[Roll] Node Ability to Participate (NAP)

Abdussalam Baryun <abdussalambaryun@gmail.com> Sun, 03 June 2012 08:37 UTC

Return-Path: <abdussalambaryun@gmail.com>
X-Original-To: roll@ietfa.amsl.com
Delivered-To: roll@ietfa.amsl.com
Received: from localhost (localhost []) by ietfa.amsl.com (Postfix) with ESMTP id 64A0221F8613 for <roll@ietfa.amsl.com>; Sun, 3 Jun 2012 01:37:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.442
X-Spam-Status: No, score=-3.442 tagged_above=-999 required=5 tests=[AWL=0.157, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([]) by localhost (ietfa.amsl.com []) (amavisd-new, port 10024) with ESMTP id wxZAFwlfF6Hc for <roll@ietfa.amsl.com>; Sun, 3 Jun 2012 01:37:14 -0700 (PDT)
Received: from mail-vc0-f172.google.com (mail-vc0-f172.google.com []) by ietfa.amsl.com (Postfix) with ESMTP id AE5DB21F8611 for <roll@ietf.org>; Sun, 3 Jun 2012 01:37:14 -0700 (PDT)
Received: by vcqp1 with SMTP id p1so2248555vcq.31 for <roll@ietf.org>; Sun, 03 Jun 2012 01:37:14 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=XeoQwO7YZf6zRnRSdzL6A1H8LI+7bgHjfhmhulDzrjM=; b=g0MClwUQKtKbZq1RJE5OMRGYV38KjAy9nyHzdKDpNcsXGM0sBMqLYBoujMTqQtQoGg cd56QK6KoMlhC8iY65dq8EWMFTRrO21TIDza37FytV9OCeYN1JHDGc2a0mNe14m+LzEA qkwvnC1Sn8bwxjCJ1v43RPz62GRHumUHvlzNmRC78AR8LaOTBhyyKk0xC9BBp6OrORsy VF8DLVvFLUA6F0hwKE91Ejq78841Wzh8MYpbI1n+ux5txigWaG4Q5+qQSR4620qym/uC wLSVlxJw3yRDnaqoEemNyWxOPIE49LsTFNaPKtmtIQKs4tj5mjmM5Xm1u72Q/Jp+DzLI l0+w==
MIME-Version: 1.0
Received: by with SMTP id x17mr7377107vds.117.1338712633939; Sun, 03 Jun 2012 01:37:13 -0700 (PDT)
Received: by with HTTP; Sun, 3 Jun 2012 01:37:13 -0700 (PDT)
In-Reply-To: <CADnDZ893+npCLZxStpOQtm=gNfyShh6o6q-pNxSQC5b7EsM0+A@mail.gmail.com>
References: <CADnDZ893+npCLZxStpOQtm=gNfyShh6o6q-pNxSQC5b7EsM0+A@mail.gmail.com>
Date: Sun, 03 Jun 2012 10:37:13 +0200
Message-ID: <CADnDZ89vacTTyi3+gUd4qHiq_cVQuo0GsGR1AjmU08w9QnZPvg@mail.gmail.com>
From: Abdussalam Baryun <abdussalambaryun@gmail.com>
To: roll@ietf.org
Content-Type: text/plain; charset="ISO-8859-1"
Subject: [Roll] Node Ability to Participate (NAP)
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/roll>, <mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/roll>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>, <mailto:roll-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 03 Jun 2012 08:37:15 -0000

================Possible Duplication===================
Hi All,

I want to discuss is there a need to consider the node ability to
participate (NAP) in LLN functions?

I think that the node ability (considering; energy consumption issue,
routing issue, and environment-event issue), it is good for some
node-originators to know neighbor nodes/sinks ability ( NAP to-route,
or NAP continue-to-route, or NAP to-survive, NAP to-store, NAP
to-manage, or other abilities), but not sure if it is available in
some of the ROLL or 6lowpan protocols, nor sure if it can make side
effects to LLN performance. The node-ability can be useful if we have
different devices capabilities and conditions. This knowledge-factor
can be useful and may be included in some technique, or forwarding
table in the protocol specification.

I want to know your advises and opinion, thanking you,

Best regards

Abdussalam Baryun,
University of Glamorgan, UK.
( One may be wrong, or may be right, but it does not matter if we work together
as a group to discuss and resolve all issues. WGs are always right )
This email and any attachments are confidential to the intended recipient
and may also be privileged. If you are not the intended recipient please
delete it from your system and notify the sender. The contents are comply
to the IETF regulations, and WG procedures. You should not copy the
email nor use it for any other purpose, nor disclose, nor distribute its
contents to any other person.