[icnrg] Comments on draft-zhang-icnrg-icniot-requirements

David Oran <daveoran@orandom.net> Thu, 17 November 2016 13:56 UTC

Return-Path: <daveoran@orandom.net>
X-Original-To: icnrg@ietfa.amsl.com
Delivered-To: icnrg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8B0F812995D for <icnrg@ietfa.amsl.com>; Thu, 17 Nov 2016 05:56:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ioavs1f8Aovm for <icnrg@ietfa.amsl.com>; Thu, 17 Nov 2016 05:56:28 -0800 (PST)
Received: from spark.crystalorb.net (spark.crystalorb.net [IPv6:2607:fca8:1530::c]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4A89912995A for <icnrg@irtf.org>; Thu, 17 Nov 2016 05:56:28 -0800 (PST)
Received: from [192.168.15.130] (c-24-61-46-100.hsd1.ma.comcast.net [24.61.46.100]) (authenticated bits=0) by spark.crystalorb.net (8.14.4/8.14.4/Debian-4+deb7u1) with ESMTP id uAHDuOCp027120 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO) for <icnrg@irtf.org>; Thu, 17 Nov 2016 05:56:26 -0800
From: David Oran <daveoran@orandom.net>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Mime-Version: 1.0 (Mac OS X Mail 10.2 \(3256\))
Message-Id: <E2071F8C-9CC6-4C40-9DBE-75940E00853E@orandom.net>
Date: Thu, 17 Nov 2016 08:56:28 -0500
To: icnrg <icnrg@irtf.org>
X-Mailer: Apple Mail (2.3256)
Archived-At: <https://mailarchive.ietf.org/arch/msg/icnrg/FiBi9DBq_yLkX0snVcmJgkbdbBg>
Subject: [icnrg] Comments on draft-zhang-icnrg-icniot-requirements
X-BeenThere: icnrg@irtf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Information-Centric Networking research group discussion list <icnrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/icnrg>, <mailto:icnrg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/icnrg/>
List-Post: <mailto:icnrg@irtf.org>
List-Help: <mailto:icnrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/icnrg>, <mailto:icnrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Thu, 17 Nov 2016 13:56:29 -0000

<chair hat off>


- I don’t think this document contains requirements, nor should it. It should be re-titled and its content measured against a scope something like “design considerations in applying ICN approaches to the Internet of Things”.

- The initial section on IoT requirements could be considerably shortened and consist primarily of references to the very good literature describing the characteristics of IoT systems. Repeating all this here just bores the reader already familiar with the field. In fact, there is a tension between a solid research contribution and a tutorial document. In its current state, the material is very much tutorial in nature, and as such is not ideal for an ICNRG publication.

- detail: in section 2 2.9 ROLL is mischaracterized. While it is “tree-like, it permits multiple trees to be computed, which may be exactly what one may desire. It is unclear if the “rich communication patterns” talked about are at odds with multi-tree routing, and in fact one could argue that the communication patterns of IoT systems aren’t particularly rich at all!

- the division of the world into “infrastructure” and “ad hoc” mode is simplistic and doesn’t add guidance for any interesting research directions.

- The section on “Open API” adds no value. There is nothing specific to either IoT or ICN here

- The whole of section 3.2.1 is confused and this reviewer thinks many of the assertions are contrafactual. First of all, adopting the “overlay” terminology is quite unhelpful, as the term “overlay” tends to just mean realizing one kind of network on top of another kind of network (or an instance of the same kind of network). This obfuscates the many architectural tradeoffs about what functions get performed in what layers in a layered architecture. To just give one example, it is claimed that “the overlay approach cannot react to dynamic contextual changes in a timely fashion”. This is patently false, as has been shown many times where real networks violate the triangle inequality and an overlay in fact responds to changes faster than the underlay. Rather than belabor each of the points here please rethink the entire section.

- somewhere the DTN elephant-in-the-room needs to be covered. Some, but not all of the supposed advantages in section 4 can be achieved using DTN; others can be achieved without a wholesale shift to ICN.

- the section on caching/storage (5.3) is way to general and in desperate need of concrete examples

- section 5.7 on security and privacy are essentially tutorial and don’t provide much if any insight into an unusual or unique challenges. The claim that IoT-ICN introduces new threats is in fact falsified by the list of threats, none of which are in fact new.

- section 5.9 on communication reliability is just motherhood and adds no value. Either say something insightful or get rid of it.

- The sections on the individual vertical targets need review by experts in these areas. As it now stands the material is much too general to be of much value in guiding research or evaluating which of various ICN approaches work well for the corresponding use case.

——