of the actual traffic. Pascal Thubert c34d7eb ChongGang's review 2015-02-24 https://bitbucket.org/6tisch/draft-ietf-6tisch- architecture/commits/c34d7ebf8abb67a51fb94717480fcc5cc931c572 Pascal Thubert 1a72a0f updated 2015-02-24 https://bitbucket.org/6tisch /draft-ietf-6tisch- architecture/commits/1a72a0f578371be194832d6525c1e502e0055b92 Comments -------- Please see below for details: I have reviewed the architecture draft (-05) and support to publish it. A few minor comments I had are listed below. • pp. 3, 2nd paragraph, “…control operations such industrial automation…” ---> ““…control operations such as industrial automation…” -> done • pp.3, 3rd paragraph, “…timeSlotted Channel Hopping …” ---> “…Time Slotted Channel Hopping…” -> Actually I think the group settled for TimeSlotted, I migrated all to that • pp.3, 4th paragraph, the fulling spelling of TSN was givning in the 2nd paragraph. Then, please put the acronym TSN in the 2nd paragraph -> It was but I changed the format to be more classical • pp.3, both “deterministic” and “Deterministic” are used in a few places. Better use one form if they mean the same thing throughout the draft. -> Done, I used the uppercase because our Deterministic is not the one from math • pp.4, 2nd paragraph “Route Computation may be achieved in a centralized fashion by a Path Computation Element (PCE), in a distributed fashion using the Routing Protocol for Low Power and Lossy Networks (RPL) [RFC6550], or in a mixed mode”, o Is RPL claim to be a distributed route computation? I believe in the non-storing mode, the root calculates the route and use source routing to route the packet to the destination. -> I see what you are saying. I agree that storing mode centralized the computation of routes down but that’s based on a parent selection that is still distributed. I do not think that being very specific like “RPL is mostly distributed but then there can be a bit of centralized computation” will help a lot the understanding of the section. I’d rather leave it at that. • pp.4, last two paragraphs from the bottom and a few other place in the draft, “…neighbor Discovery…” ---> “… Neighbor Discovery…” -> sure, many occurrences fixed • pp. 5, section 3, 1st paragraph, “Some aspects of this architecture derive from existing industrial standards for Process Control by its focus on Deterministic Networking, in particular with the use of the IEEE802.15.4e [IEEE802154e] TSCH MAC and a centralized PCE.” o What are the “existing industrial standard”? WirelessHart? Certain references would help. -> OK, added • pp.6, the title of Figure could be more complete by saying something like “Figure 1, Basic Configuration of 6TiSCH Network” -> OK • pp. 6, the paragraph under Fig. 1, “neighbor Devices” ---> “neighbor devices” -> OK • pp.6, 2nd paragraph from the bottom, “LLN Border Router (LBR)” were mentioned twice in one sentence. ->reworded • pp.8, Figure 3, suggest changing its title to “6TiSCH Protocol Stack” -> Yes, I added envisioned since all is not fully cast in stone • pp.8, Figure 3, “6LoWPAN HC” shows between IPv6 and 6top. It is correct but it could imply that only HC is used there – which is not true. Suggest changing 6LoWPAN HC to something like “6LoWPAN (e.g. adaptation, header compression)” -> added • pp.9, the 4th paragraph, “join process” was introduced all of a sudden. Wonder if it could read more smoothly by briefly mentioning these concepts (e.g. neighbor discovery, join process, track reservation, 6top, packet forwarding, etc.) together and their relationship from architectural perspective somewhere in Section 4 (e.g. at the beginning?). -> will be hard without duplicating a lot; let me think of that one. In any fashion, I can clarify join there. I propose Security is often handled at Layer-2 and Layer 4. Authentication during the process on joining or re-joining the network is discussed in <xref target="sec"/> and the applicability of existing protocols such as the <xref target="RFC5191"> Protocol for Carrying Authentication for Network access (PANA)</xref> will be studied in a next volume of this document. • pp.9, 3rd paragraph, “TEAS protocol will be required to expose the device capabilities and the network peerings to the PCE, and a protocol such as a lightweight PCEP or an adaptation of CCAMP G-MPLS formats and procedures will be used to publish the tracks, computed by the PCE, to the devices.” • Can you put the reference about “TEAS” and “CCAMP”? -> added, text looks like this now: The work on centralized track computation is deferred to a subsequent volume of the architecture. The Path Computation Element (PCE) is certainly the core component of that architecture. Around the PCE, a protocol such as an extension to a TEAS <xref target="TEAS"/> protocol (maybe running over CoAP as illustrated) will be required to expose the device capabilities and the network peers to the PCE, and a protocol such as a lightweight PCEP or an adaptation of CCAMP <xref target="CCAMP"/> G-MPLS formats and procedures will be used to publish the tracks, computed by the PCE, to the devices (maybe in a fashion similar to RSVP-TE). • pp.10, 2nd paragraph, “should be portable only other LLN link types”. It reads a little awkward and maybe some words missing around “only” ->sure! The text now reads The current charter positions 6TiSCH on IEEE802.15.4 only. Though most of the design should be portable on other link types, 6TiSCH has a strong dependency on 802.15.4 and its evolution. • pp.10, 2nd paragraph, “A new version of the standard is expected in 2015”. What’s “the standard” refer to? -> clarified as follows The current charter positions 6TiSCH on IEEE802.15.4 only. Though most of the design should be portable on other link types, 6TiSCH has a strong dependency on IEEE802.15.4 and its evolution. A new version of the IEEE802.15.4 standard is expected in 2015. • pp.10, 4th paragraph, do you want to add a reference for ISA100.20? -> there’s no good link. I added a link to ISA100, and explained what CNM is. ISA100 <xref target="ISA100"/> Common Network Management (CNM) is another external work of interest for 6TiSCH. The group, referred to as ISA100.20, defines a Common Network Management framework that should enable the management of resources that are controlled by heterogeneous protocols such as ISA100.11a <xref target="ISA100.11a"/>, WirelessHART <xref target="WirelessHART"/>, and 6TiSCH. Interestingly, the establishment of 6TiSCH Deterministic paths, called tracks, are also in scope, and ISA100.20 is working on requirements for DetNet. • pp.16, 4th paragraph, “motes” was used. Can we change it to devices or nodes to make terms more consistent? -> moved to devices, but added the following on behalf of the wireless devices (also called motes), • pp.17, 2nd paragraph, “but also allows an upper layer like RPL.” This sentence seems not finished -> OK, the sentence now looks like The receiver of the Enhanced Beacon MAY be listening at the cell to get the Enhanced Beacon ([IEEE802154e]). 6top takes this way to establish broadcast channel, which not only allows TSCH to broadcast Enhanced Beacons, but also allows protocol exchanges by an upper layer such as RPL. • pp.18, 2nd paragraph, “that is is not capable of”. One “is” should be removed. -> ack • pp.19, the last paragraph, “an higher layer” ---> “a higher layer” -> ack • pp.19, the last paragraph, “DSCP can therefore be used”. Suggest giving the full spelling and reference to DSCP or removing this sentence. -> I used ‘Differentiated Services [RFC2474]’ instead • pp.19, 5th paragraph, “A 6TISCH Instance is associated to one slotFrame.”, -> that’s really a 6top internal. Much too detailed, I removed the sentence. • Wonder what is a 6TiSCH Instance? Why associate to only “one” Slotframe? In previous paragraph, it mentions “Multiple slotFrames can coexist in a node schedule”. -> same, that is an internal construct • pp.21, section 9, both “Static Scheduling” and “Minimal Static Scheduling” are used. Are they the same? -> removed minimal. Intention was to say that this is the minimal support • pp.22, 1st paragraph, “This scheduled can be” ---> “This schedule can be” -> gone • pp.24, section 10.1, 1st paragraph, “A bundle of cells set to receive (RX-cells) is uniquely paired to a bundle of cells that are set to transmit (TX-cells), representing a layer-2 forwarding state that can be used regardless of the network layer protocol.” • Is a Track uni-directional or bi-directional? Is there any ACK for the transmission? -> I added A Track is a unidirectional path between a source and a destination. In a Track cell, the normal operation of IEEE802.15.4e Automatic Repeat-reQuest (ARQ) usually happens, though the acknowledgment may be omitted in some cases, for instance if there is no scheduled cell for a retry. • pp.27, Figure 6, suggest adding what is the value “set dmac to” and “restore dmac” -> done • pp.27, section 10.1.3, 1st paragraph, “If the tunnel egress point does not have a MAC address that matches the configuration, the Track installation fails.”, • Wonder if it is ingress point or egress point that installs the Track I think the text is correct. The configuration of the tunnel is yet TBD by this group (RSVP-TE?), but the egress must be able to deliver a packet to the MAC address that is at the end of the tunnel. • pp.30, 1st paragraph, “Centralized routes can for example computed”. The word “be” was missing. fixed • pp.30, section 11, it will be helpful if the difference between routing discussed in this section and forwarding discussed in section 10 could be clarified a little bit Added By forwarding, this specification means the per-packet operation that allows to deliver a packet to a next hop or an upper layer in this node. Forwarding is based on pre-existing state that was installed as a result of a routing computation. Pascal Thubert cca7835 Rouhollah's comments 2015-02-23 https://bitbucket.org/6tisch/draft-ietf-6tisch- architecture/commits/cca78350db5d5ad3a8b031944e44ce15972453ae Comments --------- 1-Do registration phase may work properly when network builds up, if when RPL tree grows up and extends like a complete tree (I mean in distributed manner). Maybe some additional controls needed later? > Unsure what you really mean here. There can be issues with security and the join process work is looking at that. Then there’s RPL use of slotted aloha slots. Then there’s the resource allocation problem (chunks between parents and cells in a parent’s chunk between children). We’ll recharter for all these things but the first volume of the architecture does not cover that. 2-Do you think DICE(figure 3. page 7) should be defined in the Terminology draft. Well, that’s a WG now, unsure what the standard name will be. I can add the following text: “ DTLS In Constrained Environments (DICE) is at the time of this writing the probable way LLN nodes will provide end-to-end security for UDP/CoAP packets.” Typos: Page 21. scheduled Ack On Mon, Feb 16, 2015 at 8:10 PM, Rouhollah Nabati(Google) <rnabati@gmail.com> wrote: Hello All, Page 7 first paragraph. LLN odes ack Page 9 end of third paragraph. foster I missed the issue there? I agree with all Guillaume’s suggested edits. Changes: Pascal Thubert 5c2a38f Guillaume's edits 2015-02-23 https://bitbucket.org/6tisch/draft-ietf-6tisch- architecture/commits/5c2a38ffd0b74695b26551a0ca5b90fd0ab3d7fb -- -------------------------+------------------------------------------------- Reporter: | Owner: draft-ietf-6tisch- shwethab@cisco.com | architecture@tools.ietf.org Type: defect | Status: new Priority: minor | Milestone: Component: | Version: architecture | Resolution: Severity: In WG Last | Call | Keywords: | -------------------------+------------------------------------------------- Ticket URL: <http://trac.tools.ietf.org/wg/6tisch/trac/ticket/35#comment:1> 6tisch <http://tools.ietf.org/6tisch/>
- [6tisch] #35 (architecture): Last call comments: … 6tisch issue tracker
- Re: [6tisch] #35 (architecture): Last call commen… 6tisch issue tracker
- Re: [6tisch] #35 (architecture): Last call commen… Pascal Thubert (pthubert)
- Re: [6tisch] #35 (architecture): Last call commen… Shwetha Bhandari (shwethab)
- Re: [6tisch] #35 (architecture): Last call commen… S.V.R. Anand
- Re: [6tisch] #35 (architecture): Last call commen… S.V.R. Anand
- Re: [6tisch] #35 (architecture): Last call commen… Pascal Thubert (pthubert)
- Re: [6tisch] #35 (architecture): Last call commen… Wang, Chonggang
- Re: [6tisch] #35 (architecture): Last call commen… Maria Rita PALATTELLA
- Re: [6tisch] #35 (architecture): Last call commen… Prof. Diego Dujovne
- Re: [6tisch] #35 (architecture): Last call commen… Guillaume Gaillard
- Re: [6tisch] #35 (architecture): Last call commen… 6tisch issue tracker
- Re: [6tisch] #35 (architecture): Last call commen… 6tisch issue tracker