[6tsch] minutes webex 28 June 2013
Thomas Watteyne <watteyne@eecs.berkeley.edu> Mon, 01 July 2013 18:54 UTC
Return-Path: <twatteyne@gmail.com>
X-Original-To: 6tsch@ietfa.amsl.com
Delivered-To: 6tsch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AE91221F9F28 for <6tsch@ietfa.amsl.com>; Mon, 1 Jul 2013 11:54:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.977
X-Spam-Level:
X-Spam-Status: No, score=-1.977 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, NO_RELAYS=-0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oKFE-ShXLmAt for <6tsch@ietfa.amsl.com>; Mon, 1 Jul 2013 11:54:47 -0700 (PDT)
Received: from mail-pb0-x230.google.com (mail-pb0-x230.google.com [IPv6:2607:f8b0:400e:c01::230]) by ietfa.amsl.com (Postfix) with ESMTP id 33C6E21F9F25 for <6tsch@ietf.org>; Mon, 1 Jul 2013 11:54:47 -0700 (PDT)
Received: by mail-pb0-f48.google.com with SMTP id ma3so5160579pbc.35 for <6tsch@ietf.org>; Mon, 01 Jul 2013 11:54:47 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:from:date:x-google-sender-auth:message-id :subject:to:content-type; bh=TZ2lqfc1tLmBhuC5Wn4HtcD3gb5o7+phj9mf0HzpMCc=; b=dHXldpWI8txy/doIor+ComPj8Q7VxWtOgzk9bYYJyyhraaApC2DdsDpKY1F9BAIYQZ gn3YGkJT9uwb1EqK76eeBS7y78wlV3czVJiIXkcoIwspSJrUztY9WYo3eD8TSDB/u1Eh CC279rtvOhIB3pHNHmzOjiw4swNqmDNAZtx83R8IlRiuuX7xicKD4V7yNqliHW8K5az+ lM7Y3BP8SEGx5rNoMjNn02lylN1qKjlusdY4DQ8LbauPhCwMYGyMBzgxf8u3a015+NJk ZX+v+Fo+ypYrMyIJjCWO+078O+/FnLdkRayvIcWOXeOANPVNuxMWcZhIZAF3exSIfl5v DqXw==
X-Received: by 10.69.2.228 with SMTP id br4mr25118783pbd.91.1372704886223; Mon, 01 Jul 2013 11:54:46 -0700 (PDT)
MIME-Version: 1.0
Sender: twatteyne@gmail.com
Received: by 10.66.147.228 with HTTP; Mon, 1 Jul 2013 11:54:26 -0700 (PDT)
From: Thomas Watteyne <watteyne@eecs.berkeley.edu>
Date: Mon, 01 Jul 2013 11:54:26 -0700
X-Google-Sender-Auth: IF6iKuAxzCbd5zMeYnNYouomzdg
Message-ID: <CADJ9OA-R+O6j2eAq0GVkQ2pUT1QebqrHH2MQJjDVwTwnYWkBcA@mail.gmail.com>
To: 6TSCH <6tsch@ietf.org>
Content-Type: multipart/alternative; boundary="047d7b5d9c211ffba004e077c396"
Subject: [6tsch] minutes webex 28 June 2013
X-BeenThere: 6tsch@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "Discuss link layer model for Deterministic IPv6 over the TSCH mode of IEEE 802.15.4e, and impacts on RPL and 6LoWPAN such as resource allocation" <6tsch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/6tsch>, <mailto:6tsch-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/6tsch>
List-Post: <mailto:6tsch@ietf.org>
List-Help: <mailto:6tsch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/6tsch>, <mailto:6tsch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 01 Jul 2013 18:54:48 -0000
All, You will find the minutes of the last webex below. FYI, all the minutes and slides are archived a https://bitbucket.org/6tsch/meetings/. Thanks to Xavi and Dominique for taking notes! As usual, fix anything we might have missed directly in the e-mail and reply. Thomas ---- Minutes Webex 28 June 2013, 6TSCH group Note: timestamps in PDT. Note: the Etherpad service we usually use was performing bad during the call. Taking notes 1. Xavi Vilajosana 2. Dominique Barthel 3. Thomas Watteyne Present *(alphabetically)* - Alfredo Grieco - Dominique Barthel - Guillaume Gaillard - Kris Pister - Maria Rita Palattella - Pascal Thubert - Pouria Zand - Qin Wang - Rafa Marin-Lopez - Raghuram Sudhaakar - Thomas Watteyne - Tina Tsou - Tom Phinney - Xavi Vilajosana - Yoshihiro Ohba Recording - Webex recording (audio+slides,streaming) - https://cisco.webex.com/ciscosales/lsr.php?AT=pb&SP=MC&rID=69565932&rKey=5c4b93c6082f08f0<https://cisco.webex.com/ciscosales/lsr.php?AT=pb&SP=MC&rID=69565932&rKey=5c4b93c6082f08f0> *[59min]* Slides - slides_130628_webex.ppt<https://bitbucket.org/6tsch/meetings/src/efa797943c04a632a510c12aba14f7ed756e6956/130628_webex/slides_130628_webex.ppt?at=master>: slides shared during the call Agenda - Approval minutes last call *[2min]* - draft-ohba-6tsch-security-00 *[10min]* - 6TSCH definition *[5min]* - Overview slides *[20min]* - Simulation *[20min]* - Schedule next meetings, AOB *[3min]* Minutes - *[08.05]* Meeting starts - *[08.06]* Approval minutes last call > The people on the call approve the minutes. - *[08.06]* Berlin - Preliminary agenda posted at https://datatracker.ietf.org/meeting/87/agenda.html - 6tsch BoF accepted and scheduled on Tuesday Afternoon (preliminary) - *[Pouria]* Any other 6TSCH related meetings? - *[Dominique]* Looks like most LLN-related meetings on Mon/Tue/Wed, except 6lo which is on Thursday afternoon. - *[08.08]* draft-ohba-6tsch-security-00 - *Thomas* presents overview of discussion about draft - http://tools.ietf.org/html/draft-ohba-6tsch-security-00 - formal presentation next week or following. - goal: requirements on security for the 6tsch networks - Summary of comments on the ML: - Phase 0- what a mote should have before deployment? - add PANA overview on appendix - clear statement of interaction with CCM* on 15.4e - Footprint and complexity of the proposal. (PKI complexity??) - EB protection-- need to be protected. How protected can it be if you have a shared key? - *[Yoshihiro]* - agrees to present next week. He will also be in Berlin. - Two important decisions we need to make: - do we use asymetric key-based operation or not? - do we need multiple MAC keys, Or a common network key? - *[Pascal]* Long debate on that question, using profiles we can define different levels of security. - *[Yoshihiro]* need security warnings. Not all levels of security are need for all applications. - *[Thomas]* is that a problem on having different profiles of security? - *[Yoshihiro]* good approach, but need clear differentiation and identify what each profile covers. - *[08.15]* 6TSCH definition - Yoshihiro pointed out that 6TSCH was not defined well in the terminology draft. - Proposal from Maria Rita: 6TSCH: IPv6 over Time Slotted Channel Hopping. It defines a set of IETF sublayers and protocols (for setting up a schedule with a centralized or distributed approach, managing the resource allocation, etc.), as well as the architecture to bind them together, for use in IPv6 TSCH based networks. - *[Thomas]* De we agree? - *[Pascal]* Replace "etc" by "in particular, for setting..." - *[Maria Rita]* OK. Maria Rita to add definition to terminology draft. - *[Pascal]* Do we want to rename 6tus sublayer by something else? Pascal to start discussion on the name of the 6tus sublayer. - *[08.20]* Overview slides - *Pascal* presents the overview slides he is using to present work at 6TSCH - We can use some of them during BoF. - Slide are available is someone wants to use them. - No copyright. - Centralized vs decentralized. - RPL sibling walkable structures. - ARC of siblings that join siblings together. - use ARCs for forwarding in case of congestion. - Routing with PCE - Opportunistic track reuse. have a slot that can be reused for one hop. - RPL instance ID: global and local rpl instance. Use local instance ID to identify the track id. - Coexistance of PCE routes with RPL routes. What happens when routes conflict? - TF field in 6LoWPAN header indicate how to compress the flow label - draft in 6man that defines the use of the flow label: http://tools.ietf.org/html/draft-thubert-roll-flow-label-02 - *[Thomas]* what is the context of the slides? - *[Pascal]* keep the slides up-to-date with the work so the group can use them and used to clarify architecture. - *[08.45]* Simulation - Xavi has done some preliminary simulation to determine whether the purely random approach to scheduling is appropriate for a 6TSCH networks. - *[Xavi]* - Goal not to build another NS-2, but just to know how random allocation works. - Each node randomly selects the cell in the schedule. - With less than 10-20% of allocated cells, the behavior is OK. - *[Thomas]* The plots explore the network's performance almost to the point where it is saturated? - *[Xavi]* Yes - *[Thomas]* - Shares desktop and shows a Python-based simulator to see the dynamic behavior of the network. - Help wanted to continue work on the simulator. - *[Pascal]* We can extract from the European directive how they envision CCA. Standard being produced by ETSI on behalf on the European Commission. Deals with durations related to CCA. If we implement random scheduling. Found for thought in our algorithm. - *[Kris]* Can you send out this document? - *[Tom]* will send EN 300 328 and associated IEC compliance analysis. - *[09.05]* Schedule next meetings, AOB - Summer is here, and people might be on vacation next week, especially in the US. Is the same time OK? No problems from the call. - Let's have the next meeting on Friday. - *[Pascal]* we need to start talking about the 1.5h in Berlin, and how to go from BoF to WG. - *[09.08]* Meeting ends
- [6tsch] minutes webex 28 June 2013 Thomas Watteyne