Re: [coman] FW: COMAN Discussion during IETF 84

"Ersue, Mehmet (NSN - DE/Munich)" <mehmet.ersue@nsn.com> Mon, 17 September 2012 13:32 UTC

Return-Path: <mehmet.ersue@nsn.com>
X-Original-To: coman@ietfa.amsl.com
Delivered-To: coman@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2884221F850D for <coman@ietfa.amsl.com>; Mon, 17 Sep 2012 06:32:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.599
X-Spam-Level:
X-Spam-Status: No, score=-106.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SVUEdalp4pCf for <coman@ietfa.amsl.com>; Mon, 17 Sep 2012 06:32:23 -0700 (PDT)
Received: from demumfd001.nsn-inter.net (demumfd001.nsn-inter.net [93.183.12.32]) by ietfa.amsl.com (Postfix) with ESMTP id 6B34F21F8432 for <coman@ietf.org>; Mon, 17 Sep 2012 06:32:22 -0700 (PDT)
Received: from demuprx016.emea.nsn-intra.net ([10.150.129.55]) by demumfd001.nsn-inter.net (8.12.11.20060308/8.12.11) with ESMTP id q8HDWK2q003702 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Mon, 17 Sep 2012 15:32:20 +0200
Received: from DEMUEXC048.nsn-intra.net ([10.159.32.94]) by demuprx016.emea.nsn-intra.net (8.12.11.20060308/8.12.11) with ESMTP id q8HDWHh1030753; Mon, 17 Sep 2012 15:32:20 +0200
Received: from DEMUEXC006.nsn-intra.net ([10.150.128.18]) by DEMUEXC048.nsn-intra.net with Microsoft SMTPSVC(6.0.3790.4675); Mon, 17 Sep 2012 15:32:17 +0200
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
Date: Mon, 17 Sep 2012 15:32:15 +0200
Message-ID: <80A0822C5E9A4440A5117C2F4CD36A640437DDC9@DEMUEXC006.nsn-intra.net>
In-Reply-To: <3f131b02bfd01bf1cca0e4d0a9060109@xs4all.nl>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: [coman] FW: COMAN Discussion during IETF 84
Thread-Index: Ac2SWjFR1Yhvoy+JT4iozuW6SM+xkQCeeg3g
References: <80A0822C5E9A4440A5117C2F4CD36A6404219C16@DEMUEXC006.nsn-intra.net> <3f131b02bfd01bf1cca0e4d0a9060109@xs4all.nl>
From: "Ersue, Mehmet (NSN - DE/Munich)" <mehmet.ersue@nsn.com>
To: consultancy@vanderstok.org
X-OriginalArrivalTime: 17 Sep 2012 13:32:17.0290 (UTC) FILETIME=[DB12C6A0:01CD94D8]
X-purgate-type: clean
X-purgate-Ad: Categorized by eleven eXpurgate (R) http://www.eleven.de
X-purgate: clean
X-purgate: This mail is considered clean (visit http://www.eleven.de for further information)
X-purgate-size: 7611
X-purgate-ID: 151667::1347888740-00006F5F-841B1E5D/0-0/0-0
Cc: coman@ietf.org
Subject: Re: [coman] FW: COMAN Discussion during IETF 84
X-BeenThere: coman@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Management of Constrained Networks and Devices <coman.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/coman>, <mailto:coman-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/coman>
List-Post: <mailto:coman@ietf.org>
List-Help: <mailto:coman-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/coman>, <mailto:coman-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Sep 2012 13:32:24 -0000

Hi Peter,

thank you for your comments. See below.

Cheers, 
Mehmet 

...
> In section 1.1 there is no mention of the following aspects:
> wireless - I anticipate that a large set of devices are wireless.
> battery-less - A subset of the devices will have no power supply and
> get their power from the environment.
> sleeping devices - a large part will be accessible during a small
> percentage of the time to save power.

We didn't want to make the Introduction too long. However, you are right
these are important aspects and should be added. 
 
> Further the term gateway props up quite often.
> Do you mean mean a device situated between two networks which employ
> different network stacks from application to PHY?

Yes, it is often necessary to translate betw. two stacks.

> Many will interpret the term as such.
> I like the proxy which is IP based and does NOT need to be situated on
> a device connecting subnets.
> The term router is well known and edge router for a router between
> wireless and wired looks convenient.
> 
> section 1.5 discusses classes.
> Most important distinction for me is the wired/wireless distinction

Looking at it from the network management pov. why is actually
wired/wireless distinction so important? Wired and wireless devices can
be similarly constrained or powerful. I think power consumption is not
directly related to being wireless.

> and power usage versus power supply.

Do you mean battery usage vs. power supply?

> We might make a matrix (or cube) with on one side the the memory
> aspects and comunication aspects and on the other side the
power-supply.
> 
> I am impressed by the use case descriptions. They are quite high
level.
> Where do you want to put more detail: in the Use case or in the
> requirement section 4.1

IMO the requirements section should be compact and focusing on
requirements as short statements. The requirement should be explained as
much as necessary.

> Details from my point of view are;
> 1) self organized (home net) versus managed (building control)
> 2) Configuration happens at several levels (for example):
> - application where end-points providing a specified service are
> discovered.
> - network, where parameter values (like RPL defines many) need to be
> set to common values to allow interoperability.
> The document might point out where we focus.
> 3) number of subnets, number of devices, response times.
> 4) stand-alone network, Internet connected network (managed DHCP and
> DNS)
> 5) operation period, setting-up (commissioning) period, maintenance
> period
> 6) probably others

Thanks. Let's see how this evolves during editing. 

Would you like to match them to corresponding use cases and provide some
text?

Cheers,
Mehmet

> Greetings,
> 
> peter
> 
> 
> 
> Ersue, Mehmet (NSN - DE/Munich) schreef op 2012-08-17 10:54:
> > (making it a bit easier to read)
> >
> > Hi All,
> >
> > Coman as an activity has been introduced at IETF 84 with a 1-slider
> > in
> > the Core WG session (see slide 53, 54 in
> > http://www.ietf.org/proceedings/84/slides/slides-84-core-0.pdf).
> > Coman document development has been also discussed in the OPS Area
> > open
> > session (see
> > http://www.ietf.org/proceedings/84/slides/slides-84-opsawg-3.pptx).
> >
> > There was an ad-hoc discussion on the COnstrained MANanagement
> > (Coman)
> > activity during IETF 84 on Wednesday, August 1, 2012.
> >
> > Participants: Dominique Barthel, Carsten Bormann, Martin Bjorklund,
> > Zhen
> > Cao, Benoit Claise, Bob Cole, Mehmet Ersue, Ulrich Herberg, Dan
> > Romascanu, Juergen Schoenwaelder, Peter van der Stok
> >
> > * The discussion on the scope of the work was concerning whether it
> > should be focused on the networks with constrained devices only or
> > should also cover the management of constrained networks with
> > non-constrained devices. The group agreed to describe the use case
> > for
> > constrained networks but exclude it for the detailed requirements
> > discussion. The requirements for the constrained network use case
can
> > be
> > put into the annex.
> >    - However the behavior of a constrained networks with constrained
> > devices is interesting to look at to understand how a constrained
> > network (the constrainedness) changes the requirements on the
> > management
> > of constrained devices. Carsten Bormann proposed to address the
> > management of constrainedness.
> >
> > * Currently the document gives a top-down application-view with use
> > case
> > descriptions. Compared to the top-down view it has been proposed to
> > look
> > at the use cases from the bottom-up view to understand the
> > requirements
> > of very constrained devices. It would be useful to understand the
> > requirements on simplifying the management protocols for very
> > constrained devices.
> >
> > * The deployment type should be discussed, e.g. HAN and AMI have
> > different requirements, depending on the size of the network there
> > are
> > different requirements.
> > * Class of networks should be discussed, where different type of
> > radio
> > and communication technologies are in use.
> >
> > * Zach Shelby is interested in the M2M and cellular scenario. We
> > should
> > also look at other SDOs and what they have been doing so far, e.g.
> > ETSI
> > device model, OMA device management, or OBIX from OASIS.
> > * Chen Zao from China Mobile stated that he finds the cellular and
> > mobile network use case as important. Chen can possibly contribute
to
> > the mobile application use case and requirements.
> >
> > * One related draft is the configuration draft in the Core WG
> >
> >
(http://tools.ietf.org/html/draft-nieminen-core-service-discovery-02),
> > which defines the basic model for configuration and initial
> > authentication. The model in this draft has been integrated into the
> > IPSO configuration profile.
> > * It has been proposed to list requirements but also features per
use
> > case. Furthermore the size of a network should be discussed per use
> > case.
> >
> > * Classifying devices based on features:
> >    - provide a list of management features and level of features to
> > be
> > matched to device classes and use cases,
> >    - different devices in a device class might use different
subsets.
> > * Matching use cases to device classes:
> >    - agreed to list the device categories and the assumed network
> > size
> > in a use case
> >    - provide examples for device classes
> > * Giving specific requirements per use case and device class
> >    - planned to address in section 4.
> >    - series of requirements based on FCAPS
> >
> > * It has been suggested to reference available work on constrained
> > networks/devices (e.g. FP7 EU project Butler-SmartLife). Note that
> > Levent Gurgen (cea.fr) kindly provided draft documents (not
available
> > publicly) of the EU project Butler-SmartLife, which we will use as
an
> > input for the next version.
> >
> > * A conclusion section will summarize the gaps and highlight
> > potential
> > need for new work.
> >
> > I would appreciate any comments. Thank you.
> >
> > Cheers,
> > Mehmet
> > _______________________________________________
> > coman mailing list
> > coman@ietf.org
> > https://www.ietf.org/mailman/listinfo/coman
> 
> _______________________________________________
> coman mailing list
> coman@ietf.org
> https://www.ietf.org/mailman/listinfo/coman