Terminology for Constrained Node Networks
draft-ietf-lwig-terminology-06
The information below is for an old version of the document | |||
---|---|---|---|
Document | Type | Active Internet-Draft (lwig WG) | |
Last updated | 2014-01-30 (latest revision 2013-12-18) | ||
Replaces | draft-bormann-lwig-terms | ||
Stream | IETF | ||
Intended RFC status | Informational | ||
Formats | plain text pdf html bibtex | ||
Stream | WG state | Submitted to IESG for Publication | |
Document shepherd | Zhen Cao | ||
Shepherd write-up | Show (last changed 2013-05-19) | ||
IESG | IESG state | IESG Evaluation::Revised I-D Needed | |
Consensus Boilerplate | Unknown | ||
Telechat date |
Has enough positions to pass. |
||
Responsible AD | Brian Haberman | ||
IESG note | Zhen Cao (caozhen@chinamobile.com) is the Document Shepherd. | ||
Send notices to | lwig-chairs@tools.ietf.org, draft-ietf-lwig-terminology@tools.ietf.org | ||
IANA | IANA review state | Version Changed - Review Needed | |
IANA action state | None |
LWIG Working Group C. Bormann Internet-Draft Universitaet Bremen TZI Intended status: Informational M. Ersue Expires: June 21, 2014 Nokia Siemens Networks A. Keranen Ericsson December 18, 2013 Terminology for Constrained Node Networks draft-ietf-lwig-terminology-06 Abstract The Internet Protocol Suite is increasingly used on small devices with severe constraints on power, memory and processing resources, creating constrained node networks. This document provides a number of basic terms that have turned out to be useful in the standardization work for constrained node networks. Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at http://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on June 21, 2014. Copyright Notice Copyright (c) 2013 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must Bormann, et al. Expires June 21, 2014 [Page 1] Internet-Draft CNN terminology December 2013 include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 2. Core Terminology . . . . . . . . . . . . . . . . . . . . . . 3 2.1. Constrained Nodes . . . . . . . . . . . . . . . . . . . . 4 2.2. Constrained Networks . . . . . . . . . . . . . . . . . . 5 2.2.1. Challenged Networks . . . . . . . . . . . . . . . . . 6 2.3. Constrained Node Networks . . . . . . . . . . . . . . . . 6 2.3.1. LLN ("low-power lossy network") . . . . . . . . . . . 7 2.3.2. LoWPAN, 6LoWPAN . . . . . . . . . . . . . . . . . . . 7 3. Classes of Constrained Devices . . . . . . . . . . . . . . . 8 4. Power Terminology . . . . . . . . . . . . . . . . . . . . . . 10 4.1. Scaling Properties . . . . . . . . . . . . . . . . . . . 10 4.2. Classes of Energy Limitation . . . . . . . . . . . . . . 10 4.3. Strategies of Using Power for Communication . . . . . . . 11 5. Security Considerations . . . . . . . . . . . . . . . . . . . 14 6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 14 7. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 14 8. Informative References . . . . . . . . . . . . . . . . . . . 14 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 16 1. Introduction Small devices with limited CPU, memory, and power resources, so called constrained devices (often used as a sensor/actuator, a smart object, or a smart device) can form a network, becoming "constrained nodes" in that network. Such a network may itself exhibit constraints, e.g. with unreliable or lossy channels, limited and unpredictable bandwidth, and a highly dynamic topology. Constrained devices might be in charge of gathering information in diverse settings including natural ecosystems, buildings, and factories and sending the information to one or more server stations. They also act on information, by performing some physical action, including displaying it. Constrained devices may work under severe resource constraints such as limited battery and computing power, little memory, as well as insufficient wireless bandwidth and ability to communicate; these constraints often exacerbate each other. Other entities on the network, e.g., a base station or controlling server, might have more computational and communication resources and could support the interaction between the constrained devices andShow full document text