Re: [coman] [6lo] WG Review: IPv6 over Networks of Resource-constrained Nodes (6lo)

Benoit Claise <bclaise@cisco.com> Tue, 24 September 2013 14:07 UTC

Return-Path: <bclaise@cisco.com>
X-Original-To: coman@ietfa.amsl.com
Delivered-To: coman@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B5CAC11E8125; Tue, 24 Sep 2013 07:07:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.499
X-Spam-Level:
X-Spam-Status: No, score=-10.499 tagged_above=-999 required=5 tests=[AWL=0.100, BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rzGAloqIKbzM; Tue, 24 Sep 2013 07:07:40 -0700 (PDT)
Received: from ams-iport-4.cisco.com (ams-iport-4.cisco.com [144.254.224.147]) by ietfa.amsl.com (Postfix) with ESMTP id D436321E8088; Tue, 24 Sep 2013 07:07:30 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=2138; q=dns/txt; s=iport; t=1380031651; x=1381241251; h=message-id:date:from:mime-version:to:subject:references: in-reply-to:content-transfer-encoding; bh=jtFHaz0iqhtFXywosZH3UYg9Ae1AbDfSokXbtd7BD/w=; b=iobfbDk5e9+IX7Of4XMJQqg03N5gBx7XT0Bhvx3+8Hze+2Fspzf5eAqc 0s4xD00lyNfb4nCYf6kpWyNrlF0eez8Fpj47QKi0+CO6r0Q/48f2VF9UJ BObmf2IiCsCxK4CRUfUHclXwsafUIH3J8g4RqMr4PMNiosUnd/7QT3Ief 0=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AgcFAFKcQVKQ/khL/2dsb2JhbABQCoMHOMEhgR0WdIIlAQEBBDg2ChELGAkWDwkDAgECAUUGAQwIAQEXh2oMvRWODoFKhB0Dl3yBL4UDi0WBZoFAOg
X-IronPort-AV: E=Sophos;i="4.90,970,1371081600"; d="scan'208";a="18245914"
Received: from ams-core-2.cisco.com ([144.254.72.75]) by ams-iport-4.cisco.com with ESMTP; 24 Sep 2013 14:07:17 +0000
Received: from [10.60.67.87] (ams-bclaise-8916.cisco.com [10.60.67.87]) by ams-core-2.cisco.com (8.14.5/8.14.5) with ESMTP id r8OE7FhM022384; Tue, 24 Sep 2013 14:07:15 GMT
Message-ID: <52419C92.9040807@cisco.com>
Date: Tue, 24 Sep 2013 16:07:15 +0200
From: Benoit Claise <bclaise@cisco.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:17.0) Gecko/20130801 Thunderbird/17.0.8
MIME-Version: 1.0
To: "Romascanu, Dan (Dan)" <dromasca@avaya.com>, "coman@ietf.org" <coman@ietf.org>, The IESG <iesg@ietf.org>, 6lo WG <6lo@ietf.org>
References: <20130923180202.32168.94377.idtracker@ietfa.amsl.com> <9904FB1B0159DA42B0B887B7FA8119CA128E75E5@AZ-FFEXMB04.global.avaya.com> <52419692.7050903@cisco.com> <20130924134921.GA19673@elstar.local>
In-Reply-To: <20130924134921.GA19673@elstar.local>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Subject: Re: [coman] [6lo] WG Review: IPv6 over Networks of Resource-constrained Nodes (6lo)
X-BeenThere: coman@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Management of Constrained Networks and Devices <coman.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/coman>, <mailto:coman-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/coman>
List-Post: <mailto:coman@ietf.org>
List-Help: <mailto:coman-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/coman>, <mailto:coman-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 24 Sep 2013 14:07:44 -0000

On 24/09/2013 15:49, Juergen Schoenwaelder wrote:
> On Tue, Sep 24, 2013 at 03:41:38PM +0200, Benoit Claise wrote:
>> Hi,
>>> Hi,
>>>
>>> I have a couple of issues with the way this charter is worded at this point, which makes the scope of the proposed WG unclear to me on some respects.
>>>
>>> 1. There is careful wording about 'link layer technologies of interest' and about 'Security and management work that is not specific to the link layers being worked on is out of scope' - but no indication what are the criteria to identify these, or a list of initial such layer technologies. Is this completely open by now? Is there a process to discuss and select those?
>>>
>>> 2. 'Selected MIB modules' - Did the team working on this proposal make any preparation work and determine that writing MIB modules is the appropriate way of meeting the manageability requirements for 6lo? If yes, where is this documented? If no, maybe this item should be worded in a more general manner and talk about requirements for managing the IP-over-foo specifications, followed by development of the appropriate information models and data models (the latest may be MIB modules, or may be something else).
>> I would add, for the 6lo people benefits, that
>> http://tools.ietf.org/html/draft-ersue-constrained-mgmt-03 would be
>> a good start.
>> Disclaimer: maybe this draft was mentioned already. I'm not
>> following the 6lo mailing list.
> My understanding is that the charter refers to
>
> http://tools.ietf.org/html/draft-schoenw-6lowpan-mib-03
>
> and that it not aims at a general discussion about network management
> of constrained devices. That is, it refers to concrete work instead of
> abstract work.
That's actually my point. Should we focus on developing a MIB module, 
taking for granting that SNMP is THE way to manage constrained nodes? Or 
should we ask ourselves: based on the collected management requirements, 
let's see what is more appropriate?
You know, like I2RS is currently doing, instead of jumping to 
NETCONF/YANG directly because it seemed like the solution.

Regards, Bneoit

>
> /js
>