Re: future of identifiers

Toerless Eckert <eckert@cisco.com> Wed, 06 November 2013 02:54 UTC

Return-Path: <eckert@cisco.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A631421E8136 for <ietf@ietfa.amsl.com>; Tue, 5 Nov 2013 18:54:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.228
X-Spam-Level:
X-Spam-Status: No, score=-9.228 tagged_above=-999 required=5 tests=[AWL=-1.084, BAYES_00=-2.599, FRT_ADOBE2=2.455, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id N63816TA91MO for <ietf@ietfa.amsl.com>; Tue, 5 Nov 2013 18:54:10 -0800 (PST)
Received: from mtv-iport-3.cisco.com (mtv-iport-3.cisco.com [173.36.130.14]) by ietfa.amsl.com (Postfix) with ESMTP id 073DC21E8122 for <ietf@ietf.org>; Tue, 5 Nov 2013 18:54:10 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=2174; q=dns/txt; s=iport; t=1383706450; x=1384916050; h=date:from:to:cc:subject:message-id:references: mime-version:in-reply-to; bh=KsGbyi2GtLTt4S6jlkC5ndk3oyxwA9Ekq7/gsga+3Uk=; b=Z660n7sDuo9PqQBmXcH/TyL12aeP8SQ7cCL9eUCv4TWhSz9xB2ZJWUVX NVlkErTUi0p5qjH2ZaMmExCkbb9YpTvrh0xNzSiv4QMFoaEe7zPnYkh/t UuzbauUcdbcRyRu8rO86eyymkyMk5iTBmKwKdT+hp+1w9UmO2OrLK5uTb k=;
X-IronPort-AV: E=Sophos;i="4.93,643,1378857600"; d="scan'208";a="94159334"
Received: from mtv-core-1.cisco.com ([171.68.58.6]) by mtv-iport-3.cisco.com with ESMTP; 06 Nov 2013 02:54:09 +0000
Received: from irp-view13.cisco.com (irp-view13.cisco.com [171.70.120.60]) by mtv-core-1.cisco.com (8.14.5/8.14.5) with ESMTP id rA62s7Bj011948 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 6 Nov 2013 02:54:08 GMT
Received: from irp-view13.cisco.com (localhost [127.0.0.1]) by irp-view13.cisco.com (8.14.4+Sun/8.13.8) with ESMTP id rA62s67f028918; Tue, 5 Nov 2013 18:54:07 -0800 (PST)
Received: (from eckert@localhost) by irp-view13.cisco.com (8.14.4+Sun/8.14.4/Submit) id rA62s64C028914; Tue, 5 Nov 2013 18:54:06 -0800 (PST)
Date: Tue, 05 Nov 2013 18:54:06 -0800
From: Toerless Eckert <eckert@cisco.com>
To: "Fred Baker (fred)" <fred@cisco.com>
Subject: Re: future of identifiers
Message-ID: <20131106025406.GA4431@cisco.com>
References: <9F02AA5D-4146-4F8D-B635-DE5B44A9DA9A@piuha.net> <8C48B86A895913448548E6D15DA7553BA85458@xmb-rcd-x09.cisco.com> <C68CB012D9182D408CED7B884F441D4D348260C0FD@nambxv01a.corp.adobe.com> <8173C389-CF81-4014-9A72-AF2260391668@cisco.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <8173C389-CF81-4014-9A72-AF2260391668@cisco.com>
User-Agent: Mutt/1.4i
Cc: "ietf@ietf.org Discussion" <ietf@ietf.org>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Nov 2013 02:54:15 -0000

Nice use case, Fred. Hope you got one of those sensors for your
own underbrushes. I am sure though, that if this is deployed by a
government agency, everything has unique identities, just for keeping
the bureaucracy happy with inventory maintenance and re-supply processes.

Would be nice though if the concept of anonymous identy was better
embodies in the IETF architecture.

Cheers
    Toerless

On Wed, Nov 06, 2013 at 01:36:42AM +0000, Fred Baker (fred) wrote:
> 
> On Nov 1, 2013, at 3:34 PM, Larry Masinter <masinter@adobe.com> wrote:
> >> it might be a good thing if we were to first identify what needs to be identified.
> > 
> > "Everything" needs to be identified. 
> 
> I'm not sure I buy that.
> 
> Let me give you an example. Deborah Estrin did some research a number of years ago with the California Division of Forestry, USC/ISI (which is where she was at the time), and UCSB on the use of a randomly distributed sensor network in managing wildfires. The premise was that an airplane might pitch out styrofoam "golf balls" that contained, each, a watch battery, a cheap GPS, a silicon radio that might be able to reach a few hundred meters, and silicon pretty comparable to the inside of a wristwatch. The device, when it landed, would figure out where it was to a level of accuracy on the order of tens of meters and then turn off the GPS. After that, it would periodically wake up, hear statements from its neighbors, and then make a statement. The statement would be of the form "I am located <here>, and I can hear {<list of locations>}." The statement might also include zero or more statements of the form "location <there> is reportedly [no longer] speaking."
> 
> In the nature of the case, if the fire ate up a sensor, it would stop commenting, and the fact of its doing so would rattle around the network until it got to someone that cared, such as an application on a PC. But it is not reported as "Larry's favorite golfball isn't speaking". It's "GPS Location XX/YY isn't speaking".
> 
> In this context, the locations need to be identified, but not the golf balls (nobody speaks TO them, so they don't need an address).