[Roll] Node Ability to Participate (NAP)

Abdussalam Baryun <abdussalambaryun@gmail.com> Mon, 04 June 2012 06:06 UTC

Return-Path: <abdussalambaryun@gmail.com>
X-Original-To: roll@ietfa.amsl.com
Delivered-To: roll@ietfa.amsl.com
Received: from localhost (localhost []) by ietfa.amsl.com (Postfix) with ESMTP id BE88021F87D2 for <roll@ietfa.amsl.com>; Sun, 3 Jun 2012 23:06:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.469
X-Spam-Status: No, score=-3.469 tagged_above=-999 required=5 tests=[AWL=0.130, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([]) by localhost (ietfa.amsl.com []) (amavisd-new, port 10024) with ESMTP id hyrVoVO6-61o for <roll@ietfa.amsl.com>; Sun, 3 Jun 2012 23:06:37 -0700 (PDT)
Received: from mail-vb0-f44.google.com (mail-vb0-f44.google.com []) by ietfa.amsl.com (Postfix) with ESMTP id 282AA21F87D0 for <roll@ietf.org>; Sun, 3 Jun 2012 23:06:37 -0700 (PDT)
Received: by vbbez10 with SMTP id ez10so2562781vbb.31 for <roll@ietf.org>; Sun, 03 Jun 2012 23:06:36 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :content-type; bh=TLo0QPPpZkzi8HnZy/VofnO5TzfcvSO9NcAfBlV7bNw=; b=w8cYfF6Us4ZaX1nPv48beoIX+TT9X4hDHOBTpOazMZo0FZ0dmrTwRJcIq/xdhpK+5z VDdNcpmZTSTLud992pJHPj1SCvhZZ+YtVj/al6J5OqLfNt9wVQ5d6lMEbjRf0bYONn07 hmtRvmh/4XvCWI1w/bNIXFXqS48J2gp2VkqTJSCVGyXWqhHk97M2sOK8d4oR06v2GCls W9q+S2SNnCA7V8gp7EwDWW0u1aVHl7uqq+/0LCYLjrGfsFmVx9ShPj9/foQnNjk6gWBY cLA3NM9eG4VJA8/e6dFCwcE79qnwqP9rNLn6TN7nIev+Evh/anvfdyLoJex/BmHzh2dp WNEA==
MIME-Version: 1.0
Received: by with SMTP id x17mr9533809vds.117.1338789995930; Sun, 03 Jun 2012 23:06:35 -0700 (PDT)
Received: by with HTTP; Sun, 3 Jun 2012 23:06:35 -0700 (PDT)
In-Reply-To: <CADnDZ893+npCLZxStpOQtm=gNfyShh6o6q-pNxSQC5b7EsM0+A@mail.gmail.com>
References: <CADnDZ893+npCLZxStpOQtm=gNfyShh6o6q-pNxSQC5b7EsM0+A@mail.gmail.com>
Date: Mon, 04 Jun 2012 08:06:35 +0200
Message-ID: <CADnDZ89hapaCaUFbLGath66cYhW1wLbsQH3kKRbS0GPcR0ARtA@mail.gmail.com>
From: Abdussalam Baryun <abdussalambaryun@gmail.com>
To: roll@ietf.org
Content-Type: text/plain; charset="ISO-8859-1"
Subject: [Roll] Node Ability to Participate (NAP)
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/roll>, <mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/roll>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>, <mailto:roll-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Jun 2012 06:06:37 -0000

=============== Possible Duplication ====================
Hi All,

I want to discuss is there a need to consider the node ability to
participate (NAP) in LLN functions?

I think that the node ability (considering; energy consumption issue,
routing issue, and environment-event issue), it is good for some
node-originators to know neighbor nodes/sinks ability ( NAP to-route,
or NAP continue-to-route, or NAP to-survive, NAP to-store, NAP
to-manage, or other abilities), but not sure if it is available in
some of the ROLL or 6lowpan protocols, nor sure if it can make side
effects to LLN performance. The node-ability can be useful if we have
different devices capabilities and conditions. This knowledge-factor
can be useful and may be included in some technique, or forwarding
table in the protocol specification.

I want to know your advises and opinion, thanking you,

Best regards

Abdussalam Baryun,
University of Glamorgan, UK.
( One may be wrong, or may be right, but it does not matter if we work together
as a group to discuss and resolve all issues. WGs are always right )
This email and any attachments are confidential to the intended recipient
and may also be privileged. If you are not the intended recipient please
delete it from your system and notify the sender. The contents are comply
to the IETF regulations, and WG procedures. You should not copy the
email nor use it for any other purpose, nor disclose, nor distribute its
contents to any other person.