[icnrg] Comments to draft-zhang-icnrg-icniot-requirements-01

Börje Ohlman <borje.ohlman@ericsson.com> Thu, 17 November 2016 08:37 UTC

Return-Path: <borje.ohlman@ericsson.com>
X-Original-To: icnrg@ietfa.amsl.com
Delivered-To: icnrg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 54A771297BC for <icnrg@ietfa.amsl.com>; Thu, 17 Nov 2016 00:37:00 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.22
X-Spam-Level:
X-Spam-Status: No, score=-4.22 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3xMF0s4RCMe3 for <icnrg@ietfa.amsl.com>; Thu, 17 Nov 2016 00:36:58 -0800 (PST)
Received: from sessmg23.ericsson.net (sessmg23.ericsson.net [193.180.251.45]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 88D05129705 for <icnrg@irtf.org>; Thu, 17 Nov 2016 00:36:57 -0800 (PST)
X-AuditID: c1b4fb2d-c2ca3980000062bf-97-582d6c27a8f9
Received: from ESESSHC017.ericsson.se (Unknown_Domain [153.88.183.69]) by (Symantec Mail Security) with SMTP id 12.2F.25279.72C6D285; Thu, 17 Nov 2016 09:36:55 +0100 (CET)
Received: from ESESSMB107.ericsson.se ([169.254.7.62]) by ESESSHC017.ericsson.se ([153.88.183.69]) with mapi id 14.03.0319.002; Thu, 17 Nov 2016 09:36:55 +0100
From: Börje Ohlman <borje.ohlman@ericsson.com>
To: icnrg <icnrg@irtf.org>
Thread-Topic: Comments to draft-zhang-icnrg-icniot-requirements-01
Thread-Index: AQHSQK2/upj/+tsUVEalw3kY12OO/Q==
Date: Thu, 17 Nov 2016 08:36:53 +0000
Message-ID: <4FE7AC78-735C-45BB-8096-F169D3601220@ericsson.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [153.88.183.148]
Content-Type: multipart/alternative; boundary="_000_4FE7AC78735C45BB8096F169D3601220ericssoncom_"
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFvrILMWRmVeSWpSXmKPExsUyM2K7q656jm6EwaNuS4uds3cyOTB6TN54 mC2AMYrLJiU1J7MstUjfLoErY0LbUpaC+7+YKnb8TmhgfPeBqYuRk0NCwERi/pJjLF2MXBxC AusYJZa3HmGCcBYzSmzetIAFpIpNwEli2fmn7CC2iICUxKa9d9lAbGEBW4mmM2vZIOJOEt8+ TWGGsPUk5l7cDWazCKhK/HtzGGwOr4C9xMmpOxhBbEYBWYkvjavBapgFxCVuPZkPdZGAxJI9 55khbFGJl4//sULYShKNS54A2RxA9ckSnz/zQowUlDg58wnLBEbBWUgmzUKomoWkCiKsKbF+ lz5EtaLElO6H7BC2hkTrnLlQtrXEkyXdTMhqFjByrGIULU4tLs5NNzLWSy3KTC4uzs/Ty0st 2cQIjIiDW37r7mBc/drxEKMAB6MSD29BiU6EEGtiWXFl7iFGCQ5mJRHetkzdCCHelMTKqtSi /Pii0pzU4kOM0hwsSuK8ZivvhwsJpCeWpGanphakFsFkmTg4pRoY0/ZcCLFS+h/Jriftv/jd m5Otm46eMt/5TfrCNvPVnDt2Pbj/80Ii/8yypyU+e9NfPX6dwns7WD654M9sjunNUrzfbJKu TXqpqnL4N9+9f8LHuwJEYixz69eIxVj7lrkIi0TLy+VaHQi+8Pn9+aAL3bVzlTfFGjhWS5jz 1WRpHOXeqFDqVL1UiaU4I9FQi7moOBEA8SQw34QCAAA=
Archived-At: <https://mailarchive.ietf.org/arch/msg/icnrg/TiF2p3PMEwGzU0rba3Jeae-0Gns>
Subject: [icnrg] Comments to draft-zhang-icnrg-icniot-requirements-01
X-BeenThere: icnrg@irtf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Information-Centric Networking research group discussion list <icnrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/icnrg>, <mailto:icnrg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/icnrg/>
List-Post: <mailto:icnrg@irtf.org>
List-Help: <mailto:icnrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/icnrg>, <mailto:icnrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Thu, 17 Nov 2016 08:37:01 -0000

Here are some comments on draft-zhang-icnrg-icniot-requirements-01

Börje
<Chair hat off>

—————————————————

Overall comments:

  *
Whenever it is stated the ICN is better than IP or that something is hard to do with IP that should be substantiated and references provided, e.g. Sec. 6.3 §2
  *
Why is not MQTT mentioned in the document? It is one of the more commonly used IoT protocols today.

Detailed comments:
Sec. 2.1
“The first step towards realizing a unified IoT platform is the
ability to assign names that are unique within the scope and lifetime
of each device, data items generated by these devices, or a group of
devices towards a common objective.”


  *
What names, devices and/or data?
  *
Should names be device dependent and be limited by the lifetime of a device?

“names need to be persistent (within one or more
contexts) against dynamic features that are common in IoT systems,
such as lifetime, mobility or migration”

  *
Why should persistence be context dependent?

“names should provide
advantages to application authors in comparison with traditional host
address based schemes”

  *
What type of advantages?

Sec. 2.3
“IoT devices can be broadly classified into two groups: resource-sufficient
and resource-constrained.”

  *
Why not use the type 1, type 2 & type 3 classes that is commonly referred to in IoT discussion

Sec. 5.3
“Caching in constrained networks is limited to small amounts
in the order of 10KB, while caching in infrastructure part of the
network can allow much larger chunks.”

  *
I think this type of document should refrain from stating specific numbers on what certain type of devices can or can’t do as this will certainly change over time.
  *
In addition, it is unclear from the formulation if the number refers to size of individual chunks or total device caching capability

Sec. 5.4

  *
The discussion on mobility, starting in the second bullet with “Finally, another challenge is to quantify the cost associated with mobility management, especially static binding vs. dynamic binding.” should be made into a separate sub-section. That way it will be visible in the table of contents.
  *
In the last bullet it should be mentioned that hierarchical names are a problem for mobility as it is stated that they are an advantage in the scalability discussion.
  *
In the last bullet it is stated “For handling mobility across different domains, more sophisticated approaches could be used, including the adoption of a SDN-based control plane.” If this should be stated, it should be substantiated by some example and reference.
  *
Editorial - second bullet:
     *
s/main/maintain/

Sec. 5.6

  *
§3, Editorial: s/Another is challenge is/Another challenge is/

Sec. 5.7

  *
First bullet:
Once again, I think this type of document should refrain from stating specific numbers on what certain type of devices can or can’t do as this will certainly change over time. Just one example: http://science.sciencemag.org/content/354/6310/302


  *
Second bullet:
The items in the numbered list not specific for infrastructure and/or too general to be meaningful.

Sec. 5.10

  *   Should be expanded to say something meaningful or removed.