[Lwip] draft-ietf-lwig-cellular-01

Hannes Tschofenig <hannes.tschofenig@gmx.net> Thu, 03 July 2014 08:23 UTC

Return-Path: <hannes.tschofenig@gmx.net>
X-Original-To: lwip@ietfa.amsl.com
Delivered-To: lwip@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BA7191A02F4 for <lwip@ietfa.amsl.com>; Thu, 3 Jul 2014 01:23:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.551
X-Spam-Level:
X-Spam-Status: No, score=-2.551 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RP_MATCHES_RCVD=-0.651, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ki-51kKDPDpB for <lwip@ietfa.amsl.com>; Thu, 3 Jul 2014 01:23:34 -0700 (PDT)
Received: from mout.gmx.net (mout.gmx.net [212.227.15.15]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5A4BA1A032D for <lwip@ietf.org>; Thu, 3 Jul 2014 01:23:34 -0700 (PDT)
Received: from [192.168.131.128] ([80.92.115.50]) by mail.gmx.com (mrgmx001) with ESMTPSA (Nemesis) id 0Mdafs-1XGyrY0qR2-00PPv0 for <lwip@ietf.org>; Thu, 03 Jul 2014 10:23:32 +0200
Message-ID: <53B51302.1080803@gmx.net>
Date: Thu, 03 Jul 2014 10:23:30 +0200
From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: lwip@ietf.org
X-Enigmail-Version: 1.5.2
OpenPGP: id=4D776BC9
Content-Type: multipart/signed; micalg="pgp-sha512"; protocol="application/pgp-signature"; boundary="cOIs3TE9Kg8VuweKELsmbJRX359evwO9L"
X-Provags-ID: V03:K0:RxAT5XTP45zmd7OYasKR+pQSlG+fU6JmQkg0Ek8Yed6QiTbbM7e N2oBFwmUPtL9PH5VJc5OHsniD0vkZdEb//XjCR5v1us9AUTG8Hc8+6OxP8ib4Ohl8NUB4Qw Rt9nwoontvKzpK1R19PQHvOPi9fae3Yttj/m82ald63RMvUvn2Rn6Chnusxmd5cPyl0uYKB 91qvxBoTEqVyFxptXnSBA==
Archived-At: http://mailarchive.ietf.org/arch/msg/lwip/ktcxCuYuq5McB3Y0WT6Fr_X3qTY
Subject: [Lwip] draft-ietf-lwig-cellular-01
X-BeenThere: lwip@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Lightweight IP stack <lwip.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lwip>, <mailto:lwip-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/lwip/>
List-Post: <mailto:lwip@ietf.org>
List-Help: <mailto:lwip-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lwip>, <mailto:lwip-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 03 Jul 2014 08:23:36 -0000

Hi all,

I briefly read through this document.

Here is my summary of what I learned from the different sections.

* Section 2.  Goals for Low-Power Operation

This section high level summary about energy consumption and types of
power sources. It summarizes some of the statements from the LWIG
terminology draft.

* Section 3.  Link-Layer Assumptions

I learned that cellular networks are application agnostic (at least
agnostic to these types of IoT applications), that the common link model
is the point-to-point link and multicast discovery does not work
(whatever one would want to discover locally) and that listening as well
as sending on a radio requires energy.

* Section 4.  Scenarios

Two scenarios are being investigated,namely the sleepy device and the
real-time reachable device.

* Section 5.  Discovery and Registration

This section talks about the normal network attachment procedure and
then focuses on the CoAP protocol interactions (resource directory and
the not yet standardized mirror proxy). Since there is nothing in the
local cellular network to discover the document describes alternative
ways to discover these CoAP entities.

* Section 6.  Data Formats

This section highlights that there are different data formats and the
authors recommend the use of [I-D.jennings-senml].

* Section 7.  Real-Time Reachable Devices

This section discusses the use of CoAP servers to accomplish these
reachable devices. Needless to say that servers consume more energy.

* Section 8.  Sleepy Devices

This section speculates about the use of the CoAP mirror servers and
attempts to give recommendations for implementers.

* Section 9 Security Considerations

The description focuses on the delegation of queries in context of the
mirror server discovery.

My summary:

From the title of the document I was a bit surprised not to learn
anything about cellular radio technologies. I think the filename and the
title of the document is misleading.

I think the goals of the document have to be re-evaluated. There is a
lot of text in there but not much that I haven't read in other documents
already.

Ciao
Hannes