Re: [6tisch] #35 (architecture): Last call comments: editorial
Guillaume Gaillard <guillaume.gaillard.maze@gmail.com> Fri, 24 April 2015 13:51 UTC
Return-Path: <guillaume.gaillard.maze@gmail.com>
X-Original-To: 6tisch@ietfa.amsl.com
Delivered-To: 6tisch@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D664E1B2E1B for <6tisch@ietfa.amsl.com>; Fri, 24 Apr 2015 06:51:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.901
X-Spam-Level:
X-Spam-Status: No, score=0.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, J_CHICKENPOX_46=0.6, MANGLED_LIST=2.3, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Fx2CFtEFRUba for <6tisch@ietfa.amsl.com>; Fri, 24 Apr 2015 06:51:27 -0700 (PDT)
Received: from mail-lb0-x230.google.com (mail-lb0-x230.google.com [IPv6:2a00:1450:4010:c04::230]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CB7DD1B2FE3 for <6tisch@ietf.org>; Fri, 24 Apr 2015 06:51:19 -0700 (PDT)
Received: by lbbuc2 with SMTP id uc2so36956019lbb.2 for <6tisch@ietf.org>; Fri, 24 Apr 2015 06:51:18 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=lY2l0uVP5FNNELDde+l4AeoA6s4kgUaRuxwV0W+vERM=; b=z6IOcdHWsW2zbYZH0bqlJWUH9Ke08XLOGOs8OemF2yOow2OrZRL34J1JfBjimDoViX gYu4ch79SFwwO6SJaa2Go+3iHnBjyg/I7DfAMlQDYmddnPvyskKh3TqfTp0T9eTyvlTD Zacy0DMUlvTFoKrLRwDwJp49oRwdcaXaExD57R7UF8VE8+jP4ti4qRtHk86JlUucaL3i F0mh5Z2dLL+sqPmxqhEXFZLj93RcG0bUXpRCUGK3f6kCeEvDvuqIyBLoQtyKtp3Cc8K0 jbM4yXtogaugukmdZfc/3J7AswJni9ycDCKCt2zvjP6uYKpLMmnCM+3nKwN4WtoyB2li CfFA==
MIME-Version: 1.0
X-Received: by 10.152.27.35 with SMTP id q3mr6966818lag.24.1429883478272; Fri, 24 Apr 2015 06:51:18 -0700 (PDT)
Received: by 10.25.134.84 with HTTP; Fri, 24 Apr 2015 06:51:18 -0700 (PDT)
In-Reply-To: <CAH7SZV_kxEUN1aYtFXYe2Pk9y3v17crRHtqs6XADZcvncqqt3w@mail.gmail.com>
References: <074.f528eb9e2b43e50e87dec75a65e9a26b@tools.ietf.org> <D15E7BDF.2322C2%shwethab@cisco.com> <988A85FFFC503944A7588C70D4A6F1171A631289@NABESITE.InterDigital.com> <CAH7SZV_kxEUN1aYtFXYe2Pk9y3v17crRHtqs6XADZcvncqqt3w@mail.gmail.com>
Date: Fri, 24 Apr 2015 15:51:18 +0200
Message-ID: <CAMHDfJ7VHz2gCmsZUxb+2pCRr_cCRqs=tH=N8P4MtZ8q+FFAgg@mail.gmail.com>
From: Guillaume Gaillard <guillaume.gaillard.maze@gmail.com>
To: "Shwetha Bhandari (shwethab)" <shwethab@cisco.com>
Content-Type: multipart/alternative; boundary="089e0160b7cacaf19a051478b0a0"
Archived-At: <http://mailarchive.ietf.org/arch/msg/6tisch/8-uZtvLJRRhgJK0ACYw5ebbCSnI>
Cc: Thomas Watteyne <watteyne@eecs.berkeley.edu>, "6tisch@ietf.org" <6tisch@ietf.org>, "draft-ietf-6tisch-architecture@tools.ietf.org" <draft-ietf-6tisch-architecture@tools.ietf.org>, "Pascal Thubert (pthubert)" <pthubert@cisco.com>, 6tisch issue tracker <trac+6tisch@tools.ietf.org>
Subject: Re: [6tisch] #35 (architecture): Last call comments: editorial
X-BeenThere: 6tisch@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Discuss link layer model for Deterministic IPv6 over the TSCH mode of IEEE 802.15.4e, and impacts on RPL and 6LoWPAN such as resource allocation" <6tisch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/6tisch>, <mailto:6tisch-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/6tisch/>
List-Post: <mailto:6tisch@ietf.org>
List-Help: <mailto:6tisch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/6tisch>, <mailto:6tisch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 24 Apr 2015 13:51:36 -0000
Hello Shwetha, My comments are addressed in version -07. Regards, Guillaume 2015-04-24 15:38 GMT+02:00 Prof. Diego Dujovne <diego.dujovne@mail.udp.cl>: > Swetha, > I also don't have any further comments. > Regards, > > Diego Dujovne > > 2015-04-24 10:24 GMT-03:00 Wang, Chonggang < > Chonggang.Wang@interdigital.com>: > > Hi Shwetha, >> >> I do not have further comments. >> >> Thanks, >> Chonggang >> >> -----Original Message----- >> From: 6tisch [mailto:6tisch-bounces@ietf.org] On Behalf Of Shwetha >> Bhandari (shwethab) >> Sent: Thursday, April 23, 2015 1:11 AM >> To: 6tisch issue tracker; draft-ietf-6tisch-architecture@tools.ietf.org; >> Pascal Thubert (pthubert) >> Cc: 6tisch@ietf.org >> Subject: Re: [6tisch] #35 (architecture): Last call comments: editorial >> >> Hello Reviewers, >> >> With -07 the authors and I (as the shepherd of this draft) believe all >> the comments have been addressed. >> I will close this ticket and proceed with the submission of the draft for >> IESG review by end of this week (25th April). Please respond if you think >> there are unaddressed comments. >> >> Thanks, >> Shwetha >> >> On 4/7/15 9:07 PM, "6tisch issue tracker" <trac+6tisch@tools.ietf.org> >> wrote: >> >> >#35: Last call comments: editorial >> > >> > >> >Comment (by pthubert@cisco.com): >> > >> > Replying to [ticket:35 shwethab@Š]: >> > > '''Chonggang:''' >> > > >> > > · pp. 3, 2nd paragraph, ³Šcontrol operations such industrial >> > automationŠ² ---> ³³Šcontrol operations such as industrial >> > automationŠ² >> > > · pp.3, 3rd paragraph, ³ŠtimeSlotted Channel Hopping Š² ---> >> > ³ŠTime Slotted Channel HoppingŠ² >> > > · pp.3, 4th paragraph, the fulling spelling of TSN was givning >> > in the 2nd paragraph. Then, please put the acronym TSN in the 2nd >> > paragraph >> > > · pp.3, both ³deterministic² and ³Deterministic² are used in a >> > few places. Better use one form if they mean the same thing throughout >> >the draft. >> > > · pp.4, 2nd paragraph ³Route Computation may be achieved in a >> > centralized fashion by a Path Computation Element (PCE), in a >> > distributed fashion using the Routing Protocol for Low Power and Lossy >> > Networks (RPL) [RFC6550], or in a mixed mode², >> > > o Is RPL claim to be a distributed route computation? I believe in >> >the >> > non-storing mode, the root calculates the route and use source routing >> >to route the packet to the destination. >> > > · pp.4, last two paragraphs from the bottom and a few other >> > place in the draft, ³Šneighbor DiscoveryŠ² ---> ³Š Neighbor >> > DiscoveryŠ² >> > > · pp. 5, section 3, 1st paragraph, ³Some aspects of this >> > architecture derive from existing industrial standards for Process >> >Control by its focus on Deterministic Networking, in particular with >> >the use of the IEEE802.15.4e [IEEE802154e] TSCH MAC and a centralized >> >PCE.² >> > > o What are the ³existing industrial standard²? WirelessHart? Certain >> > references would help. >> > > · pp.6, the title of Figure could be more complete by saying >> > something like ³Figure 1, Basic Configuration of 6TiSCH Network² >> > > · pp. 6, the paragraph under Fig. 1, ³neighbor Devices² ---> >> > ³neighbor devices² >> > > · pp.6, 2nd paragraph from the bottom, ³LLN Border Router >> >(LBR)² >> > were mentioned twice in one sentence. >> > > · pp.8, Figure 3, suggest changing its title to ³6TiSCH >> >Protocol >> > Stack² >> > > · pp.8, Figure 3, ³6LoWPAN HC² shows between IPv6 and 6top. It >> > is correct but it could imply that only HC is used there which is >> > not true. Suggest changing 6LoWPAN HC to something like ³6LoWPAN (e.g. >> > adaptation, header compression)² >> > > · pp.9, the 4th paragraph, ³join process² was introduced all >> of >> > a sudden. Wonder if it could read more smoothly by briefly mentioning >> >these concepts (e.g. neighbor discovery, join process, track >> >reservation, 6top, packet forwarding, etc.) together and their >> >relationship from architectural perspective somewhere in Section 4 >> >(e.g. at the beginning?). >> > > · pp.9, 3rd paragraph, ³TEAS protocol will be required to >> >expose >> > the device capabilities and the network peerings to the PCE, and a >> >protocol such as a lightweight PCEP or an adaptation of CCAMP G-MPLS >> >formats and procedures will be used to publish the tracks, computed by >> >the PCE, to the devices.² >> > > · Can you put the reference about ³TEAS² and ³CCAMP²? >> > > · pp.10, 2nd paragraph, ³should be portable only other LLN >> link >> > types². It reads a little awkward and maybe some words missing around >> > ³only² >> > > · pp.10, 2nd paragraph, ³A new version of the standard is >> > expected in 2015². What¹s ³the standard² refer to? >> > > · pp.10, 4th paragraph, do you want to add a reference for >> > ISA100.20? >> > > · pp.16, 4th paragraph, ³motes² was used. Can we change it to >> > devices or nodes to make terms more consistent? >> > > · pp.17, 2nd paragraph, ³but also allows an upper layer like >> > RPL.² This sentence seems not finished >> > > · pp.18, 2nd paragraph, ³that is is not capable of². One ³is² >> > should be removed. >> > > · pp.19, the last paragraph, ³an higher layer² ---> ³a higher >> > layer² >> > > · pp.19, the last paragraph, ³DSCP can therefore be used². >> > Suggest giving the full spelling and reference to DSCP or removing >> > this sentence. >> > > · pp.19, 5th paragraph, ³A 6TISCH Instance is associated to >> one >> > slotFrame.², >> > > · Wonder what is a 6TiSCH Instance? Why associate to only >> ³one² >> > Slotframe? In previous paragraph, it mentions ³Multiple slotFrames can >> > coexist in a node schedule². >> > > · pp.21, section 9, both ³Static Scheduling² and ³Minimal >> >Static >> > Scheduling² are used. Are they the same? >> > > · pp.22, 1st paragraph, ³This scheduled can be² ---> ³This >> > schedule can be² >> > > · pp.24, section 10.1, 1st paragraph, ³A bundle of cells set >> to >> > receive (RX-cells) is uniquely paired to a bundle of cells that are >> >set to transmit (TX-cells), representing a layer-2 forwarding state >> >that can be used regardless of the network layer protocol.² >> > > · Is a Track uni-directional or bi-directional? Is there any >> >ACK >> > for the transmission? >> > > · pp.27, Figure 6, suggest adding what is the value ³set dmac >> > to² and ³restore dmac² >> > > · pp.27, section 10.1.3, 1st paragraph, ³If the tunnel egress >> > point does not have a MAC address that matches the configuration, the >> > Track installation fails.², >> > > · Wonder if it is ingress point or egress point that installs >> > the Track >> > > · pp.30, 1st paragraph, ³Centralized routes can for example >> > computed². The word ³be² was missing. >> > > · pp.30, section 11, it will be helpful if the difference >> > between routing discussed in this section and forwarding discussed in >> > section 10 could be clarified a little bit >> > > >> > > >> > > ---- >> > > >> > > >> > > Anand: >> > > >> > > >> > > There is just one observation which I could not resist mentioning. >> > > It >> > has to do with >> > > the coupling of real-time application demands with the rest of the >> > architecture. There could be >> > > application specific "time critical and sudden" events that might >> > > call >> > for on-demand resource allocation. >> > > While we can delegate such an event handling to NME and PCE, >> > > perhaps, >> > bringing in an application awareness >> > > to the overall architecture might be useful so that we are not >> > > leaving >> > out this possible scenario. >> > > >> > > ---- >> > > >> > > >> > > Maria Rita: >> > > pag 8 LLN odes -> LLN nodes >> > > pag. 19 6TISCH -> 6TiSCH >> > > pag 23 as started -> has started >> > > pag 19 in the definition of CDU matrix, I would specify height and >> > width, and after the timeslot duration (in the current version >> > timeslot duration is in the middle, and it makes a bit hard to read >> > and clearly understand the CDU matrix structure) >> > > pag 7 are we sure we want to mention in the next round of the >> > > document >> > we will have evaluated PANA applicability? we may need/want to publish >> >the second part of the architecture before that, we don¹t know yet. >> >So, we could skip that, if you agree. >> > > >> > > >> > > ---- >> > > >> > > Rouhollah: >> > > >> > > Page 7 first paragraph. LLN odes >> > > Page 9 end of third paragraph. foster >> > > >> > > 1-Do registration phase may work properly when network builds up, if >> > when RPL tree grows up and extends like a complete tree (I mean in >> > distributed manner). Maybe some additional controls needed later? >> > > >> > > 2-Do you think DICE(figure 3. page 7) should be defined in the >> > Terminology draft. >> > > >> > > Typos: >> > > Page 21. scheduled >> > > >> > > >> > > ---- >> > > >> > > Guillaume: >> > > >> > > 1) The term reallocation/relocation of cells : >> > > 8.1 p16 a cell reallocation >> > > differs from >> > > 9.2 p22 the relocation of a soft cell / relocation is done => I am >> > > not sure if there has been a discussion on this term, but I >> >vote >> > for reallocation. >> > > >> > > 2) 8.2 p16 a set of quality metrics (RSSI, LQI) I think you cannot >> > > be specific to just two metrics (RSSI, LQI). >> > > The words "a set of" allows to define more metrics. And I think it >> > > is >> > fine. >> > > => what do you think of : "a set of quality metrics (e.g. RSSI, LQI, >> > etc.) " ? >> > > >> > > 3) 8.2 p16 and used to compute a Rank Increment The statistics of >> > > 6top may have other usages than incrementing the >> > ranks, for upper layers, and for resource management. >> > > => what about : "and used for instance to compute" ? >> > > >> > > 4) 10.2 p28 : a degree of flow control base on => I think it should >> > > be >> > "based on". >> > > >> > > 5) (Already pointed out) 11 p 30 Centralized routes con for example >> > computed => be computed >> > > >> > > >> > > ---- >> > > >> > > Jonathan Simon: >> > > 13 - Sending link-layer frames in the clear in the initial stage of >> > joining is not providing any benefit. We should always use >> >authentication, even if the key is not secret, as it provides the >> >ability to reject similar frames from other 802.15.4-based protocols. >> >It also isn¹t necessary to discuss such a detail here. >> > > >> > > 13.1 - >> > > * "Triage" - So the JCE decides which nodes are more important and >> > assigns resources to them first? How? Note this term is not used in >> > draft-richardson-6tisch-security-architecture-02. >> > > * "arbitrage" should be ³arbitrate² >> > > >> > > Other than that, it seem to be capturing the overall spirit of the >> > security architecture and highlights the open areas of security >> > discussion, e.g. that PANA is an open issue. >> > > >> > > Couple minor points: >> > > >> > > 1) Introduction and 3) Application and Goals sections need review. >> > > They >> > kind of wander all over the place. >> > > >> > > 5.1) What does "volume" mean in this context? Is this referring to >> >other >> > as yet defined documents, or later revisions of this document? >> > > >> > > >> > > ---- >> > > >> > > Rene: >> > > One note: the second para of Clause 13 seems out of place and should >> > > be >> > removed. >> > > >> > > >> > > ---- >> > > >> > >> > >> > >> > Answer >> > ------ >> > >> > I addressed all the comments doing one commit per; and answer on the ML. >> > The list of commits is in >> > https://bitbucket.org/6tisch/draft-ietf-6tisch- >> > architecture/commits/all , each with a diff. >> > >> > I made the following changes; based on Michael's comments >> > >> > Pascal Thubert ae7ea78 07 2015-03-10 >> https://bitbucket.org/6tisch >> > /draft-ietf-6tisch- >> > architecture/commits/ae7ea789ac066cb6b31fcdf9e6e8fdc2f6cf667e >> > Pascal Thubert 62b2606 06 final 2015-03-09 >> > https://bitbucket.org/6tisch/draft-ietf-6tisch- >> > architecture/commits/62b2606b48d14cb83f4d1d87c600c3f333cc8f66 >> > Pascal Thubert 2b29626 trailing whitespace removal 2015-02-24 >> > https://bitbucket.org/6tisch/draft-ietf-6tisch- >> > architecture/commits/2b296269f964eae8a7d47216ed90cf969c405a9d >> > >> > >> > >> > >> > Pascal Thubert 28c6316 Maria-Rita's review 2015-02-24 >> > https://bitbucket.org/6tisch/draft-ietf-6tisch- >> > architecture/commits/28c6316289ff06e21adc340c962acca94277de22 >> > >> > Discussion >> > ---------- >> > >> > typos to be fixed: >> > pag 8 LLN odes -> LLN nodes >> > pag. 19 6TISCH -> 6TiSCH >> > pag 23 as started -> has started >> > >> > -> all fixed >> > >> > Moreover, >> > page 19 in the definition of CDU matrix, I would specify height and >> >width, and after the timeslot duration (in the current version >> >timeslot duration is in the middle, and it makes a bit hard to read >> >and clearly understand the CDU matrix structure) >> > >> > -> text now reads: >> > In order to describe that formatting of time and frequencies, >> >the >> > 6TiSCH architecture defines a global concept that is called a >> >Channel >> > Distribution and Usage (CDU) matrix; a CDU matrix is a matrix >> of >> > cells with an height equal to the number of available channels >> > (indexed by ChannelOffsets) and a width (in timeSlots) that >> >is the >> > period of the network scheduling operation (indexed by >> > slotOffsets) for >> > that CDU matrix. The size of a cell is a timeSlot duration, and >> > values of 10 to 15 milliseconds are typical in 802.15.4e >> >TSCH to >> > accommodate for the transmission of a frame and an ack, >> >including the >> > security validation on the receive side which may take up to >> >a few >> > milliseconds on some device architecture. >> > >> > pag 7 are we sure we want to mention in the next round of the document >> > we will have evaluated PANA applicability? we may need/want to publish >> > the second part of the architecture before that, we don¹t know yet. >> > So, we could skip that, if you agree. >> > >> > -> I¹d like to leave things open. What about: >> > Future work on 6TiSCH security and will examine in deeper detail >> >how SACM, >> > ACE, DICE, IEEE802.15.9 and eventually PANA and 802.1x may apply >> >to 6TiSCH >> > networks to perform Authentication and Authorization, to secure >> >transactions >> > end-to-end, and to maintain the security posture of a device >> >over its lifetime. >> > The result of that work will be described in a subsequent volume >> >of this >> > architecture. >> > >> > >> > >> > >> > >> > >> > >> > Pascal Thubert 0e07e72 René Struik's review 2015-02-24 >> > https://bitbucket.org/6tisch/draft-ietf-6tisch- >> > architecture/commits/0e07e721ce096cbd02f93c5cfbf9e58e576ac124 >> > >> > Comments: >> > --------- >> > >> > I removed that section, and added an appendix that lists the 6TiSCH >> > personal submissions that may impact the next volumes. >> > The new text reads as follows >> > >> > Appendix A. Personal submissions relevant to the next volumes >> > >> > This volume only covers a portion of the total work that is needed to >> > cover the full 6TiSCH architecture. Missing portions include >> > Deterministic Networking with Track Forwarding, Dynamic Scheduling, >> > and Security. >> > >> > [I-D.richardson-6tisch-security-architecture] elaborates on the >> > potential use of 802.1AR certificates, and some options for the join >> > process are presented in more details. >> > >> > [I-D.struik-6tisch-security-architecture-elements"] >> > describes 6TiSCH security architectural elements with >> > high level requirements and the security framework that are relevant >> > for the design of the 6TiSCH security solution. >> > >> > [I-D.dujovne-6tisch-on-the-fly] discusses the use of the 6top >> > sublayer [I-D.wang-6tisch-6top-sublayer] to adapt dynamically the >> > number of cells between a RPL parent and a child to the needs of the >> > actual traffic. >> > >> > >> > >> > >> > Pascal Thubert c34d7eb ChongGang's review 2015-02-24 >> > https://bitbucket.org/6tisch/draft-ietf-6tisch- >> > architecture/commits/c34d7ebf8abb67a51fb94717480fcc5cc931c572 >> > >> > >> > Pascal Thubert 1a72a0f updated 2015-02-24 >> > https://bitbucket.org/6tisch >> > /draft-ietf-6tisch- >> > architecture/commits/1a72a0f578371be194832d6525c1e502e0055b92 >> > >> > Comments >> > -------- >> > >> > Please see below for details: >> > >> > I have reviewed the architecture draft (-05) and support to publish it. >> > >> > A few minor comments I had are listed below. >> > € pp. 3, 2nd paragraph, ³Šcontrol operations such industrial >> > automationŠ² ---> ³³Šcontrol operations such as industrial >> > automationŠ² >> > >> > -> done >> > € pp.3, 3rd paragraph, ³ŠtimeSlotted Channel Hopping Š² ---> >> > ³ŠTime Slotted Channel HoppingŠ² >> > >> > -> Actually I think the group settled for TimeSlotted, I migrated all >> > -> to >> > that >> > >> > € pp.3, 4th paragraph, the fulling spelling of TSN was givning >> in >> > the 2nd paragraph. Then, please put the acronym TSN in the 2nd >> > paragraph >> > >> > >> > -> It was but I changed the format to be more classical >> > >> > € pp.3, both ³deterministic² and ³Deterministic² are used in a >> >few >> > places. Better use one form if they mean the same thing throughout the >> >draft. >> > >> > -> Done, I used the uppercase because our Deterministic is not the one >> > from math >> > >> > € pp.4, 2nd paragraph ³Route Computation may be achieved in a >> > centralized fashion by a Path Computation Element (PCE), in a >> > distributed fashion using the Routing Protocol for Low Power and Lossy >> > Networks (RPL) [RFC6550], or in a mixed mode², >> > o Is RPL claim to be a distributed route computation? I believe in the >> > non-storing mode, the root calculates the route and use source routing >> > to route the packet to the destination. >> > >> > -> I see what you are saying. I agree that storing mode centralized >> > -> the >> > computation of routes down but that¹s based on a parent selection that >> >is still distributed. I do not think that being very specific like >> >³RPL is mostly distributed but then there can be a bit of centralized >> >computation² will help a lot the understanding of the section. I¹d >> >rather leave it at that. >> > >> > € pp.4, last two paragraphs from the bottom and a few other >> place >> > in the draft, ³Šneighbor DiscoveryŠ² ---> ³Š Neighbor DiscoveryŠ² >> > >> > -> sure, many occurrences fixed >> > >> > € pp. 5, section 3, 1st paragraph, ³Some aspects of this >> > architecture derive from existing industrial standards for Process >> >Control by its focus on Deterministic Networking, in particular with >> >the use of the IEEE802.15.4e [IEEE802154e] TSCH MAC and a centralized >> >PCE.² >> > o What are the ³existing industrial standard²? WirelessHart? Certain >> > references would help. >> > >> > -> OK, added >> > >> > >> > € pp.6, the title of Figure could be more complete by saying >> > something like ³Figure 1, Basic Configuration of 6TiSCH Network² >> > >> > -> OK >> > >> > € pp. 6, the paragraph under Fig. 1, ³neighbor Devices² ---> >> > ³neighbor devices² >> > >> > -> OK >> > >> > € pp.6, 2nd paragraph from the bottom, ³LLN Border Router (LBR)² >> > were mentioned twice in one sentence. >> > >> > ->reworded >> > >> > € pp.8, Figure 3, suggest changing its title to ³6TiSCH Protocol >> > Stack² >> > >> > -> Yes, I added envisioned since all is not fully cast in stone >> > >> > € pp.8, Figure 3, ³6LoWPAN HC² shows between IPv6 and 6top. It >> is >> > correct but it could imply that only HC is used there which is not >> >true. >> > Suggest changing 6LoWPAN HC to something like ³6LoWPAN (e.g. >> >adaptation, header compression)² >> > >> > -> added >> > >> > € pp.9, the 4th paragraph, ³join process² was introduced all of >> a >> > sudden. Wonder if it could read more smoothly by briefly mentioning >> >these concepts (e.g. neighbor discovery, join process, track >> >reservation, 6top, packet forwarding, etc.) together and their >> >relationship from architectural perspective somewhere in Section 4 >> >(e.g. at the beginning?). >> > >> > -> will be hard without duplicating a lot; let me think of that one. >> > -> In >> > any fashion, I can clarify join there. I propose >> > >> > Security is often handled at Layer-2 and Layer 4. >> Authentication >> > during the process on joining or re-joining the network >> > is discussed in <xref target="sec"/> and the >> > applicability of existing protocols such as >> > the <xref target="RFC5191"> >> > Protocol for Carrying Authentication for Network access >> > (PANA)</xref> >> > will be studied in a next volume of this document. >> > >> > € pp.9, 3rd paragraph, ³TEAS protocol will be required to expose >> > the device capabilities and the network peerings to the PCE, and a >> >protocol such as a lightweight PCEP or an adaptation of CCAMP G-MPLS >> >formats and procedures will be used to publish the tracks, computed by >> >the PCE, to the devices.² >> > € Can you put the reference about ³TEAS² and ³CCAMP²? >> > >> > -> added, text looks like this now: >> > >> > The work on centralized track computation is deferred to a >> >subsequent volume >> > of the architecture. The Path Computation Element (PCE) is >> >certainly >> > the core component of that architecture. Around the PCE, a >> >protocol >> > such as an extension to a TEAS <xref target="TEAS"/> protocol >> > (maybe running over CoAP as illustrated) will be required to >> >expose the >> > device capabilities and the network peers to the PCE, and a >> >protocol >> > such as a lightweight PCEP or an adaptation of CCAMP <xref >> >target="CCAMP"/> >> > G-MPLS formats and procedures will be used to publish the >> >tracks, >> > computed by the PCE, to the devices (maybe in a fashion >> >similar to RSVP-TE). >> > >> > € pp.10, 2nd paragraph, ³should be portable only other LLN link >> > types². It reads a little awkward and maybe some words missing around >> > ³only² >> > >> > ->sure! The text now reads >> > >> > The current charter positions 6TiSCH on IEEE802.15.4 only. >> > Though most of the design should be portable on other link types, >> > 6TiSCH has a strong dependency on 802.15.4 and its evolution. >> > >> > € pp.10, 2nd paragraph, ³A new version of the standard is >> >expected >> > in 2015². What¹s ³the standard² refer to? >> > >> > -> clarified as follows >> > >> > The current charter positions 6TiSCH on IEEE802.15.4 only. >> > Though most of the design should be portable on other link types, >> > 6TiSCH has a strong dependency on IEEE802.15.4 and its evolution. >> > A new version of the IEEE802.15.4 standard is expected in 2015. >> > >> > >> > € pp.10, 4th paragraph, do you want to add a reference for >> > ISA100.20? >> > >> > -> there¹s no good link. I added a link to ISA100, and explained what >> > -> CNM >> > is. >> > >> > >> > ISA100 <xref target="ISA100"/> Common Network Management (CNM) >> >is another >> > external work of interest for 6TiSCH. The group, referred to as >> >ISA100.20, >> > defines a Common Network Management framework that should enable >> >the >> > management of resources that are controlled by heterogeneous >> >protocols >> > such as ISA100.11a <xref target="ISA100.11a"/>, WirelessHART >> > <xref target="WirelessHART"/>, and 6TiSCH. Interestingly, the >> > establishment of 6TiSCH Deterministic paths, called tracks, >> > are also in scope, and ISA100.20 is working on requirements for >> >DetNet. >> > >> > € pp.16, 4th paragraph, ³motes² was used. Can we change it to >> > devices or nodes to make terms more consistent? >> > >> > -> moved to devices, but added the following >> > on behalf of the wireless devices (also called motes), >> > >> > € pp.17, 2nd paragraph, ³but also allows an upper layer like >> >RPL.² >> > This sentence seems not finished >> > >> > -> OK, the sentence now looks like >> > >> > The receiver of the Enhanced Beacon MAY >> > be listening at the cell to get the Enhanced Beacon >> > ([IEEE802154e]). >> > 6top takes this way to establish broadcast channel, which >> > not only >> > allows TSCH to broadcast Enhanced Beacons, but also allows >> > protocol >> > exchanges by an upper layer such as RPL. >> > >> > € pp.18, 2nd paragraph, ³that is is not capable of². One ³is² >> > should be removed. >> > >> > -> ack >> > >> > € pp.19, the last paragraph, ³an higher layer² ---> ³a higher >> > layer² >> > -> ack >> > >> > € pp.19, the last paragraph, ³DSCP can therefore be used². >> >Suggest >> > giving the full spelling and reference to DSCP or removing this >> sentence. >> > >> > -> I used ŒDifferentiated Services [RFC2474]¹ instead >> > >> > € pp.19, 5th paragraph, ³A 6TISCH Instance is associated to one >> > slotFrame.², >> > >> > -> that¹s really a 6top internal. Much too detailed, I removed the >> > sentence. >> > >> > € Wonder what is a 6TiSCH Instance? Why associate to only ³one² >> > Slotframe? In previous paragraph, it mentions ³Multiple slotFrames can >> > coexist in a node schedule². >> > >> > -> same, that is an internal construct >> > >> > € pp.21, section 9, both ³Static Scheduling² and ³Minimal Static >> > Scheduling² are used. Are they the same? >> > >> > -> removed minimal. Intention was to say that this is the minimal >> > -> support >> > >> > € pp.22, 1st paragraph, ³This scheduled can be² ---> ³This >> > schedule can be² >> > >> > -> gone >> > >> > € pp.24, section 10.1, 1st paragraph, ³A bundle of cells set to >> > receive (RX-cells) is uniquely paired to a bundle of cells that are >> >set to transmit (TX-cells), representing a layer-2 forwarding state >> >that can be used regardless of the network layer protocol.² >> > € Is a Track uni-directional or bi-directional? Is there any ACK >> > for the transmission? >> > >> > -> I added >> > >> > A Track is a unidirectional path between a source and a >> > destination. >> > In a Track cell, the normal operation of IEEE802.15.4e >> > Automatic Repeat-reQuest (ARQ) usually happens, though the >> > acknowledgment may be omitted in some cases, for instance >> > if there >> > is no scheduled cell for a retry. >> > >> > € pp.27, Figure 6, suggest adding what is the value ³set dmac >> to² >> > and ³restore dmac² >> > >> > -> done >> > >> > € pp.27, section 10.1.3, 1st paragraph, ³If the tunnel egress >> > point does not have a MAC address that matches the configuration, the >> > Track installation fails.², >> > € Wonder if it is ingress point or egress point that installs >> the >> > Track >> > >> > I think the text is correct. The configuration of the tunnel is yet >> >TBD by this group (RSVP-TE?), but the egress must be able to deliver a >> >packet to the MAC address that is at the end of the tunnel. >> > >> > € pp.30, 1st paragraph, ³Centralized routes can for example >> > computed². The word ³be² was missing. >> > >> > fixed >> > € pp.30, section 11, it will be helpful if the difference >> between >> > routing discussed in this section and forwarding discussed in section >> > 10 could be clarified a little bit >> > >> > Added >> > By forwarding, this specification means the per-packet >> >operation that >> > allows to deliver a packet to a next hop or an upper layer in >> >this node. >> > Forwarding is based on pre-existing state that was installed >> >as a >> > result of a routing computation. >> > >> > >> > >> > >> > >> > >> > >> > >> > >> > Pascal Thubert cca7835 Rouhollah's comments 2015-02-23 >> > https://bitbucket.org/6tisch/draft-ietf-6tisch- >> > architecture/commits/cca78350db5d5ad3a8b031944e44ce15972453ae >> > >> > Comments >> > --------- >> > >> > 1-Do registration phase may work properly when network builds up, if >> >when RPL tree grows up and extends like a complete tree (I mean in >> >distributed manner). Maybe some additional controls needed later? >> > >> > > Unsure what you really mean here. There can be issues with security >> > > and >> > the join process work is looking at that. Then there¹s RPL use of >> > slotted aloha slots. Then there¹s the resource allocation problem >> > (chunks between parents and cells in a parent¹s chunk between >> > children). We¹ll recharter for all these things but the first volume >> > of the architecture does not cover that. >> > >> > 2-Do you think DICE(figure 3. page 7) should be defined in the >> >Terminology draft. >> > >> > Well, that¹s a WG now, unsure what the standard name will be. I can >> > add the following text: >> > ³ DTLS In Constrained Environments (DICE) is at the time of this >> > writing the probable way LLN nodes will provide end-to-end >> > security for >> > UDP/CoAP packets.² >> > >> > Typos: >> > Page 21. scheduled >> > >> > Ack >> > >> > On Mon, Feb 16, 2015 at 8:10 PM, Rouhollah Nabati(Google) >> > <rnabati@gmail.com> wrote: >> > Hello All, >> > >> > Page 7 first paragraph. LLN odes >> > >> > ack >> > >> > Page 9 end of third paragraph. foster >> > >> > I missed the issue there? >> > >> > >> > >> > I agree with all Guillaume¹s suggested edits. Changes: >> > >> > Pascal Thubert 5c2a38f Guillaume's edits 2015-02-23 >> > https://bitbucket.org/6tisch/draft-ietf-6tisch- >> > architecture/commits/5c2a38ffd0b74695b26551a0ca5b90fd0ab3d7fb >> > >> >-- >> >-------------------------+--------------------------------------------- >> >-------------------------+--- >> >- >> > Reporter: | Owner: draft-ietf-6tisch- >> > shwethab@cisco.com | architecture@tools.ietf.org >> > Type: defect | Status: new >> > Priority: minor | Milestone: >> >Component: | Version: >> > architecture | Resolution: >> > Severity: In WG Last | >> > Call | >> > Keywords: | >> >-------------------------+--------------------------------------------- >> >-------------------------+--- >> >- >> > >> >Ticket URL: >> ><http://trac.tools.ietf.org/wg/6tisch/trac/ticket/35#comment:1> >> >6tisch <http://tools.ietf.org/6tisch/> >> > >> >_______________________________________________ >> >6tisch mailing list >> >6tisch@ietf.org >> >https://www.ietf.org/mailman/listinfo/6tisch >> >> _______________________________________________ >> 6tisch mailing list >> 6tisch@ietf.org >> https://www.ietf.org/mailman/listinfo/6tisch >> >> _______________________________________________ >> 6tisch mailing list >> 6tisch@ietf.org >> https://www.ietf.org/mailman/listinfo/6tisch >> > > > > -- > DIEGO DUJOVNE > Académico Escuela de Ingeniería en Informática y Telecomunicaciones > Facultad de Ingeniería UDP > www.ingenieria.udp.cl > (56 2) 676 8125 > > _______________________________________________ > 6tisch mailing list > 6tisch@ietf.org > https://www.ietf.org/mailman/listinfo/6tisch > >
- [6tisch] #35 (architecture): Last call comments: … 6tisch issue tracker
- Re: [6tisch] #35 (architecture): Last call commen… 6tisch issue tracker
- Re: [6tisch] #35 (architecture): Last call commen… Pascal Thubert (pthubert)
- Re: [6tisch] #35 (architecture): Last call commen… Shwetha Bhandari (shwethab)
- Re: [6tisch] #35 (architecture): Last call commen… S.V.R. Anand
- Re: [6tisch] #35 (architecture): Last call commen… S.V.R. Anand
- Re: [6tisch] #35 (architecture): Last call commen… Pascal Thubert (pthubert)
- Re: [6tisch] #35 (architecture): Last call commen… Wang, Chonggang
- Re: [6tisch] #35 (architecture): Last call commen… Maria Rita PALATTELLA
- Re: [6tisch] #35 (architecture): Last call commen… Prof. Diego Dujovne
- Re: [6tisch] #35 (architecture): Last call commen… Guillaume Gaillard
- Re: [6tisch] #35 (architecture): Last call commen… 6tisch issue tracker
- Re: [6tisch] #35 (architecture): Last call commen… 6tisch issue tracker