draft-ietf-lwig-terminology-05.txt | draft-ietf-lwig-terminology-06.txt | |||
---|---|---|---|---|
LWIG Working Group C. Bormann | LWIG Working Group C. Bormann | |||
Internet-Draft Universitaet Bremen TZI | Internet-Draft Universitaet Bremen TZI | |||
Intended status: Informational M. Ersue | Intended status: Informational M. Ersue | |||
Expires: January 10, 2014 Nokia Siemens Networks | Expires: June 21, 2014 Nokia Siemens Networks | |||
A. Keranen | A. Keranen | |||
Ericsson | Ericsson | |||
July 09, 2013 | December 18, 2013 | |||
Terminology for Constrained Node Networks | Terminology for Constrained Node Networks | |||
draft-ietf-lwig-terminology-05 | draft-ietf-lwig-terminology-06 | |||
Abstract | Abstract | |||
The Internet Protocol Suite is increasingly used on small devices | The Internet Protocol Suite is increasingly used on small devices | |||
with severe constraints, creating constrained node networks. This | with severe constraints on power, memory and processing resources, | |||
document provides a number of basic terms that have turned out to be | creating constrained node networks. This document provides a number | |||
useful in the standardization work for constrained environments. | of basic terms that have turned out to be useful in the | |||
standardization work for constrained node networks. | ||||
Status of This Memo | Status of This Memo | |||
This Internet-Draft is submitted in full conformance with the | This Internet-Draft is submitted in full conformance with the | |||
provisions of BCP 78 and BCP 79. | provisions of BCP 78 and BCP 79. | |||
Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
Drafts is at http://datatracker.ietf.org/drafts/current/. | Drafts is at http://datatracker.ietf.org/drafts/current/. | |||
Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
This Internet-Draft will expire on January 10, 2014. | This Internet-Draft will expire on June 21, 2014. | |||
Copyright Notice | Copyright Notice | |||
Copyright (c) 2013 IETF Trust and the persons identified as the | Copyright (c) 2013 IETF Trust and the persons identified as the | |||
document authors. All rights reserved. | document authors. All rights reserved. | |||
This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
(http://trustee.ietf.org/license-info) in effect on the date of | (http://trustee.ietf.org/license-info) in effect on the date of | |||
publication of this document. Please review these documents | publication of this document. Please review these documents | |||
carefully, as they describe your rights and restrictions with respect | carefully, as they describe your rights and restrictions with respect | |||
to this document. Code Components extracted from this document must | to this document. Code Components extracted from this document must | |||
include Simplified BSD License text as described in Section 4.e of | include Simplified BSD License text as described in Section 4.e of | |||
the Trust Legal Provisions and are provided without warranty as | the Trust Legal Provisions and are provided without warranty as | |||
described in the Simplified BSD License. | described in the Simplified BSD License. | |||
Table of Contents | Table of Contents | |||
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 | 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 | |||
2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3 | 2. Core Terminology . . . . . . . . . . . . . . . . . . . . . . 3 | |||
2.1. Constrained Nodes . . . . . . . . . . . . . . . . . . . . 3 | 2.1. Constrained Nodes . . . . . . . . . . . . . . . . . . . . 4 | |||
2.2. Constrained Networks . . . . . . . . . . . . . . . . . . 4 | 2.2. Constrained Networks . . . . . . . . . . . . . . . . . . 5 | |||
2.2.1. Challenged Networks . . . . . . . . . . . . . . . . . 5 | 2.2.1. Challenged Networks . . . . . . . . . . . . . . . . . 6 | |||
2.3. Constrained Node Networks . . . . . . . . . . . . . . . . 5 | 2.3. Constrained Node Networks . . . . . . . . . . . . . . . . 6 | |||
2.3.1. LLN ("low-power lossy network") . . . . . . . . . . . 6 | 2.3.1. LLN ("low-power lossy network") . . . . . . . . . . . 7 | |||
2.3.2. LoWPAN, 6LoWPAN . . . . . . . . . . . . . . . . . . . 6 | 2.3.2. LoWPAN, 6LoWPAN . . . . . . . . . . . . . . . . . . . 7 | |||
3. Classes of Constrained Devices . . . . . . . . . . . . . . . 8 | 3. Classes of Constrained Devices . . . . . . . . . . . . . . . 8 | |||
4. Power Terminology . . . . . . . . . . . . . . . . . . . . . . 10 | 4. Power Terminology . . . . . . . . . . . . . . . . . . . . . . 10 | |||
4.1. Scaling Properties . . . . . . . . . . . . . . . . . . . 10 | 4.1. Scaling Properties . . . . . . . . . . . . . . . . . . . 10 | |||
4.2. Classes of Energy Limitation . . . . . . . . . . . . . . 10 | 4.2. Classes of Energy Limitation . . . . . . . . . . . . . . 10 | |||
4.3. Strategies of Using Power for Communication . . . . . . . 11 | 4.3. Strategies of Using Power for Communication . . . . . . . 11 | |||
5. Security Considerations . . . . . . . . . . . . . . . . . . . 13 | 5. Security Considerations . . . . . . . . . . . . . . . . . . . 14 | |||
6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 13 | 6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 14 | |||
7. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 13 | 7. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 14 | |||
8. Informative References . . . . . . . . . . . . . . . . . . . 13 | 8. Informative References . . . . . . . . . . . . . . . . . . . 14 | |||
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 15 | Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 16 | |||
1. Introduction | 1. Introduction | |||
Small devices with limited CPU, memory, and power resources, so | Small devices with limited CPU, memory, and power resources, so | |||
called constrained devices (also known as sensor, smart object, or | called constrained devices (often used as a sensor/actuator, a smart | |||
smart device) can constitute a network, becoming "constrained nodes" | object, or a smart device) can form a network, becoming "constrained | |||
in that network. Such a network may itself exhibit constraints, e.g. | nodes" in that network. Such a network may itself exhibit | |||
with unreliable or lossy channels, limited and unpredictable | constraints, e.g. with unreliable or lossy channels, limited and | |||
bandwidth, and a highly dynamic topology. | unpredictable bandwidth, and a highly dynamic topology. | |||
Constrained devices might be in charge of gathering information in | Constrained devices might be in charge of gathering information in | |||
diverse settings including natural ecosystems, buildings, and | diverse settings including natural ecosystems, buildings, and | |||
factories and sending the information to one or more server stations. | factories and sending the information to one or more server stations. | |||
Constrained devices may work under severe resource constraints such | They also act on information, by performing some physical action, | |||
as limited battery and computing power, little memory, as well as | including displaying it. Constrained devices may work under severe | |||
insufficient wireless bandwidth and ability to communicate. Other | resource constraints such as limited battery and computing power, | |||
little memory, as well as insufficient wireless bandwidth and ability | ||||
to communicate; these constraints often exacerbate each other. Other | ||||
entities on the network, e.g., a base station or controlling server, | entities on the network, e.g., a base station or controlling server, | |||
might have more computational and communication resources and could | might have more computational and communication resources and could | |||
support the interaction between the constrained devices and | support the interaction between the constrained devices and | |||
applications in more traditional networks. | applications in more traditional networks. | |||
Today diverse sizes of constrained devices with different resources | Today diverse sizes of constrained devices with different resources | |||
and capabilities are becoming connected. Mobile personal gadgets, | and capabilities are becoming connected. Mobile personal gadgets, | |||
building-automation devices, cellular phones, Machine-to-machine | building-automation devices, cellular phones, Machine-to-machine | |||
(M2M) devices, etc. benefit from interacting with other "things" | (M2M) devices, etc. benefit from interacting with other "things" | |||
nearby or somewhere in the Internet. With this, the Internet of | nearby or somewhere in the Internet. With this, the Internet of | |||
Things (IoT) becomes a reality, built up out of uniquely identifiable | Things (IoT) becomes a reality, built up out of uniquely identifiable | |||
and addressable objects (things). And over the next decade, this | and addressable objects (things). And over the next decade, this | |||
could grow to large numbers [fifty-billion] of Internet-connected | could grow to large numbers [fifty-billion] of Internet-connected | |||
constrained devices, greatly increasing the Internet's size and | constrained devices, greatly increasing the Internet's size and | |||
scope. | scope. | |||
The present document provides a number of basic terms that have | The present document provides a number of basic terms that have | |||
turned out to be useful in the standardization work for constrained | turned out to be useful in the standardization work for constrained | |||
environments. The intention is not to exhaustively cover the field, | environments. The intention is not to exhaustively cover the field, | |||
but to make sure a few core terms are used consistently between | but to make sure a few core terms are used consistently between | |||
different groups cooperating in this space. | different groups cooperating in this space. | |||
In this document, the term "byte" is used in its now customary sense | In this document, the term "byte" is used in its now customary sense | |||
as a synonym for "octet". Where sizes of semiconductor memory are | as a synonym for "octet". Where sizes of semiconductor memory are | |||
given, the prefix "kibi" (1024) is combined with "byte" to | given, the prefix "kibi" (1024) is combined with "byte" to | |||
"kibibyte", abbreviated "KiB", for 1024 bytes [ISQ-13]. | "kibibyte", abbreviated "KiB", for 1024 bytes [ISQ-13]. | |||
2. Terminology | In computing, the term "power" is often used for the concept of | |||
"computing power" or "processing power", as in CPU performance. | ||||
Unless explicitly stated otherwise, in this document the term stands | ||||
for electrical power. "Mains-powered" is used as a short-hand for | ||||
being permanently connected to a stable electrical power grid. | ||||
The main focus of this field of work appears to be _scaling_: | 2. Core Terminology | |||
There are two important aspects to _scaling_ within the Internet of | ||||
Things: | ||||
o Scaling up Internet technologies to a large number [fifty-billion] | o Scaling up Internet technologies to a large number [fifty-billion] | |||
of inexpensive nodes, while | of inexpensive nodes, while | |||
o scaling down the characteristics of each of these nodes and of the | o scaling down the characteristics of each of these nodes and of the | |||
networks being built out of them, to make this scaling up | networks being built out of them, to make this scaling up | |||
economically and physically viable. | economically and physically viable. | |||
The need for scaling down the characteristics of nodes leads to | The need for scaling down the characteristics of nodes leads to | |||
_constrained nodes_. | _constrained nodes_. | |||
2.1. Constrained Nodes | 2.1. Constrained Nodes | |||
The term "constrained node" is best defined by contrasting the | The term "constrained node" is best defined by contrasting the | |||
characteristics of a constrained node with certain widely held | characteristics of a constrained node with certain widely held | |||
expectations on more familiar Internet nodes: | expectations on more familiar Internet nodes: | |||
Constrained Node: A node where some of the characteristics that are | Constrained Node: A node where some of the characteristics that are | |||
otherwise pretty much taken for granted for Internet nodes in 2013 | otherwise pretty much taken for granted for Internet nodes at the | |||
are not attainable, often due to cost constraints and/or physical | time of writing are not attainable, often due to cost constraints | |||
constraints on characteristics such as size, weight, and available | and/or physical constraints on characteristics such as size, | |||
power and energy. | weight, and available power and energy. The tight limits on | |||
power, memory and processing resources lead to hard upper bounds | ||||
on state, code space and processing cycles, making optimization of | ||||
energy and network bandwidth usage a dominating consideration in | ||||
all design requirements. Also, some layer 2 services such as full | ||||
connectivity and broadcast/multicast may be lacking. | ||||
While this is less than satisfying as a rigorous definition, it is | While this is not a rigorous definition, it is grounded in the state | |||
grounded in the state of the art and clearly sets apart constrained | of the art and clearly sets apart constrained nodes from server | |||
nodes from server systems, desktop or laptop computers, powerful | systems, desktop or laptop computers, powerful mobile devices such as | |||
mobile devices such as smartphones etc. There may be many design | smartphones etc. There may be many design considerations that lead | |||
considerations that lead to these constraints, including cost, size, | to these constraints, including cost, size, weight, and other scaling | |||
weight, and other scaling factors. | factors. | |||
(An alternative name, when the properties as a network node are not | (An alternative name, when the properties as a network node are not | |||
in focus, is "constrained device".) | in focus, is "constrained device".) | |||
There are multiple facets to the constraints on nodes, often applying | There are multiple facets to the constraints on nodes, often applying | |||
in combination, e.g.: | in combination, e.g.: | |||
o constraints on the maximum code complexity (ROM/Flash); | o constraints on the maximum code complexity (ROM/Flash); | |||
o constraints on the size of state and buffers (RAM); | o constraints on the size of state and buffers (RAM); | |||
o constraints on the available power. | o constraints on the amount of computation feasible in a period of | |||
time ("processing power"); | ||||
o constraints on the available (electrical) power; | ||||
o constraints on user interface and accessibility in deployment | ||||
(ability to set keys, update software, etc.). | ||||
Section 3 defines a small number of interesting classes ("class-N" | Section 3 defines a small number of interesting classes ("class-N" | |||
for N=0,1,2) of constrained nodes focusing on relevant combinations | for N=0,1,2) of constrained nodes focusing on relevant combinations | |||
of the first two constraints. With respect to available power, | of the first two constraints. With respect to available (electrical) | |||
[RFC6606] distinguishes "power-affluent" nodes (mains-powered or | power, [RFC6606] distinguishes "power-affluent" nodes (mains-powered | |||
regularly recharged) from "power-constrained nodes" that draw their | or regularly recharged) from "power-constrained nodes" that draw | |||
power from primary batteries or by using energy harvesting; more | their power from primary batteries or by using energy harvesting; | |||
detailed power terminology is given in Section 4. | more detailed power terminology is given in Section 4. | |||
The use of constrained nodes in networks often also leads to | The use of constrained nodes in networks often also leads to | |||
constraints on the networks themselves. However, there may also be | constraints on the networks themselves. However, there may also be | |||
constraints on networks that are largely independent from those of | constraints on networks that are largely independent from those of | |||
the nodes. We therefore distinguish _constrained networks_ and | the nodes. We therefore distinguish _constrained networks_ and | |||
_constrained node networks_. | _constrained node networks_. | |||
2.2. Constrained Networks | 2.2. Constrained Networks | |||
We define "constrained network" in a similar way: | We define "constrained network" in a similar way: | |||
Constrained Network: A network where some of the characteristics | Constrained Network: A network where some of the characteristics | |||
pretty much taken for granted with link layers in common use in | pretty much taken for granted with link layers in common use in | |||
the Internet by 2013, are not attainable. | the Internet at the time of writing, are not attainable. | |||
Again, there may be several reasons for this: | Again, there may be several reasons for this: | |||
o cost constraints on the network, | o cost constraints on the network, | |||
o constraints of the nodes (for constrained node networks), | o constraints of the nodes (for constrained node networks), | |||
o physical constraints (e.g., power constraints, environmental | o physical constraints (e.g., power constraints, environmental | |||
constraints, media constraints such as underwater operation, | constraints, media constraints such as underwater operation, | |||
limited spectrum for very high density, electromagnetic | limited spectrum for very high density, electromagnetic | |||
skipping to change at page 5, line 19 | skipping to change at page 5, line 52 | |||
o technology constraints, such as older and lower speed technologies | o technology constraints, such as older and lower speed technologies | |||
that are still operational and may need to stay in use for some | that are still operational and may need to stay in use for some | |||
more time. | more time. | |||
Constraints may include: | Constraints may include: | |||
o low achievable bit rate (including limits on duty cycle), | o low achievable bit rate (including limits on duty cycle), | |||
o high packet loss, packet loss (delivery rate) variability, | o high packet loss, packet loss (delivery rate) variability, | |||
o highly asymmetric link characteristics, | ||||
o severe penalties for using larger packets (e.g., high packet loss | o severe penalties for using larger packets (e.g., high packet loss | |||
due to link layer fragmentation), | due to link layer fragmentation), | |||
o lack of (or severe constraints on) advanced services such as IP | o lack of (or severe constraints on) advanced services such as IP | |||
multicast. | multicast. | |||
2.2.1. Challenged Networks | 2.2.1. Challenged Networks | |||
A constrained network is not necessarily a _challenged_ network | A constrained network is not necessarily a _challenged_ network | |||
[FALL]: | [FALL]: | |||
skipping to change at page 6, line 10 | skipping to change at page 6, line 43 | |||
Constrained Node Network: A network whose characteristics are | Constrained Node Network: A network whose characteristics are | |||
influenced by being composed of a significant portion of | influenced by being composed of a significant portion of | |||
constrained nodes. | constrained nodes. | |||
A constrained node network always is a constrained network because of | A constrained node network always is a constrained network because of | |||
the network constraints stemming from the node constraints, but may | the network constraints stemming from the node constraints, but may | |||
also have other constraints that already make it a constrained | also have other constraints that already make it a constrained | |||
network. | network. | |||
The rest of this subsection introduces two additional terms that are | ||||
in active use in the area of constrained node networks, without an | ||||
intent to define them: LLN and (6)LoWPAN. | ||||
2.3.1. LLN ("low-power lossy network") | 2.3.1. LLN ("low-power lossy network") | |||
A related term that has been used recently is "low-power lossy | A related term that has been used to describe the focus of the IETF | |||
network" (LLN). In its terminology document, the ROLL working group | working group on Routing Over Low power and Lossy networks (ROLL) is | |||
is saying [I-D.ietf-roll-terminology]: | "low-power lossy network" (LLN). The ROLL terminology document | |||
[I-D.ietf-roll-terminology] defines LLNs as follows: | ||||
LLN: Low power and Lossy networks (LLNs) are typically composed of | LLN: Low power and Lossy networks (LLNs) are typically composed of | |||
many embedded devices with limited power, memory, and processing | many embedded devices with limited power, memory, and processing | |||
resources interconnected by a variety of links, such as IEEE | resources interconnected by a variety of links, such as IEEE | |||
802.15.4 or Low Power WiFi. There is a wide scope of application | 802.15.4 or Low Power WiFi. There is a wide scope of application | |||
areas for LLNs, including industrial monitoring, building | areas for LLNs, including industrial monitoring, building | |||
automation (HVAC, lighting, access control, fire), connected home, | automation (HVAC, lighting, access control, fire), connected home, | |||
healthcare, environmental monitoring, urban sensor networks, | healthcare, environmental monitoring, urban sensor networks, | |||
energy management, assets tracking and refrigeration.. [sic] | energy management, assets tracking and refrigeration.. [sic] | |||
In common usage, LLN often stands for "the network characteristics | Beyond that, LLNs often exhibit considerable loss at the physical | |||
that RPL has been designed for". Beyond what is said in the ROLL | layer, with significant variability of the delivery rate, and some | |||
terminology document, LLNs do appear to have significant loss at the | short-term unreliability, coupled with some medium term stability | |||
physical layer, with significant variability of the delivery rate, | that makes it worthwhile to construct medium-term stable directed | |||
and some short-term unreliability, coupled with some medium term | acyclic graphs for routing and do measurements on the edges such as | |||
stability that makes it worthwhile to construct medium-term stable | ETX [RFC6551]. Actual "low power" does not seem to be a defining | |||
directed acyclic graphs for routing and do measurements on the edges | characteristic for an LLN [I-D.hui-vasseur-roll-rpl-deployment]. | |||
such as ETX [RFC6551]. Actual "low power" does not seem to be | ||||
required for an LLN [I-D.hui-vasseur-roll-rpl-deployment], and the | ||||
positions on scaling of LLNs appear to vary widely | ||||
[I-D.clausen-lln-rpl-experiences]. | ||||
The ROLL terminology document states that LLNs typically are composed | LLNs typically are composed of constrained nodes; this leads to the | |||
of constrained nodes; this is also supported by the design of | design of operation modes such as the "non-storing mode" defined by | |||
operation modes such as RPL's "non-storing mode". So, in the | RPL (the IPv6 Routing Protocol for Low-Power and Lossy Networks | |||
terminology of the present document, an LLN seems to be a constrained | [RFC6650]). So, in the terminology of the present document, an LLN | |||
node network with certain network characteristics, which include | is a constrained node network with certain network characteristics, | |||
constraints on the network as well. | which include constraints on the network as well. | |||
2.3.2. LoWPAN, 6LoWPAN | 2.3.2. LoWPAN, 6LoWPAN | |||
One interesting class of a constrained network often used as a | One interesting class of a constrained network often used as a | |||
constrained node network is the "LoWPAN" [RFC4919], a term inspired | constrained node network is the "LoWPAN" [RFC4919], a term inspired | |||
from the name of the IEEE 802.15.4 working group (low-rate wireless | from the name of the IEEE 802.15.4 working group (low-rate wireless | |||
personal area networks (LR-WPANs)). The expansion of that acronym, | personal area networks (LR-WPANs)). The expansion of that acronym, | |||
"Low-Power Wireless Personal Area Network" contains a hard to justify | "Low-Power Wireless Personal Area Network" contains a hard to justify | |||
"Personal" that is due to the history of task group naming in IEEE | "Personal" that is due to the history of task group naming in IEEE | |||
802 more than due to an orientation of LoWPANs around a single | 802 more than due to an orientation of LoWPANs around a single | |||
person. Actually, LoWPANs have been suggested for urban monitoring, | person. Actually, LoWPANs have been suggested for urban monitoring, | |||
control of large buildings, and industrial control applications, so | control of large buildings, and industrial control applications, so | |||
the "Personal" can only be considered a vestige. Maybe the term is | the "Personal" can only be considered a vestige. Occasionally the | |||
best read as "Low-Power Wireless Area Networks" (LoWPANs) [WEI]. | term is read as "Low-Power Wireless Area Networks" (LoWPANs) [WEI]. | |||
Originally focused on IEEE 802.15.4, "LoWPAN" (or when used for IPv6, | Originally focused on IEEE 802.15.4, "LoWPAN" (or when used for IPv6, | |||
"6LoWPAN") is now also being used for networks built from similarly | "6LoWPAN") also refers to networks built from similarly constrained | |||
constrained link layer technologies [I-D.ietf-6lowpan-btle] | link layer technologies [I-D.ietf-6lowpan-btle] | |||
[I-D.mariager-6lowpan-v6over-dect-ule] [I-D.brandt-6man-lowpanz]. | [I-D.mariager-6lowpan-v6over-dect-ule] [I-D.brandt-6man-lowpanz]. | |||
3. Classes of Constrained Devices | 3. Classes of Constrained Devices | |||
Despite the overwhelming variety of Internet-connected devices that | Despite the overwhelming variety of Internet-connected devices that | |||
can be envisioned, it may be worthwhile to have some succinct | can be envisioned, it may be worthwhile to have some succinct | |||
terminology for different classes of constrained devices. In this | terminology for different classes of constrained devices. In this | |||
document, the class designations in Table 1 may be used as rough | document, the class designations in Table 1 may be used as rough | |||
indications of device capabilities: | indications of device capabilities: | |||
skipping to change at page 8, line 48 | skipping to change at page 8, line 48 | |||
gateways or servers. Class 0 devices generally cannot be secured or | gateways or servers. Class 0 devices generally cannot be secured or | |||
managed comprehensively in the traditional sense. They will most | managed comprehensively in the traditional sense. They will most | |||
likely be preconfigured (and will be reconfigured rarely, if at all), | likely be preconfigured (and will be reconfigured rarely, if at all), | |||
with a very small data set. For management purposes, they could | with a very small data set. For management purposes, they could | |||
answer keepalive signals and send on/off or basic health indications. | answer keepalive signals and send on/off or basic health indications. | |||
Class 1 devices cannot easily talk to other Internet nodes employing | Class 1 devices cannot easily talk to other Internet nodes employing | |||
a full protocol stack such as using HTTP, TLS and related security | a full protocol stack such as using HTTP, TLS and related security | |||
protocols and XML-based data representations. However, they have | protocols and XML-based data representations. However, they have | |||
enough power to use a protocol stack specifically designed for | enough power to use a protocol stack specifically designed for | |||
constrained nodes (e.g., CoAP over UDP) and participate in meaningful | constrained nodes (such as CoAP over UDP [I-D.ietf-core-coap]) and | |||
conversations without the help of a gateway node. In particular, | participate in meaningful conversations without the help of a gateway | |||
they can provide support for the security functions required on a | node. In particular, they can provide support for the security | |||
large network. Therefore, they can be integrated as fully developed | functions required on a large network. Therefore, they can be | |||
peers into an IP network, but they need to be parsimonious with state | integrated as fully developed peers into an IP network, but they need | |||
memory, code space, and often power expenditure for protocol and | to be parsimonious with state memory, code space, and often power | |||
application usage. | expenditure for protocol and application usage. | |||
Class 2 can already support mostly the same protocol stacks as used | Class 2 can already support mostly the same protocol stacks as used | |||
on notebooks or servers. However, even these devices can benefit | on notebooks or servers. However, even these devices can benefit | |||
from lightweight and energy-efficient protocols and from consuming | from lightweight and energy-efficient protocols and from consuming | |||
less bandwidth. Furthermore, using fewer resources for networking | less bandwidth. Furthermore, using fewer resources for networking | |||
leaves more resources available to applications. Thus, using the | leaves more resources available to applications. Thus, using the | |||
protocol stacks defined for very constrained devices also on Class 2 | protocol stacks defined for very constrained devices also on Class 2 | |||
devices might reduce development costs and increase the | devices might reduce development costs and increase the | |||
interoperability. | interoperability. | |||
skipping to change at page 10, line 18 | skipping to change at page 10, line 18 | |||
available electrical power and/or energy. While it is harder to find | available electrical power and/or energy. While it is harder to find | |||
recognizable clusters in this space, it is still useful to introduce | recognizable clusters in this space, it is still useful to introduce | |||
some common terminology. | some common terminology. | |||
4.1. Scaling Properties | 4.1. Scaling Properties | |||
The power and/or energy available to a device may vastly differ, from | The power and/or energy available to a device may vastly differ, from | |||
kilowatts to microwatts, from essentially unlimited to hundreds of | kilowatts to microwatts, from essentially unlimited to hundreds of | |||
microjoules. | microjoules. | |||
Instead of defining classes or clusters, we propose simply stating, | Instead of defining classes or clusters, we simply state, in SI | |||
in SI units, an approximate value for one or both of the quantities | units, an approximate value for one or both of the quantities listed | |||
listed in Table 2: | in Table 2: | |||
+--------+---------------------------------------------+------------+ | +--------+---------------------------------------------+------------+ | |||
| Name | Definition | SI Unit | | | Name | Definition | SI Unit | | |||
+--------+---------------------------------------------+------------+ | +--------+---------------------------------------------+------------+ | |||
| Ps | Sustainable average power available for the | W (Watt) | | | Ps | Sustainable average power available for the | W (Watt) | | |||
| | device over the time it is functioning | | | | | device over the time it is functioning | | | |||
| | | | | | | | | | |||
| Et | Total electrical energy available before | J (Joule) | | | Et | Total electrical energy available before | J (Joule) | | |||
| | the energy source is exhausted | | | | | the energy source is exhausted | | | |||
+--------+---------------------------------------------+------------+ | +--------+---------------------------------------------+------------+ | |||
Table 2: Quantities Relevant to Power and Energy | Table 2: Quantities Relevant to Power and Energy | |||
The value of Et may need to be interpreted in conjunction with an | The value of Et may need to be interpreted in conjunction with an | |||
indication over which period of time the value is given; see the next | indication over which period of time the value is given; see the next | |||
subsection. | subsection. | |||
Some devices enter a "low-power" mode before the energy available in | ||||
a period is exhausted, or even have multiple such steps on the way to | ||||
exhaustion. For these devices, Ps would need to be given for each of | ||||
the modes/steps. | ||||
4.2. Classes of Energy Limitation | 4.2. Classes of Energy Limitation | |||
As discussed above, some devices are limited in available energy as | As discussed above, some devices are limited in available energy as | |||
opposed to (or in addition to) being limited in available power. | opposed to (or in addition to) being limited in available power. | |||
Where no relevant limitations exist with respect to energy, the | Where no relevant limitations exist with respect to energy, the | |||
device is classified as E3. The energy limitation may be in total | device is classified as E9. The energy limitation may be in total | |||
energy available in the usable lifetime of the device (e.g. a device | energy available in the usable lifetime of the device (e.g. a device | |||
with a non-replaceable primary battery, which is discarded when this | with a non-replaceable primary battery, which is discarded when this | |||
battery is exhausted), classified as E2. Where the relevant | battery is exhausted), classified as E2. Where the relevant | |||
limitation is for a specific period, this is classified as E1, e.g. | limitation is for a specific period, this is classified as E1, e.g. a | |||
a limited amount of energy available for the night with a solar- | limited amount of energy available for the night with a solar-powered | |||
powered device, or for the period between recharges with a device | device, or for the period between recharges with a device that is | |||
that is manually connected to a charger, or by a periodic (primary) | manually connected to a charger, or by a periodic (primary) battery | |||
battery replacement interval. Finally, there may be a limited amount | replacement interval. Finally, there may be a limited amount of | |||
of energy available for a specific event, e.g. for a button press in | energy available for a specific event, e.g. for a button press in an | |||
an energy harvesting light switch; this is classified as E0. Note | energy harvesting light switch; this is classified as E0. Note that | |||
that many E1 devices in a sense also are E2, as the rechargeable | many E1 devices in a sense also are E2, as the rechargeable battery | |||
battery has a limited number of useful recharging cycles. | has a limited number of useful recharging cycles. | |||
In summary, we distinguish (Table 3): | In summary, we distinguish (Table 3): | |||
+------+------------------------------+-----------------------------+ | +------+------------------------------+-----------------------------+ | |||
| Name | Type of energy limitation | Example Power Source | | | Name | Type of energy limitation | Example Power Source | | |||
+------+------------------------------+-----------------------------+ | +------+------------------------------+-----------------------------+ | |||
| E0 | Event energy-limited | Event-based harvesting | | | E0 | Event energy-limited | Event-based harvesting | | |||
| | | | | | | | | | |||
| E1 | Period energy-limited | Battery that is | | | E1 | Period energy-limited | Battery that is | | |||
| | | periodically recharged or | | | | | periodically recharged or | | |||
| | | replaced | | | | | replaced | | |||
| | | | | | | | | | |||
| E2 | Lifetime energy-limited | Non-replaceable primary | | | E2 | Lifetime energy-limited | Non-replaceable primary | | |||
| | | battery | | | | | battery | | |||
| | | | | | | | | | |||
| E3 | No direct quantitative | Mains powered | | | E9 | No direct quantitative | Mains powered | | |||
| | limitations to available | | | | | limitations to available | | | |||
| | energy | | | | | energy | | | |||
+------+------------------------------+-----------------------------+ | +------+------------------------------+-----------------------------+ | |||
Table 3: Classes of Energy Limitation | Table 3: Classes of Energy Limitation | |||
4.3. Strategies of Using Power for Communication | 4.3. Strategies of Using Power for Communication | |||
Especially when wireless transmission is used, the radio often | Especially when wireless transmission is used, the radio often | |||
consumes a big portion of the total energy consumed by the device. | consumes a big portion of the total energy consumed by the device. | |||
skipping to change at page 12, line 5 | skipping to change at page 12, line 10 | |||
The general strategies for power usage can be described as follows: | The general strategies for power usage can be described as follows: | |||
Always-on: This strategy is most applicable if there is no reason | Always-on: This strategy is most applicable if there is no reason | |||
for extreme measures for power saving. The device can stay on in | for extreme measures for power saving. The device can stay on in | |||
the usual manner all the time. It may be useful to employ power- | the usual manner all the time. It may be useful to employ power- | |||
friendly hardware or limit the number of wireless transmissions, | friendly hardware or limit the number of wireless transmissions, | |||
CPU speeds, and other aspects for general power saving and cooling | CPU speeds, and other aspects for general power saving and cooling | |||
needs, but the device can be connected to the network all the | needs, but the device can be connected to the network all the | |||
time. | time. | |||
Always-off: Under this strategy, the device sleeps such long periods | Normally-off: Under this strategy, the device sleeps such long | |||
at a time that once it wakes up, it makes sense for it to not | periods at a time that once it wakes up, it makes sense for it to | |||
pretend that it has been connected to the network during sleep: | not pretend that it has been connected to the network during | |||
The device re-attaches to the network as it is woken up. The main | sleep: The device re-attaches to the network as it is woken up. | |||
optimization goal is to minimize the effort during such re- | The main optimization goal is to minimize the effort during such | |||
attachment process and any resulting application communications. | re-attachment process and any resulting application | |||
communications. | ||||
If the device sleeps for long periods of time, and needs to | If the device sleeps for long periods of time, and needs to | |||
communicate infrequently, the relative increase in energy | communicate infrequently, the relative increase in energy | |||
expenditure during reattachment may be acceptable. | expenditure during reattachment may be acceptable. | |||
Low-power: This strategy is most applicable to devices that need to | Low-power: This strategy is most applicable to devices that need to | |||
operate on a very small amount of power, but still need to be able | operate on a very small amount of power, but still need to be able | |||
to communicate on a relatively frequent basis. This implies that | to communicate on a relatively frequent basis. This implies that | |||
extremely low power solutions needs to be used for the hardware, | extremely low power solutions needs to be used for the hardware, | |||
chosen link layer mechanisms, and so on. Typically, given the | chosen link layer mechanisms, and so on. Typically, given the | |||
small amount of time between transmissions, despite their sleep | small amount of time between transmissions, despite their sleep | |||
state these devices retain some form of network attachment to the | state these devices retain some form of network attachment to the | |||
network. Techniques used for minimizing power usage for the | network. Techniques used for minimizing power usage for the | |||
network communications include minimizing any work from re- | network communications include minimizing any work from re- | |||
establishing communications after waking up, tuning the frequency | establishing communications after waking up, tuning the frequency | |||
of communications, and other parameters appropriately. | of communications (including "duty cycling", where components are | |||
switched on and off in a regular cycle), and other parameters | ||||
appropriately. | ||||
In summary, we distinguish (Table 4): | In summary, we distinguish (Table 4): | |||
+------+------------+----------------------------------------------+ | +--------+--------------------+-------------------------------------+ | |||
| Name | Strategy | Ability to communicate | | | Name | Strategy | Ability to communicate | | |||
+------+------------+----------------------------------------------+ | +--------+--------------------+-------------------------------------+ | |||
| S0 | Always-off | Re-attach when required | | | P0 | Normally-off | Re-attach when required | | |||
| | | | | | | | | | |||
| S1 | Low-power | Appears connected, perhaps with high latency | | | P1 | Low-power | Appears connected, perhaps with | | |||
| | | | | | | | high latency | | |||
| S2 | Always-on | Always connected | | | | | | | |||
+------+------------+----------------------------------------------+ | | P9 | Always-on | Always connected | | |||
+--------+--------------------+-------------------------------------+ | ||||
Table 4: Strategies of Using Power for Communication | Table 4: Strategies of Using Power for Communication | |||
Note that the discussion above is at the device level; similar | Note that the discussion above is at the device level; similar | |||
considerations can apply at the communications interface level. This | considerations can apply at the communications interface level. This | |||
document does not define terminology for the latter. | document does not define terminology for the latter. | |||
A term often used to describe power-saving approaches is "duty- | ||||
cycling". This describes all forms of periodically switching off | ||||
some function, leaving it on only for a certain percentage of time | ||||
(the "duty cycle"). | ||||
[I-D.ietf-roll-terminology] only distinguishes two levels, defining a | ||||
Non-sleepy Node as a node that always remains in a fully powered on | ||||
state (always awake) where it has the capability to perform | ||||
communication (P9), and a Sleepy Node as a node that may sometimes go | ||||
into a sleep mode (a low power state to conserve power) and | ||||
temporarily suspend protocol communication (P0); there is no explicit | ||||
mention of P1. | ||||
5. Security Considerations | 5. Security Considerations | |||
This document introduces common terminology that does not raise any | This document introduces common terminology that does not raise any | |||
new security issue. Security considerations arising from the | new security issue. Security considerations arising from the | |||
constraints discussed in this document need to be discussed in the | constraints discussed in this document need to be discussed in the | |||
context of specific protocols. For instance, [I-D.ietf-core-coap] | context of specific protocols. For instance, [I-D.ietf-core-coap] | |||
section 11.6, "Constrained node considerations", discusses | section 11.6, "Constrained node considerations", discusses | |||
implications of specific constraints on the security mechanisms | implications of specific constraints on the security mechanisms | |||
employed. | employed. A wider view at security in constrained node networks is | |||
provided in [I-D.garcia-core-security]. | ||||
6. IANA Considerations | 6. IANA Considerations | |||
This document has no actions for IANA. | This document has no actions for IANA. | |||
7. Acknowledgements | 7. Acknowledgements | |||
Dominique Barthel and Peter van der Stok provided useful comments; | Dominique Barthel and Peter van der Stok provided useful comments; | |||
Charles Palmer provided a full editorial review. | Charles Palmer provided a full editorial review. | |||
Peter van der Stok insisted that we should have power terminology, | Peter van der Stok insisted that we should have power terminology, | |||
hence Section 4. The text for Section 4.3 is mostly lifted from | hence Section 4. The text for Section 4.3 is mostly lifted from a | |||
[I-D.arkko-lwig-cellular] and has been adapted for this document. | previous version of [I-D.ietf-lwig-cellular] and has been adapted for | |||
this document. | ||||
8. Informative References | 8. Informative References | |||
[FALL] Fall, K., "A Delay-Tolerant Network Architecture for | [FALL] Fall, K., "A Delay-Tolerant Network Architecture for | |||
Challenged Internets", SIGCOMM 2003, 2003. | Challenged Internets", SIGCOMM 2003, 2003. | |||
[I-D.arkko-lwig-cellular] | ||||
Arkko, J., Eriksson, A., and A. Keraenen, "Building Power- | ||||
Efficient CoAP Devices for Cellular Networks", draft- | ||||
arkko-lwig-cellular-00 (work in progress), February 2013. | ||||
[I-D.brandt-6man-lowpanz] | [I-D.brandt-6man-lowpanz] | |||
Brandt, A. and J. Buron, "Transmission of IPv6 packets | Brandt, A. and J. Buron, "Transmission of IPv6 packets | |||
over ITU-T G.9959 Networks", draft-brandt-6man-lowpanz-02 | over ITU-T G.9959 Networks", draft-brandt-6man-lowpanz-02 | |||
(work in progress), June 2013. | (work in progress), June 2013. | |||
[I-D.clausen-lln-rpl-experiences] | [I-D.garcia-core-security] | |||
Clausen, T., Verdiere, A., Yi, J., Herberg, U., and Y. | Garcia-Morchon, O., Kumar, S., Keoh, S., Hummen, R., and | |||
Igarashi, "Observations of RPL: IPv6 Routing Protocol for | R. Struik, "Security Considerations in the IP-based | |||
Low power and Lossy Networks", draft-clausen-lln-rpl- | Internet of Things", draft-garcia-core-security-06 (work | |||
experiences-06 (work in progress), February 2013. | in progress), September 2013. | |||
[I-D.hui-vasseur-roll-rpl-deployment] | [I-D.hui-vasseur-roll-rpl-deployment] | |||
Vasseur, J., Hui, J., Dasgupta, S., and G. Yoon, "RPL | Vasseur, J., Hui, J., Dasgupta, S., and G. Yoon, "RPL | |||
deployment experience in large scale networks", draft-hui- | deployment experience in large scale networks", draft-hui- | |||
vasseur-roll-rpl-deployment-01 (work in progress), July | vasseur-roll-rpl-deployment-01 (work in progress), July | |||
2012. | 2012. | |||
[I-D.ietf-6lowpan-btle] | [I-D.ietf-6lowpan-btle] | |||
Nieminen, J., Savolainen, T., Isomaki, M., Patil, B., | Nieminen, J., Savolainen, T., Isomaki, M., Patil, B., | |||
Shelby, Z., and C. Gomez, "Transmission of IPv6 Packets | Shelby, Z., and C. Gomez, "Transmission of IPv6 Packets | |||
over BLUETOOTH Low Energy", draft-ietf-6lowpan-btle-12 | over BLUETOOTH Low Energy", draft-ietf-6lowpan-btle-12 | |||
(work in progress), February 2013. | (work in progress), February 2013. | |||
[I-D.ietf-core-coap] | [I-D.ietf-core-coap] | |||
Shelby, Z., Hartke, K., and C. Bormann, "Constrained | Shelby, Z., Hartke, K., and C. Bormann, "Constrained | |||
Application Protocol (CoAP)", draft-ietf-core-coap-18 | Application Protocol (CoAP)", draft-ietf-core-coap-18 | |||
(work in progress), June 2013. | (work in progress), June 2013. | |||
[I-D.ietf-lwig-cellular] | ||||
Arkko, J., Eriksson, A., and A. Keranen, "Building Power- | ||||
Efficient CoAP Devices for Cellular Networks", draft-ietf- | ||||
lwig-cellular-00 (work in progress), August 2013. | ||||
[I-D.ietf-roll-terminology] | [I-D.ietf-roll-terminology] | |||
Vasseur, J., "Terminology in Low power And Lossy | Vasseur, J., "Terms used in Routing for Low power And | |||
Networks", draft-ietf-roll-terminology-12 (work in | Lossy Networks", draft-ietf-roll-terminology-13 (work in | |||
progress), March 2013. | progress), October 2013. | |||
[I-D.mariager-6lowpan-v6over-dect-ule] | [I-D.mariager-6lowpan-v6over-dect-ule] | |||
Mariager, P. and J. Petersen, "Transmission of IPv6 | Mariager, P., Petersen, J., and Z. Shelby, "Transmission | |||
Packets over DECT Ultra Low Energy", draft-mariager- | of IPv6 Packets over DECT Ultra Low Energy", draft- | |||
6lowpan-v6over-dect-ule-02 (work in progress), May 2012. | mariager-6lowpan-v6over-dect-ule-03 (work in progress), | |||
July 2013. | ||||
[ISQ-13] International Electrotechnical Commission, "International | [ISQ-13] International Electrotechnical Commission, "International | |||
Standard -- Quantities and units -- Part 13: Information | Standard -- Quantities and units -- Part 13: Information | |||
science and technology", IEC 80000-13, March 2008. | science and technology", IEC 80000-13, March 2008. | |||
[RFC0793] Postel, J., "Transmission Control Protocol", STD 7, RFC | [RFC0793] Postel, J., "Transmission Control Protocol", STD 7, RFC | |||
793, September 1981. | 793, September 1981. | |||
[RFC4838] Cerf, V., Burleigh, S., Hooke, A., Torgerson, L., Durst, | [RFC4838] Cerf, V., Burleigh, S., Hooke, A., Torgerson, L., Durst, | |||
R., Scott, K., Fall, K., and H. Weiss, "Delay-Tolerant | R., Scott, K., Fall, K., and H. Weiss, "Delay-Tolerant | |||
skipping to change at page 15, line 7 | skipping to change at page 16, line 7 | |||
[RFC6551] Vasseur, JP., Kim, M., Pister, K., Dejean, N., and D. | [RFC6551] Vasseur, JP., Kim, M., Pister, K., Dejean, N., and D. | |||
Barthel, "Routing Metrics Used for Path Calculation in | Barthel, "Routing Metrics Used for Path Calculation in | |||
Low-Power and Lossy Networks", RFC 6551, March 2012. | Low-Power and Lossy Networks", RFC 6551, March 2012. | |||
[RFC6606] Kim, E., Kaspar, D., Gomez, C., and C. Bormann, "Problem | [RFC6606] Kim, E., Kaspar, D., Gomez, C., and C. Bormann, "Problem | |||
Statement and Requirements for IPv6 over Low-Power | Statement and Requirements for IPv6 over Low-Power | |||
Wireless Personal Area Network (6LoWPAN) Routing", RFC | Wireless Personal Area Network (6LoWPAN) Routing", RFC | |||
6606, May 2012. | 6606, May 2012. | |||
[RFC6650] Falk, J. and M. Kucherawy, "Creation and Use of Email | ||||
Feedback Reports: An Applicability Statement for the Abuse | ||||
Reporting Format (ARF)", RFC 6650, June 2012. | ||||
[WEI] Shelby, Z. and C. Bormann, "6LoWPAN: the Wireless Embedded | [WEI] Shelby, Z. and C. Bormann, "6LoWPAN: the Wireless Embedded | |||
Internet", ISBN 9780470747995, 2009. | Internet", ISBN 9780470747995, 2009. | |||
[fifty-billion] | [fifty-billion] | |||
Ericsson, "More Than 50 Billion Connected Devices", | Ericsson, "More Than 50 Billion Connected Devices", | |||
Ericsson White Paper 284 23-3149 Uen, February 2011, | Ericsson White Paper 284 23-3149 Uen, February 2011, | |||
<http://www.ericsson.com/res/docs/whitepapers/ | <http://www.ericsson.com/res/docs/whitepapers/ | |||
wp-50-billions.pdf>. | wp-50-billions.pdf>. | |||
Authors' Addresses | Authors' Addresses | |||
End of changes. 42 change blocks. | ||||
128 lines changed or deleted | 180 lines changed or added | |||
This html diff was produced by rfcdiff 1.41. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ |