CoRE @ IETF96 (Agenda v1.1)
(Original on https://github.com/core-wg/ietf96/wiki)
TUESDAY, July 19, 2016 1400–1600 Afternoon Session I
Ch_burg II/III ART *** core Constrained RESTful Environments WG
Chairs’ Intro (10)
WG documents in or around WG last call
- Agree disposition of last call comments
- Take input from ongoing WGLC
- Confirm handling of groupcomm part split off
CoAP over X
CoAP over TCP/TLS/Websockets (55)
- Confirm direction of document merge
- Resolve list of open issues
(This merges the earlier draft-bormann-core-block-bert,
Managing multiple transports (10)
- Present alternatives, obtain WG direction, confirm reviewers
- Discuss relationship with TCP/TLS draft
CoRE Resource Directory (15)
- Review completion status
Congestion Control (10)
- With the new results and the updated text, are we ready for adoption now?
Σ 130 :-)
THURSDAY, July 21, 2016 1620–1820 Afternoon Session II
Tiergarten ART *** core Constrained RESTful Environments WG
Reusable Interface Definitions for Constrained RESTful Environments (15)
- Confirm document split
- Discuss adoption of dynlink split-off
*) Updates for the core-cool drafts available at
that missed the I-D cutoff by a few minutes:
- Define next steps
- Document roadmap.
- introduction, what to expect, when to expect it, and why.
- Relationship to LWM2M; should COMI and LWM2M converge, and, if yes, how?
- This document defines encoding rules for serializing configuration data, state data, RPC input and RPC output, Action input, Action output and notifications defined within YANG modules using the Concise Binary Object Representation (CBOR).
- Huh? What to expect, when to expect it, and why.
- Check readiness for last call
- Structured IDentifiers (SID) are used to identify different YANG items when encoded in CBOR. This document defines the registration and assignment processes of SIDs. To enable the implementation of these processes, this document also defines a file format used to persist and publish assigned SIDs.
- Concept, use and call for adoption by the WG.
- This document describes a management function set adapted to constrained devices and constrained networks (e.g., low-power, lossy). CoOL objects (datastores, RPCs, actions and notifications) are defined using the YANG modelling language.
- Explaining basic operation set, open questions of interest.
- How much are we deviating from RESTCONF, and are these deviations justified?
- This document analyses threats to CoAP message exchanges traversing
proxies and derives the security requirements for mitigating those
- Confirm reviewers, with a goal of getting enough review for a call
for adoption next.
- This document defines a method for in-layer security of CoAP message
exchanges using the COSE format.
- Discuss latest updates, ask for adoption
- Confirm readiness for WG last-call
- Define next steps for this draft
Documents without slot requests
Documents apparently out of scope