Re: [homenet] Homenet market gap analysis...

Ted Lemon <mellon@fugue.com> Thu, 14 March 2019 00:40 UTC

Return-Path: <mellon@fugue.com>
X-Original-To: homenet@ietfa.amsl.com
Delivered-To: homenet@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 47FD212894E for <homenet@ietfa.amsl.com>; Wed, 13 Mar 2019 17:40:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=fugue-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EZToGtht_HkF for <homenet@ietfa.amsl.com>; Wed, 13 Mar 2019 17:40:16 -0700 (PDT)
Received: from mail-qk1-x742.google.com (mail-qk1-x742.google.com [IPv6:2607:f8b0:4864:20::742]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 20D321279AA for <homenet@ietf.org>; Wed, 13 Mar 2019 17:40:16 -0700 (PDT)
Received: by mail-qk1-x742.google.com with SMTP id z76so2318670qkb.12 for <homenet@ietf.org>; Wed, 13 Mar 2019 17:40:16 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fugue-com.20150623.gappssmtp.com; s=20150623; h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=QVP9Fm5+yahCkXFR4FlJXdsNkFRFrydFg5ZwTOMeg08=; b=J8qJm6RCog2ZmD16tnax6T94xnfFIXi30SL3BPcAox+rrYzPrN42Saf9Oj3vdxCXG2 zAIM1nevxvXypIO49kwCfqIN/KgZXqwYthPVeWsWJU0INdIupPsDrAYshH+0EPiWS1r5 z4HmcbOGhTk3NGyWGfBN2h3PgzZd4+W7FAn6d6CXXc30PStVCBdVh7Q7cXTzoQvzYZZY nTkWlxUIguFl7gMD8p3aDEmOdS/1Gm8pxZh7D1py3jyc+F7+JrBl0aCfwndBYJx4dQf8 v/SmfCyv7cvpVvWOagWapcQlwTCzNwe/2UMZPWVzwH48/JKD2tqoF3Nay9TEy57381r8 Ol6Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=QVP9Fm5+yahCkXFR4FlJXdsNkFRFrydFg5ZwTOMeg08=; b=rfgMoo+XUmn2yTQCdxHCrsxOZweJ8j6ilJPMDqTtH4fKSMiSO8bkDSt5bGNHN85Rbt t2d0DomBSuQE11KYDIzvSlURoJrBdmtK+X0lz/LW/FcxoInDhf6FYjvnRqZp5OMtUsJo gEvjq7rj36PUfZfcRLre8PhI1fZhRkHboasu8QivCQ/SwBS+S56yR93ubCSYGqZwFHTg XxsfFdT3PWIGRn6X4lTY9P5QQIhwNiI6rjLc2w31lebPL3LNjg8IoWvBB8J7Ndjo7sCD YEuLoYNob9JBNdRCjmwruJ33rkXlf3E4U5m3gTrNpG6NwAk5t/7CnJcwGHsjUyxgCnO5 copw==
X-Gm-Message-State: APjAAAVV8krSMucbIdPReyofFBG5i0ctPKAx/2sZNFO0Y7rwL+eOIJxN tsL1Df0xYVNXEQ6u8MaeA6DSHg==
X-Google-Smtp-Source: APXvYqzMfFd9J8sP07oDorY9/eaz6U5Tye3FWIVrLI9LglE3ti/KeSpPUe0lhKVDYvCa7eWyMFnlzQ==
X-Received: by 2002:a37:e212:: with SMTP id g18mr23342477qki.152.1552524015044; Wed, 13 Mar 2019 17:40:15 -0700 (PDT)
Received: from [10.0.100.12] (c-73-186-137-119.hsd1.ma.comcast.net. [73.186.137.119]) by smtp.gmail.com with ESMTPSA id h10sm14209480qta.3.2019.03.13.17.40.14 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 13 Mar 2019 17:40:14 -0700 (PDT)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.2\))
From: Ted Lemon <mellon@fugue.com>
In-Reply-To: <F44636E4-D224-405D-A0B3-106702D64D37@coote.org>
Date: Wed, 13 Mar 2019 20:40:12 -0400
Cc: HOMENET <homenet@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <3C1C7448-7F0A-4863-B419-0EBAA3921436@fugue.com>
References: <ACFF8ADB-BC7F-4A12-BE14-E7655F1C82E2@fugue.com> <F44636E4-D224-405D-A0B3-106702D64D37@coote.org>
To: Tim Coote <tim+ietf.org@coote.org>
X-Mailer: Apple Mail (2.3445.104.2)
Archived-At: <https://mailarchive.ietf.org/arch/msg/homenet/QwxI0_1kYfi_hxAWtHHYyfiAxm8>
Subject: Re: [homenet] Homenet market gap analysis...
X-BeenThere: homenet@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF Homenet WG mailing list <homenet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/homenet>, <mailto:homenet-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/homenet/>
List-Post: <mailto:homenet@ietf.org>
List-Help: <mailto:homenet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/homenet>, <mailto:homenet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Mar 2019 00:40:19 -0000

Tim, it’s pretty clear that in the case of constrained networks, there needs to be subnetting.   Homenet is uniquely positioned to make that possible—if you have a regular router that doesn’t support something like HNCP, there’s no way to make it work.

In the case of a multi-premise homenet, either you have to bond the two homenets together, which we don’t currently support, or you need end-to-end to work, which means IPv6, and you need to make sure that only authorized hosts can talk to devices.

Toke and I have been discussing the endpoint roaming problem.   In L2, it’s all handled by the layer 2, so it’s transparent, which doesn’t necessarily mean that it’s any better than the less-transparent way it would need to be handled at L3.   I think we should do a comparison between these two approaches.

Mapping names to addresses can be done with service discovery; please see the simple homenet naming architecture document for a discussion of this, and also RFC6763.   We will be doing some work on this at hackathon if you want to see it in action.

Node identity can be managed with DNSSD Service Registration Protocol, which allows a host to claim and defend a name using public key cryptography.   Bear in mind that there are privace implications to this, and so it isn’t always the right thing to do.   Your printer should probably do it.   Your phone, perhaps not.   Private service discovery is being seriously discussed in the DNSSD working group.   Because private service discovery necessarily uses public key encryption, unique identifiers aren’t a problem; claiming a unique name remains a problem, but not a very big problem, because the name doesn’t change after pairing.

IoT meshes are out of scope for homenet.   I agree that there are some interesting problems to contemplate when using them. :)


> On Mar 13, 2019, at 6:45 PM, Tim Coote <tim+ietf.org@coote.org> wrote:
> 
> Ted
> 
>> On 13 Mar 2019, at 18:35, Ted Lemon <mellon@fugue.com> wrote:
>> 
>> In Bangkok I gave a talk about what Homenet gets right, what new solutions have emerged in the market since homenet started, and what is better about those solutions, as well as what homenet still adds.   I’ve written up a document that discusses this in a bit more depth, and would appreciate feedback.   It’s not very long, and should be a pretty easy read—it would be great if we could start talking about this before the meeting, so that when we get to the meeting we can have an informed discussion and maybe decide on a way forward if that seems warranted.
>> 
>> https://tools.ietf.org/html/draft-lemon-homenet-review-00
>> 
> 
> Some points/questions. Pls excuse my hamfisted articulation/miss an obvious point, I’m no network specialist.
> 
> - IoT isolation for L2: a common scenario is that the IoT network has a vastly different performance profile to other in-home networks. I don’t think that this works well for Flat L2
> - for some IoT scenarios, the scope of a home isn’t one premises, eg wanting to control a camera in one house from a controller in another. There is no general IPv4 solution to this as protocols such as STUN/ICE are too slow, in human reaction time terms, to use to set up the control link.
> - how is an endpoint reconnected if it’s moving about and getting renumbered? Is this done via some naming service?
> - how are human understandable names mapped to addresses, automatically? Is this service discovery?
> - node identity: if a node is moving about and/or has multiple addresses at the same time, how does a human understand that it’s the same thing. For s/w this is quite easy, although non-standard. Is this an application layer concern?
> - a point wrt meshes: although these potentially provide resilience, they can also provide confusion as the end to end service can move up and down over various timescales. I have experienced some very expensive support situations that were caused by (IoT) mesh networks breaking the principle of ‘fail-fast’. In these situations, as the world changes, L2 networks adopt a ’string of pearls’ topology, but do not report the changes. Ultimately there is a network partition, which breaks things in interesting ways from an engineering point of view and confusing ways from the point of view of users.
> 
> I hope that this is useful.
> 
> tc
> 
>