Re: [Coma] Constrained Device Classes 0, 1 and 2 and their need for Management

"Ersue, Mehmet (NSN - DE/Munich)" <mehmet.ersue@nsn.com> Fri, 08 June 2012 11:28 UTC

Return-Path: <mehmet.ersue@nsn.com>
X-Original-To: coma@ietfa.amsl.com
Delivered-To: coma@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D456E21F8786 for <coma@ietfa.amsl.com>; Fri, 8 Jun 2012 04:28:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.599
X-Spam-Level:
X-Spam-Status: No, score=-106.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0NiEjJy+z70Y for <coma@ietfa.amsl.com>; Fri, 8 Jun 2012 04:28:42 -0700 (PDT)
Received: from demumfd001.nsn-inter.net (demumfd001.nsn-inter.net [93.183.12.32]) by ietfa.amsl.com (Postfix) with ESMTP id 7FE0321F86D0 for <coma@ietf.org>; Fri, 8 Jun 2012 04:28:41 -0700 (PDT)
Received: from demuprx016.emea.nsn-intra.net ([10.150.129.55]) by demumfd001.nsn-inter.net (8.12.11.20060308/8.12.11) with ESMTP id q58BSbC2002290 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Fri, 8 Jun 2012 13:28:37 +0200
Received: from demuexc022.nsn-intra.net (demuexc022.nsn-intra.net [10.150.128.35]) by demuprx016.emea.nsn-intra.net (8.12.11.20060308/8.12.11) with ESMTP id q58BSaLg011250; Fri, 8 Jun 2012 13:28:37 +0200
Received: from DEMUEXC006.nsn-intra.net ([10.150.128.18]) by demuexc022.nsn-intra.net with Microsoft SMTPSVC(6.0.3790.4675); Fri, 8 Jun 2012 13:28:22 +0200
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
Date: Fri, 08 Jun 2012 13:28:20 +0200
Message-ID: <80A0822C5E9A4440A5117C2F4CD36A6403DFB85E@DEMUEXC006.nsn-intra.net>
In-Reply-To: <67442429D9C35E4C975B89BE73BD33D02F22348F75@ATLEXCH02.nivis.com>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: [Coma] Constrained Device Classes 0, 1 and 2 and their need for Management
Thread-Index: Ac1DxeGWM2hM7v/hS5e+E9As69z5CgAYdD+AAE8LYSA=
References: <80A0822C5E9A4440A5117C2F4CD36A6403DFB0D5@DEMUEXC006.nsn-intra.net><20120606092217.GA89893@elstar.local> <67442429D9C35E4C975B89BE73BD33D02F22348F75@ATLEXCH02.nivis.com>
From: "Ersue, Mehmet (NSN - DE/Munich)" <mehmet.ersue@nsn.com>
To: ext Rares Ivan <Rares.Ivan@nivis.com>, coma@ietf.org
X-OriginalArrivalTime: 08 Jun 2012 11:28:22.0590 (UTC) FILETIME=[CFECD5E0:01CD4569]
X-purgate-type: clean
X-purgate-Ad: Categorized by eleven eXpurgate (R) http://www.eleven.de
X-purgate: clean
X-purgate: This mail is considered clean (visit http://www.eleven.de for further information)
X-purgate-size: 6038
X-purgate-ID: 151667::1339154918-00003CDD-EFF1E4B3/0-0/0-0
Subject: Re: [Coma] Constrained Device Classes 0, 1 and 2 and their need for Management
X-BeenThere: coma@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Management of Constrained Networks and Devices <coma.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/coma>, <mailto:coma-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/coma>
List-Post: <mailto:coma@ietf.org>
List-Help: <mailto:coma-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/coma>, <mailto:coma-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 08 Jun 2012 11:28:44 -0000

Hi Rares,

> Hello,
> 
> In my opinion the classification should not be directly connected to
the hardware
> capabilities of devices (like processing power, RAM, flash) just
because same functional
> features can be supported on devices with very different hardware
capabilities and
> architecture. There shouldn't be any mention of hardware resources.

We are interested to know which applications and features are possible
to run on different devices. However, the type of the application you
can run on a device is dependent on the available hardware capabilities.
So the device classes are used as a tool and will help us as a means to
an end. 
 
> The classification shall be based on various sets of features
supported by a device.
> Therefore the complete list of features can be divided in subsets
where Class-0 (C0) is
> the smallest set of supported features, Class-1 (C1) adds more
features on top of C0,
> Class-2 (C2) adds more features on top of C1, and so on. A Class-2
device is implicitly

I assume you mean "possible" features. E.g. based on the constrained
nature of resources, a device may support only a few of the features
(classified as C1) at a time.

> compliant with Class-1 and Class-0, therefore a network manager that
can manage
> Class-2 can also manage the lower classes; a manager that can only
manage Class-1
> devices could only manage Class-2 devices based on features specific
to Class-1, which
> is the manager's limitation.
> 
> The higher the class, the more features a device supports, and based
on this
> classification a manager would know what the capabilities of a device
shall be. There
> wouldn't be any in-between classes specs allowed, and a device cannot
be claimed as
> Class-2 compliant unless it supports ALL the features required by that
category.

Cheers,
Mehmet
 
> Regards,
>   Rares
>
> -----Original Message-----
> From: coma-bounces@ietf.org [mailto:coma-bounces@ietf.org] On Behalf
Of Juergen
> Schoenwaelder
> Sent: Wednesday, June 06, 2012 5:22 AM
> To: Ersue, Mehmet (NSN - DE/Munich)
> Cc: coma@ietf.org
> Subject: Re: [Coma] Constrained Device Classes 0, 1 and 2 and their
need for
> Management
> 
> On Wed, Jun 06, 2012 at 10:42:13AM +0200, Ersue, Mehmet (NSN -
DE/Munich)
> wrote:
> > Hi All,
> >
> > following is an attempt to define the device classes in constrained
> > networks a bit more in detail. The text below follows the definition
> > of the three device classes provided by Carsten.
> >
> > Class-0 (C0) devices are very constrained sensor-like motes. They
will
> > most likely not have the possibility to have a direct communications
> > with the Internet in a secure manner. These class-0 devices will
> > participate in Internet communications with the help of larger
devices
> > acting as proxy or gateways.
> >
> > Class-1 (C1) devices are assumed to have about 10 Kbytes of RAM and
> > roughly 100 Kbytes of code space (e.g. Flash). For example, this
could
> > be an AVR Raven mote (http://www.atmel.com/tools/AVRRAVEN.aspx).
> > Class-1 devices can't easily talk to other Internet nodes with a
full
> > protocol stack using HTTP, TLS and related security protocols, and
> > XML-based data representations. However, they have enough power to
use
> > a reduced or lightweight protocol stack (e.g. with CoAP and UDP) and
> > participate in meaningful conversations without the help of a
gateway
> > node. So they can be integrated into the IoT network in one way or
the
> > other but need to spare with memory for the protocol and application
usage.
> >
> > Class-2 (C2) devices are embedded devices with around 50 Kbytes of
RAM
> > and maybe 250 Kbytes of code space and can support mostly the same
> > protocol stack as used on notebooks or servers. However, even these
> > devices can benefit from lightweight and energy-efficient protocols
> > and producing less bandwidth on air. Furthermore, using less network
> > resources would leave more resources available to applications. As
> > such using the same protocol stack on Class 1 and 2 devices might be
> > beneficial.
> >
> > I assume we cannot do much for the management on C0 devices. They
will
> > be most likely preconfigured and if ever will be reconfigured
seldomly
> > with a very small data set.
> >
> > For C1 devices it is indeed subject for discussion and to understand
> > what type of applications they could run and which management
> > mechanisms would be most suitable.
> > Even though they have some more functionality available we need to
> > assess C2 devices for the type of applications they will be running
> > and the management they would need. To be able to derive the
> > requirements we need to discuss the uses cases and how the devices
are
> > involved in the management scenario. The use cases where C1 or C2
> > devices build a cluster or are part of a hierarchy as well as the
> > assumed degree of automation might be essentially important.
> >
> > Comments are welcome.
> 
> This classification is very rough since devices differ in their
architecture. For example,
> some devices can run their software right out of flash memory and
hence their RAM is
> really only used for the storage of variables and the stack. Other
devices have to copy
> the machine code from flash to RAM before they can execute it. Such
devices have
> relatively large amounts of RAM but most of it is used to store
machine code.
> 
> /js
> 
> --
> Juergen Schoenwaelder           Jacobs University Bremen gGmbH
> Phone: +49 421 200 3587         Campus Ring 1, 28759 Bremen, Germany
> Fax:   +49 421 200 3103         <http://www.jacobs-university.de/>
> _______________________________________________
> Coma mailing list
> Coma@ietf.org
> https://www.ietf.org/mailman/listinfo/coma
> _______________________________________________
> Coma mailing list
> Coma@ietf.org
> https://www.ietf.org/mailman/listinfo/coma