From roll-bounces@ietf.org  Sat Aug  9 13:50:29 2008
Return-Path: <roll-bounces@ietf.org>
X-Original-To: roll-archive@ietf.org
Delivered-To: ietfarch-roll-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 2FCED3A68A4;
	Sat,  9 Aug 2008 13:50:29 -0700 (PDT)
X-Original-To: roll@core3.amsl.com
Delivered-To: roll@core3.amsl.com
Received: from localhost (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 4DDB23A68A4
	for <roll@core3.amsl.com>; Sat,  9 Aug 2008 13:50:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.528
X-Spam-Level: 
X-Spam-Status: No, score=-5.528 tagged_above=-999 required=5
	tests=[AWL=-0.326, BAYES_00=-2.599, HTML_MESSAGE=0.001,
	MIME_QP_LONG_LINE=1.396, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32])
	by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id XKfi+ZqE2feY for <roll@core3.amsl.com>;
	Sat,  9 Aug 2008 13:50:27 -0700 (PDT)
Received: from rtp-iport-2.cisco.com (rtp-iport-2.cisco.com [64.102.122.149])
	by core3.amsl.com (Postfix) with ESMTP id 1D5E33A6835
	for <roll@ietf.org>; Sat,  9 Aug 2008 13:50:27 -0700 (PDT)
X-IronPort-AV: E=Sophos;i="4.31,334,1215388800"; d="scan'208,217";a="17004089"
Received: from rtp-dkim-2.cisco.com ([64.102.121.159])
	by rtp-iport-2.cisco.com with ESMTP; 09 Aug 2008 20:50:25 +0000
Received: from rtp-core-1.cisco.com (rtp-core-1.cisco.com [64.102.124.12])
	by rtp-dkim-2.cisco.com (8.12.11/8.12.11) with ESMTP id m79KoPrw003663
	for <roll@ietf.org>; Sat, 9 Aug 2008 16:50:25 -0400
Received: from xbh-rtp-211.amer.cisco.com (xbh-rtp-211.cisco.com
	[64.102.31.102])
	by rtp-core-1.cisco.com (8.13.8/8.13.8) with ESMTP id m79KoPma001644
	for <roll@ietf.org>; Sat, 9 Aug 2008 20:50:25 GMT
Received: from xmb-rtp-213.amer.cisco.com ([64.102.31.112]) by
	xbh-rtp-211.amer.cisco.com with Microsoft SMTPSVC(6.0.3790.1830); 
	Sat, 9 Aug 2008 16:50:25 -0400
Received: from 10.61.81.172 ([10.61.81.172]) by xmb-rtp-213.amer.cisco.com
	([64.102.31.112]) with Microsoft Exchange Server HTTP-DAV ; 
	Sat,  9 Aug 2008 20:50:25 +0000
User-Agent: Microsoft-Entourage/12.11.0.080522
Date: Sat, 09 Aug 2008 22:50:24 +0200
From: JP Vasseur <jvasseur@cisco.com>
To: <roll@ietf.org>
Message-ID: <C4C3CFB0.4DAEB%jvasseur@cisco.com>
Thread-Topic: Adoption of draft-levis-roll-protocols-survey as a ROLL WG
	document
Thread-Index: Acj6YYuLuMHTFm5cuUyrafLczWZV4A==
Mime-version: 1.0
X-OriginalArrivalTime: 09 Aug 2008 20:50:25.0523 (UTC)
	FILETIME=[8C73CC30:01C8FA61]
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; l=1722; t=1218315025;
	x=1219179025; c=relaxed/simple; s=rtpdkim2001;
	h=Content-Type:From:Subject:Content-Transfer-Encoding:MIME-Version;
	d=cisco.com; i=jvasseur@cisco.com;
	z=From:=20JP=20Vasseur=20<jvasseur@cisco.com>
	|Subject:=20Adoption=20of=20draft-levis-roll-protocols-surv
	ey=20as=20a=20ROLL=20WG=20document |Sender:=20
	|To:=20<roll@ietf.org>;
	bh=TibEj2e9suk08VNtIOtj7lPPw83uk+87/m3IZRNCZFs=;
	b=Nkh3eX4UIAXu0e+HHxEt6oNB0LOzRWi7AkEQx96g0u5ilddd1ArG6OwL9S
	T7NAJo8R7JU39FkWryMuHq242ZCx1p/mlJjCaKi92/gXyTOujLwlcto6IL8x
	1MsZH159IJ;
Authentication-Results: rtp-dkim-2; header.From=jvasseur@cisco.com; dkim=pass (
	sig from cisco.com/rtpdkim2001 verified; ); 
Subject: [Roll] Adoption of draft-levis-roll-protocols-survey as a ROLL WG
	document
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/roll>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============1900746766=="
Sender: roll-bounces@ietf.org
Errors-To: roll-bounces@ietf.org

> This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

--===============1900746766==
Content-type: multipart/alternative;
	boundary="B_3301167024_11872651"

> This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

--B_3301167024_11872651
Content-type: text/plain;
	charset="US-ASCII"
Content-transfer-encoding: 7bit

Dear WG,

There was a good consensus to adopt draft-levis-roll-protocols-survey as a
ROLL WG document during the ROLL WG meeting in Dublin but as usual we need
to confirm on the mailing list.

Are you in favor/opposed adopting draft-levis-roll-protocols-survey
(http://www.ietf.org/internet-drafts/draft-levis-roll-protocols-survey-02.tx
t) as a ROLL WG document ?

Note that the draft has been slightly updated to align it with the
presentation that was made during the meeting.

Thanks.

JP.

--B_3301167024_11872651
Content-type: text/html;
	charset="US-ASCII"
Content-transfer-encoding: quoted-printable

<HTML>
<HEAD>
<TITLE>Adoption of draft-levis-roll-protocols-survey as a ROLL WG document<=
/TITLE>
</HEAD>
<BODY>
<FONT FACE=3D"Arial"><SPAN STYLE=3D'font-size:14pt'>Dear WG,<BR>
<BR>
There was a good consensus to adopt draft-levis-roll-protocols-survey as a =
ROLL WG document during the ROLL WG meeting in Dublin but as usual we need t=
o confirm on the mailing list.<BR>
<BR>
Are you in favor/opposed adopting draft-levis-roll-protocols-survey (<a hre=
f=3D"http://www.ietf.org/internet-drafts/draft-levis-roll-protocols-survey-02.=
txt">http://www.ietf.org/internet-drafts/draft-levis-roll-protocols-survey-0=
2.txt</a>) as a ROLL WG document ?<BR>
<BR>
Note that the draft has been slightly updated to align it with the presenta=
tion that was made during the meeting.<BR>
<BR>
Thanks.<BR>
<BR>
JP.</SPAN></FONT>
</BODY>
</HTML>


--B_3301167024_11872651--


--===============1900746766==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Roll mailing list
Roll@ietf.org
https://www.ietf.org/mailman/listinfo/roll

--===============1900746766==--



From roll-bounces@ietf.org  Sun Aug 10 12:32:21 2008
Return-Path: <roll-bounces@ietf.org>
X-Original-To: roll-archive@ietf.org
Delivered-To: ietfarch-roll-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id E1C063A6C10;
	Sun, 10 Aug 2008 12:32:21 -0700 (PDT)
X-Original-To: roll@core3.amsl.com
Delivered-To: roll@core3.amsl.com
Received: from localhost (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 4DD5B3A6B10
	for <roll@core3.amsl.com>; Sun, 10 Aug 2008 12:32:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.38
X-Spam-Level: 
X-Spam-Status: No, score=-2.38 tagged_above=-999 required=5
	tests=[BAYES_00=-2.599, DATE_IN_PAST_24_48=1.219,
	RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32])
	by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id D4wktiAiHdzz for <roll@core3.amsl.com>;
	Sun, 10 Aug 2008 12:32:19 -0700 (PDT)
Received: from auth-smtp.nebula.fi (auth-smtp.nebula.fi [217.30.180.105])
	by core3.amsl.com (Postfix) with ESMTP id 4DE7B3A6B16
	for <roll@ietf.org>; Sun, 10 Aug 2008 12:32:18 -0700 (PDT)
Received: from koa-lohtaja.bogus (line-6770.dyn.kponet.fi [85.29.72.203])
	(authenticated bits=0)
	by auth-smtp.nebula.fi (8.13.4/8.13.4) with ESMTP id m7AJVOA2017302
	(version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO);
	Sun, 10 Aug 2008 22:31:25 +0300
Message-ID: <489D8E22.9050108@sensinode.com>
Date: Sat, 09 Aug 2008 15:31:30 +0300
From: Zach Shelby <zach@sensinode.com>
User-Agent: Thunderbird 2.0.0.16 (Macintosh/20080707)
MIME-Version: 1.0
To: JP Vasseur <jvasseur@cisco.com>
References: <C4C3CFB0.4DAEB%jvasseur@cisco.com>
In-Reply-To: <C4C3CFB0.4DAEB%jvasseur@cisco.com>
Cc: roll@ietf.org
Subject: Re: [Roll] Adoption of draft-levis-roll-protocols-survey as a ROLL
 WG	document
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/roll>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Sender: roll-bounces@ietf.org
Errors-To: roll-bounces@ietf.org

In favor!

JP Vasseur wrote:
> Dear WG,
> 
> There was a good consensus to adopt draft-levis-roll-protocols-survey as 
> a ROLL WG document during the ROLL WG meeting in Dublin but as usual we 
> need to confirm on the mailing list.
> 
> Are you in favor/opposed adopting draft-levis-roll-protocols-survey 
> (http://www.ietf.org/internet-drafts/draft-levis-roll-protocols-survey-02.txt) 
> as a ROLL WG document ?
> 
> Note that the draft has been slightly updated to align it with the 
> presentation that was made during the meeting.
> 
> Thanks.
> 
> JP.
> 
> 
> ------------------------------------------------------------------------
> 
> _______________________________________________
> Roll mailing list
> Roll@ietf.org
> https://www.ietf.org/mailman/listinfo/roll

-- 

Zach Shelby
Head of Research
Sensinode Ltd.
Kidekuja 2
88610 Vuokatti
FINLAND

mobile: +358 40 7796297

This e-mail and all attached material are confidential and may contain 
legally privileged information. If you are not the intended recipient, 
please contact the sender and delete the e-mail from your system without 
producing, distributing or retaining copies thereof.
_______________________________________________
Roll mailing list
Roll@ietf.org
https://www.ietf.org/mailman/listinfo/roll


From roll-bounces@ietf.org  Mon Aug 11 00:05:23 2008
Return-Path: <roll-bounces@ietf.org>
X-Original-To: roll-archive@ietf.org
Delivered-To: ietfarch-roll-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 2542C3A6B59;
	Mon, 11 Aug 2008 00:05:23 -0700 (PDT)
X-Original-To: roll@core3.amsl.com
Delivered-To: roll@core3.amsl.com
Received: from localhost (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 216423A67ED
	for <roll@core3.amsl.com>; Mon, 11 Aug 2008 00:05:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.184
X-Spam-Level: 
X-Spam-Status: No, score=-0.184 tagged_above=-999 required=5
	tests=[BAYES_40=-0.185, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32])
	by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id ONGnFPAir8PH for <roll@core3.amsl.com>;
	Mon, 11 Aug 2008 00:05:20 -0700 (PDT)
Received: from mail.zen-sys.com (mail.zen-sys.com [195.215.56.170])
	by core3.amsl.com (Postfix) with ESMTP id ECC7A3A691E
	for <roll@ietf.org>; Mon, 11 Aug 2008 00:05:19 -0700 (PDT)
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Date: Mon, 11 Aug 2008 09:05:11 +0200
Message-ID: <6D9687E95918C04A8B30A7D6DA805A3EB68CF4@zensys17.zensys.local>
In-Reply-To: <C4C3CFB0.4DAEB%jvasseur@cisco.com>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: [Roll] Adoption of draft-levis-roll-protocols-survey as a ROLL
	WGdocument
Thread-Index: Acj6YYuLuMHTFm5cuUyrafLczWZV4ABHv6KQ
References: <C4C3CFB0.4DAEB%jvasseur@cisco.com>
From: "Anders Brandt" <abr@zen-sys.com>
To: <roll@ietf.org>
Subject: Re: [Roll] Adoption of draft-levis-roll-protocols-survey as a ROLL
	WGdocument
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/roll>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============0216598003=="
Sender: roll-bounces@ietf.org
Errors-To: roll-bounces@ietf.org

This is a multi-part message in MIME format.

--===============0216598003==
Content-class: urn:content-classes:message
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C8FB80.9892250E"

This is a multi-part message in MIME format.

------_=_NextPart_001_01C8FB80.9892250E
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

I support it.
=20
- Anders

________________________________

From: roll-bounces@ietf.org [mailto:roll-bounces@ietf.org] On Behalf Of
JP Vasseur
Sent: 9. august 2008 22:50
To: roll@ietf.org
Subject: [Roll] Adoption of draft-levis-roll-protocols-survey as a ROLL
WGdocument


Dear WG,

There was a good consensus to adopt draft-levis-roll-protocols-survey as
a ROLL WG document during the ROLL WG meeting in Dublin but as usual we
need to confirm on the mailing list.

Are you in favor/opposed adopting draft-levis-roll-protocols-survey
(http://www.ietf.org/internet-drafts/draft-levis-roll-protocols-survey-0
2.txt) as a ROLL WG document ?

Note that the draft has been slightly updated to align it with the
presentation that was made during the meeting.

Thanks.

JP.=20

------_=_NextPart_001_01C8FB80.9892250E
Content-Type: text/html;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD><TITLE>Adoption of draft-levis-roll-protocols-survey as a =
ROLL WG document</TITLE>
<META http-equiv=3DContent-Type content=3D"text/html; =
charset=3Dus-ascii">
<META content=3D"MSHTML 6.00.6000.16674" name=3DGENERATOR></HEAD>
<BODY>
<DIV dir=3Dltr align=3Dleft><FONT face=3DArial color=3D#0000ff =
size=3D2><SPAN=20
class=3D182470407-11082008>I support it.</SPAN></FONT></DIV>
<DIV dir=3Dltr align=3Dleft><FONT face=3DArial color=3D#0000ff =
size=3D2><SPAN=20
class=3D182470407-11082008></SPAN></FONT>&nbsp;</DIV>
<DIV dir=3Dltr align=3Dleft><FONT face=3DArial color=3D#0000ff =
size=3D2><SPAN=20
class=3D182470407-11082008>- Anders</SPAN></FONT></DIV><BR>
<DIV class=3DOutlookMessageHeader lang=3Den-us dir=3Dltr align=3Dleft>
<HR tabIndex=3D-1>
<FONT face=3DTahoma size=3D2><B>From:</B> roll-bounces@ietf.org=20
[mailto:roll-bounces@ietf.org] <B>On Behalf Of </B>JP =
Vasseur<BR><B>Sent:</B> 9.=20
august 2008 22:50<BR><B>To:</B> roll@ietf.org<BR><B>Subject:</B> [Roll] =
Adoption=20
of draft-levis-roll-protocols-survey as a ROLL =
WGdocument<BR></FONT><BR></DIV>
<DIV></DIV><FONT face=3DArial><SPAN style=3D"FONT-SIZE: 14pt">Dear =
WG,<BR><BR>There=20
was a good consensus to adopt draft-levis-roll-protocols-survey as a =
ROLL WG=20
document during the ROLL WG meeting in Dublin but as usual we need to =
confirm on=20
the mailing list.<BR><BR>Are you in favor/opposed adopting=20
draft-levis-roll-protocols-survey (<A=20
href=3D"http://www.ietf.org/internet-drafts/draft-levis-roll-protocols-su=
rvey-02.txt">http://www.ietf.org/internet-drafts/draft-levis-roll-protoco=
ls-survey-02.txt</A>)=20
as a ROLL WG document ?<BR><BR>Note that the draft has been slightly =
updated to=20
align it with the presentation that was made during the=20
meeting.<BR><BR>Thanks.<BR><BR>JP.</SPAN></FONT> </BODY></HTML>

------_=_NextPart_001_01C8FB80.9892250E--

--===============0216598003==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Roll mailing list
Roll@ietf.org
https://www.ietf.org/mailman/listinfo/roll

--===============0216598003==--


From roll-bounces@ietf.org  Mon Aug 11 00:38:45 2008
Return-Path: <roll-bounces@ietf.org>
X-Original-To: roll-archive@ietf.org
Delivered-To: ietfarch-roll-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id E2D673A6C60;
	Mon, 11 Aug 2008 00:38:45 -0700 (PDT)
X-Original-To: roll@core3.amsl.com
Delivered-To: roll@core3.amsl.com
Received: from localhost (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id B31483A6C58
	for <roll@core3.amsl.com>; Mon, 11 Aug 2008 00:38:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.504
X-Spam-Level: 
X-Spam-Status: No, score=-0.504 tagged_above=-999 required=5
	tests=[BAYES_00=-2.599, HELO_EQ_NL=0.55, HOST_EQ_NL=1.545]
Received: from mail.ietf.org ([64.170.98.32])
	by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id hTP0MBHkK-Gh for <roll@core3.amsl.com>;
	Mon, 11 Aug 2008 00:38:43 -0700 (PDT)
Received: from mailouta.tno.nl (mailouta.tno.nl [134.221.1.16])
	by core3.amsl.com (Postfix) with ESMTP id 8F6B23A67D7
	for <roll@ietf.org>; Mon, 11 Aug 2008 00:38:43 -0700 (PDT)
X-IronPort-AV: E=Sophos;i="4.31,341,1215381600"; 
   d="scan'208";a="7818718"
Received: from ms-dt01thalia.tno.nl (HELO ms-dt01thalia.tsn.tno.nl)
	([134.221.225.157])
	by mailhost1a.tno.nl with ESMTP; 11 Aug 2008 09:38:38 +0200
Content-class: urn:content-classes:message
MIME-Version: 1.0
x-mimeole: Produced By Microsoft Exchange V6.5
Date: Mon, 11 Aug 2008 09:38:37 +0200
Message-ID: <42F3BE57026C6E49B09E267EEF639D56034D6806@ms-dt01thalia.tsn.tno.nl>
In-Reply-To: <mailman.23.1218394803.24535.roll@ietf.org>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: Roll Digest, Vol 7, Issue 1
Thread-Index: Acj7G2As3vrxxONFRJuvBApyh1+19wAachcw
References: <mailman.23.1218394803.24535.roll@ietf.org>
From: "Zhang, S. (Shuang)" <shuang.zhang@tno.nl>
To: <roll@ietf.org>
Subject: Re: [Roll] Roll Digest, Vol 7, Issue 1
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/roll>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: roll-bounces@ietf.org
Errors-To: roll-bounces@ietf.org

Dear WG,

I am in favor of the adoption of draft-levis-roll-protocols-survey as a
ROLL WG document.

Kind regards,
Shuang Zhang

-----Original Message-----
From: roll-bounces@ietf.org [mailto:roll-bounces@ietf.org] On Behalf Of
roll-request@ietf.org
Sent: zondag 10 augustus 2008 21:00
To: roll@ietf.org
Subject: Roll Digest, Vol 7, Issue 1

Send Roll mailing list submissions to
	roll@ietf.org

To subscribe or unsubscribe via the World Wide Web, visit
	https://www.ietf.org/mailman/listinfo/roll
or, via email, send a message with subject or body 'help' to
	roll-request@ietf.org

You can reach the person managing the list at
	roll-owner@ietf.org

When replying, please edit your Subject line so it is more specific than
"Re: Contents of Roll digest..."


Today's Topics:

   1. Adoption of draft-levis-roll-protocols-survey as a ROLL WG
      document (JP Vasseur)


----------------------------------------------------------------------

Message: 1
Date: Sat, 09 Aug 2008 22:50:24 +0200
From: JP Vasseur <jvasseur@cisco.com>
Subject: [Roll] Adoption of draft-levis-roll-protocols-survey as a
	ROLL WG	document
To: <roll@ietf.org>
Message-ID: <C4C3CFB0.4DAEB%jvasseur@cisco.com>
Content-Type: text/plain; charset="us-ascii"

Dear WG,

There was a good consensus to adopt draft-levis-roll-protocols-survey as
a ROLL WG document during the ROLL WG meeting in Dublin but as usual we
need to confirm on the mailing list.

Are you in favor/opposed adopting draft-levis-roll-protocols-survey
(http://www.ietf.org/internet-drafts/draft-levis-roll-protocols-survey-0
2.tx
t) as a ROLL WG document ?

Note that the draft has been slightly updated to align it with the
presentation that was made during the meeting.

Thanks.

JP.
-------------- next part --------------
An HTML attachment was scrubbed...
URL:
<http://www.ietf.org/pipermail/roll/attachments/20080809/89f70ce8/attach
ment-0001.htm>

------------------------------

_______________________________________________
Roll mailing list
Roll@ietf.org
https://www.ietf.org/mailman/listinfo/roll


End of Roll Digest, Vol 7, Issue 1
**********************************
This e-mail and its contents are subject to the DISCLAIMER at http://www.tno.nl/disclaimer/email.html

_______________________________________________
Roll mailing list
Roll@ietf.org
https://www.ietf.org/mailman/listinfo/roll


From roll-bounces@ietf.org  Mon Aug 11 09:34:51 2008
Return-Path: <roll-bounces@ietf.org>
X-Original-To: roll-archive@ietf.org
Delivered-To: ietfarch-roll-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 3EC3D3A6ABC;
	Mon, 11 Aug 2008 09:34:51 -0700 (PDT)
X-Original-To: roll@core3.amsl.com
Delivered-To: roll@core3.amsl.com
Received: from localhost (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 413C23A6A4D
	for <roll@core3.amsl.com>; Mon, 11 Aug 2008 09:34:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.247
X-Spam-Level: 
X-Spam-Status: No, score=-2.247 tagged_above=-999 required=5
	tests=[BAYES_00=-2.599, HELO_EQ_FR=0.35, HTML_MESSAGE=0.001,
	UNPARSEABLE_RELAY=0.001]
Received: from mail.ietf.org ([64.170.98.32])
	by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id HEICZio7ocvO for <roll@core3.amsl.com>;
	Mon, 11 Aug 2008 09:34:48 -0700 (PDT)
Received: from relais-inet.francetelecom.com (relais-ias92.francetelecom.com
	[193.251.215.92])
	by core3.amsl.com (Postfix) with ESMTP id 2DB003A6801
	for <roll@ietf.org>; Mon, 11 Aug 2008 09:34:48 -0700 (PDT)
Received: from omfedm06.si.francetelecom.fr (unknown [xx.xx.xx.2])
	by omfedm12.si.francetelecom.fr (ESMTP service) with ESMTP id
	D0D1A48085; Mon, 11 Aug 2008 18:34:47 +0200 (CEST)
Received: from PMEXCC21.intranet-paris.francetelecom.fr (unknown
	[10.196.130.6])
	by omfedm06.si.francetelecom.fr (ESMTP service) with ESMTP id
	98DB36800B; Mon, 11 Aug 2008 18:34:47 +0200 (CEST)
Received: from PMEXCB30.intranet-paris.francetelecom.fr ([10.196.130.38]) by
	PMEXCC21.intranet-paris.francetelecom.fr with Microsoft
	SMTPSVC(6.0.3790.2499); Mon, 11 Aug 2008 18:34:47 +0200
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Date: Mon, 11 Aug 2008 18:34:42 +0200
Message-ID: <53DE7AEBE1DD5741A44C363427681922033F3800@PMEXCB30.intranet-paris.francetelecom.fr>
In-Reply-To: <C4C3CFB0.4DAEB%jvasseur@cisco.com>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: [Roll] Adoption of draft-levis-roll-protocols-survey as a ROLL
	WGdocument
thread-index: Acj6YYuLuMHTFm5cuUyrafLczWZV4ABbpNRg
From: <christian.jacquenet@orange-ftgroup.com>
To: "JP Vasseur" <jvasseur@cisco.com>,
	<roll@ietf.org>
X-OriginalArrivalTime: 11 Aug 2008 16:34:47.0423 (UTC)
	FILETIME=[2B0EF8F0:01C8FBD0]
Subject: Re: [Roll] Adoption of draft-levis-roll-protocols-survey as a ROLL
	WGdocument
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/roll>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============0807582776=="
Sender: roll-bounces@ietf.org
Errors-To: roll-bounces@ietf.org

This is a multi-part message in MIME format.

--===============0807582776==
Content-class: urn:content-classes:message
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C8FBD0.2AE1C0B0"

This is a multi-part message in MIME format.

------_=_NextPart_001_01C8FBD0.2AE1C0B0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable


Dear all,
=20
In favor=2E
=20
Cheers,
=20
Christian=2E


________________________________

	De : roll-bounces@ietf=2Eorg [mailto:roll-bounces@ietf=2Eorg] De la part=
 de JP Vasseur
	Envoy=E9 : samedi 9 ao=FBt 2008 22:50
	=C0 : roll@ietf=2Eorg
	Objet : [Roll] Adoption of draft-levis-roll-protocols-survey as a ROLL=
 WGdocument
=09
=09
	Dear WG,
=09
	There was a good consensus to adopt draft-levis-roll-protocols-survey as a=
 ROLL WG document during the ROLL WG meeting in Dublin but as usual we need=
 to confirm on the mailing list=2E
=09
	Are you in favor/opposed adopting draft-levis-roll-protocols-survey=
 (http://www=2Eietf=
=2Eorg/internet-drafts/draft-levis-roll-protocols-survey-02=2Etxt) as a=
 ROLL WG document ?
=09
	Note that the draft has been slightly updated to align it with the=
 presentation that was made during the meeting=2E
=09
	Thanks=2E
=09
	JP=2E=20



*********************************
This message and any attachments (the "message") are confidential and=
 intended solely for the addressees=2E=20
Any unauthorised use or dissemination is prohibited=2E
Messages are susceptible to alteration=2E=20
France Telecom Group shall not be liable for the message if altered,=
 changed or falsified=2E
If you are not the intended addressee of this message, please cancel it=
 immediately and inform the sender=2E
********************************
------_=_NextPart_001_01C8FBD0.2AE1C0B0
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4=2E0 Transitional//EN">
<HTML><HEAD><TITLE>Adoption of draft-levis-roll-protocols-survey as a ROLL=
 WG document</TITLE>
<META http-equiv=3DContent-Type content=3D"text/html; charset=
=3Diso-8859-1">
<META content=3D"MSHTML 6=2E00=2E2900=2E3314" name=3DGENERATOR></HEAD>
<BODY>
<DIV dir=3Dltr align=3Dleft><SPAN class=3D996263416-11082008><FONT face=
=3D"Courier New"=20
color=3D#0000ff size=3D2>Dear all,</FONT></SPAN></DIV>
<DIV dir=3Dltr align=3Dleft><SPAN class=3D996263416-11082008><FONT face=
=3D"Courier New"=20
color=3D#0000ff size=3D2></FONT></SPAN>&nbsp;</DIV>
<DIV dir=3Dltr align=3Dleft><SPAN class=3D996263416-11082008><FONT face=
=3D"Courier New"=20
color=3D#0000ff size=3D2>In favor=2E</FONT></SPAN></DIV>
<DIV dir=3Dltr align=3Dleft><SPAN class=3D996263416-11082008><FONT face=
=3D"Courier New"=20
color=3D#0000ff size=3D2></FONT></SPAN>&nbsp;</DIV>
<DIV dir=3Dltr align=3Dleft><SPAN class=3D996263416-11082008><FONT face=
=3D"Courier New"=20
color=3D#0000ff size=3D2>Cheers,</FONT></SPAN></DIV>
<DIV dir=3Dltr align=3Dleft><SPAN class=3D996263416-11082008><FONT face=
=3D"Courier New"=20
color=3D#0000ff size=3D2></FONT></SPAN>&nbsp;</DIV>
<DIV dir=3Dltr align=3Dleft><SPAN class=3D996263416-11082008><FONT face=
=3D"Courier New"=20
color=3D#0000ff size=3D2>Christian=2E</FONT></SPAN></DIV><BR>
<BLOCKQUOTE style=3D"MARGIN-RIGHT: 0px">
  <DIV class=3DOutlookMessageHeader lang=3Dfr dir=3Dltr align=3Dleft>
  <HR tabIndex=3D-1>
  <FONT face=3DTahoma size=3D2><B>De&nbsp;:</B> roll-bounces@ietf=2Eorg=20
  [mailto:roll-bounces@ietf=2Eorg] <B>De la part de</B> JP=20
  Vasseur<BR><B>Envoy=E9&nbsp;:</B> samedi 9 ao=FBt 2008 22:50<BR><B>=
=C0&nbsp;:</B>=20
  roll@ietf=2Eorg<BR><B>Objet&nbsp;:</B> [Roll] Adoption of=20
  draft-levis-roll-protocols-survey as a ROLL=
 WGdocument<BR></FONT><BR></DIV>
  <DIV></DIV><FONT face=3DArial><SPAN style=3D"FONT-SIZE: 14pt">Dear=20
  WG,<BR><BR>There was a good consensus to adopt=20
  draft-levis-roll-protocols-survey as a ROLL WG document during the ROLL=
 WG=20
  meeting in Dublin but as usual we need to confirm on the mailing=20
  list=2E<BR><BR>Are you in favor/opposed adopting=20
  draft-levis-roll-protocols-survey (<A=20
  href=3D"http://www=2Eietf=
=2Eorg/internet-drafts/draft-levis-roll-protocols-survey-02=
=2Etxt">http://www=2Eietf=
=2Eorg/internet-drafts/draft-levis-roll-protocols-survey-02=2Etxt</A>)=20
  as a ROLL WG document ?<BR><BR>Note that the draft has been slightly=
 updated=20
  to align it with the presentation that was made during the=20
  meeting=2E<BR><BR>Thanks=2E<BR><BR>JP=2E</SPAN></FONT>=
 </BLOCKQUOTE></BODY></HTML>

<table><tr><td bgcolor=3D#ffffff><font color=
=3D#000000>*********************************<br>
This message and any attachments (the "message") are confidential and=
 intended solely for the addressees=2E <br>
Any unauthorised use or dissemination is prohibited=2E<br>
Messages are susceptible to alteration=2E <br>
France Telecom Group shall not be liable for the message if altered,=
 changed or falsified=2E<br>
If you are not the intended addressee of this message, please cancel it=
 immediately and inform the sender=2E<br>
********************************<br>
</font></td></tr></table>
------_=_NextPart_001_01C8FBD0.2AE1C0B0--

--===============0807582776==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Roll mailing list
Roll@ietf.org
https://www.ietf.org/mailman/listinfo/roll

--===============0807582776==--


From roll-bounces@ietf.org  Mon Aug 11 09:37:27 2008
Return-Path: <roll-bounces@ietf.org>
X-Original-To: roll-archive@ietf.org
Delivered-To: ietfarch-roll-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 9BA093A69D5;
	Mon, 11 Aug 2008 09:37:27 -0700 (PDT)
X-Original-To: roll@core3.amsl.com
Delivered-To: roll@core3.amsl.com
Received: from localhost (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id CB1F43A69F2
	for <roll@core3.amsl.com>; Mon, 11 Aug 2008 09:37:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level: 
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5
	tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32])
	by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id 1DN7mPJCb9rq for <roll@core3.amsl.com>;
	Mon, 11 Aug 2008 09:37:26 -0700 (PDT)
Received: from mail.sf.archrock.com (mail.sf.archrock.com [216.121.16.71])
	by core3.amsl.com (Postfix) with ESMTP id 1C9DB3A6359
	for <roll@ietf.org>; Mon, 11 Aug 2008 09:37:26 -0700 (PDT)
Received: from localhost (localhost.localdomain [127.0.0.1])
	by mail.sf.archrock.com (Postfix) with ESMTP id 9F53CAF8D6;
	Mon, 11 Aug 2008 09:37:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at 
Received: from mail.sf.archrock.com ([127.0.0.1])
	by localhost (mail.sf.archrock.com [127.0.0.1]) (amavisd-new,
	port 10024)
	with ESMTP id kInCtrGsagXE; Mon, 11 Aug 2008 09:37:28 -0700 (PDT)
Received: from [192.168.7.78] (unknown [69.12.164.140])
	by mail.sf.archrock.com (Postfix) with ESMTP id D50A0AF85E;
	Mon, 11 Aug 2008 09:37:27 -0700 (PDT)
Message-Id: <B6A7837F-062E-4824-9B2D-FDFB4EDD91D2@archrock.com>
From: Jonathan Hui <jhui@archrock.com>
To: JP Vasseur <jvasseur@cisco.com>
In-Reply-To: <C4C3CFB0.4DAEB%jvasseur@cisco.com>
Mime-Version: 1.0 (Apple Message framework v926)
Date: Mon, 11 Aug 2008 09:37:17 -0700
References: <C4C3CFB0.4DAEB%jvasseur@cisco.com>
X-Mailer: Apple Mail (2.926)
Cc: roll@ietf.org
Subject: Re: [Roll] Adoption of draft-levis-roll-protocols-survey as a ROLL
	WG document
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/roll>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============1837407378=="
Sender: roll-bounces@ietf.org
Errors-To: roll-bounces@ietf.org


--===============1837407378==
Content-Type: multipart/alternative; boundary=Apple-Mail-19--352731426


--Apple-Mail-19--352731426
Content-Type: text/plain;
	charset=US-ASCII;
	format=flowed;
	delsp=yes
Content-Transfer-Encoding: 7bit


+1

It provides a good foundation for the discussion moving forward.

--
Jonathan Hui



On Aug 9, 2008, at 1:50 PM, JP Vasseur wrote:

> Dear WG,
>
> There was a good consensus to adopt draft-levis-roll-protocols- 
> survey as a ROLL WG document during the ROLL WG meeting in Dublin  
> but as usual we need to confirm on the mailing list.
>
> Are you in favor/opposed adopting draft-levis-roll-protocols-survey (http://www.ietf.org/internet-drafts/draft-levis-roll-protocols-survey-02.txt 
> ) as a ROLL WG document ?
>
> Note that the draft has been slightly updated to align it with the  
> presentation that was made during the meeting.
>
> Thanks.
>
> JP.
> _______________________________________________
> Roll mailing list
> Roll@ietf.org
> https://www.ietf.org/mailman/listinfo/roll


--Apple-Mail-19--352731426
Content-Type: text/html;
	charset=US-ASCII
Content-Transfer-Encoding: quoted-printable

<html><body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; =
-webkit-line-break: after-white-space; =
"><div><br></div><div>+1</div><div><br></div><div>It provides a good =
foundation for the discussion moving forward.</div><br><div> <span =
class=3D"Apple-style-span" style=3D"border-collapse: separate; color: =
rgb(0, 0, 0); font-family: Helvetica; font-size: 12px; font-style: =
normal; font-variant: normal; font-weight: normal; letter-spacing: =
normal; line-height: normal; orphans: 2; text-align: auto; text-indent: =
0px; text-transform: none; white-space: normal; widows: 2; word-spacing: =
0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0; "><div style=3D"word-wrap: =
break-word; -webkit-nbsp-mode: space; -webkit-line-break: =
after-white-space; "><div>--</div><div>Jonathan =
Hui</div><div><br></div></div></span><br =
class=3D"Apple-interchange-newline"> </div><br><div><div>On Aug 9, 2008, =
at 1:50 PM, JP Vasseur wrote:</div><br =
class=3D"Apple-interchange-newline"><blockquote type=3D"cite"><div> =
<font face=3D"Arial"><span style=3D"font-size:14pt">Dear WG,<br> <br> =
There was a good consensus to adopt draft-levis-roll-protocols-survey as =
a ROLL WG document during the ROLL WG meeting in Dublin but as usual we =
need to confirm on the mailing list.<br> <br> Are you in favor/opposed =
adopting draft-levis-roll-protocols-survey (<a =
href=3D"http://www.ietf.org/internet-drafts/draft-levis-roll-protocols-sur=
vey-02.txt">http://www.ietf.org/internet-drafts/draft-levis-roll-protocols=
-survey-02.txt</a>) as a ROLL WG document ?<br> <br> Note that the draft =
has been slightly updated to align it with the presentation that was =
made during the meeting.<br> <br> Thanks.<br> <br> JP.</span></font> =
</div>  _______________________________________________<br>Roll mailing =
list<br><a =
href=3D"mailto:Roll@ietf.org">Roll@ietf.org</a><br>https://www.ietf.org/ma=
ilman/listinfo/roll<br></blockquote></div><br></body></html>=

--Apple-Mail-19--352731426--

--===============1837407378==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Roll mailing list
Roll@ietf.org
https://www.ietf.org/mailman/listinfo/roll

--===============1837407378==--


From roll-bounces@ietf.org  Mon Aug 11 09:50:44 2008
Return-Path: <roll-bounces@ietf.org>
X-Original-To: roll-archive@ietf.org
Delivered-To: ietfarch-roll-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id EADAC3A6C26;
	Mon, 11 Aug 2008 09:50:44 -0700 (PDT)
X-Original-To: roll@core3.amsl.com
Delivered-To: roll@core3.amsl.com
Received: from localhost (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id A0C203A6C26
	for <roll@core3.amsl.com>; Mon, 11 Aug 2008 09:50:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5
	tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32])
	by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id x9HkSpPucmge for <roll@core3.amsl.com>;
	Mon, 11 Aug 2008 09:50:44 -0700 (PDT)
Received: from smtp108.biz.mail.re2.yahoo.com (smtp108.biz.mail.re2.yahoo.com
	[206.190.52.47]) by core3.amsl.com (Postfix) with SMTP id A90C73A6C1C
	for <roll@ietf.org>; Mon, 11 Aug 2008 09:50:43 -0700 (PDT)
Received: (qmail 38869 invoked from network); 11 Aug 2008 16:50:45 -0000
Received: from unknown (HELO ?192.168.0.207?)
	(anand@ekasystems.com@209.48.242.66 with plain)
	by smtp108.biz.mail.re2.yahoo.com with SMTP; 11 Aug 2008 16:50:44 -0000
X-YMail-OSG: d5zbZfwVM1kGY1TZGaJYVCSWRdpmMQaX_pq3GP6RLUhcGbvb7m9143mOya15u2rPhz5SDgDM37PuXKoq1eoFrTfLK_80KWAB7XIPnXEGwmcPWE_xbs6IU8O_jqg6kcU-
X-Yahoo-Newman-Property: ymail-3
Message-ID: <48A06F3E.6090908@ekasystems.com>
Date: Mon, 11 Aug 2008 12:56:30 -0400
From: "M. B. Anand" <anand@ekasystems.com>
User-Agent: Thunderbird 1.5.0.14 (Windows/20071210)
MIME-Version: 1.0
To: roll@ietf.org
References: <C4C3CFB0.4DAEB%jvasseur@cisco.com>
In-Reply-To: <C4C3CFB0.4DAEB%jvasseur@cisco.com>
Subject: Re: [Roll] Adoption of draft-levis-roll-protocols-survey as a ROLL
 WG	document
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/roll>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Sender: roll-bounces@ietf.org
Errors-To: roll-bounces@ietf.org

In favor.

Regards,
Anand.


> Dear WG,
>
> There was a good consensus to adopt draft-levis-roll-protocols-survey 
> as a ROLL WG document during the ROLL WG meeting in Dublin but as 
> usual we need to confirm on the mailing list.
>
> Are you in favor/opposed adopting draft-levis-roll-protocols-survey 
> (http://www.ietf.org/internet-drafts/draft-levis-roll-protocols-survey-02.txt) 
> as a ROLL WG document ?
>
> Note that the draft has been slightly updated to align it with the 
> presentation that was made during the meeting.
>
> Thanks.
>
> JP.
> ------------------------------------------------------------------------
>
> _______________________________________________
> Roll mailing list
> Roll@ietf.org
> https://www.ietf.org/mailman/listinfo/roll
>   

_______________________________________________
Roll mailing list
Roll@ietf.org
https://www.ietf.org/mailman/listinfo/roll


From roll-bounces@ietf.org  Mon Aug 11 10:44:01 2008
Return-Path: <roll-bounces@ietf.org>
X-Original-To: roll-archive@ietf.org
Delivered-To: ietfarch-roll-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 395173A6B1F;
	Mon, 11 Aug 2008 10:44:01 -0700 (PDT)
X-Original-To: roll@core3.amsl.com
Delivered-To: roll@core3.amsl.com
Received: from localhost (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id E70463A6B03
	for <roll@core3.amsl.com>; Mon, 11 Aug 2008 10:43:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level: 
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5
	tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32])
	by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id Sm2H-epdxXzv for <roll@core3.amsl.com>;
	Mon, 11 Aug 2008 10:43:59 -0700 (PDT)
Received: from mail.cs.wayne.edu (srv03fac.cs.wayne.edu [141.217.48.33])
	by core3.amsl.com (Postfix) with ESMTP id 207233A6AFD
	for <roll@ietf.org>; Mon, 11 Aug 2008 10:43:58 -0700 (PDT)
Received: from [127.0.0.1] ([141.217.48.171])
	by mail.cs.wayne.edu (8.14.2/8.13.4) with ESMTP id m7BHhwVJ001762;
	Mon, 11 Aug 2008 13:43:58 -0400 (EDT)
Message-ID: <48A079C8.4040006@cs.wayne.edu>
Date: Mon, 11 Aug 2008 13:41:28 -0400
From: Hongwei Zhang <hzhang@cs.wayne.edu>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US;
	rv:1.7.2) Gecko/20040804 Netscape/7.2 (ax)
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: JP Vasseur <jvasseur@cisco.com>
References: <C4C3CFB0.4DAEB%jvasseur@cisco.com>
In-Reply-To: <C4C3CFB0.4DAEB%jvasseur@cisco.com>
Cc: roll@ietf.org
Subject: Re: [Roll] Adoption of draft-levis-roll-protocols-survey as a ROLL
 WG	document
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/roll>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============1099909160=="
Sender: roll-bounces@ietf.org
Errors-To: roll-bounces@ietf.org

This is a multi-part message in MIME format.
--===============1099909160==
Content-Type: multipart/alternative;
 boundary="------------020407070106060707040204"

This is a multi-part message in MIME format.
--------------020407070106060707040204
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit

In favor.

Best,

Hongwei


JP Vasseur wrote:

> Dear WG,
>
> There was a good consensus to adopt draft-levis-roll-protocols-survey 
> as a ROLL WG document during the ROLL WG meeting in Dublin but as 
> usual we need to confirm on the mailing list.
>
> Are you in favor/opposed adopting draft-levis-roll-protocols-survey 
> (http://www.ietf.org/internet-drafts/draft-levis-roll-protocols-survey-02.txt) 
> as a ROLL WG document ?
>
> Note that the draft has been slightly updated to align it with the 
> presentation that was made during the meeting.
>
> Thanks.
>
> JP.
>
>------------------------------------------------------------------------
>
>_______________________________________________
>Roll mailing list
>Roll@ietf.org
>https://www.ietf.org/mailman/listinfo/roll
>  
>

--------------020407070106060707040204
Content-Type: text/html; charset=us-ascii
Content-Transfer-Encoding: 7bit

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
  <meta content="text/html;charset=ISO-8859-1" http-equiv="Content-Type">
  <title></title>
</head>
<body bgcolor="#ffffff" text="#000000">
In favor.<br>
<br>
Best,<br>
<br>
Hongwei<br>
<br>
<br>
JP Vasseur wrote:<br>
<blockquote cite="midC4C3CFB0.4DAEB%25jvasseur@cisco.com" type="cite">
  <title>Adoption of draft-levis-roll-protocols-survey as a ROLL WG
document</title>
  <font face="Arial"><span style="font-size: 14pt;">Dear WG,<br>
  <br>
There was a good consensus to adopt draft-levis-roll-protocols-survey
as a ROLL WG document during the ROLL WG meeting in Dublin but as usual
we need to confirm on the mailing list.<br>
  <br>
Are you in favor/opposed adopting draft-levis-roll-protocols-survey (<a
 href="http://www.ietf.org/internet-drafts/draft-levis-roll-protocols-survey-02.txt">http://www.ietf.org/internet-drafts/draft-levis-roll-protocols-survey-02.txt</a>)
as a ROLL WG document ?<br>
  <br>
Note that the draft has been slightly updated to align it with the
presentation that was made during the meeting.<br>
  <br>
Thanks.<br>
  <br>
JP.</span></font>
  <pre wrap="">
<hr size="4" width="90%">
_______________________________________________
Roll mailing list
<a class="moz-txt-link-abbreviated" href="mailto:Roll@ietf.org">Roll@ietf.org</a>
<a class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/roll">https://www.ietf.org/mailman/listinfo/roll</a>
  </pre>
</blockquote>
</body>
</html>

--------------020407070106060707040204--


--===============1099909160==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Roll mailing list
Roll@ietf.org
https://www.ietf.org/mailman/listinfo/roll

--===============1099909160==--



From roll-bounces@ietf.org  Mon Aug 11 10:50:28 2008
Return-Path: <roll-bounces@ietf.org>
X-Original-To: roll-archive@ietf.org
Delivered-To: ietfarch-roll-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 4FD433A6A43;
	Mon, 11 Aug 2008 10:50:28 -0700 (PDT)
X-Original-To: roll@core3.amsl.com
Delivered-To: roll@core3.amsl.com
Received: from localhost (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 9577E3A67EF
	for <roll@core3.amsl.com>; Mon, 11 Aug 2008 10:50:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level: 
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5
	tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32])
	by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id 2i-BwoBlAmQh for <roll@core3.amsl.com>;
	Mon, 11 Aug 2008 10:50:25 -0700 (PDT)
Received: from auswood.securesites.net (auswood.securesites.net
	[128.121.62.173])
	by core3.amsl.com (Postfix) with ESMTP id C9DB03A6A43
	for <roll@ietf.org>; Mon, 11 Aug 2008 10:50:25 -0700 (PDT)
Received: from [192.168.2.98] (adsl-99-163-7-131.dsl.pltn13.sbcglobal.net
	[99.163.7.131]) (authenticated bits=0)
	by auswood.securesites.net (8.13.6.20060614/8.13.6) with ESMTP id
	m7BHm8gh024417; Mon, 11 Aug 2008 17:48:08 GMT
Message-Id: <EF1FBFAD-7CC6-4184-9EA5-10105DB3350C@daintree.net>
From: Zachary Smith <zsmith@daintree.net>
To: JP Vasseur <jvasseur@cisco.com>
In-Reply-To: <C4C3CFB0.4DAEB%jvasseur@cisco.com>
Mime-Version: 1.0 (Apple Message framework v928.1)
Date: Mon, 11 Aug 2008 10:48:04 -0700
References: <C4C3CFB0.4DAEB%jvasseur@cisco.com>
X-Mailer: Apple Mail (2.928.1)
Cc: roll@ietf.org
Subject: Re: [Roll] Adoption of draft-levis-roll-protocols-survey as a ROLL
	WG document
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/roll>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============2133959163=="
Sender: roll-bounces@ietf.org
Errors-To: roll-bounces@ietf.org


--===============2133959163==
Content-Type: multipart/alternative; boundary=Apple-Mail-16--348483486


--Apple-Mail-16--348483486
Content-Type: text/plain;
	charset=US-ASCII;
	format=flowed;
	delsp=yes
Content-Transfer-Encoding: 7bit

in favor.

   z

On Aug 9, 2008, at 1:50 PM, JP Vasseur wrote:

> Dear WG,
>
> There was a good consensus to adopt draft-levis-roll-protocols- 
> survey as a ROLL WG document during the ROLL WG meeting in Dublin  
> but as usual we need to confirm on the mailing list.
>
> Are you in favor/opposed adopting draft-levis-roll-protocols-survey (http://www.ietf.org/internet-drafts/draft-levis-roll-protocols-survey-02.txt 
> ) as a ROLL WG document ?
>
> Note that the draft has been slightly updated to align it with the  
> presentation that was made during the meeting.
>
> Thanks.
>
> JP.
> _______________________________________________
> Roll mailing list
> Roll@ietf.org
> https://www.ietf.org/mailman/listinfo/roll


Zachary Smith - CTO
http://www.daintree.net/





--Apple-Mail-16--348483486
Content-Type: text/html;
	charset=US-ASCII
Content-Transfer-Encoding: quoted-printable

<html><body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; =
-webkit-line-break: after-white-space; ">in =
favor.<div><br></div><div>&nbsp;&nbsp;z</div><div><br><div><div>On Aug =
9, 2008, at 1:50 PM, JP Vasseur wrote:</div><br =
class=3D"Apple-interchange-newline"><blockquote type=3D"cite"><div> =
<font face=3D"Arial"><span style=3D"font-size:14pt">Dear WG,<br> <br> =
There was a good consensus to adopt draft-levis-roll-protocols-survey as =
a ROLL WG document during the ROLL WG meeting in Dublin but as usual we =
need to confirm on the mailing list.<br> <br> Are you in favor/opposed =
adopting draft-levis-roll-protocols-survey (<a =
href=3D"http://www.ietf.org/internet-drafts/draft-levis-roll-protocols-sur=
vey-02.txt">http://www.ietf.org/internet-drafts/draft-levis-roll-protocols=
-survey-02.txt</a>) as a ROLL WG document ?<br> <br> Note that the draft =
has been slightly updated to align it with the presentation that was =
made during the meeting.<br> <br> Thanks.<br> <br> JP.</span></font> =
</div>  _______________________________________________<br>Roll mailing =
list<br><a =
href=3D"mailto:Roll@ietf.org">Roll@ietf.org</a><br>https://www.ietf.org/ma=
ilman/listinfo/roll<br></blockquote></div><br><div =
apple-content-edited=3D"true"> <span class=3D"Apple-style-span" =
style=3D"border-collapse: separate; border-spacing: 0px 0px; color: =
rgb(0, 0, 0); font-family: Helvetica; font-size: 12px; font-style: =
normal; font-variant: normal; font-weight: normal; letter-spacing: =
normal; line-height: normal; text-align: auto; =
-khtml-text-decorations-in-effect: none; text-indent: 0px; =
-apple-text-size-adjust: auto; text-transform: none; orphans: 2; =
white-space: normal; widows: 2; word-spacing: 0px; "><div =
style=3D"word-wrap: break-word; -khtml-nbsp-mode: space; =
-khtml-line-break: after-white-space; "><span class=3D"Apple-style-span" =
style=3D"border-collapse: separate; border-spacing: 0px 0px; color: =
rgb(0, 0, 0); font-family: Helvetica; font-size: 12px; font-style: =
normal; font-variant: normal; font-weight: normal; letter-spacing: =
normal; line-height: normal; text-align: auto; =
-khtml-text-decorations-in-effect: none; text-indent: 0px; =
-apple-text-size-adjust: auto; text-transform: none; orphans: 2; =
white-space: normal; widows: 2; word-spacing: 0px; "><br =
class=3D"Apple-interchange-newline"><span class=3D"Apple-style-span" =
style=3D"border-collapse: separate; border-spacing: 0px 0px; color: =
rgb(0, 0, 0); font-family: Helvetica; font-size: 12px; font-style: =
normal; font-variant: normal; font-weight: normal; letter-spacing: =
normal; line-height: normal; text-align: auto; =
-khtml-text-decorations-in-effect: none; text-indent: 0px; =
-apple-text-size-adjust: auto; text-transform: none; orphans: 2; =
white-space: normal; widows: 2; word-spacing: 0px; "><span =
class=3D"Apple-style-span" style=3D"border-collapse: separate; =
border-spacing: 0px 0px; color: rgb(0, 0, 0); font-family: Helvetica; =
font-size: 12px; font-style: normal; font-variant: normal; font-weight: =
normal; letter-spacing: normal; line-height: normal; text-align: auto; =
-khtml-text-decorations-in-effect: none; text-indent: 0px; =
-apple-text-size-adjust: auto; text-transform: none; orphans: 2; =
white-space: normal; widows: 2; word-spacing: 0px; "><span =
class=3D"Apple-style-span" style=3D"border-collapse: separate; =
border-spacing: 0px 0px; color: rgb(0, 0, 0); font-family: Helvetica; =
font-size: 12px; font-style: normal; font-variant: normal; font-weight: =
normal; letter-spacing: normal; line-height: normal; text-align: auto; =
-khtml-text-decorations-in-effect: none; text-indent: 0px; =
-apple-text-size-adjust: auto; text-transform: none; orphans: 2; =
white-space: normal; widows: 2; word-spacing: 0px; "><div>Zachary Smith =
- CTO</div><div><a =
href=3D"http://www.daintree.net/">http://www.daintree.net/</a></div><div><=
br class=3D"khtml-block-placeholder"></div><div><br =
class=3D"khtml-block-placeholder"></div><br =
class=3D"Apple-interchange-newline"></span></span></span></span></div></sp=
an> </div><br></div></body></html>=

--Apple-Mail-16--348483486--

--===============2133959163==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Roll mailing list
Roll@ietf.org
https://www.ietf.org/mailman/listinfo/roll

--===============2133959163==--


From roll-bounces@ietf.org  Mon Aug 11 11:08:56 2008
Return-Path: <roll-bounces@ietf.org>
X-Original-To: roll-archive@ietf.org
Delivered-To: ietfarch-roll-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 8C52A3A6C52;
	Mon, 11 Aug 2008 11:08:56 -0700 (PDT)
X-Original-To: roll@core3.amsl.com
Delivered-To: roll@core3.amsl.com
Received: from localhost (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id F2C743A69A5
	for <roll@core3.amsl.com>; Mon, 11 Aug 2008 11:08:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5
	tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32])
	by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id B1c-XAQFOzk7 for <roll@core3.amsl.com>;
	Mon, 11 Aug 2008 11:08:55 -0700 (PDT)
Received: from smtp105.biz.mail.re2.yahoo.com (smtp105.biz.mail.re2.yahoo.com
	[206.190.52.174])
	by core3.amsl.com (Postfix) with SMTP id 0C5AD3A6919
	for <roll@ietf.org>; Mon, 11 Aug 2008 11:08:54 -0700 (PDT)
Received: (qmail 80305 invoked from network); 11 Aug 2008 18:08:57 -0000
Received: from unknown (HELO zeke.ekasystems.com)
	(tim.winter@ekasystems.com@209.48.242.66 with plain)
	by smtp105.biz.mail.re2.yahoo.com with SMTP; 11 Aug 2008 18:08:57 -0000
X-YMail-OSG: HH3VEZIVM1m8TV0bWtT8oG0F_834C7wTDFgZuyQW5f4G8qpJFv0o1nByZhjBYdhcSLHZqudtST3x1D2UWXZ7ORUwdxCKPbhvr4Ktb0bqk_.NzU8i25WIViK5nUP9uuA-
X-Yahoo-Newman-Property: ymail-3
Message-ID: <48A08036.6050005@ekasystems.com>
Date: Mon, 11 Aug 2008 14:08:54 -0400
From: Tim Winter <tim.winter@ekasystems.com>
User-Agent: Thunderbird 2.0.0.16 (X11/20080707)
MIME-Version: 1.0
To: roll@ietf.org
References: <C4C3CFB0.4DAEB%jvasseur@cisco.com>
In-Reply-To: <C4C3CFB0.4DAEB%jvasseur@cisco.com>
Subject: Re: [Roll] Adoption of draft-levis-roll-protocols-survey as a ROLL
 WG	document
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/roll>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Sender: roll-bounces@ietf.org
Errors-To: roll-bounces@ietf.org

In favor.

-Tim

JP Vasseur wrote:
> Dear WG,
>
> There was a good consensus to adopt draft-levis-roll-protocols-survey 
> as a ROLL WG document during the ROLL WG meeting in Dublin but as 
> usual we need to confirm on the mailing list.
>
> Are you in favor/opposed adopting draft-levis-roll-protocols-survey 
> (http://www.ietf.org/internet-drafts/draft-levis-roll-protocols-survey-02.txt) 
> as a ROLL WG document ?
>
> Note that the draft has been slightly updated to align it with the 
> presentation that was made during the meeting.
>
> Thanks.
>
> JP.
> ------------------------------------------------------------------------
>
> _______________________________________________
> Roll mailing list
> Roll@ietf.org
> https://www.ietf.org/mailman/listinfo/roll
>   

_______________________________________________
Roll mailing list
Roll@ietf.org
https://www.ietf.org/mailman/listinfo/roll


From roll-bounces@ietf.org  Mon Aug 11 11:14:36 2008
Return-Path: <roll-bounces@ietf.org>
X-Original-To: roll-archive@ietf.org
Delivered-To: ietfarch-roll-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 61E4F3A6CFC;
	Mon, 11 Aug 2008 11:14:36 -0700 (PDT)
X-Original-To: roll@core3.amsl.com
Delivered-To: roll@core3.amsl.com
Received: from localhost (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 386543A6CFC
	for <roll@core3.amsl.com>; Mon, 11 Aug 2008 11:14:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.299
X-Spam-Level: 
X-Spam-Status: No, score=-1.299 tagged_above=-999 required=5
	tests=[AWL=-1.300, BAYES_50=0.001]
Received: from mail.ietf.org ([64.170.98.32])
	by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id 2vK7d+-KDD91 for <roll@core3.amsl.com>;
	Mon, 11 Aug 2008 11:14:35 -0700 (PDT)
Received: from smtp101.biz.mail.mud.yahoo.com (smtp101.biz.mail.mud.yahoo.com
	[68.142.200.236])
	by core3.amsl.com (Postfix) with SMTP id 3B3433A6C52
	for <roll@ietf.org>; Mon, 11 Aug 2008 11:14:35 -0700 (PDT)
Received: (qmail 99514 invoked from network); 11 Aug 2008 18:14:36 -0000
Received: from unknown (HELO zeke.ekasystems.com)
	(tim.winter@ekasystems.com@209.48.242.66 with plain)
	by smtp101.biz.mail.mud.yahoo.com with SMTP; 11 Aug 2008 18:14:36 -0000
X-YMail-OSG: Bbk1vnwVM1k4qxw5F8Y6zBUC4mKEnmSoo_Th_1K2vkofpsDKVAAflrXHSb4mwUlIMoZX3gceJxf12cSLC9r6LgKqVnnavQBt9cz1OUabKw--
X-Yahoo-Newman-Property: ymail-3
Message-ID: <48A0818B.90605@ekasystems.com>
Date: Mon, 11 Aug 2008 14:14:35 -0400
From: Tim Winter <tim.winter@ekasystems.com>
User-Agent: Thunderbird 2.0.0.16 (X11/20080707)
MIME-Version: 1.0
To: roll@ietf.org
Subject: [Roll] Comments on draft-levis-roll-protocols-survey-02
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/roll>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Sender: roll-bounces@ietf.org
Errors-To: roll-bounces@ietf.org

WG,

In reviewing the document I have come up with the following comments:

Overall I find that the approach taken is useful and constructive.  It 
certainly provides a solid starting point from which to debate the 
merits and drawbacks of various prtocols and their suitability to ROLL.

DSDV does not appear to be covered by any RFC or active draft.  I 
suggest that it should be removed from ths survey.

With regard to the Table Scalability criterion I think it should be more 
stringent.  The use case of LLNs behaving as data collection networks, 
with the bulk of traffic flow through routers to data collection points, 
is certainly a dominant one.  But there are other use cases, e.g. access 
points -> sensor/actuator, which may let the number of possible 
destinations D begin to approach N.  Should it be necessary to maintain 
such state at individual nodes, for large networks, it would be better 
for a protocol to provide routing table scaling with O(log(D)).  Such 
may be found, for example, in protocols which employ clustering or 
hierarchical strategies.

The Control Cost criterion makes a lot of sense when considering the 
energy constraints of nodes who are only battery powered and must 
conserve energy at all times.  However I think we should also consider 
that a (proactive) routing protocol may be able to take advantage of 
powered (i.e. not energy constrained) nodes that may be available in the 
network.  For example, a set of powered nodes who are able to 
communicate without regard to limited energy may be able to maintain a 
proactive routing state in order to service transient battery powered 
nodes, who may come and go and would not be expected to maintain any 
unused state.  None of the protocols under consideration appear to have 
such capabilities.

Some small items:
  
111     Energy is a fundamental challenge in these devices.  Convenience and
 >>>>>                                        ^^^^^ in many of these devices


112     ease of use requires they be wireless and therefore battery powered.
 >>>>>                                             ^^^^^^^^^ and in many 
cases


266     properties abd attributes such as power, memory, and battery life
 >>>>>              ^^^ and
    
    
274  4.  Routing Protocol Taxonomy

 >>>>>  Suggest to add heading `4.1.  Protocol Classes'

275     Routing protocols broadly fall into two classes: link-state and
276     distance-vector.
    
330     Protocols Today
 >>>>>   ^^^  Suggest to add heading `4.2. ...'
    
    
362     protocols.  Later sections consider the properties of these protocol
 >>>>>                                                                       
^s


586     messages, but TC messages spread topology information throughout the
587     network (using MPRs).  As such, control traffic is proportional to
588     O(N^2).  As L is bounded by N, this means control traffic is
 >>>>>            ^XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

589     proportional to O(N).  MPRs reduce this load to O(N^2 / L).  As the
 >>>>>   ^XXXXXXXXXXXXXXXXXXXX
 >>>>>   This sentence seems like it should be removed, the explanation 
is more
 >>>>>   clearly laid out below

590     number of MPRs is inversely proportional to the density of the
591     network and L is bounded by N, this means control traffic is at best
592     proportional to O(N), and fails the control cost metric.




Regards,

-Tim
_______________________________________________
Roll mailing list
Roll@ietf.org
https://www.ietf.org/mailman/listinfo/roll


From roll-bounces@ietf.org  Mon Aug 11 11:15:25 2008
Return-Path: <roll-bounces@ietf.org>
X-Original-To: roll-archive@ietf.org
Delivered-To: ietfarch-roll-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 9C73E3A6D70;
	Mon, 11 Aug 2008 11:15:25 -0700 (PDT)
X-Original-To: roll@core3.amsl.com
Delivered-To: roll@core3.amsl.com
Received: from localhost (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 1A63B3A6D74
	for <roll@core3.amsl.com>; Mon, 11 Aug 2008 11:15:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.109
X-Spam-Level: 
X-Spam-Status: No, score=-1.109 tagged_above=-999 required=5
	tests=[BAYES_05=-1.11, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32])
	by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id f02hYAlCMJEo for <roll@core3.amsl.com>;
	Mon, 11 Aug 2008 11:15:24 -0700 (PDT)
Received: from mail-mta.sunlabs.com (edge.sunlabs.com [204.153.12.50])
	by core3.amsl.com (Postfix) with ESMTP id 4FDE53A6D23
	for <roll@ietf.org>; Mon, 11 Aug 2008 11:15:24 -0700 (PDT)
Received: from mail.sunlabs.com ([152.70.2.186]) by mail-mta.sfvic.sunlabs.com
	(Sun Java System Messaging Server 6.1 HotFix 0.02 (built Aug 25
	2004))
	with ESMTP id <0K5G0093Q58VZH10@mail-mta.sfvic.sunlabs.com> for
	roll@ietf.org; Mon, 11 Aug 2008 10:14:55 -0700 (PDT)
Received: from dhcp-069-082.sfbay.sunlabs.com ([152.70.69.82])
	by mail.sunlabs.com
	(Sun Java System Messaging Server 6.1 HotFix 0.02 (built Aug 25 2004))
	with ESMTPSA id <0K5G0077458UQ010@mail.sunlabs.com> for roll@ietf.org;
	Mon, 11 Aug 2008 10:14:55 -0700 (PDT)
Date: Mon, 11 Aug 2008 10:14:54 -0700
From: "Pete St. Pierre" <Pete.Stpierre@sun.com>
In-reply-to: <C4C3CFB0.4DAEB%jvasseur@cisco.com>
To: JP Vasseur <jvasseur@cisco.com>
Message-id: <0D71A114-70E3-4E9B-AD50-07E71A7644FD@Sun.COM>
MIME-version: 1.0
X-Mailer: Apple Mail (2.926)
References: <C4C3CFB0.4DAEB%jvasseur@cisco.com>
Cc: roll@ietf.org
Subject: Re: [Roll] Adoption of draft-levis-roll-protocols-survey as a ROLL
 WG document
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/roll>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============0331079599=="
Sender: roll-bounces@ietf.org
Errors-To: roll-bounces@ietf.org


--===============0331079599==
Content-type: multipart/alternative;
 boundary="Boundary_(ID_cku/cHRI3TWhoPZ4xHFiYg)"


--Boundary_(ID_cku/cHRI3TWhoPZ4xHFiYg)
Content-type: text/plain; charset=US-ASCII; format=flowed; delsp=yes
Content-transfer-encoding: 7BIT

Sounds good!
...Pete

On Aug 9, 2008, at 1:50 PM, JP Vasseur wrote:

> Dear WG,
>
> There was a good consensus to adopt draft-levis-roll-protocols- 
> survey as a ROLL WG document during the ROLL WG meeting in Dublin  
> but as usual we need to confirm on the mailing list.
>
> Are you in favor/opposed adopting draft-levis-roll-protocols-survey (http://www.ietf.org/internet-drafts/draft-levis-roll-protocols-survey-02.txt 
> ) as a ROLL WG document ?
>
> Note that the draft has been slightly updated to align it with the  
> presentation that was made during the meeting.
>
> Thanks.
>
> JP.
> _______________________________________________
> Roll mailing list
> Roll@ietf.org
> https://www.ietf.org/mailman/listinfo/roll


--Boundary_(ID_cku/cHRI3TWhoPZ4xHFiYg)
Content-type: text/html; charset=US-ASCII
Content-transfer-encoding: 7BIT

<html><body style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space; ">Sounds good!<div>...Pete</div><div><br><div><div>On Aug 9, 2008, at 1:50 PM, JP Vasseur wrote:</div><br class="Apple-interchange-newline"><blockquote type="cite"><div> <font face="Arial"><span style="font-size:14pt">Dear WG,<br> <br> There was a good consensus to adopt draft-levis-roll-protocols-survey as a ROLL WG document during the ROLL WG meeting in Dublin but as usual we need to confirm on the mailing list.<br> <br> Are you in favor/opposed adopting draft-levis-roll-protocols-survey (<a href="http://www.ietf.org/internet-drafts/draft-levis-roll-protocols-survey-02.txt">http://www.ietf.org/internet-drafts/draft-levis-roll-protocols-survey-02.txt</a>) as a ROLL WG document ?<br> <br> Note that the draft has been slightly updated to align it with the presentation that was made during the meeting.<br> <br> Thanks.<br> <br> JP.</span></font> </div>  ___________________
 ________
oll mailing list<br><a href="mailto:Roll@ietf.org">Roll@ietf.org</a><br>https://www.ietf.org/mailman/listinfo/roll<br></blockquote></div><br></div></body></html>

--Boundary_(ID_cku/cHRI3TWhoPZ4xHFiYg)--

--===============0331079599==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Roll mailing list
Roll@ietf.org
https://www.ietf.org/mailman/listinfo/roll

--===============0331079599==--


From roll-bounces@ietf.org  Mon Aug 11 12:37:05 2008
Return-Path: <roll-bounces@ietf.org>
X-Original-To: roll-archive@ietf.org
Delivered-To: ietfarch-roll-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 78C103A6C03;
	Mon, 11 Aug 2008 12:37:05 -0700 (PDT)
X-Original-To: roll@core3.amsl.com
Delivered-To: roll@core3.amsl.com
Received: from localhost (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 892C63A68E7;
	Mon, 11 Aug 2008 12:37:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.598
X-Spam-Level: 
X-Spam-Status: No, score=-6.598 tagged_above=-999 required=5
	tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32])
	by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id E6Axz8sKq7oY; Mon, 11 Aug 2008 12:37:03 -0700 (PDT)
Received: from exprod8og108.obsmtp.com (exprod8og108.obsmtp.com [64.18.3.96])
	by core3.amsl.com (Postfix) with ESMTP id B525C3A6C03;
	Mon, 11 Aug 2008 12:36:52 -0700 (PDT)
Received: from source ([192.132.24.139]) (using SSLv3) by
	exprod8ob108.postini.com ([64.18.7.12]) with SMTP; 
	Mon, 11 Aug 2008 12:33:53 PDT
Received: from jwimkrs1.na.jci.com ([10.10.6.31])
	by smtpmke02.jci.com (Lotus Domino Release 8.0.1)
	with ESMTP id 2008081114381859-2171253 ;
	Mon, 11 Aug 2008 14:38:18 -0500 
In-Reply-To: <C4C3CFB0.4DAEB%jvasseur@cisco.com>
MIME-Version: 1.0
To: JP Vasseur <jvasseur@cisco.com>
X-Mailer: Lotus Notes Release 6.5.2 June 01, 2004
From: Jerald.P.Martocci@jci.com
Message-ID: <OF746E6041.CE0D84F7-ON862574A2.00656DD7-862574A2.006BBDCA@jci.com>
Date: Mon, 11 Aug 2008 14:36:46 -0500
X-MIMETrack: Serialize by Router on jwimkrs1.na.jci.com/NA/Johnson_Controls at
	08/11/2008 02:36:53 PM,
	Serialize complete at 08/11/2008 02:36:53 PM,
	Itemize by SMTP Server on smtpmke02.jci.com/JCI_SMTP(Release
	8.0.1|February 07, 2008) at 08/11/2008 02:38:18 PM,
	Serialize by Router on smtpmke02.jci.com/JCI_SMTP(Release
	8.0.1|February 07, 2008) at 08/11/2008 02:38:20 PM,
	Serialize complete at 08/11/2008 02:38:20 PM,
	Serialize by Router on smtpmke02.jci.com/JCI_SMTP(Release
	8.0.1|February 07, 2008) at 08/11/2008 02:38:21 PM
Cc: roll@ietf.org, roll-bounces@ietf.org, Ted.Humpal@jci.com
Subject: Re: [Roll] Adoption of draft-levis-roll-protocols-survey as a ROLL
	WG	document
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/roll>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============0200194578=="
Sender: roll-bounces@ietf.org
Errors-To: roll-bounces@ietf.org

This is a multipart message in MIME format.
--===============0200194578==
Content-Type: multipart/alternative; boundary="=_alternative 006BBD94862574A2_="

This is a multipart message in MIME format.
--=_alternative 006BBD94862574A2_=
Content-Type: text/plain; charset="US-ASCII"

The survey as given in Dublin only included the Home,  Industrial and 
Urban routing requirements.  I presume this was because the Commercial 
Building requirements were not available until early July.  I would like 
the analysis to include the commercial building requirements. 

I also think that 'latency' should be a column on the decision matrix on 
page 9 of the document.  Embedded real-time systems are mission critical 
(e.g. Fire Alarming) where latency is a prime discriminator of the 
protocol used.  The routing algorithms are subject to this latency for 
example when a new path must be discovered while the packet is in transit.

I would like to postpone the adoption of the document as a ROLL WG 
document until these two items have been addressed.


Regards,

Jerry Martocci






JP Vasseur <jvasseur@cisco.com> 
Sent by: roll-bounces@ietf.org
08/09/2008 03:50 PM

To
<roll@ietf.org>
cc

Subject
[Roll] Adoption of draft-levis-roll-protocols-survey as a ROLL WG document






Dear WG,

There was a good consensus to adopt draft-levis-roll-protocols-survey as a 
ROLL WG document during the ROLL WG meeting in Dublin but as usual we need 
to confirm on the mailing list.

Are you in favor/opposed adopting draft-levis-roll-protocols-survey (
http://www.ietf.org/internet-drafts/draft-levis-roll-protocols-survey-02.txt
) as a ROLL WG document ?

Note that the draft has been slightly updated to align it with the 
presentation that was made during the meeting.

Thanks.

JP. _______________________________________________
Roll mailing list
Roll@ietf.org
https://www.ietf.org/mailman/listinfo/roll


--=_alternative 006BBD94862574A2_=
Content-Type: text/html; charset="US-ASCII"


<br><font size=2 face="sans-serif">The survey as given in Dublin only included
the Home, &nbsp;Industrial and Urban routing requirements. &nbsp;I presume
this was because the Commercial Building requirements were not available
until early July. &nbsp;I would like the analysis to include the commercial
building requirements. &nbsp;</font>
<br>
<br><font size=2 face="sans-serif">I also think that 'latency' should be
a column on the decision matrix on page 9 of the document. &nbsp;Embedded
real-time systems are mission critical (e.g. Fire Alarming) where latency
is a prime discriminator of the protocol used. &nbsp;The routing algorithms
are subject to this latency for example when a new path must be discovered
while the packet is in transit.</font>
<br>
<br><font size=2 face="sans-serif">I would like to postpone the adoption
of the document as a ROLL WG document until these two items have been addressed.</font>
<br>
<br>
<br><font size=2 face="sans-serif">Regards,</font>
<br>
<br><font size=2 face="sans-serif">Jerry Martocci</font>
<br>
<br>
<br>
<br>
<br>
<br>
<table width=100%>
<tr valign=top>
<td width=40%><font size=1 face="sans-serif"><b>JP Vasseur &lt;jvasseur@cisco.com&gt;</b>
</font>
<br><font size=1 face="sans-serif">Sent by: roll-bounces@ietf.org</font>
<p><font size=1 face="sans-serif">08/09/2008 03:50 PM</font>
<td width=59%>
<table width=100%>
<tr valign=top>
<td>
<div align=right><font size=1 face="sans-serif">To</font></div>
<td><font size=1 face="sans-serif">&lt;roll@ietf.org&gt;</font>
<tr valign=top>
<td>
<div align=right><font size=1 face="sans-serif">cc</font></div>
<td>
<tr valign=top>
<td>
<div align=right><font size=1 face="sans-serif">Subject</font></div>
<td><font size=1 face="sans-serif">[Roll] Adoption of draft-levis-roll-protocols-survey
as a ROLL WG &nbsp; &nbsp; &nbsp; &nbsp;document</font></table>
<br>
<table>
<tr valign=top>
<td>
<td></table>
<br></table>
<br>
<br>
<br><font size=4 face="Arial">Dear WG,<br>
<br>
There was a good consensus to adopt draft-levis-roll-protocols-survey as
a ROLL WG document during the ROLL WG meeting in Dublin but as usual we
need to confirm on the mailing list.<br>
<br>
Are you in favor/opposed adopting draft-levis-roll-protocols-survey (</font><a href="http://www.ietf.org/internet-drafts/draft-levis-roll-protocols-survey-02.txt"><font size=4 color=blue face="Arial"><u>http://www.ietf.org/internet-drafts/draft-levis-roll-protocols-survey-02.txt</u></font></a><font size=4 face="Arial">)
as a ROLL WG document ?<br>
<br>
Note that the draft has been slightly updated to align it with the presentation
that was made during the meeting.<br>
<br>
Thanks.<br>
<br>
JP.</font><font size=3> </font><font size=2><tt>_______________________________________________<br>
Roll mailing list<br>
Roll@ietf.org<br>
https://www.ietf.org/mailman/listinfo/roll<br>
</tt></font>
<br>
--=_alternative 006BBD94862574A2_=--

--===============0200194578==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Roll mailing list
Roll@ietf.org
https://www.ietf.org/mailman/listinfo/roll

--===============0200194578==--


From roll-bounces@ietf.org  Mon Aug 11 13:13:20 2008
Return-Path: <roll-bounces@ietf.org>
X-Original-To: roll-archive@ietf.org
Delivered-To: ietfarch-roll-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id A03CE3A68C6;
	Mon, 11 Aug 2008 13:13:20 -0700 (PDT)
X-Original-To: roll@core3.amsl.com
Delivered-To: roll@core3.amsl.com
Received: from localhost (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 3AC743A68C6;
	Mon, 11 Aug 2008 13:13:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level: 
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5
	tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32])
	by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id cj9fK159oh6Z; Mon, 11 Aug 2008 13:13:19 -0700 (PDT)
Received: from cs-smtp-1.Stanford.EDU (cs-smtp-1.Stanford.EDU [171.64.64.25])
	by core3.amsl.com (Postfix) with ESMTP id 7AEF83A68B1;
	Mon, 11 Aug 2008 13:13:19 -0700 (PDT)
Received: from dnab42228f.stanford.edu ([171.66.34.143])
	by cs-smtp-1.Stanford.EDU with esmtpsa (TLSv1:AES128-SHA:128)
	(Exim 4.60) (envelope-from <pal@cs.stanford.edu>)
	id 1KSdlZ-0002HN-TS; Mon, 11 Aug 2008 13:13:22 -0700
Message-Id: <81AA0163-15F3-4E3D-8DAB-65103F6E2515@cs.stanford.edu>
From: Philip Levis <pal@cs.stanford.edu>
To: Jerald.P.Martocci@jci.com
In-Reply-To: <OF746E6041.CE0D84F7-ON862574A2.00656DD7-862574A2.006BBDCA@jci.com>
Mime-Version: 1.0 (Apple Message framework v926)
Date: Mon, 11 Aug 2008 13:13:22 -0700
References: <OF746E6041.CE0D84F7-ON862574A2.00656DD7-862574A2.006BBDCA@jci.com>
X-Mailer: Apple Mail (2.926)
X-Scan-Signature: 126b1dc68df40fcb6eeab1e6794671ae
Cc: roll@ietf.org, Ted.Humpal@jci.com, roll-bounces@ietf.org
Subject: Re: [Roll] Adoption of draft-levis-roll-protocols-survey as a ROLL
	WG	document
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/roll>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"; DelSp="yes"
Sender: roll-bounces@ietf.org
Errors-To: roll-bounces@ietf.org


On Aug 11, 2008, at 12:36 PM, Jerald.P.Martocci@jci.com wrote:

>
> The survey as given in Dublin only included the Home,  Industrial  
> and Urban routing requirements.  I presume this was because the  
> Commercial Building requirements were not available until early  
> July.  I would like the analysis to include the commercial building  
> requirements.

Will the commercial routing requirements change the set? That is, is  
one of the existing columns not a criterion of commercial  
applications? If so, then I agree. If not, an update would merely  
require adding the correct references.

> I also think that 'latency' should be a column on the decision  
> matrix on page 9 of the document.  Embedded real-time systems are  
> mission critical (e.g. Fire Alarming) where latency is a prime  
> discriminator of the protocol used.  The routing algorithms are  
> subject to this latency for example when a new path must be  
> discovered while the packet is in transit.

Home monitoring applications are often not mission-critical real-time  
systems, and so do not share this requirement. The closest they come  
is the need for low latency alarms, but these events are very rare.  
Following the methodology of the draft, this means it shouldn't  
include latency.

Phil
_______________________________________________
Roll mailing list
Roll@ietf.org
https://www.ietf.org/mailman/listinfo/roll


From roll-bounces@ietf.org  Mon Aug 11 14:43:25 2008
Return-Path: <roll-bounces@ietf.org>
X-Original-To: roll-archive@ietf.org
Delivered-To: ietfarch-roll-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 45CFB3A6AC0;
	Mon, 11 Aug 2008 14:43:25 -0700 (PDT)
X-Original-To: roll@core3.amsl.com
Delivered-To: roll@core3.amsl.com
Received: from localhost (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 3FA483A6A12;
	Mon, 11 Aug 2008 14:43:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.598
X-Spam-Level: 
X-Spam-Status: No, score=-6.598 tagged_above=-999 required=5
	tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32])
	by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id ED8g0gce7j+Z; Mon, 11 Aug 2008 14:43:23 -0700 (PDT)
Received: from exprod8og104.obsmtp.com (exprod8og104.obsmtp.com [64.18.3.88])
	by core3.amsl.com (Postfix) with ESMTP id DD6EC3A6D0B;
	Mon, 11 Aug 2008 14:43:22 -0700 (PDT)
Received: from source ([192.132.24.137]) (using SSLv3) by
	exprod8ob104.postini.com ([64.18.7.12]) with SMTP; 
	Mon, 11 Aug 2008 14:40:13 PDT
Received: from jwimkrs1.na.jci.com ([10.10.6.31])
	by smtpmke01.jci.com (Lotus Domino Release 8.0.1)
	with ESMTP id 2008081116434935-41572 ;
	Mon, 11 Aug 2008 16:43:49 -0500 
In-Reply-To: <81AA0163-15F3-4E3D-8DAB-65103F6E2515@cs.stanford.edu>
MIME-Version: 1.0
To: Philip Levis <pal@cs.stanford.edu>
X-Mailer: Lotus Notes Release 6.5.2 June 01, 2004
From: Jerald.P.Martocci@jci.com
Message-ID: <OF95AD1F71.4829B99D-ON862574A2.0075C73D-862574A2.00774E12@jci.com>
Date: Mon, 11 Aug 2008 16:43:05 -0500
X-MIMETrack: Serialize by Router on jwimkrs1.na.jci.com/NA/Johnson_Controls at
	08/11/2008 04:43:15 PM,
	Serialize complete at 08/11/2008 04:43:15 PM,
	Itemize by SMTP Server on smtpmke01.jci.com/JCI_SMTP(Release
	8.0.1|February 07, 2008) at 08/11/2008 04:43:49 PM,
	Serialize by Router on smtpmke01.jci.com/JCI_SMTP(Release
	8.0.1|February 07, 2008) at 08/11/2008 04:43:59 PM,
	Serialize complete at 08/11/2008 04:43:59 PM
Cc: roll@ietf.org, Ted.Humpal@jci.com, roll-bounces@ietf.org
Subject: Re: [Roll] Adoption of draft-levis-roll-protocols-survey as a ROLL
	WG	document
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/roll>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============0010824890=="
Sender: roll-bounces@ietf.org
Errors-To: roll-bounces@ietf.org

This is a multipart message in MIME format.
--===============0010824890==
Content-Type: multipart/alternative; boundary="=_alternative 00774D86862574A2_="

This is a multipart message in MIME format.
--=_alternative 00774D86862574A2_=
Content-Type: text/plain; charset="US-ASCII"

Phil,

I see 'latency' as an added requirement in addition to the ones defined 
not a replacement for an existing column,  So in that regard, we could add 
it later.   I guess I am not sure if making this document a ROLL WG 
document locks it out for future additions.  I also agree the 'home' 
market probably has a limited use case for latency, however, I would think 
the 'industrial' market would require no more latency than the 
'commercial' market.

Don't get me wrong, I think your document is a great start!  I just want 
to make sure we concern ourselves with the time-critical and deterministic 
nature of some of the applications.


Jerry








Philip Levis <pal@cs.stanford.edu> 
08/11/2008 03:13 PM

To
Jerald.P.Martocci@jci.com
cc
JP Vasseur <jvasseur@cisco.com>, roll@ietf.org, roll-bounces@ietf.org, 
Ted.Humpal@jci.com
Subject
Re: [Roll] Adoption of draft-levis-roll-protocols-survey as a ROLL WG 
document







On Aug 11, 2008, at 12:36 PM, Jerald.P.Martocci@jci.com wrote:

>
> The survey as given in Dublin only included the Home,  Industrial 
> and Urban routing requirements.  I presume this was because the 
> Commercial Building requirements were not available until early 
> July.  I would like the analysis to include the commercial building 
> requirements.

Will the commercial routing requirements change the set? That is, is 
one of the existing columns not a criterion of commercial 
applications? If so, then I agree. If not, an update would merely 
require adding the correct references.

> I also think that 'latency' should be a column on the decision 
> matrix on page 9 of the document.  Embedded real-time systems are 
> mission critical (e.g. Fire Alarming) where latency is a prime 
> discriminator of the protocol used.  The routing algorithms are 
> subject to this latency for example when a new path must be 
> discovered while the packet is in transit.

Home monitoring applications are often not mission-critical real-time 
systems, and so do not share this requirement. The closest they come 
is the need for low latency alarms, but these events are very rare. 
Following the methodology of the draft, this means it shouldn't 
include latency.

Phil


--=_alternative 00774D86862574A2_=
Content-Type: text/html; charset="US-ASCII"


<br><font size=2 face="sans-serif">Phil,</font>
<br>
<br><font size=2 face="sans-serif">I see 'latency' as an added requirement
in addition to the ones defined not a replacement for an existing column,
&nbsp;So in that regard, we could add it later. &nbsp; I guess I am not
sure if making this document a ROLL WG document locks it out for future
additions. &nbsp;I also agree the 'home' market probably has a limited
use case for latency, however, I would think the 'industrial' market would
require no more latency than the 'commercial' market.</font>
<br>
<br><font size=2 face="sans-serif">Don't get me wrong, I think your document
is a great start! &nbsp;I just want to make sure we concern ourselves with
the time-critical and deterministic nature of some of the applications.</font>
<br>
<br>
<br><font size=2 face="sans-serif">Jerry</font>
<br>
<br>
<br>
<br>
<br>
<br>
<br>
<br>
<table width=100%>
<tr valign=top>
<td width=40%><font size=1 face="sans-serif"><b>Philip Levis &lt;pal@cs.stanford.edu&gt;</b>
</font>
<p><font size=1 face="sans-serif">08/11/2008 03:13 PM</font>
<td width=59%>
<table width=100%>
<tr valign=top>
<td>
<div align=right><font size=1 face="sans-serif">To</font></div>
<td><font size=1 face="sans-serif">Jerald.P.Martocci@jci.com</font>
<tr valign=top>
<td>
<div align=right><font size=1 face="sans-serif">cc</font></div>
<td><font size=1 face="sans-serif">JP Vasseur &lt;jvasseur@cisco.com&gt;,
roll@ietf.org, roll-bounces@ietf.org, Ted.Humpal@jci.com</font>
<tr valign=top>
<td>
<div align=right><font size=1 face="sans-serif">Subject</font></div>
<td><font size=1 face="sans-serif">Re: [Roll] Adoption of draft-levis-roll-protocols-survey
as a ROLL WG &nbsp; &nbsp; &nbsp; &nbsp;document</font></table>
<br>
<table>
<tr valign=top>
<td>
<td></table>
<br></table>
<br>
<br>
<br><font size=2><tt><br>
On Aug 11, 2008, at 12:36 PM, Jerald.P.Martocci@jci.com wrote:<br>
<br>
&gt;<br>
&gt; The survey as given in Dublin only included the Home, &nbsp;Industrial
&nbsp;<br>
&gt; and Urban routing requirements. &nbsp;I presume this was because the
&nbsp;<br>
&gt; Commercial Building requirements were not available until early &nbsp;<br>
&gt; July. &nbsp;I would like the analysis to include the commercial building
&nbsp;<br>
&gt; requirements.<br>
<br>
Will the commercial routing requirements change the set? That is, is &nbsp;<br>
one of the existing columns not a criterion of commercial &nbsp;<br>
applications? If so, then I agree. If not, an update would merely &nbsp;<br>
require adding the correct references.<br>
<br>
&gt; I also think that 'latency' should be a column on the decision &nbsp;<br>
&gt; matrix on page 9 of the document. &nbsp;Embedded real-time systems
are &nbsp;<br>
&gt; mission critical (e.g. Fire Alarming) where latency is a prime &nbsp;<br>
&gt; discriminator of the protocol used. &nbsp;The routing algorithms are
&nbsp;<br>
&gt; subject to this latency for example when a new path must be &nbsp;<br>
&gt; discovered while the packet is in transit.<br>
<br>
Home monitoring applications are often not mission-critical real-time &nbsp;<br>
systems, and so do not share this requirement. The closest they come &nbsp;<br>
is the need for low latency alarms, but these events are very rare. &nbsp;<br>
Following the methodology of the draft, this means it shouldn't &nbsp;<br>
include latency.<br>
<br>
Phil<br>
</tt></font>
<br>
--=_alternative 00774D86862574A2_=--

--===============0010824890==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Roll mailing list
Roll@ietf.org
https://www.ietf.org/mailman/listinfo/roll

--===============0010824890==--


From roll-bounces@ietf.org  Mon Aug 11 14:50:54 2008
Return-Path: <roll-bounces@ietf.org>
X-Original-To: roll-archive@ietf.org
Delivered-To: ietfarch-roll-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 8CA2F3A6AC9;
	Mon, 11 Aug 2008 14:50:54 -0700 (PDT)
X-Original-To: roll@core3.amsl.com
Delivered-To: roll@core3.amsl.com
Received: from localhost (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id D03A93A6A94;
	Mon, 11 Aug 2008 14:50:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level: 
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5
	tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32])
	by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id AjX3Jk1Fc2KG; Mon, 11 Aug 2008 14:50:53 -0700 (PDT)
Received: from cs-smtp-2.Stanford.EDU (cs-smtp-2.Stanford.EDU [171.64.64.26])
	by core3.amsl.com (Postfix) with ESMTP id 0620F3A681A;
	Mon, 11 Aug 2008 14:50:53 -0700 (PDT)
Received: from [76.14.71.180] (helo=[192.168.2.101])
	by cs-smtp-2.Stanford.EDU with esmtpsa (TLSv1:AES128-SHA:128)
	(Exim 4.60) (envelope-from <pal@cs.stanford.edu>)
	id 1KSfHz-00086c-H0; Mon, 11 Aug 2008 14:50:55 -0700
Message-Id: <33599D2D-2D5F-4A1E-B705-9D8FCADBA286@cs.stanford.edu>
From: Philip Levis <pal@cs.stanford.edu>
To: Jerald.P.Martocci@jci.com
In-Reply-To: <OF746E6041.CE0D84F7-ON862574A2.00656DD7-862574A2.006BBDCA@jci.com>
Mime-Version: 1.0 (Apple Message framework v926)
Date: Mon, 11 Aug 2008 13:54:23 -0700
References: <OF746E6041.CE0D84F7-ON862574A2.00656DD7-862574A2.006BBDCA@jci.com>
X-Mailer: Apple Mail (2.926)
X-Scan-Signature: 078eb853d78558c6c655f7b6c94b391a
Cc: roll@ietf.org, Ted.Humpal@jci.com, roll-bounces@ietf.org
Subject: Re: [Roll] Adoption of draft-levis-roll-protocols-survey as a ROLL
	WG	document
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/roll>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"; DelSp="yes"
Sender: roll-bounces@ietf.org
Errors-To: roll-bounces@ietf.org


On Aug 11, 2008, at 12:36 PM, Jerald.P.Martocci@jci.com wrote:

>
> The survey as given in Dublin only included the Home,  Industrial  
> and Urban routing requirements.  I presume this was because the  
> Commercial Building requirements were not available until early  
> July.  I would like the analysis to include the commercial building  
> requirements.

Jerald,

The commercial draft is a fantastic start. It points out several ways  
in which this application space differs from the others and will be  
invaluable moving forward. Using hard numbers (10 hops, 255 nodes,  
etc.) is very helpful. A couple of comments:

1) The goal of the requirements drafts is to state the requirements of  
a routing protocol, not a system as a whoe. For example,  
18.Requirement says

"RFDs SHOULD target for operation using viable energy harvesting  
techniques such as ambient light, mechanical action, solar load, air  
pressure and differential temperature."

This is outside of ROLL's control and domain.

2) The draft seems to be very 6lowpan-specific. While ROLL is very  
concerned with 6lowpan, ROLL protocols can't be tied to it. Even  
within 6lowpan they're seeking to avoid 802.15.4-specific terminology  
such as FFD and RFD, as many systems today use the link layer but not  
MAC layer. E.g., ArchRock's 6lowpan stack operates on a completely ad- 
hoc network with low-power, battery-based devices.

3) Requirement 45 seems rather difficult: it suggests that ROLL cannot  
have any headers. Is this what you mean?

Phil
_______________________________________________
Roll mailing list
Roll@ietf.org
https://www.ietf.org/mailman/listinfo/roll


From roll-bounces@ietf.org  Mon Aug 11 14:56:01 2008
Return-Path: <roll-bounces@ietf.org>
X-Original-To: roll-archive@ietf.org
Delivered-To: ietfarch-roll-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 28DFE3A6BB9;
	Mon, 11 Aug 2008 14:56:01 -0700 (PDT)
X-Original-To: roll@core3.amsl.com
Delivered-To: roll@core3.amsl.com
Received: from localhost (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 1E4113A6BB9;
	Mon, 11 Aug 2008 14:55:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level: 
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5
	tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32])
	by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id d0vO6cIFw5zv; Mon, 11 Aug 2008 14:55:58 -0700 (PDT)
Received: from cs-smtp-2.Stanford.EDU (cs-smtp-2.Stanford.EDU [171.64.64.26])
	by core3.amsl.com (Postfix) with ESMTP id 478443A6AC9;
	Mon, 11 Aug 2008 14:55:58 -0700 (PDT)
Received: from [76.14.71.180] (helo=[192.168.2.101])
	by cs-smtp-2.Stanford.EDU with esmtpsa (TLSv1:AES128-SHA:128)
	(Exim 4.60) (envelope-from <pal@cs.stanford.edu>)
	id 1KSfMu-0002LW-RS; Mon, 11 Aug 2008 14:56:01 -0700
Message-Id: <C33A9445-347D-4574-A73A-5E36230369C4@cs.stanford.edu>
From: Philip Levis <pal@cs.stanford.edu>
To: Jerald.P.Martocci@jci.com
In-Reply-To: <OF95AD1F71.4829B99D-ON862574A2.0075C73D-862574A2.00774E12@jci.com>
Mime-Version: 1.0 (Apple Message framework v926)
Date: Mon, 11 Aug 2008 14:55:59 -0700
References: <OF95AD1F71.4829B99D-ON862574A2.0075C73D-862574A2.00774E12@jci.com>
X-Mailer: Apple Mail (2.926)
X-Scan-Signature: 8e086a056c9d4443aaf3b84243aabc30
Cc: roll@ietf.org, Ted.Humpal@jci.com, roll-bounces@ietf.org
Subject: Re: [Roll] Adoption of draft-levis-roll-protocols-survey as a ROLL
	WG document
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/roll>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"; DelSp="yes"
Sender: roll-bounces@ietf.org
Errors-To: roll-bounces@ietf.org


On Aug 11, 2008, at 2:43 PM, Jerald.P.Martocci@jci.com wrote:

>
> Phil,
>
> I see 'latency' as an added requirement in addition to the ones  
> defined not a replacement for an existing column,  So in that  
> regard, we could add it later.   I guess I am not sure if making  
> this document a ROLL WG document locks it out for future additions.   
> I also agree the 'home' market probably has a limited use case for  
> latency, however, I would think the 'industrial' market would  
> require no more latency than the 'commercial' market.

Jerald,

Ah, OK. The purpose of the document isn't to state all of the  
requirements of ROLL application domains. Instead, a subset, with the  
understanding that this subset may in fact be unable to satisfy any  
individual domain. "Necessary but not sufficient" is the key phrase.  
So in that way, the lack of latency there should not indicate that  
there aren't latency requirements, or that protocols ROLL considers  
won't be examined in terms of latency.

> Don't get me wrong, I think your document is a great start!  I just  
> want to make sure we concern ourselves with the time-critical and  
> deterministic nature of some of the applications.

I agree. But this concern is for when we examine concrete protocol  
mechanisms.

Phil
_______________________________________________
Roll mailing list
Roll@ietf.org
https://www.ietf.org/mailman/listinfo/roll


From roll-bounces@ietf.org  Mon Aug 11 15:11:35 2008
Return-Path: <roll-bounces@ietf.org>
X-Original-To: roll-archive@ietf.org
Delivered-To: ietfarch-roll-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 249A43A6C7A;
	Mon, 11 Aug 2008 15:11:35 -0700 (PDT)
X-Original-To: roll@core3.amsl.com
Delivered-To: roll@core3.amsl.com
Received: from localhost (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 8D09F3A6C87
	for <roll@core3.amsl.com>; Mon, 11 Aug 2008 15:11:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.327
X-Spam-Level: 
X-Spam-Status: No, score=-0.327 tagged_above=-999 required=5
	tests=[BAYES_00=-2.599, FH_HOST_EQ_D_D_D_D=0.765,
	HOST_EQ_STATIC=1.172, HTML_MESSAGE=0.001, IP_NOT_FRIENDLY=0.334]
Received: from mail.ietf.org ([64.170.98.32])
	by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id MOjuuClC24i8 for <roll@core3.amsl.com>;
	Mon, 11 Aug 2008 15:11:32 -0700 (PDT)
Received: from mail.dustnetworks.com (cust-67-203-88-34.static.o1.com
	[67.203.88.34]) by core3.amsl.com (Postfix) with ESMTP id AA0F23A676A
	for <roll@ietf.org>; Mon, 11 Aug 2008 15:11:32 -0700 (PDT)
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Date: Mon, 11 Aug 2008 15:11:32 -0700
Message-ID: <16745BFFDEC5F64BBB094C931862B495196B16@dust-exch-01.dusthq.dust-inc.com>
In-Reply-To: <C4C3CFB0.4DAEB%jvasseur@cisco.com>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: [Roll] Adoption of draft-levis-roll-protocols-survey as a ROLL
	WGdocument
thread-index: Acj6YYuLuMHTFm5cuUyrafLczWZV4ABnXm8g
From: "Chol Su Kang" <ckang@dustnetworks.com>
To: "JP Vasseur" <jvasseur@cisco.com>
Cc: roll@ietf.org
Subject: Re: [Roll] Adoption of draft-levis-roll-protocols-survey as a ROLL
	WGdocument
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/roll>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============0465269325=="
Sender: roll-bounces@ietf.org
Errors-To: roll-bounces@ietf.org

This is a multi-part message in MIME format.

--===============0465269325==
Content-class: urn:content-classes:message
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C8FBFF.368ECA0B"

This is a multi-part message in MIME format.

------_=_NextPart_001_01C8FBFF.368ECA0B
Content-Type: text/plain;
	charset="US-ASCII"
Content-Transfer-Encoding: quoted-printable

I vote in favor.

=20

=20

Chol Su Kang

=20

________________________________

From: roll-bounces@ietf.org [mailto:roll-bounces@ietf.org] On Behalf Of
JP Vasseur
Sent: Saturday, August 09, 2008 1:50 PM
To: roll@ietf.org
Subject: [Roll] Adoption of draft-levis-roll-protocols-survey as a ROLL
WGdocument

=20

Dear WG,

There was a good consensus to adopt draft-levis-roll-protocols-survey as
a ROLL WG document during the ROLL WG meeting in Dublin but as usual we
need to confirm on the mailing list.

Are you in favor/opposed adopting draft-levis-roll-protocols-survey
(http://www.ietf.org/internet-drafts/draft-levis-roll-protocols-survey-0
2.txt) as a ROLL WG document ?

Note that the draft has been slightly updated to align it with the
presentation that was made during the meeting.

Thanks.

JP.=20


------_=_NextPart_001_01C8FBFF.368ECA0B
Content-Type: text/html;
	charset="US-ASCII"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:st1=3D"urn:schemas-microsoft-com:office:smarttags" =
xmlns=3D"http://www.w3.org/TR/REC-html40">

<head>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Dus-ascii">
<meta name=3DGenerator content=3D"Microsoft Word 11 (filtered medium)">
<!--[if !mso]>
<style>
v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style>
<![endif]-->
<title>Adoption of draft-levis-roll-protocols-survey as a ROLL WG =
document</title>
<o:SmartTagType =
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"
 name=3D"City"/>
<o:SmartTagType =
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"
 name=3D"place"/>
<!--[if !mso]>
<style>
st1\:*{behavior:url(#default#ieooui) }
</style>
<![endif]-->
<style>
<!--
 /* Font Definitions */
 @font-face
	{font-family:Batang;
	panose-1:2 3 6 0 0 1 1 1 1 1;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:"\@Batang";
	panose-1:2 3 6 0 0 1 1 1 1 1;}
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman";}
a:link, span.MsoHyperlink
	{color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{color:blue;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-reply;
	font-family:Arial;
	color:navy;}
@page Section1
	{size:8.5in 11.0in;
	margin:1.0in 1.25in 1.0in 1.25in;}
div.Section1
	{page:Section1;}
-->
</style>

</head>

<body lang=3DEN-US link=3Dblue vlink=3Dblue>

<div class=3DSection1>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>I vote in =
favor.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>Chol Su =
Kang<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<div>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><font =
size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>

<hr size=3D2 width=3D"100%" align=3Dcenter tabindex=3D-1>

</span></font></div>

<p class=3DMsoNormal><b><font size=3D2 face=3DTahoma><span =
style=3D'font-size:10.0pt;
font-family:Tahoma;font-weight:bold'>From:</span></font></b><font =
size=3D2
face=3DTahoma><span style=3D'font-size:10.0pt;font-family:Tahoma'>
roll-bounces@ietf.org [mailto:roll-bounces@ietf.org] <b><span =
style=3D'font-weight:
bold'>On Behalf Of </span></b>JP Vasseur<br>
<b><span style=3D'font-weight:bold'>Sent:</span></b> Saturday, August =
09, 2008
1:50 PM<br>
<b><span style=3D'font-weight:bold'>To:</span></b> roll@ietf.org<br>
<b><span style=3D'font-weight:bold'>Subject:</span></b> [Roll] Adoption =
of
draft-levis-roll-protocols-survey as a ROLL =
WGdocument</span></font><o:p></o:p></p>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D4 face=3DArial><span =
style=3D'font-size:14.0pt;
font-family:Arial'>Dear WG,<br>
<br>
There was a good consensus to adopt draft-levis-roll-protocols-survey as =
a ROLL
WG document during the ROLL WG meeting in <st1:City =
w:st=3D"on"><st1:place w:st=3D"on">Dublin</st1:place></st1:City>
but as usual we need to confirm on the mailing list.<br>
<br>
Are you in favor/opposed adopting draft-levis-roll-protocols-survey (<a
href=3D"http://www.ietf.org/internet-drafts/draft-levis-roll-protocols-su=
rvey-02.txt">http://www.ietf.org/internet-drafts/draft-levis-roll-protoco=
ls-survey-02.txt</a>)
as a ROLL WG document ?<br>
<br>
Note that the draft has been slightly updated to align it with the =
presentation
that was made during the meeting.<br>
<br>
Thanks.<br>
<br>
JP.</span></font> <o:p></o:p></p>

</div>

</body>

</html>

------_=_NextPart_001_01C8FBFF.368ECA0B--

--===============0465269325==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Roll mailing list
Roll@ietf.org
https://www.ietf.org/mailman/listinfo/roll

--===============0465269325==--


From roll-bounces@ietf.org  Mon Aug 11 22:22:05 2008
Return-Path: <roll-bounces@ietf.org>
X-Original-To: roll-archive@ietf.org
Delivered-To: ietfarch-roll-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 0EA763A6843;
	Mon, 11 Aug 2008 22:22:05 -0700 (PDT)
X-Original-To: roll@core3.amsl.com
Delivered-To: roll@core3.amsl.com
Received: from localhost (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id EA9863A6BCF
	for <roll@core3.amsl.com>; Mon, 11 Aug 2008 22:22:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level: 
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5
	tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32])
	by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id ARQILTSLMKVF for <roll@core3.amsl.com>;
	Mon, 11 Aug 2008 22:22:03 -0700 (PDT)
Received: from cs-smtp-1.Stanford.EDU (cs-smtp-1.Stanford.EDU [171.64.64.25])
	by core3.amsl.com (Postfix) with ESMTP id 6A0A53A67AA
	for <roll@ietf.org>; Mon, 11 Aug 2008 22:21:55 -0700 (PDT)
Received: from [76.14.71.180] (helo=[192.168.2.101])
	by cs-smtp-1.Stanford.EDU with esmtpsa (TLSv1:AES128-SHA:128)
	(Exim 4.60) (envelope-from <pal@cs.stanford.edu>)
	id 1KSmJU-0001qv-Im; Mon, 11 Aug 2008 22:20:56 -0700
Message-Id: <36B98059-6E33-47B1-87FE-2F5AA1D34700@cs.stanford.edu>
From: Philip Levis <pal@cs.stanford.edu>
To: Tim Winter <tim.winter@ekasystems.com>
In-Reply-To: <48A0818B.90605@ekasystems.com>
Mime-Version: 1.0 (Apple Message framework v926)
Date: Mon, 11 Aug 2008 22:20:40 -0700
References: <48A0818B.90605@ekasystems.com>
X-Mailer: Apple Mail (2.926)
X-Scan-Signature: 3fe17504c5843e76b9e439a63759b02e
Cc: roll@ietf.org
Subject: Re: [Roll] Comments on draft-levis-roll-protocols-survey-02
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/roll>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"; DelSp="yes"
Sender: roll-bounces@ietf.org
Errors-To: roll-bounces@ietf.org


On Aug 11, 2008, at 11:14 AM, Tim Winter wrote:

> WG,
>
> In reviewing the document I have come up with the following comments:
>
> Overall I find that the approach taken is useful and constructive.   
> It certainly provides a solid starting point from which to debate  
> the merits and drawbacks of various prtocols and their suitability  
> to ROLL.
>
> DSDV does not appear to be covered by any RFC or active draft.  I  
> suggest that it should be removed from ths survey.

It is unique in this regard. We mostly put it in there because it is  
very much a key part of the MANET canon. If we didn't have it in, I'm  
sure someone would have said that we should. That being said, I'm not  
against holding hard and fast to the draft/RFC requirement. Does  
anyone else feel strongly about this?

>
>
> With regard to the Table Scalability criterion I think it should be  
> more stringent.  The use case of LLNs behaving as data collection  
> networks, with the bulk of traffic flow through routers to data  
> collection points, is certainly a dominant one.  But there are other  
> use cases, e.g. access points -> sensor/actuator, which may let the  
> number of possible destinations D begin to approach N.  Should it be  
> necessary to maintain such state at individual nodes, for large  
> networks, it would be better for a protocol to provide routing table  
> scaling with O(log(D)).  Such may be found, for example, in  
> protocols which employ clustering or hierarchical strategies.

Well, as soon as we go to sub-linear factors on D, then we're talking  
about routing stretch. Remember, the purpose here isn't to state the  
requirements of ROLL protocols -- the application drafts do that --  
but rather to lay out a set of minimal (perhaps even insufficient)  
requirements by which we can judge existing protocols. I'm a bit wary  
saying that any protocol which does not use hierarchical routing  
cannot satisfy ROLL needs.


> The Control Cost criterion makes a lot of sense when considering the  
> energy constraints of nodes who are only battery powered and must  
> conserve energy at all times.  However I think we should also  
> consider that a (proactive) routing protocol may be able to take  
> advantage of powered (i.e. not energy constrained) nodes that may be  
> available in the network.  For example, a set of powered nodes who  
> are able to communicate without regard to limited energy may be able  
> to maintain a proactive routing state in order to service transient  
> battery powered nodes, who may come and go and would not be expected  
> to maintain any unused state.  None of the protocols under  
> consideration appear to have such capabilities.

Agreed. The point here, though, isn't that some nodes could maintain  
more than O(D) state, or have a higher control cost, rather that some  
node's can't. If a protocol requires them to have > O(D) RT state, or  
a higher control cost, than it cannot be used on these weaker nodes.  
To some degree, I think node cost encompasses much of what you're  
talking about, though.

Again, to reiterate, the criteria in this draft are *not* intended to  
be the principal ways in which we will evaluate ROLL protocols: those  
are the application requirements documents. This is just asking the  
question of whether existing protocols can meet our needs.

Phil
_______________________________________________
Roll mailing list
Roll@ietf.org
https://www.ietf.org/mailman/listinfo/roll


From roll-bounces@ietf.org  Tue Aug 12 01:11:17 2008
Return-Path: <roll-bounces@ietf.org>
X-Original-To: roll-archive@ietf.org
Delivered-To: ietfarch-roll-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 0F7413A6A0D;
	Tue, 12 Aug 2008 01:11:17 -0700 (PDT)
X-Original-To: roll@core3.amsl.com
Delivered-To: roll@core3.amsl.com
Received: from localhost (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id A61DC3A6A0D
	for <roll@core3.amsl.com>; Tue, 12 Aug 2008 01:11:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.002
X-Spam-Level: 
X-Spam-Status: No, score=0.002 tagged_above=-999 required=5
	tests=[BAYES_50=0.001, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32])
	by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id lHIN6c7qtp9h for <roll@core3.amsl.com>;
	Tue, 12 Aug 2008 01:11:15 -0700 (PDT)
Received: from scorpius.cttc.es (scorpius.cttc.es [84.88.62.197])
	by core3.amsl.com (Postfix) with ESMTP id 53F563A67AA
	for <roll@ietf.org>; Tue, 12 Aug 2008 01:11:14 -0700 (PDT)
Received: from castor (postfix@castor.cttc.es [84.88.62.196])
	by scorpius.cttc.es (8.13.8/8.13.5) with ESMTP id m7C88U9j007890
	for <roll@ietf.org>; Tue, 12 Aug 2008 10:08:30 +0200
Received: from CTTCPCMDOHLER (pcmdohler.cttc.es [84.88.61.89])
	by castor (Postfix) with ESMTP id 607AE2FC282
	for <roll@ietf.org>; Tue, 12 Aug 2008 10:08:30 +0200 (CEST)
From: "Mischa Dohler" <mischa.dohler@cttc.es>
To: <roll@ietf.org>
Date: Tue, 12 Aug 2008 10:05:54 +0200
Organization: CTTC
MIME-Version: 1.0
X-Mailer: Microsoft Office Outlook, Build 11.0.5510
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3198
In-reply-to: <C4C3CFB0.4DAEB%jvasseur@cisco.com>
Thread-Index: Acj6YYuLuMHTFm5cuUyrafLczWZV4AB8KeHw
Message-Id: <20080812080830.607AE2FC282@castor>
X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.0
	(castor); Tue, 12 Aug 2008 10:08:30 +0200 (CEST)
X-Scanned-By: MIMEDefang 2.57 on 84.88.62.197
Subject: Re: [Roll] Adoption of draft-levis-roll-protocols-survey as a ROLL
	WGdocument
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: mischa.dohler@cttc.es
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/roll>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============0943422045=="
Sender: roll-bounces@ietf.org
Errors-To: roll-bounces@ietf.org

This is a multi-part message in MIME format.

--===============0943422045==
Content-Type: multipart/alternative;
	boundary="----=_NextPart_000_014B_01C8FC63.02678640"

This is a multi-part message in MIME format.

------=_NextPart_000_014B_01C8FC63.02678640
Content-Type: text/plain;
	charset="US-ASCII"
Content-Transfer-Encoding: 7bit

In favor. Mischa.

 

  _____  

From: roll-bounces@ietf.org [mailto:roll-bounces@ietf.org] On Behalf Of JP
Vasseur
Sent: Saturday, August 09, 2008 10:50 PM
To: roll@ietf.org
Subject: [Roll] Adoption of draft-levis-roll-protocols-survey as a ROLL
WGdocument

 

Dear WG,

There was a good consensus to adopt draft-levis-roll-protocols-survey as a
ROLL WG document during the ROLL WG meeting in Dublin but as usual we need
to confirm on the mailing list.

Are you in favor/opposed adopting draft-levis-roll-protocols-survey
(http://www.ietf.org/internet-drafts/draft-levis-roll-protocols-survey-02.tx
t) as a ROLL WG document ?

Note that the draft has been slightly updated to align it with the
presentation that was made during the meeting.

Thanks.

JP. 


------=_NextPart_000_014B_01C8FC63.02678640
Content-Type: text/html;
	charset="US-ASCII"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:st1=3D"urn:schemas-microsoft-com:office:smarttags" =
xmlns=3D"http://www.w3.org/TR/REC-html40">

<head>
<meta http-equiv=3DContent-Type content=3D"text/html; =
charset=3Dus-ascii">
<meta name=3DGenerator content=3D"Microsoft Word 11 (filtered medium)">
<!--[if !mso]>
<style>
v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style>
<![endif]-->
<title>Adoption of draft-levis-roll-protocols-survey as a ROLL WG =
document</title>
<o:SmartTagType =
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"
 name=3D"City" =
downloadurl=3D"http://www.5iamas-microsoft-com:office:smarttags"/>
<o:SmartTagType =
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"
 name=3D"place" downloadurl=3D"http://www.5iantlavalamp.com/"/>
<!--[if !mso]>
<style>
st1\:*{behavior:url(#default#ieooui) }
</style>
<![endif]-->
<style>
<!--
 /* Font Definitions */
 @font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0mm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman";}
a:link, span.MsoHyperlink
	{color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{color:blue;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-reply;
	font-family:"Courier New";
	color:windowtext;
	font-weight:normal;
	font-style:normal;
	text-decoration:none none;}
@page Section1
	{size:612.0pt 792.0pt;
	margin:72.0pt 90.0pt 72.0pt 90.0pt;}
div.Section1
	{page:Section1;}
-->
</style>

</head>

<body lang=3DEN-US link=3Dblue vlink=3Dblue>

<div class=3DSection1>

<p class=3DMsoNormal><font size=3D2 face=3D"Courier New"><span =
style=3D'font-size:10.0pt;
font-family:"Courier New"'>In favor. =
Mischa.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3D"Courier New"><span =
style=3D'font-size:10.0pt;
font-family:"Courier New"'><o:p>&nbsp;</o:p></span></font></p>

<div>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><font =
size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>

<hr size=3D2 width=3D"100%" align=3Dcenter tabindex=3D-1>

</span></font></div>

<p class=3DMsoNormal><b><font size=3D2 face=3DTahoma><span =
style=3D'font-size:10.0pt;
font-family:Tahoma;font-weight:bold'>From:</span></font></b><font =
size=3D2
face=3DTahoma><span style=3D'font-size:10.0pt;font-family:Tahoma'>
roll-bounces@ietf.org [mailto:roll-bounces@ietf.org] <b><span =
style=3D'font-weight:
bold'>On Behalf Of </span></b>JP Vasseur<br>
<b><span style=3D'font-weight:bold'>Sent:</span></b> Saturday, August =
09, 2008
10:50 PM<br>
<b><span style=3D'font-weight:bold'>To:</span></b> roll@ietf.org<br>
<b><span style=3D'font-weight:bold'>Subject:</span></b> [Roll] Adoption =
of
draft-levis-roll-protocols-survey as a ROLL =
WGdocument</span></font><o:p></o:p></p>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D4 face=3DArial><span =
style=3D'font-size:14.0pt;
font-family:Arial'>Dear WG,<br>
<br>
There was a good consensus to adopt draft-levis-roll-protocols-survey as =
a ROLL
WG document during the ROLL WG meeting in <st1:City =
w:st=3D"on"><st1:place w:st=3D"on">Dublin</st1:place></st1:City>
but as usual we need to confirm on the mailing list.<br>
<br>
Are you in favor/opposed adopting draft-levis-roll-protocols-survey (<a
href=3D"http://www.ietf.org/internet-drafts/draft-levis-roll-protocols-su=
rvey-02.txt">http://www.ietf.org/internet-drafts/draft-levis-roll-protoco=
ls-survey-02.txt</a>)
as a ROLL WG document ?<br>
<br>
Note that the draft has been slightly updated to align it with the =
presentation
that was made during the meeting.<br>
<br>
Thanks.<br>
<br>
JP.</span></font> <o:p></o:p></p>

</div>

</body>

</html>

------=_NextPart_000_014B_01C8FC63.02678640--


--===============0943422045==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Roll mailing list
Roll@ietf.org
https://www.ietf.org/mailman/listinfo/roll

--===============0943422045==--



From roll-bounces@ietf.org  Tue Aug 12 01:17:58 2008
Return-Path: <roll-bounces@ietf.org>
X-Original-To: roll-archive@ietf.org
Delivered-To: ietfarch-roll-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 208453A6A85;
	Tue, 12 Aug 2008 01:17:58 -0700 (PDT)
X-Original-To: roll@core3.amsl.com
Delivered-To: roll@core3.amsl.com
Received: from localhost (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 61CD63A6A85;
	Tue, 12 Aug 2008 01:17:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.419
X-Spam-Level: 
X-Spam-Status: No, score=-5.419 tagged_above=-999 required=5
	tests=[AWL=-0.217, BAYES_00=-2.599, HTML_MESSAGE=0.001,
	MIME_QP_LONG_LINE=1.396, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32])
	by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id ufpwVRvgOW0P; Tue, 12 Aug 2008 01:17:48 -0700 (PDT)
Received: from rtp-iport-1.cisco.com (rtp-iport-1.cisco.com [64.102.122.148])
	by core3.amsl.com (Postfix) with ESMTP id 595543A684A;
	Tue, 12 Aug 2008 01:17:48 -0700 (PDT)
X-IronPort-AV: E=Sophos;i="4.32,194,1217808000"; d="scan'208,217";a="17213890"
Received: from rtp-dkim-1.cisco.com ([64.102.121.158])
	by rtp-iport-1.cisco.com with ESMTP; 12 Aug 2008 08:17:10 +0000
Received: from rtp-core-1.cisco.com (rtp-core-1.cisco.com [64.102.124.12])
	by rtp-dkim-1.cisco.com (8.12.11/8.12.11) with ESMTP id m7C8HAKr032218; 
	Tue, 12 Aug 2008 04:17:10 -0400
Received: from xbh-rtp-211.amer.cisco.com (xbh-rtp-211.cisco.com
	[64.102.31.102])
	by rtp-core-1.cisco.com (8.13.8/8.13.8) with ESMTP id m7C8HA6J007432;
	Tue, 12 Aug 2008 08:17:10 GMT
Received: from xmb-rtp-213.amer.cisco.com ([64.102.31.112]) by
	xbh-rtp-211.amer.cisco.com with Microsoft SMTPSVC(6.0.3790.1830); 
	Tue, 12 Aug 2008 04:17:10 -0400
Received: from 10.61.98.100 ([10.61.98.100]) by xmb-rtp-213.amer.cisco.com
	([64.102.31.112]) with Microsoft Exchange Server HTTP-DAV ; 
	Tue, 12 Aug 2008 08:17:10 +0000
User-Agent: Microsoft-Entourage/12.11.0.080522
Date: Tue, 12 Aug 2008 10:17:07 +0200
From: JP Vasseur <jvasseur@cisco.com>
To: <Jerald.P.Martocci@jci.com>
Message-ID: <C4C713A3.4DF1B%jvasseur@cisco.com>
Thread-Topic: [Roll] Adoption of draft-levis-roll-protocols-survey as a ROLL
	WG document
Thread-Index: Acj8U89F2OFdgzasI0aDRmQLkiLuGQ==
In-Reply-To: <OF746E6041.CE0D84F7-ON862574A2.00656DD7-862574A2.006BBDCA@jci.com>
Mime-version: 1.0
X-OriginalArrivalTime: 12 Aug 2008 08:17:10.0424 (UTC)
	FILETIME=[D1503980:01C8FC53]
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; l=7698; t=1218529030;
	x=1219393030; c=relaxed/simple; s=rtpdkim1001;
	h=Content-Type:From:Subject:Content-Transfer-Encoding:MIME-Version;
	d=cisco.com; i=jvasseur@cisco.com;
	z=From:=20JP=20Vasseur=20<jvasseur@cisco.com>
	|Subject:=20Re=3A=20[Roll]=20Adoption=20of=20draft-levis-ro
	ll-protocols-survey=20as=20a=20ROLL=20WG=0A=20document
	|Sender:=20 |To:=20<Jerald.P.Martocci@jci.com>;
	bh=qlQoEKVSuT9LdACpVzxjFtesGSM+TbigIR/aIw+t4WE=;
	b=narjUhujJhGvJF+O8/Es9fykfo2Ih74waRdUs+FGwgfEb96Kb8ud6SUJxd
	xamZYASDv/49e52x87q8KE19SrOQ+5bnZyUCdEczWBOyyqtV4jDZYOX/Z3Rj
	9jcIYU8gnw;
Authentication-Results: rtp-dkim-1; header.From=jvasseur@cisco.com; dkim=pass (
	sig from cisco.com/rtpdkim1001 verified; ); 
Cc: roll@ietf.org, roll-bounces@ietf.org, Ted.Humpal@jci.com
Subject: Re: [Roll] Adoption of draft-levis-roll-protocols-survey as a ROLL
 WG document
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/roll>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============1219550906=="
Sender: roll-bounces@ietf.org
Errors-To: roll-bounces@ietf.org

> This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

--===============1219550906==
Content-type: multipart/alternative;
	boundary="B_3301381029_24659676"

> This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

--B_3301381029_24659676
Content-type: text/plain;
	charset="ISO-8859-1"
Content-transfer-encoding: quoted-printable

Hi Jerry,

You=B9re absolutely right that the requirements spelled out in the Building
Automation documents MUST and will be taken into account, and I=B9m sure that
Phil is planning to look at it once it will become a WG document. For the
time being, there is no need to postpone the WG adoption.

Cheers,

JP.

On 8/11/08 9:36 PM, "Jerald.P.Martocci@jci.com" <Jerald.P.Martocci@jci.com>
wrote:

>=20
> The survey as given in Dublin only included the Home,  Industrial and Urb=
an
> routing requirements.  I presume this was because the Commercial Building
> requirements were not available until early July.  I would like the analy=
sis
> to include the commercial building requirements.
>=20
> I also think that 'latency' should be a column on the decision matrix on =
page
> 9 of the document.  Embedded real-time systems are mission critical (e.g.=
 Fire
> Alarming) where latency is a prime discriminator of the protocol used.  T=
he
> routing algorithms are subject to this latency for example when a new pat=
h
> must be discovered while the packet is in transit.
>=20
> I would like to postpone the adoption of the document as a ROLL WG docume=
nt
> until these two items have been addressed.
>=20
>=20
> Regards,=20
>=20
> Jerry Martocci=20
>=20
>=20
>=20
>=20
>=20
> JP Vasseur <jvasseur@cisco.com>
> Sent by: roll-bounces@ietf.org 08/09/2008 03:50 PM
> To=20
> <roll@ietf.org>=20
> cc
> Subject=20
> [Roll] Adoption of draft-levis-roll-protocols-survey as a ROLL WG
> document=20
>=20
>=20
>=20
>=20
> Dear WG,
>=20
> There was a good consensus to adopt draft-levis-roll-protocols-survey as =
a
> ROLL WG document during the ROLL WG meeting in Dublin but as usual we nee=
d to
> confirm on the mailing list.
>=20
> Are you in favor/opposed adopting draft-levis-roll-protocols-survey
> (http://www.ietf.org/internet-drafts/draft-levis-roll-protocols-survey-02=
.txt
> <http://www.ietf.org/internet-drafts/draft-levis-roll-protocols-survey-02=
.txt>
> ) as a ROLL WG document ?
>=20
> Note that the draft has been slightly updated to align it with the
> presentation that was made during the meeting.
>=20
> Thanks.
>=20
> JP. _______________________________________________
> Roll mailing list
> Roll@ietf.org
> https://www.ietf.org/mailman/listinfo/roll
>=20
>=20


--B_3301381029_24659676
Content-type: text/html;
	charset="ISO-8859-1"
Content-transfer-encoding: quoted-printable

<HTML>
<HEAD>
<TITLE>Re: [Roll] Adoption of draft-levis-roll-protocols-survey as a ROLL W=
G document</TITLE>
</HEAD>
<BODY>
<FONT FACE=3D"Calibri, Verdana, Helvetica, Arial"><SPAN STYLE=3D'font-size:13pt=
'>Hi Jerry,<BR>
<BR>
You&#8217;re absolutely right that the requirements spelled out in the Buil=
ding Automation documents MUST and will be taken into account, and I&#8217;m=
 sure that Phil is planning to look at it once it will become a WG document.=
 For the time being, there is no need to postpone the WG adoption.<BR>
<BR>
Cheers,<BR>
<BR>
JP.<BR>
<BR>
On 8/11/08 9:36 PM, &quot;<a href=3D"Jerald.P.Martocci@jci.com">Jerald.P.Mart=
occi@jci.com</a>&quot; &lt;<a href=3D"Jerald.P.Martocci@jci.com">Jerald.P.Mart=
occi@jci.com</a>&gt; wrote:<BR>
<BR>
</SPAN></FONT><BLOCKQUOTE><FONT FACE=3D"Calibri, Verdana, Helvetica, Arial"><=
SPAN STYLE=3D'font-size:13pt'><BR>
The survey as given in Dublin only included the Home, &nbsp;Industrial and =
Urban routing requirements. &nbsp;I presume this was because the Commercial =
Building requirements were not available until early July. &nbsp;I would lik=
e the analysis to include the commercial building requirements. &nbsp;<BR>
<BR>
I also think that 'latency' should be a column on the decision matrix on pa=
ge 9 of the document. &nbsp;Embedded real-time systems are mission critical =
(e.g. Fire Alarming) where latency is a prime discriminator of the protocol =
used. &nbsp;The routing algorithms are subject to this latency for example w=
hen a new path must be discovered while the packet is in transit. <BR>
<BR>
I would like to postpone the adoption of the document as a ROLL WG document=
 until these two items have been addressed. <BR>
<BR>
<BR>
Regards, <BR>
<BR>
Jerry Martocci <BR>
<BR>
<BR>
<BR>
<BR>
<BR>
</SPAN><FONT SIZE=3D"2"><SPAN STYLE=3D'font-size:12pt'><B>JP Vasseur &lt;<a hre=
f=3D"jvasseur@cisco.com">jvasseur@cisco.com</a>&gt;</B></SPAN></FONT><SPAN STY=
LE=3D'font-size:13pt'> <BR>
</SPAN><FONT SIZE=3D"2"><SPAN STYLE=3D'font-size:12pt'>Sent by: <a href=3D"roll-b=
ounces@ietf.org">roll-bounces@ietf.org</a></SPAN></FONT><SPAN STYLE=3D'font-si=
ze:13pt'> </SPAN><FONT SIZE=3D"2"><SPAN STYLE=3D'font-size:12pt'>08/09/2008 03:5=
0 PM</SPAN></FONT><SPAN STYLE=3D'font-size:13pt'>=20
</SPAN></FONT>
<P ALIGN=3DRIGHT>
<FONT FACE=3D"Calibri, Verdana, Helvetica, Arial"><FONT SIZE=3D"2"><SPAN STYLE=3D=
'font-size:12pt'>To
</SPAN></FONT></FONT>
<P>
<FONT FACE=3D"Calibri, Verdana, Helvetica, Arial"><FONT SIZE=3D"2"><SPAN STYLE=3D=
'font-size:12pt'>&lt;<a href=3D"roll@ietf.org">roll@ietf.org</a>&gt;</SPAN></F=
ONT><SPAN STYLE=3D'font-size:13pt'>=20
</SPAN></FONT>
<P ALIGN=3DRIGHT>
<FONT FACE=3D"Calibri, Verdana, Helvetica, Arial"><FONT SIZE=3D"2"><SPAN STYLE=3D=
'font-size:12pt'>cc<BR>
Subject
</SPAN></FONT></FONT>
<P>
<FONT FACE=3D"Calibri, Verdana, Helvetica, Arial"><FONT SIZE=3D"2"><SPAN STYLE=3D=
'font-size:12pt'>[Roll] Adoption of draft-levis-roll-protocols-survey as a R=
OLL WG &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;document</SPAN></FONT><SPAN=
 STYLE=3D'font-size:13pt'> <BR>
<BR>
<BR>
<BR>
<BR>
</SPAN></FONT><FONT SIZE=3D"5"><FONT FACE=3D"Arial"><SPAN STYLE=3D'font-size:24pt=
'>Dear WG,<BR>
<BR>
There was a good consensus to adopt draft-levis-roll-protocols-survey as a =
ROLL WG document during the ROLL WG meeting in Dublin but as usual we need t=
o confirm on the mailing list.<BR>
<BR>
Are you in favor/opposed adopting draft-levis-roll-protocols-survey (<FONT =
COLOR=3D"#0000FF"><U><a href=3D"http://www.ietf.org/internet-drafts/draft-levis-=
roll-protocols-survey-02.txt">http://www.ietf.org/internet-drafts/draft-levi=
s-roll-protocols-survey-02.txt</a></U></FONT></SPAN></FONT></FONT><FONT FACE=
=3D"Calibri, Verdana, Helvetica, Arial"><SPAN STYLE=3D'font-size:13pt'> &lt;<a h=
ref=3D"http://www.ietf.org/internet-drafts/draft-levis-roll-protocols-survey-0=
2.txt">http://www.ietf.org/internet-drafts/draft-levis-roll-protocols-survey=
-02.txt</a>&gt; </SPAN></FONT><FONT SIZE=3D"5"><FONT FACE=3D"Arial"><SPAN STYLE=3D=
'font-size:24pt'>) as a ROLL WG document ?<BR>
<BR>
Note that the draft has been slightly updated to align it with the presenta=
tion that was made during the meeting.<BR>
<BR>
Thanks.<BR>
<BR>
JP.</SPAN></FONT></FONT><FONT SIZE=3D"4"><FONT FACE=3D"Calibri, Verdana, Helvet=
ica, Arial"><SPAN STYLE=3D'font-size:18pt'> </SPAN></FONT></FONT><FONT SIZE=3D"1=
"><FONT FACE=3D"Consolas, Courier New, Courier"><SPAN STYLE=3D'font-size:10pt'>_=
______________________________________________<BR>
Roll mailing list<BR>
<a href=3D"Roll@ietf.org">Roll@ietf.org</a><BR>
<a href=3D"https://www.ietf.org/mailman/listinfo/roll">https://www.ietf.org/m=
ailman/listinfo/roll</a><BR>
</SPAN></FONT></FONT><FONT FACE=3D"Calibri, Verdana, Helvetica, Arial"><SPAN =
STYLE=3D'font-size:13pt'><BR>
<BR>
</SPAN></FONT></BLOCKQUOTE>
</BODY>
</HTML>


--B_3301381029_24659676--


--===============1219550906==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Roll mailing list
Roll@ietf.org
https://www.ietf.org/mailman/listinfo/roll

--===============1219550906==--



From roll-bounces@ietf.org  Tue Aug 12 06:09:20 2008
Return-Path: <roll-bounces@ietf.org>
X-Original-To: roll-archive@ietf.org
Delivered-To: ietfarch-roll-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 170883A6A28;
	Tue, 12 Aug 2008 06:09:20 -0700 (PDT)
X-Original-To: roll@core3.amsl.com
Delivered-To: roll@core3.amsl.com
Received: from localhost (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 5BFBB3A6A28;
	Tue, 12 Aug 2008 06:09:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.598
X-Spam-Level: 
X-Spam-Status: No, score=-6.598 tagged_above=-999 required=5
	tests=[AWL=-0.000, BAYES_00=-2.599, HTML_FONT_SIZE_LARGE=0.001,
	HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32])
	by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id slBKMiplTu6Y; Tue, 12 Aug 2008 06:09:13 -0700 (PDT)
Received: from psmtp.com (exprod8ob119.obsmtp.com [64.18.3.37])
	by core3.amsl.com (Postfix) with ESMTP id 327223A6886;
	Tue, 12 Aug 2008 06:09:12 -0700 (PDT)
Received: from source ([192.132.24.137]) (using SSLv3) by
	exprod8ob119.postini.com ([64.18.7.12]) with SMTP; 
	Tue, 12 Aug 2008 06:08:27 PDT
Received: from jwimkrs1.na.jci.com ([10.10.6.31])
	by smtpmke01.jci.com (Lotus Domino Release 8.0.1)
	with ESMTP id 2008081208091051-97264 ;
	Tue, 12 Aug 2008 08:09:10 -0500 
In-Reply-To: <C4C713A3.4DF1B%jvasseur@cisco.com>
MIME-Version: 1.0
To: JP Vasseur <jvasseur@cisco.com>
X-Mailer: Lotus Notes Release 6.5.2 June 01, 2004
From: Jerald.P.Martocci@jci.com
Message-ID: <OFC7A70412.4F29E252-ON862574A3.004824FB-862574A3.004836A7@jci.com>
Date: Tue, 12 Aug 2008 08:08:43 -0500
X-MIMETrack: Serialize by Router on jwimkrs1.na.jci.com/NA/Johnson_Controls at
	08/12/2008 08:08:34 AM,
	Serialize complete at 08/12/2008 08:08:34 AM,
	Itemize by SMTP Server on smtpmke01.jci.com/JCI_SMTP(Release
	8.0.1|February 07, 2008) at 08/12/2008 08:09:10 AM,
	Serialize by Router on smtpmke01.jci.com/JCI_SMTP(Release
	8.0.1|February 07, 2008) at 08/12/2008 08:09:51 AM,
	Serialize complete at 08/12/2008 08:09:51 AM
Cc: roll@ietf.org, roll-bounces@ietf.org, Ted.Humpal@jci.com
Subject: Re: [Roll] Adoption of draft-levis-roll-protocols-survey as a ROLL
 WG document
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/roll>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============1581332095=="
Sender: roll-bounces@ietf.org
Errors-To: roll-bounces@ietf.org

This is a multipart message in MIME format.
--===============1581332095==
Content-Type: multipart/alternative; boundary="=_alternative 00483669862574A3_="

This is a multipart message in MIME format.
--=_alternative 00483669862574A3_=
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain; charset="ISO-8859-1"

Agreed.  I don't want to hold anything up.   Just want to make sure we're=20
considering all application domains.





JP Vasseur <jvasseur@cisco.com>=20
08/12/2008 03:17 AM

To
<Jerald.P.Martocci@jci.com>
cc
<roll@ietf.org>, <roll-bounces@ietf.org>, <Ted.Humpal@jci.com>
Subject
Re: [Roll] Adoption of draft-levis-roll-protocols-survey as a ROLL WG=20
document






Hi Jerry,

You?re absolutely right that the requirements spelled out in the Building=20
Automation documents MUST and will be taken into account, and I?m sure=20
that Phil is planning to look at it once it will become a WG document. For =

the time being, there is no need to postpone the WG adoption.

Cheers,

JP.

On 8/11/08 9:36 PM, "Jerald.P.Martocci@jci.com" <Jerald.P.Martocci@jci.com
> wrote:


The survey as given in Dublin only included the Home,  Industrial and=20
Urban routing requirements.  I presume this was because the Commercial=20
Building requirements were not available until early July.  I would like=20
the analysis to include the commercial building requirements.=20

I also think that 'latency' should be a column on the decision matrix on=20
page 9 of the document.  Embedded real-time systems are mission critical=20
(e.g. Fire Alarming) where latency is a prime discriminator of the=20
protocol used.  The routing algorithms are subject to this latency for=20
example when a new path must be discovered while the packet is in transit. =



I would like to postpone the adoption of the document as a ROLL WG=20
document until these two items have been addressed.=20


Regards,=20

Jerry Martocci=20





JP Vasseur <jvasseur@cisco.com>=20
Sent by: roll-bounces@ietf.org 08/09/2008 03:50 PM=20
To=20
<roll@ietf.org>=20
cc
Subject=20
[Roll] Adoption of draft-levis-roll-protocols-survey as a ROLL WG document =






Dear WG,

There was a good consensus to adopt draft-levis-roll-protocols-survey as a =

ROLL WG document during the ROLL WG meeting in Dublin but as usual we need =

to confirm on the mailing list.

Are you in favor/opposed adopting draft-levis-roll-protocols-survey (
http://www.ietf.org/internet-drafts/draft-levis-roll-protocols-survey-02.tx=
t=20
<
http://www.ietf.org/internet-drafts/draft-levis-roll-protocols-survey-02.txt
> ) as a ROLL WG document ?

Note that the draft has been slightly updated to align it with the=20
presentation that was made during the meeting.

Thanks.

JP. =5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=
=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F
Roll mailing list
Roll@ietf.org
https://www.ietf.org/mailman/listinfo/roll



--=_alternative 00483669862574A3_=
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html; charset="ISO-8859-1"


<br><font size=3D2 face=3D"sans-serif">Agreed. &nbsp;I don't want to hold a=
nything
up. &nbsp; Just want to make sure we're considering all application domains=
.</font>
<br>
<br>
<br>
<br>
<br>
<table width=3D100%>
<tr valign=3Dtop>
<td width=3D40%><font size=3D1 face=3D"sans-serif"><b>JP Vasseur &lt;jvasse=
ur@cisco.com&gt;</b>
</font>
<p><font size=3D1 face=3D"sans-serif">08/12/2008 03:17 AM</font>
<td width=3D59%>
<table width=3D100%>
<tr valign=3Dtop>
<td>
<div align=3Dright><font size=3D1 face=3D"sans-serif">To</font></div>
<td><font size=3D1 face=3D"sans-serif">&lt;Jerald.P.Martocci@jci.com&gt;</f=
ont>
<tr valign=3Dtop>
<td>
<div align=3Dright><font size=3D1 face=3D"sans-serif">cc</font></div>
<td><font size=3D1 face=3D"sans-serif">&lt;roll@ietf.org&gt;, &lt;roll-boun=
ces@ietf.org&gt;,
&lt;Ted.Humpal@jci.com&gt;</font>
<tr valign=3Dtop>
<td>
<div align=3Dright><font size=3D1 face=3D"sans-serif">Subject</font></div>
<td><font size=3D1 face=3D"sans-serif">Re: [Roll] Adoption of draft-levis-r=
oll-protocols-survey
as a ROLL WG document</font></table>
<br>
<table>
<tr valign=3Dtop>
<td>
<td></table>
<br></table>
<br>
<br>
<br><font size=3D3 face=3D"Calibri">Hi Jerry,<br>
<br>
You&#8217;re absolutely right that the requirements spelled out in the Buil=
ding
Automation documents MUST and will be taken into account, and I&#8217;m sure
that Phil is planning to look at it once it will become a WG document.
For the time being, there is no need to postpone the WG adoption.<br>
<br>
Cheers,<br>
<br>
JP.<br>
<br>
On 8/11/08 9:36 PM, &quot;</font><a href=3DJerald.P.Martocci@jci.com><font =
size=3D3 color=3Dblue face=3D"Calibri"><u>Jerald.P.Martocci@jci.com</u></fo=
nt></a><font size=3D3 face=3D"Calibri">&quot;
&lt;</font><a href=3DJerald.P.Martocci@jci.com><font size=3D3 color=3Dblue =
face=3D"Calibri"><u>Jerald.P.Martocci@jci.com</u></font></a><font size=3D3 =
face=3D"Calibri">&gt;
wrote:<br>
</font>
<br><font size=3D3 face=3D"Calibri"><br>
The survey as given in Dublin only included the Home, &nbsp;Industrial
and Urban routing requirements. &nbsp;I presume this was because the Commer=
cial
Building requirements were not available until early July. &nbsp;I would
like the analysis to include the commercial building requirements. &nbsp;<b=
r>
<br>
I also think that 'latency' should be a column on the decision matrix on
page 9 of the document. &nbsp;Embedded real-time systems are mission critic=
al
(e.g. Fire Alarming) where latency is a prime discriminator of the protocol
used. &nbsp;The routing algorithms are subject to this latency for example
when a new path must be discovered while the packet is in transit. <br>
<br>
I would like to postpone the adoption of the document as a ROLL WG document
until these two items have been addressed. <br>
<br>
<br>
Regards, <br>
<br>
Jerry Martocci <br>
<br>
<br>
<br>
<br>
</font><font size=3D3 face=3D"Calibri"><b><br>
JP Vasseur &lt;</b></font><a href=3Djvasseur@cisco.com><font size=3D3 color=
=3Dblue face=3D"Calibri"><b><u>jvasseur@cisco.com</u></b></font></a><font s=
ize=3D3 face=3D"Calibri"><b>&gt;</b></font><font size=3D3 face=3D"Calibri">
</font><font size=3D3 face=3D"Calibri"><br>
Sent by: </font><a href=3D"roll-bounces@ietf.org"><font size=3D3 color=3Dbl=
ue face=3D"Calibri"><u>roll-bounces@ietf.org</u></font></a><font size=3D3 f=
ace=3D"Calibri">
</font><font size=3D3 face=3D"Calibri">08/09/2008 03:50 PM</font><font size=
=3D3 face=3D"Calibri">
</font>
<div align=3Dright>
<p><font size=3D3 face=3D"Calibri">To </font></div>
<p><font size=3D3 face=3D"Calibri">&lt;</font><a href=3Droll@ietf.org><font=
 size=3D3 color=3Dblue face=3D"Calibri"><u>roll@ietf.org</u></font></a><fon=
t size=3D3 face=3D"Calibri">&gt;</font><font size=3D3 face=3D"Calibri">
</font>
<div align=3Dright>
<p><font size=3D3 face=3D"Calibri">cc<br>
Subject </font></div>
<p><font size=3D3 face=3D"Calibri">[Roll] Adoption of draft-levis-roll-prot=
ocols-survey
as a ROLL WG &nbsp; &nbsp; &nbsp; &nbsp;document</font><font size=3D3 face=
=3D"Calibri">
<br>
<br>
<br>
<br>
</font><font size=3D6 face=3D"Arial"><br>
Dear WG,<br>
<br>
There was a good consensus to adopt draft-levis-roll-protocols-survey as
a ROLL WG document during the ROLL WG meeting in Dublin but as usual we
need to confirm on the mailing list.<br>
<br>
Are you in favor/opposed adopting draft-levis-roll-protocols-survey (</font=
><a href=3D"http://www.ietf.org/internet-drafts/draft-levis-roll-protocols-=
survey-02.txt"><font size=3D6 color=3Dblue face=3D"Arial"><u>http://www.iet=
f.org/internet-drafts/draft-levis-roll-protocols-survey-02.txt</u></font></=
a><font size=3D3 face=3D"Calibri">
&lt;</font><a href=3D"http://www.ietf.org/internet-drafts/draft-levis-roll-=
protocols-survey-02.txt"><font size=3D3 color=3Dblue face=3D"Calibri"><u>ht=
tp://www.ietf.org/internet-drafts/draft-levis-roll-protocols-survey-02.txt<=
/u></font></a><font size=3D3 face=3D"Calibri">&gt;
</font><font size=3D6 face=3D"Arial">) as a ROLL WG document ?<br>
<br>
Note that the draft has been slightly updated to align it with the presenta=
tion
that was made during the meeting.<br>
<br>
Thanks.<br>
<br>
JP.</font><font size=3D5 face=3D"Calibri"> </font><font size=3D2 face=3D"Co=
nsolas">=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=
=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=
<br>
Roll mailing list</font><font size=3D2 color=3Dblue face=3D"Consolas"><u><b=
r>
</u></font><a href=3DRoll@ietf.org><font size=3D2 color=3Dblue face=3D"Cons=
olas"><u>Roll@ietf.org</u></font></a><font size=3D2 color=3Dblue face=3D"Co=
nsolas"><u><br>
</u></font><a href=3Dhttps://www.ietf.org/mailman/listinfo/roll><font size=
=3D2 color=3Dblue face=3D"Consolas"><u>https://www.ietf.org/mailman/listinf=
o/roll</u></font></a><font size=3D3 face=3D"Calibri"><br>
<br>
</font>
<p>
--=_alternative 00483669862574A3_=--

--===============1581332095==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Roll mailing list
Roll@ietf.org
https://www.ietf.org/mailman/listinfo/roll

--===============1581332095==--


From roll-bounces@ietf.org  Thu Aug 14 08:33:44 2008
Return-Path: <roll-bounces@ietf.org>
X-Original-To: roll-archive@ietf.org
Delivered-To: ietfarch-roll-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 9B8483A6DA2;
	Thu, 14 Aug 2008 08:33:44 -0700 (PDT)
X-Original-To: roll@core3.amsl.com
Delivered-To: roll@core3.amsl.com
Received: from localhost (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 580003A681B
	for <roll@core3.amsl.com>; Thu, 14 Aug 2008 08:33:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.365
X-Spam-Level: 
X-Spam-Status: No, score=-5.365 tagged_above=-999 required=5
	tests=[AWL=-0.163, BAYES_00=-2.599, HTML_MESSAGE=0.001,
	MIME_QP_LONG_LINE=1.396, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32])
	by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id gnUT7B-ESmVb for <roll@core3.amsl.com>;
	Thu, 14 Aug 2008 08:33:42 -0700 (PDT)
Received: from rtp-iport-2.cisco.com (rtp-iport-2.cisco.com [64.102.122.149])
	by core3.amsl.com (Postfix) with ESMTP id 1B4363A6D96
	for <roll@ietf.org>; Thu, 14 Aug 2008 08:33:42 -0700 (PDT)
X-IronPort-AV: E=Sophos;i="4.32,210,1217808000"; d="scan'208,217";a="17501427"
Received: from rtp-dkim-1.cisco.com ([64.102.121.158])
	by rtp-iport-2.cisco.com with ESMTP; 14 Aug 2008 15:33:14 +0000
Received: from rtp-core-1.cisco.com (rtp-core-1.cisco.com [64.102.124.12])
	by rtp-dkim-1.cisco.com (8.12.11/8.12.11) with ESMTP id m7EFXEQG029738; 
	Thu, 14 Aug 2008 11:33:14 -0400
Received: from xbh-rtp-201.amer.cisco.com (xbh-rtp-201.cisco.com
	[64.102.31.12])
	by rtp-core-1.cisco.com (8.13.8/8.13.8) with ESMTP id m7EFXDG4027830;
	Thu, 14 Aug 2008 15:33:14 GMT
Received: from xmb-rtp-213.amer.cisco.com ([64.102.31.112]) by
	xbh-rtp-201.amer.cisco.com with Microsoft SMTPSVC(6.0.3790.1830); 
	Thu, 14 Aug 2008 11:33:14 -0400
Received: from 10.61.97.72 ([10.61.97.72]) by xmb-rtp-213.amer.cisco.com
	([64.102.31.112]) with Microsoft Exchange Server HTTP-DAV ; 
	Thu, 14 Aug 2008 15:33:13 +0000
User-Agent: Microsoft-Entourage/12.11.0.080522
Date: Thu, 14 Aug 2008 17:33:13 +0200
From: JP Vasseur <jvasseur@cisco.com>
To: <roll@ietf.org>
Message-ID: <C4CA1CD9.4E6E5%jvasseur@cisco.com>
Thread-Topic: New ROLL WG
Thread-Index: Acj+IxBAfLZg/irSY0moiiKILRqf3Q==
Mime-version: 1.0
X-OriginalArrivalTime: 14 Aug 2008 15:33:14.0067 (UTC)
	FILETIME=[10E2D230:01C8FE23]
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; l=1037; t=1218727994;
	x=1219591994; c=relaxed/simple; s=rtpdkim1001;
	h=Content-Type:From:Subject:Content-Transfer-Encoding:MIME-Version;
	d=cisco.com; i=jvasseur@cisco.com;
	z=From:=20JP=20Vasseur=20<jvasseur@cisco.com>
	|Subject:=20New=20ROLL=20WG |Sender:=20 |To:=20<roll@ietf.org>;
	bh=NCNL+WfZfA7uptXg6yU1Go7jSoA44D/zKXHfdnmJcRA=;
	b=F+C/VrmhQwRx+ABKqnmqZLGaG663CZngnE196CFJWavqw5K3jOQBAX4bmq
	L1MeU/3PfXEdCrcsMLi9XkzhfpD6afjlBli031RwkoSqtoCSMRxsZHmVDtvR
	0N7HuM3sF2;
Authentication-Results: rtp-dkim-1; header.From=jvasseur@cisco.com; dkim=pass (
	sig from cisco.com/rtpdkim1001 verified; ); 
Subject: [Roll] New ROLL WG
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/roll>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============0555803419=="
Sender: roll-bounces@ietf.org
Errors-To: roll-bounces@ietf.org

> This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

--===============0555803419==
Content-type: multipart/alternative;
	boundary="B_3301579993_5978558"

> This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

--B_3301579993_5978558
Content-type: text/plain;
	charset="US-ASCII"
Content-transfer-encoding: 7bit

Dear WG,

Considering the good support, draft-levis-roll-protocols-survey is adopted
as a ROLL WG document. Authors, please resubmit as
draft-ietf-roll-protocols-survey-00.txt with no change other than the name
and date.

Thanks.

JP.

--B_3301579993_5978558
Content-type: text/html;
	charset="US-ASCII"
Content-transfer-encoding: quoted-printable

<HTML>
<HEAD>
<TITLE>New ROLL WG</TITLE>
</HEAD>
<BODY>
<FONT SIZE=3D"2"><FONT FACE=3D"Arial"><SPAN STYLE=3D'font-size:12pt'>Dear WG,<BR>
<BR>
Considering the good support, draft-levis-roll-protocols-survey is adopted =
as a ROLL WG document. Authors, please resubmit as draft-ietf-roll-protocols=
-survey-00.txt with no change other than the name and date.<BR>
<BR>
Thanks.<BR>
<BR>
JP.</SPAN></FONT></FONT>
</BODY>
</HTML>


--B_3301579993_5978558--


--===============0555803419==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Roll mailing list
Roll@ietf.org
https://www.ietf.org/mailman/listinfo/roll

--===============0555803419==--



From roll-bounces@ietf.org  Thu Aug 14 10:56:25 2008
Return-Path: <roll-bounces@ietf.org>
X-Original-To: roll-archive@ietf.org
Delivered-To: ietfarch-roll-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id F09AC3A6A2C;
	Thu, 14 Aug 2008 10:56:24 -0700 (PDT)
X-Original-To: roll@core3.amsl.com
Delivered-To: roll@core3.amsl.com
Received: from localhost (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 9B69B3A6921
	for <roll@core3.amsl.com>; Thu, 14 Aug 2008 10:56:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level: 
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5
	tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32])
	by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id MBt2yJAXLM3w for <roll@core3.amsl.com>;
	Thu, 14 Aug 2008 10:56:22 -0700 (PDT)
Received: from cs-smtp-1.Stanford.EDU (cs-smtp-1.Stanford.EDU [171.64.64.25])
	by core3.amsl.com (Postfix) with ESMTP id 5461B3A6A88
	for <roll@ietf.org>; Thu, 14 Aug 2008 10:56:22 -0700 (PDT)
Received: from [76.14.71.180] (helo=[192.168.2.103])
	by cs-smtp-1.Stanford.EDU with esmtpsa (TLSv1:AES128-SHA:128)
	(Exim 4.60) (envelope-from <pal@cs.stanford.edu>)
	id 1KTh3S-0001NX-QE; Thu, 14 Aug 2008 10:56:10 -0700
In-Reply-To: <C4CA1CD9.4E6E5%jvasseur@cisco.com>
References: <C4CA1CD9.4E6E5%jvasseur@cisco.com>
Mime-Version: 1.0 (Apple Message framework v753.1)
Message-Id: <8DF8F8A9-3E8D-42DF-9A68-30DFC1DA44CA@cs.stanford.edu>
From: Philip Levis <pal@cs.stanford.edu>
Date: Thu, 14 Aug 2008 10:55:09 -0700
To: JP Vasseur <jvasseur@cisco.com>
X-Mailer: Apple Mail (2.753.1)
X-Scan-Signature: c6b7461a7773f457175e025605fe13fe
Cc: roll@ietf.org
Subject: Re: [Roll] New ROLL WG
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/roll>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"; DelSp="yes"
Sender: roll-bounces@ietf.org
Errors-To: roll-bounces@ietf.org


On Aug 14, 2008, at 8:33 AM, JP Vasseur wrote:

> Dear WG,
>
> Considering the good support, draft-levis-roll-protocols-survey is  
> adopted as a ROLL WG document. Authors, please resubmit as draft- 
> ietf-roll-protocols-survey-00.txt with no change other than the  
> name and date.

OK, will do tomorrow.

Phil
_______________________________________________
Roll mailing list
Roll@ietf.org
https://www.ietf.org/mailman/listinfo/roll


From roll-bounces@ietf.org  Thu Aug 21 12:27:27 2008
Return-Path: <roll-bounces@ietf.org>
X-Original-To: roll-archive@ietf.org
Delivered-To: ietfarch-roll-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 42A5C3A6996;
	Thu, 21 Aug 2008 12:27:27 -0700 (PDT)
X-Original-To: roll@core3.amsl.com
Delivered-To: roll@core3.amsl.com
Received: from localhost (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 2EE063A67C0
	for <roll@core3.amsl.com>; Thu, 21 Aug 2008 12:27:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.371
X-Spam-Level: 
X-Spam-Status: No, score=-5.371 tagged_above=-999 required=5
	tests=[AWL=-0.169, BAYES_00=-2.599, HTML_MESSAGE=0.001,
	MIME_QP_LONG_LINE=1.396, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32])
	by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id vDmzihELQrXZ for <roll@core3.amsl.com>;
	Thu, 21 Aug 2008 12:27:03 -0700 (PDT)
Received: from sj-iport-2.cisco.com (sj-iport-2.cisco.com [171.71.176.71])
	by core3.amsl.com (Postfix) with ESMTP id A247928C11E
	for <roll@ietf.org>; Thu, 21 Aug 2008 12:26:49 -0700 (PDT)
X-IronPort-AV: E=Sophos;i="4.32,247,1217808000"; d="scan'208,217";a="77250671"
Received: from sj-dkim-3.cisco.com ([171.71.179.195])
	by sj-iport-2.cisco.com with ESMTP; 21 Aug 2008 19:26:50 +0000
Received: from sj-core-3.cisco.com (sj-core-3.cisco.com [171.68.223.137])
	by sj-dkim-3.cisco.com (8.12.11/8.12.11) with ESMTP id m7LJQoXZ031276
	for <roll@ietf.org>; Thu, 21 Aug 2008 12:26:50 -0700
Received: from xbh-rtp-201.amer.cisco.com (xbh-rtp-201.cisco.com
	[64.102.31.12])
	by sj-core-3.cisco.com (8.13.8/8.13.8) with ESMTP id m7LJQZ0C011584
	for <roll@ietf.org>; Thu, 21 Aug 2008 19:26:49 GMT
Received: from xmb-rtp-213.amer.cisco.com ([64.102.31.112]) by
	xbh-rtp-201.amer.cisco.com with Microsoft SMTPSVC(6.0.3790.1830); 
	Thu, 21 Aug 2008 15:26:49 -0400
Received: from 10.61.97.215 ([10.61.97.215]) by xmb-rtp-213.amer.cisco.com
	([64.102.31.112]) with Microsoft Exchange Server HTTP-DAV ; 
	Thu, 21 Aug 2008 19:26:49 +0000
User-Agent: Microsoft-Entourage/12.12.0.080729
Date: Thu, 21 Aug 2008 21:26:48 +0200
From: JP Vasseur <jvasseur@cisco.com>
To: <roll@ietf.org>
Message-ID: <C4D38E18.4FB44%jvasseur@cisco.com>
Thread-Topic: Aligning Terminology across ROLL Routing Requirements Documents
Thread-Index: AckDw9q7L5M0IvVf8EGd9qOQInzFGg==
Mime-version: 1.0
X-OriginalArrivalTime: 21 Aug 2008 19:26:49.0469 (UTC)
	FILETIME=[DB9BB2D0:01C903C3]
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; l=1166; t=1219346810;
	x=1220210810; c=relaxed/simple; s=sjdkim3002;
	h=Content-Type:From:Subject:Content-Transfer-Encoding:MIME-Version;
	d=cisco.com; i=jvasseur@cisco.com;
	z=From:=20JP=20Vasseur=20<jvasseur@cisco.com>
	|Subject:=20Aligning=20Terminology=20across=20ROLL=20Routin
	g=20Requirements=20Documents |Sender:=20;
	bh=fVw6DoQgt16zEIUllqyungxut2xNJiNH5eJTAiEIO6k=;
	b=MSa1rNBrkLLG4yr2f3//opih/ocuQkl+5TGVS0I7pUhk0ddym96QqRV6Cm
	NO7GGUOttKgOx8GzdTqvxe2B+Z5y7WKpkQzDLtrcqfMaTyiHpfVuyrQ1GPiU
	NMKrfJl7LP;
Authentication-Results: sj-dkim-3; header.From=jvasseur@cisco.com; dkim=pass (
	sig from cisco.com/sjdkim3002 verified; ); 
Subject: [Roll] Aligning Terminology across ROLL Routing Requirements
	Documents
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/roll>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============1682140885=="
Sender: roll-bounces@ietf.org
Errors-To: roll-bounces@ietf.org

> This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

--===============1682140885==
Content-type: multipart/alternative;
	boundary="B_3302198808_43104876"

> This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

--B_3302198808_43104876
Content-type: text/plain;
	charset="US-ASCII"
Content-transfer-encoding: 7bit

Dear WG,

Since there are quite a few inconsistencies between the terms used across
the various ROLL WG ID, I will try to quickly prepare a short ID on
Terminology that could be referenced in all ROLL documents.

Let me know if you have comments.

Thanks.

JP.

--B_3302198808_43104876
Content-type: text/html;
	charset="US-ASCII"
Content-transfer-encoding: quoted-printable

<HTML>
<HEAD>
<TITLE>Aligning Terminology across ROLL Routing Requirements Documents</TIT=
LE>
</HEAD>
<BODY>
<FONT FACE=3D"Calibri, Verdana, Helvetica, Arial"><SPAN STYLE=3D'font-size:13pt=
'>Dear WG,<BR>
<BR>
Since there are quite a few inconsistencies between the terms used across t=
he various ROLL WG ID, I will try to quickly prepare a short ID on Terminolo=
gy that could be referenced in all ROLL documents. <BR>
<BR>
Let me know if you have comments.<BR>
<BR>
Thanks.<BR>
<BR>
JP.</SPAN></FONT>
</BODY>
</HTML>


--B_3302198808_43104876--


--===============1682140885==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Roll mailing list
Roll@ietf.org
https://www.ietf.org/mailman/listinfo/roll

--===============1682140885==--



From roll-bounces@ietf.org  Thu Aug 21 12:29:15 2008
Return-Path: <roll-bounces@ietf.org>
X-Original-To: roll-archive@ietf.org
Delivered-To: ietfarch-roll-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id BC77A3A6831;
	Thu, 21 Aug 2008 12:29:15 -0700 (PDT)
X-Original-To: roll@core3.amsl.com
Delivered-To: roll@core3.amsl.com
Received: from localhost (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id A773E3A6831
	for <roll@core3.amsl.com>; Thu, 21 Aug 2008 12:29:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.945
X-Spam-Level: 
X-Spam-Status: No, score=-4.945 tagged_above=-999 required=5
	tests=[AWL=-0.570, BAYES_50=0.001, GB_I_LETTER=-2, HTML_MESSAGE=0.001, 
	MIME_QP_LONG_LINE=1.396, RCVD_IN_DNSWL_MED=-4, SARE_SUB_OBFU_Q1=0.227]
Received: from mail.ietf.org ([64.170.98.32])
	by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id XHo+BKPZweRp for <roll@core3.amsl.com>;
	Thu, 21 Aug 2008 12:28:53 -0700 (PDT)
Received: from rtp-iport-2.cisco.com (rtp-iport-2.cisco.com [64.102.122.149])
	by core3.amsl.com (Postfix) with ESMTP id 25FD03A677E
	for <roll@ietf.org>; Thu, 21 Aug 2008 12:28:52 -0700 (PDT)
X-IronPort-AV: E=Sophos;i="4.32,247,1217808000"; d="scan'208,217";a="18331253"
Received: from rtp-dkim-2.cisco.com ([64.102.121.159])
	by rtp-iport-2.cisco.com with ESMTP; 21 Aug 2008 19:28:57 +0000
Received: from rtp-core-2.cisco.com (rtp-core-2.cisco.com [64.102.124.13])
	by rtp-dkim-2.cisco.com (8.12.11/8.12.11) with ESMTP id m7LJSv4J012521; 
	Thu, 21 Aug 2008 15:28:57 -0400
Received: from xbh-rtp-211.amer.cisco.com (xbh-rtp-211.cisco.com
	[64.102.31.102])
	by rtp-core-2.cisco.com (8.13.8/8.13.8) with ESMTP id m7LJSvbI001666;
	Thu, 21 Aug 2008 19:28:57 GMT
Received: from xmb-rtp-213.amer.cisco.com ([64.102.31.112]) by
	xbh-rtp-211.amer.cisco.com with Microsoft SMTPSVC(6.0.3790.1830); 
	Thu, 21 Aug 2008 15:28:57 -0400
Received: from 10.61.97.215 ([10.61.97.215]) by xmb-rtp-213.amer.cisco.com
	([64.102.31.112]) with Microsoft Exchange Server HTTP-DAV ; 
	Thu, 21 Aug 2008 19:28:56 +0000
User-Agent: Microsoft-Entourage/12.12.0.080729
Date: Thu, 21 Aug 2008 21:28:54 +0200
From: JP Vasseur <jvasseur@cisco.com>
To: Mischa Dohler <mischa.dohler@cttc.es>,
	Tim Winter <tim.winter@ekasystems.com>,
	<thomas.watteyne@orange-ftgroup.com>,
	<christian.jacquenet@orange-ftgroup.com>,
	<giyyarpuram.madhusudan@orange-ftgroup.com>,
	<gabriel.chegaray@orange-ftgroup.com>,
	<Dominique.Barthel@orange-ftgroup.com>, <roll@ietf.org>
Message-ID: <C4D38E96.4FB46%jvasseur@cisco.com>
Thread-Topic: Review of draft-ietf-roll-urban-routing-reqs-01
Thread-Index: AckDxCXVl9keGlV0jkulakQaFFRIHQ==
Mime-version: 1.0
X-OriginalArrivalTime: 21 Aug 2008 19:28:57.0135 (UTC)
	FILETIME=[27B3FBF0:01C903C4]
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; l=42268; t=1219346937;
	x=1220210937; c=relaxed/simple; s=rtpdkim2001;
	h=Content-Type:From:Subject:Content-Transfer-Encoding:MIME-Version;
	d=cisco.com; i=jvasseur@cisco.com;
	z=From:=20JP=20Vasseur=20<jvasseur@cisco.com>
	|Subject:=20Review=20of=20draft-ietf-roll-urban-routing-req
	s-01 |Sender:=20
	|To:=20Mischa=20Dohler=20<mischa.dohler@cttc.es>,=0A=20=20=
	20=20=20=20=20=20Tim=20Winter=20<tim.winter@ekasystems.com>,
	=0A=20=20=20=20=20=20=20=20<thomas.watteyne@orange-ftgroup.c
	om>,=0A=20=20=20=20=20=20=20=20<christian.jacquenet@orange-f
	tgroup.com>,=0A=20=20=20=20=20=20=20=20<giyyarpuram.madhusud
	an@orange-ftgroup.com>,=0A=20=20=20=20=20=20=20=20<gabriel.c
	hegaray@orange-ftgroup.com>,=0A=20=20=20=20=20=20=20=20<Domi
	nique.Barthel@orange-ftgroup.com>,=20<roll@ietf.org>;
	bh=gd8z5KJaZnBvDCPTbA0jaB/l/CEHdKw6QuuBGrPNgps=;
	b=XiZDdtxjPn1Jm0vI3+pcftGYGnB4z4Gqv79FaeVIcGAWFKfEfp7YLO/rzM
	CVuAvXKACMfBYrhasNgjHqvlmA/eRNSRSTNgsSLo6eNpB2DJFj57bteisZIW
	lBtOqZ4jbC;
Authentication-Results: rtp-dkim-2; header.From=jvasseur@cisco.com; dkim=pass (
	sig from cisco.com/rtpdkim2001 verified; ); 
Cc: "David E. Culler" <culler@cs.berkeley.edu>
Subject: [Roll] Review of draft-ietf-roll-urban-routing-reqs-01
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/roll>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============0990667676=="
Sender: roll-bounces@ietf.org
Errors-To: roll-bounces@ietf.org

> This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

--===============0990667676==
Content-type: multipart/alternative;
	boundary="B_3302198935_43092083"

> This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

--B_3302198935_43092083
Content-type: text/plain;
	charset="ISO-8859-1"
Content-transfer-encoding: quoted-printable

Dear WG,

As discussed in Dublin, the plan is to try to Last Call all the
application-specific routing requirements document before end of September.
Thus, please provide your detailed comments as soon as possible.

Let me start my co-chair review with the Urban WSNs Routing Requirements,
since (with the exception of the Mobility issue) the document is fairly
stable. Comments are not by order of importance by in chronological order.

Abstract
#######
s/ for a wireless ROLL solution to be useful the protocol(s) ought to be
energy-efficient, scalable, and autonomous/ the routing solution ought to b=
e
energy-efficient, scalable and autonomous.

JP> You may want to use a different word than =B3Autonomous=B2. Do you refer to
the =B3self configuration=B2 property ?

Section 1
#######
* =B3Section 6 discusses the routing requirements for networks comprising
   such constrained devices in a U-LLN environment.  These requirements
   may be overlapping requirements derived from other application-
   specific requirements documents or as listed in
   [I-D.culler-rl2n-routing-reqs].=B2

JP> Please remove this reference (ID abandoned) and insert reference to
http://www.ietf.org/internet-drafts/draft-ietf-roll-home-routing-reqs-02.tx=
t
,=20
http://www.ietf.org/internet-drafts/draft-ietf-roll-indus-routing-reqs-01.t=
x
t and=20
http://www.ietf.org/internet-drafts/draft-martocci-roll-commercial-routing-=
r
eqs-00.txt.

* s/ Section 7 provides an overview of security considerations/ Section 7
provides an overview of routing security considerations

Section 2
########

* S/ ROLL: Routing over Low power and Lossy networks/ ROLL: Routing Over Lo=
w
power and Lossy networks

* Schedule:  An agreed execution, wake-up, transmission, reception,
         etc., time-table between two or more field devices.
The definition is a little bit too vague. If used in the generic sense, no
need to add it to the terminology section. Otherwise, it ought to be more
specific.

Section 3.1.1
###########
* S/ pre- planned location/ pre-planned location

* What you refer to as a repeater is in fact a router. What I would suggest
here is to reword this paragraph to indicate that some nodes are simple
routers whereas other nodes are routers and also perform sensing/actuating
task. Insert this paragraph after the Actuators and Sensors paragraphs.

* =B3Actuators may generally be mobile but are likely to be static in the
majority of near-future roll-outs=B2: seems a bit contradictory. Don=B9t you
want to simply say that in a near-future the majority will be static?

* =B3Similar to the access points, actuator nodes do not suffer from any
long-term resource constraints.=B2 what about battery-operated actuators ?

Section 3.1.4
###########
* =B3pollution data, such as polluting gases (SO2, NOx, CO, Ozone),
 heavy metals (e.g.  Mercury), pH, radioactivity, etc;=B2 =3D> please expand
acronym when first used.

* =B3These meters will be capable of
   advanced sensing functionalities such as measuring quality of
   service, providing granular interval data, or automating the
   detection of alarm conditions.=B2
You may want to more accurately define the term =B3quality of service=B2 since
as you know, we used that term of other purposes in IETF documents.

* In addition they may be capable of
   advanced interactive functionalities such as remote service
   disconnect or remote demand reset.=B2 =3D> in this case, they are also actin=
g
as actuators.

Section 3.2=20
#########

* s/ between one other/between each other

* =B3The network MUST be capable of supporting the organization of
   a large number of sensing nodes into regions containing on the order
   of 10^2 to 10^4 sensing nodes each.=B2
JP> Thanks to make this =B3MUST=B2 routing-specific and move it to the
requirements section.

Section 3.3
#########

* RFID: expand acronym (Radio Frequency IDentification) and add to the
terminology section

* s/battery-powered nodes/battery powered nodes
=B3Sensor nodes are capable of forwarding data.=B2 In other words, they can act
as routers. No need to repeat this here.

Section 3.4
#########

* =B32.  packet errors due to medium access control;=B2 JP> It is not really
=B3packet error=B2 here.

* Some available protocols may cause packets of neighbouring nodes to
collide and hence cause a link outage.=B2 JP> You may want to be more specifi=
c
=B3Some=B2 ?

* =B3if ISM bands are to be used.  For instance, if the 2.4GHz ISM band is
   used to facilitate communication between U-LLN nodes, then heavily
   loaded WLAN hot-spots become a detrimental performance factor
   jeopardizing the functioning of the U-LLN.=B2
JP> Please expand acronym when first used and add to the terminology sectio=
n
(ISM, WLAN, ...)

* Don=B9t you want to say a few words about the varying BER leading to
potentially even higher packet error loss ratio?

Section 4.1
#########

* =B3Pre-programmed MAC=B2: expand acronym

* =B3the autonomous organization=B2 =3D> self-organizing?

* =B3For example, nodes in urban sensor nodes SHOULD be able to:=B2 =3D> Several
of the requirements that follow are nor routing specific. You may either
want to change the SHOULD for a =B3should=B2 or just focus on the routing
aspects and move them to the routing requirements section.

* =B3o  Dynamically compute, select and possibly optimize the (multiple)
      path(s) that will be used by the participating devices to forward
      the traffic towards the actuators and/or the access point
      according to the service-specific and traffic-specific QoS,
      traffic engineering and security policies that will have to be
      enforced at the scale of a routing domain (that is, a set of
      networking devices administered by a globally unique entity), or a
      region of such domain (e.g. a metropolitan area composed of
      clusters of sensors).=B2
JP> You list important and stringent requirements here. Do you really need =
a
routing algorithms capable of computing a path on a per QoS/service
specific/... Basis ?

Section 4.2
#########

* =B3After the initialization phase and possibly some operational time,
   new nodes may be injected into the network as well as existing nodes
   removed from the network.  The former might be because a removed node
   is replaced or denser readings/actuations are needed or routing
   protocols report connectivity problems. =B3
JP> Just to avoid any mis-interpretation when referring to routing problem,
you mean that it may be desirable to inject to node because connectivity is
not sufficient (lack of enough redundant path, ...) and not because of a
routing issue per say.

* =B3Differentiation
   SHOULD be made between node disappearance, where the node disappears
   without prior notification, and user or node-initiated disassociation
   ("phased-out"), where the node has enough time to inform the network
   about its removal.=B2
JP> Again this is not a routing requirement. Unless you refer to the abilit=
y
for the routing protocol to advertise to the rest of the network that it
will be removed in order for the other node to re-compute their path and
avoid traffic disruption (e.g. Similarly to what we do with the ISIS
overload bit for example.) Is it what you mean ? If so, please clarify and
move the routing requirement (SHOULD in capital letter to the routing
requirement section).

* =B3The protocol(s) hence SHOULD support the pinpointing of problematic
routing areas=B2
JP> Could you clarify what you mean by =B3pinpointing=B2 since it could be
interpreted in many ways?

* The following section also requires some clarification =AD you wrote:
=B3Furthermore, to inform the
   access point(s) of the node's arrival and association with the
   network as well as freshly associated nodes about packet forwarding
   schedules, roles, etc, appropriate (link state) updating mechanisms
   SHOULD be supported.=B2
JP> Are you explicitly requiring a Link State routing protocol or a routing
protocol that provides information about link states or ... ?
Note that a requirement document should stay solution agnostic and stay
focus on the requirement. Is you requirement that any node needs to have
visibility on other node characteristics with no attempt of aggregation?

Section 4.3
#########

* =B3The protocol(s) hence MUST support a large number of highly
   directional unicast flows from the sensing nodes or sensing clusters
   towards the access point or highly directed multicast or anycast
   flows from the nodes towards multiple access points.=B2
JP> I think that what you mean is that the routing protocol MUST be
optimized for Multipoint-to-Point traffic patterns (from sensors/actuators
to Sink). As written, it is not clear whether you refer to it as a routing
requirement ?
This in fact what you wrote in section 6.5: =B3To this end, the routing
protocol(s) SHOULD support and utilize the fact of highly directed traffic
flow to facilitate scalability and parameter constrained routing.=B2

* s/ More generally, entire routing areas may be avoided at e.g. night but
heavily used during the day when nodes are scavenging from sunlight/ More
generally, entire routing areas may be avoided (e.g. at night) but heavily
used during the day when nodes are scavenging from sunlight.
JP> Doesn=B9t this translate to the requirement for time-based routing (some
form of policy routing) ?

Section 4.4
#########

=B3However, they are not very stringent where
   latencies SHOULD simply be sufficiently smaller than typical
   reporting intervals=B2
JP> This is certainly true but not a routing requirement but a data plane
requirement unless you refer to the ability to support QoS aware routing
where each node may want to be able to compute different paths depending on
the traffic requirements?

* Move =B3U-LLN network devices SHOULD support unicast and multicast routing
capabilities=B2 to the routing requirement section. You may want to leave the
sentence here (without a SHOULD).

* You use the term =B3anycast=B2 that has been discussed in the past, in
particular in the context of the Home routing requirement document. I would
suggest to define this term in the document, refer to RFC4291 or RFC1546,
...

Section 4.5
#########

* =B3An alarm is likely being
   registered by a plurality of sensing nodes where the delivery of a
   single alert message with its location of origin suffices in most
   cases.=B2
Then you provide the example of toxic gas level. This is one example where
it might be desirable not to perform data aggregation/fusion and get
multiple copies of the same message from different source to perform
=B3triangulation=B2 and better localize the incident.

* =B3Routing within urban sensor networks SHOULD require the U-LLN nodes
   to dynamically compute, select and install different paths towards a
   same destination, depending on the nature of the traffic.  From this
   perspective, such nodes SHOULD inspect the contents of traffic
   payload for making routing and forwarding decisions:

JP> This clarifies my previous question; you do refer to ability to compute
different paths (with different characteristic). Note that the path
selection process performed by the sender and potentially routers along the
path is not strictly speaking a routing requirement.
Move this requirement to the requirement section.

* =B3for example, the analysis of the traffic payload SHOULD be derived into
aggregation
   capabilities for the sake of forwarding efficiency.=B2
JP> Can you clarify what you mean here?

* =B3Delays and latencies are
   important; however, again, deliveries within seconds SHOULD suffice
   in most of the cases.=B2
JP> Clearly not a routing requirement!

Section 5
########

* =B3The network SHOULD take into consideration that different application
   traffic may require different priorities when traversing the network,
   and that some traffic may be more sensitive to latency.=B2
JP> If by priorities you mean different routes with different
characteristics then this is fine and already covered. If you refer to
packet marking to provide different QoS in the data plane, this is not a
routing requirement.

* =B3An U-LLN SHOULD support occasional large scale traffic flows from
   sensing nodes to access points, such as system-wide alerts. =B3 and =B3A nod=
e
MUST be able to send its own alerts toward an access
   point while continuing to forward traffic on behalf of other devices
   who are also experiencing an alert condition.  The network MUST be
   able to manage this sudden large traffic flow.=B2
JP> Not routing requirements. Unless ... You require the ability to compute
multiple paths and use all of them (symmetrical or asymmetrical routing ???=
)
to spread out the traffic and limit network delays ?

* You make an interesting reference to Smart Grid and DR/DSM. That said, yo=
u
wrote =B3The network SHOULD support internetworking, while giving attention t=
o
security implications of interfacing, for example, a home network with a
utility U-LLN.=B2
JP> Don=B9t you mean that the routing protocol must be able to potentially
interact via potential route redistribution with other routing protocol use=
d
in the Internet, should these two protocols not be identical ?
=20

Section 6
#########

* S/Current urban roll-outs are composed of sometimes more than a hundred
nodes/ Current urban roll-outs are composed of sometimes more than one
hundred nodes

* =B3 The routing protocols(s) SHOULD support the organization of a large
number of nodes into regions of to-be-specified size.=B2
JP> It will be difficult (or too easy ;-)) to be compliant with that SHOULD
with a to-be-specified size. Or did you mean =B3configurable=B2 ?

* =B3To this end, the routing protocol(s) MUST support parameter
   constrained routing, where examples of such parameters (CPU, memory
   size, battery level, etc.) have been given in the previous paragraph.=B2
JP> Please use the term =B3node constrained based routing=B2

* =B3For the latter, the protocol(s) MUST support multi- and
   any-cast addressing.  The protocol(s) SHOULD also support the
   formation and identification of groups of field devices in the
   network.=B2
JP> You may want to more accurately define the term =B3anycast=B2

* =B3 To mandate fully interoperable implementations, the routing
   protocol(s) proposed in U-LLN MUST support different devices and
   underlying technologies without compromising the operability and
   energy efficiency of the network.=B2
JP> This requires clarification here. Do you mean that the routing protocol
MUST support node constrained based routing? If so, it is already stated
above. The support of different L1/L2 is a given (route over).

* Section 6.8, as written, is not related to routing but data plane. Let me
be more specific:

* =B3To this end, the routing protocol(s) SHOULD support minimum latency
   for alert reporting and time-critical data queries.=B2
JP> The support of minimum latency path (data plane !) or the support for
different metric path (control plane) ?

* =B3For regular data
   reporting, it SHOULD support latencies not exceeding a fraction of
   the smallest reporting interval.  =B3
JP> Not a routing requirement. Even if you are referring to a bound on the
total path metric (the metric reflecting the delay in this case), this is a=
n
implementation issue.

* =B3Due to the different latency requirements, the routing protocol(s) SHOUL=
D
support the ability of dealing with different latency requirements.  The
routing protocol(s) SHOULD also support the ability to route according to
different metrics (one of which could e.g. be latency).=B2
JP> yes these are routing requirements although I would suggest to remove
the first sentence, the requirement being captured in the second sentence.

Section 7
#########

* =B3As every network, U-LLNs are exposed to security threats that MUST be
addressed.=B2
JP> You cannot put a MUST here unless you list the routing security threats=
.

* s/ potential security threats/ potential routing security threats =3D> JP>
Please use the term =B3routing security=B2 in place of =B3security=B2 throughout th=
e
section.=20

* =B3U-LLN networks SHOULD support mechanisms to preserve the
   confidentiality of the traffic that they forward.  The U-LLN network
   SHOULD NOT prevent an application from employing additional
   confidentiality mechanisms.=B2
JP> I do agree with the requirement but this is not a routing requirement.
Could you focus on the routing security issues ? Or are you referring to th=
e
routing traffic confidentiality ? This is what you do right after:
=B3 The U-LLN MUST be protected against attempts to inject false or
   modified packets.  For example, an attacker SHOULD be prevented from
   manipulating or disabling the routing function by compromising
   routing update messages.  Moreover, it SHOULD NOT be possible to
   coerce the network into routing packets which have been modified in
   transit.  To this end the routing protocol(s) MUST support message
   integrity.=B2
JP> I do not see any reference to the type of routing attacks that could be
performed on such networks because of the typical P2MP traffic pattern,
extensive use of wireless links, ...
JP> What I would suggest is to re-focus on the routing security issues with
the Security expert that will get appointed.

Reference section
###############

The current reference section reads:
11.2.  Informative References

   [I-D.brandt-roll-home-routing-reqs]
              Brandt, A., "Home Automation Routing Requirement in Low
              Power and Lossy Networks",
              draft-brandt-roll-home-routing-reqs-01 (work in progress),
              May 2008.

JP> Please update to draft-ietf-roll-home-routing-reqs and add the referenc=
e
to draft-ietf-roll-indus-routing-reqs

   [I-D.culler-rl2n-routing-reqs]
              Vasseur, J. and D. Cullerot, "Routing Requirements for Low
              Power And Lossy Networks",
              draft-culler-rl2n-routing-reqs-01 (work in progress),
              July 2007.

JP> This one can be removed.


Last comment: please check that you expand acronyms when first used.

Thanks.

JP.

--B_3302198935_43092083
Content-type: text/html;
	charset="ISO-8859-1"
Content-transfer-encoding: quoted-printable

<HTML>
<HEAD>
<TITLE>Review of draft-ietf-roll-urban-routing-reqs-01</TITLE>
</HEAD>
<BODY>
<FONT SIZE=3D"2"><FONT FACE=3D"Calibri, Verdana, Helvetica, Arial"><SPAN STYLE=3D=
'font-size:12pt'>Dear WG,<BR>
<BR>
As discussed in Dublin, the plan is to try to Last Call all the application=
-specific routing requirements document before end of September. <BR>
<B>Thus, please provide your detailed comments as soon as possible.<BR>
</B><BR>
Let me start my co-chair review with the Urban WSNs Routing Requirements, s=
ince (with the exception of the Mobility issue) the document is fairly stabl=
e. Comments are not by order of importance by in chronological order. <BR>
<BR>
Abstract<BR>
#######<BR>
s/ for a wireless ROLL solution to be useful the protocol(s) ought to be en=
ergy-efficient, scalable, and autonomous/ the routing solution ought to be e=
nergy-efficient, scalable and autonomous.<BR>
<BR>
JP&gt; You may want to use a different word than &#8220;Autonomous&#8221;. =
Do you refer to the &#8220;self configuration&#8221; property ?<BR>
<BR>
Section 1<BR>
#######<BR>
* &#8220;Section 6 discusses the routing requirements for networks comprisi=
ng<BR>
&nbsp;&nbsp;&nbsp;such constrained devices in a U-LLN environment. &nbsp;Th=
ese requirements<BR>
&nbsp;&nbsp;&nbsp;may be overlapping requirements derived from other applic=
ation-<BR>
&nbsp;&nbsp;&nbsp;specific requirements documents or as listed in<BR>
&nbsp;&nbsp;&nbsp;[I-D.culler-rl2n-routing-reqs].&#8221;<BR>
<BR>
JP&gt; Please remove this reference (ID abandoned) and insert reference to =
<a href=3D"http://www.ietf.org/internet-drafts/draft-ietf-roll-home-routing-re=
qs-02.txt">http://www.ietf.org/internet-drafts/draft-ietf-roll-home-routing-=
reqs-02.txt</a>, <a href=3D"http://www.ietf.org/internet-drafts/draft-ietf-rol=
l-indus-routing-reqs-01.txt">http://www.ietf.org/internet-drafts/draft-ietf-=
roll-indus-routing-reqs-01.txt</a> and <a href=3D"http://www.ietf.org/internet=
-drafts/draft-martocci-roll-commercial-routing-reqs-00.txt">http://www.ietf.=
org/internet-drafts/draft-martocci-roll-commercial-routing-reqs-00.txt</a>.<=
BR>
<BR>
* s/ Section 7 provides an overview of security considerations/ Section 7 p=
rovides an overview of routing security considerations <BR>
<BR>
Section 2<BR>
########<BR>
<BR>
* S/ ROLL: Routing over Low power and Lossy networks/ ROLL: Routing Over Lo=
w power and Lossy networks<BR>
<BR>
* Schedule: &nbsp;An agreed execution, wake-up, transmission, reception,<BR=
>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;etc., time-table betw=
een two or more field devices.<BR>
The definition is a little bit too vague. If used in the generic sense, no =
need to add it to the terminology section. Otherwise, it ought to be more sp=
ecific.<BR>
<BR>
Section 3.1.1<BR>
###########<BR>
* S/ pre- planned location/ pre-planned location<BR>
<BR>
* What you refer to as a repeater is in fact a router. What I would suggest=
 here is to reword this paragraph to indicate that some nodes are simple rou=
ters whereas other nodes are routers and also perform sensing/actuating task=
. Insert this paragraph after the Actuators and Sensors paragraphs.<BR>
<BR>
* &#8220;Actuators may generally be mobile but are likely to be static in t=
he majority of near-future roll-outs&#8221;: seems a bit contradictory. Don&=
#8217;t you want to simply say that in a near-future the majority will be st=
atic?<BR>
<BR>
* &#8220;Similar to the access points, actuator nodes do not suffer from an=
y long-term resource constraints.&#8221; what about battery-operated actuato=
rs ?<BR>
<BR>
Section 3.1.4<BR>
###########<BR>
* &#8220;pollution data, such as polluting gases (SO2, NOx, CO, Ozone),<BR>
&nbsp;heavy metals (e.g. &nbsp;Mercury), pH, radioactivity, etc;&#8221; =3D&g=
t; please expand acronym when first used.<BR>
<BR>
* &#8220;These meters will be capable of<BR>
&nbsp;&nbsp;&nbsp;advanced sensing functionalities such as measuring qualit=
y of<BR>
&nbsp;&nbsp;&nbsp;service, providing granular interval data, or automating =
the<BR>
&nbsp;&nbsp;&nbsp;detection of alarm conditions.&#8221;<BR>
You may want to more accurately define the term &#8220;quality of service&#=
8221; since as you know, we used that term of other purposes in IETF documen=
ts.<BR>
<BR>
* In addition they may be capable of<BR>
&nbsp;&nbsp;&nbsp;advanced interactive functionalities such as remote servi=
ce<BR>
&nbsp;&nbsp;&nbsp;disconnect or remote demand reset.&#8221; =3D&gt; in this c=
ase, they are also acting as actuators.<BR>
<BR>
Section 3.2 <BR>
#########<BR>
<BR>
* s/ between one other/between each other<BR>
<BR>
* &#8220;The network MUST be capable of supporting the organization of<BR>
&nbsp;&nbsp;&nbsp;a large number of sensing nodes into regions containing o=
n the order<BR>
&nbsp;&nbsp;&nbsp;of 10^2 to 10^4 sensing nodes each.&#8221;<BR>
JP&gt; Thanks to make this &#8220;MUST&#8221; routing-specific and move it =
to the requirements section.<BR>
<BR>
Section 3.3<BR>
#########<BR>
<BR>
* RFID: expand acronym (Radio Frequency IDentification) and add to the term=
inology section<BR>
<BR>
* s/battery-powered nodes/battery powered nodes<BR>
&#8220;Sensor nodes are capable of forwarding data.&#8221; In other words, =
they can act as routers. No need to repeat this here.<BR>
<BR>
Section 3.4<BR>
#########<BR>
<BR>
* &#8220;2. &nbsp;packet errors due to medium access control;&#8221; JP&gt;=
 It is not really &#8220;packet error&#8221; here.<BR>
<BR>
* Some available protocols may cause packets of neighbouring nodes to colli=
de and hence cause a link outage.&#8221; JP&gt; You may want to be more spec=
ific &#8220;Some&#8221; ?<BR>
<BR>
* &#8220;if ISM bands are to be used. &nbsp;For instance, if the 2.4GHz ISM=
 band is<BR>
&nbsp;&nbsp;&nbsp;used to facilitate communication between U-LLN nodes, the=
n heavily<BR>
&nbsp;&nbsp;&nbsp;loaded WLAN hot-spots become a detrimental performance fa=
ctor<BR>
&nbsp;&nbsp;&nbsp;jeopardizing the functioning of the U-LLN.&#8221;<BR>
JP&gt; Please expand acronym when first used and add to the terminology sec=
tion (ISM, WLAN, ...)<BR>
<BR>
* Don&#8217;t you want to say a few words about the varying BER leading to =
potentially even higher packet error loss ratio?<BR>
<BR>
Section 4.1<BR>
#########<BR>
<BR>
* &#8220;Pre-programmed MAC&#8221;: expand acronym<BR>
<BR>
* &#8220;the autonomous organization&#8221; =3D&gt; self-organizing?<BR>
<BR>
* &#8220;For example, nodes in urban sensor nodes SHOULD be able to:&#8221;=
 =3D&gt; Several of the requirements that follow are nor routing specific. You=
 may either want to change the SHOULD for a &#8220;should&#8221; or just foc=
us on the routing aspects and move them to the routing requirements section.=
<BR>
<BR>
* &#8220;o &nbsp;Dynamically compute, select and possibly optimize the (mul=
tiple)<BR>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;path(s) that will be used by the partic=
ipating devices to forward<BR>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;the traffic towards the actuators and/o=
r the access point<BR>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;according to the service-specific and t=
raffic-specific QoS,<BR>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;traffic engineering and security polici=
es that will have to be<BR>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;enforced at the scale of a routing doma=
in (that is, a set of<BR>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;networking devices administered by a gl=
obally unique entity), or a<BR>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;region of such domain (e.g. a metropoli=
tan area composed of<BR>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;clusters of sensors).&#8221;<BR>
JP&gt; You list important and stringent requirements here. Do you really ne=
ed a routing algorithms capable of computing a path on a per QoS/service spe=
cific/... Basis ?<BR>
<BR>
Section 4.2<BR>
#########<BR>
<BR>
* &#8220;After the initialization phase and possibly some operational time,=
<BR>
&nbsp;&nbsp;&nbsp;new nodes may be injected into the network as well as exi=
sting nodes<BR>
&nbsp;&nbsp;&nbsp;removed from the network. &nbsp;The former might be becau=
se a removed node<BR>
&nbsp;&nbsp;&nbsp;is replaced or denser readings/actuations are needed or r=
outing<BR>
&nbsp;&nbsp;&nbsp;protocols report connectivity problems. &#8220;<BR>
JP&gt; Just to avoid any mis-interpretation when referring to routing probl=
em, you mean that it may be desirable to inject to node because connectivity=
 is not sufficient (lack of enough redundant path, ...) and not because of a=
 routing issue per say.<BR>
<BR>
* &#8220;Differentiation<BR>
&nbsp;&nbsp;&nbsp;SHOULD be made between node disappearance, where the node=
 disappears<BR>
&nbsp;&nbsp;&nbsp;without prior notification, and user or node-initiated di=
sassociation<BR>
&nbsp;&nbsp;&nbsp;(&quot;phased-out&quot;), where the node has enough time =
to inform the network<BR>
&nbsp;&nbsp;&nbsp;about its removal.&#8221;<BR>
JP&gt; Again this is not a routing requirement. Unless you refer to the abi=
lity for the routing protocol to advertise to the rest of the network that i=
t will be removed in order for the other node to re-compute their path and a=
void traffic disruption (e.g. Similarly to what we do with the ISIS overload=
 bit for example.) Is it what you mean ? If so, please clarify and move the =
routing requirement (SHOULD in capital letter to the routing requirement sec=
tion).<BR>
<BR>
* &#8220;The protocol(s) hence SHOULD support the pinpointing of problemati=
c routing areas&#8221;<BR>
JP&gt; Could you clarify what you mean by &#8220;pinpointing&#8221; since i=
t could be interpreted in many ways? &nbsp;<BR>
<BR>
* The following section also requires some clarification &#8211; you wrote:=
<BR>
&#8220;Furthermore, to inform the<BR>
&nbsp;&nbsp;&nbsp;access point(s) of the node's arrival and association wit=
h the<BR>
&nbsp;&nbsp;&nbsp;network as well as freshly associated nodes about packet =
forwarding<BR>
&nbsp;&nbsp;&nbsp;schedules, roles, etc, appropriate (link state) updating =
mechanisms<BR>
&nbsp;&nbsp;&nbsp;SHOULD be supported.&#8221;<BR>
JP&gt; Are you explicitly requiring a Link State routing protocol or a rout=
ing protocol that provides information about link states or ... ?<BR>
Note that a requirement document should stay solution agnostic and stay foc=
us on the requirement. Is you requirement that any node needs to have visibi=
lity on other node characteristics with no attempt of aggregation?<BR>
<BR>
Section 4.3<BR>
#########<BR>
<BR>
* &#8220;The protocol(s) hence MUST support a large number of highly<BR>
&nbsp;&nbsp;&nbsp;directional unicast flows from the sensing nodes or sensi=
ng clusters<BR>
&nbsp;&nbsp;&nbsp;towards the access point or highly directed multicast or =
anycast<BR>
&nbsp;&nbsp;&nbsp;flows from the nodes towards multiple access points.&#822=
1;<BR>
JP&gt; I think that what you mean is that the routing protocol MUST be opti=
mized for Multipoint-to-Point traffic patterns (from sensors/actuators to Si=
nk). As written, it is not clear whether you refer to it as a routing requir=
ement ?<BR>
This in fact what you wrote in section 6.5: &#8220;To this end, the routing=
 protocol(s) SHOULD support and utilize the fact of highly directed traffic =
flow to facilitate scalability and parameter constrained routing.&#8221;<BR>
<BR>
* s/ More generally, entire routing areas may be avoided at e.g. night but =
heavily used during the day when nodes are scavenging from sunlight/ More ge=
nerally, entire routing areas may be avoided (e.g. at night) but heavily use=
d during the day when nodes are scavenging from sunlight.<BR>
JP&gt; Doesn&#8217;t this translate to the requirement for time-based routi=
ng (some form of policy routing) ?<BR>
<BR>
Section 4.4<BR>
#########<BR>
<BR>
&#8220;However, they are not very stringent where<BR>
&nbsp;&nbsp;&nbsp;latencies SHOULD simply be sufficiently smaller than typi=
cal<BR>
&nbsp;&nbsp;&nbsp;reporting intervals&#8221;<BR>
JP&gt; This is certainly true but not a routing requirement but a data plan=
e requirement unless you refer to the ability to support QoS aware routing w=
here each node may want to be able to compute different paths depending on t=
he traffic requirements?<BR>
<BR>
* Move &#8220;U-LLN network devices SHOULD support unicast and multicast ro=
uting capabilities&#8221; to the routing requirement section. You may want t=
o leave the sentence here (without a SHOULD).<BR>
<BR>
* You use the term &#8220;anycast&#8221; that has been discussed in the pas=
t, in particular in the context of the Home routing requirement document. I =
would suggest to define this term in the document, refer to RFC4291 or RFC15=
46, ...<BR>
<BR>
Section 4.5<BR>
#########<BR>
<BR>
* &#8220;An alarm is likely being<BR>
&nbsp;&nbsp;&nbsp;registered by a plurality of sensing nodes where the deli=
very of a<BR>
&nbsp;&nbsp;&nbsp;single alert message with its location of origin suffices=
 in most<BR>
&nbsp;&nbsp;&nbsp;cases.&#8221;<BR>
Then you provide the example of toxic gas level. This is one example where =
it might be desirable not to perform data aggregation/fusion and get multipl=
e copies of the same message from different source to perform &#8220;triangu=
lation&#8221; and better localize the incident.<BR>
<BR>
* &#8220;Routing within urban sensor networks SHOULD require the U-LLN node=
s<BR>
&nbsp;&nbsp;&nbsp;to dynamically compute, select and install different path=
s towards a<BR>
&nbsp;&nbsp;&nbsp;same destination, depending on the nature of the traffic.=
 &nbsp;From this<BR>
&nbsp;&nbsp;&nbsp;perspective, such nodes SHOULD inspect the contents of tr=
affic<BR>
&nbsp;&nbsp;&nbsp;payload for making routing and forwarding decisions: <BR>
<BR>
JP&gt; This clarifies my previous question; you do refer to ability to comp=
ute different paths (with different characteristic). Note that the path sele=
ction process performed by the sender and potentially routers along the path=
 is not strictly speaking a routing requirement.<BR>
Move this requirement to the requirement section. <BR>
<BR>
* &#8220;for example, the analysis of the traffic payload SHOULD be derived=
 into aggregation<BR>
&nbsp;&nbsp;&nbsp;capabilities for the sake of forwarding efficiency.&#8221=
;<BR>
JP&gt; Can you clarify what you mean here?<BR>
<BR>
* &#8220;Delays and latencies are<BR>
&nbsp;&nbsp;&nbsp;important; however, again, deliveries within seconds SHOU=
LD suffice<BR>
&nbsp;&nbsp;&nbsp;in most of the cases.&#8221;<BR>
JP&gt; Clearly not a routing requirement!<BR>
<BR>
Section 5<BR>
########<BR>
<BR>
* &#8220;The network SHOULD take into consideration that different applicat=
ion<BR>
&nbsp;&nbsp;&nbsp;traffic may require different priorities when traversing =
the network,<BR>
&nbsp;&nbsp;&nbsp;and that some traffic may be more sensitive to latency.&#=
8221;<BR>
JP&gt; If by priorities you mean different routes with different characteri=
stics then this is fine and already covered. If you refer to packet marking =
to provide different QoS in the data plane, this is not a routing requiremen=
t.<BR>
<BR>
* &#8220;An U-LLN SHOULD support occasional large scale traffic flows from<=
BR>
&nbsp;&nbsp;&nbsp;sensing nodes to access points, such as system-wide alert=
s. &#8220; and &#8220;A node MUST be able to send its own alerts toward an a=
ccess<BR>
&nbsp;&nbsp;&nbsp;point while continuing to forward traffic on behalf of ot=
her devices<BR>
&nbsp;&nbsp;&nbsp;who are also experiencing an alert condition. &nbsp;The n=
etwork MUST be<BR>
&nbsp;&nbsp;&nbsp;able to manage this sudden large traffic flow.&#8221;<BR>
JP&gt; Not routing requirements. Unless ... You require the ability to comp=
ute multiple paths and use all of them (symmetrical or asymmetrical routing =
???) to spread out the traffic and limit network delays ?<BR>
<BR>
* You make an interesting reference to Smart Grid and DR/DSM. That said, yo=
u wrote &#8220;The network SHOULD support internetworking, while giving atte=
ntion to security implications of interfacing, for example, a home network w=
ith a utility U-LLN.&#8221;<BR>
JP&gt; Don&#8217;t you mean that the routing protocol must be able to poten=
tially interact via potential route redistribution with other routing protoc=
ol used in the Internet, should these two protocols not be identical ?<BR>
&nbsp;<BR>
<BR>
Section 6<BR>
#########<BR>
<BR>
* S/Current urban roll-outs are composed of sometimes more than a hundred n=
odes/ Current urban roll-outs are composed of sometimes more than one hundre=
d nodes<BR>
<BR>
* &#8220; The routing protocols(s) SHOULD support the organization of a lar=
ge number of nodes into regions of to-be-specified size.&#8221;<BR>
JP&gt; It will be difficult (or too easy ;-)) to be compliant with that SHO=
ULD with a to-be-specified size. Or did you mean &#8220;configurable&#8221; =
?<BR>
<BR>
* &#8220;To this end, the routing protocol(s) MUST support parameter<BR>
&nbsp;&nbsp;&nbsp;constrained routing, where examples of such parameters (C=
PU, memory<BR>
&nbsp;&nbsp;&nbsp;size, battery level, etc.) have been given in the previou=
s paragraph.&#8221;<BR>
JP&gt; Please use the term &#8220;node constrained based routing&#8221;<BR>
<BR>
* &#8220;For the latter, the protocol(s) MUST support multi- and<BR>
&nbsp;&nbsp;&nbsp;any-cast addressing. &nbsp;The protocol(s) SHOULD also su=
pport the<BR>
&nbsp;&nbsp;&nbsp;formation and identification of groups of field devices i=
n the<BR>
&nbsp;&nbsp;&nbsp;network.&#8221;<BR>
JP&gt; You may want to more accurately define the term &#8220;anycast&#8221=
;<BR>
<BR>
* &#8220; To mandate fully interoperable implementations, the routing<BR>
&nbsp;&nbsp;&nbsp;protocol(s) proposed in U-LLN MUST support different devi=
ces and<BR>
&nbsp;&nbsp;&nbsp;underlying technologies without compromising the operabil=
ity and<BR>
&nbsp;&nbsp;&nbsp;energy efficiency of the network.&#8221;<BR>
JP&gt; This requires clarification here. Do you mean that the routing proto=
col MUST support node constrained based routing? If so, it is already stated=
 above. The support of different L1/L2 is a given (route over).<BR>
<BR>
* Section 6.8, as written, is not related to routing but data plane. Let me=
 be more specific:<BR>
<BR>
* &#8220;To this end, the routing protocol(s) SHOULD support minimum latenc=
y<BR>
&nbsp;&nbsp;&nbsp;for alert reporting and time-critical data queries.&#8221=
;<BR>
JP&gt; The support of minimum latency path (data plane !) or the support fo=
r different metric path (control plane) ?<BR>
<BR>
* &#8220;For regular data<BR>
&nbsp;&nbsp;&nbsp;reporting, it SHOULD support latencies not exceeding a fr=
action of<BR>
&nbsp;&nbsp;&nbsp;the smallest reporting interval. &nbsp;&#8220;<BR>
JP&gt; Not a routing requirement. Even if you are referring to a bound on t=
he total path metric (the metric reflecting the delay in this case), this is=
 an implementation issue.<BR>
<BR>
* &#8220;Due to the different latency requirements, the routing protocol(s)=
 SHOULD support the ability of dealing with different latency requirements. =
&nbsp;The routing protocol(s) SHOULD also support the ability to route accor=
ding to different metrics (one of which could e.g. be latency).&#8221;<BR>
JP&gt; yes these are routing requirements although I would suggest to remov=
e the first sentence, the requirement being captured in the second sentence.=
<BR>
<BR>
Section 7<BR>
#########<BR>
<BR>
* &#8220;As every network, U-LLNs are exposed to security threats that MUST=
 be addressed.&#8221;<BR>
JP&gt; You cannot put a MUST here unless you list the routing security thre=
ats.<BR>
<BR>
* s/ potential security threats/ potential routing security threats =3D&gt; J=
P&gt; Please use the term &#8220;routing security&#8221; in place of &#8220;=
security&#8221; throughout the section. <BR>
<BR>
* &#8220;U-LLN networks SHOULD support mechanisms to preserve the<BR>
&nbsp;&nbsp;&nbsp;confidentiality of the traffic that they forward. &nbsp;T=
he U-LLN network<BR>
&nbsp;&nbsp;&nbsp;SHOULD NOT prevent an application from employing addition=
al<BR>
&nbsp;&nbsp;&nbsp;confidentiality mechanisms.&#8221;<BR>
JP&gt; I do agree with the requirement but this is not a routing requiremen=
t. Could you focus on the routing security issues ? Or are you referring to =
the routing traffic confidentiality ? This is what you do right after:<BR>
&#8220; The U-LLN MUST be protected against attempts to inject false or<BR>
&nbsp;&nbsp;&nbsp;modified packets. &nbsp;For example, an attacker SHOULD b=
e prevented from<BR>
&nbsp;&nbsp;&nbsp;manipulating or disabling the routing function by comprom=
ising<BR>
&nbsp;&nbsp;&nbsp;routing update messages. &nbsp;Moreover, it SHOULD NOT be=
 possible to<BR>
&nbsp;&nbsp;&nbsp;coerce the network into routing packets which have been m=
odified in<BR>
&nbsp;&nbsp;&nbsp;transit. &nbsp;To this end the routing protocol(s) MUST s=
upport message<BR>
&nbsp;&nbsp;&nbsp;integrity.&#8221;<BR>
JP&gt; I do not see any reference to the type of routing attacks that could=
 be performed on such networks because of the typical P2MP traffic pattern, =
extensive use of wireless links, ... <BR>
JP&gt; What I would suggest is to re-focus on the routing security issues w=
ith the Security expert that will get appointed.<BR>
<BR>
Reference section<BR>
###############<BR>
<BR>
The current reference section reads:<BR>
11.2. &nbsp;Informative References<BR>
<BR>
&nbsp;&nbsp;&nbsp;[I-D.brandt-roll-home-routing-reqs]<BR>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;Brandt, A., &quot;Home Automation Routing Requirement in Low<BR>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;Power and Lossy Networks&quot;,<BR>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;draft-brandt-roll-home-routing-reqs-01 (work in progress),<BR>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;May 2008.<BR>
<BR>
JP&gt; Please update to draft-ietf-roll-home-routing-reqs and add the refer=
ence to draft-ietf-roll-indus-routing-reqs<BR>
<BR>
&nbsp;&nbsp;&nbsp;[I-D.culler-rl2n-routing-reqs]<BR>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;Vasseur, J. and D. Cullerot, &quot;Routing Requirements for Low<BR>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;Power And Lossy Networks&quot;,<BR>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;draft-culler-rl2n-routing-reqs-01 (work in progress),<BR>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;July 2007.<BR>
<BR>
JP&gt; This one can be removed.<BR>
<BR>
<BR>
Last comment: please check that you expand acronyms when first used.<BR>
<BR>
Thanks.<BR>
<BR>
JP.</SPAN></FONT></FONT>
</BODY>
</HTML>


--B_3302198935_43092083--


--===============0990667676==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Roll mailing list
Roll@ietf.org
https://www.ietf.org/mailman/listinfo/roll

--===============0990667676==--



From roll-bounces@ietf.org  Thu Aug 21 14:08:42 2008
Return-Path: <roll-bounces@ietf.org>
X-Original-To: roll-archive@ietf.org
Delivered-To: ietfarch-roll-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id E67A428C0EB;
	Thu, 21 Aug 2008 14:08:42 -0700 (PDT)
X-Original-To: roll@core3.amsl.com
Delivered-To: roll@core3.amsl.com
Received: from localhost (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 706E928C156
	for <roll@core3.amsl.com>; Thu, 21 Aug 2008 14:03:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.134
X-Spam-Level: 
X-Spam-Status: No, score=-3.134 tagged_above=-999 required=5 tests=[AWL=0.886, 
	BAYES_00=-2.599, GB_I_LETTER=-2, HELO_EQ_FR=0.35,
	HTML_MESSAGE=0.001, 
	SARE_SUB_OBFU_Q1=0.227, UNPARSEABLE_RELAY=0.001]
Received: from mail.ietf.org ([64.170.98.32])
	by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id Km5kAstnxquN for <roll@core3.amsl.com>;
	Thu, 21 Aug 2008 14:03:02 -0700 (PDT)
Received: from relais-inet.francetelecom.com (relais-ias91.francetelecom.com
	[193.251.215.91])
	by core3.amsl.com (Postfix) with ESMTP id D3E3C3A677E
	for <roll@ietf.org>; Thu, 21 Aug 2008 14:03:01 -0700 (PDT)
Received: from omfedm07.si.francetelecom.fr (unknown [xx.xx.xx.3])
	by omfedm12.si.francetelecom.fr (ESMTP service) with ESMTP id
	62E524817D; Thu, 21 Aug 2008 23:02:06 +0200 (CEST)
Received: from localhost (unknown [127.0.0.1])
	by omfedm07.si.francetelecom.fr (ESMTP service) with SMTP id 5CDFA68015;
	Thu, 21 Aug 2008 23:02:06 +0200 (CEST)
Received: from PMEXCC11.intranet-paris.francetelecom.fr (unknown
	[10.196.130.4])
	by omfedm07.si.francetelecom.fr (ESMTP service) with ESMTP id
	4C5F368015; Thu, 21 Aug 2008 23:01:57 +0200 (CEST)
Received: from PMEXCB30.intranet-paris.francetelecom.fr ([10.196.130.38]) by
	PMEXCC11.intranet-paris.francetelecom.fr with Microsoft
	SMTPSVC(6.0.3790.2499); Thu, 21 Aug 2008 23:01:56 +0200
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Date: Thu, 21 Aug 2008 23:01:59 +0200
Message-ID: <53DE7AEBE1DD5741A44C3634276819220344C1B3@PMEXCB30.intranet-paris.francetelecom.fr>
In-Reply-To: <C4D38E96.4FB46%jvasseur@cisco.com>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: Review of draft-ietf-roll-urban-routing-reqs-01
thread-index: AckDxCXVl9keGlV0jkulakQaFFRIHQAAdXyA
From: <christian.jacquenet@orange-ftgroup.com>
To: "JP Vasseur" <jvasseur@cisco.com>, "Mischa Dohler" <mischa.dohler@cttc.es>,
	"Tim Winter" <tim.winter@ekasystems.com>,
	"WATTEYNE Thomas RD-TECH" <thomas.watteyne@orange-ftgroup.com>,
	"MADHUSUDAN Giyyarpuram RD-TECH"
	<giyyarpuram.madhusudan@orange-ftgroup.com>, 
	"CHEGARAY Gabriel RD-TECH" <gabriel.chegaray@orange-ftgroup.com>,
	"BARTHEL Dominique RD-TECH" <dominique.barthel@orange-ftgroup.com>,
	<roll@ietf.org>
X-OriginalArrivalTime: 21 Aug 2008 21:01:56.0641 (UTC)
	FILETIME=[25590910:01C903D1]
Cc: "David E. Culler" <culler@cs.berkeley.edu>
Subject: Re: [Roll] Review of draft-ietf-roll-urban-routing-reqs-01
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/roll>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============0444533850=="
Sender: roll-bounces@ietf.org
Errors-To: roll-bounces@ietf.org

This is a multi-part message in MIME format.

--===============0444533850==
Content-class: urn:content-classes:message
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C903D1.24A82DD4"

This is a multi-part message in MIME format.

------_=_NextPart_001_01C903D1.24A82DD4
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable


Dear all,
=20
Thanks to Jean-Philippe for this thorough review=2E Please find a first
shot of personal comments inline, but I'll let my fellow co-authors
further elaborate accordingly=2E


	[CJ] [snip]=20
	Abstract
	#######
	s/ for a wireless ROLL solution to be useful the protocol(s)
ought to be energy-efficient, scalable, and autonomous/ the routing
solution ought to be energy-efficient, scalable and autonomous=2E
=09
	JP> You may want to use a different word than "Autonomous"=2E Do
you refer to the "self configuration" property ?
	[CJ] We chose "autonomous" because it was generic enough, while
I think "self configuration" is too restrictive: it's not only a matter
of configuration, it's also a matter of making (forwarding) decisions,
self-healing capabilities, etc=2E Another word I would suggest is
"self-organizing", if this is more specific=2E=20
=09
	Section 1
	#######
	* "Section 6 discusses the routing requirements for networks
comprising
	   such constrained devices in a U-LLN environment=2E  These
requirements
	   may be overlapping requirements derived from other
application-
	   specific requirements documents or as listed in
	   [I-D=2Eculler-rl2n-routing-reqs]=2E"
=09
	JP> Please remove this reference (ID abandoned) and insert
reference to
http://www=2Eietf=
=2Eorg/internet-drafts/draft-ietf-roll-home-routing-reqs-02
=2Etxt
<http://www=2Eietf=
=2Eorg/internet-drafts/draft-ietf-roll-home-routing-reqs-0
2=2Etxt> ,
http://www=2Eietf=
=2Eorg/internet-drafts/draft-ietf-roll-indus-routing-reqs-0
1=2Etxt
<http://www=2Eietf=
=2Eorg/internet-drafts/draft-ietf-roll-indus-routing-reqs-
01=2Etxt>  and
http://www=2Eietf=
=2Eorg/internet-drafts/draft-martocci-roll-commercial-routi
ng-reqs-00=2Etxt
<http://www=2Eietf=
=2Eorg/internet-drafts/draft-martocci-roll-commercial-rout
ing-reqs-00=2Etxt> =2E
	[CJ] OK=2E=20
=09
	* s/ Section 7 provides an overview of security considerations/
Section 7 provides an overview of routing security considerations=20
	[CJ] OK=2E=20
=09
	Section 2
	########
=09
	* S/ ROLL: Routing over Low power and Lossy networks/ ROLL:
Routing Over Low power and Lossy networks
	[CJ] OK=2E=20
=09
	* Schedule:  An agreed execution, wake-up, transmission,
reception,
	         etc=2E, time-table between two or more field devices=2E
	The definition is a little bit too vague=2E If used in the generic
sense, no need to add it to the terminology section=2E Otherwise, it ought
to be more specific=2E
	[CJ] Schedule is indeed very generic, but I think the sue of the
word makes perfect sense in the context of U-WSN networks=2E Being more
specific would mean elaborating on use cases where schedule information
is taken into account by field devices to perform some specific action=2E
If this proposal makes sense, I'm not sure the terminology section is
appropriate for such elaboration and would therefore suggest we (1) keep
the "schedule" definition in this section and (2) further elaborate on a
use case that illustrates the use of schedule information in section 5
of the draft=2E=20
=09
	Section 3=2E1=2E1
	###########
	* S/ pre- planned location/ pre-planned location
	[CJ] OK=2E=20
=09
	* What you refer to as a repeater is in fact a router=2E What I
would suggest here is to reword this paragraph to indicate that some
nodes are simple routers whereas other nodes are routers and lso perform
sensing/actuating task=2E Insert this paragraph after the Actuators and
Sensors paragraphs=2E
	[CJ] So you're suggesting to (1) remove section 3=2E1=2E2 (not
3=2E1=2E1, actually), and (2) indicate that some nodes are routers (not
"simple", btw :-), others also perform sensing/actuating tasks, right?
I'm fine with this suggestion, but I'd like to hear the feedback from my
colleagues=2E It's also worth mentioning that a "repeater" has a very
specific meaning in "classical" networking environments, remembering the
old days of FOIRL and the like=2E=2E=2Ethat may be another reason to avoid=
 the
use of this notion within the roll context=2E
=09
	* "Actuators may generally be mobile but are likely to be static
in the majority of near-future roll-outs": seems a bit contradictory=2E
Don't you want to simply say that in a near-future the majority will be
static?
	[CJ] Not quite, because actuators can be devices used by people
who move from one place to another to check how the sensor network is
doing=2E I think both cases are valid, and would therefore stick to the
current wording=2E=20
=09
	* "Similar to the access points, actuator nodes do not suffer
from any long-term resource constraints=2E" what about battery-operated
actuators ?
	[CJ] I'll leave that one to my colleagues :-)=20
=09
	Section 3=2E1=2E4
	###########
	* "pollution data, such as polluting gases (SO2, NOx, CO,
Ozone),
	 heavy metals (e=2Eg=2E  Mercury), pH, radioactivity, etc;" =3D>
please expand acronym when first used=2E
	[CJ] Hmmm=2E=2E=2EI don't see too many acronyms in that sentence,
actually=2E This is chemistry stuff, unless you're suggesting we provide
the "lettered" designation of these substances like carbon oxyde, etc=2E?
I wouldn't go that way=2E=2E=2E=20
=09
	* "These meters will be capable of
	   advanced sensing functionalities such as measuring quality of
	   service, providing granular interval data, or automating the
	   detection of alarm conditions=2E"
	You may want to more accurately define the term "quality of
service" since as you know, we used that term of other purposes in IETF
documents=2E
	[CJ] Agreed=2E Since this is a list of examples, I would suggest
something like "measuring the quality of the water provided to the
customers"=2E
=09
	* In addition they may be capable of
	   advanced interactive functionalities such as remote service
	   disconnect or remote demand reset=2E" =3D> in this case, they are
also acting as actuators=2E
	[CJ] Agreed=2E=20
=09
	Section 3=2E2=20
	#########
=09
	* s/ between one other/between each other
	[CJ] OK=2E=20
=09
	* "The network MUST be capable of supporting the organization of
	   a large number of sensing nodes into regions containing on
the order
	   of 10^2 to 10^4 sensing nodes each=2E"
	JP> Thanks to make this "MUST" routing-specific and move it to
the requirements section=2E
	[CJ] Agreed - would suggest this should be the introductory
sentence of section 6=2E1=2E=20
=09
	Section 3=2E3
	#########
=09
	* RFID: expand acronym (Radio Frequency IDentification) and add
to the terminology section
	[CJ] OK=2E=20
=09
	* s/battery-powered nodes/battery powered nodes
	[CJ] OK=2E=20
	"Sensor nodes are capable of forwarding data=2E" In other words,
they can act as routers=2E No need to repeat this here=2E
	[CJ] Fair enough=2E=20
=09
	Section 3=2E4
	#########
=09
	* "2=2E  packet errors due to medium access control;" JP> It is
not really "packet error" here=2E
	[CJ] Do you mean "transmission erros"? If so, I would agree with
you that this wording is better, but then I guess it should be used for
first three cases, right?=20
=09
	* Some available protocols may cause packets of neighbouring
nodes to collide and hence cause a link outage=2E" JP> You may want to be
more specific "Some" ?
	[CJ] Do you mean examples, because the previous sentence
mentions the L2 protocols this sentence refers to?
=09
	* "if ISM bands are to be used=2E  For instance, if the 2=2E4GHz ISM
band is
	   used to facilitate communication between U-LLN nodes, then
heavily
	   loaded WLAN hot-spots become a detrimental performance factor
	   jeopardizing the functioning of the U-LLN=2E"
	JP> Please expand acronym when first used and add to the
terminology section (ISM, WLAN, =2E=2E=2E)
	[CJ] OK=2E=20
=09
	* Don't you want to say a few words about the varying BER
leading to potentially even higher packet error loss ratio?
	[CJ] Expand the acronym ;-) I agree, bit error rate
considerations should deserve a couple of sentences in this section=2E=20
=09
	Section 4=2E1
	#########
=09
	* "Pre-programmed MAC": expand acronym
	[CJ] OK=2E=20
=09
	* "the autonomous organization" =3D> self-organizing?
	[CJ] Much better indeed=2E=20
=09
	* "For example, nodes in urban sensor nodes SHOULD be able to:"
=3D> Several of the requirements that follow are nor routing specific=2E=
 You
may either want to change the SHOULD for a "should" or just focus on the
routing aspects and move them to the routing requirements section=2E
	[CJ] They may not be routing specific, but I think they do
affect how routing policies are enforced=2E I woudl therefore suggest we
stick to the proposed wording=2E=20
=09
	* "o  Dynamically compute, select and possibly optimize the
(multiple)
	      path(s) that will be used by the participating devices to
forward
	      the traffic towards the actuators and/or the access point
	      according to the service-specific and traffic-specific
QoS,
	      traffic engineering and security policies that will have
to be
	      enforced at the scale of a routing domain (that is, a set
of
	      networking devices administered by a globally unique
entity), or a
	      region of such domain (e=2Eg=2E a metropolitan area composed
of
	      clusters of sensors)=2E"
	JP> You list important and stringent requirements here=2E Do you
really need a routing algorithms capable of computing a path on a per
QoS/service specific/=2E=2E=2E Basis ?
	[CJ] I don't read this sentence as you do=2E What I meant here is
that entities that operate urban sensor networks specify their own
policies (routing, te, security, QoS, etc=2E), which may be
service-specific=2E The requirement suggests that the devices involved in
the enforcement of such policies should behave accordingly, that is,
compute, select, establish and maintain paths whose characteristics
comply with these policies=2E But I agree this is a strong requirement,
but not stronger than, say, the self-organization requirement=2E
=09
	Section 4=2E2
	#########
=09
	* "After the initialization phase and possibly some operational
time,
	   new nodes may be injected into the network as well as
existing nodes
	   removed from the network=2E  The former might be because a
removed node
	   is replaced or denser readings/actuations are needed or
routing
	   protocols report connectivity problems=2E "
	JP> Just to avoid any mis-interpretation when referring to
routing problem, you mean that it may be desirable to inject to node
because connectivity is not sufficient (lack of enough redundant path,
=2E=2E=2E) and not because of a routing issue per say=2E
	[CJ] Not necessarily because connectivity is insufficient (new
services, network expansion, node maintenance, etc=2E), and not
necessarily because there is a routing issue, indeed=2E=20
=09
	* "Differentiation
	   SHOULD be made between node disappearance, where the node
disappears
	   without prior notification, and user or node-initiated
disassociation
	   ("phased-out"), where the node has enough time to inform the
network
	   about its removal=2E"
	JP> Again this is not a routing requirement=2E Unless you refer to
the ability for the routing protocol to advertise to the rest of the
network that it will be removed in order for the other node to
re-compute their path and avoid traffic disruption (e=2Eg=2E Similarly to
what we do with the ISIS overload bit for example=2E) Is it what you mean
?=20
	[CJ] This is indeed what we meant (at least that's my reading of
this sentence, but I'll let my colleagues further comment on that)=2E If
so, please clarify and move the routing requirement (SHOULD in capital
letter to the routing requirement section)=2E
	[CJ] OK=2E=20
=09
	* "The protocol(s) hence SHOULD support the pinpointing of
problematic routing areas"
	JP> Could you clarify what you mean by "pinpointing" since it
could be interpreted in many ways?=20
	[CJ] Fair enough, we need to be more explicit=2E Maybe something
like: "the protocol should be able to convey information about
malfunctioning nodes which may affect or jeopardize the overall routing
efficiency, so that self-configuration capabilities of the sensor
network might be solicited to facilitate the appropriate
reconfiguration=2E"
=09
	* The following section also requires some clarification - you
wrote:
	"Furthermore, to inform the
	   access point(s) of the node's arrival and association with
the
	   network as well as freshly associated nodes about packet
forwarding
	   schedules, roles, etc, appropriate (link state) updating
mechanisms
	   SHOULD be supported=2E"
	JP> Are you explicitly requiring a Link State routing protocol
or a routing protocol that provides information about link states or =2E=2E=
=2E
?
	[CJ] We meant "a protocol that can provide information about
link status", indeed=2E=20
	Note that a requirement document should stay solution agnostic
and stay focus on the requirement=2E=20
	[CJ] Fully agreed=2E=20
	Is you requirement that any node needs to have visibility on
other node characteristics with no attempt of aggregation?
	[CJ] Well, yes, presumably depending on design considerations:
cluster head vs=2E clients within the cluster, for example=2E I think this
is typical Self Organizing Networking capability=2E
=09
	Section 4=2E3
	#########
=09
	* "The protocol(s) hence MUST support a large number of highly
	   directional unicast flows from the sensing nodes or sensing
clusters
	   towards the access point or highly directed multicast or
anycast
	   flows from the nodes towards multiple access points=2E"
	JP> I think that what you mean is that the routing protocol MUST
be optimized for Multipoint-to-Point traffic patterns (from
sensors/actuators to Sink)=2E As written, it is not clear whether you
refer to it as a routing requirement ?
	[CJ] Agreed=2E=20
	This in fact what you wrote in section 6=2E5: "To this end, the
routing protocol(s) SHOULD support and utilize the fact of highly
directed traffic flow to facilitate scalability and parameter
constrained routing=2E"
	[CJ] Correct=2E=20
=09
	* s/ More generally, entire routing areas may be avoided at e=2Eg=2E
night but heavily used during the day when nodes are scavenging from
sunlight/ More generally, entire routing areas may be avoided (e=2Eg=2E at
night) but heavily used during the day when nodes are scavenging from
sunlight=2E
	JP> Doesn't this translate to the requirement for time-based
routing (some form of policy routing) ?
	[CJ] Correct, but I don't see any harm in providing a practical
example=2E=20
=09
	Section 4=2E4
	#########
=09
	"However, they are not very stringent where
	   latencies SHOULD simply be sufficiently smaller than typical
	   reporting intervals"
	JP> This is certainly true but not a routing requirement but a
data plane requirement unless you refer to the ability to support QoS
aware routing where each node may want to be able to compute different
paths depending on the traffic requirements?
	[CJ] This is indeed related to the third bullet that appears in
section 4=2E1=2E=20
=09
	* Move "U-LLN network devices SHOULD support unicast and
multicast routing capabilities" to the routing requirement section=2E You
may want to leave the sentence here (without a SHOULD)=2E
	[CJ] OK=2E=20
=09
	* You use the term "anycast" that has been discussed in the
past, in particular in the context of the Home routing requirement
document=2E I would suggest to define this term in the document, refer to
RFC4291 or RFC1546, =2E=2E=2E
	[CJ] Fully agreed=2E=20
=09
	Section 4=2E5
	#########
=09
	* "An alarm is likely being
	   registered by a plurality of sensing nodes where the delivery
of a
	   single alert message with its location of origin suffices in
most
	   cases=2E"
	Then you provide the example of toxic gas level=2E This is one
example where it might be desirable not to perform data
aggregation/fusion and get multiple copies of the same message from
different source to perform "triangulation" and better localize the
incident=2E
	[CJ] Agreed, but I think this example precisely illustrates the
issue=2E=20
=09
	* "Routing within urban sensor networks SHOULD require the U-LLN
nodes
	   to dynamically compute, select and install different paths
towards a
	   same destination, depending on the nature of the traffic=2E
>From this
	   perspective, such nodes SHOULD inspect the contents of
traffic
	   payload for making routing and forwarding decisions:=20
=09
	JP> This clarifies my previous question; you do refer to ability
to compute different paths (with different characteristic)=2E Note that
the path selection process performed by the sender and potentially
routers along the path is not strictly speaking a routing requirement=2E
	Move this requirement to the requirement section=2E=20
	[CJ] OK=2E=20
=09
	* "for example, the analysis of the traffic payload SHOULD be
derived into aggregation
	   capabilities for the sake of forwarding efficiency=2E"
	JP> Can you clarify what you mean here?
	[CJ] The analysis of the payload of several packets should help
in making forwarding decisions that will spare network resources=2E
=09
	* "Delays and latencies are
	   important; however, again, deliveries within seconds SHOULD
suffice
	   in most of the cases=2E"
	JP> Clearly not a routing requirement!
	[CJ] Agreed=2E=20
=09
	Section 5
	########
=09
	* "The network SHOULD take into consideration that different
application
	   traffic may require different priorities when traversing the
network,
	   and that some traffic may be more sensitive to latency=2E"
	JP> If by priorities you mean different routes with different
characteristics then this is fine and already covered=2E If you refer to
packet marking to provide different QoS in the data plane, this is not a
routing requirement=2E
	[CJ] Agreed - the former is the correct interpretation=2E=20
=09
	* "An U-LLN SHOULD support occasional large scale traffic flows
from
	   sensing nodes to access points, such as system-wide alerts=2E "
and "A node MUST be able to send its own alerts toward an access
	   point while continuing to forward traffic on behalf of other
devices
	   who are also experiencing an alert condition=2E  The network
MUST be
	   able to manage this sudden large traffic flow=2E"
	JP> Not routing requirements=2E Unless =2E=2E=2E You require the ability
to compute multiple paths and use all of them (symmetrical or
asymmetrical routing ???) to spread out the traffic and limit network
delays ?
	[CJ] I think this is a kind of causality effect: the routing
protocol must be able to accommodate traffic bursts by dynamically
computing and selecting multiple paths towards the same destination=2E=20
=09
	* You make an interesting reference to Smart Grid and DR/DSM=2E
That said, you wrote "The network SHOULD support internetworking, while
giving attention to security implications of interfacing, for example, a
home network with a utility U-LLN=2E"
	JP> Don't you mean that the routing protocol must be able to
potentially interact via potential route redistribution with other
routing protocol used in the Internet, should these two protocols not be
identical ?
	[CJ] Correct=2E=20
	=20
=09
	Section 6
	#########
=09
	* S/Current urban roll-outs are composed of sometimes more than
a hundred nodes/ Current urban roll-outs are composed of sometimes more
than one hundred nodes
	[CJ] OK=2E=20
=09
	* " The routing protocols(s) SHOULD support the organization of
a large number of nodes into regions of to-be-specified size=2E"
	JP> It will be difficult (or too easy ;-)) to be compliant with
that SHOULD with a to-be-specified size=2E Or did you mean "configurable"
?
	[CJ] Configurable is indeed much better=2E=20
=09
	* "To this end, the routing protocol(s) MUST support parameter
	   constrained routing, where examples of such parameters (CPU,
memory
	   size, battery level, etc=2E) have been given in the previous
paragraph=2E"
	JP> Please use the term "node constrained based routing"
	[CJ] I'm not sure I agree here, because "node-constrained"
sounds more fuzzy to me=2E "environment-constrained"?=20
=09
	* "For the latter, the protocol(s) MUST support multi- and
	   any-cast addressing=2E  The protocol(s) SHOULD also support the
	   formation and identification of groups of field devices in
the
	   network=2E"
	JP> You may want to more accurately define the term "anycast"=20
	[CJ] Would the couple of references you righfully mentioned
earlier be sufficient?
=09
	* " To mandate fully interoperable implementations, the routing
	   protocol(s) proposed in U-LLN MUST support different devices
and
	   underlying technologies without compromising the operability
and
	   energy efficiency of the network=2E"
	JP> This requires clarification here=2E Do you mean that the
routing protocol MUST support node constrained based routing? If so, it
is already stated above=2E The support of different L1/L2 is a given
(route over)=2E
	[CJ] I would agree with Jean-Philippe, and suggest we remove
this wording=2E=2E=2Ebut I'll let the co-authors further comment=2E=20
=09
	* Section 6=2E8, as written, is not related to routing but data
plane=2E Let me be more specific:
=09
	* "To this end, the routing protocol(s) SHOULD support minimum
latency
	   for alert reporting and time-critical data queries=2E"
	JP> The support of minimum latency path (data plane !) or the
support for different metric path (control plane) ?
	[CJ] As written, I read it as the former interpretation and
would suggest we remove the text=2E=20
=09
	* "For regular data
	   reporting, it SHOULD support latencies not exceeding a
fraction of
	   the smallest reporting interval=2E  "
	JP> Not a routing requirement=2E Even if you are referring to a
bound on the total path metric (the metric reflecting the delay in this
case), this is an implementation issue=2E
	[CJ] Correct=2E=20
=09
	* "Due to the different latency requirements, the routing
protocol(s) SHOULD support the ability of dealing with different latency
requirements=2E  The routing protocol(s) SHOULD also support the ability
to route according to different metrics (one of which could e=2Eg=2E be
latency)=2E"
	JP> yes these are routing requirements although I would suggest
to remove the first sentence, the requirement being captured in the
second sentence=2E
	[CJ] Agreed=2E=20
=09
	Section 7
	#########
=09
	* "As every network, U-LLNs are exposed to security threats that
MUST be addressed=2E"
	JP> You cannot put a MUST here unless you list the routing
security threats=2E
	[CJ] OK=2E=20
=09
	* s/ potential security threats/ potential routing security
threats =3D> JP> Please use the term "routing security" in place of
"security" throughout the section=2E=20
	[CJ] OK=2E=20
=09
	* "U-LLN networks SHOULD support mechanisms to preserve the
	   confidentiality of the traffic that they forward=2E  The U-LLN
network
	   SHOULD NOT prevent an application from employing additional
	   confidentiality mechanisms=2E"
	JP> I do agree with the requirement but this is not a routing
requirement=2E=20
	[CJ] Fair enough=2E=20
	Could you focus on the routing security issues ? Or are you
referring to the routing traffic confidentiality ?
	[CJ] No, this wording referred to the traffic forwarded by the
network=2E =20
	This is what you do right after:
	[CJ] Correct=2E=20
	" The U-LLN MUST be protected against attempts to inject false
or
	   modified packets=2E  For example, an attacker SHOULD be
prevented from
	   manipulating or disabling the routing function by
compromising
	   routing update messages=2E  Moreover, it SHOULD NOT be possible
to
	   coerce the network into routing packets which have been
modified in
	   transit=2E  To this end the routing protocol(s) MUST support
message
	   integrity=2E"
	JP> I do not see any reference to the type of routing attacks
that could be performed on such networks because of the typical P2MP
traffic pattern, extensive use of wireless links, =2E=2E=2E=20
	[CJ] OK, but does that mean we should not consider such
requirement? I don't think so, afaic=2E=20
	JP> What I would suggest is to re-focus on the routing security
issues with the Security expert that will get appointed=2E
	[CJ] OK=2E=20
=09
	Reference section
	###############
=09
	The current reference section reads:
	11=2E2=2E  Informative References
=09
	   [I-D=2Ebrandt-roll-home-routing-reqs]
	              Brandt, A=2E, "Home Automation Routing Requirement
in Low
	              Power and Lossy Networks",
	              draft-brandt-roll-home-routing-reqs-01 (work in
progress),
	              May 2008=2E
=09
	JP> Please update to draft-ietf-roll-home-routing-reqs and add
the reference to draft-ietf-roll-indus-routing-reqs
	[CJ] OK=2E=20
=09
	   [I-D=2Eculler-rl2n-routing-reqs]
	              Vasseur, J=2E and D=2E Cullerot, "Routing Requirements
for Low
	              Power And Lossy Networks",
	              draft-culler-rl2n-routing-reqs-01 (work in
progress),
	              July 2007=2E
=09
	JP> This one can be removed=2E
	[CJ] OK=2E=20
=09
=09
	Last comment: please check that you expand acronyms when first
used=2E
	[CJ] OK=2E
	=20
	Cheers,
	=20
	Christian=2E=20
=09
=09



*********************************
This message and any attachments (the "message") are confidential and=
 intended solely for the addressees=2E=20
Any unauthorised use or dissemination is prohibited=2E
Messages are susceptible to alteration=2E=20
France Telecom Group shall not be liable for the message if altered,=
 changed or falsified=2E
If you are not the intended addressee of this message, please cancel it=
 immediately and inform the sender=2E
********************************
------_=_NextPart_001_01C903D1.24A82DD4
Content-Type: text/html;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4=2E0 Transitional//EN">
<HTML><HEAD><TITLE>Review of draft-ietf-roll-urban-routing-reqs-01</TITLE>
<META http-equiv=3DContent-Type content=3D"text/html; charset=3Dus-ascii">
<META content=3D"MSHTML 6=2E00=2E2900=2E3314" name=3DGENERATOR></HEAD>
<BODY>
<DIV dir=3Dltr align=3Dleft><SPAN class=3D461024219-21082008><FONT face=
=3D"Courier New"=20
color=3D#0000ff size=3D2>Dear all,</FONT></SPAN></DIV>
<DIV dir=3Dltr align=3Dleft><SPAN class=3D461024219-21082008><FONT face=
=3D"Courier New"=20
color=3D#0000ff size=3D2></FONT></SPAN>&nbsp;</DIV>
<DIV dir=3Dltr align=3Dleft><SPAN class=3D461024219-21082008><FONT face=
=3D"Courier New"=20
color=3D#0000ff size=3D2>Thanks to Jean-Philippe for this thorough review=
=2E Please=20
find a first shot of personal comments inline, but I'll let my fellow=
 co-authors=20
further elaborate accordingly=2E</FONT></SPAN></DIV><BR>
<BLOCKQUOTE style=3D"MARGIN-RIGHT: 0px">
  <DIV class=3DOutlookMessageHeader lang=3Dfr dir=3Dltr align=3Dleft><SPAN=
=20
  class=3D461024219-21082008><FONT face=3D"Courier New" color=3D#0000ff=20
  size=3D2>[CJ]&nbsp;[snip]&nbsp;</FONT></SPAN><FONT=20
  face=3D"Calibri, Verdana, Helvetica, Arial"><SPAN=20
  style=3D"FONT-SIZE: 12pt"><BR><FONT size=3D2>Abstract<BR>#######<BR>s/=
 for a=20
  wireless ROLL solution to be useful the protocol(s) ought to be=20
  energy-efficient, scalable, and autonomous/ the routing solution ought to=
 be=20
  energy-efficient, scalable and autonomous=2E<BR><BR>JP&gt; You may want=
 to use a=20
  different word than &#8220;Autonomous&#8221;=2E Do you refer to the=
 &#8220;self configuration&#8221;=20
  property ?<BR><SPAN class=3D461024219-21082008><FONT face=3D"Courier New"=
=20
  color=3D#0000ff>[CJ]&nbsp;We chose "autonomous" because it was generic=
 enough,=20
  while I think "self configuration" is too restrictive: it's not only a=
 matter=20
  of configuration, it's also a matter of making (forwarding) decisions,=20
  self-healing capabilities, etc=2E Another word I would suggest is=20
  "self-organizing", if this is more=20
  specific=2E&nbsp;</FONT></SPAN><BR><BR>Section 1<BR>#######<BR>*=
 &#8220;Section 6=20
  discusses the routing requirements for networks=20
  comprising<BR>&nbsp;&nbsp;&nbsp;such constrained devices in a U-LLN=20
  environment=2E &nbsp;These requirements<BR>&nbsp;&nbsp;&nbsp;may be=
 overlapping=20
  requirements derived from other=
 application-<BR>&nbsp;&nbsp;&nbsp;specific=20
  requirements documents or as listed=20
  in<BR>&nbsp;&nbsp;&nbsp;[I-D=2Eculler-rl2n-routing-reqs]=
=2E&#8221;<BR><BR>JP&gt; Please=20
  remove this reference (ID abandoned) and insert reference to </FONT><A=20
  href=3D"http://www=2Eietf=
=2Eorg/internet-drafts/draft-ietf-roll-home-routing-reqs-02=2Etxt"><FONT=20
  size=3D2>http://www=2Eietf=
=2Eorg/internet-drafts/draft-ietf-roll-home-routing-reqs-02=
=2Etxt</FONT></A><FONT=20
  size=3D2>, </FONT><A=20
  href=3D"http://www=2Eietf=
=2Eorg/internet-drafts/draft-ietf-roll-indus-routing-reqs-01=2Etxt"><FONT=20
  size=3D2>http://www=2Eietf=
=2Eorg/internet-drafts/draft-ietf-roll-indus-routing-reqs-01=
=2Etxt</FONT></A><FONT=20
  size=3D2> and </FONT><A=20
  href=3D"http://www=2Eietf=
=2Eorg/internet-drafts/draft-martocci-roll-commercial-routing-reqs-00=
=2Etxt"><FONT=20
  size=3D2>http://www=2Eietf=
=2Eorg/internet-drafts/draft-martocci-roll-commercial-routing-reqs-00=
=2Etxt</FONT></A><FONT=20
  size=3D2>=2E<BR><SPAN class=3D461024219-21082008><FONT face=3D"Courier=
 New"=20
  color=3D#0000ff>[CJ]&nbsp;OK=2E&nbsp;</FONT></SPAN><BR><BR>* s/ Section 7=
 provides=20
  an overview of security considerations/ Section 7 provides an overview of=
=20
  routing security considerations <BR><SPAN class=
=3D461024219-21082008><FONT=20
  face=3D"Courier New"=20
  color=3D#0000ff>[CJ]&nbsp;OK=2E&nbsp;</FONT></SPAN><BR><BR>Section=20
  2<BR>########<BR><BR>* S/ ROLL: Routing over Low power and Lossy=
 networks/=20
  ROLL: Routing Over Low power and Lossy networks<BR><SPAN=20
  class=3D461024219-21082008><FONT face=3D"Courier New"=20
  color=3D#0000ff>[CJ]&nbsp;OK=2E&nbsp;</FONT></SPAN><BR><BR>* Schedule:=
 &nbsp;An=20
  agreed execution, wake-up, transmission,=20
  reception,<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;etc=
=2E,=20
  time-table between two or more field devices=2E<BR>The definition is a=
 little=20
  bit too vague=2E If used in the generic sense, no need to add it to the=20
  terminology section=2E Otherwise, it ought to be more specific=
=2E<BR><SPAN=20
  class=3D461024219-21082008><FONT face=3D"Courier New"=20
  color=3D#0000ff>[CJ]&nbsp;Schedule is indeed&nbsp;very generic, but I=
 think the=20
  sue of the word makes perfect sense in the context of U-WSN networks=2E=
 Being=20
  more specific would mean elaborating on use cases where schedule=
 information=20
  is taken into account by field devices to perform some specific action=2E=
 If=20
  this proposal makes sense, I'm not sure the terminology section is=
 appropriate=20
  for such elaboration and would therefore suggest we (1) keep the=
 "schedule"=20
  definition in this section and (2) further elaborate on a use case that=20
  illustrates the use of schedule information in section 5 of the=20
  draft=2E&nbsp;</FONT></SPAN><BR><BR>Section 3=2E1=2E1<BR>###########<BR>*=
 S/ pre-=20
  planned location/ pre-planned location<BR><SPAN class=
=3D461024219-21082008><FONT=20
  face=3D"Courier New" color=3D#0000ff>[CJ]&nbsp;OK=
=2E&nbsp;</FONT></SPAN><BR><BR>*=20
  What you refer to as a repeater is in fact a router=2E What I would=
 suggest here=20
  is to reword this paragraph to indicate that some nodes are simple=
 routers=20
  whereas other nodes are routers and lso perform sensing/actuating task=2E=
 Insert=20
  this paragraph after the Actuators and Sensors paragraphs=2E<BR><SPAN=20
  class=3D461024219-21082008><FONT face=3D"Courier New" color=
=3D#0000ff>[CJ]&nbsp;So=20
  you're suggesting to (1) remove section 3=2E1=2E2 (not 3=2E1=2E1,=
 actually), and (2)=20
  indicate that some nodes are routers (not "simple", btw :-), others also=
=20
  perform sensing/actuating tasks, right? I'm fine with this suggestion,=
 but I'd=20
  like to hear the feedback from my colleagues=2E It's also worth=
 mentioning that=20
  a "repeater" has a very specific meaning in "classical" networking=20
  environments, remembering the old days of FOIRL and the like=2E=2E=2Ethat=
 may be=20
  another reason to avoid the use of this notion within the roll=20
  context=2E</FONT></SPAN><BR><BR>* &#8220;Actuators may generally be=
 mobile but are=20
  likely to be static in the majority of near-future roll-outs&#8221;:=
 seems a bit=20
  contradictory=2E Don&#8217;t you want to simply say that in a near-future=
 the majority=20
  will be static?<BR><SPAN class=3D461024219-21082008><FONT face=3D"Courier=
 New"=20
  color=3D#0000ff>[CJ]&nbsp;Not quite, because actuators can be=
 devices&nbsp;used=20
  by people who move from one place to another to check how the&nbsp;sensor=
=20
  network is&nbsp;doing=2E I think both cases are valid, and would=
 therefore stick=20
  to the current wording=2E&nbsp;</FONT></SPAN><BR><BR>* &#8220;Similar to=
 the access=20
  points, actuator nodes do not suffer from any long-term resource=
 constraints=2E&#8221;=20
  what about battery-operated actuators ?<BR><SPAN=20
  class=3D461024219-21082008><FONT face=3D"Courier New" color=
=3D#0000ff>[CJ]&nbsp;I'll=20
  leave that one to my colleagues :-)&nbsp;</FONT></SPAN><BR><BR>Section=20
  3=2E1=2E4<BR>###########<BR>* &#8220;pollution data, such as polluting=
 gases (SO2, NOx,=20
  CO, Ozone),<BR>&nbsp;heavy metals (e=2Eg=2E &nbsp;Mercury), pH,=
 radioactivity,=20
  etc;&#8221; =3D&gt; please expand acronym when first used=2E<BR><SPAN=20
  class=3D461024219-21082008><FONT face=3D"Courier New"=20
  color=3D#0000ff>[CJ]&nbsp;Hmmm=2E=2E=2EI don't see too many acronyms in=
 that sentence,=20
  actually=2E This is chemistry stuff, unless you're suggesting=
 we&nbsp;provide=20
  the&nbsp;"lettered" designation of these substances like carbon oxyde,=
 etc=2E? I=20
  wouldn't go that way=2E=2E=2E&nbsp;</FONT></SPAN><BR><BR>* &#8220;These=
 meters will be=20
  capable of<BR>&nbsp;&nbsp;&nbsp;advanced sensing functionalities such as=
=20
  measuring quality of<BR>&nbsp;&nbsp;&nbsp;service, providing granular=
 interval=20
  data, or automating the<BR>&nbsp;&nbsp;&nbsp;detection of alarm=20
  conditions=2E&#8221;<BR>You may want to more accurately define the term=
 &#8220;quality of=20
  service&#8221; since as you know, we used that term of other purposes in=
 IETF=20
  documents=2E<BR><SPAN class=3D461024219-21082008><FONT face=3D"Courier=
 New"=20
  color=3D#0000ff>[CJ]&nbsp;Agreed=2E Since this is a list of examples, I=
 would=20
  suggest something like "measuring the&nbsp;quality of the water provided=
 to=20
  the customers"=2E</FONT></SPAN><BR><BR>* In addition they may be capable=
=20
  of<BR>&nbsp;&nbsp;&nbsp;advanced interactive functionalities such as=
 remote=20
  service<BR>&nbsp;&nbsp;&nbsp;disconnect or remote demand reset=2E&#8221; =
=3D&gt; in this=20
  case, they are also acting as actuators=2E<BR><SPAN=20
  class=3D461024219-21082008><FONT face=3D"Courier New"=20
  color=3D#0000ff>[CJ]&nbsp;Agreed=2E&nbsp;</FONT></SPAN><BR><BR>Section 3=
=2E2=20
  <BR>#########<BR><BR>* s/ between one other/between each other<BR><SPAN=20
  class=3D461024219-21082008><FONT face=3D"Courier New"=20
  color=3D#0000ff>[CJ]&nbsp;OK=2E&nbsp;</FONT></SPAN><BR><BR>* &#8220;The=
 network MUST be=20
  capable of supporting the organization of<BR>&nbsp;&nbsp;&nbsp;a large=
 number=20
  of sensing nodes into regions containing on the=
 order<BR>&nbsp;&nbsp;&nbsp;of=20
  10^2 to 10^4 sensing nodes each=2E&#8221;<BR>JP&gt; Thanks to make this=
 &#8220;MUST&#8221;=20
  routing-specific and move it to the requirements section=2E<BR><SPAN=20
  class=3D461024219-21082008><FONT face=3D"Courier New"=20
  color=3D#0000ff>[CJ]&nbsp;Agreed - would suggest this should be the=
 introductory=20
  sentence of section 6=2E1=2E&nbsp;</FONT></SPAN><BR><BR>Section=20
  3=2E3<BR>#########<BR><BR>* RFID: expand acronym (Radio Frequency=20
  IDentification) and add to the terminology section<BR><SPAN=20
  class=3D461024219-21082008><FONT face=3D"Courier New"=20
  color=3D#0000ff>[CJ]&nbsp;OK=2E&nbsp;</FONT></SPAN><BR><BR>*=
 s/battery-powered=20
  nodes/battery powered nodes<BR><SPAN class=3D461024219-21082008><FONT=20
  face=3D"Courier New" color=3D#0000ff>[CJ]&nbsp;OK=
=2E&nbsp;</FONT></SPAN><BR>&#8220;Sensor=20
  nodes are capable of forwarding data=2E&#8221; In other words, they can=
 act as=20
  routers=2E No need to repeat this here=2E<BR><SPAN class=
=3D461024219-21082008><FONT=20
  face=3D"Courier New" color=3D#0000ff>[CJ]&nbsp;Fair=20
  enough=2E&nbsp;</FONT></SPAN><BR><BR>Section 3=2E4<BR>#########<BR><BR>*=
 &#8220;2=2E=20
  &nbsp;packet errors due to medium access control;&#8221; JP&gt; It is not=
 really=20
  &#8220;packet error&#8221; here=2E<BR><SPAN class=
=3D461024219-21082008><FONT=20
  face=3D"Courier New" color=3D#0000ff>[CJ]&nbsp;Do you mean "transmission=
 erros"?=20
  If so, I would agree with you that this wording is better, but then I=
 guess it=20
  should be used for first three cases, right?&nbsp;</FONT></SPAN><BR><BR>*=
 Some=20
  available protocols may cause packets of neighbouring nodes to collide=
 and=20
  hence cause a link outage=2E&#8221; JP&gt; You may want to be more=
 specific &#8220;Some&#8221;=20
  ?<BR><SPAN class=3D461024219-21082008><FONT face=3D"Courier New"=20
  color=3D#0000ff>[CJ]&nbsp;Do you mean examples, because the previous=
 sentence=20
  mentions the L2 protocols this sentence refers to?</FONT></SPAN><BR><BR>*=
 &#8220;if=20
  ISM bands are to be used=2E &nbsp;For instance, if the 2=2E4GHz ISM band=
=20
  is<BR>&nbsp;&nbsp;&nbsp;used to facilitate communication between U-LLN=
 nodes,=20
  then heavily<BR>&nbsp;&nbsp;&nbsp;loaded WLAN hot-spots become a=
 detrimental=20
  performance factor<BR>&nbsp;&nbsp;&nbsp;jeopardizing the functioning of=
 the=20
  U-LLN=2E&#8221;<BR>JP&gt; Please expand acronym when first used and add=
 to the=20
  terminology section (ISM, WLAN, =2E=2E=2E)<BR><SPAN class=
=3D461024219-21082008><FONT=20
  face=3D"Courier New" color=3D#0000ff>[CJ]&nbsp;OK=
=2E&nbsp;</FONT></SPAN><BR><BR>*=20
  Don&#8217;t you want to say a few words about the varying BER leading to=
 potentially=20
  even higher packet error loss ratio?<BR><SPAN class=
=3D461024219-21082008><FONT=20
  face=3D"Courier New" color=3D#0000ff>[CJ]&nbsp;Expand the acronym ;-) I=
 agree, bit=20
  error rate considerations should deserve a couple of sentences in this=20
  section=2E&nbsp;</FONT></SPAN><BR><BR>Section 4=2E1<BR>#########<BR><BR>*=
=20
  &#8220;Pre-programmed MAC&#8221;: expand acronym<BR><SPAN class=
=3D461024219-21082008><FONT=20
  face=3D"Courier New" color=3D#0000ff>[CJ]&nbsp;OK=
=2E&nbsp;</FONT></SPAN><BR><BR>*=20
  &#8220;the autonomous organization&#8221; =3D&gt;=
 self-organizing?<BR><SPAN=20
  class=3D461024219-21082008><FONT face=3D"Courier New" color=
=3D#0000ff>[CJ]&nbsp;Much=20
  better indeed=2E&nbsp;</FONT></SPAN><BR><BR>* &#8220;For example, nodes=
 in urban=20
  sensor nodes SHOULD be able to:&#8221; =3D&gt; Several of the=
 requirements that follow=20
  are nor routing specific=2E You may either want to change the SHOULD for=
 a=20
  &#8220;should&#8221; or just focus on the routing aspects and move them=
 to the routing=20
  requirements section=2E<BR><SPAN class=3D461024219-21082008><FONT=20
  face=3D"Courier New" color=3D#0000ff>[CJ]&nbsp;They may not be routing=
 specific,=20
  but I think they do affect how routing policies are enforced=2E I woudl=20
  therefore suggest we stick to the proposed=20
  wording=2E&nbsp;</FONT></SPAN><BR><BR>* &#8220;o &nbsp;Dynamically=
 compute, select and=20
  possibly optimize the=20
  (multiple)<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;path(s) that will be=
 used by=20
  the participating devices to=20
  forward<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;the traffic towards the=20
  actuators and/or the access=20
  point<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;according to the=
 service-specific=20
  and traffic-specific QoS,<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;traffic=
=20
  engineering and security policies that will have to=20
  be<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;enforced at the scale of a=
 routing=20
  domain (that is, a set=
 of<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;networking=20
  devices administered by a globally unique entity), or=20
  a<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;region of such domain (e=2Eg=2E=
 a=20
  metropolitan area composed=
 of<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;clusters=20
  of sensors)=2E&#8221;<BR>JP&gt; You list important and stringent=
 requirements here=2E Do=20
  you really need a routing algorithms capable of computing a path on a per=
=20
  QoS/service specific/=2E=2E=2E Basis ?<BR><SPAN class=
=3D461024219-21082008><FONT=20
  face=3D"Courier New" color=3D#0000ff>[CJ]&nbsp;I don't read this sentence=
 as you=20
  do=2E What I meant here is that entities that operate urban sensor=
 networks=20
  specify their own policies (routing, te, security, QoS, etc=2E), which=
 may be=20
  service-specific=2E The requirement suggests that the devices involved in=
 the=20
  enforcement of such policies should behave accordingly, that is, compute,=
=20
  select, establish and maintain paths whose characteristics comply with=
 these=20
  policies=2E But I agree this is a strong requirement, but not stronger=
 than,=20
  say, the self-organization requirement=2E</FONT></SPAN><BR><BR>Section=20
  4=2E2<BR>#########<BR><BR>* &#8220;After the initialization phase and=
 possibly some=20
  operational time,<BR>&nbsp;&nbsp;&nbsp;new nodes may be injected into the=
=20
  network as well as existing nodes<BR>&nbsp;&nbsp;&nbsp;removed from the=20
  network=2E &nbsp;The former might be because a removed=20
  node<BR>&nbsp;&nbsp;&nbsp;is replaced or denser readings/actuations are=
 needed=20
  or routing<BR>&nbsp;&nbsp;&nbsp;protocols report connectivity problems=2E=
=20
  &#8220;<BR>JP&gt; Just to avoid any mis-interpretation when referring to=
 routing=20
  problem, you mean that it may be desirable to inject to node because=20
  connectivity is not sufficient (lack of enough redundant path, =2E=2E=2E)=
 and not=20
  because of a routing issue per say=2E<BR><SPAN class=
=3D461024219-21082008><FONT=20
  face=3D"Courier New" color=3D#0000ff>[CJ]&nbsp;Not necessarily because=20
  connectivity is insufficient (new services, network expansion, node=20
  maintenance, etc=2E), and not necessarily because there is a routing=
 issue,=20
  indeed=2E&nbsp;</FONT></SPAN><BR><BR>*=20
  &#8220;Differentiation<BR>&nbsp;&nbsp;&nbsp;SHOULD be made between node=20
  disappearance, where the node disappears<BR>&nbsp;&nbsp;&nbsp;without=
 prior=20
  notification, and user or node-initiated=20
  disassociation<BR>&nbsp;&nbsp;&nbsp;("phased-out"), where the node has=
 enough=20
  time to inform the network<BR>&nbsp;&nbsp;&nbsp;about its removal=
=2E&#8221;<BR>JP&gt;=20
  Again this is not a routing requirement=2E Unless you refer to the=
 ability for=20
  the routing protocol to advertise to the rest of the network that it will=
 be=20
  removed in order for the other node to re-compute their path and avoid=
 traffic=20
  disruption (e=2Eg=2E Similarly to what we do with the ISIS overload bit=
 for=20
  example=2E) Is it what you mean ? <BR><SPAN class=
=3D461024219-21082008><FONT=20
  face=3D"Courier New" color=3D#0000ff>[CJ]&nbsp;This is indeed what we=
 meant (at=20
  least that's my reading of this sentence, but I'll let my colleagues=
 further=20
  comment on that)=2E&nbsp;</FONT></SPAN>If so, please clarify and move the=
=20
  routing requirement (SHOULD in capital letter to the routing requirement=
=20
  section)=2E<BR><SPAN class=3D461024219-21082008><FONT face=3D"Courier=
 New"=20
  color=3D#0000ff>[CJ]&nbsp;OK=2E&nbsp;</FONT></SPAN><BR><BR>* &#8220;The=
 protocol(s)=20
  hence SHOULD support the pinpointing of problematic routing=
 areas&#8221;<BR>JP&gt;=20
  Could you clarify what you mean by &#8220;pinpointing&#8221; since it=
 could be interpreted=20
  in many ways? <BR><SPAN class=3D461024219-21082008><FONT face=3D"Courier=
 New"=20
  color=3D#0000ff>[CJ]&nbsp;Fair enough, we need to be more explicit=
=2E&nbsp;Maybe=20
  something like: "the protocol should be able to convey information about=
=20
  malfunctioning nodes which may affect or jeopardize the overall routing=20
  efficiency, so that self-configuration capabilities of the sensor network=
=20
  might be solicited to facilitate the appropriate=20
  reconfiguration=2E"</FONT></SPAN><BR><BR>* The following section also=
 requires=20
  some clarification &#8211; you wrote:<BR>&#8220;Furthermore, to inform=20
  the<BR>&nbsp;&nbsp;&nbsp;access point(s) of the node's arrival and=
 association=20
  with the<BR>&nbsp;&nbsp;&nbsp;network as well as freshly associated nodes=
=20
  about packet forwarding<BR>&nbsp;&nbsp;&nbsp;schedules, roles, etc,=20
  appropriate (link state) updating mechanisms<BR>&nbsp;&nbsp;&nbsp;SHOULD=
 be=20
  supported=2E&#8221;<BR>JP&gt; Are you explicitly requiring a Link State=
 routing=20
  protocol or a routing protocol that provides information about link=
 states or=20
  =2E=2E=2E ?<BR><SPAN class=3D461024219-21082008><FONT face=3D"Courier=
 New"=20
  color=3D#0000ff>[CJ]&nbsp;We meant "a protocol that can provide=
 information=20
  about link status", indeed=2E&nbsp;</FONT></SPAN><BR>Note that a=
 requirement=20
  document should stay solution agnostic and stay focus on the requirement=
=2E=20
  <BR><SPAN class=3D461024219-21082008><FONT face=3D"Courier New"=20
  color=3D#0000ff>[CJ]&nbsp;Fully=20
  agreed=2E&nbsp;</FONT></SPAN></FONT></SPAN></FONT></DIV>
  <DIV class=3DOutlookMessageHeader lang=3Dfr dir=3Dltr align=3Dleft><FONT=
=20
  face=3D"Calibri, Verdana, Helvetica, Arial"><SPAN style=3D"FONT-SIZE:=
 12pt"><SPAN=20
  class=3D461024219-21082008></SPAN><FONT size=3D2>Is you requirement that=
 any node=20
  needs to have visibility on other node characteristics with no attempt of=
=20
  aggregation?<BR><SPAN class=3D461024219-21082008><FONT face=3D"Courier=
 New"=20
  color=3D#0000ff>[CJ]&nbsp;Well, yes,&nbsp;presumably depending on design=
=20
  considerations: cluster head vs=2E clients within the cluster, for=20
  example=2E&nbsp;I think this is typical Self Organizing=20
  Networking&nbsp;capability=2E</FONT></SPAN><BR><BR>Section=20
  4=2E3<BR>#########<BR><BR>* &#8220;The protocol(s) hence MUST support a=
 large number=20
  of highly<BR>&nbsp;&nbsp;&nbsp;directional unicast flows from the sensing=
=20
  nodes or sensing clusters<BR>&nbsp;&nbsp;&nbsp;towards the access point=
 or=20
  highly directed multicast or anycast<BR>&nbsp;&nbsp;&nbsp;flows from the=
 nodes=20
  towards multiple access points=2E&#8221;<BR>JP&gt; I think that what you=
 mean is that=20
  the routing protocol MUST be optimized for Multipoint-to-Point traffic=20
  patterns (from sensors/actuators to Sink)=2E As written, it is not clear=
 whether=20
  you refer to it as a routing requirement ?<BR><SPAN=20
  class=3D461024219-21082008><FONT face=3D"Courier New"=20
  color=3D#0000ff>[CJ]&nbsp;Agreed=2E&nbsp;</FONT></SPAN><BR>This in fact=
 what you=20
  wrote in section 6=2E5: &#8220;To this end, the routing protocol(s)=
 SHOULD support and=20
  utilize the fact of highly directed traffic flow to facilitate=
 scalability and=20
  parameter constrained routing=2E&#8221;<BR><SPAN class=
=3D461024219-21082008><FONT=20
  face=3D"Courier New"=20
  color=3D#0000ff>[CJ]&nbsp;Correct=2E&nbsp;</FONT></SPAN><BR><BR>* s/ More=
=20
  generally, entire routing areas may be avoided at e=2Eg=2E night but=
 heavily used=20
  during the day when nodes are scavenging from sunlight/ More generally,=
 entire=20
  routing areas may be avoided (e=2Eg=2E at night) but heavily used during=
 the day=20
  when nodes are scavenging from sunlight=2E<BR>JP&gt; Doesn&#8217;t this=
 translate to=20
  the requirement for time-based routing (some form of policy routing)=20
  ?<BR><SPAN class=3D461024219-21082008><FONT face=3D"Courier New"=20
  color=3D#0000ff>[CJ]&nbsp;Correct, but I don't see any harm in providing=
 a=20
  practical example=2E&nbsp;</FONT></SPAN><BR><BR>Section=20
  4=2E4<BR>#########<BR><BR>&#8220;However, they are not very stringent=20
  where<BR>&nbsp;&nbsp;&nbsp;latencies SHOULD simply be sufficiently=
 smaller=20
  than typical<BR>&nbsp;&nbsp;&nbsp;reporting intervals&#8221;<BR>JP&gt;=
 This is=20
  certainly true but not a routing requirement but a data plane requirement=
=20
  unless you refer to the ability to support QoS aware routing where each=
 node=20
  may want to be able to compute different paths depending on the traffic=20
  requirements?<BR><SPAN class=3D461024219-21082008><FONT face=3D"Courier=
 New"=20
  color=3D#0000ff>[CJ]&nbsp;This is indeed related to the third bullet that=
=20
  appears in section 4=2E1=2E&nbsp;</FONT></SPAN><BR><BR>* Move=
 &#8220;U-LLN network=20
  devices SHOULD support unicast and multicast routing capabilities&#8221;=
 to the=20
  routing requirement section=2E You may want to leave the sentence here=
 (without=20
  a SHOULD)=2E<BR><SPAN class=3D461024219-21082008><FONT face=3D"Courier=
 New"=20
  color=3D#0000ff>[CJ]&nbsp;OK=2E&nbsp;</FONT></SPAN><BR><BR>* You use the=
 term=20
  &#8220;anycast&#8221; that has been discussed in the past, in particular=
 in the context of=20
  the Home routing requirement document=2E I would suggest to define this=
 term in=20
  the document, refer to RFC4291 or RFC1546, =2E=2E=2E<BR><SPAN=20
  class=3D461024219-21082008><FONT face=3D"Courier New"=20
  color=3D#0000ff>[CJ]&nbsp;Fully agreed=2E </FONT></SPAN><BR><BR>Section=20
  4=2E5<BR>#########<BR><BR>* &#8220;An alarm is likely=20
  being<BR>&nbsp;&nbsp;&nbsp;registered by a plurality of sensing nodes=
 where=20
  the delivery of a<BR>&nbsp;&nbsp;&nbsp;single alert message with its=
 location=20
  of origin suffices in most<BR>&nbsp;&nbsp;&nbsp;cases=2E&#8221;<BR>Then=
 you provide=20
  the example of toxic gas level=2E This is one example where it might be=20
  desirable not to perform data aggregation/fusion and get multiple copies=
 of=20
  the same message from different source to perform=
 &#8220;triangulation&#8221; and better=20
  localize the incident=2E<BR><SPAN class=3D461024219-21082008><FONT=20
  face=3D"Courier New" color=3D#0000ff>[CJ]&nbsp;Agreed, but I think this=
 example=20
  precisely illustrates the issue=2E&nbsp;</FONT></SPAN><BR><BR>*=
 &#8220;Routing within=20
  urban sensor networks SHOULD require the U-LLN=
 nodes<BR>&nbsp;&nbsp;&nbsp;to=20
  dynamically compute, select and install different paths towards=20
  a<BR>&nbsp;&nbsp;&nbsp;same destination, depending on the nature of the=20
  traffic=2E &nbsp;From this<BR>&nbsp;&nbsp;&nbsp;perspective, such nodes=
 SHOULD=20
  inspect the contents of traffic<BR>&nbsp;&nbsp;&nbsp;payload for making=20
  routing and forwarding decisions: <BR><BR>JP&gt; This clarifies my=
 previous=20
  question; you do refer to ability to compute different paths (with=
 different=20
  characteristic)=2E Note that the path selection process performed by the=
 sender=20
  and potentially routers along the path is not strictly speaking a routing=
=20
  requirement=2E<BR>Move this requirement to the requirement section=2E=
 <BR><SPAN=20
  class=3D461024219-21082008><FONT face=3D"Courier New"=20
  color=3D#0000ff>[CJ]&nbsp;OK=2E&nbsp;</FONT></SPAN><BR><BR>* &#8220;for=
 example, the=20
  analysis of the traffic payload SHOULD be derived into=20
  aggregation<BR>&nbsp;&nbsp;&nbsp;capabilities for the sake of forwarding=
=20
  efficiency=2E&#8221;<BR>JP&gt; Can you clarify what you mean=
 here?<BR><SPAN=20
  class=3D461024219-21082008><FONT face=3D"Courier New" color=
=3D#0000ff>[CJ]&nbsp;The=20
  analysis of the payload of several packets should&nbsp;help in making=20
  forwarding decisions that will spare network resources=
=2E</FONT></SPAN><BR><BR>*=20
  &#8220;Delays and latencies are<BR>&nbsp;&nbsp;&nbsp;important; however,=
 again,=20
  deliveries within seconds SHOULD suffice<BR>&nbsp;&nbsp;&nbsp;in most of=
 the=20
  cases=2E&#8221;<BR>JP&gt; Clearly not a routing requirement!<BR><SPAN=20
  class=3D461024219-21082008><FONT face=3D"Courier New"=20
  color=3D#0000ff>[CJ]&nbsp;Agreed=2E&nbsp;</FONT></SPAN><BR><BR>Section=20
  5<BR>########<BR><BR>* &#8220;The network SHOULD take into consideration=
 that=20
  different application<BR>&nbsp;&nbsp;&nbsp;traffic may require different=
=20
  priorities when traversing the network,<BR>&nbsp;&nbsp;&nbsp;and that=
 some=20
  traffic may be more sensitive to latency=2E&#8221;<BR>JP&gt; If by=
 priorities you mean=20
  different routes with different characteristics then this is fine and=
 already=20
  covered=2E If you refer to packet marking to provide different QoS in the=
 data=20
  plane, this is not a routing requirement=2E<BR><SPAN=20
  class=3D461024219-21082008><FONT face=3D"Courier New"=20
  color=3D#0000ff>[CJ]&nbsp;Agreed - the former is the correct=20
  interpretation=2E&nbsp;</FONT></SPAN><BR><BR>* &#8220;An U-LLN SHOULD=
 support=20
  occasional large scale traffic flows from<BR>&nbsp;&nbsp;&nbsp;sensing=
 nodes=20
  to access points, such as system-wide alerts=2E &#8220; and &#8220;A node=
 MUST be able to=20
  send its own alerts toward an access<BR>&nbsp;&nbsp;&nbsp;point while=20
  continuing to forward traffic on behalf of other=20
  devices<BR>&nbsp;&nbsp;&nbsp;who are also experiencing an alert condition=
=2E=20
  &nbsp;The network MUST be<BR>&nbsp;&nbsp;&nbsp;able to manage this sudden=
=20
  large traffic flow=2E&#8221;<BR>JP&gt; Not routing requirements=2E Unless=
 =2E=2E=2E You=20
  require the ability to compute multiple paths and use all of them=
 (symmetrical=20
  or asymmetrical routing ???) to spread out the traffic and limit network=
=20
  delays ?<BR><SPAN class=3D461024219-21082008><FONT face=3D"Courier New"=20
  color=3D#0000ff>[CJ]&nbsp;I think this is a kind of causality effect: the=
=20
  routing protocol must be able to accommodate traffic bursts by=
 dynamically=20
  computing&nbsp;and selecting multiple paths towards the same=20
  destination=2E&nbsp;</FONT></SPAN><BR><BR>* You make an interesting=
 reference to=20
  Smart Grid and DR/DSM=2E That said, you wrote &#8220;The network SHOULD=
 support=20
  internetworking, while giving attention to security implications of=20
  interfacing, for example, a home network with a utility U-LLN=
=2E&#8221;<BR>JP&gt;=20
  Don&#8217;t you mean that the routing protocol must be able to=
 potentially interact=20
  via potential route redistribution with other routing protocol used in=
 the=20
  Internet, should these two protocols not be identical ?<BR><SPAN=20
  class=3D461024219-21082008><FONT face=3D"Courier New"=20
  color=3D#0000ff>[CJ]&nbsp;Correct=
=2E&nbsp;</FONT></SPAN><BR>&nbsp;<BR><BR>Section=20
  6<BR>#########<BR><BR>* S/Current urban roll-outs are composed of=
 sometimes=20
  more than a hundred nodes/ Current urban roll-outs are composed of=
 sometimes=20
  more than one hundred nodes<BR><SPAN class=3D461024219-21082008><FONT=20
  face=3D"Courier New" color=3D#0000ff>[CJ]&nbsp;OK=
=2E&nbsp;</FONT></SPAN><BR><BR>* &#8220;=20
  The routing protocols(s) SHOULD support the organization of a large=
 number of=20
  nodes into regions of to-be-specified size=2E&#8221;<BR>JP&gt; It will be=
 difficult=20
  (or too easy ;-)) to be compliant with that SHOULD with a to-be-specified=
=20
  size=2E Or did you mean &#8220;configurable&#8221; ?<BR><SPAN class=
=3D461024219-21082008><FONT=20
  face=3D"Courier New" color=3D#0000ff>[CJ]&nbsp;Configurable is indeed=
 much=20
  better=2E&nbsp;</FONT></SPAN><BR><BR>* &#8220;To this end, the routing=
 protocol(s)=20
  MUST support parameter<BR>&nbsp;&nbsp;&nbsp;constrained routing, where=20
  examples of such parameters (CPU, memory<BR>&nbsp;&nbsp;&nbsp;size,=
 battery=20
  level, etc=2E) have been given in the previous paragraph=
=2E&#8221;<BR>JP&gt; Please use=20
  the term &#8220;node constrained based routing&#8221;<BR><SPAN=20
  class=3D461024219-21082008><FONT face=3D"Courier New" color=
=3D#0000ff>[CJ]&nbsp;I'm=20
  not sure I agree here, because "node-constrained" sounds more fuzzy to me=
=2E=20
  "environment-constrained"?&nbsp;</FONT></SPAN><BR><BR>* &#8220;For the=
 latter, the=20
  protocol(s) MUST support multi- and<BR>&nbsp;&nbsp;&nbsp;any-cast=
 addressing=2E=20
  &nbsp;The protocol(s) SHOULD also support=
 the<BR>&nbsp;&nbsp;&nbsp;formation=20
  and identification of groups of field devices in=20
  the<BR>&nbsp;&nbsp;&nbsp;network=2E&#8221;<BR>JP&gt; You may want to more=
 accurately=20
  define the term &#8220;anycast&#8221;<SPAN class=
=3D461024219-21082008><FONT=20
  face=3D"Courier New" color=3D#0000ff>&nbsp;</FONT></SPAN><BR><FONT=20
  face=3D"Courier New"><FONT color=3D#0000ff><SPAN=20
  class=3D461024219-21082008>[CJ]&nbsp;Would the couple of references you=20
  righfully mentioned earlier be sufficient?</SPAN></FONT></FONT><BR><BR>*=
 &#8220; To=20
  mandate fully interoperable implementations, the=20
  routing<BR>&nbsp;&nbsp;&nbsp;protocol(s) proposed in U-LLN MUST support=20
  different devices and<BR>&nbsp;&nbsp;&nbsp;underlying technologies=
 without=20
  compromising the operability and<BR>&nbsp;&nbsp;&nbsp;energy efficiency=
 of the=20
  network=2E&#8221;<BR>JP&gt; This requires clarification here=2E Do you=
 mean that the=20
  routing protocol MUST support node constrained based routing? If so, it=
 is=20
  already stated above=2E The support of different L1/L2 is a given (route=
=20
  over)=2E<BR><SPAN class=3D461024219-21082008><FONT face=3D"Courier New"=20
  color=3D#0000ff>[CJ]&nbsp;I would agree with Jean-Philippe, and suggest=
 we=20
  remove this wording=2E=2E=2Ebut I'll let the co-authors further=20
  comment=2E&nbsp;</FONT></SPAN><BR><BR>* Section 6=2E8, as written, is not=
 related=20
  to routing but data plane=2E Let me be more specific:<BR><BR>* &#8220;To=
 this end, the=20
  routing protocol(s) SHOULD support minimum=
 latency<BR>&nbsp;&nbsp;&nbsp;for=20
  alert reporting and time-critical data queries=2E&#8221;<BR>JP&gt; The=
 support of=20
  minimum latency path (data plane !) or the support for different metric=
 path=20
  (control plane) ?<BR><SPAN class=3D461024219-21082008><FONT face=
=3D"Courier New"=20
  color=3D#0000ff>[CJ]&nbsp;As written, I read it as the former=
 interpretation and=20
  would suggest we remove the text=2E&nbsp;</FONT></SPAN><BR><BR>*=
 &#8220;For regular=20
  data<BR>&nbsp;&nbsp;&nbsp;reporting, it SHOULD support latencies not=
 exceeding=20
  a fraction of<BR>&nbsp;&nbsp;&nbsp;the smallest reporting interval=2E=20
  &nbsp;&#8220;<BR>JP&gt; Not a routing requirement=2E Even if you are=
 referring to a=20
  bound on the total path metric (the metric reflecting the delay in this=
 case),=20
  this is an implementation issue=2E<BR><SPAN class=
=3D461024219-21082008><FONT=20
  face=3D"Courier New"=20
  color=3D#0000ff>[CJ]&nbsp;Correct=2E&nbsp;</FONT></SPAN><BR><BR>*=
 &#8220;Due to the=20
  different latency requirements, the routing protocol(s) SHOULD support=
 the=20
  ability of dealing with different latency requirements=2E &nbsp;The=
 routing=20
  protocol(s) SHOULD also support the ability to route according to=
 different=20
  metrics (one of which could e=2Eg=2E be latency)=2E&#8221;<BR>JP&gt; yes=
 these are routing=20
  requirements although I would suggest to remove the first sentence, the=20
  requirement being captured in the second sentence=2E<BR><SPAN=20
  class=3D461024219-21082008><FONT face=3D"Courier New"=20
  color=3D#0000ff>[CJ]&nbsp;Agreed=2E&nbsp;</FONT></SPAN><BR><BR>Section=20
  7<BR>#########<BR><BR>* &#8220;As every network, U-LLNs are exposed to=
 security=20
  threats that MUST be addressed=2E&#8221;<BR>JP&gt; You cannot put a MUST=
 here unless=20
  you list the routing security threats=2E<BR><SPAN class=
=3D461024219-21082008><FONT=20
  face=3D"Courier New" color=3D#0000ff>[CJ]&nbsp;OK=
=2E&nbsp;</FONT></SPAN><BR><BR>* s/=20
  potential security threats/ potential routing security threats =3D&gt;=
 JP&gt;=20
  Please use the term &#8220;routing security&#8221; in place of=
 &#8220;security&#8221; throughout the=20
  section=2E <BR><SPAN class=3D461024219-21082008><FONT face=3D"Courier=
 New"=20
  color=3D#0000ff>[CJ]&nbsp;OK=2E&nbsp;</FONT></SPAN><BR><BR>* &#8220;U-LLN=
 networks=20
  SHOULD support mechanisms to preserve=
 the<BR>&nbsp;&nbsp;&nbsp;confidentiality=20
  of the traffic that they forward=2E &nbsp;The U-LLN=20
  network<BR>&nbsp;&nbsp;&nbsp;SHOULD NOT prevent an application from=
 employing=20
  additional<BR>&nbsp;&nbsp;&nbsp;confidentiality mechanisms=
=2E&#8221;<BR>JP&gt; I do=20
  agree with the requirement but this is not a routing requirement=2E=
 <BR><SPAN=20
  class=3D461024219-21082008><FONT face=3D"Courier New" color=
=3D#0000ff>[CJ]&nbsp;Fair=20
  enough=2E&nbsp;</FONT></SPAN></FONT></SPAN></FONT></DIV>
  <DIV class=3DOutlookMessageHeader lang=3Dfr dir=3Dltr align=3Dleft><FONT=
=20
  face=3D"Calibri, Verdana, Helvetica, Arial"><SPAN style=3D"FONT-SIZE:=
 12pt"><SPAN=20
  class=3D461024219-21082008></SPAN><FONT size=3D2>Could you focus on the=
 routing=20
  security issues ? Or are you referring to the routing traffic=
 confidentiality=20
  ?<BR><SPAN class=3D461024219-21082008><FONT face=3D"Courier New"=20
  color=3D#0000ff>[CJ]&nbsp;No, this wording referred to the traffic=
 forwarded by=20
  the network=2E&nbsp;</FONT></SPAN>&nbsp;<BR>This is what you do right=20
  after:<BR><SPAN class=3D461024219-21082008><FONT face=3D"Courier New"=20
  color=3D#0000ff>[CJ]&nbsp;Correct=2E&nbsp;</FONT></SPAN><BR>&#8220; The=
 U-LLN MUST be=20
  protected against attempts to inject false=
 or<BR>&nbsp;&nbsp;&nbsp;modified=20
  packets=2E &nbsp;For example, an attacker SHOULD be prevented=20
  from<BR>&nbsp;&nbsp;&nbsp;manipulating or disabling the routing function=
 by=20
  compromising<BR>&nbsp;&nbsp;&nbsp;routing update messages=2E=
 &nbsp;Moreover, it=20
  SHOULD NOT be possible to<BR>&nbsp;&nbsp;&nbsp;coerce the network into=
 routing=20
  packets which have been modified in<BR>&nbsp;&nbsp;&nbsp;transit=2E=
 &nbsp;To=20
  this end the routing protocol(s) MUST support=20
  message<BR>&nbsp;&nbsp;&nbsp;integrity=2E&#8221;<BR>JP&gt; I do not see=
 any reference=20
  to the type of routing attacks that could be performed on such networks=20
  because of the typical P2MP traffic pattern, extensive use of wireless=
 links,=20
  =2E=2E=2E <BR><SPAN class=3D461024219-21082008><FONT face=3D"Courier New"=
=20
  color=3D#0000ff>[CJ]&nbsp;OK, but does that mean we should not consider=
 such=20
  requirement? I don't think so, afaic=2E&nbsp;</FONT></SPAN><BR>JP&gt;=
 What I=20
  would suggest is to re-focus on the routing security issues with the=
 Security=20
  expert that will get appointed=2E<BR><SPAN class=
=3D461024219-21082008><FONT=20
  face=3D"Courier New"=20
  color=3D#0000ff>[CJ]&nbsp;OK=2E&nbsp;</FONT></SPAN><BR><BR>Reference=20
  section<BR>###############<BR><BR>The current reference section=20
  reads:<BR>11=2E2=2E &nbsp;Informative=20
  References<BR><BR>&nbsp;&nbsp;&nbsp;[I-D=
=2Ebrandt-roll-home-routing-reqs]<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Brandt,=20
  A=2E, "Home Automation Routing Requirement in=20
 =
 Low<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;Power=20
  and Lossy=20
 =
 Networks",<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;draft-brandt-roll-home-routing-reqs-01=20
  (work in=20
 =
 progress),<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;May=20
  2008=2E<BR><BR>JP&gt; Please update to draft-ietf-roll-home-routing-reqs=
 and add=20
  the reference to draft-ietf-roll-indus-routing-reqs<BR><SPAN=20
  class=3D461024219-21082008><FONT face=3D"Courier New"=20
  color=3D#0000ff>[CJ]&nbsp;OK=
=2E&nbsp;</FONT></SPAN><BR><BR>&nbsp;&nbsp;&nbsp;[I-D=
=2Eculler-rl2n-routing-reqs]<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Vasseur,=20
  J=2E and D=2E Cullerot, "Routing Requirements for=20
 =
 Low<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;Power=20
  And Lossy=20
 =
 Networks",<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;draft-culler-rl2n-routing-reqs-01=20
  (work in=20
 =
 progress),<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;July=20
  2007=2E<BR><BR>JP&gt; This one can be removed=2E<BR><SPAN=20
  class=3D461024219-21082008><FONT face=3D"Courier New"=20
  color=3D#0000ff>[CJ]&nbsp;OK=2E&nbsp;</FONT></SPAN><BR><BR><BR>Last=
 comment:=20
  please check that you expand acronyms when first used=2E<BR><SPAN=20
  class=3D461024219-21082008><FONT face=3D"Courier New"=20
  color=3D#0000ff>[CJ]&nbsp;OK=2E</FONT></SPAN></FONT></SPAN></FONT></DIV>
  <DIV class=3DOutlookMessageHeader lang=3Dfr dir=3Dltr align=3Dleft><FONT=
=20
  face=3D"Calibri, Verdana, Helvetica, Arial"><SPAN style=3D"FONT-SIZE:=
 12pt"><FONT=20
  size=3D2><SPAN class=
=3D461024219-21082008></SPAN></FONT></SPAN></FONT>&nbsp;</DIV>
  <DIV class=3DOutlookMessageHeader lang=3Dfr dir=3Dltr align=3Dleft><FONT=
=20
  face=3D"Calibri, Verdana, Helvetica, Arial"><SPAN style=3D"FONT-SIZE:=
 12pt"><FONT=20
  size=3D2><SPAN class=3D461024219-21082008><FONT face=3D"Courier New"=20
  color=3D#0000ff>Cheers,</FONT></SPAN></FONT></SPAN></FONT></DIV>
  <DIV class=3DOutlookMessageHeader lang=3Dfr dir=3Dltr align=3Dleft><FONT=
=20
  face=3D"Calibri, Verdana, Helvetica, Arial"><SPAN style=3D"FONT-SIZE:=
 12pt"><FONT=20
  size=3D2><SPAN class=
=3D461024219-21082008></SPAN></FONT></SPAN></FONT>&nbsp;</DIV>
  <DIV class=3DOutlookMessageHeader lang=3Dfr dir=3Dltr align=3Dleft><FONT=
=20
  face=3D"Calibri, Verdana, Helvetica, Arial"><SPAN style=3D"FONT-SIZE:=
 12pt"><FONT=20
  size=3D2><SPAN class=3D461024219-21082008><FONT face=3D"Courier New"=20
  color=3D#0000ff>Christian=
=2E</FONT>&nbsp;</SPAN><BR><BR></FONT></SPAN></FONT></DIV></BLOCKQUOTE></BO=
DY></HTML>

<table><tr><td bgcolor=3D#ffffff><font color=
=3D#000000>*********************************<br>
This message and any attachments (the "message") are confidential and=
 intended solely for the addressees=2E <br>
Any unauthorised use or dissemination is prohibited=2E<br>
Messages are susceptible to alteration=2E <br>
France Telecom Group shall not be liable for the message if altered,=
 changed or falsified=2E<br>
If you are not the intended addressee of this message, please cancel it=
 immediately and inform the sender=2E<br>
********************************<br>
</font></td></tr></table>
------_=_NextPart_001_01C903D1.24A82DD4--


--===============0444533850==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Roll mailing list
Roll@ietf.org
https://www.ietf.org/mailman/listinfo/roll

--===============0444533850==--



From roll-bounces@ietf.org  Thu Aug 21 14:18:17 2008
Return-Path: <roll-bounces@ietf.org>
X-Original-To: roll-archive@ietf.org
Delivered-To: ietfarch-roll-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 076393A6B33;
	Thu, 21 Aug 2008 14:18:17 -0700 (PDT)
X-Original-To: roll@core3.amsl.com
Delivered-To: roll@core3.amsl.com
Received: from localhost (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id BB8473A6B82
	for <roll@core3.amsl.com>; Thu, 21 Aug 2008 14:13:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5
	tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32])
	by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id h3-fL+P1XBOn for <roll@core3.amsl.com>;
	Thu, 21 Aug 2008 14:13:12 -0700 (PDT)
Received: from usstuh502.johnsondiversey.com (mail3.johnsondiversey.com
	[208.251.229.30])
	by core3.amsl.com (Postfix) with ESMTP id EE2FF3A6ACB
	for <roll@ietf.org>; Thu, 21 Aug 2008 14:13:11 -0700 (PDT)
From: david.bruemmer@johnsondiversey.com
To: roll@ietf.org
Message-ID: <OF660BB71F.F7322AF0-ON862574AC.00738E42-862574AC.00738E42@johnsondiversey.com>
Date: Thu, 21 Aug 2008 16:02:10 -0500
X-MIMETrack: Serialize by Router on USSTUH502/SVR/CMI(Release
	7.0.3FP1|February 24, 2008) at 08/21/2008 16:14:21
MIME-Version: 1.0
Subject: [Roll] David Bruemmer is out of the office.
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/roll>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: roll-bounces@ietf.org
Errors-To: roll-bounces@ietf.org


I will be out of the office starting  08/18/2008 and will not return until
08/25/2008.

I will respond to your message when I return.

_______________________________________________
Roll mailing list
Roll@ietf.org
https://www.ietf.org/mailman/listinfo/roll


From roll-bounces@ietf.org  Thu Aug 21 14:41:26 2008
Return-Path: <roll-bounces@ietf.org>
X-Original-To: roll-archive@ietf.org
Delivered-To: ietfarch-roll-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 98FA93A6ABC;
	Thu, 21 Aug 2008 14:41:26 -0700 (PDT)
X-Original-To: roll@core3.amsl.com
Delivered-To: roll@core3.amsl.com
Received: from localhost (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 4A2C23A687E
	for <roll@core3.amsl.com>; Thu, 21 Aug 2008 14:34:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.204
X-Spam-Level: 
X-Spam-Status: No, score=-6.204 tagged_above=-999 required=5 tests=[AWL=0.771, 
	BAYES_00=-2.599, GB_I_LETTER=-2, HTML_MESSAGE=0.001,
	MIME_QP_LONG_LINE=1.396, RCVD_IN_DNSWL_MED=-4, SARE_SUB_OBFU_Q1=0.227]
Received: from mail.ietf.org ([64.170.98.32])
	by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id lw53FpsFCRuq for <roll@core3.amsl.com>;
	Thu, 21 Aug 2008 14:34:25 -0700 (PDT)
Received: from sj-iport-6.cisco.com (sj-iport-6.cisco.com [171.71.176.117])
	by core3.amsl.com (Postfix) with ESMTP id 12CBB3A6A57
	for <roll@ietf.org>; Thu, 21 Aug 2008 14:34:25 -0700 (PDT)
X-IronPort-AV: E=Sophos;i="4.32,247,1217808000"; 
	d="scan'208,217";a="144071959"
Received: from sj-dkim-2.cisco.com ([171.71.179.186])
	by sj-iport-6.cisco.com with ESMTP; 21 Aug 2008 21:33:18 +0000
Received: from sj-core-3.cisco.com (sj-core-3.cisco.com [171.68.223.137])
	by sj-dkim-2.cisco.com (8.12.11/8.12.11) with ESMTP id m7LLXIQc021436; 
	Thu, 21 Aug 2008 14:33:18 -0700
Received: from xbh-rtp-211.amer.cisco.com (xbh-rtp-211.cisco.com
	[64.102.31.102])
	by sj-core-3.cisco.com (8.13.8/8.13.8) with ESMTP id m7LLXH3P012763;
	Thu, 21 Aug 2008 21:33:18 GMT
Received: from xmb-rtp-213.amer.cisco.com ([64.102.31.112]) by
	xbh-rtp-211.amer.cisco.com with Microsoft SMTPSVC(6.0.3790.1830); 
	Thu, 21 Aug 2008 17:33:17 -0400
Received: from 10.61.97.215 ([10.61.97.215]) by xmb-rtp-213.amer.cisco.com
	([64.102.31.112]) with Microsoft Exchange Server HTTP-DAV ; 
	Thu, 21 Aug 2008 21:33:17 +0000
User-Agent: Microsoft-Entourage/12.12.0.080729
Date: Thu, 21 Aug 2008 23:33:15 +0200
From: JP Vasseur <jvasseur@cisco.com>
To: Anders Brandt <abr@zen-sys.com>,
	Porcu Giorgio <giorgio.porcu@guest.telecomitalia.it>, <roll@ietf.org>
Message-ID: <C4D3ABBB.4FBB9%jvasseur@cisco.com>
Thread-Topic: Review of draft-ietf-roll-home-routing-reqs-02 
Thread-Index: AckD1YTvR+kjwowIaE+CUmY/7HuZOg==
Mime-version: 1.0
X-OriginalArrivalTime: 21 Aug 2008 21:33:17.0446 (UTC)
	FILETIME=[86651A60:01C903D5]
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; l=24671; t=1219354398;
	x=1220218398; c=relaxed/simple; s=sjdkim2002;
	h=Content-Type:From:Subject:Content-Transfer-Encoding:MIME-Version;
	d=cisco.com; i=jvasseur@cisco.com;
	z=From:=20JP=20Vasseur=20<jvasseur@cisco.com>
	|Subject:=20Review=20of=20draft-ietf-roll-home-routing-reqs
	-02=20 |Sender:=20;
	bh=3m2rIZyLrxOTr4yIoTHo/8FCHUsib9jzFXEyG4wxVwc=;
	b=1AnHF9qgggB2X+ogbpb2Deq7gHqU3WOMc62Bswp107dsOh1FWOE24I/592
	FnGWpXS4k3irwMGd94rkcBdVJDSlsdHj6FEcl50qnEd0woXaiMA0e2zxEzka
	p++SCNdSS3;
Authentication-Results: sj-dkim-2; header.From=jvasseur@cisco.com; dkim=pass (
	sig from cisco.com/sjdkim2002 verified; ); 
Cc: "David E. Culler" <culler@cs.berkeley.edu>
Subject: [Roll] Review of draft-ietf-roll-home-routing-reqs-02
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/roll>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============0844671696=="
Sender: roll-bounces@ietf.org
Errors-To: roll-bounces@ietf.org

> This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

--===============0844671696==
Content-type: multipart/alternative;
	boundary="B_3302206395_43592693"

> This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

--B_3302206395_43592693
Content-type: text/plain;
	charset="ISO-8859-1"
Content-transfer-encoding: quoted-printable

Dear WG,

As discussed in Dublin, the plan is to try to Last Call all the
application-specific routing requirements document before end of September.
Thus, please provide your detailed comments as soon as possible.

Here is my co-chair review on the Home Automation Routing Requirements.

Comments are not by order of importance by in chronological order.

First comments: as discussed in Dublin, could you please try to quickly
address the routing security issues.

Abstract
#######

* S/ ROuting in Low power and Lossy networks (ROLL)/ Routing Over Low power
and Lossy networks (ROLL) // Also in the terminology section //
* =B3Examples include lighting control,
   heating control, sensors, leak detectors, healthcare systems and
   advanced remote controls.=B2
JP> Don=B9t you want to classify with sensor (water leak, motion, healthcare
systems...), actuators (lighting, ....)
* Thanks to substitute the term =B3multi-hop routing=B2 by =B3routing=B2 (explain
that in a typical home all the nodes are not in direct range). It appears i=
n
several sections.
* I think that the terminology section requires some work but I=B9ll send a
separate email thread on the ROLL WG mailing list. For the time being, I
would suggest to remove the ROLL Node, ROLL network, ... terminology. You
may just want to a node where a node may be a sensor, actuator, ... Unless
you need to refer to a particular function of the node.

Please re-order sections so that Introduction becomes Section 1.

Introduction Section
#################

* s/ gas/water leak detectors/ gas/water leak sensor =3D> JP> Good to use the
term sensor not to introduce new term (detector)
* =B3Basic home control
   modules such as wall switches and plug-in modules may be turned into
   an advanced home automation solution via the use of an IP-enabled
   application responding to events generated by wall switches, motion
   sensors, light sensors, rain sensors, and so on. =B3
JP> You may want to explain that wall switched are then actuators. We could
also have embedded power sensor in plug-in modules but I guess that you
refer to actuators here.
* =B3These requirements may be overlapping requirements
   derived from other application-specific requirements. =B3
JP> Good place to reference the other IDs:
http://www.ietf.org/internet-drafts/draft-ietf-roll-home-routing-reqs-02.tx=
t
,=20
http://www.ietf.org/internet-drafts/draft-ietf-roll-indus-routing-reqs-01.t=
x
t and=20
http://www.ietf.org/internet-drafts/draft-martocci-roll-commercial-routing-=
r
eqs-00.txt. + Update the reference section

Section 3
########

* =B3Home automation applications represent a special segment of networked
   wireless devices with its unique set of requirements.=B2
JP> You may want to say that home networks may also comprise wired link
(e.g.PLC)
* =B3For instance a lamp may be turned on, not only be a
   wall switch but also from a movement sensor. =B3
JP> Don=B9t you want to move this to Section 3.1 and try to slightly
generalize the Section 3.1 to =B3lighting application=B2.
* =B3Geographical areas using central heating may turn off heating when
   not at home and use a reduced temperature during night time.

   The power grid may experience periods where more wind-generated power
   is produced than is needed. Typically this may happen during night
   hours. The washing machine and dish washer may just as well work
   while power is cheap. The electric car should also charge its
   batteries on cheap power.

   In periods where electricity demands exceed available supply,
   appliances such as air conditioning, climate control systems, washing
   machines etc. can be turned off to avoid overloading the power grid. =B3
JP> Great example. When you refer to this kind of application you may want
to use the term DR (demand-response) and SDM (Demand Side management) also
listed in the Urban routing requirement ID.
* =B3Wireless remote control of the household appliances is well-suited
   for this application. =B3 and =B3 Moreover, in order to achieve
   effective electricity savings, the energy monitoring application
   running on the Wireless Sensor Network (WSN)=B2
JP> Well it is not just wireless but also wired (PLC). You may want to say
=B3Remote control ...=B2.
* Section 3.4: This is an important section. Two comments:
    - This is not just for lighting devices (referring to the title)
    - Distribution of unique address may not always be performed by a
central contoller
* =B3A=20
   home automation controller sending commands to window shades via ROLL
   devices will have no problems delivering the packet to the router,
   but the router may have to wait for some time before the command can
   be delivered to the window shades if the receiver is sleeping;=B2
JP> You may want to clarify the paragraph above. I guess that in your
example: the router is the node immediately upstream to the destination, an=
d
the window shades destination=3Dreceiver (actuator)? =3D> means buffering on
routers. No need to ellaborate more though, since this is not related to
routing requirements. The 250ms refer to the wake-up time ?
* s/=B2which can be=20
   triggered by the end-user that has received an alarm from a movement
   sensor or smoke detector - or the user simply wants to check the home
   status via video. =B3/=B2which can be
   triggered by the end-user that has received an alarm from sensor
(movement=20
   or smoke detector) or the user that simply wants to check the home
   status via video. =B3
* PDA: please expand acronym when first used.
* s/=B3From a ROLL perspective, all the above-mentioned applications may run
   on battery.=B2/=B2Because all of the above-mentioned applications may run on
battery, this leads to specific requirements for the routing protocol.=B2
* =B3A home security alarm system is comprised of various devices like
   vibration detectors, fire or carbon monoxide detection system, door
   or window contacts, glass-break detector, presence sensor, panic
   button, home security key.=B2
JP> Sorry to be =B3picky=B2 with the terminology but could you classify as
sensors, actuators, ... ? Thanks.
* =B3When a node (or a group of nodes) identifies a risk situation (e.g.
   intrusion, smoke, fire), it sends an alarm message to the control
   centre that could autonomously forward it via Internet or interact
   with the WSN (e.g. trying to obtain more detailed information or
   asking to other nodes close to the alarm event).=B2
JP> Define the =B3control centre=B2 as a local device.
* s/=B3RAM memory=B2/RAM and expand the term RAM

Section 4
#########
* s/=B2Home automation applications have a number of specific requirements
   related to the set of home networking applications and the perceived
   operation of the system.=B2/=B2Home automation applications have a number of
specific routing requirements
   related to the set of home networking applications and the perceived
   operation of the system.=B2
* =B3Broadcast and groupcast in home automation MAY be used to deliver the
   illusion that all recipients respond simultaneously. Distant
   recipients out of direct range may not react to the (unacknowledged)
   groupcast.  Acknowledged unicast delivery MUST be used subsequently. =B3
JP> These are not routing requirements. If you require the support of
=B3groupcast routing=B2 (e.g. Minimization of packet duplication) then it is
indeed a routing requirement, in which case there are other implications on
addressing. Is it what is being required here ? Clearly the second statemen=
t
related to acknowledgment delivery is NOT a routing requirement.
* Ah indeed I now read =B3The support of unicast, groupcast and broadcast als=
o
has an=20
   implication on the addressing scheme and are outside the scope of
   this document that focuses on the routing requirements aspects. =B3 So do
you want to clarify the routing specific requirement for Groupcast ?
* Same issue here =B3It MUST be to possible to address a group of receivers
known by the=20
   sender even if the receivers do not know that they have been grouped
   by the sender.=B2
* =B3The routing protocol should either share the load between
   nodes to preserve battery or only route via mains-powered nodes if
   possible.=B2
JP> Is it a =B3should=B2 or a =B3SHOULD=B2. If a =B3SHOULD=B2 this translates to the
support of load balancing (symmetrical or asymetrical), thus the computatio=
n
of multiple paths to the destination (of equal or unequal cost).
* =B3The=20
   routing protocol SHOULD make use of the fact that if not being able
   to deliver a packet, it is most likely that the sending node moved;
   rather than a failure occurred in that node or in a link on the path
   towards it. =B3
JP> And ??
* =B3The routing protocol MUST support the recognition of neighbors and
   periodical scanning.=B2
JP> By periodical scanning you mean =B3Keep alive=B2 ? Then you may want to
indicate some frequency since it may contradict with your next statement:
=B3This process SHOULD preserve energy capacity as much as possible=B2.
* =B3Thus, the routing protocol MUST support 250 devices in a subnet.
   The routing protocol SHOULD support 2500 devices in a subnet. =B3
JP> Why in a subnet? You mean in the =B3network=B2
* Section 4.7
    - I would suggest not to use the PAN terminology
    - s/=B2From ROLL perspective,=B2/=B2From a routing perspective=B2
* =B3The routing protocol MUST support the ability to isolate a
   misbehaving node thus preserving the correct operation of overall
   network. =B3
This is a fairly important requirement, although it may end up being an
implementation issue, which will be determined once we will get to the
routing solution. But this requirement is not about manageability but
network stability. Could you make it a dedicated section ?

Section 5
#########
* Just to avoid ambiguity, please clarify the term =B3any-to-one=B2 (which may
interpreted as Multipoint-to-point)

Section 7
#########
I would have similar comments on this section as for the Urban routing
requirement documents. You may want to focus on routing security issues and
work with the security expert that will be appointed.


Other comments:=20
- Please capitalize each first letter of each word in titles (3.7.3.
Healthcare routing considerations  =3D> 3.7.3. Healthcare Routing
Considerations )
- Add the other application specific routing requirements documents as
informative references

Thanks.

JP.


--B_3302206395_43592693
Content-type: text/html;
	charset="ISO-8859-1"
Content-transfer-encoding: quoted-printable

<HTML>
<HEAD>
<TITLE>Review of draft-ietf-roll-home-routing-reqs-02 </TITLE>
</HEAD>
<BODY>
<FONT SIZE=3D"2"><FONT FACE=3D"Calibri, Verdana, Helvetica, Arial"><SPAN STYLE=3D=
'font-size:12pt'>Dear WG,<BR>
<BR>
As discussed in Dublin, the plan is to try to Last Call all the application=
-specific routing requirements document before end of September. Thus, pleas=
e provide your detailed comments as soon as possible.<BR>
<BR>
Here is my co-chair review on the Home Automation Routing Requirements. <BR=
>
<BR>
Comments are not by order of importance by in chronological order.<BR>
<BR>
First comments: as discussed in Dublin, could you please try to quickly add=
ress the routing security issues.<BR>
<BR>
Abstract<BR>
#######<BR>
<BR>
* S/ ROuting in Low power and Lossy networks (ROLL)/ Routing Over Low power=
 and Lossy networks (ROLL) // Also in the terminology section //<BR>
* &#8220;Examples include lighting control, <BR>
&nbsp;&nbsp;&nbsp;heating control, sensors, leak detectors, healthcare syst=
ems and <BR>
&nbsp;&nbsp;&nbsp;advanced remote controls.&#8221;<BR>
JP&gt; Don&#8217;t you want to classify with sensor (water leak, motion, he=
althcare systems...), actuators (lighting, ....)<BR>
* Thanks to substitute the term &#8220;multi-hop routing&#8221; by &#8220;r=
outing&#8221; (explain that in a typical home all the nodes are not in direc=
t range). It appears in several sections.<BR>
* I think that the terminology section requires some work but I&#8217;ll se=
nd a separate email thread on the ROLL WG mailing list. For the time being, =
I would suggest to remove the ROLL Node, ROLL network, ... terminology. You =
may just want to a node where a node may be a sensor, actuator, ... Unless y=
ou need to refer to a particular function of the node.<BR>
<BR>
Please re-order sections so that Introduction becomes Section 1.<BR>
<BR>
Introduction Section<BR>
#################<BR>
<BR>
* s/ gas/water leak detectors/ gas/water leak sensor =3D&gt; JP&gt; Good to u=
se the term sensor not to introduce new term (detector)<BR>
* &#8220;Basic home control <BR>
&nbsp;&nbsp;&nbsp;modules such as wall switches and plug-in modules may be =
turned into <BR>
&nbsp;&nbsp;&nbsp;an advanced home automation solution via the use of an IP=
-enabled <BR>
&nbsp;&nbsp;&nbsp;application responding to events generated by wall switch=
es, motion <BR>
&nbsp;&nbsp;&nbsp;sensors, light sensors, rain sensors, and so on. &#8220;<=
BR>
JP&gt; You may want to explain that wall switched are then actuators. We co=
uld also have embedded power sensor in plug-in modules but I guess that you =
refer to actuators here.<BR>
* &#8220;These requirements may be overlapping requirements <BR>
&nbsp;&nbsp;&nbsp;derived from other application-specific requirements. &#8=
220;<BR>
JP&gt; Good place to reference the other IDs: &nbsp;<FONT COLOR=3D"#0000FF"><=
U><a href=3D"http://www.ietf.org/internet-drafts/draft-ietf-roll-home-routing-=
reqs-02.txt">http://www.ietf.org/internet-drafts/draft-ietf-roll-home-routin=
g-reqs-02.txt</a></U></FONT>, <FONT COLOR=3D"#0000FF"><U><a href=3D"http://www.i=
etf.org/internet-drafts/draft-ietf-roll-indus-routing-reqs-01.txt">http://ww=
w.ietf.org/internet-drafts/draft-ietf-roll-indus-routing-reqs-01.txt</a></U>=
</FONT> and <FONT COLOR=3D"#0000FF"><U><a href=3D"http://www.ietf.org/internet-d=
rafts/draft-martocci-roll-commercial-routing-reqs-00.txt">http://www.ietf.or=
g/internet-drafts/draft-martocci-roll-commercial-routing-reqs-00.txt</a></U>=
</FONT>. + Update the reference section<BR>
<BR>
Section 3<BR>
########<BR>
<BR>
* &#8220;Home automation applications represent a special segment of networ=
ked <BR>
&nbsp;&nbsp;&nbsp;wireless devices with its unique set of requirements.&#82=
21;<BR>
JP&gt; You may want to say that home networks may also comprise wired link =
(e.g.PLC)<BR>
* &#8220;For instance a lamp may be turned on, not only be a <BR>
&nbsp;&nbsp;&nbsp;wall switch but also from a movement sensor. &#8220;<BR>
JP&gt; Don&#8217;t you want to move this to Section 3.1 and try to slightly=
 generalize the Section 3.1 to &#8220;lighting application&#8221;.<BR>
* &#8220;Geographical areas using central heating may turn off heating when=
 <BR>
&nbsp;&nbsp;&nbsp;not at home and use a reduced temperature during night ti=
me. <BR>
<BR>
&nbsp;&nbsp;&nbsp;The power grid may experience periods where more wind-gen=
erated power <BR>
&nbsp;&nbsp;&nbsp;is produced than is needed. Typically this may happen dur=
ing night <BR>
&nbsp;&nbsp;&nbsp;hours. The washing machine and dish washer may just as we=
ll work <BR>
&nbsp;&nbsp;&nbsp;while power is cheap. The electric car should also charge=
 its <BR>
&nbsp;&nbsp;&nbsp;batteries on cheap power. <BR>
<BR>
&nbsp;&nbsp;&nbsp;In periods where electricity demands exceed available sup=
ply, <BR>
&nbsp;&nbsp;&nbsp;appliances such as air conditioning, climate control syst=
ems, washing <BR>
&nbsp;&nbsp;&nbsp;machines etc. can be turned off to avoid overloading the =
power grid. &#8220;<BR>
JP&gt; Great example. When you refer to this kind of application you may wa=
nt to use the term DR (demand-response) and SDM (Demand Side management) als=
o listed in the Urban routing requirement ID. <BR>
* &#8220;Wireless remote control of the household appliances is well-suited=
 <BR>
&nbsp;&nbsp;&nbsp;for this application. &#8220; and &#8220; Moreover, in or=
der to achieve <BR>
&nbsp;&nbsp;&nbsp;effective electricity savings, the energy monitoring appl=
ication <BR>
&nbsp;&nbsp;&nbsp;running on the Wireless Sensor Network (WSN)&#8221;<BR>
JP&gt; Well it is not just wireless but also wired (PLC). You may want to s=
ay &#8220;Remote control ...&#8221;.<BR>
* Section 3.4: This is an important section. Two comments:<BR>
&nbsp;&nbsp;&nbsp;&nbsp;- This is not just for lighting devices (referring =
to the title)<BR>
&nbsp;&nbsp;&nbsp;&nbsp;- Distribution of unique address may not always be =
performed by a central contoller<BR>
* &#8220;A <BR>
&nbsp;&nbsp;&nbsp;home automation controller sending commands to window sha=
des via ROLL <BR>
&nbsp;&nbsp;&nbsp;devices will have no problems delivering the packet to th=
e router, <BR>
&nbsp;&nbsp;&nbsp;but the router may have to wait for some time before the =
command can <BR>
&nbsp;&nbsp;&nbsp;be delivered to the window shades if the receiver is slee=
ping;&#8221;<BR>
JP&gt; You may want to clarify the paragraph above. I guess that in your ex=
ample: the router is the node immediately upstream to the destination, and t=
he window shades destination=3Dreceiver (actuator)? =3D&gt; means buffering on r=
outers. No need to ellaborate more though, since this is not related to rout=
ing requirements. The 250ms refer to the wake-up time ?<BR>
* s/&#8221;which can be <BR>
&nbsp;&nbsp;&nbsp;triggered by the end-user that has received an alarm from=
 a movement <BR>
&nbsp;&nbsp;&nbsp;sensor or smoke detector - or the user simply wants to ch=
eck the home <BR>
&nbsp;&nbsp;&nbsp;status via video. &#8220;/&#8221;which can be <BR>
&nbsp;&nbsp;&nbsp;triggered by the end-user that has received an alarm from=
 sensor (movement <BR>
&nbsp;&nbsp;&nbsp;or smoke detector) or the user that simply wants to check=
 the home <BR>
&nbsp;&nbsp;&nbsp;status via video. &#8220; &nbsp;&nbsp;<BR>
* PDA: please expand acronym when first used.<BR>
* s/&#8220;From a ROLL perspective, all the above-mentioned applications ma=
y run <BR>
&nbsp;&nbsp;&nbsp;on battery.&#8221;/&#8221;Because all of the above-mentio=
ned applications may run on battery, this leads to specific requirements for=
 the routing protocol.&#8221;<BR>
* &#8220;A home security alarm system is comprised of various devices like =
<BR>
&nbsp;&nbsp;&nbsp;vibration detectors, fire or carbon monoxide detection sy=
stem, door <BR>
&nbsp;&nbsp;&nbsp;or window contacts, glass-break detector, presence sensor=
, panic <BR>
&nbsp;&nbsp;&nbsp;button, home security key.&#8221;<BR>
JP&gt; Sorry to be &#8220;picky&#8221; with the terminology but could you c=
lassify as sensors, actuators, ... ? Thanks.<BR>
* &#8220;When a node (or a group of nodes) identifies a risk situation (e.g=
. <BR>
&nbsp;&nbsp;&nbsp;intrusion, smoke, fire), it sends an alarm message to the=
 control <BR>
&nbsp;&nbsp;&nbsp;centre that could autonomously forward it via Internet or=
 interact <BR>
&nbsp;&nbsp;&nbsp;with the WSN (e.g. trying to obtain more detailed informa=
tion or <BR>
&nbsp;&nbsp;&nbsp;asking to other nodes close to the alarm event).&#8221;<B=
R>
JP&gt; Define the &#8220;control centre&#8221; as a local device.<BR>
* s/&#8220;RAM memory&#8221;/RAM and expand the term RAM<BR>
<BR>
Section 4<BR>
#########<BR>
* s/&#8221;Home automation applications have a number of specific requireme=
nts <BR>
&nbsp;&nbsp;&nbsp;related to the set of home networking applications and th=
e perceived <BR>
&nbsp;&nbsp;&nbsp;operation of the system.&#8221;/&#8221;Home automation ap=
plications have a number of specific routing requirements <BR>
&nbsp;&nbsp;&nbsp;related to the set of home networking applications and th=
e perceived <BR>
&nbsp;&nbsp;&nbsp;operation of the system.&#8221;<BR>
* &#8220;Broadcast and groupcast in home automation MAY be used to deliver =
the <BR>
&nbsp;&nbsp;&nbsp;illusion that all recipients respond simultaneously. Dist=
ant <BR>
&nbsp;&nbsp;&nbsp;recipients out of direct range may not react to the (unac=
knowledged) <BR>
&nbsp;&nbsp;&nbsp;groupcast. &nbsp;Acknowledged unicast delivery MUST be us=
ed subsequently. &#8220;<BR>
JP&gt; These are not routing requirements. If you require the support of &#=
8220;groupcast routing&#8221; (e.g. Minimization of packet duplication) then=
 it is indeed a routing requirement, in which case there are other implicati=
ons on addressing. Is it what is being required here ? Clearly the second st=
atement related to acknowledgment delivery is NOT a routing requirement.<BR>
* Ah indeed I now read &#8220;The support of unicast, groupcast and broadca=
st also has an <BR>
&nbsp;&nbsp;&nbsp;implication on the addressing scheme and are outside the =
scope of <BR>
&nbsp;&nbsp;&nbsp;this document that focuses on the routing requirements as=
pects. &#8220; So do you want to clarify the routing specific requirement fo=
r Groupcast ?<BR>
* Same issue here &#8220;It MUST be to possible to address a group of recei=
vers known by the <BR>
&nbsp;&nbsp;&nbsp;sender even if the receivers do not know that they have b=
een grouped <BR>
&nbsp;&nbsp;&nbsp;by the sender.&#8221;<BR>
* &#8220;The routing protocol should either share the load between <BR>
&nbsp;&nbsp;&nbsp;nodes to preserve battery or only route via mains-powered=
 nodes if <BR>
&nbsp;&nbsp;&nbsp;possible.&#8221;<BR>
JP&gt; Is it a &#8220;should&#8221; or a &#8220;SHOULD&#8221;. If a &#8220;=
SHOULD&#8221; this translates to the support of load balancing (symmetrical =
or asymetrical), thus the computation of multiple paths to the destination (=
of equal or unequal cost).<BR>
* &#8220;The <BR>
&nbsp;&nbsp;&nbsp;routing protocol SHOULD make use of the fact that if not =
being able <BR>
&nbsp;&nbsp;&nbsp;to deliver a packet, it is most likely that the sending n=
ode moved; <BR>
&nbsp;&nbsp;&nbsp;rather than a failure occurred in that node or in a link =
on the path <BR>
&nbsp;&nbsp;&nbsp;towards it. &#8220;<BR>
JP&gt; And ??<BR>
* &#8220;The routing protocol MUST support the recognition of neighbors and=
 <BR>
&nbsp;&nbsp;&nbsp;periodical scanning.&#8221;<BR>
JP&gt; By periodical scanning you mean &#8220;Keep alive&#8221; ? Then you =
may want to indicate some frequency since it may contradict with your next s=
tatement: &#8220;This process SHOULD preserve energy capacity as much as pos=
sible&#8221;. <BR>
* &#8220;Thus, the routing protocol MUST support 250 devices in a subnet. <=
BR>
&nbsp;&nbsp;&nbsp;The routing protocol SHOULD support 2500 devices in a sub=
net. &#8220;<BR>
JP&gt; Why in a subnet? You mean in the &#8220;network&#8221;<BR>
* Section 4.7<BR>
&nbsp;&nbsp;&nbsp;&nbsp;- I would suggest not to use the PAN terminology<BR=
>
&nbsp;&nbsp;&nbsp;&nbsp;- s/&#8221;From ROLL perspective,&#8221;/&#8221;Fro=
m a routing perspective&#8221;<BR>
* &#8220;The routing protocol MUST support the ability to isolate a <BR>
&nbsp;&nbsp;&nbsp;misbehaving node thus preserving the correct operation of=
 overall <BR>
&nbsp;&nbsp;&nbsp;network. &#8220;<BR>
This is a fairly important requirement, although it may end up being an imp=
lementation issue, which will be determined once we will get to the routing =
solution. But this requirement is not about manageability but network stabil=
ity. Could you make it a dedicated section ?<BR>
<BR>
Section 5<BR>
#########<BR>
* Just to avoid ambiguity, please clarify the term &#8220;any-to-one&#8221;=
 (which may interpreted as Multipoint-to-point) <BR>
<BR>
Section 7<BR>
#########<BR>
I would have similar comments on this section as for the Urban routing requ=
irement documents. You may want to focus on routing security issues and work=
 with the security expert that will be appointed.<BR>
<BR>
<BR>
Other comments: <BR>
- Please capitalize each first letter of each word in titles (3.7.3. Health=
care routing considerations &nbsp;=3D&gt; 3.7.3. Healthcare Routing Considerat=
ions )<BR>
- Add the other application specific routing requirements documents as info=
rmative references<BR>
<BR>
Thanks.<BR>
<BR>
JP.<BR>
</SPAN></FONT></FONT>
</BODY>
</HTML>


--B_3302206395_43592693--


--===============0844671696==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Roll mailing list
Roll@ietf.org
https://www.ietf.org/mailman/listinfo/roll

--===============0844671696==--



From roll-bounces@ietf.org  Thu Aug 21 16:15:25 2008
Return-Path: <roll-bounces@ietf.org>
X-Original-To: roll-archive@ietf.org
Delivered-To: ietfarch-roll-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id ACF793A6BAB;
	Thu, 21 Aug 2008 16:15:25 -0700 (PDT)
X-Original-To: roll@ietf.org
Delivered-To: roll@core3.amsl.com
Received: by core3.amsl.com (Postfix, from userid 0)
	id D1F2A3A67A1; Thu, 21 Aug 2008 16:15:01 -0700 (PDT)
From: Internet-Drafts@ietf.org
To: i-d-announce@ietf.org
Content-Type: Multipart/Mixed; Boundary="NextPart"
Mime-Version: 1.0
Message-Id: <20080821231501.D1F2A3A67A1@core3.amsl.com>
Date: Thu, 21 Aug 2008 16:15:01 -0700 (PDT)
Cc: roll@ietf.org
Subject: [Roll] I-D ACTION:draft-ietf-roll-protocols-survey-00.txt
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/roll>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=subscribe>
Sender: roll-bounces@ietf.org
Errors-To: roll-bounces@ietf.org

--NextPart

A New Internet-Draft is available from the on-line Internet-Drafts 
directories.
This draft is a work item of the Routing Over Low power and Lossy networks Working Group of the IETF.

	Title		: Overview of Existing Routing Protocols for Low Power and Lossy Networks
	Author(s)	: A. Tavakoli, S. Dawson-Haggerty, P. Levis
	Filename	: draft-ietf-roll-protocols-survey-00.txt
	Pages		: 21
	Date		: 2008-8-5
	
Networks of low power wireless devices introduce novel IP routing
   issues.  Low-power wireless devices, such as sensors, actuators and
   smart objects, have difficult constraints: very limited memory,
   little processing power, and long sleep periods.  As most of these
   devices are battery-powered, energy efficiency is critically
   important.  Wireless link qualities can vary significantly over time,
   requiring protocols to make agile decisions yet minimize topology
   change energy costs.  Routing over such low power and lossy networks
   has requirements that existing mesh protocols only partially address.
   This document provides a brief survey of the strengths and weaknesses
of existing protocols with respect to this class of networks.  It
   provides guidance on how lessons from existing and prior efforts can
   be leveraged in future protocol design.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-roll-protocols-survey-00.txt

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

--NextPart
Content-Type: Message/External-body;
	name="draft-ietf-roll-protocols-survey-00.txt";
	site="ftp.ietf.org";
	access-type="anon-ftp";
	directory="internet-drafts"

Content-Type: text/plain
Content-ID: <2008-8-21161405.I-D@ietf.org>


--NextPart
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Roll mailing list
Roll@ietf.org
https://www.ietf.org/mailman/listinfo/roll

--NextPart--



From roll-bounces@ietf.org  Fri Aug 22 01:30:54 2008
Return-Path: <roll-bounces@ietf.org>
X-Original-To: roll-archive@ietf.org
Delivered-To: ietfarch-roll-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 7CC4C3A683C;
	Fri, 22 Aug 2008 01:30:54 -0700 (PDT)
X-Original-To: roll@core3.amsl.com
Delivered-To: roll@core3.amsl.com
Received: from localhost (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 1AD1528C11C
	for <roll@core3.amsl.com>; Fri, 22 Aug 2008 01:20:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.184
X-Spam-Level: 
X-Spam-Status: No, score=-0.184 tagged_above=-999 required=5
	tests=[BAYES_40=-0.185, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32])
	by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id 9of1LqHI7cZM for <roll@core3.amsl.com>;
	Fri, 22 Aug 2008 01:20:24 -0700 (PDT)
Received: from mail.zen-sys.com (mail.zen-sys.com [195.215.56.170])
	by core3.amsl.com (Postfix) with ESMTP id 16C873A6A51
	for <roll@ietf.org>; Fri, 22 Aug 2008 01:20:23 -0700 (PDT)
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Date: Fri, 22 Aug 2008 10:20:02 +0200
Message-ID: <6D9687E95918C04A8B30A7D6DA805A3EB68D7A@zensys17.zensys.local>
In-Reply-To: <C4D38E18.4FB44%jvasseur@cisco.com>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: [Roll] Aligning Terminology across ROLL Routing
	RequirementsDocuments
Thread-Index: AckDw9q7L5M0IvVf8EGd9qOQInzFGgAa9d2A
References: <C4D38E18.4FB44%jvasseur@cisco.com>
From: "Anders Brandt" <abr@zen-sys.com>
To: <roll@ietf.org>
Subject: Re: [Roll] Aligning Terminology across ROLL Routing
	RequirementsDocuments
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/roll>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============0387717101=="
Sender: roll-bounces@ietf.org
Errors-To: roll-bounces@ietf.org

This is a multi-part message in MIME format.

--===============0387717101==
Content-class: urn:content-classes:message
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C9042F.DFEB80D8"

This is a multi-part message in MIME format.

------_=_NextPart_001_01C9042F.DFEB80D8
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Great.
I have been missing that too, but did not get all the way to writing a
proposal ...
=20
Cheers,
  Anders

________________________________

From: roll-bounces@ietf.org [mailto:roll-bounces@ietf.org] On Behalf Of
JP Vasseur
Sent: 21. august 2008 21:27
To: roll@ietf.org
Subject: [Roll] Aligning Terminology across ROLL Routing
RequirementsDocuments


Dear WG,

Since there are quite a few inconsistencies between the terms used
across the various ROLL WG ID, I will try to quickly prepare a short ID
on Terminology that could be referenced in all ROLL documents.=20

Let me know if you have comments.

Thanks.

JP.=20

------_=_NextPart_001_01C9042F.DFEB80D8
Content-Type: text/html;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD><TITLE>Aligning Terminology across ROLL Routing Requirements =
Documents</TITLE>
<META http-equiv=3DContent-Type content=3D"text/html; =
charset=3Dus-ascii">
<META content=3D"MSHTML 6.00.6000.16705" name=3DGENERATOR></HEAD>
<BODY>
<DIV dir=3Dltr align=3Dleft><FONT face=3DArial color=3D#0000ff =
size=3D2><SPAN=20
class=3D723451808-22082008>Great.<BR>I have been missing that too, but =
did not get=20
all the way to writing a proposal ...</SPAN></FONT></DIV>
<DIV dir=3Dltr align=3Dleft><FONT face=3DArial color=3D#0000ff =
size=3D2><SPAN=20
class=3D723451808-22082008></SPAN></FONT>&nbsp;</DIV>
<DIV dir=3Dltr align=3Dleft><FONT face=3DArial color=3D#0000ff =
size=3D2><SPAN=20
class=3D723451808-22082008>Cheers,<BR>&nbsp; =
Anders</SPAN></FONT></DIV><BR>
<DIV class=3DOutlookMessageHeader lang=3Den-us dir=3Dltr align=3Dleft>
<HR tabIndex=3D-1>
<FONT face=3DTahoma size=3D2><B>From:</B> roll-bounces@ietf.org=20
[mailto:roll-bounces@ietf.org] <B>On Behalf Of </B>JP =
Vasseur<BR><B>Sent:</B>=20
21. august 2008 21:27<BR><B>To:</B> roll@ietf.org<BR><B>Subject:</B> =
[Roll]=20
Aligning Terminology across ROLL Routing=20
RequirementsDocuments<BR></FONT><BR></DIV>
<DIV></DIV><FONT face=3D"Calibri, Verdana, Helvetica, Arial"><SPAN=20
style=3D"FONT-SIZE: 13pt">Dear WG,<BR><BR>Since there are quite a few=20
inconsistencies between the terms used across the various ROLL WG ID, I =
will try=20
to quickly prepare a short ID on Terminology that could be referenced in =
all=20
ROLL documents. <BR><BR>Let me know if you have=20
comments.<BR><BR>Thanks.<BR><BR>JP.</SPAN></FONT> </BODY></HTML>

------_=_NextPart_001_01C9042F.DFEB80D8--

--===============0387717101==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Roll mailing list
Roll@ietf.org
https://www.ietf.org/mailman/listinfo/roll

--===============0387717101==--


From roll-bounces@ietf.org  Fri Aug 22 02:40:59 2008
Return-Path: <roll-bounces@ietf.org>
X-Original-To: roll-archive@ietf.org
Delivered-To: ietfarch-roll-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 624C83A68EC;
	Fri, 22 Aug 2008 02:40:59 -0700 (PDT)
X-Original-To: roll@core3.amsl.com
Delivered-To: roll@core3.amsl.com
Received: from localhost (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id D8E6F28C137
	for <roll@core3.amsl.com>; Fri, 22 Aug 2008 02:26:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.184
X-Spam-Level: 
X-Spam-Status: No, score=-2.184 tagged_above=-999 required=5 tests=[AWL=2.187, 
	BAYES_00=-2.599, GB_I_LETTER=-2, HTML_MESSAGE=0.001,
	SARE_SUB_OBFU_Q1=0.227]
Received: from mail.ietf.org ([64.170.98.32])
	by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id nfXLMZwju7P4 for <roll@core3.amsl.com>;
	Fri, 22 Aug 2008 02:25:51 -0700 (PDT)
Received: from scorpius.cttc.es (scorpius.cttc.es [84.88.62.197])
	by core3.amsl.com (Postfix) with ESMTP id 24BAD3A696D
	for <roll@ietf.org>; Fri, 22 Aug 2008 02:25:49 -0700 (PDT)
Received: from castor (postfix@castor.cttc.es [84.88.62.196])
	by scorpius.cttc.es (8.13.8/8.13.5) with ESMTP id m7M9NSQ9026430;
	Fri, 22 Aug 2008 11:23:28 +0200
Received: from CTTCPCMDOHLER (pcmdohler.cttc.es [84.88.61.89])
	by castor (Postfix) with ESMTP id C8E7E2FC284;
	Fri, 22 Aug 2008 11:23:27 +0200 (CEST)
From: "Mischa Dohler" <mischa.dohler@cttc.es>
To: <christian.jacquenet@orange-ftgroup.com>,
	"'JP Vasseur'" <jvasseur@cisco.com>,
	"'Tim Winter'" <tim.winter@ekasystems.com>,
	"'WATTEYNE Thomas RD-TECH'" <thomas.watteyne@orange-ftgroup.com>,
	"'MADHUSUDAN Giyyarpuram RD-TECH'"
	<giyyarpuram.madhusudan@orange-ftgroup.com>, 
	"'CHEGARAY Gabriel RD-TECH'" <gabriel.chegaray@orange-ftgroup.com>,
	"'BARTHEL Dominique RD-TECH'" <dominique.barthel@orange-ftgroup.com>,
	<roll@ietf.org>
Date: Fri, 22 Aug 2008 11:20:41 +0200
Organization: CTTC
MIME-Version: 1.0
X-Mailer: Microsoft Office Outlook, Build 11.0.5510
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3350
In-Reply-To: <53DE7AEBE1DD5741A44C3634276819220344C1B3@PMEXCB30.intranet-paris.francetelecom.fr>
Thread-Index: AckDxCXVl9keGlV0jkulakQaFFRIHQAAdXyAABs8CCA=
Message-Id: <20080822092327.C8E7E2FC284@castor>
X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.0
	(castor); Fri, 22 Aug 2008 11:23:28 +0200 (CEST)
X-Scanned-By: MIMEDefang 2.57 on 84.88.62.197
Cc: "'David E. Culler'" <culler@cs.berkeley.edu>
Subject: Re: [Roll] Review of draft-ietf-roll-urban-routing-reqs-01
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: mischa.dohler@cttc.es
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/roll>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============1115744616=="
Sender: roll-bounces@ietf.org
Errors-To: roll-bounces@ietf.org

This is a multi-part message in MIME format.

--===============1115744616==
Content-Type: multipart/alternative;
	boundary="----=_NextPart_000_00BE_01C90449.1CA63C70"

This is a multi-part message in MIME format.

------=_NextPart_000_00BE_01C90449.1CA63C70
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit

Thanks, JP, indeed, for this in-depth review. I propose that Tim takes care
of all the small typos identified by JP. Some comments in-line in addition
to Christian ones. Thanks to all and kind regards, Mischa.

 

  _____  

From: christian.jacquenet@orange-ftgroup.com
[mailto:christian.jacquenet@orange-ftgroup.com] 
Sent: Thursday, August 21, 2008 11:02 PM
To: JP Vasseur; Mischa Dohler; Tim Winter; WATTEYNE Thomas RD-TECH;
MADHUSUDAN Giyyarpuram RD-TECH; CHEGARAY Gabriel RD-TECH; BARTHEL Dominique
RD-TECH; roll@ietf.org
Cc: David E. Culler
Subject: RE: Review of draft-ietf-roll-urban-routing-reqs-01

 

Dear all,

 

Thanks to Jean-Philippe for this thorough review. Please find a first shot
of personal comments inline, but I'll let my fellow co-authors further
elaborate accordingly.

 

[CJ] [snip] 
Abstract
#######
s/ for a wireless ROLL solution to be useful the protocol(s) ought to be
energy-efficient, scalable, and autonomous/ the routing solution ought to be
energy-efficient, scalable and autonomous.

JP> You may want to use a different word than "Autonomous". Do you refer to
the "self configuration" property ?
[CJ] We chose "autonomous" because it was generic enough, while I think
"self configuration" is too restrictive: it's not only a matter of
configuration, it's also a matter of making (forwarding) decisions,
self-healing capabilities, etc. Another word I would suggest is
"self-organizing", if this is more specific. 
[Mischa] We had long discussions on this and finally converged to <
autonomous >. Let's leave it. 


Section 1
#######
* "Section 6 discusses the routing requirements for networks comprising
   such constrained devices in a U-LLN environment.  These requirements
   may be overlapping requirements derived from other application-
   specific requirements documents or as listed in
   [I-D.culler-rl2n-routing-reqs]."

JP> Please remove this reference (ID abandoned) and insert reference to
<http://www.ietf.org/internet-drafts/draft-ietf-roll-home-routing-reqs-02.tx
t>
http://www.ietf.org/internet-drafts/draft-ietf-roll-home-routing-reqs-02.txt
,
<http://www.ietf.org/internet-drafts/draft-ietf-roll-indus-routing-reqs-01.t
xt>
http://www.ietf.org/internet-drafts/draft-ietf-roll-indus-routing-reqs-01.tx
t and
<http://www.ietf.org/internet-drafts/draft-martocci-roll-commercial-routing-
reqs-00.txt>
http://www.ietf.org/internet-drafts/draft-martocci-roll-commercial-routing-r
eqs-00.txt.
[CJ] OK. 

* s/ Section 7 provides an overview of security considerations/ Section 7
provides an overview of routing security considerations 
[CJ] OK. 

Section 2
########

* S/ ROLL: Routing over Low power and Lossy networks/ ROLL: Routing Over Low
power and Lossy networks
[CJ] OK. 

* Schedule:  An agreed execution, wake-up, transmission, reception,
         etc., time-table between two or more field devices.
The definition is a little bit too vague. If used in the generic sense, no
need to add it to the terminology section. Otherwise, it ought to be more
specific.
[CJ] Schedule is indeed very generic, but I think the sue of the word makes
perfect sense in the context of U-WSN networks. Being more specific would
mean elaborating on use cases where schedule information is taken into
account by field devices to perform some specific action. If this proposal
makes sense, I'm not sure the terminology section is appropriate for such
elaboration and would therefore suggest we (1) keep the "schedule"
definition in this section and (2) further elaborate on a use case that
illustrates the use of schedule information in section 5 of the draft. 

[Mischa] I don't see why this is vague. This is very clear to me. Let's
leave it as is (I guess we do not need to find the maximum entropy of this
document; the routing solution won't get better due to this :-)).



Section 3.1.1
###########
* S/ pre- planned location/ pre-planned location
[CJ] OK. 

* What you refer to as a repeater is in fact a router. What I would suggest
here is to reword this paragraph to indicate that some nodes are simple
routers whereas other nodes are routers and lso perform sensing/actuating
task. Insert this paragraph after the Actuators and Sensors paragraphs.
[CJ] So you're suggesting to (1) remove section 3.1.2 (not 3.1.1, actually),
and (2) indicate that some nodes are routers (not "simple", btw :-), others
also perform sensing/actuating tasks, right? I'm fine with this suggestion,
but I'd like to hear the feedback from my colleagues. It's also worth
mentioning that a "repeater" has a very specific meaning in "classical"
networking environments, remembering the old days of FOIRL and the
like...that may be another reason to avoid the use of this notion within the
roll context.
[Mischa] We had this discussion before and the reason outlined by Christian
is exactly why the thingy is called repeater and not router. 

 

* "Actuators may generally be mobile but are likely to be static in the
majority of near-future roll-outs": seems a bit contradictory. Don't you
want to simply say that in a near-future the majority will be static?
[CJ] Not quite, because actuators can be devices used by people who move
from one place to another to check how the sensor network is doing. I think
both cases are valid, and would therefore stick to the current wording. 

[Mischa] When I wrote this I had more in mind what JP said in shortened
form. I personally hence propose to change as suggested by JP.



* "Similar to the access points, actuator nodes do not suffer from any
long-term resource constraints." what about battery-operated actuators ?
[CJ] I'll leave that one to my colleagues :-) 
[Mischa] This is a difficult one. It clearly depends on the application,
which even in the urban context can be infinite. There will be applications
where acting nodes just switch something or reset something and hence need
minimal energy allowing them to operate on batteries and hence be < resource
constrained >. Other applications will require actuators which need to do
heavy stuff with loads of energy, one hence needs the mains. I propose to
change it to reflect the two cases < Actuator node may also suffer from any
. >  


Section 3.1.4
###########
* "pollution data, such as polluting gases (SO2, NOx, CO, Ozone),
 heavy metals (e.g.  Mercury), pH, radioactivity, etc;" => please expand
acronym when first used.
[CJ] Hmmm...I don't see too many acronyms in that sentence, actually. This
is chemistry stuff, unless you're suggesting we provide the "lettered"
designation of these substances like carbon oxyde, etc.? I wouldn't go that
way... 

[Mischa] :-) I agree with Christian. Let's leave that basic stuff which I
think is part of SI and hence does not need to spelled out.



* "These meters will be capable of
   advanced sensing functionalities such as measuring quality of
   service, providing granular interval data, or automating the
   detection of alarm conditions."
You may want to more accurately define the term "quality of service" since
as you know, we used that term of other purposes in IETF documents.
[CJ] Agreed. Since this is a list of examples, I would suggest something
like "measuring the quality of the water provided to the customers".
[Mischa] I agree with both.


* In addition they may be capable of
   advanced interactive functionalities such as remote service
   disconnect or remote demand reset." => in this case, they are also acting
as actuators.
[CJ] Agreed. 
[Mischa] I agree.


Section 3.2 
#########

* s/ between one other/between each other
[CJ] OK. 

* "The network MUST be capable of supporting the organization of
   a large number of sensing nodes into regions containing on the order
   of 10^2 to 10^4 sensing nodes each."
JP> Thanks to make this "MUST" routing-specific and move it to the
requirements section.
[CJ] Agreed - would suggest this should be the introductory sentence of
section 6.1. 
[Mischa] I agree with both.


Section 3.3
#########

* RFID: expand acronym (Radio Frequency IDentification) and add to the
terminology section
[CJ] OK. 

* s/battery-powered nodes/battery powered nodes
[CJ] OK. 
"Sensor nodes are capable of forwarding data." In other words, they can act
as routers. No need to repeat this here.
[CJ] Fair enough. 

Section 3.4
#########

* "2.  packet errors due to medium access control;" JP> It is not really
"packet error" here.
[CJ] Do you mean "transmission erros"? If so, I would agree with you that
this wording is better, but then I guess it should be used for first three
cases, right? 
[Mischa] Collision resulting from poor MAC yield packet errors. We had
discussed this section numerous times. I propose to leave it as is.


* Some available protocols may cause packets of neighbouring nodes to
collide and hence cause a link outage." JP> You may want to be more specific
"Some" ?
[CJ] Do you mean examples, because the previous sentence mentions the L2
protocols this sentence refers to?
[Mischa] Yes, this is a L 2 issue and I am a little confused here : at one
iterative point you insist to minimize if not delete all references to L2
and here you ask to be more specific. I give you an example for you to
understand but propose this not to be included : reservation based MACs can
guarantee a collision-free schedule whereas contention-based MACs, MACs with
common schedules and preamble-based MACs cannot. Therefore < some >. 


* "if ISM bands are to be used.  For instance, if the 2.4GHz ISM band is
   used to facilitate communication between U-LLN nodes, then heavily
   loaded WLAN hot-spots become a detrimental performance factor
   jeopardizing the functioning of the U-LLN."
JP> Please expand acronym when first used and add to the terminology section
(ISM, WLAN, ...)
[CJ] OK. 

* Don't you want to say a few words about the varying BER leading to
potentially even higher packet error loss ratio?
[CJ] Expand the acronym ;-) I agree, bit error rate considerations should
deserve a couple of sentences in this section. 
[Mischa] We purposedly don't talk about BER but about PER - they are VERY
different, mainly because you can use different channel codes. For instance,
a BCH code which is capable of correcting 5 errors does not care much about
small BER variations. Large changes, however, will effect the performance
but we are effecitvely interested in PER. I personally think that all needed
information is in there. 


Section 4.1
#########

* "Pre-programmed MAC": expand acronym
[CJ] OK. 

* "the autonomous organization" => self-organizing?
[CJ] Much better indeed. 

* "For example, nodes in urban sensor nodes SHOULD be able to:" => Several
of the requirements that follow are nor routing specific. You may either
want to change the SHOULD for a "should" or just focus on the routing
aspects and move them to the routing requirements section.
[CJ] They may not be routing specific, but I think they do affect how
routing policies are enforced. I woudl therefore suggest we stick to the
proposed wording. 
[Mischa] I tend to agree with Christian.


* "o  Dynamically compute, select and possibly optimize the (multiple)
      path(s) that will be used by the participating devices to forward
      the traffic towards the actuators and/or the access point
      according to the service-specific and traffic-specific QoS,
      traffic engineering and security policies that will have to be
      enforced at the scale of a routing domain (that is, a set of
      networking devices administered by a globally unique entity), or a
      region of such domain (e.g. a metropolitan area composed of
      clusters of sensors)."
JP> You list important and stringent requirements here. Do you really need a
routing algorithms capable of computing a path on a per QoS/service
specific/... Basis ?
[CJ] I don't read this sentence as you do. What I meant here is that
entities that operate urban sensor networks specify their own policies
(routing, te, security, QoS, etc.), which may be service-specific. The
requirement suggests that the devices involved in the enforcement of such
policies should behave accordingly, that is, compute, select, establish and
maintain paths whose characteristics comply with these policies. But I agree
this is a strong requirement, but not stronger than, say, the
self-organization requirement.
[Mischa] We only need to make sure that this is not a MUST requirement
because there are solutions out there which don't need all these
computations.


Section 4.2
#########

* "After the initialization phase and possibly some operational time,
   new nodes may be injected into the network as well as existing nodes
   removed from the network.  The former might be because a removed node
   is replaced or denser readings/actuations are needed or routing
   protocols report connectivity problems. "
JP> Just to avoid any mis-interpretation when referring to routing problem,
you mean that it may be desirable to inject to node because connectivity is
not sufficient (lack of enough redundant path, ...) and not because of a
routing issue per say.
[CJ] Not necessarily because connectivity is insufficient (new services,
network expansion, node maintenance, etc.), and not necessarily because
there is a routing issue, indeed. 

* "Differentiation
   SHOULD be made between node disappearance, where the node disappears
   without prior notification, and user or node-initiated disassociation
   ("phased-out"), where the node has enough time to inform the network
   about its removal."
JP> Again this is not a routing requirement. Unless you refer to the ability
for the routing protocol to advertise to the rest of the network that it
will be removed in order for the other node to re-compute their path and
avoid traffic disruption (e.g. Similarly to what we do with the ISIS
overload bit for example.) Is it what you mean ? 
[CJ] This is indeed what we meant (at least that's my reading of this
sentence, but I'll let my colleagues further comment on that). 

[Mischa] Yes, this is what we mean.

If so, please clarify and move the routing requirement (SHOULD in capital
letter to the routing requirement section).
[CJ] OK. 

* "The protocol(s) hence SHOULD support the pinpointing of problematic
routing areas"
JP> Could you clarify what you mean by "pinpointing" since it could be
interpreted in many ways? 
[CJ] Fair enough, we need to be more explicit. Maybe something like: "the
protocol should be able to convey information about malfunctioning nodes
which may affect or jeopardize the overall routing efficiency, so that
self-configuration capabilities of the sensor network might be solicited to
facilitate the appropriate reconfiguration."

[Mischa] And I would add < This information may e.g. be in the form of exact
or relative geographical position, etc. >



* The following section also requires some clarification - you wrote:
"Furthermore, to inform the
   access point(s) of the node's arrival and association with the
   network as well as freshly associated nodes about packet forwarding
   schedules, roles, etc, appropriate (link state) updating mechanisms
   SHOULD be supported."
JP> Are you explicitly requiring a Link State routing protocol or a routing
protocol that provides information about link states or ... ?
[CJ] We meant "a protocol that can provide information about link status",
indeed. 
[Mischa] I remind you however that this is SHOULD and not MUST.

Note that a requirement document should stay solution agnostic and stay
focus on the requirement. 
[CJ] Fully agreed. 

Is you requirement that any node needs to have visibility on other node
characteristics with no attempt of aggregation?
[CJ] Well, yes, presumably depending on design considerations: cluster head
vs. clients within the cluster, for example. I think this is typical Self
Organizing Networking capability.

Section 4.3
#########

* "The protocol(s) hence MUST support a large number of highly
   directional unicast flows from the sensing nodes or sensing clusters
   towards the access point or highly directed multicast or anycast
   flows from the nodes towards multiple access points."
JP> I think that what you mean is that the routing protocol MUST be
optimized for Multipoint-to-Point traffic patterns (from sensors/actuators
to Sink). As written, it is not clear whether you refer to it as a routing
requirement ?
[CJ] Agreed. 

[Mischa] No, our requirement is stronger. Multipoint can be from many < some
where > nodes to one sink. What we mean is many < geographically close >
nodes to one sink. This is an underlying property of WSNs and our routing
solutions HEAVILY rely on this.


This in fact what you wrote in section 6.5: "To this end, the routing
protocol(s) SHOULD support and utilize the fact of highly directed traffic
flow to facilitate scalability and parameter constrained routing."
[CJ] Correct. 

* s/ More generally, entire routing areas may be avoided at e.g. night but
heavily used during the day when nodes are scavenging from sunlight/ More
generally, entire routing areas may be avoided (e.g. at night) but heavily
used during the day when nodes are scavenging from sunlight.
JP> Doesn't this translate to the requirement for time-based routing (some
form of policy routing) ?
[CJ] Correct, but I don't see any harm in providing a practical example. 
[Mischa] I agree with Christian.


Section 4.4
#########

"However, they are not very stringent where
   latencies SHOULD simply be sufficiently smaller than typical
   reporting intervals"
JP> This is certainly true but not a routing requirement but a data plane
requirement unless you refer to the ability to support QoS aware routing
where each node may want to be able to compute different paths depending on
the traffic requirements?
[CJ] This is indeed related to the third bullet that appears in section 4.1.


* Move "U-LLN network devices SHOULD support unicast and multicast routing
capabilities" to the routing requirement section. You may want to leave the
sentence here (without a SHOULD).
[CJ] OK. 

* You use the term "anycast" that has been discussed in the past, in
particular in the context of the Home routing requirement document. I would
suggest to define this term in the document, refer to RFC4291 or RFC1546,
...
[CJ] Fully agreed. 

Section 4.5
#########

* "An alarm is likely being
   registered by a plurality of sensing nodes where the delivery of a
   single alert message with its location of origin suffices in most
   cases."
Then you provide the example of toxic gas level. This is one example where
it might be desirable not to perform data aggregation/fusion and get
multiple copies of the same message from different source to perform
"triangulation" and better localize the incident.
[CJ] Agreed, but I think this example precisely illustrates the issue. 

* "Routing within urban sensor networks SHOULD require the U-LLN nodes
   to dynamically compute, select and install different paths towards a
   same destination, depending on the nature of the traffic.  From this
   perspective, such nodes SHOULD inspect the contents of traffic
   payload for making routing and forwarding decisions: 

JP> This clarifies my previous question; you do refer to ability to compute
different paths (with different characteristic). Note that the path
selection process performed by the sender and potentially routers along the
path is not strictly speaking a routing requirement.
Move this requirement to the requirement section. 
[CJ] OK. 

* "for example, the analysis of the traffic payload SHOULD be derived into
aggregation
   capabilities for the sake of forwarding efficiency."
JP> Can you clarify what you mean here?
[CJ] The analysis of the payload of several packets should help in making
forwarding decisions that will spare network resources.

* "Delays and latencies are
   important; however, again, deliveries within seconds SHOULD suffice
   in most of the cases."
JP> Clearly not a routing requirement!
[CJ] Agreed. 

Section 5
########

* "The network SHOULD take into consideration that different application
   traffic may require different priorities when traversing the network,
   and that some traffic may be more sensitive to latency."
JP> If by priorities you mean different routes with different
characteristics then this is fine and already covered. If you refer to
packet marking to provide different QoS in the data plane, this is not a
routing requirement.
[CJ] Agreed - the former is the correct interpretation. 

* "An U-LLN SHOULD support occasional large scale traffic flows from
   sensing nodes to access points, such as system-wide alerts. " and "A node
MUST be able to send its own alerts toward an access
   point while continuing to forward traffic on behalf of other devices
   who are also experiencing an alert condition.  The network MUST be
   able to manage this sudden large traffic flow."
JP> Not routing requirements. Unless ... You require the ability to compute
multiple paths and use all of them (symmetrical or asymmetrical routing ???)
to spread out the traffic and limit network delays ?
[CJ] I think this is a kind of causality effect: the routing protocol must
be able to accommodate traffic bursts by dynamically computing and selecting
multiple paths towards the same destination. 
[Mischa] Agreed.


* You make an interesting reference to Smart Grid and DR/DSM. That said, you
wrote "The network SHOULD support internetworking, while giving attention to
security implications of interfacing, for example, a home network with a
utility U-LLN."
JP> Don't you mean that the routing protocol must be able to potentially
interact via potential route redistribution with other routing protocol used
in the Internet, should these two protocols not be identical ?
[CJ] Correct. 
 

Section 6
#########

* S/Current urban roll-outs are composed of sometimes more than a hundred
nodes/ Current urban roll-outs are composed of sometimes more than one
hundred nodes
[CJ] OK. 

* " The routing protocols(s) SHOULD support the organization of a large
number of nodes into regions of to-be-specified size."
JP> It will be difficult (or too easy ;-)) to be compliant with that SHOULD
with a to-be-specified size. Or did you mean "configurable" ?
[CJ] Configurable is indeed much better. 

* "To this end, the routing protocol(s) MUST support parameter
   constrained routing, where examples of such parameters (CPU, memory
   size, battery level, etc.) have been given in the previous paragraph."
JP> Please use the term "node constrained based routing"
[CJ] I'm not sure I agree here, because "node-constrained" sounds more fuzzy
to me. "environment-constrained"? 
[Mischa] Parameter constrained is the right word. For instance node internal
parameters (CPU, etc) and also environment parameters (avilability of sun
and therefore availability of energy due to energy scavanging, etc)


* "For the latter, the protocol(s) MUST support multi- and
   any-cast addressing.  The protocol(s) SHOULD also support the
   formation and identification of groups of field devices in the
   network."
JP> You may want to more accurately define the term "anycast" 
[CJ] Would the couple of references you righfully mentioned earlier be
sufficient?

* " To mandate fully interoperable implementations, the routing
   protocol(s) proposed in U-LLN MUST support different devices and
   underlying technologies without compromising the operability and
   energy efficiency of the network."
JP> This requires clarification here. Do you mean that the routing protocol
MUST support node constrained based routing? If so, it is already stated
above. The support of different L1/L2 is a given (route over).
[CJ] I would agree with Jean-Philippe, and suggest we remove this
wording...but I'll let the co-authors further comment. 
[Mischa] Imagine a network composed of simple ZigBee nodes and a few WLAN
nodes which have a ZigBee interface. An optimum solution will use the WLAN
nodes as a virtual information backbone and connect the ZigBee nodes to the
WLAN nodes. You can turn this as you want but an optimal routing solution
would never treat nodes of different capabilities the same (eg build a flat
routing structure). Therefore, any routing algorithm should ideally make use
of this heterogeneity. I would be happy to change this MUST for SHOULD
(which is what I had proposed, I think, a few weeks ago).


* Section 6.8, as written, is not related to routing but data plane. Let me
be more specific:

* "To this end, the routing protocol(s) SHOULD support minimum latency
   for alert reporting and time-critical data queries."
JP> The support of minimum latency path (data plane !) or the support for
different metric path (control plane) ?
[CJ] As written, I read it as the former interpretation and would suggest we
remove the text. 

* "For regular data
   reporting, it SHOULD support latencies not exceeding a fraction of
   the smallest reporting interval.  "
JP> Not a routing requirement. Even if you are referring to a bound on the
total path metric (the metric reflecting the delay in this case), this is an
implementation issue.
[CJ] Correct. 

* "Due to the different latency requirements, the routing protocol(s) SHOULD
support the ability of dealing with different latency requirements.  The
routing protocol(s) SHOULD also support the ability to route according to
different metrics (one of which could e.g. be latency)."
JP> yes these are routing requirements although I would suggest to remove
the first sentence, the requirement being captured in the second sentence.
[CJ] Agreed. 

Section 7
#########

* "As every network, U-LLNs are exposed to security threats that MUST be
addressed."
JP> You cannot put a MUST here unless you list the routing security threats.
[CJ] OK. 

* s/ potential security threats/ potential routing security threats => JP>
Please use the term "routing security" in place of "security" throughout the
section. 
[CJ] OK. 

* "U-LLN networks SHOULD support mechanisms to preserve the
   confidentiality of the traffic that they forward.  The U-LLN network
   SHOULD NOT prevent an application from employing additional
   confidentiality mechanisms."
JP> I do agree with the requirement but this is not a routing requirement. 
[CJ] Fair enough. 

Could you focus on the routing security issues ? Or are you referring to the
routing traffic confidentiality ?
[CJ] No, this wording referred to the traffic forwarded by the network.  
This is what you do right after:
[CJ] Correct. 
" The U-LLN MUST be protected against attempts to inject false or
   modified packets.  For example, an attacker SHOULD be prevented from
   manipulating or disabling the routing function by compromising
   routing update messages.  Moreover, it SHOULD NOT be possible to
   coerce the network into routing packets which have been modified in
   transit.  To this end the routing protocol(s) MUST support message
   integrity."
JP> I do not see any reference to the type of routing attacks that could be
performed on such networks because of the typical P2MP traffic pattern,
extensive use of wireless links, ... 
[CJ] OK, but does that mean we should not consider such requirement? I don't
think so, afaic. 
JP> What I would suggest is to re-focus on the routing security issues with
the Security expert that will get appointed.
[CJ] OK. 

Reference section
###############

The current reference section reads:
11.2.  Informative References

   [I-D.brandt-roll-home-routing-reqs]
              Brandt, A., "Home Automation Routing Requirement in Low
              Power and Lossy Networks",
              draft-brandt-roll-home-routing-reqs-01 (work in progress),
              May 2008.

JP> Please update to draft-ietf-roll-home-routing-reqs and add the reference
to draft-ietf-roll-indus-routing-reqs
[CJ] OK. 

   [I-D.culler-rl2n-routing-reqs]
              Vasseur, J. and D. Cullerot, "Routing Requirements for Low
              Power And Lossy Networks",
              draft-culler-rl2n-routing-reqs-01 (work in progress),
              July 2007.

JP> This one can be removed.
[CJ] OK. 


Last comment: please check that you expand acronyms when first used.
[CJ] OK.

 

Cheers,

 

Christian. 

*********************************
This message and any attachments (the "message") are confidential and
intended solely for the addressees. 
Any unauthorised use or dissemination is prohibited.
Messages are susceptible to alteration. 
France Telecom Group shall not be liable for the message if altered, changed
or falsified.
If you are not the intended addressee of this message, please cancel it
immediately and inform the sender.
********************************
	

------=_NextPart_000_00BE_01C90449.1CA63C70
Content-Type: text/html;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:st1=3D"urn:schemas-microsoft-com:office:smarttags" =
xmlns=3D"http://www.w3.org/TR/REC-html40">

<head>
<meta http-equiv=3DContent-Type content=3D"text/html; =
charset=3Dus-ascii">
<meta name=3DGenerator content=3D"Microsoft Word 11 (filtered medium)">
<!--[if !mso]>
<style>
v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style>
<![endif]-->
<title>Review of draft-ietf-roll-urban-routing-reqs-01</title>
<o:SmartTagType =
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"
 name=3D"PersonName"/>
<!--[if !mso]>
<style>
st1\:*{behavior:url(#default#ieooui) }
</style>
<![endif]-->
<style>
<!--
 /* Font Definitions */
 @font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Calibri;}
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0mm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman";}
a:link, span.MsoHyperlink
	{color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{color:blue;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-reply;
	font-family:"Courier New";
	color:windowtext;
	font-weight:normal;
	font-style:normal;
	text-decoration:none none;}
@page Section1
	{size:612.0pt 792.0pt;
	margin:72.0pt 90.0pt 72.0pt 90.0pt;}
div.Section1
	{page:Section1;}
-->
</style>
<!--[if gte mso 9]><xml>
 <o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
 <o:shapelayout v:ext=3D"edit">
  <o:idmap v:ext=3D"edit" data=3D"1" />
 </o:shapelayout></xml><![endif]-->
</head>

<body lang=3DEN-US link=3Dblue vlink=3Dblue>

<div class=3DSection1>

<p class=3DMsoNormal><font size=3D2 face=3D"Courier New"><span =
style=3D'font-size:10.0pt;
font-family:"Courier New"'>Thanks, JP, indeed, for this in-depth review. =
I
propose that Tim takes care of all the small typos identified by JP. =
Some
comments in-line in addition to Christian ones. Thanks to all and kind =
regards,
Mischa.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3D"Courier New"><span =
style=3D'font-size:10.0pt;
font-family:"Courier New"'><o:p>&nbsp;</o:p></span></font></p>

<div>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><font =
size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>

<hr size=3D2 width=3D"100%" align=3Dcenter tabindex=3D-1>

</span></font></div>

<p class=3DMsoNormal><b><font size=3D2 face=3DTahoma><span =
style=3D'font-size:10.0pt;
font-family:Tahoma;font-weight:bold'>From:</span></font></b><font =
size=3D2
face=3DTahoma><span style=3D'font-size:10.0pt;font-family:Tahoma'>
christian.jacquenet@orange-ftgroup.com
[mailto:christian.jacquenet@orange-ftgroup.com] <br>
<b><span style=3D'font-weight:bold'>Sent:</span></b> Thursday, August =
21, 2008
11:02 PM<br>
<b><span style=3D'font-weight:bold'>To:</span></b> JP Vasseur; Mischa =
Dohler; Tim
Winter; WATTEYNE Thomas RD-TECH; MADHUSUDAN Giyyarpuram RD-TECH; =
CHEGARAY
Gabriel RD-TECH; BARTHEL Dominique RD-TECH; roll@ietf.org<br>
<b><span style=3D'font-weight:bold'>Cc:</span></b> David E. Culler<br>
<b><span style=3D'font-weight:bold'>Subject:</span></b> RE: Review of =
draft-ietf-roll-urban-routing-reqs-01</span></font><o:p></o:p></p>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dblue face=3D"Courier =
New"><span
style=3D'font-size:10.0pt;font-family:"Courier New";color:blue'>Dear =
all,</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dblue face=3D"Courier =
New"><span
style=3D'font-size:10.0pt;font-family:"Courier New";color:blue'>Thanks =
to
Jean-Philippe for this thorough review. Please find a first shot of =
personal
comments inline, but I'll let my fellow co-authors further elaborate
accordingly.</span></font><o:p></o:p></p>

<blockquote =
style=3D'margin-top:5.0pt;margin-right:0mm;margin-bottom:5.0pt'>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dblue face=3D"Courier =
New"><span lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;[snip]&nbsp;</span></font><font
face=3DCalibri><span lang=3DFR style=3D'font-family:Calibri'><br>
</span></font><font size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:10.0pt;
font-family:Calibri'>Abstract<br>
#######<br>
s/ for a wireless ROLL solution to be useful the protocol(s) ought to be
energy-efficient, scalable, and autonomous/ the routing solution ought =
to be
energy-efficient, scalable and autonomous.<br>
<br>
JP&gt; You may want to use a different word than =
&#8220;Autonomous&#8221;. Do
you refer to the &#8220;self configuration&#8221; property ?<br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;We
chose &quot;autonomous&quot; because it was generic enough, while I =
think
&quot;self configuration&quot; is too restrictive: it's not only a =
matter of
configuration, it's also a matter of making (forwarding) decisions,
self-healing capabilities, etc. Another word I would suggest is
&quot;self-organizing&quot;, if this is more =
specific.&nbsp;</span></font><font
size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:10.0pt;font-family:Calibri'><br>
<font color=3Dred><span style=3D'color:red'>[Mischa] We had long =
discussions on
this and finally converged to &laquo;&nbsp;autonomous&nbsp;&raquo;. =
Let&#8217;s
leave it.</span></font>&nbsp;<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:
10.0pt;font-family:Calibri'><br>
Section 1<br>
#######<br>
* &#8220;Section 6 discusses the routing requirements for networks =
comprising<br>
&nbsp;&nbsp;&nbsp;such constrained devices in a U-LLN environment. =
&nbsp;These
requirements<br>
&nbsp;&nbsp;&nbsp;may be overlapping requirements derived from other
application-<br>
&nbsp;&nbsp;&nbsp;specific requirements documents or as listed in<br>
&nbsp;&nbsp;&nbsp;[I-D.culler-rl2n-routing-reqs].&#8221;<br>
<br>
JP&gt; Please remove this reference (ID abandoned) and insert reference =
to </span></font><font
face=3DCalibri><span lang=3DFR style=3D'font-family:Calibri'><a
href=3D"http://www.ietf.org/internet-drafts/draft-ietf-roll-home-routing-=
reqs-02.txt"><font
size=3D2><span =
style=3D'font-size:10.0pt'>http://www.ietf.org/internet-drafts/draft-ietf=
-roll-home-routing-reqs-02.txt</span></font></a></span></font><font
size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:10.0pt;font-family:Calibri'>,
</span></font><font face=3DCalibri><span lang=3DFR =
style=3D'font-family:Calibri'><a
href=3D"http://www.ietf.org/internet-drafts/draft-ietf-roll-indus-routing=
-reqs-01.txt"><font
size=3D2><span =
style=3D'font-size:10.0pt'>http://www.ietf.org/internet-drafts/draft-ietf=
-roll-indus-routing-reqs-01.txt</span></font></a></span></font><font
size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:10.0pt;font-family:Calibri'>
and </span></font><font face=3DCalibri><span lang=3DFR =
style=3D'font-family:Calibri'><a
href=3D"http://www.ietf.org/internet-drafts/draft-martocci-roll-commercia=
l-routing-reqs-00.txt"><font
size=3D2><span =
style=3D'font-size:10.0pt'>http://www.ietf.org/internet-drafts/draft-mart=
occi-roll-commercial-routing-reqs-00.txt</span></font></a></span></font><=
font
size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:10.0pt;font-family:Calibri'>.<br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;OK.&nbsp;</span></font><font
size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:10.0pt;font-family:Calibri'><br>
<br>
* s/ Section 7 provides an overview of security considerations/ Section =
7
provides an overview of routing security considerations <br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;OK.&nbsp;</span></font><font
size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:10.0pt;font-family:Calibri'><br>
<br>
Section 2<br>
########<br>
<br>
* S/ ROLL: Routing over Low power and Lossy networks/ ROLL: Routing Over =
Low
power and Lossy networks<br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;OK.&nbsp;</span></font><font
size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:10.0pt;font-family:Calibri'><br>
<br>
* Schedule: &nbsp;An agreed execution, wake-up, transmission, =
reception,<br>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;etc., time-table =
between
two or more field devices.<br>
The definition is a little bit too vague. If used in the generic sense, =
no need
to add it to the terminology section. Otherwise, it ought to be more =
specific.<br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;Schedule
is indeed&nbsp;very generic, but I think the sue of the word makes =
perfect
sense in the context of U-WSN networks. Being more specific would mean
elaborating on use cases where schedule information is taken into =
account by
field devices to perform some specific action. If this proposal makes =
sense,
I'm not sure the terminology section is appropriate for such elaboration =
and
would therefore suggest we (1) keep the &quot;schedule&quot; definition =
in this
section and (2) further elaborate on a use case that illustrates the use =
of
schedule information in section 5 of the draft.&nbsp;</span></font><font
size=3D2 face=3D"Courier New"><span lang=3DFR =
style=3D'font-size:10.0pt;font-family:
"Courier New"'><o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dred face=3D"Courier =
New"><span lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier New";color:red'>[Mischa] =
I don&#8217;t
see why this is vague. This is very clear to me. Let&#8217;s leave it as =
is (I
guess we do not need to find the maximum entropy of this document; the =
routing
solution won&#8217;t get better due to this&nbsp;</span></font><font =
size=3D2
color=3Dred face=3DWingdings><span lang=3DFR =
style=3D'font-size:10.0pt;font-family:
Wingdings;color:red'>J</span></font><font size=3D2 color=3Dred =
face=3D"Courier New"><span
lang=3DFR style=3D'font-size:10.0pt;font-family:"Courier =
New";color:red'>).<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:
10.0pt;font-family:Calibri'><br>
<br>
Section 3.1.1<br>
###########<br>
* S/ pre- planned location/ pre-planned location<br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;OK.&nbsp;</span></font><font
size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:10.0pt;font-family:Calibri'><br>
<br>
* What you refer to as a repeater is in fact a router. What I would =
suggest
here is to reword this paragraph to indicate that some nodes are simple =
routers
whereas other nodes are routers and lso perform sensing/actuating task. =
Insert
this paragraph after the Actuators and Sensors paragraphs.<br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;So
you're suggesting to (1) remove section 3.1.2 (not 3.1.1, actually), and =
(2)
indicate that some nodes are routers (not &quot;simple&quot;, btw :-), =
others
also perform sensing/actuating tasks, right? I'm fine with this =
suggestion, but
I'd like to hear the feedback from my colleagues. It's also worth =
mentioning
that a &quot;repeater&quot; has a very specific meaning in
&quot;classical&quot; networking environments, remembering the old days =
of
FOIRL and the like...that may be another reason to avoid the use of this =
notion
within the roll context.</span></font><font size=3D2 =
face=3DCalibri><span lang=3DFR
style=3D'font-size:10.0pt;font-family:Calibri'><br>
<font color=3Dred><span style=3D'color:red'>[Mischa] We had this =
discussion before
and the reason outlined by Christian is exactly why the thingy is called
repeater and not router. </span></font><o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3D"Courier New"><span lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New"'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:
10.0pt;font-family:Calibri'>* &#8220;Actuators may generally be mobile =
but are
likely to be static in the majority of near-future roll-outs&#8221;: =
seems a
bit contradictory. Don&#8217;t you want to simply say that in a =
near-future the
majority will be static?<br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;Not
quite, because actuators can be devices&nbsp;used by people who move =
from one
place to another to check how the&nbsp;sensor network is&nbsp;doing. I =
think
both cases are valid, and would therefore stick to the current =
wording.&nbsp;</span></font><font
size=3D2 face=3D"Courier New"><span lang=3DFR =
style=3D'font-size:10.0pt;font-family:
"Courier New"'><o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dred face=3DCalibri><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:Calibri;color:red'>[Mischa] When I =
wrote
this I had more in mind what JP said in shortened form. I personally =
hence
propose to change as suggested by JP.</span></font><font size=3D2 =
face=3DCalibri><span
lang=3DFR =
style=3D'font-size:10.0pt;font-family:Calibri'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal><font size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:
10.0pt;font-family:Calibri'><br>
<br>
* &#8220;Similar to the access points, actuator nodes do not suffer from =
any
long-term resource constraints.&#8221; what about battery-operated =
actuators ?<br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;I'll
leave that one to my colleagues :-)&nbsp;</span></font><font size=3D2
face=3DCalibri><span lang=3DFR =
style=3D'font-size:10.0pt;font-family:Calibri'><br>
<font color=3Dred><span style=3D'color:red'>[Mischa] This is a difficult =
one. It
clearly depends on the application, which even in the urban context can =
be
infinite. There will be applications where acting nodes just switch =
something
or reset something and hence need minimal energy allowing them to =
operate on
batteries and hence be &laquo;&nbsp;resource constrained&nbsp;&raquo;. =
Other
applications will require actuators which need to do heavy stuff with =
loads of
energy, one hence needs the mains. I propose to change it to reflect the =
two
cases &laquo;&nbsp;Actuator node may also suffer from any =
&#8230;&nbsp;&raquo;&nbsp;&nbsp;</span></font><o:p></o:p></span></font></=
p>

<p class=3DMsoNormal><font size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:
10.0pt;font-family:Calibri'><br>
Section 3.1.4<br>
###########<br>
* &#8220;pollution data, such as polluting gases (SO2, NOx, CO, =
Ozone),<br>
&nbsp;heavy metals (e.g. &nbsp;Mercury), pH, radioactivity, etc;&#8221; =
=3D&gt;
please expand acronym when first used.<br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;Hmmm...I
don't see too many acronyms in that sentence, actually. This is =
chemistry
stuff, unless you're suggesting we&nbsp;provide =
the&nbsp;&quot;lettered&quot;
designation of these substances like carbon oxyde, etc.? I wouldn't go =
that
way...&nbsp;</span></font><font size=3D2 face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New"'><o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dred face=3DCalibri><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:Calibri;color:red'>[Mischa]&nbsp;</=
span></font><font
size=3D2 color=3Dred face=3DWingdings><span lang=3DFR =
style=3D'font-size:10.0pt;
font-family:Wingdings;color:red'>J</span></font><font size=3D2 =
color=3Dred
face=3DCalibri><span lang=3DFR =
style=3D'font-size:10.0pt;font-family:Calibri;
color:red'> I agree with Christian. Let&#8217;s leave that basic stuff =
which I
think is part of SI and hence does not need to spelled =
out.</span></font><font
size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:10.0pt;font-family:Calibri'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal><font size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:
10.0pt;font-family:Calibri'><br>
<br>
* &#8220;These meters will be capable of<br>
&nbsp;&nbsp;&nbsp;advanced sensing functionalities such as measuring =
quality of<br>
&nbsp;&nbsp;&nbsp;service, providing granular interval data, or =
automating the<br>
&nbsp;&nbsp;&nbsp;detection of alarm conditions.&#8221;<br>
You may want to more accurately define the term &#8220;quality of
service&#8221; since as you know, we used that term of other purposes in =
IETF
documents.<br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;Agreed.
Since this is a list of examples, I would suggest something like
&quot;measuring the&nbsp;quality of the water provided to the =
customers&quot;.</span></font><font
size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:10.0pt;font-family:Calibri'><br>
<font color=3Dred><span style=3D'color:red'>[Mischa] I agree with =
both.</span></font><o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:
10.0pt;font-family:Calibri'><br>
* In addition they may be capable of<br>
&nbsp;&nbsp;&nbsp;advanced interactive functionalities such as remote =
service<br>
&nbsp;&nbsp;&nbsp;disconnect or remote demand reset.&#8221; =3D&gt; in =
this case,
they are also acting as actuators.<br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;Agreed.&nbsp;</span></font><font
size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:10.0pt;font-family:Calibri'><br>
<font color=3Dred><span style=3D'color:red'>[Mischa] I =
agree.</span></font><o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:
10.0pt;font-family:Calibri'><br>
Section 3.2 <br>
#########<br>
<br>
* s/ between one other/between each other<br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;OK.&nbsp;</span></font><font
size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:10.0pt;font-family:Calibri'><br>
<br>
* &#8220;The network MUST be capable of supporting the organization =
of<br>
&nbsp;&nbsp;&nbsp;a large number of sensing nodes into regions =
containing on
the order<br>
&nbsp;&nbsp;&nbsp;of 10^2 to 10^4 sensing nodes each.&#8221;<br>
JP&gt; Thanks to make this &#8220;MUST&#8221; routing-specific and move =
it to
the requirements section.<br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;Agreed
- would suggest this should be the introductory sentence of section =
6.1.&nbsp;</span></font><font
size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:10.0pt;font-family:Calibri'><br>
<font color=3Dred><span style=3D'color:red'>[Mischa] I agree with =
both.</span></font><o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:
10.0pt;font-family:Calibri'><br>
Section 3.3<br>
#########<br>
<br>
* RFID: expand acronym (Radio Frequency IDentification) and add to the
terminology section<br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;OK.&nbsp;</span></font><font
size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:10.0pt;font-family:Calibri'><br>
<br>
* s/battery-powered nodes/battery powered nodes<br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;OK.&nbsp;</span></font><font
size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:10.0pt;font-family:Calibri'><br>
&#8220;Sensor nodes are capable of forwarding data.&#8221; In other =
words, they
can act as routers. No need to repeat this here.<br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;Fair
enough.&nbsp;</span></font><font size=3D2 face=3DCalibri><span lang=3DFR
style=3D'font-size:10.0pt;font-family:Calibri'><br>
<br>
Section 3.4<br>
#########<br>
<br>
* &#8220;2. &nbsp;packet errors due to medium access control;&#8221; =
JP&gt; It
is not really &#8220;packet error&#8221; here.<br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;Do you
mean &quot;transmission erros&quot;? If so, I would agree with you that =
this
wording is better, but then I guess it should be used for first three =
cases,
right?&nbsp;</span></font><font size=3D2 face=3DCalibri><span lang=3DFR
style=3D'font-size:10.0pt;font-family:Calibri'><br>
<font color=3Dred><span style=3D'color:red'>[Mischa] Collision resulting =
from poor
MAC yield packet errors. We had discussed this section numerous times. I
propose to leave it as is.</span></font><o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:
10.0pt;font-family:Calibri'><br>
* Some available protocols may cause packets of neighbouring nodes to =
collide
and hence cause a link outage.&#8221; JP&gt; You may want to be more =
specific
&#8220;Some&#8221; ?<br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;Do you
mean examples, because the previous sentence mentions the L2 protocols =
this
sentence refers to?</span></font><font size=3D2 face=3DCalibri><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:Calibri'><br>
<font color=3Dred><span style=3D'color:red'>[Mischa] Yes, this is a =
L&nbsp;2 issue
and I am a little confused here&nbsp;: at one iterative point you insist =
to
minimize if not delete all references to L2 and here you ask to be more
specific. I give you an example for you to understand but propose this =
not to
be included&nbsp;: reservation based MACs can guarantee a collision-free
schedule whereas contention-based MACs, MACs with common schedules and
preamble-based MACs cannot. Therefore =
&laquo;&nbsp;some&nbsp;&raquo;.&nbsp;</span></font><o:p></o:p></span></fo=
nt></p>

<p class=3DMsoNormal><font size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:
10.0pt;font-family:Calibri'><br>
* &#8220;if ISM bands are to be used. &nbsp;For instance, if the 2.4GHz =
ISM
band is<br>
&nbsp;&nbsp;&nbsp;used to facilitate communication between U-LLN nodes, =
then
heavily<br>
&nbsp;&nbsp;&nbsp;loaded WLAN hot-spots become a detrimental performance =
factor<br>
&nbsp;&nbsp;&nbsp;jeopardizing the functioning of the U-LLN.&#8221;<br>
JP&gt; Please expand acronym when first used and add to the terminology =
section
(ISM, WLAN, ...)<br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;OK.&nbsp;</span></font><font
size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:10.0pt;font-family:Calibri'><br>
<br>
* Don&#8217;t you want to say a few words about the varying BER leading =
to
potentially even higher packet error loss ratio?<br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;Expand
the acronym ;-) I agree, bit error rate considerations should deserve a =
couple
of sentences in this section.&nbsp;</span></font><font size=3D2 =
face=3DCalibri><span
lang=3DFR style=3D'font-size:10.0pt;font-family:Calibri'><br>
<font color=3Dred><span style=3D'color:red'>[Mischa] We purposedly =
don&#8217;t talk
about BER but about PER &#8211; they are VERY different, mainly because =
you can
use different channel codes. For instance, a BCH code which is capable =
of
correcting 5 errors does not care much about small BER variations. Large
changes, however, will effect the performance but we are effecitvely =
interested
in PER. I personally think that all needed information is in there. =
</span></font><o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:
10.0pt;font-family:Calibri'><br>
Section 4.1<br>
#########<br>
<br>
* &#8220;Pre-programmed MAC&#8221;: expand acronym<br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;OK.&nbsp;</span></font><font
size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:10.0pt;font-family:Calibri'><br>
<br>
* &#8220;the autonomous organization&#8221; =3D&gt; self-organizing?<br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;Much
better indeed.&nbsp;</span></font><font size=3D2 face=3DCalibri><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:Calibri'><br>
<br>
* &#8220;For example, nodes in urban sensor nodes SHOULD be able =
to:&#8221;
=3D&gt; Several of the requirements that follow are nor routing =
specific. You may
either want to change the SHOULD for a &#8220;should&#8221; or just =
focus on
the routing aspects and move them to the routing requirements =
section.<br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;They
may not be routing specific, but I think they do affect how routing =
policies
are enforced. I woudl therefore suggest we stick to the proposed =
wording.&nbsp;</span></font><font
size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:10.0pt;font-family:Calibri'><br>
<font color=3Dred><span style=3D'color:red'>[Mischa] I tend to agree =
with
Christian.</span></font><o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:
10.0pt;font-family:Calibri'><br>
* &#8220;o &nbsp;Dynamically compute, select and possibly optimize the
(multiple)<br>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;path(s) that will be used by the
participating devices to forward<br>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;the traffic towards the actuators =
and/or
the access point<br>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;according to the service-specific =
and
traffic-specific QoS,<br>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;traffic engineering and security =
policies
that will have to be<br>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;enforced at the scale of a routing =
domain
(that is, a set of<br>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;networking devices administered by a
globally unique entity), or a<br>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;region of such domain (e.g. a =
metropolitan
area composed of<br>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;clusters of sensors).&#8221;<br>
JP&gt; You list important and stringent requirements here. Do you really =
need a
routing algorithms capable of computing a path on a per QoS/service
specific/... Basis ?<br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;I don't
read this sentence as you do. What I meant here is that entities that =
operate
urban sensor networks specify their own policies (routing, te, security, =
QoS,
etc.), which may be service-specific. The requirement suggests that the =
devices
involved in the enforcement of such policies should behave accordingly, =
that
is, compute, select, establish and maintain paths whose characteristics =
comply
with these policies. But I agree this is a strong requirement, but not =
stronger
than, say, the self-organization requirement.</span></font><font =
size=3D2
face=3DCalibri><span lang=3DFR =
style=3D'font-size:10.0pt;font-family:Calibri'><br>
<font color=3Dred><span style=3D'color:red'>[Mischa] We only need to =
make sure that
this is not a MUST requirement because there are solutions out there =
which don&#8217;t
need all these computations.</span></font><o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:
10.0pt;font-family:Calibri'><br>
Section 4.2<br>
#########<br>
<br>
* &#8220;After the initialization phase and possibly some operational =
time,<br>
&nbsp;&nbsp;&nbsp;new nodes may be injected into the network as well as
existing nodes<br>
&nbsp;&nbsp;&nbsp;removed from the network. &nbsp;The former might be =
because a
removed node<br>
&nbsp;&nbsp;&nbsp;is replaced or denser readings/actuations are needed =
or
routing<br>
&nbsp;&nbsp;&nbsp;protocols report connectivity problems. &#8220;<br>
JP&gt; Just to avoid any mis-interpretation when referring to routing =
problem,
you mean that it may be desirable to inject to node because connectivity =
is not
sufficient (lack of enough redundant path, ...) and not because of a =
routing
issue per say.<br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;Not
necessarily because connectivity is insufficient (new services, network
expansion, node maintenance, etc.), and not necessarily because there is =
a
routing issue, indeed.&nbsp;</span></font><font size=3D2 =
face=3DCalibri><span
lang=3DFR style=3D'font-size:10.0pt;font-family:Calibri'><br>
<br>
* &#8220;Differentiation<br>
&nbsp;&nbsp;&nbsp;SHOULD be made between node disappearance, where the =
node
disappears<br>
&nbsp;&nbsp;&nbsp;without prior notification, and user or node-initiated
disassociation<br>
&nbsp;&nbsp;&nbsp;(&quot;phased-out&quot;), where the node has enough =
time to
inform the network<br>
&nbsp;&nbsp;&nbsp;about its removal.&#8221;<br>
JP&gt; Again this is not a routing requirement. Unless you refer to the =
ability
for the routing protocol to advertise to the rest of the network that it =
will
be removed in order for the other node to re-compute their path and =
avoid
traffic disruption (e.g. Similarly to what we do with the ISIS overload =
bit for
example.) Is it what you mean ? <br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;This is
indeed what we meant (at least that's my reading of this sentence, but =
I'll let
my colleagues further comment on that).&nbsp;</span></font><font =
size=3D2
face=3D"Courier New"><span lang=3DFR =
style=3D'font-size:10.0pt;font-family:"Courier =
New"'><o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dred face=3DCalibri><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:Calibri;color:red'>[Mischa] Yes, =
this is
what we mean.</span></font><font size=3D2 face=3DCalibri><span lang=3DFR
style=3D'font-size:10.0pt;font-family:Calibri'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal><font size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:
10.0pt;font-family:Calibri'>If so, please clarify and move the routing
requirement (SHOULD in capital letter to the routing requirement =
section).<br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;OK.&nbsp;</span></font><font
size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:10.0pt;font-family:Calibri'><br>
<br>
* &#8220;The protocol(s) hence SHOULD support the pinpointing of =
problematic
routing areas&#8221;<br>
JP&gt; Could you clarify what you mean by &#8220;pinpointing&#8221; =
since it
could be interpreted in many ways? <br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;Fair
enough, we need to be more explicit.&nbsp;Maybe something like: =
&quot;the
protocol should be able to convey information about malfunctioning nodes =
which
may affect or jeopardize the overall routing efficiency, so that
self-configuration capabilities of the sensor network might be solicited =
to
facilitate the appropriate reconfiguration.&quot;</span></font><font =
size=3D2
face=3D"Courier New"><span lang=3DFR =
style=3D'font-size:10.0pt;font-family:"Courier =
New"'><o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dred face=3DCalibri><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:Calibri;color:red'>[Mischa] And I =
would add
&laquo;&nbsp;This information may e.g. be in the form of exact or =
relative
geographical position, etc.&nbsp;&raquo;</span></font><font size=3D2
face=3DCalibri><span lang=3DFR =
style=3D'font-size:10.0pt;font-family:Calibri'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal><font size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:
10.0pt;font-family:Calibri'><br>
<br>
* The following section also requires some clarification &#8211; you =
wrote:<br>
&#8220;Furthermore, to inform the<br>
&nbsp;&nbsp;&nbsp;access point(s) of the node's arrival and association =
with
the<br>
&nbsp;&nbsp;&nbsp;network as well as freshly associated nodes about =
packet
forwarding<br>
&nbsp;&nbsp;&nbsp;schedules, roles, etc, appropriate (link state) =
updating
mechanisms<br>
&nbsp;&nbsp;&nbsp;SHOULD be supported.&#8221;<br>
JP&gt; Are you explicitly requiring a Link State routing protocol or a =
routing
protocol that provides information about link states or ... ?<br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;We
meant &quot;a protocol that can provide information about link =
status&quot;,
indeed.&nbsp;</span></font><font size=3D2 face=3DCalibri><span lang=3DFR
style=3D'font-size:10.0pt;font-family:Calibri'><br>
<font color=3Dred><span style=3D'color:red'>[Mischa] I remind you =
however that this
is SHOULD and not MUST.</span></font></span></font><font size=3D2
face=3D"Courier New"><span lang=3DFR =
style=3D'font-size:10.0pt;font-family:"Courier =
New"'><o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:
10.0pt;font-family:Calibri'>Note that a requirement document should stay
solution agnostic and stay focus on the requirement. <br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;Fully
agreed.&nbsp;</span></font><span lang=3DFR><o:p></o:p></span></p>

<p class=3DMsoNormal><font size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:
10.0pt;font-family:Calibri'>Is you requirement that any node needs to =
have
visibility on other node characteristics with no attempt of =
aggregation?<br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;Well,
yes,&nbsp;presumably depending on design considerations: cluster head =
vs.
clients within the cluster, for example.&nbsp;I think this is typical =
Self
Organizing Networking&nbsp;capability.</span></font><font size=3D2 =
face=3DCalibri><span
lang=3DFR style=3D'font-size:10.0pt;font-family:Calibri'><br>
<br>
Section 4.3<br>
#########<br>
<br>
* &#8220;The protocol(s) hence MUST support a large number of highly<br>
&nbsp;&nbsp;&nbsp;directional unicast flows from the sensing nodes or =
sensing
clusters<br>
&nbsp;&nbsp;&nbsp;towards the access point or highly directed multicast =
or
anycast<br>
&nbsp;&nbsp;&nbsp;flows from the nodes towards multiple access =
points.&#8221;<br>
JP&gt; I think that what you mean is that the routing protocol MUST be
optimized for Multipoint-to-Point traffic patterns (from =
sensors/actuators to
Sink). As written, it is not clear whether you refer to it as a routing
requirement ?<br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;Agreed.&nbsp;</span></font><font
size=3D2 face=3D"Courier New"><span lang=3DFR =
style=3D'font-size:10.0pt;font-family:
"Courier New"'><o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dred face=3DCalibri><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:Calibri;color:red'>[Mischa] No, =
our
requirement is stronger. Multipoint can be from many &laquo;&nbsp;some =
where&nbsp;&raquo;
nodes to one sink. What we mean is many &laquo;&nbsp;geographically =
close&nbsp;&raquo;
nodes to one sink. This is an underlying property of WSNs and our =
routing
solutions HEAVILY rely on this.</span></font><font size=3D2 =
face=3D"Courier New"><span
lang=3DFR style=3D'font-size:10.0pt;font-family:"Courier =
New"'><o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:
10.0pt;font-family:Calibri'><br>
This in fact what you wrote in section 6.5: &#8220;To this end, the =
routing
protocol(s) SHOULD support and utilize the fact of highly directed =
traffic flow
to facilitate scalability and parameter constrained routing.&#8221;<br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;Correct.&nbsp;</span></font><font
size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:10.0pt;font-family:Calibri'><br>
<br>
* s/ More generally, entire routing areas may be avoided at e.g. night =
but
heavily used during the day when nodes are scavenging from sunlight/ =
More
generally, entire routing areas may be avoided (e.g. at night) but =
heavily used
during the day when nodes are scavenging from sunlight.<br>
JP&gt; Doesn&#8217;t this translate to the requirement for time-based =
routing
(some form of policy routing) ?<br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;Correct,
but I don't see any harm in providing a practical =
example.&nbsp;</span></font><font
size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:10.0pt;font-family:Calibri'><br>
<font color=3Dred><span style=3D'color:red'>[Mischa] I agree with =
Christian.</span></font><o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:
10.0pt;font-family:Calibri'><br>
Section 4.4<br>
#########<br>
<br>
&#8220;However, they are not very stringent where<br>
&nbsp;&nbsp;&nbsp;latencies SHOULD simply be sufficiently smaller than =
typical<br>
&nbsp;&nbsp;&nbsp;reporting intervals&#8221;<br>
JP&gt; This is certainly true but not a routing requirement but a data =
plane
requirement unless you refer to the ability to support QoS aware routing =
where
each node may want to be able to compute different paths depending on =
the
traffic requirements?<br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;This is
indeed related to the third bullet that appears in section =
4.1.&nbsp;</span></font><font
size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:10.0pt;font-family:Calibri'><br>
<br>
* Move &#8220;U-LLN network devices SHOULD support unicast and multicast
routing capabilities&#8221; to the routing requirement section. You may =
want to
leave the sentence here (without a SHOULD).<br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;OK.&nbsp;</span></font><font
size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:10.0pt;font-family:Calibri'><br>
<br>
* You use the term &#8220;anycast&#8221; that has been discussed in the =
past,
in particular in the context of the Home routing requirement document. I =
would
suggest to define this term in the document, refer to RFC4291 or =
RFC1546, ...<br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;Fully
agreed. </span></font><font size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:
10.0pt;font-family:Calibri'><br>
<br>
Section 4.5<br>
#########<br>
<br>
* &#8220;An alarm is likely being<br>
&nbsp;&nbsp;&nbsp;registered by a plurality of sensing nodes where the =
delivery
of a<br>
&nbsp;&nbsp;&nbsp;single alert message with its location of origin =
suffices in
most<br>
&nbsp;&nbsp;&nbsp;cases.&#8221;<br>
Then you provide the example of toxic gas level. This is one example =
where it
might be desirable not to perform data aggregation/fusion and get =
multiple
copies of the same message from different source to perform
&#8220;triangulation&#8221; and better localize the incident.<br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;Agreed,
but I think this example precisely illustrates the =
issue.&nbsp;</span></font><font
size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:10.0pt;font-family:Calibri'><br>
<br>
* &#8220;Routing within urban sensor networks SHOULD require the U-LLN =
nodes<br>
&nbsp;&nbsp;&nbsp;to dynamically compute, select and install different =
paths
towards a<br>
&nbsp;&nbsp;&nbsp;same destination, depending on the nature of the =
traffic.
&nbsp;From this<br>
&nbsp;&nbsp;&nbsp;perspective, such nodes SHOULD inspect the contents of
traffic<br>
&nbsp;&nbsp;&nbsp;payload for making routing and forwarding decisions: =
<br>
<br>
JP&gt; This clarifies my previous question; you do refer to ability to =
compute
different paths (with different characteristic). Note that the path =
selection
process performed by the sender and potentially routers along the path =
is not
strictly speaking a routing requirement.<br>
Move this requirement to the requirement section. <br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;OK.&nbsp;</span></font><font
size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:10.0pt;font-family:Calibri'><br>
<br>
* &#8220;for example, the analysis of the traffic payload SHOULD be =
derived
into aggregation<br>
&nbsp;&nbsp;&nbsp;capabilities for the sake of forwarding =
efficiency.&#8221;<br>
JP&gt; Can you clarify what you mean here?<br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;The
analysis of the payload of several packets should&nbsp;help in making
forwarding decisions that will spare network =
resources.</span></font><font
size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:10.0pt;font-family:Calibri'><br>
<br>
* &#8220;Delays and latencies are<br>
&nbsp;&nbsp;&nbsp;important; however, again, deliveries within seconds =
SHOULD
suffice<br>
&nbsp;&nbsp;&nbsp;in most of the cases.&#8221;<br>
JP&gt; Clearly not a routing requirement!<br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;Agreed.&nbsp;</span></font><font
size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:10.0pt;font-family:Calibri'><br>
<br>
Section 5<br>
########<br>
<br>
* &#8220;The network SHOULD take into consideration that different =
application<br>
&nbsp;&nbsp;&nbsp;traffic may require different priorities when =
traversing the
network,<br>
&nbsp;&nbsp;&nbsp;and that some traffic may be more sensitive to
latency.&#8221;<br>
JP&gt; If by priorities you mean different routes with different
characteristics then this is fine and already covered. If you refer to =
packet
marking to provide different QoS in the data plane, this is not a =
routing
requirement.<br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;Agreed
- the former is the correct interpretation.&nbsp;</span></font><font =
size=3D2
face=3DCalibri><span lang=3DFR =
style=3D'font-size:10.0pt;font-family:Calibri'><br>
<br>
* &#8220;An U-LLN SHOULD support occasional large scale traffic flows =
from<br>
&nbsp;&nbsp;&nbsp;sensing nodes to access points, such as system-wide =
alerts.
&#8220; and &#8220;A node MUST be able to send its own alerts toward an =
access<br>
&nbsp;&nbsp;&nbsp;point while continuing to forward traffic on behalf of =
other
devices<br>
&nbsp;&nbsp;&nbsp;who are also experiencing an alert condition. =
&nbsp;The
network MUST be<br>
&nbsp;&nbsp;&nbsp;able to manage this sudden large traffic =
flow.&#8221;<br>
JP&gt; Not routing requirements. Unless ... You require the ability to =
compute
multiple paths and use all of them (symmetrical or asymmetrical routing =
<st1:PersonName
w:st=3D"on">???</st1:PersonName>) to spread out the traffic and limit =
network
delays ?<br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;I think
this is a kind of causality effect: the routing protocol must be able to
accommodate traffic bursts by dynamically computing&nbsp;and selecting =
multiple
paths towards the same destination.&nbsp;</span></font><font size=3D2
face=3DCalibri><span lang=3DFR =
style=3D'font-size:10.0pt;font-family:Calibri'><br>
<font color=3Dred><span style=3D'color:red'>[Mischa] =
Agreed.</span></font><o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:
10.0pt;font-family:Calibri'><br>
* You make an interesting reference to Smart Grid and DR/DSM. That said, =
you
wrote &#8220;The network SHOULD support internetworking, while giving =
attention
to security implications of interfacing, for example, a home network =
with a
utility U-LLN.&#8221;<br>
JP&gt; Don&#8217;t you mean that the routing protocol must be able to
potentially interact via potential route redistribution with other =
routing
protocol used in the Internet, should these two protocols not be =
identical ?<br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;Correct.&nbsp;</span></font><font
size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:10.0pt;font-family:Calibri'><br>
&nbsp;<br>
<br>
Section 6<br>
#########<br>
<br>
* S/Current urban roll-outs are composed of sometimes more than a =
hundred
nodes/ Current urban roll-outs are composed of sometimes more than one =
hundred
nodes<br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;OK.&nbsp;</span></font><font
size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:10.0pt;font-family:Calibri'><br>
<br>
* &#8220; The routing protocols(s) SHOULD support the organization of a =
large
number of nodes into regions of to-be-specified size.&#8221;<br>
JP&gt; It will be difficult (or too easy ;-)) to be compliant with that =
SHOULD
with a to-be-specified size. Or did you mean &#8220;configurable&#8221; =
?<br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;Configurable
is indeed much better.&nbsp;</span></font><font size=3D2 =
face=3DCalibri><span
lang=3DFR style=3D'font-size:10.0pt;font-family:Calibri'><br>
<br>
* &#8220;To this end, the routing protocol(s) MUST support parameter<br>
&nbsp;&nbsp;&nbsp;constrained routing, where examples of such parameters =
(CPU,
memory<br>
&nbsp;&nbsp;&nbsp;size, battery level, etc.) have been given in the =
previous
paragraph.&#8221;<br>
JP&gt; Please use the term &#8220;node constrained based =
routing&#8221;<br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;I'm not
sure I agree here, because &quot;node-constrained&quot; sounds more =
fuzzy to
me. &quot;environment-constrained&quot;?&nbsp;</span></font><font =
size=3D2
face=3DCalibri><span lang=3DFR =
style=3D'font-size:10.0pt;font-family:Calibri'><br>
<font color=3Dred><span style=3D'color:red'>[Mischa] Parameter =
constrained is the
right word. For instance node internal parameters (CPU, etc) and also
environment parameters (avilability of sun and therefore availability of =
energy
due to energy scavanging, =
etc)</span></font><o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:
10.0pt;font-family:Calibri'><br>
* &#8220;For the latter, the protocol(s) MUST support multi- and<br>
&nbsp;&nbsp;&nbsp;any-cast addressing. &nbsp;The protocol(s) SHOULD also
support the<br>
&nbsp;&nbsp;&nbsp;formation and identification of groups of field =
devices in
the<br>
&nbsp;&nbsp;&nbsp;network.&#8221;<br>
JP&gt; You may want to more accurately define the term =
&#8220;anycast&#8221;</span></font><font
size=3D2 color=3Dblue face=3D"Courier New"><span lang=3DFR =
style=3D'font-size:10.0pt;
font-family:"Courier New";color:blue'>&nbsp;</span></font><font size=3D2
face=3DCalibri><span lang=3DFR =
style=3D'font-size:10.0pt;font-family:Calibri'><br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;Would
the couple of references you righfully mentioned earlier be =
sufficient?</span></font><font
size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:10.0pt;font-family:Calibri'><br>
<br>
* &#8220; To mandate fully interoperable implementations, the =
routing<br>
&nbsp;&nbsp;&nbsp;protocol(s) proposed in U-LLN MUST support different =
devices
and<br>
&nbsp;&nbsp;&nbsp;underlying technologies without compromising the =
operability
and<br>
&nbsp;&nbsp;&nbsp;energy efficiency of the network.&#8221;<br>
JP&gt; This requires clarification here. Do you mean that the routing =
protocol
MUST support node constrained based routing? If so, it is already stated =
above.
The support of different L1/L2 is a given (route over).<br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;I would
agree with Jean-Philippe, and suggest we remove this wording...but I'll =
let the
co-authors further comment.&nbsp;</span></font><font size=3D2 =
face=3DCalibri><span
lang=3DFR style=3D'font-size:10.0pt;font-family:Calibri'><br>
<font color=3Dred><span style=3D'color:red'>[Mischa] Imagine a network =
composed of
simple ZigBee nodes and a few WLAN nodes which have a ZigBee interface. =
An
optimum solution will use the WLAN nodes as a virtual information =
backbone and
connect the ZigBee nodes to the WLAN nodes. You can turn this as you =
want but
an optimal routing solution would never treat nodes of different =
capabilities
the same (eg build a flat routing structure). Therefore, any routing =
algorithm
should ideally make use of this heterogeneity. I would be happy to =
change this
MUST for SHOULD (which is what I had proposed, I think, a few weeks =
ago).</span></font><o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:
10.0pt;font-family:Calibri'><br>
* Section 6.8, as written, is not related to routing but data plane. Let =
me be
more specific:<br>
<br>
* &#8220;To this end, the routing protocol(s) SHOULD support minimum =
latency<br>
&nbsp;&nbsp;&nbsp;for alert reporting and time-critical data =
queries.&#8221;<br>
JP&gt; The support of minimum latency path (data plane !) or the support =
for
different metric path (control plane) ?<br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;As
written, I read it as the former interpretation and would suggest we =
remove the
text.&nbsp;</span></font><font size=3D2 face=3DCalibri><span lang=3DFR
style=3D'font-size:10.0pt;font-family:Calibri'><br>
<br>
* &#8220;For regular data<br>
&nbsp;&nbsp;&nbsp;reporting, it SHOULD support latencies not exceeding a
fraction of<br>
&nbsp;&nbsp;&nbsp;the smallest reporting interval. &nbsp;&#8220;<br>
JP&gt; Not a routing requirement. Even if you are referring to a bound =
on the
total path metric (the metric reflecting the delay in this case), this =
is an
implementation issue.<br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;Correct.&nbsp;</span></font><font
size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:10.0pt;font-family:Calibri'><br>
<br>
* &#8220;Due to the different latency requirements, the routing =
protocol(s)
SHOULD support the ability of dealing with different latency =
requirements.
&nbsp;The routing protocol(s) SHOULD also support the ability to route
according to different metrics (one of which could e.g. be =
latency).&#8221;<br>
JP&gt; yes these are routing requirements although I would suggest to =
remove
the first sentence, the requirement being captured in the second =
sentence.<br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;Agreed.&nbsp;</span></font><font
size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:10.0pt;font-family:Calibri'><br>
<br>
Section 7<br>
#########<br>
<br>
* &#8220;As every network, U-LLNs are exposed to security threats that =
MUST be
addressed.&#8221;<br>
JP&gt; You cannot put a MUST here unless you list the routing security =
threats.<br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;OK.&nbsp;</span></font><font
size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:10.0pt;font-family:Calibri'><br>
<br>
* s/ potential security threats/ potential routing security threats =
=3D&gt;
JP&gt; Please use the term &#8220;routing security&#8221; in place of
&#8220;security&#8221; throughout the section. <br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;OK.&nbsp;</span></font><font
size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:10.0pt;font-family:Calibri'><br>
<br>
* &#8220;U-LLN networks SHOULD support mechanisms to preserve the<br>
&nbsp;&nbsp;&nbsp;confidentiality of the traffic that they forward. =
&nbsp;The
U-LLN network<br>
&nbsp;&nbsp;&nbsp;SHOULD NOT prevent an application from employing =
additional<br>
&nbsp;&nbsp;&nbsp;confidentiality mechanisms.&#8221;<br>
JP&gt; I do agree with the requirement but this is not a routing =
requirement. <br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;Fair
enough.&nbsp;</span></font><span lang=3DFR><o:p></o:p></span></p>

<p class=3DMsoNormal><font size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:
10.0pt;font-family:Calibri'>Could you focus on the routing security =
issues ? Or
are you referring to the routing traffic confidentiality ?<br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;No,
this wording referred to the traffic forwarded by the =
network.&nbsp;</span></font><font
size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:10.0pt;font-family:Calibri'>&nbsp;<br>
This is what you do right after:<br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;Correct.&nbsp;</span></font><font
size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:10.0pt;font-family:Calibri'><br>
&#8220; The U-LLN MUST be protected against attempts to inject false =
or<br>
&nbsp;&nbsp;&nbsp;modified packets. &nbsp;For example, an attacker =
SHOULD be
prevented from<br>
&nbsp;&nbsp;&nbsp;manipulating or disabling the routing function by
compromising<br>
&nbsp;&nbsp;&nbsp;routing update messages. &nbsp;Moreover, it SHOULD NOT =
be
possible to<br>
&nbsp;&nbsp;&nbsp;coerce the network into routing packets which have =
been
modified in<br>
&nbsp;&nbsp;&nbsp;transit. &nbsp;To this end the routing protocol(s) =
MUST
support message<br>
&nbsp;&nbsp;&nbsp;integrity.&#8221;<br>
JP&gt; I do not see any reference to the type of routing attacks that =
could be
performed on such networks because of the typical P2MP traffic pattern,
extensive use of wireless links, ... <br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;OK, but
does that mean we should not consider such requirement? I don't think =
so,
afaic.&nbsp;</span></font><font size=3D2 face=3DCalibri><span lang=3DFR
style=3D'font-size:10.0pt;font-family:Calibri'><br>
JP&gt; What I would suggest is to re-focus on the routing security =
issues with
the Security expert that will get appointed.<br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;OK.&nbsp;</span></font><font
size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:10.0pt;font-family:Calibri'><br>
<br>
Reference section<br>
###############<br>
<br>
The current reference section reads:<br>
11.2. &nbsp;Informative References<br>
<br>
&nbsp;&nbsp;&nbsp;[I-D.brandt-roll-home-routing-reqs]<br>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;Brandt,
A., &quot;Home Automation Routing Requirement in Low<br>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;Power
and Lossy Networks&quot;,<br>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;draft-brandt-roll-home-routing-reqs-01
(work in progress),<br>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;May
2008.<br>
<br>
JP&gt; Please update to draft-ietf-roll-home-routing-reqs and add the =
reference
to draft-ietf-roll-indus-routing-reqs<br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;OK.&nbsp;</span></font><font
size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:10.0pt;font-family:Calibri'><br>
<br>
&nbsp;&nbsp;&nbsp;[I-D.culler-rl2n-routing-reqs]<br>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;Vasseur,
J. and D. Cullerot, &quot;Routing Requirements for Low<br>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;Power
And Lossy Networks&quot;,<br>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;draft-culler-rl2n-routing-reqs-01
(work in progress),<br>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;July
2007.<br>
<br>
JP&gt; This one can be removed.<br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;OK.&nbsp;</span></font><font
size=3D2 face=3DCalibri><span lang=3DFR =
style=3D'font-size:10.0pt;font-family:Calibri'><br>
<br>
<br>
Last comment: please check that you expand acronyms when first used.<br>
</span></font><font size=3D2 color=3Dblue face=3D"Courier New"><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>[CJ]&nbsp;OK.</span></font><span
lang=3DFR><o:p></o:p></span></p>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
lang=3DFR
style=3D'font-size:12.0pt'>&nbsp;<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dblue face=3D"Courier =
New"><span lang=3DFR
style=3D'font-size:10.0pt;font-family:"Courier =
New";color:blue'>Cheers,</span></font><span
lang=3DFR><o:p></o:p></span></p>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
lang=3DFR
style=3D'font-size:12.0pt'>&nbsp;<o:p></o:p></span></font></p>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><font size=3D2 =
color=3Dblue
face=3D"Courier New"><span lang=3DFR =
style=3D'font-size:10.0pt;font-family:"Courier New";
color:blue'>Christian.</span></font><font size=3D2 face=3DCalibri><span =
lang=3DFR
style=3D'font-size:10.0pt;font-family:Calibri'>&nbsp;</span></font><span =
lang=3DFR><o:p></o:p></span></p>

</blockquote>

</div>

</body>

</html>
<table><tr><td bgcolor=3D#ffffff><font =
color=3D#000000>*********************************<br>
This message and any attachments (the "message") are confidential and =
intended solely for the addressees. <br>
Any unauthorised use or dissemination is prohibited.<br>
Messages are susceptible to alteration. <br>
France Telecom Group shall not be liable for the message if altered, =
changed or falsified.<br>
If you are not the intended addressee of this message, please cancel it =
immediately and inform the sender.<br>
********************************<br>
</font></td></tr></table>
------=_NextPart_000_00BE_01C90449.1CA63C70--


--===============1115744616==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Roll mailing list
Roll@ietf.org
https://www.ietf.org/mailman/listinfo/roll

--===============1115744616==--



From roll-bounces@ietf.org  Sun Aug 24 05:13:59 2008
Return-Path: <roll-bounces@ietf.org>
X-Original-To: roll-archive@ietf.org
Delivered-To: ietfarch-roll-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id ED43A3A6B3E;
	Sun, 24 Aug 2008 05:13:59 -0700 (PDT)
X-Original-To: roll@core3.amsl.com
Delivered-To: roll@core3.amsl.com
Received: from localhost (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 8678F3A6B3E
	for <roll@core3.amsl.com>; Sun, 24 Aug 2008 05:13:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.152
X-Spam-Level: *
X-Spam-Status: No, score=1.152 tagged_above=-999 required=5 tests=[AWL=-1.150, 
	BAYES_50=0.001, MANGLED_TOOL=2.3, STOX_REPLY_TYPE=0.001]
Received: from mail.ietf.org ([64.170.98.32])
	by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id 8czpHGJehYJm for <roll@core3.amsl.com>;
	Sun, 24 Aug 2008 05:13:57 -0700 (PDT)
Received: from asmtp2.iomartmail.com (asmtp2.iomartmail.com [62.128.201.249])
	by core3.amsl.com (Postfix) with ESMTP id A9E4B3A689B
	for <roll@ietf.org>; Sun, 24 Aug 2008 05:13:56 -0700 (PDT)
Received: from asmtp2.iomartmail.com (localhost.localdomain [127.0.0.1])
	by asmtp2.iomartmail.com (8.12.11.20060308/8.12.8) with ESMTP id
	m7OCDpmo018903 for <roll@ietf.org>; Sun, 24 Aug 2008 13:13:51 +0100
Received: from your029b8cecfe (dsl-sp-81-140-15-32.in-addr.broadbandscope.com
	[81.140.15.32]) (authenticated bits=0)
	by asmtp2.iomartmail.com (8.12.11.20060308/8.12.11) with ESMTP id
	m7OCDoRM018897 for <roll@ietf.org>; Sun, 24 Aug 2008 13:13:50 +0100
Message-ID: <046001c905e2$dd5b0f50$0300a8c0@your029b8cecfe>
From: "Adrian Farrel" <adrian@olddog.co.uk>
To: <roll@ietf.org>
Date: Sun, 24 Aug 2008 13:13:46 +0100
MIME-Version: 1.0
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2900.3138
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3350
Subject: [Roll] draft-ietf-roll-protocols-survey-00
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: Adrian Farrel <adrian@olddog.co.uk>
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/roll>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: roll-bounces@ietf.org
Errors-To: roll-bounces@ietf.org

Hi,

As one of the two tourists who raised a hand in Dublin to express uneasiness 
about this I-D becoming a WG draft, I thought I should write a note about my 
concerns.

I should caveat this by saying that I do appreciate the need for this work, 
and that the author-team will, I'm sure, do a fine job at delivering what 
the working group needs. My concerns were much more about getting the 
direction of the I-D right before accepting it as I think it is often harder 
to recast an I-D once it is within the working group.

Below, please find my major discussion point. I have also done a review of 
the draft and found a bunch of issues/questions of more minor importance.

Regards,
Adrian

===

The analysis of the routing protocols is predicated on what they are 
currently used for. To some extent this is reasonable - the easiest analysis 
of a routing protocol is in its operational environment. But to use this 
analysis as the basis of a decision for use of a protocol in a new 
environment is not so reasonable. If you want to show that none of today's 
protocols has been designed for use in the ROLL environment, then I don't 
suppose anyone will be surprised. However, what we are really interested in 
is whether any of the existing protocols is suitable for adaptation for use 
in ROLL, whether the those adaptations would be contrived and technically 
hard (or flaky), and whether it would be more efficient to design a new 
protocol.

For an example (and I'm not proposing this as the solution for ROLL), an IGP 
could easily be adapted to flood on only certain links, to discard certain 
LSAs, and to build a FIB according to specific rules. This would not be a 
large change to the protocol, although it would obviously not be 
interoperable.

To discard from consideration any protocol based on its behavior in a 
certain environment without setting it in the context of your forwarding 
paradigm and without examining the potential to adapt a protocol to that 
environment is wrong. If all you wanted to do was show that no current 
variant of any existing routing protocol is immediately applicable to ROLL, 
then that would be easy and would not be a surprise. But to imply that 
protocols are not open for adaptation is more serious.

This is not to say that inventing a new protocol would be wrong or not fun. 
Only that your reasons for discarding protocols are poorly founded. You have 
focused on the operation of the routing protocol, not the purpose of the 
routing protocol. To give a better understanding of why you are discarding a 
protocol, you must show what you want to achieve as your forwarding 
paradigm. The requirements documents make some start at this. For example, 
draft-ietf-roll-urban-routing-reqs talks about:
- routing to minimise power usage
- routing to consider node and link capabilities
- routing protocol to scale within CPU, memory and power limits
- routing according to different metrics (latency is cited)

Such considerations are a good start to understanding the forwarding 
paradigm in ROLL, but would not be good enough to use to devise a new 
routing protocol, so I don't see how they can be good enough to determine 
whether an existing protocol should be discarded, modified, or used.

=============

More specific comments on the draft follow.

---

Do we have a commitment from the WG that any new protocol developed will be 
held to the same standards? That is, that the new protocol MUST achieve a 
"pass" in very column of the table in section 4. Or is there scope for 
pragmatism allowing trade-offs in the new protocol such that in some 
environments it achieves a pass in some columns, and in other environments 
it achieves a pass in other columns.

Maybe you could add this as a statement in the Abstract and Introduction

---

Why do you include the requirements language boilerplate? I don't think you 
use (or should use) such language in this document.

---

Section 1

Can you strip out terms not used in the document?

---

Section 2

You quote CPU power in MHz. Although that is the practical electronic limit, 
maybe MIPS would be a better measure.

---

Section 3 para 2

"If a protocol cannot meet even these minimalist criteria..."
I think your use of "cannot" is correct in the context of the sentence, but 
I think your I-D examines "does not"

"...is unlikely to be good candidate..."
Too much prevarication!

---

Section 3 para 3

"...the protocol does not appear to contain sufficient flexibility..."
The problem with this is that it is very mushy!
It is OK to discard a protocol that is not flexible enough to handle your 
requirements. It is not OK to discard a protocol because you don't appear to 
know how to extend it.

A example comes in the somewhat contentious table in section 4 :-)
Here, for OSPF, you say that there is a "fail" for conveying node costs.
But there is already LSA available for carrying node capabilities, and there 
are opaque LSAs available for carrying additional "unconventional" 
information.

All this sort of ties to my main point. Of course, the protocols don't do 
exactly what you want already, but a more thorough survey is needed if you 
what to use this I-D as the reason for excluding protocols.

---

Section 3.2 para 1
"...with size ranging from a minimum..."
I think you mean "...with maximum size ranging from a minimum..."

"very large networks"
Can you de-fluff this? Some people might think that 250 nodes is very large 
;-)

"network depths"
Would be worth including your definition here.

--

Section 3.2 para 1

Is every network node a router? draft-ietf-roll-urban-routing-reqs says 
"Sensor nodes are capable of forwarding data." If every node is a router and 
participates in the routing protocol, this creates a very different 
environment from saying that most sensors are hosts, and some are routers. I 
appreciate that "capable" does not imply "do".

---

Associated with the previous point, I think you might spend a little more 
time discussing the definition of a link in ROLL. It is clear that in a 
wireless n/w a link may exist between any two nodes in range. If that is 
what you mean, then it would help to make it clear. On the other hand, 
"link" could be defined as an active neighbor relationship between a pair of 
routers. Or something else.

This becomes important as we try to understand how the protocol must scale, 
and what it is supposed to do.

I presume that the concept of "parallel links" between neighbors is going to 
have no meaning at the moment. That is, you use only one frequency in any 
network. Maybe I presume wrong, in which case, you need to refine the 
definition of "network density" in section 3.1.

---

Section 3.2 para 1
Final sentence is a bit mangled.

---

Section 3.2 para 2

I can see why scaling with O(L) may be an issue, but it may depend on the 
definitions of links and routers. Also it may depend on what magnitude you 
expect for L. Perhaps you could give some ball-parks in the previous 
paragraph as you do for N and D. Without that, it is hard to justify the 
claim that scaling with O(L) is a problem.

---

Section 3.3

Can you add SINR to your terminology?

"...not trigger unnecessary responses..."
I think that this is subjective and unhelpful. Can you rephrase to capture a 
quantifiable requirement?

s/link changes to propagate across/link changes to be propagated across/

s/O(l)/O(L)/

---

Section 3.3 final para

You have "transmissions", "broadcast", and "route updates". Can you use a 
consistent term? It may be less pretty English, but it would be a better way 
to avoid accusations of bias :-)

Perhaps...
More precisely, loss responses that require transmissions within the network 
of O(N) fail, while those that are limited to O(L) or O(D) pass.

---

Section 3.4 para 1

"In terms of routing structure, any proposed L2N routing protocol ought to 
support the autonomous organization and configuration of the network at the 
lowest possible energy cost."

Why "L2N"? I thought "Networks of low power wireless devices introduce novel 
IP routing issues."

"ought" is not a recognized RFC 2119 word :-)

I think "at the lowest possible energy cost" is a statement that this 
requirement trumps all others. Is that what you mean?

I'm not convinced by the absolute statement you make here. Maybe, this is a 
question I should take to the requirements documents. Consider routing 
protocol A that is slightly more (say 5%) power-consuming than routing 
protocol B. But suppose protocol A gives rise to a data forwarding solution 
that is 50% more power-efficient?

---

Section 3.4 para 2

"As low-power wireless networks can have very low data rates, protocols 
which require a minimum control packet rate can have unbounded control 
overhead."

I know what you mean, but I had to parse several times. How about...

The control overhead is the ratio of control data to payload data. A high 
control overhead indicates that precious network resources (bandwidth, 
power, or CPU) are being consumed by the control protocols instead of being 
used to transmit data. Where payload data rates are very low (as is often 
the case in low-power wireless networks) the control overhead can become 
unbounded for protocols that require some non-zero background control packet 
rate.

---

Section 3.4 para 2

s/never meet the condition can be forced/never meet the condition could be 
forced/

---

Section 4 para 3

"multiple layer 2 hops away"
Really?
Again, I thought we were building an IP routing protocol. If your 
requirement is layer 2 routing, you need to make that visible up front.
But, I can see why you are interested in L2 hops as well as L3 hops since 
they all consume power.

This comes back to the question about whether all nodes are routers. Perhaps 
some repeaters are not routers?

But can't we actually factor the L2 hops into the definition of the L3 hop?

---

Section 4 para 3

"...nodes may only advertise..."
This sounds prohibitive!

---

Section 4 para 4

"Neighbor discovery is a critical component of any routing protocol."
I think I disagree.
It is clear that routing protocols need to know their neighbors. It is not 
clear that this requires that the discovery be part of the routing protocol.

Later you have:
"...key component of many protocols."
This is less strong than the initial sentence.

---

Section 4

"Protocols Today"

Is this a section 4.1 headers?

---

Section 4 "Protocols Today" para 2

I don't think the MPLS TE example is a good one. It is certainly not correct 
that the TED has to be fully distributed around the network.
There are some very good examples of where "stub TE areas" do not need to 
know the TE information for the whole of the rest of the network.

---

Section 4 Table

I'm prepared to bet that a lot of people will be upset by the use of "fail" 
for their favorite protocols. It would seem that "?" is more appropriate in 
many cells.

---

Section 5.1
Is it worth replacing "OSPF" with "OSPF or IS-IS"?

---

Section 14.
Your three ROLL requirements drafts are Normative References, I think. 

_______________________________________________
Roll mailing list
Roll@ietf.org
https://www.ietf.org/mailman/listinfo/roll


From roll-bounces@ietf.org  Mon Aug 25 09:15:14 2008
Return-Path: <roll-bounces@ietf.org>
X-Original-To: roll-archive@ietf.org
Delivered-To: ietfarch-roll-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id C42AD3A682F;
	Mon, 25 Aug 2008 09:15:14 -0700 (PDT)
X-Original-To: roll@core3.amsl.com
Delivered-To: roll@core3.amsl.com
Received: from localhost (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 9F6FC3A67F6
	for <roll@core3.amsl.com>; Mon, 25 Aug 2008 09:15:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.699
X-Spam-Level: 
X-Spam-Status: No, score=-1.699 tagged_above=-999 required=5
	tests=[BAYES_50=0.001, MANGLED_TOOL=2.3, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32])
	by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id U8ticrQ6WjRp for <roll@core3.amsl.com>;
	Mon, 25 Aug 2008 09:15:12 -0700 (PDT)
Received: from slb-smtpout-01.boeing.com (slb-smtpout-01.boeing.com
	[130.76.64.48]) by core3.amsl.com (Postfix) with ESMTP id 2E20D3A682F
	for <roll@ietf.org>; Mon, 25 Aug 2008 09:15:12 -0700 (PDT)
Received: from stl-av-01.boeing.com (stl-av-01.boeing.com [192.76.190.6])
	by slb-smtpout-01.ns.cs.boeing.com (8.14.0/8.14.0/8.14.0/SMTPOUT) with
	ESMTP id m7PGDUK0029485
	(version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL);
	Mon, 25 Aug 2008 09:13:37 -0700 (PDT)
Received: from stl-av-01.boeing.com (localhost [127.0.0.1])
	by stl-av-01.boeing.com (8.14.0/8.14.0/DOWNSTREAM_RELAY) with ESMTP id
	m7PGDThu016575; Mon, 25 Aug 2008 11:13:29 -0500 (CDT)
Received: from xch-swbh-11.sw.nos.boeing.com (xch-swbh-11.sw.nos.boeing.com
	[129.172.192.157])
	by stl-av-01.boeing.com (8.14.0/8.14.0/UPSTREAM_RELAY) with ESMTP id
	m7PGDTY5016550; Mon, 25 Aug 2008 11:13:29 -0500 (CDT)
Received: from XCH-SW-5V2.sw.nos.boeing.com ([129.172.193.50]) by
	xch-swbh-11.sw.nos.boeing.com with Microsoft SMTPSVC(6.0.3790.3959); 
	Mon, 25 Aug 2008 09:13:28 -0700
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Date: Mon, 25 Aug 2008 09:13:27 -0700
Message-ID: <51661468CBD1354294533DA79E85955A01053026@XCH-SW-5V2.sw.nos.boeing.com>
In-Reply-To: <046001c905e2$dd5b0f50$0300a8c0@your029b8cecfe>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: [Roll] draft-ietf-roll-protocols-survey-00
Thread-Index: AckF4uWWv+jCr8q7RKKuNS7geV3eIgA6l4jA
References: <046001c905e2$dd5b0f50$0300a8c0@your029b8cecfe>
From: "Drake, John E" <John.E.Drake2@boeing.com>
To: "Adrian Farrel" <adrian@olddog.co.uk>, <roll@ietf.org>
X-OriginalArrivalTime: 25 Aug 2008 16:13:28.0978 (UTC)
	FILETIME=[82D43F20:01C906CD]
Subject: Re: [Roll] draft-ietf-roll-protocols-survey-00
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/roll>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: roll-bounces@ietf.org
Errors-To: roll-bounces@ietf.org

Adrian,

An excellent note - I agree completely.  We need fewer routing
protocols, not more.

Thanks,

John

>-----Original Message-----
>From: Adrian Farrel [mailto:adrian@olddog.co.uk] 
>Sent: Sunday, August 24, 2008 5:14 AM
>To: roll@ietf.org
>Subject: [Roll] draft-ietf-roll-protocols-survey-00
>
>Hi,
>
>As one of the two tourists who raised a hand in Dublin to 
>express uneasiness about this I-D becoming a WG draft, I 
>thought I should write a note about my concerns.
>
>I should caveat this by saying that I do appreciate the need 
>for this work, and that the author-team will, I'm sure, do a 
>fine job at delivering what the working group needs. My 
>concerns were much more about getting the direction of the I-D 
>right before accepting it as I think it is often harder to 
>recast an I-D once it is within the working group.
>
>Below, please find my major discussion point. I have also done 
>a review of the draft and found a bunch of issues/questions of 
>more minor importance.
>
>Regards,
>Adrian
>
>===
>
>The analysis of the routing protocols is predicated on what 
>they are currently used for. To some extent this is reasonable 
>- the easiest analysis of a routing protocol is in its 
>operational environment. But to use this analysis as the basis 
>of a decision for use of a protocol in a new environment is 
>not so reasonable. If you want to show that none of today's 
>protocols has been designed for use in the ROLL environment, 
>then I don't suppose anyone will be surprised. However, what 
>we are really interested in is whether any of the existing 
>protocols is suitable for adaptation for use in ROLL, whether 
>the those adaptations would be contrived and technically hard 
>(or flaky), and whether it would be more efficient to design a 
>new protocol.
>
>For an example (and I'm not proposing this as the solution for 
>ROLL), an IGP could easily be adapted to flood on only certain 
>links, to discard certain LSAs, and to build a FIB according 
>to specific rules. This would not be a large change to the 
>protocol, although it would obviously not be interoperable.
>
>To discard from consideration any protocol based on its 
>behavior in a certain environment without setting it in the 
>context of your forwarding paradigm and without examining the 
>potential to adapt a protocol to that environment is wrong. If 
>all you wanted to do was show that no current variant of any 
>existing routing protocol is immediately applicable to ROLL, 
>then that would be easy and would not be a surprise. But to 
>imply that protocols are not open for adaptation is more serious.
>
>This is not to say that inventing a new protocol would be 
>wrong or not fun. 
>Only that your reasons for discarding protocols are poorly 
>founded. You have focused on the operation of the routing 
>protocol, not the purpose of the routing protocol. To give a 
>better understanding of why you are discarding a protocol, you 
>must show what you want to achieve as your forwarding 
>paradigm. The requirements documents make some start at this. 
>For example, draft-ietf-roll-urban-routing-reqs talks about:
>- routing to minimise power usage
>- routing to consider node and link capabilities
>- routing protocol to scale within CPU, memory and power limits
>- routing according to different metrics (latency is cited)
>
>Such considerations are a good start to understanding the 
>forwarding paradigm in ROLL, but would not be good enough to 
>use to devise a new routing protocol, so I don't see how they 
>can be good enough to determine whether an existing protocol 
>should be discarded, modified, or used.
>
>=============
>
>More specific comments on the draft follow.
>
>---
>
>Do we have a commitment from the WG that any new protocol 
>developed will be held to the same standards? That is, that 
>the new protocol MUST achieve a "pass" in very column of the 
>table in section 4. Or is there scope for pragmatism allowing 
>trade-offs in the new protocol such that in some environments 
>it achieves a pass in some columns, and in other environments 
>it achieves a pass in other columns.
>
>Maybe you could add this as a statement in the Abstract and 
>Introduction
>
>---
>
>Why do you include the requirements language boilerplate? I 
>don't think you use (or should use) such language in this document.
>
>---
>
>Section 1
>
>Can you strip out terms not used in the document?
>
>---
>
>Section 2
>
>You quote CPU power in MHz. Although that is the practical 
>electronic limit, maybe MIPS would be a better measure.
>
>---
>
>Section 3 para 2
>
>"If a protocol cannot meet even these minimalist criteria..."
>I think your use of "cannot" is correct in the context of the 
>sentence, but I think your I-D examines "does not"
>
>"...is unlikely to be good candidate..."
>Too much prevarication!
>
>---
>
>Section 3 para 3
>
>"...the protocol does not appear to contain sufficient flexibility..."
>The problem with this is that it is very mushy!
>It is OK to discard a protocol that is not flexible enough to 
>handle your requirements. It is not OK to discard a protocol 
>because you don't appear to know how to extend it.
>
>A example comes in the somewhat contentious table in section 4 
>:-) Here, for OSPF, you say that there is a "fail" for 
>conveying node costs.
>But there is already LSA available for carrying node 
>capabilities, and there are opaque LSAs available for carrying 
>additional "unconventional" 
>information.
>
>All this sort of ties to my main point. Of course, the 
>protocols don't do exactly what you want already, but a more 
>thorough survey is needed if you what to use this I-D as the 
>reason for excluding protocols.
>
>---
>
>Section 3.2 para 1
>"...with size ranging from a minimum..."
>I think you mean "...with maximum size ranging from a minimum..."
>
>"very large networks"
>Can you de-fluff this? Some people might think that 250 nodes 
>is very large
>;-)
>
>"network depths"
>Would be worth including your definition here.
>
>--
>
>Section 3.2 para 1
>
>Is every network node a router? 
>draft-ietf-roll-urban-routing-reqs says "Sensor nodes are 
>capable of forwarding data." If every node is a router and 
>participates in the routing protocol, this creates a very 
>different environment from saying that most sensors are hosts, 
>and some are routers. I appreciate that "capable" does not imply "do".
>
>---
>
>Associated with the previous point, I think you might spend a 
>little more 
>time discussing the definition of a link in ROLL. It is clear 
>that in a 
>wireless n/w a link may exist between any two nodes in range. 
>If that is 
>what you mean, then it would help to make it clear. On the other hand, 
>"link" could be defined as an active neighbor relationship 
>between a pair of 
>routers. Or something else.
>
>This becomes important as we try to understand how the 
>protocol must scale, 
>and what it is supposed to do.
>
>I presume that the concept of "parallel links" between 
>neighbors is going to 
>have no meaning at the moment. That is, you use only one 
>frequency in any 
>network. Maybe I presume wrong, in which case, you need to refine the 
>definition of "network density" in section 3.1.
>
>---
>
>Section 3.2 para 1
>Final sentence is a bit mangled.
>
>---
>
>Section 3.2 para 2
>
>I can see why scaling with O(L) may be an issue, but it may 
>depend on the 
>definitions of links and routers. Also it may depend on what 
>magnitude you 
>expect for L. Perhaps you could give some ball-parks in the previous 
>paragraph as you do for N and D. Without that, it is hard to 
>justify the 
>claim that scaling with O(L) is a problem.
>
>---
>
>Section 3.3
>
>Can you add SINR to your terminology?
>
>"...not trigger unnecessary responses..."
>I think that this is subjective and unhelpful. Can you 
>rephrase to capture a 
>quantifiable requirement?
>
>s/link changes to propagate across/link changes to be 
>propagated across/
>
>s/O(l)/O(L)/
>
>---
>
>Section 3.3 final para
>
>You have "transmissions", "broadcast", and "route updates". 
>Can you use a 
>consistent term? It may be less pretty English, but it would 
>be a better way 
>to avoid accusations of bias :-)
>
>Perhaps...
>More precisely, loss responses that require transmissions 
>within the network 
>of O(N) fail, while those that are limited to O(L) or O(D) pass.
>
>---
>
>Section 3.4 para 1
>
>"In terms of routing structure, any proposed L2N routing 
>protocol ought to 
>support the autonomous organization and configuration of the 
>network at the 
>lowest possible energy cost."
>
>Why "L2N"? I thought "Networks of low power wireless devices 
>introduce novel 
>IP routing issues."
>
>"ought" is not a recognized RFC 2119 word :-)
>
>I think "at the lowest possible energy cost" is a statement that this 
>requirement trumps all others. Is that what you mean?
>
>I'm not convinced by the absolute statement you make here. 
>Maybe, this is a 
>question I should take to the requirements documents. Consider routing 
>protocol A that is slightly more (say 5%) power-consuming than routing 
>protocol B. But suppose protocol A gives rise to a data 
>forwarding solution 
>that is 50% more power-efficient?
>
>---
>
>Section 3.4 para 2
>
>"As low-power wireless networks can have very low data rates, 
>protocols 
>which require a minimum control packet rate can have unbounded control 
>overhead."
>
>I know what you mean, but I had to parse several times. How about...
>
>The control overhead is the ratio of control data to payload 
>data. A high 
>control overhead indicates that precious network resources (bandwidth, 
>power, or CPU) are being consumed by the control protocols 
>instead of being 
>used to transmit data. Where payload data rates are very low 
>(as is often 
>the case in low-power wireless networks) the control overhead 
>can become 
>unbounded for protocols that require some non-zero background 
>control packet 
>rate.
>
>---
>
>Section 3.4 para 2
>
>s/never meet the condition can be forced/never meet the 
>condition could be 
>forced/
>
>---
>
>Section 4 para 3
>
>"multiple layer 2 hops away"
>Really?
>Again, I thought we were building an IP routing protocol. If your 
>requirement is layer 2 routing, you need to make that visible up front.
>But, I can see why you are interested in L2 hops as well as L3 
>hops since 
>they all consume power.
>
>This comes back to the question about whether all nodes are 
>routers. Perhaps 
>some repeaters are not routers?
>
>But can't we actually factor the L2 hops into the definition 
>of the L3 hop?
>
>---
>
>Section 4 para 3
>
>"...nodes may only advertise..."
>This sounds prohibitive!
>
>---
>
>Section 4 para 4
>
>"Neighbor discovery is a critical component of any routing protocol."
>I think I disagree.
>It is clear that routing protocols need to know their 
>neighbors. It is not 
>clear that this requires that the discovery be part of the 
>routing protocol.
>
>Later you have:
>"...key component of many protocols."
>This is less strong than the initial sentence.
>
>---
>
>Section 4
>
>"Protocols Today"
>
>Is this a section 4.1 headers?
>
>---
>
>Section 4 "Protocols Today" para 2
>
>I don't think the MPLS TE example is a good one. It is 
>certainly not correct 
>that the TED has to be fully distributed around the network.
>There are some very good examples of where "stub TE areas" do 
>not need to 
>know the TE information for the whole of the rest of the network.
>
>---
>
>Section 4 Table
>
>I'm prepared to bet that a lot of people will be upset by the 
>use of "fail" 
>for their favorite protocols. It would seem that "?" is more 
>appropriate in 
>many cells.
>
>---
>
>Section 5.1
>Is it worth replacing "OSPF" with "OSPF or IS-IS"?
>
>---
>
>Section 14.
>Your three ROLL requirements drafts are Normative References, I think. 
>
>_______________________________________________
>Roll mailing list
>Roll@ietf.org
>https://www.ietf.org/mailman/listinfo/roll
>
_______________________________________________
Roll mailing list
Roll@ietf.org
https://www.ietf.org/mailman/listinfo/roll


From roll-bounces@ietf.org  Wed Aug 27 02:28:47 2008
Return-Path: <roll-bounces@ietf.org>
X-Original-To: roll-archive@ietf.org
Delivered-To: ietfarch-roll-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 78C843A691F;
	Wed, 27 Aug 2008 02:28:47 -0700 (PDT)
X-Original-To: roll@core3.amsl.com
Delivered-To: roll@core3.amsl.com
Received: from localhost (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 5F5593A684F
	for <roll@core3.amsl.com>; Wed, 27 Aug 2008 02:28:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.449
X-Spam-Level: 
X-Spam-Status: No, score=-5.449 tagged_above=-999 required=5
	tests=[AWL=-1.150, BAYES_00=-2.599, MANGLED_TOOL=2.3,
	RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32])
	by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id yzJedD6KFdU2 for <roll@core3.amsl.com>;
	Wed, 27 Aug 2008 02:28:44 -0700 (PDT)
Received: from rtp-iport-2.cisco.com (rtp-iport-2.cisco.com [64.102.122.149])
	by core3.amsl.com (Postfix) with ESMTP id 7010E3A691F
	for <roll@ietf.org>; Wed, 27 Aug 2008 02:28:44 -0700 (PDT)
X-IronPort-AV: E=Sophos;i="4.32,278,1217808000"; d="scan'208";a="18821151"
Received: from rtp-dkim-2.cisco.com ([64.102.121.159])
	by rtp-iport-2.cisco.com with ESMTP; 27 Aug 2008 09:28:04 +0000
Received: from rtp-core-1.cisco.com (rtp-core-1.cisco.com [64.102.124.12])
	by rtp-dkim-2.cisco.com (8.12.11/8.12.11) with ESMTP id m7R9S4fV031713; 
	Wed, 27 Aug 2008 05:28:04 -0400
Received: from xbh-rtp-201.amer.cisco.com (xbh-rtp-201.cisco.com
	[64.102.31.12])
	by rtp-core-1.cisco.com (8.13.8/8.13.8) with ESMTP id m7R9S4To013878;
	Wed, 27 Aug 2008 09:28:04 GMT
Received: from xmb-rtp-213.amer.cisco.com ([64.102.31.112]) by
	xbh-rtp-201.amer.cisco.com with Microsoft SMTPSVC(6.0.3790.1830); 
	Wed, 27 Aug 2008 05:28:04 -0400
Received: from 10.21.94.91 ([10.21.94.91]) by xmb-rtp-213.amer.cisco.com
	([64.102.31.112]) with Microsoft Exchange Server HTTP-DAV ; 
	Wed, 27 Aug 2008 09:24:18 +0000
User-Agent: Microsoft-Entourage/12.12.0.080729
Date: Wed, 27 Aug 2008 11:23:56 +0200
From: JP Vasseur <jvasseur@cisco.com>
To: "Drake, John E" <John.E.Drake2@boeing.com>,
	Adrian Farrel <adrian@olddog.co.uk>, <roll@ietf.org>
Message-ID: <C4DAE9CC.503D4%jvasseur@cisco.com>
Thread-Topic: [Roll] draft-ietf-roll-protocols-survey-00
Thread-Index: AckF4uWWv+jCr8q7RKKuNS7geV3eIgA6l4jAAFZXU+0=
In-Reply-To: <51661468CBD1354294533DA79E85955A01053026@XCH-SW-5V2.sw.nos.boeing.com>
Mime-version: 1.0
X-OriginalArrivalTime: 27 Aug 2008 09:28:04.0219 (UTC)
	FILETIME=[34F814B0:01C90827]
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; l=13360; t=1219829284;
	x=1220693284; c=relaxed/simple; s=rtpdkim2001;
	h=Content-Type:From:Subject:Content-Transfer-Encoding:MIME-Version;
	d=cisco.com; i=jvasseur@cisco.com;
	z=From:=20JP=20Vasseur=20<jvasseur@cisco.com>
	|Subject:=20Re=3A=20[Roll]=20draft-ietf-roll-protocols-surv
	ey-00 |Sender:=20
	|To:=20=22Drake,=20John=20E=22=20<John.E.Drake2@boeing.com>
	,=0A=20=20=20=20=20=20=20=20Adrian=20Farrel=20<adrian@olddog
	.co.uk>,=20<roll@ietf.org>;
	bh=DPX+LEVZQWP0VpH/9d1tAxzRd4S6kMY4uBfjhgr2MCc=;
	b=k/GezIhX/6kihXZmOHdhmMBl/16aw6WSb8z+1HmIJ6onJgRpI/9S7+Ftti
	eCwycaS0tVP3MIfAmHiuVOYr7n/jK8oBMEjsxg0Rs8Y03VsuX6TtX6Jw2yB5
	cSMMssPjML;
Authentication-Results: rtp-dkim-2; header.From=jvasseur@cisco.com; dkim=pass (
	sig from cisco.com/rtpdkim2001 verified; ); 
Subject: Re: [Roll] draft-ietf-roll-protocols-survey-00
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/roll>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: roll-bounces@ietf.org
Errors-To: roll-bounces@ietf.org

John,

I do not think that this was Adrian's point. Your feed-back is more than
welcome but please argue a bit more ...

Thanks.

JP.


On 8/25/08 6:13 PM, "Drake, John E" <John.E.Drake2@boeing.com> wrote:

> Adrian,
> 
> An excellent note - I agree completely.  We need fewer routing
> protocols, not more.
> 
> Thanks,
> 
> John
> 
>> -----Original Message-----
>> From: Adrian Farrel [mailto:adrian@olddog.co.uk]
>> Sent: Sunday, August 24, 2008 5:14 AM
>> To: roll@ietf.org
>> Subject: [Roll] draft-ietf-roll-protocols-survey-00
>> 
>> Hi,
>> 
>> As one of the two tourists who raised a hand in Dublin to
>> express uneasiness about this I-D becoming a WG draft, I
>> thought I should write a note about my concerns.
>> 
>> I should caveat this by saying that I do appreciate the need
>> for this work, and that the author-team will, I'm sure, do a
>> fine job at delivering what the working group needs. My
>> concerns were much more about getting the direction of the I-D
>> right before accepting it as I think it is often harder to
>> recast an I-D once it is within the working group.
>> 
>> Below, please find my major discussion point. I have also done
>> a review of the draft and found a bunch of issues/questions of
>> more minor importance.
>> 
>> Regards,
>> Adrian
>> 
>> ===
>> 
>> The analysis of the routing protocols is predicated on what
>> they are currently used for. To some extent this is reasonable
>> - the easiest analysis of a routing protocol is in its
>> operational environment. But to use this analysis as the basis
>> of a decision for use of a protocol in a new environment is
>> not so reasonable. If you want to show that none of today's
>> protocols has been designed for use in the ROLL environment,
>> then I don't suppose anyone will be surprised. However, what
>> we are really interested in is whether any of the existing
>> protocols is suitable for adaptation for use in ROLL, whether
>> the those adaptations would be contrived and technically hard
>> (or flaky), and whether it would be more efficient to design a
>> new protocol.
>> 
>> For an example (and I'm not proposing this as the solution for
>> ROLL), an IGP could easily be adapted to flood on only certain
>> links, to discard certain LSAs, and to build a FIB according
>> to specific rules. This would not be a large change to the
>> protocol, although it would obviously not be interoperable.
>> 
>> To discard from consideration any protocol based on its
>> behavior in a certain environment without setting it in the
>> context of your forwarding paradigm and without examining the
>> potential to adapt a protocol to that environment is wrong. If
>> all you wanted to do was show that no current variant of any
>> existing routing protocol is immediately applicable to ROLL,
>> then that would be easy and would not be a surprise. But to
>> imply that protocols are not open for adaptation is more serious.
>> 
>> This is not to say that inventing a new protocol would be
>> wrong or not fun.
>> Only that your reasons for discarding protocols are poorly
>> founded. You have focused on the operation of the routing
>> protocol, not the purpose of the routing protocol. To give a
>> better understanding of why you are discarding a protocol, you
>> must show what you want to achieve as your forwarding
>> paradigm. The requirements documents make some start at this.
>> For example, draft-ietf-roll-urban-routing-reqs talks about:
>> - routing to minimise power usage
>> - routing to consider node and link capabilities
>> - routing protocol to scale within CPU, memory and power limits
>> - routing according to different metrics (latency is cited)
>> 
>> Such considerations are a good start to understanding the
>> forwarding paradigm in ROLL, but would not be good enough to
>> use to devise a new routing protocol, so I don't see how they
>> can be good enough to determine whether an existing protocol
>> should be discarded, modified, or used.
>> 
>> =============
>> 
>> More specific comments on the draft follow.
>> 
>> ---
>> 
>> Do we have a commitment from the WG that any new protocol
>> developed will be held to the same standards? That is, that
>> the new protocol MUST achieve a "pass" in very column of the
>> table in section 4. Or is there scope for pragmatism allowing
>> trade-offs in the new protocol such that in some environments
>> it achieves a pass in some columns, and in other environments
>> it achieves a pass in other columns.
>> 
>> Maybe you could add this as a statement in the Abstract and
>> Introduction
>> 
>> ---
>> 
>> Why do you include the requirements language boilerplate? I
>> don't think you use (or should use) such language in this document.
>> 
>> ---
>> 
>> Section 1
>> 
>> Can you strip out terms not used in the document?
>> 
>> ---
>> 
>> Section 2
>> 
>> You quote CPU power in MHz. Although that is the practical
>> electronic limit, maybe MIPS would be a better measure.
>> 
>> ---
>> 
>> Section 3 para 2
>> 
>> "If a protocol cannot meet even these minimalist criteria..."
>> I think your use of "cannot" is correct in the context of the
>> sentence, but I think your I-D examines "does not"
>> 
>> "...is unlikely to be good candidate..."
>> Too much prevarication!
>> 
>> ---
>> 
>> Section 3 para 3
>> 
>> "...the protocol does not appear to contain sufficient flexibility..."
>> The problem with this is that it is very mushy!
>> It is OK to discard a protocol that is not flexible enough to
>> handle your requirements. It is not OK to discard a protocol
>> because you don't appear to know how to extend it.
>> 
>> A example comes in the somewhat contentious table in section 4
>> :-) Here, for OSPF, you say that there is a "fail" for
>> conveying node costs.
>> But there is already LSA available for carrying node
>> capabilities, and there are opaque LSAs available for carrying
>> additional "unconventional"
>> information.
>> 
>> All this sort of ties to my main point. Of course, the
>> protocols don't do exactly what you want already, but a more
>> thorough survey is needed if you what to use this I-D as the
>> reason for excluding protocols.
>> 
>> ---
>> 
>> Section 3.2 para 1
>> "...with size ranging from a minimum..."
>> I think you mean "...with maximum size ranging from a minimum..."
>> 
>> "very large networks"
>> Can you de-fluff this? Some people might think that 250 nodes
>> is very large
>> ;-)
>> 
>> "network depths"
>> Would be worth including your definition here.
>> 
>> --
>> 
>> Section 3.2 para 1
>> 
>> Is every network node a router?
>> draft-ietf-roll-urban-routing-reqs says "Sensor nodes are
>> capable of forwarding data." If every node is a router and
>> participates in the routing protocol, this creates a very
>> different environment from saying that most sensors are hosts,
>> and some are routers. I appreciate that "capable" does not imply "do".
>> 
>> ---
>> 
>> Associated with the previous point, I think you might spend a
>> little more 
>> time discussing the definition of a link in ROLL. It is clear
>> that in a 
>> wireless n/w a link may exist between any two nodes in range.
>> If that is 
>> what you mean, then it would help to make it clear. On the other hand,
>> "link" could be defined as an active neighbor relationship
>> between a pair of
>> routers. Or something else.
>> 
>> This becomes important as we try to understand how the
>> protocol must scale,
>> and what it is supposed to do.
>> 
>> I presume that the concept of "parallel links" between
>> neighbors is going to
>> have no meaning at the moment. That is, you use only one
>> frequency in any
>> network. Maybe I presume wrong, in which case, you need to refine the
>> definition of "network density" in section 3.1.
>> 
>> ---
>> 
>> Section 3.2 para 1
>> Final sentence is a bit mangled.
>> 
>> ---
>> 
>> Section 3.2 para 2
>> 
>> I can see why scaling with O(L) may be an issue, but it may
>> depend on the 
>> definitions of links and routers. Also it may depend on what
>> magnitude you 
>> expect for L. Perhaps you could give some ball-parks in the previous
>> paragraph as you do for N and D. Without that, it is hard to
>> justify the 
>> claim that scaling with O(L) is a problem.
>> 
>> ---
>> 
>> Section 3.3
>> 
>> Can you add SINR to your terminology?
>> 
>> "...not trigger unnecessary responses..."
>> I think that this is subjective and unhelpful. Can you
>> rephrase to capture a
>> quantifiable requirement?
>> 
>> s/link changes to propagate across/link changes to be
>> propagated across/
>> 
>> s/O(l)/O(L)/
>> 
>> ---
>> 
>> Section 3.3 final para
>> 
>> You have "transmissions", "broadcast", and "route updates".
>> Can you use a 
>> consistent term? It may be less pretty English, but it would
>> be a better way 
>> to avoid accusations of bias :-)
>> 
>> Perhaps...
>> More precisely, loss responses that require transmissions
>> within the network
>> of O(N) fail, while those that are limited to O(L) or O(D) pass.
>> 
>> ---
>> 
>> Section 3.4 para 1
>> 
>> "In terms of routing structure, any proposed L2N routing
>> protocol ought to
>> support the autonomous organization and configuration of the
>> network at the 
>> lowest possible energy cost."
>> 
>> Why "L2N"? I thought "Networks of low power wireless devices
>> introduce novel 
>> IP routing issues."
>> 
>> "ought" is not a recognized RFC 2119 word :-)
>> 
>> I think "at the lowest possible energy cost" is a statement that this
>> requirement trumps all others. Is that what you mean?
>> 
>> I'm not convinced by the absolute statement you make here.
>> Maybe, this is a
>> question I should take to the requirements documents. Consider routing
>> protocol A that is slightly more (say 5%) power-consuming than routing
>> protocol B. But suppose protocol A gives rise to a data
>> forwarding solution
>> that is 50% more power-efficient?
>> 
>> ---
>> 
>> Section 3.4 para 2
>> 
>> "As low-power wireless networks can have very low data rates,
>> protocols 
>> which require a minimum control packet rate can have unbounded control
>> overhead."
>> 
>> I know what you mean, but I had to parse several times. How about...
>> 
>> The control overhead is the ratio of control data to payload
>> data. A high 
>> control overhead indicates that precious network resources (bandwidth,
>> power, or CPU) are being consumed by the control protocols
>> instead of being
>> used to transmit data. Where payload data rates are very low
>> (as is often 
>> the case in low-power wireless networks) the control overhead
>> can become 
>> unbounded for protocols that require some non-zero background
>> control packet 
>> rate.
>> 
>> ---
>> 
>> Section 3.4 para 2
>> 
>> s/never meet the condition can be forced/never meet the
>> condition could be
>> forced/
>> 
>> ---
>> 
>> Section 4 para 3
>> 
>> "multiple layer 2 hops away"
>> Really?
>> Again, I thought we were building an IP routing protocol. If your
>> requirement is layer 2 routing, you need to make that visible up front.
>> But, I can see why you are interested in L2 hops as well as L3
>> hops since 
>> they all consume power.
>> 
>> This comes back to the question about whether all nodes are
>> routers. Perhaps
>> some repeaters are not routers?
>> 
>> But can't we actually factor the L2 hops into the definition
>> of the L3 hop?
>> 
>> ---
>> 
>> Section 4 para 3
>> 
>> "...nodes may only advertise..."
>> This sounds prohibitive!
>> 
>> ---
>> 
>> Section 4 para 4
>> 
>> "Neighbor discovery is a critical component of any routing protocol."
>> I think I disagree.
>> It is clear that routing protocols need to know their
>> neighbors. It is not
>> clear that this requires that the discovery be part of the
>> routing protocol.
>> 
>> Later you have:
>> "...key component of many protocols."
>> This is less strong than the initial sentence.
>> 
>> ---
>> 
>> Section 4
>> 
>> "Protocols Today"
>> 
>> Is this a section 4.1 headers?
>> 
>> ---
>> 
>> Section 4 "Protocols Today" para 2
>> 
>> I don't think the MPLS TE example is a good one. It is
>> certainly not correct
>> that the TED has to be fully distributed around the network.
>> There are some very good examples of where "stub TE areas" do
>> not need to 
>> know the TE information for the whole of the rest of the network.
>> 
>> ---
>> 
>> Section 4 Table
>> 
>> I'm prepared to bet that a lot of people will be upset by the
>> use of "fail" 
>> for their favorite protocols. It would seem that "?" is more
>> appropriate in 
>> many cells.
>> 
>> ---
>> 
>> Section 5.1
>> Is it worth replacing "OSPF" with "OSPF or IS-IS"?
>> 
>> ---
>> 
>> Section 14.
>> Your three ROLL requirements drafts are Normative References, I think.
>> 
>> _______________________________________________
>> Roll mailing list
>> Roll@ietf.org
>> https://www.ietf.org/mailman/listinfo/roll
>> 
> _______________________________________________
> Roll mailing list
> Roll@ietf.org
> https://www.ietf.org/mailman/listinfo/roll

_______________________________________________
Roll mailing list
Roll@ietf.org
https://www.ietf.org/mailman/listinfo/roll


From roll-bounces@ietf.org  Wed Aug 27 07:46:54 2008
Return-Path: <roll-bounces@ietf.org>
X-Original-To: roll-archive@ietf.org
Delivered-To: ietfarch-roll-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id E73D93A6C0B;
	Wed, 27 Aug 2008 07:46:54 -0700 (PDT)
X-Original-To: roll@core3.amsl.com
Delivered-To: roll@core3.amsl.com
Received: from localhost (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 813663A6C0B
	for <roll@core3.amsl.com>; Wed, 27 Aug 2008 07:46:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.145
X-Spam-Level: 
X-Spam-Status: No, score=-5.145 tagged_above=-999 required=5
	tests=[AWL=-0.846, BAYES_00=-2.599, MANGLED_TOOL=2.3,
	RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32])
	by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id BTIxeZe+JDCd for <roll@core3.amsl.com>;
	Wed, 27 Aug 2008 07:46:52 -0700 (PDT)
Received: from stl-smtpout-01.boeing.com (stl-smtpout-01.boeing.com
	[130.76.96.56]) by core3.amsl.com (Postfix) with ESMTP id 82A173A683A
	for <roll@ietf.org>; Wed, 27 Aug 2008 07:46:52 -0700 (PDT)
Received: from stl-av-01.boeing.com (stl-av-01.boeing.com [192.76.190.6])
	by stl-smtpout-01.ns.cs.boeing.com (8.14.0/8.14.0/8.14.0/SMTPOUT) with
	ESMTP id m7REjOVJ019126
	(version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL);
	Wed, 27 Aug 2008 09:45:24 -0500 (CDT)
Received: from stl-av-01.boeing.com (localhost [127.0.0.1])
	by stl-av-01.boeing.com (8.14.0/8.14.0/DOWNSTREAM_RELAY) with ESMTP id
	m7REjNkn026775; Wed, 27 Aug 2008 09:45:23 -0500 (CDT)
Received: from xch-swbh-11.sw.nos.boeing.com (xch-swbh-11.sw.nos.boeing.com
	[129.172.192.157])
	by stl-av-01.boeing.com (8.14.0/8.14.0/UPSTREAM_RELAY) with ESMTP id
	m7REjFA2026558; Wed, 27 Aug 2008 09:45:23 -0500 (CDT)
Received: from XCH-SW-5V2.sw.nos.boeing.com ([129.172.193.50]) by
	xch-swbh-11.sw.nos.boeing.com with Microsoft SMTPSVC(6.0.3790.3959); 
	Wed, 27 Aug 2008 07:45:23 -0700
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Date: Wed, 27 Aug 2008 07:45:21 -0700
Message-ID: <51661468CBD1354294533DA79E85955A0109FD7B@XCH-SW-5V2.sw.nos.boeing.com>
In-Reply-To: <C4DAE9CC.503D4%jvasseur@cisco.com>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: [Roll] draft-ietf-roll-protocols-survey-00
Thread-Index: AckF4uWWv+jCr8q7RKKuNS7geV3eIgA6l4jAAFZXU+0ACvR8MA==
References: <51661468CBD1354294533DA79E85955A01053026@XCH-SW-5V2.sw.nos.boeing.com>
	<C4DAE9CC.503D4%jvasseur@cisco.com>
From: "Drake, John E" <John.E.Drake2@boeing.com>
To: "JP Vasseur" <jvasseur@cisco.com>, "Adrian Farrel" <adrian@olddog.co.uk>, 
	<roll@ietf.org>
X-OriginalArrivalTime: 27 Aug 2008 14:45:23.0192 (UTC)
	FILETIME=[8914CF80:01C90853]
Subject: Re: [Roll] draft-ietf-roll-protocols-survey-00
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/roll>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: roll-bounces@ietf.org
Errors-To: roll-bounces@ietf.org

JP,

I thought that was exactly Adrian's point.

If you evaluate a bunch of routing protocols as they exist today in a
new operational environment and conclude that none of them are
appropriate, then you have no choice but to conclude that you need to
invent at least one, but probably many, new routing protocols.  It's not
like this hasn't been done before.

I took Adrian's note to say that doing this is not sufficient and that
what needed to be done was to characterize the new operational
environment, propose changes needed in each routing protocol to address
the new operational environment, and then evaluate these changes.

Thanks,

John 

>-----Original Message-----
>From: JP Vasseur [mailto:jvasseur@cisco.com] 
>Sent: Wednesday, August 27, 2008 2:24 AM
>To: Drake, John E; Adrian Farrel; roll@ietf.org
>Subject: Re: [Roll] draft-ietf-roll-protocols-survey-00
>
>John,
>
>I do not think that this was Adrian's point. Your feed-back is 
>more than welcome but please argue a bit more ...
>
>Thanks.
>
>JP.
>
>
>On 8/25/08 6:13 PM, "Drake, John E" <John.E.Drake2@boeing.com> wrote:
>
>> Adrian,
>> 
>> An excellent note - I agree completely.  We need fewer routing 
>> protocols, not more.
>> 
>> Thanks,
>> 
>> John
>> 
>>> -----Original Message-----
>>> From: Adrian Farrel [mailto:adrian@olddog.co.uk]
>>> Sent: Sunday, August 24, 2008 5:14 AM
>>> To: roll@ietf.org
>>> Subject: [Roll] draft-ietf-roll-protocols-survey-00
>>> 
>>> Hi,
>>> 
>>> As one of the two tourists who raised a hand in Dublin to express 
>>> uneasiness about this I-D becoming a WG draft, I thought I should 
>>> write a note about my concerns.
>>> 
>>> I should caveat this by saying that I do appreciate the 
>need for this 
>>> work, and that the author-team will, I'm sure, do a fine job at 
>>> delivering what the working group needs. My concerns were much more 
>>> about getting the direction of the I-D right before 
>accepting it as I 
>>> think it is often harder to recast an I-D once it is within the 
>>> working group.
>>> 
>>> Below, please find my major discussion point. I have also done a 
>>> review of the draft and found a bunch of issues/questions of more 
>>> minor importance.
>>> 
>>> Regards,
>>> Adrian
>>> 
>>> ===
>>> 
>>> The analysis of the routing protocols is predicated on what 
>they are 
>>> currently used for. To some extent this is reasonable
>>> - the easiest analysis of a routing protocol is in its operational 
>>> environment. But to use this analysis as the basis of a 
>decision for 
>>> use of a protocol in a new environment is not so reasonable. If you 
>>> want to show that none of today's protocols has been 
>designed for use 
>>> in the ROLL environment, then I don't suppose anyone will be 
>>> surprised. However, what we are really interested in is whether any 
>>> of the existing protocols is suitable for adaptation for 
>use in ROLL, 
>>> whether the those adaptations would be contrived and 
>technically hard 
>>> (or flaky), and whether it would be more efficient to design a new 
>>> protocol.
>>> 
>>> For an example (and I'm not proposing this as the solution 
>for ROLL), 
>>> an IGP could easily be adapted to flood on only certain links, to 
>>> discard certain LSAs, and to build a FIB according to 
>specific rules. 
>>> This would not be a large change to the protocol, although it would 
>>> obviously not be interoperable.
>>> 
>>> To discard from consideration any protocol based on its 
>behavior in a 
>>> certain environment without setting it in the context of your 
>>> forwarding paradigm and without examining the potential to adapt a 
>>> protocol to that environment is wrong. If all you wanted to do was 
>>> show that no current variant of any existing routing protocol is 
>>> immediately applicable to ROLL, then that would be easy and 
>would not 
>>> be a surprise. But to imply that protocols are not open for 
>>> adaptation is more serious.
>>> 
>>> This is not to say that inventing a new protocol would be wrong or 
>>> not fun.
>>> Only that your reasons for discarding protocols are poorly founded. 
>>> You have focused on the operation of the routing protocol, not the 
>>> purpose of the routing protocol. To give a better understanding of 
>>> why you are discarding a protocol, you must show what you want to 
>>> achieve as your forwarding paradigm. The requirements 
>documents make 
>>> some start at this.
>>> For example, draft-ietf-roll-urban-routing-reqs talks about:
>>> - routing to minimise power usage
>>> - routing to consider node and link capabilities
>>> - routing protocol to scale within CPU, memory and power limits
>>> - routing according to different metrics (latency is cited)
>>> 
>>> Such considerations are a good start to understanding the 
>forwarding 
>>> paradigm in ROLL, but would not be good enough to use to 
>devise a new 
>>> routing protocol, so I don't see how they can be good enough to 
>>> determine whether an existing protocol should be discarded, 
>modified, 
>>> or used.
>>> 
>>> =============
>>> 
>>> More specific comments on the draft follow.
>>> 
>>> ---
>>> 
>>> Do we have a commitment from the WG that any new protocol developed 
>>> will be held to the same standards? That is, that the new protocol 
>>> MUST achieve a "pass" in very column of the table in 
>section 4. Or is 
>>> there scope for pragmatism allowing trade-offs in the new protocol 
>>> such that in some environments it achieves a pass in some columns, 
>>> and in other environments it achieves a pass in other columns.
>>> 
>>> Maybe you could add this as a statement in the Abstract and 
>>> Introduction
>>> 
>>> ---
>>> 
>>> Why do you include the requirements language boilerplate? I don't 
>>> think you use (or should use) such language in this document.
>>> 
>>> ---
>>> 
>>> Section 1
>>> 
>>> Can you strip out terms not used in the document?
>>> 
>>> ---
>>> 
>>> Section 2
>>> 
>>> You quote CPU power in MHz. Although that is the practical 
>electronic 
>>> limit, maybe MIPS would be a better measure.
>>> 
>>> ---
>>> 
>>> Section 3 para 2
>>> 
>>> "If a protocol cannot meet even these minimalist criteria..."
>>> I think your use of "cannot" is correct in the context of the 
>>> sentence, but I think your I-D examines "does not"
>>> 
>>> "...is unlikely to be good candidate..."
>>> Too much prevarication!
>>> 
>>> ---
>>> 
>>> Section 3 para 3
>>> 
>>> "...the protocol does not appear to contain sufficient 
>flexibility..."
>>> The problem with this is that it is very mushy!
>>> It is OK to discard a protocol that is not flexible enough 
>to handle 
>>> your requirements. It is not OK to discard a protocol because you 
>>> don't appear to know how to extend it.
>>> 
>>> A example comes in the somewhat contentious table in section 4
>>> :-) Here, for OSPF, you say that there is a "fail" for 
>conveying node 
>>> costs.
>>> But there is already LSA available for carrying node capabilities, 
>>> and there are opaque LSAs available for carrying additional 
>>> "unconventional"
>>> information.
>>> 
>>> All this sort of ties to my main point. Of course, the protocols 
>>> don't do exactly what you want already, but a more thorough 
>survey is 
>>> needed if you what to use this I-D as the reason for excluding 
>>> protocols.
>>> 
>>> ---
>>> 
>>> Section 3.2 para 1
>>> "...with size ranging from a minimum..."
>>> I think you mean "...with maximum size ranging from a minimum..."
>>> 
>>> "very large networks"
>>> Can you de-fluff this? Some people might think that 250 
>nodes is very 
>>> large
>>> ;-)
>>> 
>>> "network depths"
>>> Would be worth including your definition here.
>>> 
>>> --
>>> 
>>> Section 3.2 para 1
>>> 
>>> Is every network node a router?
>>> draft-ietf-roll-urban-routing-reqs says "Sensor nodes are 
>capable of 
>>> forwarding data." If every node is a router and participates in the 
>>> routing protocol, this creates a very different environment from 
>>> saying that most sensors are hosts, and some are routers. I 
>>> appreciate that "capable" does not imply "do".
>>> 
>>> ---
>>> 
>>> Associated with the previous point, I think you might spend 
>a little 
>>> more time discussing the definition of a link in ROLL. It is clear 
>>> that in a wireless n/w a link may exist between any two nodes in 
>>> range.
>>> If that is
>>> what you mean, then it would help to make it clear. On the other 
>>> hand, "link" could be defined as an active neighbor relationship 
>>> between a pair of routers. Or something else.
>>> 
>>> This becomes important as we try to understand how the 
>protocol must 
>>> scale, and what it is supposed to do.
>>> 
>>> I presume that the concept of "parallel links" between neighbors is 
>>> going to have no meaning at the moment. That is, you use only one 
>>> frequency in any network. Maybe I presume wrong, in which case, you 
>>> need to refine the definition of "network density" in section 3.1.
>>> 
>>> ---
>>> 
>>> Section 3.2 para 1
>>> Final sentence is a bit mangled.
>>> 
>>> ---
>>> 
>>> Section 3.2 para 2
>>> 
>>> I can see why scaling with O(L) may be an issue, but it may 
>depend on 
>>> the definitions of links and routers. Also it may depend on what 
>>> magnitude you expect for L. Perhaps you could give some 
>ball-parks in 
>>> the previous paragraph as you do for N and D. Without that, it is 
>>> hard to justify the claim that scaling with O(L) is a problem.
>>> 
>>> ---
>>> 
>>> Section 3.3
>>> 
>>> Can you add SINR to your terminology?
>>> 
>>> "...not trigger unnecessary responses..."
>>> I think that this is subjective and unhelpful. Can you rephrase to 
>>> capture a quantifiable requirement?
>>> 
>>> s/link changes to propagate across/link changes to be propagated 
>>> across/
>>> 
>>> s/O(l)/O(L)/
>>> 
>>> ---
>>> 
>>> Section 3.3 final para
>>> 
>>> You have "transmissions", "broadcast", and "route updates".
>>> Can you use a
>>> consistent term? It may be less pretty English, but it would be a 
>>> better way to avoid accusations of bias :-)
>>> 
>>> Perhaps...
>>> More precisely, loss responses that require transmissions 
>within the 
>>> network of O(N) fail, while those that are limited to O(L) or O(D) 
>>> pass.
>>> 
>>> ---
>>> 
>>> Section 3.4 para 1
>>> 
>>> "In terms of routing structure, any proposed L2N routing protocol 
>>> ought to support the autonomous organization and 
>configuration of the 
>>> network at the lowest possible energy cost."
>>> 
>>> Why "L2N"? I thought "Networks of low power wireless devices 
>>> introduce novel IP routing issues."
>>> 
>>> "ought" is not a recognized RFC 2119 word :-)
>>> 
>>> I think "at the lowest possible energy cost" is a statement 
>that this 
>>> requirement trumps all others. Is that what you mean?
>>> 
>>> I'm not convinced by the absolute statement you make here.
>>> Maybe, this is a
>>> question I should take to the requirements documents. Consider 
>>> routing protocol A that is slightly more (say 5%) power-consuming 
>>> than routing protocol B. But suppose protocol A gives rise 
>to a data 
>>> forwarding solution that is 50% more power-efficient?
>>> 
>>> ---
>>> 
>>> Section 3.4 para 2
>>> 
>>> "As low-power wireless networks can have very low data rates, 
>>> protocols which require a minimum control packet rate can have 
>>> unbounded control overhead."
>>> 
>>> I know what you mean, but I had to parse several times. How about...
>>> 
>>> The control overhead is the ratio of control data to 
>payload data. A 
>>> high control overhead indicates that precious network resources 
>>> (bandwidth, power, or CPU) are being consumed by the control 
>>> protocols instead of being used to transmit data. Where 
>payload data 
>>> rates are very low (as is often the case in low-power wireless 
>>> networks) the control overhead can become unbounded for protocols 
>>> that require some non-zero background control packet rate.
>>> 
>>> ---
>>> 
>>> Section 3.4 para 2
>>> 
>>> s/never meet the condition can be forced/never meet the condition 
>>> could be forced/
>>> 
>>> ---
>>> 
>>> Section 4 para 3
>>> 
>>> "multiple layer 2 hops away"
>>> Really?
>>> Again, I thought we were building an IP routing protocol. If your 
>>> requirement is layer 2 routing, you need to make that 
>visible up front.
>>> But, I can see why you are interested in L2 hops as well as L3 hops 
>>> since they all consume power.
>>> 
>>> This comes back to the question about whether all nodes are 
>routers. 
>>> Perhaps some repeaters are not routers?
>>> 
>>> But can't we actually factor the L2 hops into the definition of the 
>>> L3 hop?
>>> 
>>> ---
>>> 
>>> Section 4 para 3
>>> 
>>> "...nodes may only advertise..."
>>> This sounds prohibitive!
>>> 
>>> ---
>>> 
>>> Section 4 para 4
>>> 
>>> "Neighbor discovery is a critical component of any routing 
>protocol."
>>> I think I disagree.
>>> It is clear that routing protocols need to know their neighbors. It 
>>> is not clear that this requires that the discovery be part of the 
>>> routing protocol.
>>> 
>>> Later you have:
>>> "...key component of many protocols."
>>> This is less strong than the initial sentence.
>>> 
>>> ---
>>> 
>>> Section 4
>>> 
>>> "Protocols Today"
>>> 
>>> Is this a section 4.1 headers?
>>> 
>>> ---
>>> 
>>> Section 4 "Protocols Today" para 2
>>> 
>>> I don't think the MPLS TE example is a good one. It is 
>certainly not 
>>> correct that the TED has to be fully distributed around the network.
>>> There are some very good examples of where "stub TE areas" do not 
>>> need to know the TE information for the whole of the rest of the 
>>> network.
>>> 
>>> ---
>>> 
>>> Section 4 Table
>>> 
>>> I'm prepared to bet that a lot of people will be upset by 
>the use of 
>>> "fail"
>>> for their favorite protocols. It would seem that "?" is more 
>>> appropriate in many cells.
>>> 
>>> ---
>>> 
>>> Section 5.1
>>> Is it worth replacing "OSPF" with "OSPF or IS-IS"?
>>> 
>>> ---
>>> 
>>> Section 14.
>>> Your three ROLL requirements drafts are Normative 
>References, I think.
>>> 
>>> _______________________________________________
>>> Roll mailing list
>>> Roll@ietf.org
>>> https://www.ietf.org/mailman/listinfo/roll
>>> 
>> _______________________________________________
>> Roll mailing list
>> Roll@ietf.org
>> https://www.ietf.org/mailman/listinfo/roll
>
>
_______________________________________________
Roll mailing list
Roll@ietf.org
https://www.ietf.org/mailman/listinfo/roll


From roll-bounces@ietf.org  Wed Aug 27 08:37:58 2008
Return-Path: <roll-bounces@ietf.org>
X-Original-To: roll-archive@ietf.org
Delivered-To: ietfarch-roll-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 34B843A6AD5;
	Wed, 27 Aug 2008 08:37:58 -0700 (PDT)
X-Original-To: roll@core3.amsl.com
Delivered-To: roll@core3.amsl.com
Received: from localhost (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id D6CC128B56A
	for <roll@core3.amsl.com>; Wed, 27 Aug 2008 08:37:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.051
X-Spam-Level: 
X-Spam-Status: No, score=0.051 tagged_above=-999 required=5
	tests=[BAYES_00=-2.599, HELO_EQ_FR=0.35, MANGLED_TOOL=2.3]
Received: from mail.ietf.org ([64.170.98.32])
	by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id r880FkQVztlD for <roll@core3.amsl.com>;
	Wed, 27 Aug 2008 08:37:55 -0700 (PDT)
Received: from mail3-relais-sop.national.inria.fr
	(mail3-relais-sop.national.inria.fr [192.134.164.104])
	by core3.amsl.com (Postfix) with ESMTP id 6CAC03A67EF
	for <roll@ietf.org>; Wed, 27 Aug 2008 08:37:54 -0700 (PDT)
X-IronPort-AV: E=Sophos;i="4.32,279,1217800800"; d="scan'208";a="16326837"
Received: from ras75-3-82-226-221-97.fbx.proxad.net (HELO
	BoolfightMaN-Laptop.local) ([82.226.221.97])
	by mail3-relais-sop.national.inria.fr with ESMTP/TLS/DHE-RSA-AES256-SHA;
	27 Aug 2008 17:37:54 +0200
Message-ID: <48B574CF.9070607@inria.fr>
Date: Wed, 27 Aug 2008 17:37:51 +0200
From: Emmanuel Baccelli <Emmanuel.Baccelli@inria.fr>
User-Agent: Thunderbird 2.0.0.16 (Macintosh/20080707)
MIME-Version: 1.0
To: roll@ietf.org
References: <51661468CBD1354294533DA79E85955A01053026@XCH-SW-5V2.sw.nos.boeing.com>	<C4DAE9CC.503D4%jvasseur@cisco.com>
	<51661468CBD1354294533DA79E85955A0109FD7B@XCH-SW-5V2.sw.nos.boeing.com>
In-Reply-To: <51661468CBD1354294533DA79E85955A0109FD7B@XCH-SW-5V2.sw.nos.boeing.com>
Subject: Re: [Roll] draft-ietf-roll-protocols-survey-00
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/roll>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Sender: roll-bounces@ietf.org
Errors-To: roll-bounces@ietf.org

I guess I agree with John. I think this document is incomplete. The =

working group should consider the approach based on extending some =

existing protocol(s) to meet the specific requirements addressed in =

ROLL. To be really useful, the document should include some text =

providing a framework for this approach, aside from the "from scratch" way.

regards,
Emmanuel



Drake, John E a =E9crit :
> JP,
> =

> I thought that was exactly Adrian's point.
> =

> If you evaluate a bunch of routing protocols as they exist today in a
> new operational environment and conclude that none of them are
> appropriate, then you have no choice but to conclude that you need to
> invent at least one, but probably many, new routing protocols.  It's not
> like this hasn't been done before.
> =

> I took Adrian's note to say that doing this is not sufficient and that
> what needed to be done was to characterize the new operational
> environment, propose changes needed in each routing protocol to address
> the new operational environment, and then evaluate these changes.
> =

> Thanks,
> =

> John =

> =

>> -----Original Message-----
>> From: JP Vasseur [mailto:jvasseur@cisco.com] =

>> Sent: Wednesday, August 27, 2008 2:24 AM
>> To: Drake, John E; Adrian Farrel; roll@ietf.org
>> Subject: Re: [Roll] draft-ietf-roll-protocols-survey-00
>>
>> John,
>>
>> I do not think that this was Adrian's point. Your feed-back is =

>> more than welcome but please argue a bit more ...
>>
>> Thanks.
>>
>> JP.
>>
>>
>> On 8/25/08 6:13 PM, "Drake, John E" <John.E.Drake2@boeing.com> wrote:
>>
>>> Adrian,
>>>
>>> An excellent note - I agree completely.  We need fewer routing =

>>> protocols, not more.
>>>
>>> Thanks,
>>>
>>> John
>>>
>>>> -----Original Message-----
>>>> From: Adrian Farrel [mailto:adrian@olddog.co.uk]
>>>> Sent: Sunday, August 24, 2008 5:14 AM
>>>> To: roll@ietf.org
>>>> Subject: [Roll] draft-ietf-roll-protocols-survey-00
>>>>
>>>> Hi,
>>>>
>>>> As one of the two tourists who raised a hand in Dublin to express =

>>>> uneasiness about this I-D becoming a WG draft, I thought I should =

>>>> write a note about my concerns.
>>>>
>>>> I should caveat this by saying that I do appreciate the =

>> need for this =

>>>> work, and that the author-team will, I'm sure, do a fine job at =

>>>> delivering what the working group needs. My concerns were much more =

>>>> about getting the direction of the I-D right before =

>> accepting it as I =

>>>> think it is often harder to recast an I-D once it is within the =

>>>> working group.
>>>>
>>>> Below, please find my major discussion point. I have also done a =

>>>> review of the draft and found a bunch of issues/questions of more =

>>>> minor importance.
>>>>
>>>> Regards,
>>>> Adrian
>>>>
>>>> =3D=3D=3D
>>>>
>>>> The analysis of the routing protocols is predicated on what =

>> they are =

>>>> currently used for. To some extent this is reasonable
>>>> - the easiest analysis of a routing protocol is in its operational =

>>>> environment. But to use this analysis as the basis of a =

>> decision for =

>>>> use of a protocol in a new environment is not so reasonable. If you =

>>>> want to show that none of today's protocols has been =

>> designed for use =

>>>> in the ROLL environment, then I don't suppose anyone will be =

>>>> surprised. However, what we are really interested in is whether any =

>>>> of the existing protocols is suitable for adaptation for =

>> use in ROLL, =

>>>> whether the those adaptations would be contrived and =

>> technically hard =

>>>> (or flaky), and whether it would be more efficient to design a new =

>>>> protocol.
>>>>
>>>> For an example (and I'm not proposing this as the solution =

>> for ROLL), =

>>>> an IGP could easily be adapted to flood on only certain links, to =

>>>> discard certain LSAs, and to build a FIB according to =

>> specific rules. =

>>>> This would not be a large change to the protocol, although it would =

>>>> obviously not be interoperable.
>>>>
>>>> To discard from consideration any protocol based on its =

>> behavior in a =

>>>> certain environment without setting it in the context of your =

>>>> forwarding paradigm and without examining the potential to adapt a =

>>>> protocol to that environment is wrong. If all you wanted to do was =

>>>> show that no current variant of any existing routing protocol is =

>>>> immediately applicable to ROLL, then that would be easy and =

>> would not =

>>>> be a surprise. But to imply that protocols are not open for =

>>>> adaptation is more serious.
>>>>
>>>> This is not to say that inventing a new protocol would be wrong or =

>>>> not fun.
>>>> Only that your reasons for discarding protocols are poorly founded. =

>>>> You have focused on the operation of the routing protocol, not the =

>>>> purpose of the routing protocol. To give a better understanding of =

>>>> why you are discarding a protocol, you must show what you want to =

>>>> achieve as your forwarding paradigm. The requirements =

>> documents make =

>>>> some start at this.
>>>> For example, draft-ietf-roll-urban-routing-reqs talks about:
>>>> - routing to minimise power usage
>>>> - routing to consider node and link capabilities
>>>> - routing protocol to scale within CPU, memory and power limits
>>>> - routing according to different metrics (latency is cited)
>>>>
>>>> Such considerations are a good start to understanding the =

>> forwarding =

>>>> paradigm in ROLL, but would not be good enough to use to =

>> devise a new =

>>>> routing protocol, so I don't see how they can be good enough to =

>>>> determine whether an existing protocol should be discarded, =

>> modified, =

>>>> or used.
>>>>
>>>> =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
>>>>
>>>> More specific comments on the draft follow.
>>>>
>>>> ---
>>>>
>>>> Do we have a commitment from the WG that any new protocol developed =

>>>> will be held to the same standards? That is, that the new protocol =

>>>> MUST achieve a "pass" in very column of the table in =

>> section 4. Or is =

>>>> there scope for pragmatism allowing trade-offs in the new protocol =

>>>> such that in some environments it achieves a pass in some columns, =

>>>> and in other environments it achieves a pass in other columns.
>>>>
>>>> Maybe you could add this as a statement in the Abstract and =

>>>> Introduction
>>>>
>>>> ---
>>>>
>>>> Why do you include the requirements language boilerplate? I don't =

>>>> think you use (or should use) such language in this document.
>>>>
>>>> ---
>>>>
>>>> Section 1
>>>>
>>>> Can you strip out terms not used in the document?
>>>>
>>>> ---
>>>>
>>>> Section 2
>>>>
>>>> You quote CPU power in MHz. Although that is the practical =

>> electronic =

>>>> limit, maybe MIPS would be a better measure.
>>>>
>>>> ---
>>>>
>>>> Section 3 para 2
>>>>
>>>> "If a protocol cannot meet even these minimalist criteria..."
>>>> I think your use of "cannot" is correct in the context of the =

>>>> sentence, but I think your I-D examines "does not"
>>>>
>>>> "...is unlikely to be good candidate..."
>>>> Too much prevarication!
>>>>
>>>> ---
>>>>
>>>> Section 3 para 3
>>>>
>>>> "...the protocol does not appear to contain sufficient =

>> flexibility..."
>>>> The problem with this is that it is very mushy!
>>>> It is OK to discard a protocol that is not flexible enough =

>> to handle =

>>>> your requirements. It is not OK to discard a protocol because you =

>>>> don't appear to know how to extend it.
>>>>
>>>> A example comes in the somewhat contentious table in section 4
>>>> :-) Here, for OSPF, you say that there is a "fail" for =

>> conveying node =

>>>> costs.
>>>> But there is already LSA available for carrying node capabilities, =

>>>> and there are opaque LSAs available for carrying additional =

>>>> "unconventional"
>>>> information.
>>>>
>>>> All this sort of ties to my main point. Of course, the protocols =

>>>> don't do exactly what you want already, but a more thorough =

>> survey is =

>>>> needed if you what to use this I-D as the reason for excluding =

>>>> protocols.
>>>>
>>>> ---
>>>>
>>>> Section 3.2 para 1
>>>> "...with size ranging from a minimum..."
>>>> I think you mean "...with maximum size ranging from a minimum..."
>>>>
>>>> "very large networks"
>>>> Can you de-fluff this? Some people might think that 250 =

>> nodes is very =

>>>> large
>>>> ;-)
>>>>
>>>> "network depths"
>>>> Would be worth including your definition here.
>>>>
>>>> --
>>>>
>>>> Section 3.2 para 1
>>>>
>>>> Is every network node a router?
>>>> draft-ietf-roll-urban-routing-reqs says "Sensor nodes are =

>> capable of =

>>>> forwarding data." If every node is a router and participates in the =

>>>> routing protocol, this creates a very different environment from =

>>>> saying that most sensors are hosts, and some are routers. I =

>>>> appreciate that "capable" does not imply "do".
>>>>
>>>> ---
>>>>
>>>> Associated with the previous point, I think you might spend =

>> a little =

>>>> more time discussing the definition of a link in ROLL. It is clear =

>>>> that in a wireless n/w a link may exist between any two nodes in =

>>>> range.
>>>> If that is
>>>> what you mean, then it would help to make it clear. On the other =

>>>> hand, "link" could be defined as an active neighbor relationship =

>>>> between a pair of routers. Or something else.
>>>>
>>>> This becomes important as we try to understand how the =

>> protocol must =

>>>> scale, and what it is supposed to do.
>>>>
>>>> I presume that the concept of "parallel links" between neighbors is =

>>>> going to have no meaning at the moment. That is, you use only one =

>>>> frequency in any network. Maybe I presume wrong, in which case, you =

>>>> need to refine the definition of "network density" in section 3.1.
>>>>
>>>> ---
>>>>
>>>> Section 3.2 para 1
>>>> Final sentence is a bit mangled.
>>>>
>>>> ---
>>>>
>>>> Section 3.2 para 2
>>>>
>>>> I can see why scaling with O(L) may be an issue, but it may =

>> depend on =

>>>> the definitions of links and routers. Also it may depend on what =

>>>> magnitude you expect for L. Perhaps you could give some =

>> ball-parks in =

>>>> the previous paragraph as you do for N and D. Without that, it is =

>>>> hard to justify the claim that scaling with O(L) is a problem.
>>>>
>>>> ---
>>>>
>>>> Section 3.3
>>>>
>>>> Can you add SINR to your terminology?
>>>>
>>>> "...not trigger unnecessary responses..."
>>>> I think that this is subjective and unhelpful. Can you rephrase to =

>>>> capture a quantifiable requirement?
>>>>
>>>> s/link changes to propagate across/link changes to be propagated =

>>>> across/
>>>>
>>>> s/O(l)/O(L)/
>>>>
>>>> ---
>>>>
>>>> Section 3.3 final para
>>>>
>>>> You have "transmissions", "broadcast", and "route updates".
>>>> Can you use a
>>>> consistent term? It may be less pretty English, but it would be a =

>>>> better way to avoid accusations of bias :-)
>>>>
>>>> Perhaps...
>>>> More precisely, loss responses that require transmissions =

>> within the =

>>>> network of O(N) fail, while those that are limited to O(L) or O(D) =

>>>> pass.
>>>>
>>>> ---
>>>>
>>>> Section 3.4 para 1
>>>>
>>>> "In terms of routing structure, any proposed L2N routing protocol =

>>>> ought to support the autonomous organization and =

>> configuration of the =

>>>> network at the lowest possible energy cost."
>>>>
>>>> Why "L2N"? I thought "Networks of low power wireless devices =

>>>> introduce novel IP routing issues."
>>>>
>>>> "ought" is not a recognized RFC 2119 word :-)
>>>>
>>>> I think "at the lowest possible energy cost" is a statement =

>> that this =

>>>> requirement trumps all others. Is that what you mean?
>>>>
>>>> I'm not convinced by the absolute statement you make here.
>>>> Maybe, this is a
>>>> question I should take to the requirements documents. Consider =

>>>> routing protocol A that is slightly more (say 5%) power-consuming =

>>>> than routing protocol B. But suppose protocol A gives rise =

>> to a data =

>>>> forwarding solution that is 50% more power-efficient?
>>>>
>>>> ---
>>>>
>>>> Section 3.4 para 2
>>>>
>>>> "As low-power wireless networks can have very low data rates, =

>>>> protocols which require a minimum control packet rate can have =

>>>> unbounded control overhead."
>>>>
>>>> I know what you mean, but I had to parse several times. How about...
>>>>
>>>> The control overhead is the ratio of control data to =

>> payload data. A =

>>>> high control overhead indicates that precious network resources =

>>>> (bandwidth, power, or CPU) are being consumed by the control =

>>>> protocols instead of being used to transmit data. Where =

>> payload data =

>>>> rates are very low (as is often the case in low-power wireless =

>>>> networks) the control overhead can become unbounded for protocols =

>>>> that require some non-zero background control packet rate.
>>>>
>>>> ---
>>>>
>>>> Section 3.4 para 2
>>>>
>>>> s/never meet the condition can be forced/never meet the condition =

>>>> could be forced/
>>>>
>>>> ---
>>>>
>>>> Section 4 para 3
>>>>
>>>> "multiple layer 2 hops away"
>>>> Really?
>>>> Again, I thought we were building an IP routing protocol. If your =

>>>> requirement is layer 2 routing, you need to make that =

>> visible up front.
>>>> But, I can see why you are interested in L2 hops as well as L3 hops =

>>>> since they all consume power.
>>>>
>>>> This comes back to the question about whether all nodes are =

>> routers. =

>>>> Perhaps some repeaters are not routers?
>>>>
>>>> But can't we actually factor the L2 hops into the definition of the =

>>>> L3 hop?
>>>>
>>>> ---
>>>>
>>>> Section 4 para 3
>>>>
>>>> "...nodes may only advertise..."
>>>> This sounds prohibitive!
>>>>
>>>> ---
>>>>
>>>> Section 4 para 4
>>>>
>>>> "Neighbor discovery is a critical component of any routing =

>> protocol."
>>>> I think I disagree.
>>>> It is clear that routing protocols need to know their neighbors. It =

>>>> is not clear that this requires that the discovery be part of the =

>>>> routing protocol.
>>>>
>>>> Later you have:
>>>> "...key component of many protocols."
>>>> This is less strong than the initial sentence.
>>>>
>>>> ---
>>>>
>>>> Section 4
>>>>
>>>> "Protocols Today"
>>>>
>>>> Is this a section 4.1 headers?
>>>>
>>>> ---
>>>>
>>>> Section 4 "Protocols Today" para 2
>>>>
>>>> I don't think the MPLS TE example is a good one. It is =

>> certainly not =

>>>> correct that the TED has to be fully distributed around the network.
>>>> There are some very good examples of where "stub TE areas" do not =

>>>> need to know the TE information for the whole of the rest of the =

>>>> network.
>>>>
>>>> ---
>>>>
>>>> Section 4 Table
>>>>
>>>> I'm prepared to bet that a lot of people will be upset by =

>> the use of =

>>>> "fail"
>>>> for their favorite protocols. It would seem that "?" is more =

>>>> appropriate in many cells.
>>>>
>>>> ---
>>>>
>>>> Section 5.1
>>>> Is it worth replacing "OSPF" with "OSPF or IS-IS"?
>>>>
>>>> ---
>>>>
>>>> Section 14.
>>>> Your three ROLL requirements drafts are Normative =

>> References, I think.
>>>> _______________________________________________
>>>> Roll mailing list
>>>> Roll@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/roll
>>>>
>>> _______________________________________________
>>> Roll mailing list
>>> Roll@ietf.org
>>> https://www.ietf.org/mailman/listinfo/roll
>>
> _______________________________________________
> Roll mailing list
> Roll@ietf.org
> https://www.ietf.org/mailman/listinfo/roll
> =

> =

_______________________________________________
Roll mailing list
Roll@ietf.org
https://www.ietf.org/mailman/listinfo/roll


From roll-bounces@ietf.org  Wed Aug 27 08:43:52 2008
Return-Path: <roll-bounces@ietf.org>
X-Original-To: roll-archive@ietf.org
Delivered-To: ietfarch-roll-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 429C63A688A;
	Wed, 27 Aug 2008 08:43:52 -0700 (PDT)
X-Original-To: roll@core3.amsl.com
Delivered-To: roll@core3.amsl.com
Received: from localhost (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 84C273A6B63
	for <roll@core3.amsl.com>; Wed, 27 Aug 2008 08:43:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.041
X-Spam-Level: 
X-Spam-Status: No, score=-0.041 tagged_above=-999 required=5 tests=[AWL=0.257, 
	BAYES_00=-2.599, MANGLED_TOOL=2.3, STOX_REPLY_TYPE=0.001]
Received: from mail.ietf.org ([64.170.98.32])
	by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id 35z9Xqdcw84B for <roll@core3.amsl.com>;
	Wed, 27 Aug 2008 08:43:44 -0700 (PDT)
Received: from asmtp2.iomartmail.com (asmtp2.iomartmail.com [62.128.201.249])
	by core3.amsl.com (Postfix) with ESMTP id 2C8D23A6C02
	for <roll@ietf.org>; Wed, 27 Aug 2008 08:43:44 -0700 (PDT)
Received: from asmtp2.iomartmail.com (localhost.localdomain [127.0.0.1])
	by asmtp2.iomartmail.com (8.12.11.20060308/8.12.8) with ESMTP id
	m7RFhRrU011941; Wed, 27 Aug 2008 16:43:29 +0100
Received: from your029b8cecfe (dsl-sp-81-140-15-32.in-addr.broadbandscope.com
	[81.140.15.32]) (authenticated bits=0)
	by asmtp2.iomartmail.com (8.12.11.20060308/8.12.11) with ESMTP id
	m7RFhQjw011923; Wed, 27 Aug 2008 16:43:26 +0100
Message-ID: <065801c9085b$a4a20ee0$0300a8c0@your029b8cecfe>
From: "Adrian Farrel" <adrian@olddog.co.uk>
To: "Drake, John E" <John.E.Drake2@boeing.com>,
	"JP Vasseur" <jvasseur@cisco.com>, <roll@ietf.org>
References: <51661468CBD1354294533DA79E85955A01053026@XCH-SW-5V2.sw.nos.boeing.com>
	<C4DAE9CC.503D4%jvasseur@cisco.com>
	<51661468CBD1354294533DA79E85955A0109FD7B@XCH-SW-5V2.sw.nos.boeing.com>
Date: Wed, 27 Aug 2008 16:36:37 +0100
MIME-Version: 1.0
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2900.3138
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3350
Subject: Re: [Roll] draft-ietf-roll-protocols-survey-00
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: Adrian Farrel <adrian@olddog.co.uk>
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/roll>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: roll-bounces@ietf.org
Errors-To: roll-bounces@ietf.org

Right.

I am not saying that a new protocol is not needed. I am saying that I'd like 
to see some more discussion of what the routing protocol is trying to 
achieve.

The work to describe how the protocol itself must behave is pretty good. But 
the work describing what information must be distributed, how up-to-date it 
must be, and how it will be used is missing.

I am sure that this is all work in progress and will emerge in due course.

A
----- Original Message ----- 
From: "Drake, John E" <John.E.Drake2@boeing.com>
To: "JP Vasseur" <jvasseur@cisco.com>; "Adrian Farrel" 
<adrian@olddog.co.uk>; <roll@ietf.org>
Sent: Wednesday, August 27, 2008 3:45 PM
Subject: RE: [Roll] draft-ietf-roll-protocols-survey-00


JP,

I thought that was exactly Adrian's point.

If you evaluate a bunch of routing protocols as they exist today in a
new operational environment and conclude that none of them are
appropriate, then you have no choice but to conclude that you need to
invent at least one, but probably many, new routing protocols.  It's not
like this hasn't been done before.

I took Adrian's note to say that doing this is not sufficient and that
what needed to be done was to characterize the new operational
environment, propose changes needed in each routing protocol to address
the new operational environment, and then evaluate these changes.

Thanks,

John

>-----Original Message-----
>From: JP Vasseur [mailto:jvasseur@cisco.com]
>Sent: Wednesday, August 27, 2008 2:24 AM
>To: Drake, John E; Adrian Farrel; roll@ietf.org
>Subject: Re: [Roll] draft-ietf-roll-protocols-survey-00
>
>John,
>
>I do not think that this was Adrian's point. Your feed-back is
>more than welcome but please argue a bit more ...
>
>Thanks.
>
>JP.
>
>
>On 8/25/08 6:13 PM, "Drake, John E" <John.E.Drake2@boeing.com> wrote:
>
>> Adrian,
>>
>> An excellent note - I agree completely.  We need fewer routing
>> protocols, not more.
>>
>> Thanks,
>>
>> John
>>
>>> -----Original Message-----
>>> From: Adrian Farrel [mailto:adrian@olddog.co.uk]
>>> Sent: Sunday, August 24, 2008 5:14 AM
>>> To: roll@ietf.org
>>> Subject: [Roll] draft-ietf-roll-protocols-survey-00
>>>
>>> Hi,
>>>
>>> As one of the two tourists who raised a hand in Dublin to express
>>> uneasiness about this I-D becoming a WG draft, I thought I should
>>> write a note about my concerns.
>>>
>>> I should caveat this by saying that I do appreciate the
>need for this
>>> work, and that the author-team will, I'm sure, do a fine job at
>>> delivering what the working group needs. My concerns were much more
>>> about getting the direction of the I-D right before
>accepting it as I
>>> think it is often harder to recast an I-D once it is within the
>>> working group.
>>>
>>> Below, please find my major discussion point. I have also done a
>>> review of the draft and found a bunch of issues/questions of more
>>> minor importance.
>>>
>>> Regards,
>>> Adrian
>>>
>>> ===
>>>
>>> The analysis of the routing protocols is predicated on what
>they are
>>> currently used for. To some extent this is reasonable
>>> - the easiest analysis of a routing protocol is in its operational
>>> environment. But to use this analysis as the basis of a
>decision for
>>> use of a protocol in a new environment is not so reasonable. If you
>>> want to show that none of today's protocols has been
>designed for use
>>> in the ROLL environment, then I don't suppose anyone will be
>>> surprised. However, what we are really interested in is whether any
>>> of the existing protocols is suitable for adaptation for
>use in ROLL,
>>> whether the those adaptations would be contrived and
>technically hard
>>> (or flaky), and whether it would be more efficient to design a new
>>> protocol.
>>>
>>> For an example (and I'm not proposing this as the solution
>for ROLL),
>>> an IGP could easily be adapted to flood on only certain links, to
>>> discard certain LSAs, and to build a FIB according to
>specific rules.
>>> This would not be a large change to the protocol, although it would
>>> obviously not be interoperable.
>>>
>>> To discard from consideration any protocol based on its
>behavior in a
>>> certain environment without setting it in the context of your
>>> forwarding paradigm and without examining the potential to adapt a
>>> protocol to that environment is wrong. If all you wanted to do was
>>> show that no current variant of any existing routing protocol is
>>> immediately applicable to ROLL, then that would be easy and
>would not
>>> be a surprise. But to imply that protocols are not open for
>>> adaptation is more serious.
>>>
>>> This is not to say that inventing a new protocol would be wrong or
>>> not fun.
>>> Only that your reasons for discarding protocols are poorly founded.
>>> You have focused on the operation of the routing protocol, not the
>>> purpose of the routing protocol. To give a better understanding of
>>> why you are discarding a protocol, you must show what you want to
>>> achieve as your forwarding paradigm. The requirements
>documents make
>>> some start at this.
>>> For example, draft-ietf-roll-urban-routing-reqs talks about:
>>> - routing to minimise power usage
>>> - routing to consider node and link capabilities
>>> - routing protocol to scale within CPU, memory and power limits
>>> - routing according to different metrics (latency is cited)
>>>
>>> Such considerations are a good start to understanding the
>forwarding
>>> paradigm in ROLL, but would not be good enough to use to
>devise a new
>>> routing protocol, so I don't see how they can be good enough to
>>> determine whether an existing protocol should be discarded,
>modified,
>>> or used.
>>>
>>> =============
>>>
>>> More specific comments on the draft follow.
>>>
>>> ---
>>>
>>> Do we have a commitment from the WG that any new protocol developed
>>> will be held to the same standards? That is, that the new protocol
>>> MUST achieve a "pass" in very column of the table in
>section 4. Or is
>>> there scope for pragmatism allowing trade-offs in the new protocol
>>> such that in some environments it achieves a pass in some columns,
>>> and in other environments it achieves a pass in other columns.
>>>
>>> Maybe you could add this as a statement in the Abstract and
>>> Introduction
>>>
>>> ---
>>>
>>> Why do you include the requirements language boilerplate? I don't
>>> think you use (or should use) such language in this document.
>>>
>>> ---
>>>
>>> Section 1
>>>
>>> Can you strip out terms not used in the document?
>>>
>>> ---
>>>
>>> Section 2
>>>
>>> You quote CPU power in MHz. Although that is the practical
>electronic
>>> limit, maybe MIPS would be a better measure.
>>>
>>> ---
>>>
>>> Section 3 para 2
>>>
>>> "If a protocol cannot meet even these minimalist criteria..."
>>> I think your use of "cannot" is correct in the context of the
>>> sentence, but I think your I-D examines "does not"
>>>
>>> "...is unlikely to be good candidate..."
>>> Too much prevarication!
>>>
>>> ---
>>>
>>> Section 3 para 3
>>>
>>> "...the protocol does not appear to contain sufficient
>flexibility..."
>>> The problem with this is that it is very mushy!
>>> It is OK to discard a protocol that is not flexible enough
>to handle
>>> your requirements. It is not OK to discard a protocol because you
>>> don't appear to know how to extend it.
>>>
>>> A example comes in the somewhat contentious table in section 4
>>> :-) Here, for OSPF, you say that there is a "fail" for
>conveying node
>>> costs.
>>> But there is already LSA available for carrying node capabilities,
>>> and there are opaque LSAs available for carrying additional
>>> "unconventional"
>>> information.
>>>
>>> All this sort of ties to my main point. Of course, the protocols
>>> don't do exactly what you want already, but a more thorough
>survey is
>>> needed if you what to use this I-D as the reason for excluding
>>> protocols.
>>>
>>> ---
>>>
>>> Section 3.2 para 1
>>> "...with size ranging from a minimum..."
>>> I think you mean "...with maximum size ranging from a minimum..."
>>>
>>> "very large networks"
>>> Can you de-fluff this? Some people might think that 250
>nodes is very
>>> large
>>> ;-)
>>>
>>> "network depths"
>>> Would be worth including your definition here.
>>>
>>> --
>>>
>>> Section 3.2 para 1
>>>
>>> Is every network node a router?
>>> draft-ietf-roll-urban-routing-reqs says "Sensor nodes are
>capable of
>>> forwarding data." If every node is a router and participates in the
>>> routing protocol, this creates a very different environment from
>>> saying that most sensors are hosts, and some are routers. I
>>> appreciate that "capable" does not imply "do".
>>>
>>> ---
>>>
>>> Associated with the previous point, I think you might spend
>a little
>>> more time discussing the definition of a link in ROLL. It is clear
>>> that in a wireless n/w a link may exist between any two nodes in
>>> range.
>>> If that is
>>> what you mean, then it would help to make it clear. On the other
>>> hand, "link" could be defined as an active neighbor relationship
>>> between a pair of routers. Or something else.
>>>
>>> This becomes important as we try to understand how the
>protocol must
>>> scale, and what it is supposed to do.
>>>
>>> I presume that the concept of "parallel links" between neighbors is
>>> going to have no meaning at the moment. That is, you use only one
>>> frequency in any network. Maybe I presume wrong, in which case, you
>>> need to refine the definition of "network density" in section 3.1.
>>>
>>> ---
>>>
>>> Section 3.2 para 1
>>> Final sentence is a bit mangled.
>>>
>>> ---
>>>
>>> Section 3.2 para 2
>>>
>>> I can see why scaling with O(L) may be an issue, but it may
>depend on
>>> the definitions of links and routers. Also it may depend on what
>>> magnitude you expect for L. Perhaps you could give some
>ball-parks in
>>> the previous paragraph as you do for N and D. Without that, it is
>>> hard to justify the claim that scaling with O(L) is a problem.
>>>
>>> ---
>>>
>>> Section 3.3
>>>
>>> Can you add SINR to your terminology?
>>>
>>> "...not trigger unnecessary responses..."
>>> I think that this is subjective and unhelpful. Can you rephrase to
>>> capture a quantifiable requirement?
>>>
>>> s/link changes to propagate across/link changes to be propagated
>>> across/
>>>
>>> s/O(l)/O(L)/
>>>
>>> ---
>>>
>>> Section 3.3 final para
>>>
>>> You have "transmissions", "broadcast", and "route updates".
>>> Can you use a
>>> consistent term? It may be less pretty English, but it would be a
>>> better way to avoid accusations of bias :-)
>>>
>>> Perhaps...
>>> More precisely, loss responses that require transmissions
>within the
>>> network of O(N) fail, while those that are limited to O(L) or O(D)
>>> pass.
>>>
>>> ---
>>>
>>> Section 3.4 para 1
>>>
>>> "In terms of routing structure, any proposed L2N routing protocol
>>> ought to support the autonomous organization and
>configuration of the
>>> network at the lowest possible energy cost."
>>>
>>> Why "L2N"? I thought "Networks of low power wireless devices
>>> introduce novel IP routing issues."
>>>
>>> "ought" is not a recognized RFC 2119 word :-)
>>>
>>> I think "at the lowest possible energy cost" is a statement
>that this
>>> requirement trumps all others. Is that what you mean?
>>>
>>> I'm not convinced by the absolute statement you make here.
>>> Maybe, this is a
>>> question I should take to the requirements documents. Consider
>>> routing protocol A that is slightly more (say 5%) power-consuming
>>> than routing protocol B. But suppose protocol A gives rise
>to a data
>>> forwarding solution that is 50% more power-efficient?
>>>
>>> ---
>>>
>>> Section 3.4 para 2
>>>
>>> "As low-power wireless networks can have very low data rates,
>>> protocols which require a minimum control packet rate can have
>>> unbounded control overhead."
>>>
>>> I know what you mean, but I had to parse several times. How about...
>>>
>>> The control overhead is the ratio of control data to
>payload data. A
>>> high control overhead indicates that precious network resources
>>> (bandwidth, power, or CPU) are being consumed by the control
>>> protocols instead of being used to transmit data. Where
>payload data
>>> rates are very low (as is often the case in low-power wireless
>>> networks) the control overhead can become unbounded for protocols
>>> that require some non-zero background control packet rate.
>>>
>>> ---
>>>
>>> Section 3.4 para 2
>>>
>>> s/never meet the condition can be forced/never meet the condition
>>> could be forced/
>>>
>>> ---
>>>
>>> Section 4 para 3
>>>
>>> "multiple layer 2 hops away"
>>> Really?
>>> Again, I thought we were building an IP routing protocol. If your
>>> requirement is layer 2 routing, you need to make that
>visible up front.
>>> But, I can see why you are interested in L2 hops as well as L3 hops
>>> since they all consume power.
>>>
>>> This comes back to the question about whether all nodes are
>routers.
>>> Perhaps some repeaters are not routers?
>>>
>>> But can't we actually factor the L2 hops into the definition of the
>>> L3 hop?
>>>
>>> ---
>>>
>>> Section 4 para 3
>>>
>>> "...nodes may only advertise..."
>>> This sounds prohibitive!
>>>
>>> ---
>>>
>>> Section 4 para 4
>>>
>>> "Neighbor discovery is a critical component of any routing
>protocol."
>>> I think I disagree.
>>> It is clear that routing protocols need to know their neighbors. It
>>> is not clear that this requires that the discovery be part of the
>>> routing protocol.
>>>
>>> Later you have:
>>> "...key component of many protocols."
>>> This is less strong than the initial sentence.
>>>
>>> ---
>>>
>>> Section 4
>>>
>>> "Protocols Today"
>>>
>>> Is this a section 4.1 headers?
>>>
>>> ---
>>>
>>> Section 4 "Protocols Today" para 2
>>>
>>> I don't think the MPLS TE example is a good one. It is
>certainly not
>>> correct that the TED has to be fully distributed around the network.
>>> There are some very good examples of where "stub TE areas" do not
>>> need to know the TE information for the whole of the rest of the
>>> network.
>>>
>>> ---
>>>
>>> Section 4 Table
>>>
>>> I'm prepared to bet that a lot of people will be upset by
>the use of
>>> "fail"
>>> for their favorite protocols. It would seem that "?" is more
>>> appropriate in many cells.
>>>
>>> ---
>>>
>>> Section 5.1
>>> Is it worth replacing "OSPF" with "OSPF or IS-IS"?
>>>
>>> ---
>>>
>>> Section 14.
>>> Your three ROLL requirements drafts are Normative
>References, I think.
>>>
>>> _______________________________________________
>>> Roll mailing list
>>> Roll@ietf.org
>>> https://www.ietf.org/mailman/listinfo/roll
>>>
>> _______________________________________________
>> Roll mailing list
>> Roll@ietf.org
>> https://www.ietf.org/mailman/listinfo/roll
>
>

_______________________________________________
Roll mailing list
Roll@ietf.org
https://www.ietf.org/mailman/listinfo/roll


From roll-bounces@ietf.org  Wed Aug 27 09:38:31 2008
Return-Path: <roll-bounces@ietf.org>
X-Original-To: roll-archive@ietf.org
Delivered-To: ietfarch-roll-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 3A5AD3A6A76;
	Wed, 27 Aug 2008 09:38:31 -0700 (PDT)
X-Original-To: roll@core3.amsl.com
Delivered-To: roll@core3.amsl.com
Received: from localhost (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 3C6D53A694C
	for <roll@core3.amsl.com>; Wed, 27 Aug 2008 09:38:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.874
X-Spam-Level: 
X-Spam-Status: No, score=-4.874 tagged_above=-999 required=5
	tests=[AWL=-0.575, BAYES_00=-2.599, MANGLED_TOOL=2.3,
	RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32])
	by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id eXdwkOHsxa8Y for <roll@core3.amsl.com>;
	Wed, 27 Aug 2008 09:38:27 -0700 (PDT)
Received: from rtp-iport-1.cisco.com (rtp-iport-1.cisco.com [64.102.122.148])
	by core3.amsl.com (Postfix) with ESMTP id 1FB5E3A67E9
	for <roll@ietf.org>; Wed, 27 Aug 2008 09:38:27 -0700 (PDT)
X-IronPort-AV: E=Sophos;i="4.32,279,1217808000"; d="scan'208";a="18902470"
Received: from rtp-dkim-1.cisco.com ([64.102.121.158])
	by rtp-iport-1.cisco.com with ESMTP; 27 Aug 2008 16:38:03 +0000
Received: from rtp-core-1.cisco.com (rtp-core-1.cisco.com [64.102.124.12])
	by rtp-dkim-1.cisco.com (8.12.11/8.12.11) with ESMTP id m7RGc38x008883; 
	Wed, 27 Aug 2008 12:38:03 -0400
Received: from xbh-rtp-201.amer.cisco.com (xbh-rtp-201.cisco.com
	[64.102.31.12])
	by rtp-core-1.cisco.com (8.13.8/8.13.8) with ESMTP id m7RGc3n5019065;
	Wed, 27 Aug 2008 16:38:03 GMT
Received: from xmb-rtp-213.amer.cisco.com ([64.102.31.112]) by
	xbh-rtp-201.amer.cisco.com with Microsoft SMTPSVC(6.0.3790.1830); 
	Wed, 27 Aug 2008 12:38:03 -0400
Received: from 10.55.206.229 ([10.55.206.229]) by xmb-rtp-213.amer.cisco.com
	([64.102.31.112]) with Microsoft Exchange Server HTTP-DAV ; 
	Wed, 27 Aug 2008 16:38:02 +0000
User-Agent: Microsoft-Entourage/12.12.0.080729
Date: Wed, 27 Aug 2008 18:38:01 +0200
From: JP Vasseur <jvasseur@cisco.com>
To: "Drake, John E" <John.E.Drake2@boeing.com>,
	Adrian Farrel <adrian@olddog.co.uk>, <roll@ietf.org>
Message-ID: <C4DB4F89.50AEC%jvasseur@cisco.com>
Thread-Topic: [Roll] draft-ietf-roll-protocols-survey-00
Thread-Index: AckF4uWWv+jCr8q7RKKuNS7geV3eIgA6l4jAAFZXU+0ACvR8MAAENIb7
In-Reply-To: <51661468CBD1354294533DA79E85955A0109FD7B@XCH-SW-5V2.sw.nos.boeing.com>
Mime-version: 1.0
X-OriginalArrivalTime: 27 Aug 2008 16:38:03.0214 (UTC)
	FILETIME=[465E4EE0:01C90863]
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; l=15588; t=1219855083;
	x=1220719083; c=relaxed/simple; s=rtpdkim1001;
	h=Content-Type:From:Subject:Content-Transfer-Encoding:MIME-Version;
	d=cisco.com; i=jvasseur@cisco.com;
	z=From:=20JP=20Vasseur=20<jvasseur@cisco.com>
	|Subject:=20Re=3A=20[Roll]=20draft-ietf-roll-protocols-surv
	ey-00 |Sender:=20
	|To:=20=22Drake,=20John=20E=22=20<John.E.Drake2@boeing.com>
	,=0A=20=20=20=20=20=20=20=20Adrian=20Farrel=20<adrian@olddog
	.co.uk>,=20<roll@ietf.org>;
	bh=9GgUO4lwoVURrWFgTlMaOFHZ+hBSmA/Mq9NdHb/Yb+s=;
	b=fQ1iECJoIfHlofslYIjSCVMlzfBU6qU6Oi5XsyNU+o4C2ktwViNSz95Etu
	vPoZchfoFK3xZO4YfgwLGcw6FD56NP7ptF92z+lNT72ou16vC9plOxfzlb/G
	MYQUM03dKq;
Authentication-Results: rtp-dkim-1; header.From=jvasseur@cisco.com; dkim=pass (
	sig from cisco.com/rtpdkim1001 verified; ); 
Subject: Re: [Roll] draft-ietf-roll-protocols-survey-00
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/roll>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: roll-bounces@ietf.org
Errors-To: roll-bounces@ietf.org

Hi John,


On 8/27/08 4:45 PM, "Drake, John E" <John.E.Drake2@boeing.com> wrote:

> JP,
> 
> I thought that was exactly Adrian's point.

Ok let's have him express his opinion.

> 
> If you evaluate a bunch of routing protocols as they exist today in a
> new operational environment and conclude that none of them are
> appropriate, then you have no choice but to conclude that you need to
> invent at least one, but probably many, new routing protocols.  It's not
> like this hasn't been done before.
> 
> I took Adrian's note to say that doing this is not sufficient and that
> what needed to be done was to characterize the new operational
> environment, propose changes needed in each routing protocol to address
> the new operational environment, and then evaluate these changes.
> 

John, I fully respect your opinion. Feel free to propose these changes in
light of the routing requirements expressed in the related WG document.
Please make sure to fully understand them though, these networks have fairly
unique characteristics that do require significant background.

JP.

> Thanks,
> 
> John 
> 
>> -----Original Message-----
>> From: JP Vasseur [mailto:jvasseur@cisco.com]
>> Sent: Wednesday, August 27, 2008 2:24 AM
>> To: Drake, John E; Adrian Farrel; roll@ietf.org
>> Subject: Re: [Roll] draft-ietf-roll-protocols-survey-00
>> 
>> John,
>> 
>> I do not think that this was Adrian's point. Your feed-back is
>> more than welcome but please argue a bit more ...
>> 
>> Thanks.
>> 
>> JP.
>> 
>> 
>> On 8/25/08 6:13 PM, "Drake, John E" <John.E.Drake2@boeing.com> wrote:
>> 
>>> Adrian,
>>> 
>>> An excellent note - I agree completely.  We need fewer routing
>>> protocols, not more.
>>> 
>>> Thanks,
>>> 
>>> John
>>> 
>>>> -----Original Message-----
>>>> From: Adrian Farrel [mailto:adrian@olddog.co.uk]
>>>> Sent: Sunday, August 24, 2008 5:14 AM
>>>> To: roll@ietf.org
>>>> Subject: [Roll] draft-ietf-roll-protocols-survey-00
>>>> 
>>>> Hi,
>>>> 
>>>> As one of the two tourists who raised a hand in Dublin to express
>>>> uneasiness about this I-D becoming a WG draft, I thought I should
>>>> write a note about my concerns.
>>>> 
>>>> I should caveat this by saying that I do appreciate the
>> need for this 
>>>> work, and that the author-team will, I'm sure, do a fine job at
>>>> delivering what the working group needs. My concerns were much more
>>>> about getting the direction of the I-D right before
>> accepting it as I
>>>> think it is often harder to recast an I-D once it is within the
>>>> working group.
>>>> 
>>>> Below, please find my major discussion point. I have also done a
>>>> review of the draft and found a bunch of issues/questions of more
>>>> minor importance.
>>>> 
>>>> Regards,
>>>> Adrian
>>>> 
>>>> ===
>>>> 
>>>> The analysis of the routing protocols is predicated on what
>> they are 
>>>> currently used for. To some extent this is reasonable
>>>> - the easiest analysis of a routing protocol is in its operational
>>>> environment. But to use this analysis as the basis of a
>> decision for 
>>>> use of a protocol in a new environment is not so reasonable. If you
>>>> want to show that none of today's protocols has been
>> designed for use
>>>> in the ROLL environment, then I don't suppose anyone will be
>>>> surprised. However, what we are really interested in is whether any
>>>> of the existing protocols is suitable for adaptation for
>> use in ROLL, 
>>>> whether the those adaptations would be contrived and
>> technically hard
>>>> (or flaky), and whether it would be more efficient to design a new
>>>> protocol.
>>>> 
>>>> For an example (and I'm not proposing this as the solution
>> for ROLL), 
>>>> an IGP could easily be adapted to flood on only certain links, to
>>>> discard certain LSAs, and to build a FIB according to
>> specific rules. 
>>>> This would not be a large change to the protocol, although it would
>>>> obviously not be interoperable.
>>>> 
>>>> To discard from consideration any protocol based on its
>> behavior in a 
>>>> certain environment without setting it in the context of your
>>>> forwarding paradigm and without examining the potential to adapt a
>>>> protocol to that environment is wrong. If all you wanted to do was
>>>> show that no current variant of any existing routing protocol is
>>>> immediately applicable to ROLL, then that would be easy and
>> would not 
>>>> be a surprise. But to imply that protocols are not open for
>>>> adaptation is more serious.
>>>> 
>>>> This is not to say that inventing a new protocol would be wrong or
>>>> not fun.
>>>> Only that your reasons for discarding protocols are poorly founded.
>>>> You have focused on the operation of the routing protocol, not the
>>>> purpose of the routing protocol. To give a better understanding of
>>>> why you are discarding a protocol, you must show what you want to
>>>> achieve as your forwarding paradigm. The requirements
>> documents make 
>>>> some start at this.
>>>> For example, draft-ietf-roll-urban-routing-reqs talks about:
>>>> - routing to minimise power usage
>>>> - routing to consider node and link capabilities
>>>> - routing protocol to scale within CPU, memory and power limits
>>>> - routing according to different metrics (latency is cited)
>>>> 
>>>> Such considerations are a good start to understanding the
>> forwarding 
>>>> paradigm in ROLL, but would not be good enough to use to
>> devise a new 
>>>> routing protocol, so I don't see how they can be good enough to
>>>> determine whether an existing protocol should be discarded,
>> modified, 
>>>> or used.
>>>> 
>>>> =============
>>>> 
>>>> More specific comments on the draft follow.
>>>> 
>>>> ---
>>>> 
>>>> Do we have a commitment from the WG that any new protocol developed
>>>> will be held to the same standards? That is, that the new protocol
>>>> MUST achieve a "pass" in very column of the table in
>> section 4. Or is
>>>> there scope for pragmatism allowing trade-offs in the new protocol
>>>> such that in some environments it achieves a pass in some columns,
>>>> and in other environments it achieves a pass in other columns.
>>>> 
>>>> Maybe you could add this as a statement in the Abstract and
>>>> Introduction
>>>> 
>>>> ---
>>>> 
>>>> Why do you include the requirements language boilerplate? I don't
>>>> think you use (or should use) such language in this document.
>>>> 
>>>> ---
>>>> 
>>>> Section 1
>>>> 
>>>> Can you strip out terms not used in the document?
>>>> 
>>>> ---
>>>> 
>>>> Section 2
>>>> 
>>>> You quote CPU power in MHz. Although that is the practical
>> electronic 
>>>> limit, maybe MIPS would be a better measure.
>>>> 
>>>> ---
>>>> 
>>>> Section 3 para 2
>>>> 
>>>> "If a protocol cannot meet even these minimalist criteria..."
>>>> I think your use of "cannot" is correct in the context of the
>>>> sentence, but I think your I-D examines "does not"
>>>> 
>>>> "...is unlikely to be good candidate..."
>>>> Too much prevarication!
>>>> 
>>>> ---
>>>> 
>>>> Section 3 para 3
>>>> 
>>>> "...the protocol does not appear to contain sufficient
>> flexibility..."
>>>> The problem with this is that it is very mushy!
>>>> It is OK to discard a protocol that is not flexible enough
>> to handle 
>>>> your requirements. It is not OK to discard a protocol because you
>>>> don't appear to know how to extend it.
>>>> 
>>>> A example comes in the somewhat contentious table in section 4
>>>> :-) Here, for OSPF, you say that there is a "fail" for
>> conveying node 
>>>> costs.
>>>> But there is already LSA available for carrying node capabilities,
>>>> and there are opaque LSAs available for carrying additional
>>>> "unconventional"
>>>> information.
>>>> 
>>>> All this sort of ties to my main point. Of course, the protocols
>>>> don't do exactly what you want already, but a more thorough
>> survey is 
>>>> needed if you what to use this I-D as the reason for excluding
>>>> protocols.
>>>> 
>>>> ---
>>>> 
>>>> Section 3.2 para 1
>>>> "...with size ranging from a minimum..."
>>>> I think you mean "...with maximum size ranging from a minimum..."
>>>> 
>>>> "very large networks"
>>>> Can you de-fluff this? Some people might think that 250
>> nodes is very 
>>>> large
>>>> ;-)
>>>> 
>>>> "network depths"
>>>> Would be worth including your definition here.
>>>> 
>>>> --
>>>> 
>>>> Section 3.2 para 1
>>>> 
>>>> Is every network node a router?
>>>> draft-ietf-roll-urban-routing-reqs says "Sensor nodes are
>> capable of 
>>>> forwarding data." If every node is a router and participates in the
>>>> routing protocol, this creates a very different environment from
>>>> saying that most sensors are hosts, and some are routers. I
>>>> appreciate that "capable" does not imply "do".
>>>> 
>>>> ---
>>>> 
>>>> Associated with the previous point, I think you might spend
>> a little 
>>>> more time discussing the definition of a link in ROLL. It is clear
>>>> that in a wireless n/w a link may exist between any two nodes in
>>>> range.
>>>> If that is
>>>> what you mean, then it would help to make it clear. On the other
>>>> hand, "link" could be defined as an active neighbor relationship
>>>> between a pair of routers. Or something else.
>>>> 
>>>> This becomes important as we try to understand how the
>> protocol must 
>>>> scale, and what it is supposed to do.
>>>> 
>>>> I presume that the concept of "parallel links" between neighbors is
>>>> going to have no meaning at the moment. That is, you use only one
>>>> frequency in any network. Maybe I presume wrong, in which case, you
>>>> need to refine the definition of "network density" in section 3.1.
>>>> 
>>>> ---
>>>> 
>>>> Section 3.2 para 1
>>>> Final sentence is a bit mangled.
>>>> 
>>>> ---
>>>> 
>>>> Section 3.2 para 2
>>>> 
>>>> I can see why scaling with O(L) may be an issue, but it may
>> depend on 
>>>> the definitions of links and routers. Also it may depend on what
>>>> magnitude you expect for L. Perhaps you could give some
>> ball-parks in 
>>>> the previous paragraph as you do for N and D. Without that, it is
>>>> hard to justify the claim that scaling with O(L) is a problem.
>>>> 
>>>> ---
>>>> 
>>>> Section 3.3
>>>> 
>>>> Can you add SINR to your terminology?
>>>> 
>>>> "...not trigger unnecessary responses..."
>>>> I think that this is subjective and unhelpful. Can you rephrase to
>>>> capture a quantifiable requirement?
>>>> 
>>>> s/link changes to propagate across/link changes to be propagated
>>>> across/
>>>> 
>>>> s/O(l)/O(L)/
>>>> 
>>>> ---
>>>> 
>>>> Section 3.3 final para
>>>> 
>>>> You have "transmissions", "broadcast", and "route updates".
>>>> Can you use a
>>>> consistent term? It may be less pretty English, but it would be a
>>>> better way to avoid accusations of bias :-)
>>>> 
>>>> Perhaps...
>>>> More precisely, loss responses that require transmissions
>> within the 
>>>> network of O(N) fail, while those that are limited to O(L) or O(D)
>>>> pass.
>>>> 
>>>> ---
>>>> 
>>>> Section 3.4 para 1
>>>> 
>>>> "In terms of routing structure, any proposed L2N routing protocol
>>>> ought to support the autonomous organization and
>> configuration of the
>>>> network at the lowest possible energy cost."
>>>> 
>>>> Why "L2N"? I thought "Networks of low power wireless devices
>>>> introduce novel IP routing issues."
>>>> 
>>>> "ought" is not a recognized RFC 2119 word :-)
>>>> 
>>>> I think "at the lowest possible energy cost" is a statement
>> that this 
>>>> requirement trumps all others. Is that what you mean?
>>>> 
>>>> I'm not convinced by the absolute statement you make here.
>>>> Maybe, this is a
>>>> question I should take to the requirements documents. Consider
>>>> routing protocol A that is slightly more (say 5%) power-consuming
>>>> than routing protocol B. But suppose protocol A gives rise
>> to a data 
>>>> forwarding solution that is 50% more power-efficient?
>>>> 
>>>> ---
>>>> 
>>>> Section 3.4 para 2
>>>> 
>>>> "As low-power wireless networks can have very low data rates,
>>>> protocols which require a minimum control packet rate can have
>>>> unbounded control overhead."
>>>> 
>>>> I know what you mean, but I had to parse several times. How about...
>>>> 
>>>> The control overhead is the ratio of control data to
>> payload data. A 
>>>> high control overhead indicates that precious network resources
>>>> (bandwidth, power, or CPU) are being consumed by the control
>>>> protocols instead of being used to transmit data. Where
>> payload data 
>>>> rates are very low (as is often the case in low-power wireless
>>>> networks) the control overhead can become unbounded for protocols
>>>> that require some non-zero background control packet rate.
>>>> 
>>>> ---
>>>> 
>>>> Section 3.4 para 2
>>>> 
>>>> s/never meet the condition can be forced/never meet the condition
>>>> could be forced/
>>>> 
>>>> ---
>>>> 
>>>> Section 4 para 3
>>>> 
>>>> "multiple layer 2 hops away"
>>>> Really?
>>>> Again, I thought we were building an IP routing protocol. If your
>>>> requirement is layer 2 routing, you need to make that
>> visible up front.
>>>> But, I can see why you are interested in L2 hops as well as L3 hops
>>>> since they all consume power.
>>>> 
>>>> This comes back to the question about whether all nodes are
>> routers. 
>>>> Perhaps some repeaters are not routers?
>>>> 
>>>> But can't we actually factor the L2 hops into the definition of the
>>>> L3 hop?
>>>> 
>>>> ---
>>>> 
>>>> Section 4 para 3
>>>> 
>>>> "...nodes may only advertise..."
>>>> This sounds prohibitive!
>>>> 
>>>> ---
>>>> 
>>>> Section 4 para 4
>>>> 
>>>> "Neighbor discovery is a critical component of any routing
>> protocol."
>>>> I think I disagree.
>>>> It is clear that routing protocols need to know their neighbors. It
>>>> is not clear that this requires that the discovery be part of the
>>>> routing protocol.
>>>> 
>>>> Later you have:
>>>> "...key component of many protocols."
>>>> This is less strong than the initial sentence.
>>>> 
>>>> ---
>>>> 
>>>> Section 4
>>>> 
>>>> "Protocols Today"
>>>> 
>>>> Is this a section 4.1 headers?
>>>> 
>>>> ---
>>>> 
>>>> Section 4 "Protocols Today" para 2
>>>> 
>>>> I don't think the MPLS TE example is a good one. It is
>> certainly not 
>>>> correct that the TED has to be fully distributed around the network.
>>>> There are some very good examples of where "stub TE areas" do not
>>>> need to know the TE information for the whole of the rest of the
>>>> network.
>>>> 
>>>> ---
>>>> 
>>>> Section 4 Table
>>>> 
>>>> I'm prepared to bet that a lot of people will be upset by
>> the use of 
>>>> "fail"
>>>> for their favorite protocols. It would seem that "?" is more
>>>> appropriate in many cells.
>>>> 
>>>> ---
>>>> 
>>>> Section 5.1
>>>> Is it worth replacing "OSPF" with "OSPF or IS-IS"?
>>>> 
>>>> ---
>>>> 
>>>> Section 14.
>>>> Your three ROLL requirements drafts are Normative
>> References, I think.
>>>> 
>>>> _______________________________________________
>>>> Roll mailing list
>>>> Roll@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/roll
>>>> 
>>> _______________________________________________
>>> Roll mailing list
>>> Roll@ietf.org
>>> https://www.ietf.org/mailman/listinfo/roll
>> 
>> 

_______________________________________________
Roll mailing list
Roll@ietf.org
https://www.ietf.org/mailman/listinfo/roll


From roll-bounces@ietf.org  Wed Aug 27 09:42:10 2008
Return-Path: <roll-bounces@ietf.org>
X-Original-To: roll-archive@ietf.org
Delivered-To: ietfarch-roll-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id A33BC3A6AC3;
	Wed, 27 Aug 2008 09:42:10 -0700 (PDT)
X-Original-To: roll@core3.amsl.com
Delivered-To: roll@core3.amsl.com
Received: from localhost (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id A5B4B3A694C
	for <roll@core3.amsl.com>; Wed, 27 Aug 2008 09:42:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.682
X-Spam-Level: 
X-Spam-Status: No, score=-4.682 tagged_above=-999 required=5
	tests=[AWL=-0.383, BAYES_00=-2.599, MANGLED_TOOL=2.3,
	RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32])
	by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id mTmt++1h4IT8 for <roll@core3.amsl.com>;
	Wed, 27 Aug 2008 09:42:07 -0700 (PDT)
Received: from sj-iport-2.cisco.com (sj-iport-2.cisco.com [171.71.176.71])
	by core3.amsl.com (Postfix) with ESMTP id C70843A6AC3
	for <roll@ietf.org>; Wed, 27 Aug 2008 09:42:05 -0700 (PDT)
X-IronPort-AV: E=Sophos;i="4.32,279,1217808000"; d="scan'208";a="78616872"
Received: from sj-dkim-3.cisco.com ([171.71.179.195])
	by sj-iport-2.cisco.com with ESMTP; 27 Aug 2008 16:41:34 +0000
Received: from sj-core-2.cisco.com (sj-core-2.cisco.com [171.71.177.254])
	by sj-dkim-3.cisco.com (8.12.11/8.12.11) with ESMTP id m7RGfYGQ007139; 
	Wed, 27 Aug 2008 09:41:34 -0700
Received: from xbh-rtp-211.amer.cisco.com (xbh-rtp-211.cisco.com
	[64.102.31.102])
	by sj-core-2.cisco.com (8.13.8/8.13.8) with ESMTP id m7RGfOGt008208;
	Wed, 27 Aug 2008 16:41:34 GMT
Received: from xmb-rtp-213.amer.cisco.com ([64.102.31.112]) by
	xbh-rtp-211.amer.cisco.com with Microsoft SMTPSVC(6.0.3790.1830); 
	Wed, 27 Aug 2008 12:41:32 -0400
Received: from 10.55.206.229 ([10.55.206.229]) by xmb-rtp-213.amer.cisco.com
	([64.102.31.112]) with Microsoft Exchange Server HTTP-DAV ; 
	Wed, 27 Aug 2008 16:41:32 +0000
User-Agent: Microsoft-Entourage/12.12.0.080729
Date: Wed, 27 Aug 2008 18:41:31 +0200
From: JP Vasseur <jvasseur@cisco.com>
To: Adrian Farrel <adrian@olddog.co.uk>,
	"Drake, John E" <John.E.Drake2@boeing.com>, <roll@ietf.org>
Message-ID: <C4DB505B.50AF9%jvasseur@cisco.com>
Thread-Topic: [Roll] draft-ietf-roll-protocols-survey-00
Thread-Index: AckIY8I3xZ/MdTsAeUWxNceWkLcHvw==
In-Reply-To: <065801c9085b$a4a20ee0$0300a8c0@your029b8cecfe>
Mime-version: 1.0
X-OriginalArrivalTime: 27 Aug 2008 16:41:32.0874 (UTC)
	FILETIME=[C355E2A0:01C90863]
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; l=16314; t=1219855294;
	x=1220719294; c=relaxed/simple; s=sjdkim3002;
	h=Content-Type:From:Subject:Content-Transfer-Encoding:MIME-Version;
	d=cisco.com; i=jvasseur@cisco.com;
	z=From:=20JP=20Vasseur=20<jvasseur@cisco.com>
	|Subject:=20Re=3A=20[Roll]=20draft-ietf-roll-protocols-surv
	ey-00 |Sender:=20;
	bh=ddJbcv8itWZtO7zPAnrMw0NNgnV8uiyxwQDgNX2sL3Y=;
	b=GQdqH0RrR+Txai3Nmm/W736UAG0tAACt50ZZfpO/E0LOmBpW9acfE13D31
	P4XQPCj+4xbcWexqS3hVcSA8GDM3bncHtXs1aFzidvDmvFJXF6t+X9xQlhUQ
	+Cg28Y89Am;
Authentication-Results: sj-dkim-3; header.From=jvasseur@cisco.com; dkim=pass (
	sig from cisco.com/sjdkim3002 verified; ); 
Subject: Re: [Roll] draft-ietf-roll-protocols-survey-00
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/roll>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: roll-bounces@ietf.org
Errors-To: roll-bounces@ietf.org

Hi Adrian,


On 8/27/08 5:36 PM, "Adrian Farrel" <adrian@olddog.co.uk> wrote:

> Right.
> 
> I am not saying that a new protocol is not needed. I am saying that I'd like
> to see some more discussion of what the routing protocol is trying to
> achieve.
> 
> The work to describe how the protocol itself must behave is pretty good.

Right.

But 
> the work describing what information must be distributed, how up-to-date it
> must be, and how it will be used is missing.
> 
> I am sure that this is all work in progress and will emerge in due course.

Absolutely, although there is already some of that in the existing documents
and others (such as the routing metrics - an individual submission at this
points). Required protocol characteristics are described (e.g. Constrained
based routing, node constraints, protocol overhead, ...).

Cheers,

JP.

> 
> A
> ----- Original Message -----
> From: "Drake, John E" <John.E.Drake2@boeing.com>
> To: "JP Vasseur" <jvasseur@cisco.com>; "Adrian Farrel"
> <adrian@olddog.co.uk>; <roll@ietf.org>
> Sent: Wednesday, August 27, 2008 3:45 PM
> Subject: RE: [Roll] draft-ietf-roll-protocols-survey-00
> 
> 
> JP,
> 
> I thought that was exactly Adrian's point.
> 
> If you evaluate a bunch of routing protocols as they exist today in a
> new operational environment and conclude that none of them are
> appropriate, then you have no choice but to conclude that you need to
> invent at least one, but probably many, new routing protocols.  It's not
> like this hasn't been done before.
> 
> I took Adrian's note to say that doing this is not sufficient and that
> what needed to be done was to characterize the new operational
> environment, propose changes needed in each routing protocol to address
> the new operational environment, and then evaluate these changes.
> 
> Thanks,
> 
> John
> 
>> -----Original Message-----
>> From: JP Vasseur [mailto:jvasseur@cisco.com]
>> Sent: Wednesday, August 27, 2008 2:24 AM
>> To: Drake, John E; Adrian Farrel; roll@ietf.org
>> Subject: Re: [Roll] draft-ietf-roll-protocols-survey-00
>> 
>> John,
>> 
>> I do not think that this was Adrian's point. Your feed-back is
>> more than welcome but please argue a bit more ...
>> 
>> Thanks.
>> 
>> JP.
>> 
>> 
>> On 8/25/08 6:13 PM, "Drake, John E" <John.E.Drake2@boeing.com> wrote:
>> 
>>> Adrian,
>>> 
>>> An excellent note - I agree completely.  We need fewer routing
>>> protocols, not more.
>>> 
>>> Thanks,
>>> 
>>> John
>>> 
>>>> -----Original Message-----
>>>> From: Adrian Farrel [mailto:adrian@olddog.co.uk]
>>>> Sent: Sunday, August 24, 2008 5:14 AM
>>>> To: roll@ietf.org
>>>> Subject: [Roll] draft-ietf-roll-protocols-survey-00
>>>> 
>>>> Hi,
>>>> 
>>>> As one of the two tourists who raised a hand in Dublin to express
>>>> uneasiness about this I-D becoming a WG draft, I thought I should
>>>> write a note about my concerns.
>>>> 
>>>> I should caveat this by saying that I do appreciate the
>> need for this
>>>> work, and that the author-team will, I'm sure, do a fine job at
>>>> delivering what the working group needs. My concerns were much more
>>>> about getting the direction of the I-D right before
>> accepting it as I
>>>> think it is often harder to recast an I-D once it is within the
>>>> working group.
>>>> 
>>>> Below, please find my major discussion point. I have also done a
>>>> review of the draft and found a bunch of issues/questions of more
>>>> minor importance.
>>>> 
>>>> Regards,
>>>> Adrian
>>>> 
>>>> ===
>>>> 
>>>> The analysis of the routing protocols is predicated on what
>> they are
>>>> currently used for. To some extent this is reasonable
>>>> - the easiest analysis of a routing protocol is in its operational
>>>> environment. But to use this analysis as the basis of a
>> decision for
>>>> use of a protocol in a new environment is not so reasonable. If you
>>>> want to show that none of today's protocols has been
>> designed for use
>>>> in the ROLL environment, then I don't suppose anyone will be
>>>> surprised. However, what we are really interested in is whether any
>>>> of the existing protocols is suitable for adaptation for
>> use in ROLL,
>>>> whether the those adaptations would be contrived and
>> technically hard
>>>> (or flaky), and whether it would be more efficient to design a new
>>>> protocol.
>>>> 
>>>> For an example (and I'm not proposing this as the solution
>> for ROLL),
>>>> an IGP could easily be adapted to flood on only certain links, to
>>>> discard certain LSAs, and to build a FIB according to
>> specific rules.
>>>> This would not be a large change to the protocol, although it would
>>>> obviously not be interoperable.
>>>> 
>>>> To discard from consideration any protocol based on its
>> behavior in a
>>>> certain environment without setting it in the context of your
>>>> forwarding paradigm and without examining the potential to adapt a
>>>> protocol to that environment is wrong. If all you wanted to do was
>>>> show that no current variant of any existing routing protocol is
>>>> immediately applicable to ROLL, then that would be easy and
>> would not
>>>> be a surprise. But to imply that protocols are not open for
>>>> adaptation is more serious.
>>>> 
>>>> This is not to say that inventing a new protocol would be wrong or
>>>> not fun.
>>>> Only that your reasons for discarding protocols are poorly founded.
>>>> You have focused on the operation of the routing protocol, not the
>>>> purpose of the routing protocol. To give a better understanding of
>>>> why you are discarding a protocol, you must show what you want to
>>>> achieve as your forwarding paradigm. The requirements
>> documents make
>>>> some start at this.
>>>> For example, draft-ietf-roll-urban-routing-reqs talks about:
>>>> - routing to minimise power usage
>>>> - routing to consider node and link capabilities
>>>> - routing protocol to scale within CPU, memory and power limits
>>>> - routing according to different metrics (latency is cited)
>>>> 
>>>> Such considerations are a good start to understanding the
>> forwarding
>>>> paradigm in ROLL, but would not be good enough to use to
>> devise a new
>>>> routing protocol, so I don't see how they can be good enough to
>>>> determine whether an existing protocol should be discarded,
>> modified,
>>>> or used.
>>>> 
>>>> =============
>>>> 
>>>> More specific comments on the draft follow.
>>>> 
>>>> ---
>>>> 
>>>> Do we have a commitment from the WG that any new protocol developed
>>>> will be held to the same standards? That is, that the new protocol
>>>> MUST achieve a "pass" in very column of the table in
>> section 4. Or is
>>>> there scope for pragmatism allowing trade-offs in the new protocol
>>>> such that in some environments it achieves a pass in some columns,
>>>> and in other environments it achieves a pass in other columns.
>>>> 
>>>> Maybe you could add this as a statement in the Abstract and
>>>> Introduction
>>>> 
>>>> ---
>>>> 
>>>> Why do you include the requirements language boilerplate? I don't
>>>> think you use (or should use) such language in this document.
>>>> 
>>>> ---
>>>> 
>>>> Section 1
>>>> 
>>>> Can you strip out terms not used in the document?
>>>> 
>>>> ---
>>>> 
>>>> Section 2
>>>> 
>>>> You quote CPU power in MHz. Although that is the practical
>> electronic
>>>> limit, maybe MIPS would be a better measure.
>>>> 
>>>> ---
>>>> 
>>>> Section 3 para 2
>>>> 
>>>> "If a protocol cannot meet even these minimalist criteria..."
>>>> I think your use of "cannot" is correct in the context of the
>>>> sentence, but I think your I-D examines "does not"
>>>> 
>>>> "...is unlikely to be good candidate..."
>>>> Too much prevarication!
>>>> 
>>>> ---
>>>> 
>>>> Section 3 para 3
>>>> 
>>>> "...the protocol does not appear to contain sufficient
>> flexibility..."
>>>> The problem with this is that it is very mushy!
>>>> It is OK to discard a protocol that is not flexible enough
>> to handle
>>>> your requirements. It is not OK to discard a protocol because you
>>>> don't appear to know how to extend it.
>>>> 
>>>> A example comes in the somewhat contentious table in section 4
>>>> :-) Here, for OSPF, you say that there is a "fail" for
>> conveying node
>>>> costs.
>>>> But there is already LSA available for carrying node capabilities,
>>>> and there are opaque LSAs available for carrying additional
>>>> "unconventional"
>>>> information.
>>>> 
>>>> All this sort of ties to my main point. Of course, the protocols
>>>> don't do exactly what you want already, but a more thorough
>> survey is
>>>> needed if you what to use this I-D as the reason for excluding
>>>> protocols.
>>>> 
>>>> ---
>>>> 
>>>> Section 3.2 para 1
>>>> "...with size ranging from a minimum..."
>>>> I think you mean "...with maximum size ranging from a minimum..."
>>>> 
>>>> "very large networks"
>>>> Can you de-fluff this? Some people might think that 250
>> nodes is very
>>>> large
>>>> ;-)
>>>> 
>>>> "network depths"
>>>> Would be worth including your definition here.
>>>> 
>>>> --
>>>> 
>>>> Section 3.2 para 1
>>>> 
>>>> Is every network node a router?
>>>> draft-ietf-roll-urban-routing-reqs says "Sensor nodes are
>> capable of
>>>> forwarding data." If every node is a router and participates in the
>>>> routing protocol, this creates a very different environment from
>>>> saying that most sensors are hosts, and some are routers. I
>>>> appreciate that "capable" does not imply "do".
>>>> 
>>>> ---
>>>> 
>>>> Associated with the previous point, I think you might spend
>> a little
>>>> more time discussing the definition of a link in ROLL. It is clear
>>>> that in a wireless n/w a link may exist between any two nodes in
>>>> range.
>>>> If that is
>>>> what you mean, then it would help to make it clear. On the other
>>>> hand, "link" could be defined as an active neighbor relationship
>>>> between a pair of routers. Or something else.
>>>> 
>>>> This becomes important as we try to understand how the
>> protocol must
>>>> scale, and what it is supposed to do.
>>>> 
>>>> I presume that the concept of "parallel links" between neighbors is
>>>> going to have no meaning at the moment. That is, you use only one
>>>> frequency in any network. Maybe I presume wrong, in which case, you
>>>> need to refine the definition of "network density" in section 3.1.
>>>> 
>>>> ---
>>>> 
>>>> Section 3.2 para 1
>>>> Final sentence is a bit mangled.
>>>> 
>>>> ---
>>>> 
>>>> Section 3.2 para 2
>>>> 
>>>> I can see why scaling with O(L) may be an issue, but it may
>> depend on
>>>> the definitions of links and routers. Also it may depend on what
>>>> magnitude you expect for L. Perhaps you could give some
>> ball-parks in
>>>> the previous paragraph as you do for N and D. Without that, it is
>>>> hard to justify the claim that scaling with O(L) is a problem.
>>>> 
>>>> ---
>>>> 
>>>> Section 3.3
>>>> 
>>>> Can you add SINR to your terminology?
>>>> 
>>>> "...not trigger unnecessary responses..."
>>>> I think that this is subjective and unhelpful. Can you rephrase to
>>>> capture a quantifiable requirement?
>>>> 
>>>> s/link changes to propagate across/link changes to be propagated
>>>> across/
>>>> 
>>>> s/O(l)/O(L)/
>>>> 
>>>> ---
>>>> 
>>>> Section 3.3 final para
>>>> 
>>>> You have "transmissions", "broadcast", and "route updates".
>>>> Can you use a
>>>> consistent term? It may be less pretty English, but it would be a
>>>> better way to avoid accusations of bias :-)
>>>> 
>>>> Perhaps...
>>>> More precisely, loss responses that require transmissions
>> within the
>>>> network of O(N) fail, while those that are limited to O(L) or O(D)
>>>> pass.
>>>> 
>>>> ---
>>>> 
>>>> Section 3.4 para 1
>>>> 
>>>> "In terms of routing structure, any proposed L2N routing protocol
>>>> ought to support the autonomous organization and
>> configuration of the
>>>> network at the lowest possible energy cost."
>>>> 
>>>> Why "L2N"? I thought "Networks of low power wireless devices
>>>> introduce novel IP routing issues."
>>>> 
>>>> "ought" is not a recognized RFC 2119 word :-)
>>>> 
>>>> I think "at the lowest possible energy cost" is a statement
>> that this
>>>> requirement trumps all others. Is that what you mean?
>>>> 
>>>> I'm not convinced by the absolute statement you make here.
>>>> Maybe, this is a
>>>> question I should take to the requirements documents. Consider
>>>> routing protocol A that is slightly more (say 5%) power-consuming
>>>> than routing protocol B. But suppose protocol A gives rise
>> to a data
>>>> forwarding solution that is 50% more power-efficient?
>>>> 
>>>> ---
>>>> 
>>>> Section 3.4 para 2
>>>> 
>>>> "As low-power wireless networks can have very low data rates,
>>>> protocols which require a minimum control packet rate can have
>>>> unbounded control overhead."
>>>> 
>>>> I know what you mean, but I had to parse several times. How about...
>>>> 
>>>> The control overhead is the ratio of control data to
>> payload data. A
>>>> high control overhead indicates that precious network resources
>>>> (bandwidth, power, or CPU) are being consumed by the control
>>>> protocols instead of being used to transmit data. Where
>> payload data
>>>> rates are very low (as is often the case in low-power wireless
>>>> networks) the control overhead can become unbounded for protocols
>>>> that require some non-zero background control packet rate.
>>>> 
>>>> ---
>>>> 
>>>> Section 3.4 para 2
>>>> 
>>>> s/never meet the condition can be forced/never meet the condition
>>>> could be forced/
>>>> 
>>>> ---
>>>> 
>>>> Section 4 para 3
>>>> 
>>>> "multiple layer 2 hops away"
>>>> Really?
>>>> Again, I thought we were building an IP routing protocol. If your
>>>> requirement is layer 2 routing, you need to make that
>> visible up front.
>>>> But, I can see why you are interested in L2 hops as well as L3 hops
>>>> since they all consume power.
>>>> 
>>>> This comes back to the question about whether all nodes are
>> routers.
>>>> Perhaps some repeaters are not routers?
>>>> 
>>>> But can't we actually factor the L2 hops into the definition of the
>>>> L3 hop?
>>>> 
>>>> ---
>>>> 
>>>> Section 4 para 3
>>>> 
>>>> "...nodes may only advertise..."
>>>> This sounds prohibitive!
>>>> 
>>>> ---
>>>> 
>>>> Section 4 para 4
>>>> 
>>>> "Neighbor discovery is a critical component of any routing
>> protocol."
>>>> I think I disagree.
>>>> It is clear that routing protocols need to know their neighbors. It
>>>> is not clear that this requires that the discovery be part of the
>>>> routing protocol.
>>>> 
>>>> Later you have:
>>>> "...key component of many protocols."
>>>> This is less strong than the initial sentence.
>>>> 
>>>> ---
>>>> 
>>>> Section 4
>>>> 
>>>> "Protocols Today"
>>>> 
>>>> Is this a section 4.1 headers?
>>>> 
>>>> ---
>>>> 
>>>> Section 4 "Protocols Today" para 2
>>>> 
>>>> I don't think the MPLS TE example is a good one. It is
>> certainly not
>>>> correct that the TED has to be fully distributed around the network.
>>>> There are some very good examples of where "stub TE areas" do not
>>>> need to know the TE information for the whole of the rest of the
>>>> network.
>>>> 
>>>> ---
>>>> 
>>>> Section 4 Table
>>>> 
>>>> I'm prepared to bet that a lot of people will be upset by
>> the use of
>>>> "fail"
>>>> for their favorite protocols. It would seem that "?" is more
>>>> appropriate in many cells.
>>>> 
>>>> ---
>>>> 
>>>> Section 5.1
>>>> Is it worth replacing "OSPF" with "OSPF or IS-IS"?
>>>> 
>>>> ---
>>>> 
>>>> Section 14.
>>>> Your three ROLL requirements drafts are Normative
>> References, I think.
>>>> 
>>>> _______________________________________________
>>>> Roll mailing list
>>>> Roll@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/roll
>>>> 
>>> _______________________________________________
>>> Roll mailing list
>>> Roll@ietf.org
>>> https://www.ietf.org/mailman/listinfo/roll
>> 
>> 
> 

_______________________________________________
Roll mailing list
Roll@ietf.org
https://www.ietf.org/mailman/listinfo/roll


From roll-bounces@ietf.org  Wed Aug 27 09:58:54 2008
Return-Path: <roll-bounces@ietf.org>
X-Original-To: roll-archive@ietf.org
Delivered-To: ietfarch-roll-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id C9C0D3A694C;
	Wed, 27 Aug 2008 09:58:54 -0700 (PDT)
X-Original-To: roll@core3.amsl.com
Delivered-To: roll@core3.amsl.com
Received: from localhost (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 826193A682B
	for <roll@core3.amsl.com>; Wed, 27 Aug 2008 09:58:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.106
X-Spam-Level: 
X-Spam-Status: No, score=-5.106 tagged_above=-999 required=5
	tests=[AWL=-0.807, BAYES_00=-2.599, MANGLED_TOOL=2.3,
	RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32])
	by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id t-XgNg03jzuF for <roll@core3.amsl.com>;
	Wed, 27 Aug 2008 09:58:51 -0700 (PDT)
Received: from stl-smtpout-01.boeing.com (stl-smtpout-01.boeing.com
	[130.76.96.56]) by core3.amsl.com (Postfix) with ESMTP id 9D3E83A694C
	for <roll@ietf.org>; Wed, 27 Aug 2008 09:58:51 -0700 (PDT)
Received: from stl-av-01.boeing.com (stl-av-01.boeing.com [192.76.190.6])
	by stl-smtpout-01.ns.cs.boeing.com (8.14.0/8.14.0/8.14.0/SMTPOUT) with
	ESMTP id m7RGvf4N026210
	(version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL);
	Wed, 27 Aug 2008 11:57:41 -0500 (CDT)
Received: from stl-av-01.boeing.com (localhost [127.0.0.1])
	by stl-av-01.boeing.com (8.14.0/8.14.0/DOWNSTREAM_RELAY) with ESMTP id
	m7RGvfks016717; Wed, 27 Aug 2008 11:57:41 -0500 (CDT)
Received: from xch-swbh-11.sw.nos.boeing.com (xch-swbh-11.sw.nos.boeing.com
	[129.172.192.157])
	by stl-av-01.boeing.com (8.14.0/8.14.0/UPSTREAM_RELAY) with ESMTP id
	m7RGvM8h015966; Wed, 27 Aug 2008 11:57:41 -0500 (CDT)
Received: from XCH-SW-5V2.sw.nos.boeing.com ([129.172.193.50]) by
	xch-swbh-11.sw.nos.boeing.com with Microsoft SMTPSVC(6.0.3790.3959); 
	Wed, 27 Aug 2008 09:57:37 -0700
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Date: Wed, 27 Aug 2008 09:57:35 -0700
Message-ID: <51661468CBD1354294533DA79E85955A0109FE32@XCH-SW-5V2.sw.nos.boeing.com>
In-Reply-To: <C4DB4F89.50AEC%jvasseur@cisco.com>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: [Roll] draft-ietf-roll-protocols-survey-00
Thread-Index: AckF4uWWv+jCr8q7RKKuNS7geV3eIgA6l4jAAFZXU+0ACvR8MAAENIb7AACOAHA=
References: <51661468CBD1354294533DA79E85955A0109FD7B@XCH-SW-5V2.sw.nos.boeing.com>
	<C4DB4F89.50AEC%jvasseur@cisco.com>
From: "Drake, John E" <John.E.Drake2@boeing.com>
To: "JP Vasseur" <jvasseur@cisco.com>, "Adrian Farrel" <adrian@olddog.co.uk>, 
	<roll@ietf.org>
X-OriginalArrivalTime: 27 Aug 2008 16:57:37.0200 (UTC)
	FILETIME=[021E5B00:01C90866]
Subject: Re: [Roll] draft-ietf-roll-protocols-survey-00
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/roll>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: roll-bounces@ietf.org
Errors-To: roll-bounces@ietf.org

Comment inline 

>-----Original Message-----
>From: JP Vasseur [mailto:jvasseur@cisco.com] 
>Sent: Wednesday, August 27, 2008 9:38 AM
>To: Drake, John E; Adrian Farrel; roll@ietf.org
>Subject: Re: [Roll] draft-ietf-roll-protocols-survey-00
>
>Hi John,
>
>
>On 8/27/08 4:45 PM, "Drake, John E" <John.E.Drake2@boeing.com> wrote:
>
>> JP,
>> 
>> I thought that was exactly Adrian's point.
>
>Ok let's have him express his opinion.
>
>> 
>> If you evaluate a bunch of routing protocols as they exist 
>today in a 
>> new operational environment and conclude that none of them are 
>> appropriate, then you have no choice but to conclude that 
>you need to 
>> invent at least one, but probably many, new routing protocols.  It's 
>> not like this hasn't been done before.
>> 
>> I took Adrian's note to say that doing this is not 
>sufficient and that 
>> what needed to be done was to characterize the new operational 
>> environment, propose changes needed in each routing protocol to 
>> address the new operational environment, and then evaluate 
>these changes.
>> 
>
>John, I fully respect your opinion. Feel free to propose these 
>changes in light of the routing requirements expressed in the 
>related WG document.
>Please make sure to fully understand them though, these 
>networks have fairly unique characteristics that do require 
>significant background.

JD:  I would think this is the responsibility of the authors who are
requesting that their I-D be adopted by the working group.

>
>JP.
>
>> Thanks,
>> 
>> John
>> 
>>> -----Original Message-----
>>> From: JP Vasseur [mailto:jvasseur@cisco.com]
>>> Sent: Wednesday, August 27, 2008 2:24 AM
>>> To: Drake, John E; Adrian Farrel; roll@ietf.org
>>> Subject: Re: [Roll] draft-ietf-roll-protocols-survey-00
>>> 
>>> John,
>>> 
>>> I do not think that this was Adrian's point. Your feed-back is more 
>>> than welcome but please argue a bit more ...
>>> 
>>> Thanks.
>>> 
>>> JP.
>>> 
>>> 
>>> On 8/25/08 6:13 PM, "Drake, John E" 
><John.E.Drake2@boeing.com> wrote:
>>> 
>>>> Adrian,
>>>> 
>>>> An excellent note - I agree completely.  We need fewer routing 
>>>> protocols, not more.
>>>> 
>>>> Thanks,
>>>> 
>>>> John
>>>> 
>>>>> -----Original Message-----
>>>>> From: Adrian Farrel [mailto:adrian@olddog.co.uk]
>>>>> Sent: Sunday, August 24, 2008 5:14 AM
>>>>> To: roll@ietf.org
>>>>> Subject: [Roll] draft-ietf-roll-protocols-survey-00
>>>>> 
>>>>> Hi,
>>>>> 
>>>>> As one of the two tourists who raised a hand in Dublin to express 
>>>>> uneasiness about this I-D becoming a WG draft, I thought I should 
>>>>> write a note about my concerns.
>>>>> 
>>>>> I should caveat this by saying that I do appreciate the
>>> need for this
>>>>> work, and that the author-team will, I'm sure, do a fine job at 
>>>>> delivering what the working group needs. My concerns were 
>much more 
>>>>> about getting the direction of the I-D right before
>>> accepting it as I
>>>>> think it is often harder to recast an I-D once it is within the 
>>>>> working group.
>>>>> 
>>>>> Below, please find my major discussion point. I have also done a 
>>>>> review of the draft and found a bunch of issues/questions of more 
>>>>> minor importance.
>>>>> 
>>>>> Regards,
>>>>> Adrian
>>>>> 
>>>>> ===
>>>>> 
>>>>> The analysis of the routing protocols is predicated on what
>>> they are
>>>>> currently used for. To some extent this is reasonable
>>>>> - the easiest analysis of a routing protocol is in its 
>operational 
>>>>> environment. But to use this analysis as the basis of a
>>> decision for
>>>>> use of a protocol in a new environment is not so 
>reasonable. If you 
>>>>> want to show that none of today's protocols has been
>>> designed for use
>>>>> in the ROLL environment, then I don't suppose anyone will be 
>>>>> surprised. However, what we are really interested in is 
>whether any 
>>>>> of the existing protocols is suitable for adaptation for
>>> use in ROLL,
>>>>> whether the those adaptations would be contrived and
>>> technically hard
>>>>> (or flaky), and whether it would be more efficient to 
>design a new 
>>>>> protocol.
>>>>> 
>>>>> For an example (and I'm not proposing this as the solution
>>> for ROLL),
>>>>> an IGP could easily be adapted to flood on only certain links, to 
>>>>> discard certain LSAs, and to build a FIB according to
>>> specific rules. 
>>>>> This would not be a large change to the protocol, 
>although it would 
>>>>> obviously not be interoperable.
>>>>> 
>>>>> To discard from consideration any protocol based on its
>>> behavior in a
>>>>> certain environment without setting it in the context of your 
>>>>> forwarding paradigm and without examining the potential 
>to adapt a 
>>>>> protocol to that environment is wrong. If all you wanted 
>to do was 
>>>>> show that no current variant of any existing routing protocol is 
>>>>> immediately applicable to ROLL, then that would be easy and
>>> would not
>>>>> be a surprise. But to imply that protocols are not open for 
>>>>> adaptation is more serious.
>>>>> 
>>>>> This is not to say that inventing a new protocol would be 
>wrong or 
>>>>> not fun.
>>>>> Only that your reasons for discarding protocols are 
>poorly founded.
>>>>> You have focused on the operation of the routing 
>protocol, not the 
>>>>> purpose of the routing protocol. To give a better 
>understanding of 
>>>>> why you are discarding a protocol, you must show what you want to 
>>>>> achieve as your forwarding paradigm. The requirements
>>> documents make
>>>>> some start at this.
>>>>> For example, draft-ietf-roll-urban-routing-reqs talks about:
>>>>> - routing to minimise power usage
>>>>> - routing to consider node and link capabilities
>>>>> - routing protocol to scale within CPU, memory and power limits
>>>>> - routing according to different metrics (latency is cited)
>>>>> 
>>>>> Such considerations are a good start to understanding the
>>> forwarding
>>>>> paradigm in ROLL, but would not be good enough to use to
>>> devise a new
>>>>> routing protocol, so I don't see how they can be good enough to 
>>>>> determine whether an existing protocol should be discarded,
>>> modified,
>>>>> or used.
>>>>> 
>>>>> =============
>>>>> 
>>>>> More specific comments on the draft follow.
>>>>> 
>>>>> ---
>>>>> 
>>>>> Do we have a commitment from the WG that any new protocol 
>developed 
>>>>> will be held to the same standards? That is, that the new 
>protocol 
>>>>> MUST achieve a "pass" in very column of the table in
>>> section 4. Or is
>>>>> there scope for pragmatism allowing trade-offs in the new 
>protocol 
>>>>> such that in some environments it achieves a pass in some 
>columns, 
>>>>> and in other environments it achieves a pass in other columns.
>>>>> 
>>>>> Maybe you could add this as a statement in the Abstract and 
>>>>> Introduction
>>>>> 
>>>>> ---
>>>>> 
>>>>> Why do you include the requirements language boilerplate? I don't 
>>>>> think you use (or should use) such language in this document.
>>>>> 
>>>>> ---
>>>>> 
>>>>> Section 1
>>>>> 
>>>>> Can you strip out terms not used in the document?
>>>>> 
>>>>> ---
>>>>> 
>>>>> Section 2
>>>>> 
>>>>> You quote CPU power in MHz. Although that is the practical
>>> electronic
>>>>> limit, maybe MIPS would be a better measure.
>>>>> 
>>>>> ---
>>>>> 
>>>>> Section 3 para 2
>>>>> 
>>>>> "If a protocol cannot meet even these minimalist criteria..."
>>>>> I think your use of "cannot" is correct in the context of the 
>>>>> sentence, but I think your I-D examines "does not"
>>>>> 
>>>>> "...is unlikely to be good candidate..."
>>>>> Too much prevarication!
>>>>> 
>>>>> ---
>>>>> 
>>>>> Section 3 para 3
>>>>> 
>>>>> "...the protocol does not appear to contain sufficient
>>> flexibility..."
>>>>> The problem with this is that it is very mushy!
>>>>> It is OK to discard a protocol that is not flexible enough
>>> to handle
>>>>> your requirements. It is not OK to discard a protocol because you 
>>>>> don't appear to know how to extend it.
>>>>> 
>>>>> A example comes in the somewhat contentious table in section 4
>>>>> :-) Here, for OSPF, you say that there is a "fail" for
>>> conveying node
>>>>> costs.
>>>>> But there is already LSA available for carrying node 
>capabilities, 
>>>>> and there are opaque LSAs available for carrying additional 
>>>>> "unconventional"
>>>>> information.
>>>>> 
>>>>> All this sort of ties to my main point. Of course, the protocols 
>>>>> don't do exactly what you want already, but a more thorough
>>> survey is
>>>>> needed if you what to use this I-D as the reason for excluding 
>>>>> protocols.
>>>>> 
>>>>> ---
>>>>> 
>>>>> Section 3.2 para 1
>>>>> "...with size ranging from a minimum..."
>>>>> I think you mean "...with maximum size ranging from a minimum..."
>>>>> 
>>>>> "very large networks"
>>>>> Can you de-fluff this? Some people might think that 250
>>> nodes is very
>>>>> large
>>>>> ;-)
>>>>> 
>>>>> "network depths"
>>>>> Would be worth including your definition here.
>>>>> 
>>>>> --
>>>>> 
>>>>> Section 3.2 para 1
>>>>> 
>>>>> Is every network node a router?
>>>>> draft-ietf-roll-urban-routing-reqs says "Sensor nodes are
>>> capable of
>>>>> forwarding data." If every node is a router and 
>participates in the 
>>>>> routing protocol, this creates a very different environment from 
>>>>> saying that most sensors are hosts, and some are routers. I 
>>>>> appreciate that "capable" does not imply "do".
>>>>> 
>>>>> ---
>>>>> 
>>>>> Associated with the previous point, I think you might spend
>>> a little
>>>>> more time discussing the definition of a link in ROLL. It 
>is clear 
>>>>> that in a wireless n/w a link may exist between any two nodes in 
>>>>> range.
>>>>> If that is
>>>>> what you mean, then it would help to make it clear. On the other 
>>>>> hand, "link" could be defined as an active neighbor relationship 
>>>>> between a pair of routers. Or something else.
>>>>> 
>>>>> This becomes important as we try to understand how the
>>> protocol must
>>>>> scale, and what it is supposed to do.
>>>>> 
>>>>> I presume that the concept of "parallel links" between 
>neighbors is 
>>>>> going to have no meaning at the moment. That is, you use only one 
>>>>> frequency in any network. Maybe I presume wrong, in which 
>case, you 
>>>>> need to refine the definition of "network density" in section 3.1.
>>>>> 
>>>>> ---
>>>>> 
>>>>> Section 3.2 para 1
>>>>> Final sentence is a bit mangled.
>>>>> 
>>>>> ---
>>>>> 
>>>>> Section 3.2 para 2
>>>>> 
>>>>> I can see why scaling with O(L) may be an issue, but it may
>>> depend on
>>>>> the definitions of links and routers. Also it may depend on what 
>>>>> magnitude you expect for L. Perhaps you could give some
>>> ball-parks in
>>>>> the previous paragraph as you do for N and D. Without that, it is 
>>>>> hard to justify the claim that scaling with O(L) is a problem.
>>>>> 
>>>>> ---
>>>>> 
>>>>> Section 3.3
>>>>> 
>>>>> Can you add SINR to your terminology?
>>>>> 
>>>>> "...not trigger unnecessary responses..."
>>>>> I think that this is subjective and unhelpful. Can you 
>rephrase to 
>>>>> capture a quantifiable requirement?
>>>>> 
>>>>> s/link changes to propagate across/link changes to be propagated 
>>>>> across/
>>>>> 
>>>>> s/O(l)/O(L)/
>>>>> 
>>>>> ---
>>>>> 
>>>>> Section 3.3 final para
>>>>> 
>>>>> You have "transmissions", "broadcast", and "route updates".
>>>>> Can you use a
>>>>> consistent term? It may be less pretty English, but it would be a 
>>>>> better way to avoid accusations of bias :-)
>>>>> 
>>>>> Perhaps...
>>>>> More precisely, loss responses that require transmissions
>>> within the
>>>>> network of O(N) fail, while those that are limited to 
>O(L) or O(D) 
>>>>> pass.
>>>>> 
>>>>> ---
>>>>> 
>>>>> Section 3.4 para 1
>>>>> 
>>>>> "In terms of routing structure, any proposed L2N routing protocol 
>>>>> ought to support the autonomous organization and
>>> configuration of the
>>>>> network at the lowest possible energy cost."
>>>>> 
>>>>> Why "L2N"? I thought "Networks of low power wireless devices 
>>>>> introduce novel IP routing issues."
>>>>> 
>>>>> "ought" is not a recognized RFC 2119 word :-)
>>>>> 
>>>>> I think "at the lowest possible energy cost" is a statement
>>> that this
>>>>> requirement trumps all others. Is that what you mean?
>>>>> 
>>>>> I'm not convinced by the absolute statement you make here.
>>>>> Maybe, this is a
>>>>> question I should take to the requirements documents. Consider 
>>>>> routing protocol A that is slightly more (say 5%) power-consuming 
>>>>> than routing protocol B. But suppose protocol A gives rise
>>> to a data
>>>>> forwarding solution that is 50% more power-efficient?
>>>>> 
>>>>> ---
>>>>> 
>>>>> Section 3.4 para 2
>>>>> 
>>>>> "As low-power wireless networks can have very low data rates, 
>>>>> protocols which require a minimum control packet rate can have 
>>>>> unbounded control overhead."
>>>>> 
>>>>> I know what you mean, but I had to parse several times. 
>How about...
>>>>> 
>>>>> The control overhead is the ratio of control data to
>>> payload data. A
>>>>> high control overhead indicates that precious network resources 
>>>>> (bandwidth, power, or CPU) are being consumed by the control 
>>>>> protocols instead of being used to transmit data. Where
>>> payload data
>>>>> rates are very low (as is often the case in low-power wireless
>>>>> networks) the control overhead can become unbounded for protocols 
>>>>> that require some non-zero background control packet rate.
>>>>> 
>>>>> ---
>>>>> 
>>>>> Section 3.4 para 2
>>>>> 
>>>>> s/never meet the condition can be forced/never meet the condition 
>>>>> could be forced/
>>>>> 
>>>>> ---
>>>>> 
>>>>> Section 4 para 3
>>>>> 
>>>>> "multiple layer 2 hops away"
>>>>> Really?
>>>>> Again, I thought we were building an IP routing protocol. If your 
>>>>> requirement is layer 2 routing, you need to make that
>>> visible up front.
>>>>> But, I can see why you are interested in L2 hops as well 
>as L3 hops 
>>>>> since they all consume power.
>>>>> 
>>>>> This comes back to the question about whether all nodes are
>>> routers. 
>>>>> Perhaps some repeaters are not routers?
>>>>> 
>>>>> But can't we actually factor the L2 hops into the 
>definition of the
>>>>> L3 hop?
>>>>> 
>>>>> ---
>>>>> 
>>>>> Section 4 para 3
>>>>> 
>>>>> "...nodes may only advertise..."
>>>>> This sounds prohibitive!
>>>>> 
>>>>> ---
>>>>> 
>>>>> Section 4 para 4
>>>>> 
>>>>> "Neighbor discovery is a critical component of any routing
>>> protocol."
>>>>> I think I disagree.
>>>>> It is clear that routing protocols need to know their 
>neighbors. It 
>>>>> is not clear that this requires that the discovery be part of the 
>>>>> routing protocol.
>>>>> 
>>>>> Later you have:
>>>>> "...key component of many protocols."
>>>>> This is less strong than the initial sentence.
>>>>> 
>>>>> ---
>>>>> 
>>>>> Section 4
>>>>> 
>>>>> "Protocols Today"
>>>>> 
>>>>> Is this a section 4.1 headers?
>>>>> 
>>>>> ---
>>>>> 
>>>>> Section 4 "Protocols Today" para 2
>>>>> 
>>>>> I don't think the MPLS TE example is a good one. It is
>>> certainly not
>>>>> correct that the TED has to be fully distributed around 
>the network.
>>>>> There are some very good examples of where "stub TE areas" do not 
>>>>> need to know the TE information for the whole of the rest of the 
>>>>> network.
>>>>> 
>>>>> ---
>>>>> 
>>>>> Section 4 Table
>>>>> 
>>>>> I'm prepared to bet that a lot of people will be upset by
>>> the use of
>>>>> "fail"
>>>>> for their favorite protocols. It would seem that "?" is more 
>>>>> appropriate in many cells.
>>>>> 
>>>>> ---
>>>>> 
>>>>> Section 5.1
>>>>> Is it worth replacing "OSPF" with "OSPF or IS-IS"?
>>>>> 
>>>>> ---
>>>>> 
>>>>> Section 14.
>>>>> Your three ROLL requirements drafts are Normative
>>> References, I think.
>>>>> 
>>>>> _______________________________________________
>>>>> Roll mailing list
>>>>> Roll@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/roll
>>>>> 
>>>> _______________________________________________
>>>> Roll mailing list
>>>> Roll@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/roll
>>> 
>>> 
>
>
_______________________________________________
Roll mailing list
Roll@ietf.org
https://www.ietf.org/mailman/listinfo/roll


From roll-bounces@ietf.org  Wed Aug 27 10:05:51 2008
Return-Path: <roll-bounces@ietf.org>
X-Original-To: roll-archive@ietf.org
Delivered-To: ietfarch-roll-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id D801B3A6AC3;
	Wed, 27 Aug 2008 10:05:51 -0700 (PDT)
X-Original-To: roll@core3.amsl.com
Delivered-To: roll@core3.amsl.com
Received: from localhost (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 780C03A6AC3
	for <roll@core3.amsl.com>; Wed, 27 Aug 2008 10:05:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.587
X-Spam-Level: 
X-Spam-Status: No, score=-4.587 tagged_above=-999 required=5
	tests=[AWL=-0.287, BAYES_00=-2.599, MANGLED_TOOL=2.3,
	RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32])
	by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id lgFdmFWjRlny for <roll@core3.amsl.com>;
	Wed, 27 Aug 2008 10:05:45 -0700 (PDT)
Received: from rtp-iport-2.cisco.com (rtp-iport-2.cisco.com [64.102.122.149])
	by core3.amsl.com (Postfix) with ESMTP id 265CB3A6868
	for <roll@ietf.org>; Wed, 27 Aug 2008 10:05:45 -0700 (PDT)
X-IronPort-AV: E=Sophos;i="4.32,279,1217808000"; d="scan'208";a="18885580"
Received: from rtp-dkim-2.cisco.com ([64.102.121.159])
	by rtp-iport-2.cisco.com with ESMTP; 27 Aug 2008 17:05:29 +0000
Received: from rtp-core-1.cisco.com (rtp-core-1.cisco.com [64.102.124.12])
	by rtp-dkim-2.cisco.com (8.12.11/8.12.11) with ESMTP id m7RH5TNX027362; 
	Wed, 27 Aug 2008 13:05:29 -0400
Received: from xbh-rtp-201.amer.cisco.com (xbh-rtp-201.cisco.com
	[64.102.31.12])
	by rtp-core-1.cisco.com (8.13.8/8.13.8) with ESMTP id m7RH5T80027317;
	Wed, 27 Aug 2008 17:05:29 GMT
Received: from xmb-rtp-213.amer.cisco.com ([64.102.31.112]) by
	xbh-rtp-201.amer.cisco.com with Microsoft SMTPSVC(6.0.3790.1830); 
	Wed, 27 Aug 2008 13:05:29 -0400
Received: from 10.55.206.229 ([10.55.206.229]) by xmb-rtp-213.amer.cisco.com
	([64.102.31.112]) with Microsoft Exchange Server HTTP-DAV ; 
	Wed, 27 Aug 2008 17:05:29 +0000
User-Agent: Microsoft-Entourage/12.12.0.080729
Date: Wed, 27 Aug 2008 19:05:22 +0200
From: JP Vasseur <jvasseur@cisco.com>
To: "Drake, John E" <John.E.Drake2@boeing.com>,
	Adrian Farrel <adrian@olddog.co.uk>, <roll@ietf.org>
Message-ID: <C4DB55F2.50B24%jvasseur@cisco.com>
Thread-Topic: [Roll] draft-ietf-roll-protocols-survey-00
Thread-Index: AckF4uWWv+jCr8q7RKKuNS7geV3eIgA6l4jAAFZXU+0ACvR8MAAENIb7AACOAHAAAGaHlQ==
In-Reply-To: <51661468CBD1354294533DA79E85955A0109FE32@XCH-SW-5V2.sw.nos.boeing.com>
Mime-version: 1.0
X-OriginalArrivalTime: 27 Aug 2008 17:05:29.0324 (UTC)
	FILETIME=[1B86C2C0:01C90867]
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; l=17253; t=1219856729;
	x=1220720729; c=relaxed/simple; s=rtpdkim2001;
	h=Content-Type:From:Subject:Content-Transfer-Encoding:MIME-Version;
	d=cisco.com; i=jvasseur@cisco.com;
	z=From:=20JP=20Vasseur=20<jvasseur@cisco.com>
	|Subject:=20Re=3A=20[Roll]=20draft-ietf-roll-protocols-surv
	ey-00 |Sender:=20
	|To:=20=22Drake,=20John=20E=22=20<John.E.Drake2@boeing.com>
	,=0A=20=20=20=20=20=20=20=20Adrian=20Farrel=20<adrian@olddog
	.co.uk>,=20<roll@ietf.org>;
	bh=C9kckedFD8wWlT9HyoRr7WFSS7k3KVekFx+cbTZa2qI=;
	b=DM95Ik/q3ErC6Xj3Y9mkxSw+J2+1OuTEq+wCJZtoWz30RG3TtxY2/7Cnkw
	VryxsvqcGAZ1j6eg//UQPOK7IOa7Ri44HQBjAJX/kHfOPi8Hy+6z0ffdIXEy
	dRcBsSBFXa;
Authentication-Results: rtp-dkim-2; header.From=jvasseur@cisco.com; dkim=pass (
	sig from cisco.com/rtpdkim2001 verified; ); 
Subject: Re: [Roll] draft-ietf-roll-protocols-survey-00
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/roll>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: roll-bounces@ietf.org
Errors-To: roll-bounces@ietf.org

John,


On 8/27/08 6:57 PM, "Drake, John E" <John.E.Drake2@boeing.com> wrote:

> Comment inline 
> 
>> -----Original Message-----
>> From: JP Vasseur [mailto:jvasseur@cisco.com]
>> Sent: Wednesday, August 27, 2008 9:38 AM
>> To: Drake, John E; Adrian Farrel; roll@ietf.org
>> Subject: Re: [Roll] draft-ietf-roll-protocols-survey-00
>> 
>> Hi John,
>> 
>> 
>> On 8/27/08 4:45 PM, "Drake, John E" <John.E.Drake2@boeing.com> wrote:
>> 
>>> JP,
>>> 
>>> I thought that was exactly Adrian's point.
>> 
>> Ok let's have him express his opinion.
>> 
>>> 
>>> If you evaluate a bunch of routing protocols as they exist
>> today in a 
>>> new operational environment and conclude that none of them are
>>> appropriate, then you have no choice but to conclude that
>> you need to 
>>> invent at least one, but probably many, new routing protocols.  It's
>>> not like this hasn't been done before.
>>> 
>>> I took Adrian's note to say that doing this is not
>> sufficient and that
>>> what needed to be done was to characterize the new operational
>>> environment, propose changes needed in each routing protocol to
>>> address the new operational environment, and then evaluate
>> these changes.
>>> 
>> 
>> John, I fully respect your opinion. Feel free to propose these
>> changes in light of the routing requirements expressed in the
>> related WG document.
>> Please make sure to fully understand them though, these
>> networks have fairly unique characteristics that do require
>> significant background.
> 
> JD:  I would think this is the responsibility of the authors who are
> requesting that their I-D be adopted by the working group.

This is already a WG document and there was a consensus within the WG.

JP.

> 
>> 
>> JP.
>> 
>>> Thanks,
>>> 
>>> John
>>> 
>>>> -----Original Message-----
>>>> From: JP Vasseur [mailto:jvasseur@cisco.com]
>>>> Sent: Wednesday, August 27, 2008 2:24 AM
>>>> To: Drake, John E; Adrian Farrel; roll@ietf.org
>>>> Subject: Re: [Roll] draft-ietf-roll-protocols-survey-00
>>>> 
>>>> John,
>>>> 
>>>> I do not think that this was Adrian's point. Your feed-back is more
>>>> than welcome but please argue a bit more ...
>>>> 
>>>> Thanks.
>>>> 
>>>> JP.
>>>> 
>>>> 
>>>> On 8/25/08 6:13 PM, "Drake, John E"
>> <John.E.Drake2@boeing.com> wrote:
>>>> 
>>>>> Adrian,
>>>>> 
>>>>> An excellent note - I agree completely.  We need fewer routing
>>>>> protocols, not more.
>>>>> 
>>>>> Thanks,
>>>>> 
>>>>> John
>>>>> 
>>>>>> -----Original Message-----
>>>>>> From: Adrian Farrel [mailto:adrian@olddog.co.uk]
>>>>>> Sent: Sunday, August 24, 2008 5:14 AM
>>>>>> To: roll@ietf.org
>>>>>> Subject: [Roll] draft-ietf-roll-protocols-survey-00
>>>>>> 
>>>>>> Hi,
>>>>>> 
>>>>>> As one of the two tourists who raised a hand in Dublin to express
>>>>>> uneasiness about this I-D becoming a WG draft, I thought I should
>>>>>> write a note about my concerns.
>>>>>> 
>>>>>> I should caveat this by saying that I do appreciate the
>>>> need for this
>>>>>> work, and that the author-team will, I'm sure, do a fine job at
>>>>>> delivering what the working group needs. My concerns were
>> much more 
>>>>>> about getting the direction of the I-D right before
>>>> accepting it as I
>>>>>> think it is often harder to recast an I-D once it is within the
>>>>>> working group.
>>>>>> 
>>>>>> Below, please find my major discussion point. I have also done a
>>>>>> review of the draft and found a bunch of issues/questions of more
>>>>>> minor importance.
>>>>>> 
>>>>>> Regards,
>>>>>> Adrian
>>>>>> 
>>>>>> ===
>>>>>> 
>>>>>> The analysis of the routing protocols is predicated on what
>>>> they are
>>>>>> currently used for. To some extent this is reasonable
>>>>>> - the easiest analysis of a routing protocol is in its
>> operational 
>>>>>> environment. But to use this analysis as the basis of a
>>>> decision for
>>>>>> use of a protocol in a new environment is not so
>> reasonable. If you
>>>>>> want to show that none of today's protocols has been
>>>> designed for use
>>>>>> in the ROLL environment, then I don't suppose anyone will be
>>>>>> surprised. However, what we are really interested in is
>> whether any 
>>>>>> of the existing protocols is suitable for adaptation for
>>>> use in ROLL,
>>>>>> whether the those adaptations would be contrived and
>>>> technically hard
>>>>>> (or flaky), and whether it would be more efficient to
>> design a new 
>>>>>> protocol.
>>>>>> 
>>>>>> For an example (and I'm not proposing this as the solution
>>>> for ROLL),
>>>>>> an IGP could easily be adapted to flood on only certain links, to
>>>>>> discard certain LSAs, and to build a FIB according to
>>>> specific rules.
>>>>>> This would not be a large change to the protocol,
>> although it would
>>>>>> obviously not be interoperable.
>>>>>> 
>>>>>> To discard from consideration any protocol based on its
>>>> behavior in a
>>>>>> certain environment without setting it in the context of your
>>>>>> forwarding paradigm and without examining the potential
>> to adapt a 
>>>>>> protocol to that environment is wrong. If all you wanted
>> to do was 
>>>>>> show that no current variant of any existing routing protocol is
>>>>>> immediately applicable to ROLL, then that would be easy and
>>>> would not
>>>>>> be a surprise. But to imply that protocols are not open for
>>>>>> adaptation is more serious.
>>>>>> 
>>>>>> This is not to say that inventing a new protocol would be
>> wrong or 
>>>>>> not fun.
>>>>>> Only that your reasons for discarding protocols are
>> poorly founded.
>>>>>> You have focused on the operation of the routing
>> protocol, not the
>>>>>> purpose of the routing protocol. To give a better
>> understanding of
>>>>>> why you are discarding a protocol, you must show what you want to
>>>>>> achieve as your forwarding paradigm. The requirements
>>>> documents make
>>>>>> some start at this.
>>>>>> For example, draft-ietf-roll-urban-routing-reqs talks about:
>>>>>> - routing to minimise power usage
>>>>>> - routing to consider node and link capabilities
>>>>>> - routing protocol to scale within CPU, memory and power limits
>>>>>> - routing according to different metrics (latency is cited)
>>>>>> 
>>>>>> Such considerations are a good start to understanding the
>>>> forwarding
>>>>>> paradigm in ROLL, but would not be good enough to use to
>>>> devise a new
>>>>>> routing protocol, so I don't see how they can be good enough to
>>>>>> determine whether an existing protocol should be discarded,
>>>> modified,
>>>>>> or used.
>>>>>> 
>>>>>> =============
>>>>>> 
>>>>>> More specific comments on the draft follow.
>>>>>> 
>>>>>> ---
>>>>>> 
>>>>>> Do we have a commitment from the WG that any new protocol
>> developed 
>>>>>> will be held to the same standards? That is, that the new
>> protocol 
>>>>>> MUST achieve a "pass" in very column of the table in
>>>> section 4. Or is
>>>>>> there scope for pragmatism allowing trade-offs in the new
>> protocol 
>>>>>> such that in some environments it achieves a pass in some
>> columns, 
>>>>>> and in other environments it achieves a pass in other columns.
>>>>>> 
>>>>>> Maybe you could add this as a statement in the Abstract and
>>>>>> Introduction
>>>>>> 
>>>>>> ---
>>>>>> 
>>>>>> Why do you include the requirements language boilerplate? I don't
>>>>>> think you use (or should use) such language in this document.
>>>>>> 
>>>>>> ---
>>>>>> 
>>>>>> Section 1
>>>>>> 
>>>>>> Can you strip out terms not used in the document?
>>>>>> 
>>>>>> ---
>>>>>> 
>>>>>> Section 2
>>>>>> 
>>>>>> You quote CPU power in MHz. Although that is the practical
>>>> electronic
>>>>>> limit, maybe MIPS would be a better measure.
>>>>>> 
>>>>>> ---
>>>>>> 
>>>>>> Section 3 para 2
>>>>>> 
>>>>>> "If a protocol cannot meet even these minimalist criteria..."
>>>>>> I think your use of "cannot" is correct in the context of the
>>>>>> sentence, but I think your I-D examines "does not"
>>>>>> 
>>>>>> "...is unlikely to be good candidate..."
>>>>>> Too much prevarication!
>>>>>> 
>>>>>> ---
>>>>>> 
>>>>>> Section 3 para 3
>>>>>> 
>>>>>> "...the protocol does not appear to contain sufficient
>>>> flexibility..."
>>>>>> The problem with this is that it is very mushy!
>>>>>> It is OK to discard a protocol that is not flexible enough
>>>> to handle
>>>>>> your requirements. It is not OK to discard a protocol because you
>>>>>> don't appear to know how to extend it.
>>>>>> 
>>>>>> A example comes in the somewhat contentious table in section 4
>>>>>> :-) Here, for OSPF, you say that there is a "fail" for
>>>> conveying node
>>>>>> costs.
>>>>>> But there is already LSA available for carrying node
>> capabilities, 
>>>>>> and there are opaque LSAs available for carrying additional
>>>>>> "unconventional"
>>>>>> information.
>>>>>> 
>>>>>> All this sort of ties to my main point. Of course, the protocols
>>>>>> don't do exactly what you want already, but a more thorough
>>>> survey is
>>>>>> needed if you what to use this I-D as the reason for excluding
>>>>>> protocols.
>>>>>> 
>>>>>> ---
>>>>>> 
>>>>>> Section 3.2 para 1
>>>>>> "...with size ranging from a minimum..."
>>>>>> I think you mean "...with maximum size ranging from a minimum..."
>>>>>> 
>>>>>> "very large networks"
>>>>>> Can you de-fluff this? Some people might think that 250
>>>> nodes is very
>>>>>> large
>>>>>> ;-)
>>>>>> 
>>>>>> "network depths"
>>>>>> Would be worth including your definition here.
>>>>>> 
>>>>>> --
>>>>>> 
>>>>>> Section 3.2 para 1
>>>>>> 
>>>>>> Is every network node a router?
>>>>>> draft-ietf-roll-urban-routing-reqs says "Sensor nodes are
>>>> capable of
>>>>>> forwarding data." If every node is a router and
>> participates in the
>>>>>> routing protocol, this creates a very different environment from
>>>>>> saying that most sensors are hosts, and some are routers. I
>>>>>> appreciate that "capable" does not imply "do".
>>>>>> 
>>>>>> ---
>>>>>> 
>>>>>> Associated with the previous point, I think you might spend
>>>> a little
>>>>>> more time discussing the definition of a link in ROLL. It
>> is clear 
>>>>>> that in a wireless n/w a link may exist between any two nodes in
>>>>>> range.
>>>>>> If that is
>>>>>> what you mean, then it would help to make it clear. On the other
>>>>>> hand, "link" could be defined as an active neighbor relationship
>>>>>> between a pair of routers. Or something else.
>>>>>> 
>>>>>> This becomes important as we try to understand how the
>>>> protocol must
>>>>>> scale, and what it is supposed to do.
>>>>>> 
>>>>>> I presume that the concept of "parallel links" between
>> neighbors is 
>>>>>> going to have no meaning at the moment. That is, you use only one
>>>>>> frequency in any network. Maybe I presume wrong, in which
>> case, you 
>>>>>> need to refine the definition of "network density" in section 3.1.
>>>>>> 
>>>>>> ---
>>>>>> 
>>>>>> Section 3.2 para 1
>>>>>> Final sentence is a bit mangled.
>>>>>> 
>>>>>> ---
>>>>>> 
>>>>>> Section 3.2 para 2
>>>>>> 
>>>>>> I can see why scaling with O(L) may be an issue, but it may
>>>> depend on
>>>>>> the definitions of links and routers. Also it may depend on what
>>>>>> magnitude you expect for L. Perhaps you could give some
>>>> ball-parks in
>>>>>> the previous paragraph as you do for N and D. Without that, it is
>>>>>> hard to justify the claim that scaling with O(L) is a problem.
>>>>>> 
>>>>>> ---
>>>>>> 
>>>>>> Section 3.3
>>>>>> 
>>>>>> Can you add SINR to your terminology?
>>>>>> 
>>>>>> "...not trigger unnecessary responses..."
>>>>>> I think that this is subjective and unhelpful. Can you
>> rephrase to 
>>>>>> capture a quantifiable requirement?
>>>>>> 
>>>>>> s/link changes to propagate across/link changes to be propagated
>>>>>> across/
>>>>>> 
>>>>>> s/O(l)/O(L)/
>>>>>> 
>>>>>> ---
>>>>>> 
>>>>>> Section 3.3 final para
>>>>>> 
>>>>>> You have "transmissions", "broadcast", and "route updates".
>>>>>> Can you use a
>>>>>> consistent term? It may be less pretty English, but it would be a
>>>>>> better way to avoid accusations of bias :-)
>>>>>> 
>>>>>> Perhaps...
>>>>>> More precisely, loss responses that require transmissions
>>>> within the
>>>>>> network of O(N) fail, while those that are limited to
>> O(L) or O(D) 
>>>>>> pass.
>>>>>> 
>>>>>> ---
>>>>>> 
>>>>>> Section 3.4 para 1
>>>>>> 
>>>>>> "In terms of routing structure, any proposed L2N routing protocol
>>>>>> ought to support the autonomous organization and
>>>> configuration of the
>>>>>> network at the lowest possible energy cost."
>>>>>> 
>>>>>> Why "L2N"? I thought "Networks of low power wireless devices
>>>>>> introduce novel IP routing issues."
>>>>>> 
>>>>>> "ought" is not a recognized RFC 2119 word :-)
>>>>>> 
>>>>>> I think "at the lowest possible energy cost" is a statement
>>>> that this
>>>>>> requirement trumps all others. Is that what you mean?
>>>>>> 
>>>>>> I'm not convinced by the absolute statement you make here.
>>>>>> Maybe, this is a
>>>>>> question I should take to the requirements documents. Consider
>>>>>> routing protocol A that is slightly more (say 5%) power-consuming
>>>>>> than routing protocol B. But suppose protocol A gives rise
>>>> to a data
>>>>>> forwarding solution that is 50% more power-efficient?
>>>>>> 
>>>>>> ---
>>>>>> 
>>>>>> Section 3.4 para 2
>>>>>> 
>>>>>> "As low-power wireless networks can have very low data rates,
>>>>>> protocols which require a minimum control packet rate can have
>>>>>> unbounded control overhead."
>>>>>> 
>>>>>> I know what you mean, but I had to parse several times.
>> How about...
>>>>>> 
>>>>>> The control overhead is the ratio of control data to
>>>> payload data. A
>>>>>> high control overhead indicates that precious network resources
>>>>>> (bandwidth, power, or CPU) are being consumed by the control
>>>>>> protocols instead of being used to transmit data. Where
>>>> payload data
>>>>>> rates are very low (as is often the case in low-power wireless
>>>>>> networks) the control overhead can become unbounded for protocols
>>>>>> that require some non-zero background control packet rate.
>>>>>> 
>>>>>> ---
>>>>>> 
>>>>>> Section 3.4 para 2
>>>>>> 
>>>>>> s/never meet the condition can be forced/never meet the condition
>>>>>> could be forced/
>>>>>> 
>>>>>> ---
>>>>>> 
>>>>>> Section 4 para 3
>>>>>> 
>>>>>> "multiple layer 2 hops away"
>>>>>> Really?
>>>>>> Again, I thought we were building an IP routing protocol. If your
>>>>>> requirement is layer 2 routing, you need to make that
>>>> visible up front.
>>>>>> But, I can see why you are interested in L2 hops as well
>> as L3 hops 
>>>>>> since they all consume power.
>>>>>> 
>>>>>> This comes back to the question about whether all nodes are
>>>> routers. 
>>>>>> Perhaps some repeaters are not routers?
>>>>>> 
>>>>>> But can't we actually factor the L2 hops into the
>> definition of the
>>>>>> L3 hop?
>>>>>> 
>>>>>> ---
>>>>>> 
>>>>>> Section 4 para 3
>>>>>> 
>>>>>> "...nodes may only advertise..."
>>>>>> This sounds prohibitive!
>>>>>> 
>>>>>> ---
>>>>>> 
>>>>>> Section 4 para 4
>>>>>> 
>>>>>> "Neighbor discovery is a critical component of any routing
>>>> protocol."
>>>>>> I think I disagree.
>>>>>> It is clear that routing protocols need to know their
>> neighbors. It 
>>>>>> is not clear that this requires that the discovery be part of the
>>>>>> routing protocol.
>>>>>> 
>>>>>> Later you have:
>>>>>> "...key component of many protocols."
>>>>>> This is less strong than the initial sentence.
>>>>>> 
>>>>>> ---
>>>>>> 
>>>>>> Section 4
>>>>>> 
>>>>>> "Protocols Today"
>>>>>> 
>>>>>> Is this a section 4.1 headers?
>>>>>> 
>>>>>> ---
>>>>>> 
>>>>>> Section 4 "Protocols Today" para 2
>>>>>> 
>>>>>> I don't think the MPLS TE example is a good one. It is
>>>> certainly not
>>>>>> correct that the TED has to be fully distributed around
>> the network.
>>>>>> There are some very good examples of where "stub TE areas" do not
>>>>>> need to know the TE information for the whole of the rest of the
>>>>>> network.
>>>>>> 
>>>>>> ---
>>>>>> 
>>>>>> Section 4 Table
>>>>>> 
>>>>>> I'm prepared to bet that a lot of people will be upset by
>>>> the use of
>>>>>> "fail"
>>>>>> for their favorite protocols. It would seem that "?" is more
>>>>>> appropriate in many cells.
>>>>>> 
>>>>>> ---
>>>>>> 
>>>>>> Section 5.1
>>>>>> Is it worth replacing "OSPF" with "OSPF or IS-IS"?
>>>>>> 
>>>>>> ---
>>>>>> 
>>>>>> Section 14.
>>>>>> Your three ROLL requirements drafts are Normative
>>>> References, I think.
>>>>>> 
>>>>>> _______________________________________________
>>>>>> Roll mailing list
>>>>>> Roll@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/roll
>>>>>> 
>>>>> _______________________________________________
>>>>> Roll mailing list
>>>>> Roll@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/roll
>>>> 
>>>> 
>> 
>> 

_______________________________________________
Roll mailing list
Roll@ietf.org
https://www.ietf.org/mailman/listinfo/roll


From roll-bounces@ietf.org  Wed Aug 27 10:48:19 2008
Return-Path: <roll-bounces@ietf.org>
X-Original-To: roll-archive@ietf.org
Delivered-To: ietfarch-roll-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id D61A13A6C36;
	Wed, 27 Aug 2008 10:48:19 -0700 (PDT)
X-Original-To: roll@core3.amsl.com
Delivered-To: roll@core3.amsl.com
Received: from localhost (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id E4DAD3A6974
	for <roll@core3.amsl.com>; Wed, 27 Aug 2008 10:48:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.052
X-Spam-Level: 
X-Spam-Status: No, score=-5.052 tagged_above=-999 required=5
	tests=[AWL=-0.753, BAYES_00=-2.599, MANGLED_TOOL=2.3,
	RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32])
	by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id vwcFJb44FKc1 for <roll@core3.amsl.com>;
	Wed, 27 Aug 2008 10:48:15 -0700 (PDT)
Received: from slb-smtpout-01.boeing.com (slb-smtpout-01.boeing.com
	[130.76.64.48]) by core3.amsl.com (Postfix) with ESMTP id 7424D3A6C36
	for <roll@ietf.org>; Wed, 27 Aug 2008 10:48:15 -0700 (PDT)
Received: from stl-av-01.boeing.com (stl-av-01.boeing.com [192.76.190.6])
	by slb-smtpout-01.ns.cs.boeing.com (8.14.0/8.14.0/8.14.0/SMTPOUT) with
	ESMTP id m7RHlcxh019479
	(version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL);
	Wed, 27 Aug 2008 10:47:39 -0700 (PDT)
Received: from stl-av-01.boeing.com (localhost [127.0.0.1])
	by stl-av-01.boeing.com (8.14.0/8.14.0/DOWNSTREAM_RELAY) with ESMTP id
	m7RHlcL4009899; Wed, 27 Aug 2008 12:47:38 -0500 (CDT)
Received: from xch-swbh-11.sw.nos.boeing.com (xch-swbh-11.sw.nos.boeing.com
	[129.172.192.157])
	by stl-av-01.boeing.com (8.14.0/8.14.0/UPSTREAM_RELAY) with ESMTP id
	m7RHlaoh009798; Wed, 27 Aug 2008 12:47:38 -0500 (CDT)
Received: from XCH-SW-5V2.sw.nos.boeing.com ([129.172.193.50]) by
	xch-swbh-11.sw.nos.boeing.com with Microsoft SMTPSVC(6.0.3790.3959); 
	Wed, 27 Aug 2008 10:47:37 -0700
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Date: Wed, 27 Aug 2008 10:47:35 -0700
Message-ID: <51661468CBD1354294533DA79E85955A0109FE71@XCH-SW-5V2.sw.nos.boeing.com>
In-Reply-To: <C4DB55F2.50B24%jvasseur@cisco.com>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: [Roll] draft-ietf-roll-protocols-survey-00
Thread-Index: AckF4uWWv+jCr8q7RKKuNS7geV3eIgA6l4jAAFZXU+0ACvR8MAAENIb7AACOAHAAAGaHlQABSNJw
References: <51661468CBD1354294533DA79E85955A0109FE32@XCH-SW-5V2.sw.nos.boeing.com>
	<C4DB55F2.50B24%jvasseur@cisco.com>
From: "Drake, John E" <John.E.Drake2@boeing.com>
To: "JP Vasseur" <jvasseur@cisco.com>, "Adrian Farrel" <adrian@olddog.co.uk>, 
	<roll@ietf.org>
X-OriginalArrivalTime: 27 Aug 2008 17:47:37.0535 (UTC)
	FILETIME=[FE7524F0:01C9086C]
Subject: Re: [Roll] draft-ietf-roll-protocols-survey-00
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/roll>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: roll-bounces@ietf.org
Errors-To: roll-bounces@ietf.org

JP,

Oopsie, my mistake.

However, I think my comment still stands, particularly if the working
group plans to use this I-D for deciding whether to invent at least one,
but probably many, new routing protocols.

Thanks,

John

>-----Original Message-----
>From: JP Vasseur [mailto:jvasseur@cisco.com] 
>Sent: Wednesday, August 27, 2008 10:05 AM
>To: Drake, John E; Adrian Farrel; roll@ietf.org
>Subject: Re: [Roll] draft-ietf-roll-protocols-survey-00
>
>John,
>
>
>On 8/27/08 6:57 PM, "Drake, John E" <John.E.Drake2@boeing.com> wrote:
>
>> Comment inline
>> 
>>> -----Original Message-----
>>> From: JP Vasseur [mailto:jvasseur@cisco.com]
>>> Sent: Wednesday, August 27, 2008 9:38 AM
>>> To: Drake, John E; Adrian Farrel; roll@ietf.org
>>> Subject: Re: [Roll] draft-ietf-roll-protocols-survey-00
>>> 
>>> Hi John,
>>> 
>>> 
>>> On 8/27/08 4:45 PM, "Drake, John E" 
><John.E.Drake2@boeing.com> wrote:
>>> 
>>>> JP,
>>>> 
>>>> I thought that was exactly Adrian's point.
>>> 
>>> Ok let's have him express his opinion.
>>> 
>>>> 
>>>> If you evaluate a bunch of routing protocols as they exist
>>> today in a
>>>> new operational environment and conclude that none of them are 
>>>> appropriate, then you have no choice but to conclude that
>>> you need to
>>>> invent at least one, but probably many, new routing 
>protocols.  It's 
>>>> not like this hasn't been done before.
>>>> 
>>>> I took Adrian's note to say that doing this is not
>>> sufficient and that
>>>> what needed to be done was to characterize the new operational 
>>>> environment, propose changes needed in each routing protocol to 
>>>> address the new operational environment, and then evaluate
>>> these changes.
>>>> 
>>> 
>>> John, I fully respect your opinion. Feel free to propose these 
>>> changes in light of the routing requirements expressed in 
>the related 
>>> WG document.
>>> Please make sure to fully understand them though, these 
>networks have 
>>> fairly unique characteristics that do require significant 
>background.
>> 
>> JD:  I would think this is the responsibility of the authors who are 
>> requesting that their I-D be adopted by the working group.
>
>This is already a WG document and there was a consensus within the WG.
>
>JP.
>
>> 
>>> 
>>> JP.
>>> 
>>>> Thanks,
>>>> 
>>>> John
>>>> 
>>>>> -----Original Message-----
>>>>> From: JP Vasseur [mailto:jvasseur@cisco.com]
>>>>> Sent: Wednesday, August 27, 2008 2:24 AM
>>>>> To: Drake, John E; Adrian Farrel; roll@ietf.org
>>>>> Subject: Re: [Roll] draft-ietf-roll-protocols-survey-00
>>>>> 
>>>>> John,
>>>>> 
>>>>> I do not think that this was Adrian's point. Your 
>feed-back is more 
>>>>> than welcome but please argue a bit more ...
>>>>> 
>>>>> Thanks.
>>>>> 
>>>>> JP.
>>>>> 
>>>>> 
>>>>> On 8/25/08 6:13 PM, "Drake, John E"
>>> <John.E.Drake2@boeing.com> wrote:
>>>>> 
>>>>>> Adrian,
>>>>>> 
>>>>>> An excellent note - I agree completely.  We need fewer routing 
>>>>>> protocols, not more.
>>>>>> 
>>>>>> Thanks,
>>>>>> 
>>>>>> John
>>>>>> 
>>>>>>> -----Original Message-----
>>>>>>> From: Adrian Farrel [mailto:adrian@olddog.co.uk]
>>>>>>> Sent: Sunday, August 24, 2008 5:14 AM
>>>>>>> To: roll@ietf.org
>>>>>>> Subject: [Roll] draft-ietf-roll-protocols-survey-00
>>>>>>> 
>>>>>>> Hi,
>>>>>>> 
>>>>>>> As one of the two tourists who raised a hand in Dublin 
>to express 
>>>>>>> uneasiness about this I-D becoming a WG draft, I 
>thought I should 
>>>>>>> write a note about my concerns.
>>>>>>> 
>>>>>>> I should caveat this by saying that I do appreciate the
>>>>> need for this
>>>>>>> work, and that the author-team will, I'm sure, do a fine job at 
>>>>>>> delivering what the working group needs. My concerns were
>>> much more
>>>>>>> about getting the direction of the I-D right before
>>>>> accepting it as I
>>>>>>> think it is often harder to recast an I-D once it is within the 
>>>>>>> working group.
>>>>>>> 
>>>>>>> Below, please find my major discussion point. I have 
>also done a 
>>>>>>> review of the draft and found a bunch of 
>issues/questions of more 
>>>>>>> minor importance.
>>>>>>> 
>>>>>>> Regards,
>>>>>>> Adrian
>>>>>>> 
>>>>>>> ===
>>>>>>> 
>>>>>>> The analysis of the routing protocols is predicated on what
>>>>> they are
>>>>>>> currently used for. To some extent this is reasonable
>>>>>>> - the easiest analysis of a routing protocol is in its
>>> operational
>>>>>>> environment. But to use this analysis as the basis of a
>>>>> decision for
>>>>>>> use of a protocol in a new environment is not so
>>> reasonable. If you
>>>>>>> want to show that none of today's protocols has been
>>>>> designed for use
>>>>>>> in the ROLL environment, then I don't suppose anyone will be 
>>>>>>> surprised. However, what we are really interested in is
>>> whether any
>>>>>>> of the existing protocols is suitable for adaptation for
>>>>> use in ROLL,
>>>>>>> whether the those adaptations would be contrived and
>>>>> technically hard
>>>>>>> (or flaky), and whether it would be more efficient to
>>> design a new
>>>>>>> protocol.
>>>>>>> 
>>>>>>> For an example (and I'm not proposing this as the solution
>>>>> for ROLL),
>>>>>>> an IGP could easily be adapted to flood on only certain 
>links, to 
>>>>>>> discard certain LSAs, and to build a FIB according to
>>>>> specific rules.
>>>>>>> This would not be a large change to the protocol,
>>> although it would
>>>>>>> obviously not be interoperable.
>>>>>>> 
>>>>>>> To discard from consideration any protocol based on its
>>>>> behavior in a
>>>>>>> certain environment without setting it in the context of your 
>>>>>>> forwarding paradigm and without examining the potential
>>> to adapt a
>>>>>>> protocol to that environment is wrong. If all you wanted
>>> to do was
>>>>>>> show that no current variant of any existing routing 
>protocol is 
>>>>>>> immediately applicable to ROLL, then that would be easy and
>>>>> would not
>>>>>>> be a surprise. But to imply that protocols are not open for 
>>>>>>> adaptation is more serious.
>>>>>>> 
>>>>>>> This is not to say that inventing a new protocol would be
>>> wrong or
>>>>>>> not fun.
>>>>>>> Only that your reasons for discarding protocols are
>>> poorly founded.
>>>>>>> You have focused on the operation of the routing
>>> protocol, not the
>>>>>>> purpose of the routing protocol. To give a better
>>> understanding of
>>>>>>> why you are discarding a protocol, you must show what 
>you want to 
>>>>>>> achieve as your forwarding paradigm. The requirements
>>>>> documents make
>>>>>>> some start at this.
>>>>>>> For example, draft-ietf-roll-urban-routing-reqs talks about:
>>>>>>> - routing to minimise power usage
>>>>>>> - routing to consider node and link capabilities
>>>>>>> - routing protocol to scale within CPU, memory and power limits
>>>>>>> - routing according to different metrics (latency is cited)
>>>>>>> 
>>>>>>> Such considerations are a good start to understanding the
>>>>> forwarding
>>>>>>> paradigm in ROLL, but would not be good enough to use to
>>>>> devise a new
>>>>>>> routing protocol, so I don't see how they can be good enough to 
>>>>>>> determine whether an existing protocol should be discarded,
>>>>> modified,
>>>>>>> or used.
>>>>>>> 
>>>>>>> =============
>>>>>>> 
>>>>>>> More specific comments on the draft follow.
>>>>>>> 
>>>>>>> ---
>>>>>>> 
>>>>>>> Do we have a commitment from the WG that any new protocol
>>> developed
>>>>>>> will be held to the same standards? That is, that the new
>>> protocol
>>>>>>> MUST achieve a "pass" in very column of the table in
>>>>> section 4. Or is
>>>>>>> there scope for pragmatism allowing trade-offs in the new
>>> protocol
>>>>>>> such that in some environments it achieves a pass in some
>>> columns,
>>>>>>> and in other environments it achieves a pass in other columns.
>>>>>>> 
>>>>>>> Maybe you could add this as a statement in the Abstract and 
>>>>>>> Introduction
>>>>>>> 
>>>>>>> ---
>>>>>>> 
>>>>>>> Why do you include the requirements language 
>boilerplate? I don't 
>>>>>>> think you use (or should use) such language in this document.
>>>>>>> 
>>>>>>> ---
>>>>>>> 
>>>>>>> Section 1
>>>>>>> 
>>>>>>> Can you strip out terms not used in the document?
>>>>>>> 
>>>>>>> ---
>>>>>>> 
>>>>>>> Section 2
>>>>>>> 
>>>>>>> You quote CPU power in MHz. Although that is the practical
>>>>> electronic
>>>>>>> limit, maybe MIPS would be a better measure.
>>>>>>> 
>>>>>>> ---
>>>>>>> 
>>>>>>> Section 3 para 2
>>>>>>> 
>>>>>>> "If a protocol cannot meet even these minimalist criteria..."
>>>>>>> I think your use of "cannot" is correct in the context of the 
>>>>>>> sentence, but I think your I-D examines "does not"
>>>>>>> 
>>>>>>> "...is unlikely to be good candidate..."
>>>>>>> Too much prevarication!
>>>>>>> 
>>>>>>> ---
>>>>>>> 
>>>>>>> Section 3 para 3
>>>>>>> 
>>>>>>> "...the protocol does not appear to contain sufficient
>>>>> flexibility..."
>>>>>>> The problem with this is that it is very mushy!
>>>>>>> It is OK to discard a protocol that is not flexible enough
>>>>> to handle
>>>>>>> your requirements. It is not OK to discard a protocol 
>because you 
>>>>>>> don't appear to know how to extend it.
>>>>>>> 
>>>>>>> A example comes in the somewhat contentious table in section 4
>>>>>>> :-) Here, for OSPF, you say that there is a "fail" for
>>>>> conveying node
>>>>>>> costs.
>>>>>>> But there is already LSA available for carrying node
>>> capabilities,
>>>>>>> and there are opaque LSAs available for carrying additional 
>>>>>>> "unconventional"
>>>>>>> information.
>>>>>>> 
>>>>>>> All this sort of ties to my main point. Of course, the 
>protocols 
>>>>>>> don't do exactly what you want already, but a more thorough
>>>>> survey is
>>>>>>> needed if you what to use this I-D as the reason for excluding 
>>>>>>> protocols.
>>>>>>> 
>>>>>>> ---
>>>>>>> 
>>>>>>> Section 3.2 para 1
>>>>>>> "...with size ranging from a minimum..."
>>>>>>> I think you mean "...with maximum size ranging from a 
>minimum..."
>>>>>>> 
>>>>>>> "very large networks"
>>>>>>> Can you de-fluff this? Some people might think that 250
>>>>> nodes is very
>>>>>>> large
>>>>>>> ;-)
>>>>>>> 
>>>>>>> "network depths"
>>>>>>> Would be worth including your definition here.
>>>>>>> 
>>>>>>> --
>>>>>>> 
>>>>>>> Section 3.2 para 1
>>>>>>> 
>>>>>>> Is every network node a router?
>>>>>>> draft-ietf-roll-urban-routing-reqs says "Sensor nodes are
>>>>> capable of
>>>>>>> forwarding data." If every node is a router and
>>> participates in the
>>>>>>> routing protocol, this creates a very different 
>environment from 
>>>>>>> saying that most sensors are hosts, and some are routers. I 
>>>>>>> appreciate that "capable" does not imply "do".
>>>>>>> 
>>>>>>> ---
>>>>>>> 
>>>>>>> Associated with the previous point, I think you might spend
>>>>> a little
>>>>>>> more time discussing the definition of a link in ROLL. It
>>> is clear
>>>>>>> that in a wireless n/w a link may exist between any two 
>nodes in 
>>>>>>> range.
>>>>>>> If that is
>>>>>>> what you mean, then it would help to make it clear. On 
>the other 
>>>>>>> hand, "link" could be defined as an active neighbor 
>relationship 
>>>>>>> between a pair of routers. Or something else.
>>>>>>> 
>>>>>>> This becomes important as we try to understand how the
>>>>> protocol must
>>>>>>> scale, and what it is supposed to do.
>>>>>>> 
>>>>>>> I presume that the concept of "parallel links" between
>>> neighbors is
>>>>>>> going to have no meaning at the moment. That is, you 
>use only one 
>>>>>>> frequency in any network. Maybe I presume wrong, in which
>>> case, you
>>>>>>> need to refine the definition of "network density" in 
>section 3.1.
>>>>>>> 
>>>>>>> ---
>>>>>>> 
>>>>>>> Section 3.2 para 1
>>>>>>> Final sentence is a bit mangled.
>>>>>>> 
>>>>>>> ---
>>>>>>> 
>>>>>>> Section 3.2 para 2
>>>>>>> 
>>>>>>> I can see why scaling with O(L) may be an issue, but it may
>>>>> depend on
>>>>>>> the definitions of links and routers. Also it may 
>depend on what 
>>>>>>> magnitude you expect for L. Perhaps you could give some
>>>>> ball-parks in
>>>>>>> the previous paragraph as you do for N and D. Without 
>that, it is 
>>>>>>> hard to justify the claim that scaling with O(L) is a problem.
>>>>>>> 
>>>>>>> ---
>>>>>>> 
>>>>>>> Section 3.3
>>>>>>> 
>>>>>>> Can you add SINR to your terminology?
>>>>>>> 
>>>>>>> "...not trigger unnecessary responses..."
>>>>>>> I think that this is subjective and unhelpful. Can you
>>> rephrase to
>>>>>>> capture a quantifiable requirement?
>>>>>>> 
>>>>>>> s/link changes to propagate across/link changes to be 
>propagated 
>>>>>>> across/
>>>>>>> 
>>>>>>> s/O(l)/O(L)/
>>>>>>> 
>>>>>>> ---
>>>>>>> 
>>>>>>> Section 3.3 final para
>>>>>>> 
>>>>>>> You have "transmissions", "broadcast", and "route updates".
>>>>>>> Can you use a
>>>>>>> consistent term? It may be less pretty English, but it 
>would be a 
>>>>>>> better way to avoid accusations of bias :-)
>>>>>>> 
>>>>>>> Perhaps...
>>>>>>> More precisely, loss responses that require transmissions
>>>>> within the
>>>>>>> network of O(N) fail, while those that are limited to
>>> O(L) or O(D)
>>>>>>> pass.
>>>>>>> 
>>>>>>> ---
>>>>>>> 
>>>>>>> Section 3.4 para 1
>>>>>>> 
>>>>>>> "In terms of routing structure, any proposed L2N 
>routing protocol 
>>>>>>> ought to support the autonomous organization and
>>>>> configuration of the
>>>>>>> network at the lowest possible energy cost."
>>>>>>> 
>>>>>>> Why "L2N"? I thought "Networks of low power wireless devices 
>>>>>>> introduce novel IP routing issues."
>>>>>>> 
>>>>>>> "ought" is not a recognized RFC 2119 word :-)
>>>>>>> 
>>>>>>> I think "at the lowest possible energy cost" is a statement
>>>>> that this
>>>>>>> requirement trumps all others. Is that what you mean?
>>>>>>> 
>>>>>>> I'm not convinced by the absolute statement you make here.
>>>>>>> Maybe, this is a
>>>>>>> question I should take to the requirements documents. Consider 
>>>>>>> routing protocol A that is slightly more (say 5%) 
>power-consuming 
>>>>>>> than routing protocol B. But suppose protocol A gives rise
>>>>> to a data
>>>>>>> forwarding solution that is 50% more power-efficient?
>>>>>>> 
>>>>>>> ---
>>>>>>> 
>>>>>>> Section 3.4 para 2
>>>>>>> 
>>>>>>> "As low-power wireless networks can have very low data rates, 
>>>>>>> protocols which require a minimum control packet rate can have 
>>>>>>> unbounded control overhead."
>>>>>>> 
>>>>>>> I know what you mean, but I had to parse several times.
>>> How about...
>>>>>>> 
>>>>>>> The control overhead is the ratio of control data to
>>>>> payload data. A
>>>>>>> high control overhead indicates that precious network resources 
>>>>>>> (bandwidth, power, or CPU) are being consumed by the control 
>>>>>>> protocols instead of being used to transmit data. Where
>>>>> payload data
>>>>>>> rates are very low (as is often the case in low-power wireless
>>>>>>> networks) the control overhead can become unbounded for 
>protocols 
>>>>>>> that require some non-zero background control packet rate.
>>>>>>> 
>>>>>>> ---
>>>>>>> 
>>>>>>> Section 3.4 para 2
>>>>>>> 
>>>>>>> s/never meet the condition can be forced/never meet the 
>condition 
>>>>>>> could be forced/
>>>>>>> 
>>>>>>> ---
>>>>>>> 
>>>>>>> Section 4 para 3
>>>>>>> 
>>>>>>> "multiple layer 2 hops away"
>>>>>>> Really?
>>>>>>> Again, I thought we were building an IP routing 
>protocol. If your 
>>>>>>> requirement is layer 2 routing, you need to make that
>>>>> visible up front.
>>>>>>> But, I can see why you are interested in L2 hops as well
>>> as L3 hops
>>>>>>> since they all consume power.
>>>>>>> 
>>>>>>> This comes back to the question about whether all nodes are
>>>>> routers. 
>>>>>>> Perhaps some repeaters are not routers?
>>>>>>> 
>>>>>>> But can't we actually factor the L2 hops into the
>>> definition of the
>>>>>>> L3 hop?
>>>>>>> 
>>>>>>> ---
>>>>>>> 
>>>>>>> Section 4 para 3
>>>>>>> 
>>>>>>> "...nodes may only advertise..."
>>>>>>> This sounds prohibitive!
>>>>>>> 
>>>>>>> ---
>>>>>>> 
>>>>>>> Section 4 para 4
>>>>>>> 
>>>>>>> "Neighbor discovery is a critical component of any routing
>>>>> protocol."
>>>>>>> I think I disagree.
>>>>>>> It is clear that routing protocols need to know their
>>> neighbors. It
>>>>>>> is not clear that this requires that the discovery be 
>part of the 
>>>>>>> routing protocol.
>>>>>>> 
>>>>>>> Later you have:
>>>>>>> "...key component of many protocols."
>>>>>>> This is less strong than the initial sentence.
>>>>>>> 
>>>>>>> ---
>>>>>>> 
>>>>>>> Section 4
>>>>>>> 
>>>>>>> "Protocols Today"
>>>>>>> 
>>>>>>> Is this a section 4.1 headers?
>>>>>>> 
>>>>>>> ---
>>>>>>> 
>>>>>>> Section 4 "Protocols Today" para 2
>>>>>>> 
>>>>>>> I don't think the MPLS TE example is a good one. It is
>>>>> certainly not
>>>>>>> correct that the TED has to be fully distributed around
>>> the network.
>>>>>>> There are some very good examples of where "stub TE 
>areas" do not 
>>>>>>> need to know the TE information for the whole of the 
>rest of the 
>>>>>>> network.
>>>>>>> 
>>>>>>> ---
>>>>>>> 
>>>>>>> Section 4 Table
>>>>>>> 
>>>>>>> I'm prepared to bet that a lot of people will be upset by
>>>>> the use of
>>>>>>> "fail"
>>>>>>> for their favorite protocols. It would seem that "?" is more 
>>>>>>> appropriate in many cells.
>>>>>>> 
>>>>>>> ---
>>>>>>> 
>>>>>>> Section 5.1
>>>>>>> Is it worth replacing "OSPF" with "OSPF or IS-IS"?
>>>>>>> 
>>>>>>> ---
>>>>>>> 
>>>>>>> Section 14.
>>>>>>> Your three ROLL requirements drafts are Normative
>>>>> References, I think.
>>>>>>> 
>>>>>>> _______________________________________________
>>>>>>> Roll mailing list
>>>>>>> Roll@ietf.org
>>>>>>> https://www.ietf.org/mailman/listinfo/roll
>>>>>>> 
>>>>>> _______________________________________________
>>>>>> Roll mailing list
>>>>>> Roll@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/roll
>>>>> 
>>>>> 
>>> 
>>> 
>
>_______________________________________________
>Roll mailing list
>Roll@ietf.org
>https://www.ietf.org/mailman/listinfo/roll
>
_______________________________________________
Roll mailing list
Roll@ietf.org
https://www.ietf.org/mailman/listinfo/roll


From roll-bounces@ietf.org  Wed Aug 27 11:03:46 2008
Return-Path: <roll-bounces@ietf.org>
X-Original-To: roll-archive@ietf.org
Delivered-To: ietfarch-roll-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 17C6D3A6C2C;
	Wed, 27 Aug 2008 11:03:46 -0700 (PDT)
X-Original-To: roll@core3.amsl.com
Delivered-To: roll@core3.amsl.com
Received: from localhost (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 322813A69C3
	for <roll@core3.amsl.com>; Wed, 27 Aug 2008 11:03:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.201
X-Spam-Level: 
X-Spam-Status: No, score=0.201 tagged_above=-999 required=5 tests=[AWL=-0.150, 
	BAYES_50=0.001, HELO_EQ_FR=0.35]
Received: from mail.ietf.org ([64.170.98.32])
	by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id ncj-TRk-9H83 for <roll@core3.amsl.com>;
	Wed, 27 Aug 2008 11:03:39 -0700 (PDT)
Received: from mail2-relais-roc.national.inria.fr
	(mail2-relais-roc.national.inria.fr [192.134.164.83])
	by core3.amsl.com (Postfix) with ESMTP id 4F0543A6AC9
	for <roll@ietf.org>; Wed, 27 Aug 2008 11:03:39 -0700 (PDT)
X-IronPort-AV: E=Sophos;i="4.32,279,1217800800"; d="scan'208";a="14319791"
Received: from ras75-3-82-226-221-97.fbx.proxad.net (HELO
	BoolfightMaN-Laptop.local) ([82.226.221.97])
	by mail2-relais-roc.national.inria.fr with ESMTP/TLS/DHE-RSA-AES256-SHA;
	27 Aug 2008 20:03:08 +0200
Message-ID: <48B596DB.5020808@inria.fr>
Date: Wed, 27 Aug 2008 20:03:07 +0200
From: Emmanuel Baccelli <Emmanuel.Baccelli@inria.fr>
User-Agent: Thunderbird 2.0.0.16 (Macintosh/20080707)
MIME-Version: 1.0
To: roll@ietf.org
References: <C4DB55F2.50B24%jvasseur@cisco.com>
In-Reply-To: <C4DB55F2.50B24%jvasseur@cisco.com>
Subject: Re: [Roll] draft-ietf-roll-protocols-survey-00
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/roll>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: roll-bounces@ietf.org
Errors-To: roll-bounces@ietf.org



>>>> I took Adrian's note to say that doing this is not
>>> sufficient and that
>>>> what needed to be done was to characterize the new operational
>>>> environment, propose changes needed in each routing protocol to
>>>> address the new operational environment, and then evaluate
>>> these changes.
>>> John, I fully respect your opinion. Feel free to propose these
>>> changes in light of the routing requirements expressed in the
>>> related WG document.
>>> Please make sure to fully understand them though, these
>>> networks have fairly unique characteristics that do require
>>> significant background.
>> JD:  I would think this is the responsibility of the authors who are
>> requesting that their I-D be adopted by the working group.
> 
> This is already a WG document and there was a consensus within the WG.
> 
> JP.
> 

The point here is that such a document is extremely difficult to write, 
especially if it is not balanced with the framework that was mentionned 
earlier in the discussion (about "existing protocol extensions" vs "from 
scratch design").

I think that such a balance is missing in the document, and there is a 
high risk that conclusions may thus be misleading.

For example, there is this infamous "fail/pass" table at the end of 
section 4, which is too quickly justified in Section 13 (Annex A).

It is no secret that in reality it is difficult to be so binary about 
most of the criteria that are being cited here. Just a couple of 
examples I noted at first glance:

- OLSR is said to "fail" the "loss response" criteria. However in the 
quick justification in section 4, nothing is said about link hysteresis 
strategy (see OLSR RFC 3626 section 14.3.) which arguably makes OLSR 
"pass" this criteria.

- OLSR is said to "fail" the "control cost" criteria. However, simple 
fisheye TTL strategy on OLSR control messages makes OLSR "pass" this 
criteria. See this paper "Fish Eye OLSR Scaling Properties" in Journal 
of Communication and Networks, 2004. Actually this paper even proves 
that OLSR can thus reach the Gupta and Kumar bounds in terms of control 
overhead scalability.

But I'm afraid these 2 examples are just the tip of the iceberg if the 
document really about to justify the "fail/pass" table in section 4. For 
now this document is thus blurry and not really usable.

This is why in my opinion the document should be rewritten in a 
different, more balanced state of mind. The aim should be to remain 
constructive with what is already out there in terms of routing 
solutions, and to justify fully what is needed in addition to these 
existing solutions.

Regards,
Emmanuel

_______________________________________________
Roll mailing list
Roll@ietf.org
https://www.ietf.org/mailman/listinfo/roll


From roll-bounces@ietf.org  Wed Aug 27 11:22:06 2008
Return-Path: <roll-bounces@ietf.org>
X-Original-To: roll-archive@ietf.org
Delivered-To: ietfarch-roll-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 26BB33A6AC9;
	Wed, 27 Aug 2008 11:22:06 -0700 (PDT)
X-Original-To: roll@core3.amsl.com
Delivered-To: roll@core3.amsl.com
Received: from localhost (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id C35A53A68F4
	for <roll@core3.amsl.com>; Wed, 27 Aug 2008 11:22:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.679
X-Spam-Level: 
X-Spam-Status: No, score=-5.679 tagged_above=-999 required=5 tests=[AWL=0.920, 
	BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32])
	by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id oC7v70Rs+iA9 for <roll@core3.amsl.com>;
	Wed, 27 Aug 2008 11:22:02 -0700 (PDT)
Received: from sj-iport-6.cisco.com (sj-iport-6.cisco.com [171.71.176.117])
	by core3.amsl.com (Postfix) with ESMTP id 5DC403A6AC9
	for <roll@ietf.org>; Wed, 27 Aug 2008 11:22:02 -0700 (PDT)
X-IronPort-AV: E=Sophos;i="4.32,280,1217808000"; d="scan'208";a="147716766"
Received: from sj-dkim-2.cisco.com ([171.71.179.186])
	by sj-iport-6.cisco.com with ESMTP; 27 Aug 2008 18:21:41 +0000
Received: from sj-core-2.cisco.com (sj-core-2.cisco.com [171.71.177.254])
	by sj-dkim-2.cisco.com (8.12.11/8.12.11) with ESMTP id m7RILfob029257; 
	Wed, 27 Aug 2008 11:21:41 -0700
Received: from xbh-rtp-201.amer.cisco.com (xbh-rtp-201.cisco.com
	[64.102.31.12])
	by sj-core-2.cisco.com (8.13.8/8.13.8) with ESMTP id m7RILWxb019705;
	Wed, 27 Aug 2008 18:21:41 GMT
Received: from xmb-rtp-213.amer.cisco.com ([64.102.31.112]) by
	xbh-rtp-201.amer.cisco.com with Microsoft SMTPSVC(6.0.3790.1830); 
	Wed, 27 Aug 2008 14:21:34 -0400
Received: from 10.55.206.229 ([10.55.206.229]) by xmb-rtp-213.amer.cisco.com
	([64.102.31.112]) with Microsoft Exchange Server HTTP-DAV ; 
	Wed, 27 Aug 2008 18:21:33 +0000
User-Agent: Microsoft-Entourage/12.12.0.080729
Date: Wed, 27 Aug 2008 20:21:30 +0200
From: JP Vasseur <jvasseur@cisco.com>
To: "Drake, John E" <John.E.Drake2@boeing.com>,
	Adrian Farrel <adrian@olddog.co.uk>, <roll@ietf.org>
Message-ID: <C4DB67CA.50BC9%jvasseur@cisco.com>
Thread-Topic: [Roll] draft-ietf-roll-protocols-survey-00
Thread-Index: AckF4uWWv+jCr8q7RKKuNS7geV3eIgA6l4jAAFZXU+0ACvR8MAAENIb7AACOAHAAAGaHlQABSNJwAAFf3kk=
In-Reply-To: <51661468CBD1354294533DA79E85955A0109FE71@XCH-SW-5V2.sw.nos.boeing.com>
Mime-version: 1.0
X-OriginalArrivalTime: 27 Aug 2008 18:21:34.0505 (UTC)
	FILETIME=[BC961990:01C90871]
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; l=19451; t=1219861301;
	x=1220725301; c=relaxed/simple; s=sjdkim2002;
	h=Content-Type:From:Subject:Content-Transfer-Encoding:MIME-Version;
	d=cisco.com; i=jvasseur@cisco.com;
	z=From:=20JP=20Vasseur=20<jvasseur@cisco.com>
	|Subject:=20Re=3A=20[Roll]=20draft-ietf-roll-protocols-surv
	ey-00 |Sender:=20;
	bh=L5zmdTqo3urBNAdQcolKFWD50KbzZY+66nbTeXSeeU8=;
	b=iH7O8N+u0x/97KYrxsX+/YkNdejJSuv1xAaqty2w88OZv5qnebBujTkmed
	laAKmJ3Hvle+/TVJFXYjfzkkuqWIDU7nHab0MLGUvrFss3t7ySF9x0UDXGI1
	mHNsYZCNOI;
Authentication-Results: sj-dkim-2; header.From=jvasseur@cisco.com; dkim=pass (
	sig from cisco.com/sjdkim2002 verified; ); 
Subject: Re: [Roll] draft-ietf-roll-protocols-survey-00
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/roll>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: roll-bounces@ietf.org
Errors-To: roll-bounces@ietf.org

Hi John,


On 8/27/08 7:47 PM, "Drake, John E" <John.E.Drake2@boeing.com> wrote:

> JP,
> 
> Oopsie, my mistake.
> 
> However, I think my comment still stands, particularly if the working
> group plans to use this I-D for deciding whether to invent at least one,
> but probably many, new routing protocols.

Just to clarify: *should* the WG decide to design a new protocol (which
would mean to re-charter), it will *not* be many protocols for sure. That
would simply be a non sense. See my first presentation at the routing
plenary meeting.

Thanks.

JP.

> 
> Thanks,
> 
> John
> 
>> -----Original Message-----
>> From: JP Vasseur [mailto:jvasseur@cisco.com]
>> Sent: Wednesday, August 27, 2008 10:05 AM
>> To: Drake, John E; Adrian Farrel; roll@ietf.org
>> Subject: Re: [Roll] draft-ietf-roll-protocols-survey-00
>> 
>> John,
>> 
>> 
>> On 8/27/08 6:57 PM, "Drake, John E" <John.E.Drake2@boeing.com> wrote:
>> 
>>> Comment inline
>>> 
>>>> -----Original Message-----
>>>> From: JP Vasseur [mailto:jvasseur@cisco.com]
>>>> Sent: Wednesday, August 27, 2008 9:38 AM
>>>> To: Drake, John E; Adrian Farrel; roll@ietf.org
>>>> Subject: Re: [Roll] draft-ietf-roll-protocols-survey-00
>>>> 
>>>> Hi John,
>>>> 
>>>> 
>>>> On 8/27/08 4:45 PM, "Drake, John E"
>> <John.E.Drake2@boeing.com> wrote:
>>>> 
>>>>> JP,
>>>>> 
>>>>> I thought that was exactly Adrian's point.
>>>> 
>>>> Ok let's have him express his opinion.
>>>> 
>>>>> 
>>>>> If you evaluate a bunch of routing protocols as they exist
>>>> today in a
>>>>> new operational environment and conclude that none of them are
>>>>> appropriate, then you have no choice but to conclude that
>>>> you need to
>>>>> invent at least one, but probably many, new routing
>> protocols.  It's
>>>>> not like this hasn't been done before.
>>>>> 
>>>>> I took Adrian's note to say that doing this is not
>>>> sufficient and that
>>>>> what needed to be done was to characterize the new operational
>>>>> environment, propose changes needed in each routing protocol to
>>>>> address the new operational environment, and then evaluate
>>>> these changes.
>>>>> 
>>>> 
>>>> John, I fully respect your opinion. Feel free to propose these
>>>> changes in light of the routing requirements expressed in
>> the related 
>>>> WG document.
>>>> Please make sure to fully understand them though, these
>> networks have 
>>>> fairly unique characteristics that do require significant
>> background.
>>> 
>>> JD:  I would think this is the responsibility of the authors who are
>>> requesting that their I-D be adopted by the working group.
>> 
>> This is already a WG document and there was a consensus within the WG.
>> 
>> JP.
>> 
>>> 
>>>> 
>>>> JP.
>>>> 
>>>>> Thanks,
>>>>> 
>>>>> John
>>>>> 
>>>>>> -----Original Message-----
>>>>>> From: JP Vasseur [mailto:jvasseur@cisco.com]
>>>>>> Sent: Wednesday, August 27, 2008 2:24 AM
>>>>>> To: Drake, John E; Adrian Farrel; roll@ietf.org
>>>>>> Subject: Re: [Roll] draft-ietf-roll-protocols-survey-00
>>>>>> 
>>>>>> John,
>>>>>> 
>>>>>> I do not think that this was Adrian's point. Your
>> feed-back is more
>>>>>> than welcome but please argue a bit more ...
>>>>>> 
>>>>>> Thanks.
>>>>>> 
>>>>>> JP.
>>>>>> 
>>>>>> 
>>>>>> On 8/25/08 6:13 PM, "Drake, John E"
>>>> <John.E.Drake2@boeing.com> wrote:
>>>>>> 
>>>>>>> Adrian,
>>>>>>> 
>>>>>>> An excellent note - I agree completely.  We need fewer routing
>>>>>>> protocols, not more.
>>>>>>> 
>>>>>>> Thanks,
>>>>>>> 
>>>>>>> John
>>>>>>> 
>>>>>>>> -----Original Message-----
>>>>>>>> From: Adrian Farrel [mailto:adrian@olddog.co.uk]
>>>>>>>> Sent: Sunday, August 24, 2008 5:14 AM
>>>>>>>> To: roll@ietf.org
>>>>>>>> Subject: [Roll] draft-ietf-roll-protocols-survey-00
>>>>>>>> 
>>>>>>>> Hi,
>>>>>>>> 
>>>>>>>> As one of the two tourists who raised a hand in Dublin
>> to express 
>>>>>>>> uneasiness about this I-D becoming a WG draft, I
>> thought I should
>>>>>>>> write a note about my concerns.
>>>>>>>> 
>>>>>>>> I should caveat this by saying that I do appreciate the
>>>>>> need for this
>>>>>>>> work, and that the author-team will, I'm sure, do a fine job at
>>>>>>>> delivering what the working group needs. My concerns were
>>>> much more
>>>>>>>> about getting the direction of the I-D right before
>>>>>> accepting it as I
>>>>>>>> think it is often harder to recast an I-D once it is within the
>>>>>>>> working group.
>>>>>>>> 
>>>>>>>> Below, please find my major discussion point. I have
>> also done a 
>>>>>>>> review of the draft and found a bunch of
>> issues/questions of more
>>>>>>>> minor importance.
>>>>>>>> 
>>>>>>>> Regards,
>>>>>>>> Adrian
>>>>>>>> 
>>>>>>>> ===
>>>>>>>> 
>>>>>>>> The analysis of the routing protocols is predicated on what
>>>>>> they are
>>>>>>>> currently used for. To some extent this is reasonable
>>>>>>>> - the easiest analysis of a routing protocol is in its
>>>> operational
>>>>>>>> environment. But to use this analysis as the basis of a
>>>>>> decision for
>>>>>>>> use of a protocol in a new environment is not so
>>>> reasonable. If you
>>>>>>>> want to show that none of today's protocols has been
>>>>>> designed for use
>>>>>>>> in the ROLL environment, then I don't suppose anyone will be
>>>>>>>> surprised. However, what we are really interested in is
>>>> whether any
>>>>>>>> of the existing protocols is suitable for adaptation for
>>>>>> use in ROLL,
>>>>>>>> whether the those adaptations would be contrived and
>>>>>> technically hard
>>>>>>>> (or flaky), and whether it would be more efficient to
>>>> design a new
>>>>>>>> protocol.
>>>>>>>> 
>>>>>>>> For an example (and I'm not proposing this as the solution
>>>>>> for ROLL),
>>>>>>>> an IGP could easily be adapted to flood on only certain
>> links, to 
>>>>>>>> discard certain LSAs, and to build a FIB according to
>>>>>> specific rules.
>>>>>>>> This would not be a large change to the protocol,
>>>> although it would
>>>>>>>> obviously not be interoperable.
>>>>>>>> 
>>>>>>>> To discard from consideration any protocol based on its
>>>>>> behavior in a
>>>>>>>> certain environment without setting it in the context of your
>>>>>>>> forwarding paradigm and without examining the potential
>>>> to adapt a
>>>>>>>> protocol to that environment is wrong. If all you wanted
>>>> to do was
>>>>>>>> show that no current variant of any existing routing
>> protocol is 
>>>>>>>> immediately applicable to ROLL, then that would be easy and
>>>>>> would not
>>>>>>>> be a surprise. But to imply that protocols are not open for
>>>>>>>> adaptation is more serious.
>>>>>>>> 
>>>>>>>> This is not to say that inventing a new protocol would be
>>>> wrong or
>>>>>>>> not fun.
>>>>>>>> Only that your reasons for discarding protocols are
>>>> poorly founded.
>>>>>>>> You have focused on the operation of the routing
>>>> protocol, not the
>>>>>>>> purpose of the routing protocol. To give a better
>>>> understanding of
>>>>>>>> why you are discarding a protocol, you must show what
>> you want to 
>>>>>>>> achieve as your forwarding paradigm. The requirements
>>>>>> documents make
>>>>>>>> some start at this.
>>>>>>>> For example, draft-ietf-roll-urban-routing-reqs talks about:
>>>>>>>> - routing to minimise power usage
>>>>>>>> - routing to consider node and link capabilities
>>>>>>>> - routing protocol to scale within CPU, memory and power limits
>>>>>>>> - routing according to different metrics (latency is cited)
>>>>>>>> 
>>>>>>>> Such considerations are a good start to understanding the
>>>>>> forwarding
>>>>>>>> paradigm in ROLL, but would not be good enough to use to
>>>>>> devise a new
>>>>>>>> routing protocol, so I don't see how they can be good enough to
>>>>>>>> determine whether an existing protocol should be discarded,
>>>>>> modified,
>>>>>>>> or used.
>>>>>>>> 
>>>>>>>> =============
>>>>>>>> 
>>>>>>>> More specific comments on the draft follow.
>>>>>>>> 
>>>>>>>> ---
>>>>>>>> 
>>>>>>>> Do we have a commitment from the WG that any new protocol
>>>> developed
>>>>>>>> will be held to the same standards? That is, that the new
>>>> protocol
>>>>>>>> MUST achieve a "pass" in very column of the table in
>>>>>> section 4. Or is
>>>>>>>> there scope for pragmatism allowing trade-offs in the new
>>>> protocol
>>>>>>>> such that in some environments it achieves a pass in some
>>>> columns,
>>>>>>>> and in other environments it achieves a pass in other columns.
>>>>>>>> 
>>>>>>>> Maybe you could add this as a statement in the Abstract and
>>>>>>>> Introduction
>>>>>>>> 
>>>>>>>> ---
>>>>>>>> 
>>>>>>>> Why do you include the requirements language
>> boilerplate? I don't
>>>>>>>> think you use (or should use) such language in this document.
>>>>>>>> 
>>>>>>>> ---
>>>>>>>> 
>>>>>>>> Section 1
>>>>>>>> 
>>>>>>>> Can you strip out terms not used in the document?
>>>>>>>> 
>>>>>>>> ---
>>>>>>>> 
>>>>>>>> Section 2
>>>>>>>> 
>>>>>>>> You quote CPU power in MHz. Although that is the practical
>>>>>> electronic
>>>>>>>> limit, maybe MIPS would be a better measure.
>>>>>>>> 
>>>>>>>> ---
>>>>>>>> 
>>>>>>>> Section 3 para 2
>>>>>>>> 
>>>>>>>> "If a protocol cannot meet even these minimalist criteria..."
>>>>>>>> I think your use of "cannot" is correct in the context of the
>>>>>>>> sentence, but I think your I-D examines "does not"
>>>>>>>> 
>>>>>>>> "...is unlikely to be good candidate..."
>>>>>>>> Too much prevarication!
>>>>>>>> 
>>>>>>>> ---
>>>>>>>> 
>>>>>>>> Section 3 para 3
>>>>>>>> 
>>>>>>>> "...the protocol does not appear to contain sufficient
>>>>>> flexibility..."
>>>>>>>> The problem with this is that it is very mushy!
>>>>>>>> It is OK to discard a protocol that is not flexible enough
>>>>>> to handle
>>>>>>>> your requirements. It is not OK to discard a protocol
>> because you 
>>>>>>>> don't appear to know how to extend it.
>>>>>>>> 
>>>>>>>> A example comes in the somewhat contentious table in section 4
>>>>>>>> :-) Here, for OSPF, you say that there is a "fail" for
>>>>>> conveying node
>>>>>>>> costs.
>>>>>>>> But there is already LSA available for carrying node
>>>> capabilities,
>>>>>>>> and there are opaque LSAs available for carrying additional
>>>>>>>> "unconventional"
>>>>>>>> information.
>>>>>>>> 
>>>>>>>> All this sort of ties to my main point. Of course, the
>> protocols 
>>>>>>>> don't do exactly what you want already, but a more thorough
>>>>>> survey is
>>>>>>>> needed if you what to use this I-D as the reason for excluding
>>>>>>>> protocols.
>>>>>>>> 
>>>>>>>> ---
>>>>>>>> 
>>>>>>>> Section 3.2 para 1
>>>>>>>> "...with size ranging from a minimum..."
>>>>>>>> I think you mean "...with maximum size ranging from a
>> minimum..."
>>>>>>>> 
>>>>>>>> "very large networks"
>>>>>>>> Can you de-fluff this? Some people might think that 250
>>>>>> nodes is very
>>>>>>>> large
>>>>>>>> ;-)
>>>>>>>> 
>>>>>>>> "network depths"
>>>>>>>> Would be worth including your definition here.
>>>>>>>> 
>>>>>>>> --
>>>>>>>> 
>>>>>>>> Section 3.2 para 1
>>>>>>>> 
>>>>>>>> Is every network node a router?
>>>>>>>> draft-ietf-roll-urban-routing-reqs says "Sensor nodes are
>>>>>> capable of
>>>>>>>> forwarding data." If every node is a router and
>>>> participates in the
>>>>>>>> routing protocol, this creates a very different
>> environment from
>>>>>>>> saying that most sensors are hosts, and some are routers. I
>>>>>>>> appreciate that "capable" does not imply "do".
>>>>>>>> 
>>>>>>>> ---
>>>>>>>> 
>>>>>>>> Associated with the previous point, I think you might spend
>>>>>> a little
>>>>>>>> more time discussing the definition of a link in ROLL. It
>>>> is clear
>>>>>>>> that in a wireless n/w a link may exist between any two
>> nodes in 
>>>>>>>> range.
>>>>>>>> If that is
>>>>>>>> what you mean, then it would help to make it clear. On
>> the other 
>>>>>>>> hand, "link" could be defined as an active neighbor
>> relationship 
>>>>>>>> between a pair of routers. Or something else.
>>>>>>>> 
>>>>>>>> This becomes important as we try to understand how the
>>>>>> protocol must
>>>>>>>> scale, and what it is supposed to do.
>>>>>>>> 
>>>>>>>> I presume that the concept of "parallel links" between
>>>> neighbors is
>>>>>>>> going to have no meaning at the moment. That is, you
>> use only one 
>>>>>>>> frequency in any network. Maybe I presume wrong, in which
>>>> case, you
>>>>>>>> need to refine the definition of "network density" in
>> section 3.1.
>>>>>>>> 
>>>>>>>> ---
>>>>>>>> 
>>>>>>>> Section 3.2 para 1
>>>>>>>> Final sentence is a bit mangled.
>>>>>>>> 
>>>>>>>> ---
>>>>>>>> 
>>>>>>>> Section 3.2 para 2
>>>>>>>> 
>>>>>>>> I can see why scaling with O(L) may be an issue, but it may
>>>>>> depend on
>>>>>>>> the definitions of links and routers. Also it may
>> depend on what 
>>>>>>>> magnitude you expect for L. Perhaps you could give some
>>>>>> ball-parks in
>>>>>>>> the previous paragraph as you do for N and D. Without
>> that, it is 
>>>>>>>> hard to justify the claim that scaling with O(L) is a problem.
>>>>>>>> 
>>>>>>>> ---
>>>>>>>> 
>>>>>>>> Section 3.3
>>>>>>>> 
>>>>>>>> Can you add SINR to your terminology?
>>>>>>>> 
>>>>>>>> "...not trigger unnecessary responses..."
>>>>>>>> I think that this is subjective and unhelpful. Can you
>>>> rephrase to
>>>>>>>> capture a quantifiable requirement?
>>>>>>>> 
>>>>>>>> s/link changes to propagate across/link changes to be
>> propagated 
>>>>>>>> across/
>>>>>>>> 
>>>>>>>> s/O(l)/O(L)/
>>>>>>>> 
>>>>>>>> ---
>>>>>>>> 
>>>>>>>> Section 3.3 final para
>>>>>>>> 
>>>>>>>> You have "transmissions", "broadcast", and "route updates".
>>>>>>>> Can you use a
>>>>>>>> consistent term? It may be less pretty English, but it
>> would be a 
>>>>>>>> better way to avoid accusations of bias :-)
>>>>>>>> 
>>>>>>>> Perhaps...
>>>>>>>> More precisely, loss responses that require transmissions
>>>>>> within the
>>>>>>>> network of O(N) fail, while those that are limited to
>>>> O(L) or O(D)
>>>>>>>> pass.
>>>>>>>> 
>>>>>>>> ---
>>>>>>>> 
>>>>>>>> Section 3.4 para 1
>>>>>>>> 
>>>>>>>> "In terms of routing structure, any proposed L2N
>> routing protocol
>>>>>>>> ought to support the autonomous organization and
>>>>>> configuration of the
>>>>>>>> network at the lowest possible energy cost."
>>>>>>>> 
>>>>>>>> Why "L2N"? I thought "Networks of low power wireless devices
>>>>>>>> introduce novel IP routing issues."
>>>>>>>> 
>>>>>>>> "ought" is not a recognized RFC 2119 word :-)
>>>>>>>> 
>>>>>>>> I think "at the lowest possible energy cost" is a statement
>>>>>> that this
>>>>>>>> requirement trumps all others. Is that what you mean?
>>>>>>>> 
>>>>>>>> I'm not convinced by the absolute statement you make here.
>>>>>>>> Maybe, this is a
>>>>>>>> question I should take to the requirements documents. Consider
>>>>>>>> routing protocol A that is slightly more (say 5%)
>> power-consuming 
>>>>>>>> than routing protocol B. But suppose protocol A gives rise
>>>>>> to a data
>>>>>>>> forwarding solution that is 50% more power-efficient?
>>>>>>>> 
>>>>>>>> ---
>>>>>>>> 
>>>>>>>> Section 3.4 para 2
>>>>>>>> 
>>>>>>>> "As low-power wireless networks can have very low data rates,
>>>>>>>> protocols which require a minimum control packet rate can have
>>>>>>>> unbounded control overhead."
>>>>>>>> 
>>>>>>>> I know what you mean, but I had to parse several times.
>>>> How about...
>>>>>>>> 
>>>>>>>> The control overhead is the ratio of control data to
>>>>>> payload data. A
>>>>>>>> high control overhead indicates that precious network resources
>>>>>>>> (bandwidth, power, or CPU) are being consumed by the control
>>>>>>>> protocols instead of being used to transmit data. Where
>>>>>> payload data
>>>>>>>> rates are very low (as is often the case in low-power wireless
>>>>>>>> networks) the control overhead can become unbounded for
>> protocols 
>>>>>>>> that require some non-zero background control packet rate.
>>>>>>>> 
>>>>>>>> ---
>>>>>>>> 
>>>>>>>> Section 3.4 para 2
>>>>>>>> 
>>>>>>>> s/never meet the condition can be forced/never meet the
>> condition 
>>>>>>>> could be forced/
>>>>>>>> 
>>>>>>>> ---
>>>>>>>> 
>>>>>>>> Section 4 para 3
>>>>>>>> 
>>>>>>>> "multiple layer 2 hops away"
>>>>>>>> Really?
>>>>>>>> Again, I thought we were building an IP routing
>> protocol. If your
>>>>>>>> requirement is layer 2 routing, you need to make that
>>>>>> visible up front.
>>>>>>>> But, I can see why you are interested in L2 hops as well
>>>> as L3 hops
>>>>>>>> since they all consume power.
>>>>>>>> 
>>>>>>>> This comes back to the question about whether all nodes are
>>>>>> routers. 
>>>>>>>> Perhaps some repeaters are not routers?
>>>>>>>> 
>>>>>>>> But can't we actually factor the L2 hops into the
>>>> definition of the
>>>>>>>> L3 hop?
>>>>>>>> 
>>>>>>>> ---
>>>>>>>> 
>>>>>>>> Section 4 para 3
>>>>>>>> 
>>>>>>>> "...nodes may only advertise..."
>>>>>>>> This sounds prohibitive!
>>>>>>>> 
>>>>>>>> ---
>>>>>>>> 
>>>>>>>> Section 4 para 4
>>>>>>>> 
>>>>>>>> "Neighbor discovery is a critical component of any routing
>>>>>> protocol."
>>>>>>>> I think I disagree.
>>>>>>>> It is clear that routing protocols need to know their
>>>> neighbors. It
>>>>>>>> is not clear that this requires that the discovery be
>> part of the 
>>>>>>>> routing protocol.
>>>>>>>> 
>>>>>>>> Later you have:
>>>>>>>> "...key component of many protocols."
>>>>>>>> This is less strong than the initial sentence.
>>>>>>>> 
>>>>>>>> ---
>>>>>>>> 
>>>>>>>> Section 4
>>>>>>>> 
>>>>>>>> "Protocols Today"
>>>>>>>> 
>>>>>>>> Is this a section 4.1 headers?
>>>>>>>> 
>>>>>>>> ---
>>>>>>>> 
>>>>>>>> Section 4 "Protocols Today" para 2
>>>>>>>> 
>>>>>>>> I don't think the MPLS TE example is a good one. It is
>>>>>> certainly not
>>>>>>>> correct that the TED has to be fully distributed around
>>>> the network.
>>>>>>>> There are some very good examples of where "stub TE
>> areas" do not 
>>>>>>>> need to know the TE information for the whole of the
>> rest of the 
>>>>>>>> network.
>>>>>>>> 
>>>>>>>> ---
>>>>>>>> 
>>>>>>>> Section 4 Table
>>>>>>>> 
>>>>>>>> I'm prepared to bet that a lot of people will be upset by
>>>>>> the use of
>>>>>>>> "fail"
>>>>>>>> for their favorite protocols. It would seem that "?" is more
>>>>>>>> appropriate in many cells.
>>>>>>>> 
>>>>>>>> ---
>>>>>>>> 
>>>>>>>> Section 5.1
>>>>>>>> Is it worth replacing "OSPF" with "OSPF or IS-IS"?
>>>>>>>> 
>>>>>>>> ---
>>>>>>>> 
>>>>>>>> Section 14.
>>>>>>>> Your three ROLL requirements drafts are Normative
>>>>>> References, I think.
>>>>>>>> 
>>>>>>>> _______________________________________________
>>>>>>>> Roll mailing list
>>>>>>>> Roll@ietf.org
>>>>>>>> https://www.ietf.org/mailman/listinfo/roll
>>>>>>>> 
>>>>>>> _______________________________________________
>>>>>>> Roll mailing list
>>>>>>> Roll@ietf.org
>>>>>>> https://www.ietf.org/mailman/listinfo/roll
>>>>>> 
>>>>>> 
>>>> 
>>>> 
>> 
>> _______________________________________________
>> Roll mailing list
>> Roll@ietf.org
>> https://www.ietf.org/mailman/listinfo/roll
>> 

_______________________________________________
Roll mailing list
Roll@ietf.org
https://www.ietf.org/mailman/listinfo/roll


From roll-bounces@ietf.org  Thu Aug 28 05:38:31 2008
Return-Path: <roll-bounces@ietf.org>
X-Original-To: roll-archive@ietf.org
Delivered-To: ietfarch-roll-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id BA24D3A6C02;
	Thu, 28 Aug 2008 05:38:31 -0700 (PDT)
X-Original-To: roll@core3.amsl.com
Delivered-To: roll@core3.amsl.com
Received: from localhost (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 4210E3A6C02
	for <roll@core3.amsl.com>; Thu, 28 Aug 2008 05:38:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.299
X-Spam-Level: 
X-Spam-Status: No, score=-5.299 tagged_above=-999 required=5 tests=[AWL=1.300, 
	BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32])
	by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id gZG2V5m35eQ6 for <roll@core3.amsl.com>;
	Thu, 28 Aug 2008 05:38:29 -0700 (PDT)
Received: from ams-iport-1.cisco.com (ams-iport-1.cisco.com [144.254.224.140])
	by core3.amsl.com (Postfix) with ESMTP id 2D19B3A6B2A
	for <roll@ietf.org>; Thu, 28 Aug 2008 05:38:28 -0700 (PDT)
X-IronPort-AV: E=Sophos;i="4.32,286,1217808000"; d="scan'208";a="18525265"
Received: from ams-dkim-2.cisco.com ([144.254.224.139])
	by ams-iport-1.cisco.com with ESMTP; 28 Aug 2008 12:38:29 +0000
Received: from ams-core-1.cisco.com (ams-core-1.cisco.com [144.254.224.150])
	by ams-dkim-2.cisco.com (8.12.11/8.12.11) with ESMTP id m7SCcTrM032196; 
	Thu, 28 Aug 2008 14:38:29 +0200
Received: from xbh-ams-331.emea.cisco.com (xbh-ams-331.cisco.com
	[144.254.231.71])
	by ams-core-1.cisco.com (8.13.8/8.13.8) with ESMTP id m7SCcTW3011228;
	Thu, 28 Aug 2008 12:38:29 GMT
Received: from xmb-ams-337.cisco.com ([144.254.231.82]) by
	xbh-ams-331.emea.cisco.com with Microsoft SMTPSVC(6.0.3790.1830); 
	Thu, 28 Aug 2008 14:38:29 +0200
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Date: Thu, 28 Aug 2008 14:37:53 +0200
Message-ID: <7892795E1A87F04CADFCCF41FADD00FC0625ED6C@xmb-ams-337.emea.cisco.com>
In-Reply-To: <51661468CBD1354294533DA79E85955A0109FE71@XCH-SW-5V2.sw.nos.boeing.com>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: [Roll] draft-ietf-roll-protocols-survey-00
Thread-Index: AckF4uWWv+jCr8q7RKKuNS7geV3eIgA6l4jAAFZXU+0ACvR8MAAENIb7AACOAHAAAGaHlQABSNJwACc9dbA=
References: <51661468CBD1354294533DA79E85955A0109FE32@XCH-SW-5V2.sw.nos.boeing.com><C4DB55F2.50B24%jvasseur@cisco.com>
	<51661468CBD1354294533DA79E85955A0109FE71@XCH-SW-5V2.sw.nos.boeing.com>
From: "Pascal Thubert (pthubert)" <pthubert@cisco.com>
To: "Drake, John E" <John.E.Drake2@boeing.com>,
	"Jean Philippe Vasseur (jvasseur)" <jvasseur@cisco.com>,
	"Adrian Farrel" <adrian@olddog.co.uk>, <roll@ietf.org>
X-OriginalArrivalTime: 28 Aug 2008 12:38:29.0840 (UTC)
	FILETIME=[F9953D00:01C9090A]
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; l=19962; t=1219927109;
	x=1220791109; c=relaxed/simple; s=amsdkim2001;
	h=Content-Type:From:Subject:Content-Transfer-Encoding:MIME-Version;
	d=cisco.com; i=pthubert@cisco.com;
	z=From:=20=22Pascal=20Thubert=20(pthubert)=22=20<pthubert@ci
	sco.com>
	|Subject:=20RE=3A=20[Roll]=20draft-ietf-roll-protocols-surv
	ey-00 |Sender:=20;
	bh=sM+LIKZ4ad3RpJYbbSmkDhGnvWpbVt1/eNgFchG97o4=;
	b=EkChRnd/29PF7eBKk8RY4hjj/cBtPubR3LAuXW0dyUYoRA/+PWyi2/vqC4
	qUphGIFoz4QVptgVmKxSW0b10B0Apx2lXaUyEFfGffAIfsp7dTWw7bKjsUr3
	RWURTUQiVz;
Authentication-Results: ams-dkim-2; header.From=pthubert@cisco.com; dkim=pass (
	sig from cisco.com/amsdkim2001 verified; ); 
Subject: Re: [Roll] draft-ietf-roll-protocols-survey-00
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/roll>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Sender: roll-bounces@ietf.org
Errors-To: roll-bounces@ietf.org

Hi John:

I suspect that this discussion is already solution space thus should happen=
 after rechartering.

NEW to me means that we can't just pick an existing RFC and be done with it=
. This is what ROLL is chartered to evaluate and this is why the protocols =
survey is promoted to WG doc.

To work on something NEW we need to recharter. =


IOW, even if the solution is heavily based on existing work, with say, a sp=
ecific set of features made mandatory (a profile of some sort), and eventua=
lly a few new ones added, we need to specify that in an RFC and we need a g=
roup chartered to do so. =


Pascal

>-----Original Message-----
>From: roll-bounces@ietf.org [mailto:roll-bounces@ietf.org] On Behalf Of Dr=
ake, John E
>Sent: mercredi 27 ao=FBt 2008 19:48
>To: Jean Philippe Vasseur (jvasseur); Adrian Farrel; roll@ietf.org
>Subject: Re: [Roll] draft-ietf-roll-protocols-survey-00
>
>JP,
>
>Oopsie, my mistake.
>
>However, I think my comment still stands, particularly if the working
>group plans to use this I-D for deciding whether to invent at least one,
>but probably many, new routing protocols.
>
>Thanks,
>
>John
>
>>-----Original Message-----
>>From: JP Vasseur [mailto:jvasseur@cisco.com]
>>Sent: Wednesday, August 27, 2008 10:05 AM
>>To: Drake, John E; Adrian Farrel; roll@ietf.org
>>Subject: Re: [Roll] draft-ietf-roll-protocols-survey-00
>>
>>John,
>>
>>
>>On 8/27/08 6:57 PM, "Drake, John E" <John.E.Drake2@boeing.com> wrote:
>>
>>> Comment inline
>>>
>>>> -----Original Message-----
>>>> From: JP Vasseur [mailto:jvasseur@cisco.com]
>>>> Sent: Wednesday, August 27, 2008 9:38 AM
>>>> To: Drake, John E; Adrian Farrel; roll@ietf.org
>>>> Subject: Re: [Roll] draft-ietf-roll-protocols-survey-00
>>>>
>>>> Hi John,
>>>>
>>>>
>>>> On 8/27/08 4:45 PM, "Drake, John E"
>><John.E.Drake2@boeing.com> wrote:
>>>>
>>>>> JP,
>>>>>
>>>>> I thought that was exactly Adrian's point.
>>>>
>>>> Ok let's have him express his opinion.
>>>>
>>>>>
>>>>> If you evaluate a bunch of routing protocols as they exist
>>>> today in a
>>>>> new operational environment and conclude that none of them are
>>>>> appropriate, then you have no choice but to conclude that
>>>> you need to
>>>>> invent at least one, but probably many, new routing
>>protocols.  It's
>>>>> not like this hasn't been done before.
>>>>>
>>>>> I took Adrian's note to say that doing this is not
>>>> sufficient and that
>>>>> what needed to be done was to characterize the new operational
>>>>> environment, propose changes needed in each routing protocol to
>>>>> address the new operational environment, and then evaluate
>>>> these changes.
>>>>>
>>>>
>>>> John, I fully respect your opinion. Feel free to propose these
>>>> changes in light of the routing requirements expressed in
>>the related
>>>> WG document.
>>>> Please make sure to fully understand them though, these
>>networks have
>>>> fairly unique characteristics that do require significant
>>background.
>>>
>>> JD:  I would think this is the responsibility of the authors who are
>>> requesting that their I-D be adopted by the working group.
>>
>>This is already a WG document and there was a consensus within the WG.
>>
>>JP.
>>
>>>
>>>>
>>>> JP.
>>>>
>>>>> Thanks,
>>>>>
>>>>> John
>>>>>
>>>>>> -----Original Message-----
>>>>>> From: JP Vasseur [mailto:jvasseur@cisco.com]
>>>>>> Sent: Wednesday, August 27, 2008 2:24 AM
>>>>>> To: Drake, John E; Adrian Farrel; roll@ietf.org
>>>>>> Subject: Re: [Roll] draft-ietf-roll-protocols-survey-00
>>>>>>
>>>>>> John,
>>>>>>
>>>>>> I do not think that this was Adrian's point. Your
>>feed-back is more
>>>>>> than welcome but please argue a bit more ...
>>>>>>
>>>>>> Thanks.
>>>>>>
>>>>>> JP.
>>>>>>
>>>>>>
>>>>>> On 8/25/08 6:13 PM, "Drake, John E"
>>>> <John.E.Drake2@boeing.com> wrote:
>>>>>>
>>>>>>> Adrian,
>>>>>>>
>>>>>>> An excellent note - I agree completely.  We need fewer routing
>>>>>>> protocols, not more.
>>>>>>>
>>>>>>> Thanks,
>>>>>>>
>>>>>>> John
>>>>>>>
>>>>>>>> -----Original Message-----
>>>>>>>> From: Adrian Farrel [mailto:adrian@olddog.co.uk]
>>>>>>>> Sent: Sunday, August 24, 2008 5:14 AM
>>>>>>>> To: roll@ietf.org
>>>>>>>> Subject: [Roll] draft-ietf-roll-protocols-survey-00
>>>>>>>>
>>>>>>>> Hi,
>>>>>>>>
>>>>>>>> As one of the two tourists who raised a hand in Dublin
>>to express
>>>>>>>> uneasiness about this I-D becoming a WG draft, I
>>thought I should
>>>>>>>> write a note about my concerns.
>>>>>>>>
>>>>>>>> I should caveat this by saying that I do appreciate the
>>>>>> need for this
>>>>>>>> work, and that the author-team will, I'm sure, do a fine job at
>>>>>>>> delivering what the working group needs. My concerns were
>>>> much more
>>>>>>>> about getting the direction of the I-D right before
>>>>>> accepting it as I
>>>>>>>> think it is often harder to recast an I-D once it is within the
>>>>>>>> working group.
>>>>>>>>
>>>>>>>> Below, please find my major discussion point. I have
>>also done a
>>>>>>>> review of the draft and found a bunch of
>>issues/questions of more
>>>>>>>> minor importance.
>>>>>>>>
>>>>>>>> Regards,
>>>>>>>> Adrian
>>>>>>>>
>>>>>>>> =3D=3D=3D
>>>>>>>>
>>>>>>>> The analysis of the routing protocols is predicated on what
>>>>>> they are
>>>>>>>> currently used for. To some extent this is reasonable
>>>>>>>> - the easiest analysis of a routing protocol is in its
>>>> operational
>>>>>>>> environment. But to use this analysis as the basis of a
>>>>>> decision for
>>>>>>>> use of a protocol in a new environment is not so
>>>> reasonable. If you
>>>>>>>> want to show that none of today's protocols has been
>>>>>> designed for use
>>>>>>>> in the ROLL environment, then I don't suppose anyone will be
>>>>>>>> surprised. However, what we are really interested in is
>>>> whether any
>>>>>>>> of the existing protocols is suitable for adaptation for
>>>>>> use in ROLL,
>>>>>>>> whether the those adaptations would be contrived and
>>>>>> technically hard
>>>>>>>> (or flaky), and whether it would be more efficient to
>>>> design a new
>>>>>>>> protocol.
>>>>>>>>
>>>>>>>> For an example (and I'm not proposing this as the solution
>>>>>> for ROLL),
>>>>>>>> an IGP could easily be adapted to flood on only certain
>>links, to
>>>>>>>> discard certain LSAs, and to build a FIB according to
>>>>>> specific rules.
>>>>>>>> This would not be a large change to the protocol,
>>>> although it would
>>>>>>>> obviously not be interoperable.
>>>>>>>>
>>>>>>>> To discard from consideration any protocol based on its
>>>>>> behavior in a
>>>>>>>> certain environment without setting it in the context of your
>>>>>>>> forwarding paradigm and without examining the potential
>>>> to adapt a
>>>>>>>> protocol to that environment is wrong. If all you wanted
>>>> to do was
>>>>>>>> show that no current variant of any existing routing
>>protocol is
>>>>>>>> immediately applicable to ROLL, then that would be easy and
>>>>>> would not
>>>>>>>> be a surprise. But to imply that protocols are not open for
>>>>>>>> adaptation is more serious.
>>>>>>>>
>>>>>>>> This is not to say that inventing a new protocol would be
>>>> wrong or
>>>>>>>> not fun.
>>>>>>>> Only that your reasons for discarding protocols are
>>>> poorly founded.
>>>>>>>> You have focused on the operation of the routing
>>>> protocol, not the
>>>>>>>> purpose of the routing protocol. To give a better
>>>> understanding of
>>>>>>>> why you are discarding a protocol, you must show what
>>you want to
>>>>>>>> achieve as your forwarding paradigm. The requirements
>>>>>> documents make
>>>>>>>> some start at this.
>>>>>>>> For example, draft-ietf-roll-urban-routing-reqs talks about:
>>>>>>>> - routing to minimise power usage
>>>>>>>> - routing to consider node and link capabilities
>>>>>>>> - routing protocol to scale within CPU, memory and power limits
>>>>>>>> - routing according to different metrics (latency is cited)
>>>>>>>>
>>>>>>>> Such considerations are a good start to understanding the
>>>>>> forwarding
>>>>>>>> paradigm in ROLL, but would not be good enough to use to
>>>>>> devise a new
>>>>>>>> routing protocol, so I don't see how they can be good enough to
>>>>>>>> determine whether an existing protocol should be discarded,
>>>>>> modified,
>>>>>>>> or used.
>>>>>>>>
>>>>>>>> =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
>>>>>>>>
>>>>>>>> More specific comments on the draft follow.
>>>>>>>>
>>>>>>>> ---
>>>>>>>>
>>>>>>>> Do we have a commitment from the WG that any new protocol
>>>> developed
>>>>>>>> will be held to the same standards? That is, that the new
>>>> protocol
>>>>>>>> MUST achieve a "pass" in very column of the table in
>>>>>> section 4. Or is
>>>>>>>> there scope for pragmatism allowing trade-offs in the new
>>>> protocol
>>>>>>>> such that in some environments it achieves a pass in some
>>>> columns,
>>>>>>>> and in other environments it achieves a pass in other columns.
>>>>>>>>
>>>>>>>> Maybe you could add this as a statement in the Abstract and
>>>>>>>> Introduction
>>>>>>>>
>>>>>>>> ---
>>>>>>>>
>>>>>>>> Why do you include the requirements language
>>boilerplate? I don't
>>>>>>>> think you use (or should use) such language in this document.
>>>>>>>>
>>>>>>>> ---
>>>>>>>>
>>>>>>>> Section 1
>>>>>>>>
>>>>>>>> Can you strip out terms not used in the document?
>>>>>>>>
>>>>>>>> ---
>>>>>>>>
>>>>>>>> Section 2
>>>>>>>>
>>>>>>>> You quote CPU power in MHz. Although that is the practical
>>>>>> electronic
>>>>>>>> limit, maybe MIPS would be a better measure.
>>>>>>>>
>>>>>>>> ---
>>>>>>>>
>>>>>>>> Section 3 para 2
>>>>>>>>
>>>>>>>> "If a protocol cannot meet even these minimalist criteria..."
>>>>>>>> I think your use of "cannot" is correct in the context of the
>>>>>>>> sentence, but I think your I-D examines "does not"
>>>>>>>>
>>>>>>>> "...is unlikely to be good candidate..."
>>>>>>>> Too much prevarication!
>>>>>>>>
>>>>>>>> ---
>>>>>>>>
>>>>>>>> Section 3 para 3
>>>>>>>>
>>>>>>>> "...the protocol does not appear to contain sufficient
>>>>>> flexibility..."
>>>>>>>> The problem with this is that it is very mushy!
>>>>>>>> It is OK to discard a protocol that is not flexible enough
>>>>>> to handle
>>>>>>>> your requirements. It is not OK to discard a protocol
>>because you
>>>>>>>> don't appear to know how to extend it.
>>>>>>>>
>>>>>>>> A example comes in the somewhat contentious table in section 4
>>>>>>>> :-) Here, for OSPF, you say that there is a "fail" for
>>>>>> conveying node
>>>>>>>> costs.
>>>>>>>> But there is already LSA available for carrying node
>>>> capabilities,
>>>>>>>> and there are opaque LSAs available for carrying additional
>>>>>>>> "unconventional"
>>>>>>>> information.
>>>>>>>>
>>>>>>>> All this sort of ties to my main point. Of course, the
>>protocols
>>>>>>>> don't do exactly what you want already, but a more thorough
>>>>>> survey is
>>>>>>>> needed if you what to use this I-D as the reason for excluding
>>>>>>>> protocols.
>>>>>>>>
>>>>>>>> ---
>>>>>>>>
>>>>>>>> Section 3.2 para 1
>>>>>>>> "...with size ranging from a minimum..."
>>>>>>>> I think you mean "...with maximum size ranging from a
>>minimum..."
>>>>>>>>
>>>>>>>> "very large networks"
>>>>>>>> Can you de-fluff this? Some people might think that 250
>>>>>> nodes is very
>>>>>>>> large
>>>>>>>> ;-)
>>>>>>>>
>>>>>>>> "network depths"
>>>>>>>> Would be worth including your definition here.
>>>>>>>>
>>>>>>>> --
>>>>>>>>
>>>>>>>> Section 3.2 para 1
>>>>>>>>
>>>>>>>> Is every network node a router?
>>>>>>>> draft-ietf-roll-urban-routing-reqs says "Sensor nodes are
>>>>>> capable of
>>>>>>>> forwarding data." If every node is a router and
>>>> participates in the
>>>>>>>> routing protocol, this creates a very different
>>environment from
>>>>>>>> saying that most sensors are hosts, and some are routers. I
>>>>>>>> appreciate that "capable" does not imply "do".
>>>>>>>>
>>>>>>>> ---
>>>>>>>>
>>>>>>>> Associated with the previous point, I think you might spend
>>>>>> a little
>>>>>>>> more time discussing the definition of a link in ROLL. It
>>>> is clear
>>>>>>>> that in a wireless n/w a link may exist between any two
>>nodes in
>>>>>>>> range.
>>>>>>>> If that is
>>>>>>>> what you mean, then it would help to make it clear. On
>>the other
>>>>>>>> hand, "link" could be defined as an active neighbor
>>relationship
>>>>>>>> between a pair of routers. Or something else.
>>>>>>>>
>>>>>>>> This becomes important as we try to understand how the
>>>>>> protocol must
>>>>>>>> scale, and what it is supposed to do.
>>>>>>>>
>>>>>>>> I presume that the concept of "parallel links" between
>>>> neighbors is
>>>>>>>> going to have no meaning at the moment. That is, you
>>use only one
>>>>>>>> frequency in any network. Maybe I presume wrong, in which
>>>> case, you
>>>>>>>> need to refine the definition of "network density" in
>>section 3.1.
>>>>>>>>
>>>>>>>> ---
>>>>>>>>
>>>>>>>> Section 3.2 para 1
>>>>>>>> Final sentence is a bit mangled.
>>>>>>>>
>>>>>>>> ---
>>>>>>>>
>>>>>>>> Section 3.2 para 2
>>>>>>>>
>>>>>>>> I can see why scaling with O(L) may be an issue, but it may
>>>>>> depend on
>>>>>>>> the definitions of links and routers. Also it may
>>depend on what
>>>>>>>> magnitude you expect for L. Perhaps you could give some
>>>>>> ball-parks in
>>>>>>>> the previous paragraph as you do for N and D. Without
>>that, it is
>>>>>>>> hard to justify the claim that scaling with O(L) is a problem.
>>>>>>>>
>>>>>>>> ---
>>>>>>>>
>>>>>>>> Section 3.3
>>>>>>>>
>>>>>>>> Can you add SINR to your terminology?
>>>>>>>>
>>>>>>>> "...not trigger unnecessary responses..."
>>>>>>>> I think that this is subjective and unhelpful. Can you
>>>> rephrase to
>>>>>>>> capture a quantifiable requirement?
>>>>>>>>
>>>>>>>> s/link changes to propagate across/link changes to be
>>propagated
>>>>>>>> across/
>>>>>>>>
>>>>>>>> s/O(l)/O(L)/
>>>>>>>>
>>>>>>>> ---
>>>>>>>>
>>>>>>>> Section 3.3 final para
>>>>>>>>
>>>>>>>> You have "transmissions", "broadcast", and "route updates".
>>>>>>>> Can you use a
>>>>>>>> consistent term? It may be less pretty English, but it
>>would be a
>>>>>>>> better way to avoid accusations of bias :-)
>>>>>>>>
>>>>>>>> Perhaps...
>>>>>>>> More precisely, loss responses that require transmissions
>>>>>> within the
>>>>>>>> network of O(N) fail, while those that are limited to
>>>> O(L) or O(D)
>>>>>>>> pass.
>>>>>>>>
>>>>>>>> ---
>>>>>>>>
>>>>>>>> Section 3.4 para 1
>>>>>>>>
>>>>>>>> "In terms of routing structure, any proposed L2N
>>routing protocol
>>>>>>>> ought to support the autonomous organization and
>>>>>> configuration of the
>>>>>>>> network at the lowest possible energy cost."
>>>>>>>>
>>>>>>>> Why "L2N"? I thought "Networks of low power wireless devices
>>>>>>>> introduce novel IP routing issues."
>>>>>>>>
>>>>>>>> "ought" is not a recognized RFC 2119 word :-)
>>>>>>>>
>>>>>>>> I think "at the lowest possible energy cost" is a statement
>>>>>> that this
>>>>>>>> requirement trumps all others. Is that what you mean?
>>>>>>>>
>>>>>>>> I'm not convinced by the absolute statement you make here.
>>>>>>>> Maybe, this is a
>>>>>>>> question I should take to the requirements documents. Consider
>>>>>>>> routing protocol A that is slightly more (say 5%)
>>power-consuming
>>>>>>>> than routing protocol B. But suppose protocol A gives rise
>>>>>> to a data
>>>>>>>> forwarding solution that is 50% more power-efficient?
>>>>>>>>
>>>>>>>> ---
>>>>>>>>
>>>>>>>> Section 3.4 para 2
>>>>>>>>
>>>>>>>> "As low-power wireless networks can have very low data rates,
>>>>>>>> protocols which require a minimum control packet rate can have
>>>>>>>> unbounded control overhead."
>>>>>>>>
>>>>>>>> I know what you mean, but I had to parse several times.
>>>> How about...
>>>>>>>>
>>>>>>>> The control overhead is the ratio of control data to
>>>>>> payload data. A
>>>>>>>> high control overhead indicates that precious network resources
>>>>>>>> (bandwidth, power, or CPU) are being consumed by the control
>>>>>>>> protocols instead of being used to transmit data. Where
>>>>>> payload data
>>>>>>>> rates are very low (as is often the case in low-power wireless
>>>>>>>> networks) the control overhead can become unbounded for
>>protocols
>>>>>>>> that require some non-zero background control packet rate.
>>>>>>>>
>>>>>>>> ---
>>>>>>>>
>>>>>>>> Section 3.4 para 2
>>>>>>>>
>>>>>>>> s/never meet the condition can be forced/never meet the
>>condition
>>>>>>>> could be forced/
>>>>>>>>
>>>>>>>> ---
>>>>>>>>
>>>>>>>> Section 4 para 3
>>>>>>>>
>>>>>>>> "multiple layer 2 hops away"
>>>>>>>> Really?
>>>>>>>> Again, I thought we were building an IP routing
>>protocol. If your
>>>>>>>> requirement is layer 2 routing, you need to make that
>>>>>> visible up front.
>>>>>>>> But, I can see why you are interested in L2 hops as well
>>>> as L3 hops
>>>>>>>> since they all consume power.
>>>>>>>>
>>>>>>>> This comes back to the question about whether all nodes are
>>>>>> routers.
>>>>>>>> Perhaps some repeaters are not routers?
>>>>>>>>
>>>>>>>> But can't we actually factor the L2 hops into the
>>>> definition of the
>>>>>>>> L3 hop?
>>>>>>>>
>>>>>>>> ---
>>>>>>>>
>>>>>>>> Section 4 para 3
>>>>>>>>
>>>>>>>> "...nodes may only advertise..."
>>>>>>>> This sounds prohibitive!
>>>>>>>>
>>>>>>>> ---
>>>>>>>>
>>>>>>>> Section 4 para 4
>>>>>>>>
>>>>>>>> "Neighbor discovery is a critical component of any routing
>>>>>> protocol."
>>>>>>>> I think I disagree.
>>>>>>>> It is clear that routing protocols need to know their
>>>> neighbors. It
>>>>>>>> is not clear that this requires that the discovery be
>>part of the
>>>>>>>> routing protocol.
>>>>>>>>
>>>>>>>> Later you have:
>>>>>>>> "...key component of many protocols."
>>>>>>>> This is less strong than the initial sentence.
>>>>>>>>
>>>>>>>> ---
>>>>>>>>
>>>>>>>> Section 4
>>>>>>>>
>>>>>>>> "Protocols Today"
>>>>>>>>
>>>>>>>> Is this a section 4.1 headers?
>>>>>>>>
>>>>>>>> ---
>>>>>>>>
>>>>>>>> Section 4 "Protocols Today" para 2
>>>>>>>>
>>>>>>>> I don't think the MPLS TE example is a good one. It is
>>>>>> certainly not
>>>>>>>> correct that the TED has to be fully distributed around
>>>> the network.
>>>>>>>> There are some very good examples of where "stub TE
>>areas" do not
>>>>>>>> need to know the TE information for the whole of the
>>rest of the
>>>>>>>> network.
>>>>>>>>
>>>>>>>> ---
>>>>>>>>
>>>>>>>> Section 4 Table
>>>>>>>>
>>>>>>>> I'm prepared to bet that a lot of people will be upset by
>>>>>> the use of
>>>>>>>> "fail"
>>>>>>>> for their favorite protocols. It would seem that "?" is more
>>>>>>>> appropriate in many cells.
>>>>>>>>
>>>>>>>> ---
>>>>>>>>
>>>>>>>> Section 5.1
>>>>>>>> Is it worth replacing "OSPF" with "OSPF or IS-IS"?
>>>>>>>>
>>>>>>>> ---
>>>>>>>>
>>>>>>>> Section 14.
>>>>>>>> Your three ROLL requirements drafts are Normative
>>>>>> References, I think.
>>>>>>>>
>>>>>>>> _______________________________________________
>>>>>>>> Roll mailing list
>>>>>>>> Roll@ietf.org
>>>>>>>> https://www.ietf.org/mailman/listinfo/roll
>>>>>>>>
>>>>>>> _______________________________________________
>>>>>>> Roll mailing list
>>>>>>> Roll@ietf.org
>>>>>>> https://www.ietf.org/mailman/listinfo/roll
>>>>>>
>>>>>>
>>>>
>>>>
>>
>>_______________________________________________
>>Roll mailing list
>>Roll@ietf.org
>>https://www.ietf.org/mailman/listinfo/roll
>>
>_______________________________________________
>Roll mailing list
>Roll@ietf.org
>https://www.ietf.org/mailman/listinfo/roll
_______________________________________________
Roll mailing list
Roll@ietf.org
https://www.ietf.org/mailman/listinfo/roll


From roll-bounces@ietf.org  Fri Aug 29 11:47:36 2008
Return-Path: <roll-bounces@ietf.org>
X-Original-To: roll-archive@ietf.org
Delivered-To: ietfarch-roll-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 52A273A6926;
	Fri, 29 Aug 2008 11:47:36 -0700 (PDT)
X-Original-To: roll@core3.amsl.com
Delivered-To: roll@core3.amsl.com
Received: from localhost (localhost [127.0.0.1])
	by core3.amsl.com (Postfix) with ESMTP id 08E083A6926
	for <roll@core3.amsl.com>; Fri, 29 Aug 2008 11:47:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.942
X-Spam-Level: 
X-Spam-Status: No, score=-5.942 tagged_above=-999 required=5 tests=[AWL=0.657, 
	BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32])
	by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id Aqq57DPO1F0r for <roll@core3.amsl.com>;
	Fri, 29 Aug 2008 11:47:34 -0700 (PDT)
Received: from sj-iport-6.cisco.com (sj-iport-6.cisco.com [171.71.176.117])
	by core3.amsl.com (Postfix) with ESMTP id 08F933A6833
	for <roll@ietf.org>; Fri, 29 Aug 2008 11:47:34 -0700 (PDT)
X-IronPort-AV: E=Sophos;i="4.32,293,1217808000"; d="scan'208";a="149246187"
Received: from sj-dkim-2.cisco.com ([171.71.179.186])
	by sj-iport-6.cisco.com with ESMTP; 29 Aug 2008 18:47:38 +0000
Received: from sj-core-2.cisco.com (sj-core-2.cisco.com [171.71.177.254])
	by sj-dkim-2.cisco.com (8.12.11/8.12.11) with ESMTP id m7TIlbSv025813
	for <roll@ietf.org>; Fri, 29 Aug 2008 11:47:37 -0700
Received: from xbh-rtp-211.amer.cisco.com (xbh-rtp-211.cisco.com
	[64.102.31.102])
	by sj-core-2.cisco.com (8.13.8/8.13.8) with ESMTP id m7TIlZCj010505
	for <roll@ietf.org>; Fri, 29 Aug 2008 18:47:37 GMT
Received: from xmb-rtp-213.amer.cisco.com ([64.102.31.112]) by
	xbh-rtp-211.amer.cisco.com with Microsoft SMTPSVC(6.0.3790.1830); 
	Fri, 29 Aug 2008 14:47:36 -0400
Received: from 10.61.64.42 ([10.61.64.42]) by xmb-rtp-213.amer.cisco.com
	([64.102.31.112]) with Microsoft Exchange Server HTTP-DAV ; 
	Fri, 29 Aug 2008 18:47:36 +0000
User-Agent: Microsoft-Entourage/12.12.0.080729
Date: Fri, 29 Aug 2008 20:47:35 +0200
From: JP Vasseur <jvasseur@cisco.com>
To: <roll@ietf.org>
Message-ID: <C4DE10E7.5134F%jvasseur@cisco.com>
Thread-Topic: ROLL WG Interim Meeting, October 6, 2008, San Jose 
Thread-Index: AckKB7OKzv77k8fIoE2esF1neVRDEQ==
In-Reply-To: <20080829184419.CC5FA3A6A9A@core3.amsl.com>
Mime-version: 1.0
X-OriginalArrivalTime: 29 Aug 2008 18:47:36.0463 (UTC)
	FILETIME=[B46979F0:01C90A07]
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; l=811; t=1220035657; x=1220899657;
	c=relaxed/simple; s=sjdkim2002;
	h=Content-Type:From:Subject:Content-Transfer-Encoding:MIME-Version;
	d=cisco.com; i=jvasseur@cisco.com;
	z=From:=20JP=20Vasseur=20<jvasseur@cisco.com>
	|Subject:=20FW=3A=20ROLL=20WG=20Interim=20Meeting,=20Octobe
	r=206,=202008,=20San=20Jose=20 |Sender:=20;
	bh=fDfC3AhOV0bcyrkuONv5dHmKtop9ZIT0E+iwev1KcGQ=;
	b=z2sWeExofeE0Pu49R9i1MkKkOqdYzx15R+pBOeoLicK/q2s7+7ZmcFKJoH
	LtgDjK0GDgDNAwPmYAjJn8DIst8o1oXAIh/XUpMtq1Opi+OAkJJ02EKVCpI7
	tsEDDbCAbM;
Authentication-Results: sj-dkim-2; header.From=jvasseur@cisco.com; dkim=pass (
	sig from cisco.com/sjdkim2002 verified; ); 
Subject: [Roll] FW: ROLL WG Interim Meeting, October 6, 2008, San Jose
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/roll>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>,
	<mailto:roll-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: roll-bounces@ietf.org
Errors-To: roll-bounces@ietf.org


------ Forwarded Message
From: IESG Secretary <iesg-secretary@ietf.org>
Date: Fri, 29 Aug 2008 11:44:19 -0700 (PDT)
To: IETF Announcement list <ietf-announce@ietf.org>
Cc: JP Vasseur <jvasseur@cisco.com>
Subject: ROLL WG Interim Meeting, October 6, 2008, San Jose

In light of the fast progress of the ROLL Working Group and in order not
to delay the progress of the Working Group having it to wait for IETF-73,
we are pleased to announce an Interim ROLL Working meeting that will take
place on October 6, in San Jose, hosted by Cisco Systems (details to be
announced soon), from 2pm to 4:30pm.

Agenda:
- Discussion of draft-ietf-roll-protocols-survey.

For logistic reasons, if you plan to attend, please send an email to JP
Vasseur, ROLL WG co-chair.


------ End of Forwarded Message

_______________________________________________
Roll mailing list
Roll@ietf.org
https://www.ietf.org/mailman/listinfo/roll


