Document Action: 'Management of Networks with Constrained Devices: Use Cases' to Informational RFC (draft-ietf-opsawg-coman-use-cases-05.txt)

The IESG <> Mon, 02 March 2015 15:43 UTC

Return-Path: <>
Received: from localhost ( []) by (Postfix) with ESMTP id 46AB21A1B95 for <>; Mon, 2 Mar 2015 07:43:16 -0800 (PST)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -101.9
X-Spam-Status: No, score=-101.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, USER_IN_WHITELIST=-100] autolearn=ham
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id Y1tlfZ4qAr6o; Mon, 2 Mar 2015 07:43:15 -0800 (PST)
Received: from (localhost [IPv6:::1]) by (Postfix) with ESMTP id AE1C61A00D4; Mon, 2 Mar 2015 07:43:12 -0800 (PST)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: The IESG <>
To: "IETF-Announce" <>
Subject: Document Action: 'Management of Networks with Constrained Devices: Use Cases' to Informational RFC (draft-ietf-opsawg-coman-use-cases-05.txt)
X-Test-IDTracker: no
X-IETF-IDTracker: 5.12.0.p1
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <>
Date: Mon, 02 Mar 2015 07:43:12 -0800
Archived-At: <>
Cc: RFC Editor <>
X-Mailman-Version: 2.1.15
List-Id: "IETF announcement list. No discussions." <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Mon, 02 Mar 2015 15:43:16 -0000

The IESG has approved the following document:
- 'Management of Networks with Constrained Devices: Use Cases'
  (draft-ietf-opsawg-coman-use-cases-05.txt) as Informational RFC

This document is the product of the Operations and Management Area
Working Group.

The IESG contact persons are Benoit Claise and Joel Jaeggli.

A URL of this Internet Draft is:

Technical Summary

Constrained devices (limited CPU, memory, and power resources) can be
connected to a network. This network may also be constrained or 
challenged (unreliable or lossy channels, wireless technologies with
limited bandwidth and a dynamic topology). This may make traditional
network management a poor fit for these networks. This document
outlines use cases for a network with constrained devices.  

Document Quality

This document provides an overview and introduction to constrained
networks / networks with constrained devices. It discusses where they
are typically used, and some of the challenges in managing them.
 Special thanks to Thomas Watteyne and Pascal Thubert for 
arranging additional review.


Warren Kumari will be the document shepherd, Joel Jaeggli is taking over 
for Benoit Claise as sponsoring AD.