draft-ietf-roll-home-routing-reqs-07.txt | draft-ietf-roll-home-routing-reqs-08.txt | |||
---|---|---|---|---|
Networking Working Group A. Brandt | Networking Working Group A. Brandt | |||
Internet Draft Zensys, Inc. | Internet Draft Zensys, Inc. | |||
Intended status: Informational G. Porcu | Intended status: Informational G. Porcu | |||
Expires: March 2010 Telecom Italia | Expires: March 2010 Telecom Italia | |||
September 14, 2009 | September 16, 2009 | |||
Home Automation Routing Requirements in Low Power and Lossy | Home Automation Routing Requirements in Low Power and Lossy | |||
Networks | Networks | |||
draft-ietf-roll-home-routing-reqs-07 | draft-ietf-roll-home-routing-reqs-08 | |||
Status of this Memo | Status of this Memo | |||
This Internet-Draft is submitted to IETF in full conformance with | This Internet-Draft is submitted to IETF in full conformance with | |||
the provisions of BCP 78 and BCP 79. | the provisions of BCP 78 and BCP 79. | |||
Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
Task Force (IETF), its areas, and its working groups. Note that | Task Force (IETF), its areas, and its working groups. Note that | |||
other groups may also distribute working documents as Internet- | other groups may also distribute working documents as Internet- | |||
Drafts. | Drafts. | |||
skipping to change at page 1, line 34 | skipping to change at page 1, line 34 | |||
documents at any time. It is inappropriate to use Internet-Drafts | documents at any time. It is inappropriate to use Internet-Drafts | |||
as reference material or to cite them other than as "work in | as reference material or to cite them other than as "work in | |||
progress." | progress." | |||
The list of current Internet-Drafts can be accessed at | The list of current Internet-Drafts can be accessed at | |||
http://www.ietf.org/ietf/1id-abstracts.txt. | http://www.ietf.org/ietf/1id-abstracts.txt. | |||
The list of Internet-Draft Shadow Directories can be accessed at | The list of Internet-Draft Shadow Directories can be accessed at | |||
http://www.ietf.org/shadow.html. | http://www.ietf.org/shadow.html. | |||
This Internet-Draft will expire on March 14, 2010. | This Internet-Draft will expire on March 16, 2010. | |||
Copyright Notice | Copyright Notice | |||
Copyright (c) 2009 IETF Trust and the persons identified as the | Copyright (c) 2009 IETF Trust and the persons identified as the | |||
document authors. All rights reserved. | document authors. All rights reserved. | |||
This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
Provisions Relating to IETF Documents in effect on the date of | Provisions Relating to IETF Documents in effect on the date of | |||
publication of this document (http://trustee.ietf.org/license- | publication of this document (http://trustee.ietf.org/license- | |||
info). | info). | |||
skipping to change at page 3, line 7 | skipping to change at page 3, line 7 | |||
Requirements Language | Requirements Language | |||
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL | The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL | |||
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" | NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" | |||
in this document are to be interpreted as described in RFC-2119 | in this document are to be interpreted as described in RFC-2119 | |||
[RFC2119]. | [RFC2119]. | |||
Table of Contents | Table of Contents | |||
1. Introduction..............................................4 | 1. Introduction..................................................4 | |||
1.1. Terminology...........................................5 | 1.1. Terminology..............................................5 | |||
2. Home Automation Applications...............................6 | 2. Home Automation Applications..................................6 | |||
2.1. Lighting Application In Action.........................6 | 2.1. Lighting Application In Action...........................6 | |||
2.2. Energy Conservation and Optimizing Energy Consumption...7 | 2.2. Energy Conservation and Optimizing Energy Consumption....7 | |||
2.3. Moving a Remote Control Around.........................7 | 2.3. Moving a Remote Control Around...........................7 | |||
2.4. Adding A New Module To The System......................8 | 2.4. Adding A New Module To The System........................8 | |||
2.5. Controlling Battery Operated Window Shades..............8 | 2.5. Controlling Battery Operated Window Shades...............8 | |||
2.6. Remote Video Surveillance..............................8 | 2.6. Remote Video Surveillance................................8 | |||
2.7. Healthcare............................................8 | 2.7. Healthcare...............................................8 | |||
2.7.1. At-home Health Reporting..........................9 | 2.7.1. At-home Health Reporting............................9 | |||
2.7.2. At-home Health Monitoring........................10 | 2.7.2. At-home Health Monitoring..........................10 | |||
2.8. Alarm Systems........................................10 | 2.8. Alarm Systems...........................................10 | |||
3. Unique Routing Requirements of Home Automation Applications.11 | 3. Unique Routing Requirements of Home Automation Applications..11 | |||
3.1. Constraint-based Routing..............................11 | 3.1. Constraint-based Routing................................11 | |||
3.2. Support of Mobility..................................12 | 3.2. Support of Mobility.....................................12 | |||
3.3. Sleeping Nodes.......................................13 | 3.3. Sleeping Nodes..........................................13 | |||
3.4. Healthcare Routing...................................13 | 3.4. Healthcare Routing......................................13 | |||
3.5. Scalability..........................................13 | 3.5. Scalability.............................................13 | |||
3.6. Convergence Time.....................................14 | 3.6. Convergence Time........................................14 | |||
3.7. Manageability........................................14 | 3.7. Manageability...........................................14 | |||
3.8. Stability............................................14 | 3.8. Stability...............................................14 | |||
4. Traffic Pattern...........................................14 | 4. Traffic Pattern..............................................14 | |||
5. Security Considerations...................................15 | 5. Security Considerations......................................15 | |||
6. IANA Considerations.......................................17 | 6. IANA Considerations..........................................17 | |||
7. Acknowledgments...........................................17 | 7. Acknowledgments..............................................17 | |||
8. References...............................................17 | 8. Disclaimer for pre-RFC5378 work..............................17 | |||
8.1. Normative References.................................17 | 9. References...................................................17 | |||
8.2. Informative References...............................18 | 9.1. Normative References....................................17 | |||
Disclaimer of Validity...............Error! Bookmark not defined. | 9.2. Informative References..................................18 | |||
1. Introduction | 1. Introduction | |||
This document presents home control and automation application | This document presents home control and automation application | |||
specific requirements for Routing Over Low power and Lossy | specific requirements for Routing Over Low power and Lossy | |||
networks (ROLL). In the near future many homes will contain high | networks (ROLL). In the near future many homes will contain high | |||
numbers of wireless devices for a wide set of purposes. Examples | numbers of wireless devices for a wide set of purposes. Examples | |||
include actuators (relay, light dimmer, heating valve), sensors | include actuators (relay, light dimmer, heating valve), sensors | |||
(wall switch, water leak, blood pressure) and advanced | (wall switch, water leak, blood pressure) and advanced | |||
controllers. Basic home control modules such as wall switches and | controllers. Basic home control modules such as wall switches and | |||
End of changes. 4 change blocks. | ||||
33 lines changed or deleted | 33 lines changed or added | |||
This html diff was produced by rfcdiff 1.36. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ |