summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc7228.txt
diff options
context:
space:
mode:
authorThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
committerThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
commit4bfd864f10b68b71482b35c818559068ef8d5797 (patch)
treee3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc7228.txt
parentea76e11061bda059ae9f9ad130a9895cc85607db (diff)
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc7228.txt')
-rw-r--r--doc/rfc/rfc7228.txt955
1 files changed, 955 insertions, 0 deletions
diff --git a/doc/rfc/rfc7228.txt b/doc/rfc/rfc7228.txt
new file mode 100644
index 0000000..819068d
--- /dev/null
+++ b/doc/rfc/rfc7228.txt
@@ -0,0 +1,955 @@
+
+
+
+
+
+
+Internet Engineering Task Force (IETF) C. Bormann
+Request for Comments: 7228 Universitaet Bremen TZI
+Category: Informational M. Ersue
+ISSN: 2070-1721 Nokia Solutions and Networks
+ A. Keranen
+ Ericsson
+ May 2014
+
+
+ Terminology for Constrained-Node Networks
+
+Abstract
+
+ The Internet Protocol Suite is increasingly used on small devices
+ with severe constraints on power, memory, and processing resources,
+ creating constrained-node networks. This document provides a number
+ of basic terms that have been useful in the standardization work for
+ constrained-node networks.
+
+Status of This Memo
+
+ This document is not an Internet Standards Track specification; it is
+ published for informational purposes.
+
+ This document is a product of the Internet Engineering Task Force
+ (IETF). It represents the consensus of the IETF community. It has
+ received public review and has been approved for publication by the
+ Internet Engineering Steering Group (IESG). Not all documents
+ approved by the IESG are a candidate for any level of Internet
+ Standard; see Section 2 of RFC 5741.
+
+ Information about the current status of this document, any errata,
+ and how to provide feedback on it may be obtained at
+ http://www.rfc-editor.org/info/rfc7228.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Bormann, et al. Informational [Page 1]
+
+RFC 7228 CNN Terminology May 2014
+
+
+Copyright Notice
+
+ Copyright (c) 2014 IETF Trust and the persons identified as the
+ document authors. All rights reserved.
+
+ This document is subject to BCP 78 and the IETF Trust's Legal
+ Provisions Relating to IETF Documents
+ (http://trustee.ietf.org/license-info) in effect on the date of
+ publication of this document. Please review these documents
+ carefully, as they describe your rights and restrictions with respect
+ to this document. Code Components extracted from this document must
+ include Simplified BSD License text as described in Section 4.e of
+ the Trust Legal Provisions and are provided without warranty as
+ described in the Simplified BSD License.
+
+Table of Contents
+
+ 1. Introduction ....................................................3
+ 2. Core Terminology ................................................4
+ 2.1. Constrained Nodes ..........................................4
+ 2.2. Constrained Networks .......................................5
+ 2.2.1. Challenged Networks .................................6
+ 2.3. Constrained-Node Networks ..................................7
+ 2.3.1. LLN .................................................7
+ 2.3.2. LoWPAN, 6LoWPAN .....................................8
+ 3. Classes of Constrained Devices ..................................8
+ 4. Power Terminology ..............................................10
+ 4.1. Scaling Properties ........................................10
+ 4.2. Classes of Energy Limitation ..............................11
+ 4.3. Strategies for Using Power for Communication ..............12
+ 5. Security Considerations ........................................14
+ 6. Acknowledgements ...............................................14
+ 7. Informative References .........................................14
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Bormann, et al. Informational [Page 2]
+
+RFC 7228 CNN Terminology May 2014
+
+
+1. Introduction
+
+ Small devices with limited CPU, memory, and power resources, so-
+ called "constrained devices" (often used as sensors/actuators, smart
+ objects, or smart devices) can form a network, becoming "constrained
+ nodes" in that network. Such a network may itself exhibit
+ constraints, e.g., with unreliable or lossy channels, limited and
+ unpredictable bandwidth, and a highly dynamic topology.
+
+ Constrained devices might be in charge of gathering information in
+ diverse settings, including natural ecosystems, buildings, and
+ factories, and sending the information to one or more server
+ stations. They might also act on information, by performing some
+ physical action, including displaying it. Constrained devices may
+ work under severe resource constraints such as limited battery and
+ computing power, little memory, and insufficient wireless bandwidth
+ and ability to communicate; these constraints often exacerbate each
+ other. Other entities on the network, e.g., a base station or
+ controlling server, might have more computational and communication
+ resources and could support the interaction between the constrained
+ devices and applications in more traditional networks.
+
+ Today, diverse sizes of constrained devices with different resources
+ and capabilities are becoming connected. Mobile personal gadgets,
+ building-automation devices, cellular phones, machine-to-machine
+ (M2M) devices, and other devices benefit from interacting with other
+ "things" nearby or somewhere in the Internet. With this, the
+ Internet of Things (IoT) becomes a reality, built up out of uniquely
+ identifiable and addressable objects (things). Over the next decade,
+ this could grow to large numbers [FIFTY-BILLION] of Internet-
+ connected constrained devices, greatly increasing the Internet's size
+ and scope.
+
+ The present document provides a number of basic terms that have been
+ useful in the standardization work for constrained environments. The
+ intention is not to exhaustively cover the field but to make sure a
+ few core terms are used consistently between different groups
+ cooperating in this space.
+
+ In this document, the term "byte" is used in its now customary sense
+ as a synonym for "octet". Where sizes of semiconductor memory are
+ given, the prefix "kibi" (1024) is combined with "byte" to
+ "kibibyte", abbreviated "KiB", for 1024 bytes [ISQ-13].
+
+
+
+
+
+
+
+
+Bormann, et al. Informational [Page 3]
+
+RFC 7228 CNN Terminology May 2014
+
+
+ In computing, the term "power" is often used for the concept of
+ "computing power" or "processing power", as in CPU performance. In
+ this document, the term stands for electrical power unless explicitly
+ stated otherwise. "Mains-powered" is used as a shorthand for being
+ permanently connected to a stable electrical power grid.
+
+2. Core Terminology
+
+ There are two important aspects to _scaling_ within the Internet of
+ Things:
+
+ o scaling up Internet technologies to a large number [FIFTY-BILLION]
+ of inexpensive nodes, while
+
+ o scaling down the characteristics of each of these nodes and of the
+ networks being built out of them, to make this scaling up
+ economically and physically viable.
+
+ The need for scaling down the characteristics of nodes leads to
+ "constrained nodes".
+
+2.1. Constrained Nodes
+
+ The term "constrained node" is best defined by contrasting the
+ characteristics of a constrained node with certain widely held
+ expectations on more familiar Internet nodes:
+
+ Constrained Node: A node where some of the characteristics that are
+ otherwise pretty much taken for granted for Internet nodes at the
+ time of writing are not attainable, often due to cost constraints
+ and/or physical constraints on characteristics such as size,
+ weight, and available power and energy. The tight limits on
+ power, memory, and processing resources lead to hard upper bounds
+ on state, code space, and processing cycles, making optimization
+ of energy and network bandwidth usage a dominating consideration
+ in all design requirements. Also, some layer-2 services such as
+ full connectivity and broadcast/multicast may be lacking.
+
+ While this is not a rigorous definition, it is grounded in the state
+ of the art and clearly sets apart constrained nodes from server
+ systems, desktop or laptop computers, powerful mobile devices such as
+ smartphones, etc. There may be many design considerations that lead
+ to these constraints, including cost, size, weight, and other scaling
+ factors.
+
+
+
+
+
+
+
+Bormann, et al. Informational [Page 4]
+
+RFC 7228 CNN Terminology May 2014
+
+
+ (An alternative term, when the properties as a network node are not
+ in focus, is "constrained device".)
+
+ There are multiple facets to the constraints on nodes, often applying
+ in combination, for example:
+
+ o constraints on the maximum code complexity (ROM/Flash),
+
+ o constraints on the size of state and buffers (RAM),
+
+ o constraints on the amount of computation feasible in a period of
+ time ("processing power"),
+
+ o constraints on the available power, and
+
+ o constraints on user interface and accessibility in deployment
+ (ability to set keys, update software, etc.).
+
+ Section 3 defines a small number of interesting classes ("class-N"
+ for N = 0, 1, 2) of constrained nodes focusing on relevant
+ combinations of the first two constraints. With respect to available
+ power, [RFC6606] distinguishes "power-affluent" nodes (mains-powered
+ or regularly recharged) from "power-constrained nodes" that draw
+ their power from primary batteries or by using energy harvesting;
+ more detailed power terminology is given in Section 4.
+
+ The use of constrained nodes in networks often also leads to
+ constraints on the networks themselves. However, there may also be
+ constraints on networks that are largely independent from those of
+ the nodes. We therefore distinguish "constrained networks" from
+ "constrained-node networks".
+
+2.2. Constrained Networks
+
+ We define "constrained network" in a similar way:
+
+ Constrained Network: A network where some of the characteristics
+ pretty much taken for granted with link layers in common use in
+ the Internet at the time of writing are not attainable.
+
+ Constraints may include:
+
+ o low achievable bitrate/throughput (including limits on duty
+ cycle),
+
+ o high packet loss and high variability of packet loss (delivery
+ rate),
+
+
+
+
+Bormann, et al. Informational [Page 5]
+
+RFC 7228 CNN Terminology May 2014
+
+
+ o highly asymmetric link characteristics,
+
+ o severe penalties for using larger packets (e.g., high packet loss
+ due to link-layer fragmentation),
+
+ o limits on reachability over time (a substantial number of devices
+ may power off at any point in time but periodically "wake up" and
+ can communicate for brief periods of time), and
+
+ o lack of (or severe constraints on) advanced services such as IP
+ multicast.
+
+ More generally, we speak of constrained networks whenever at least
+ some of the nodes involved in the network exhibit these
+ characteristics.
+
+ Again, there may be several reasons for this:
+
+ o cost constraints on the network,
+
+ o constraints posed by the nodes (for constrained-node networks),
+
+ o physical constraints (e.g., power constraints, environmental
+ constraints, media constraints such as underwater operation,
+ limited spectrum for very high density, electromagnetic
+ compatibility),
+
+ o regulatory constraints, such as very limited spectrum availability
+ (including limits on effective radiated power and duty cycle) or
+ explosion safety, and
+
+ o technology constraints, such as older and lower-speed technologies
+ that are still operational and may need to stay in use for some
+ more time.
+
+2.2.1. Challenged Networks
+
+ A constrained network is not necessarily a "challenged network"
+ [FALL]:
+
+ Challenged Network: A network that has serious trouble maintaining
+ what an application would today expect of the end-to-end IP model,
+ e.g., by:
+
+ * not being able to offer end-to-end IP connectivity at all,
+
+ * exhibiting serious interruptions in end-to-end IP connectivity,
+ or
+
+
+
+Bormann, et al. Informational [Page 6]
+
+RFC 7228 CNN Terminology May 2014
+
+
+ * exhibiting delay well beyond the Maximum Segment Lifetime (MSL)
+ defined by TCP [RFC0793].
+
+ All challenged networks are constrained networks in some sense, but
+ not all constrained networks are challenged networks. There is no
+ well-defined boundary between the two, though. Delay-Tolerant
+ Networking (DTN) has been designed to cope with challenged networks
+ [RFC4838].
+
+2.3. Constrained-Node Networks
+
+ Constrained-Node Network: A network whose characteristics are
+ influenced by being composed of a significant portion of
+ constrained nodes.
+
+ A constrained-node network always is a constrained network because of
+ the network constraints stemming from the node constraints, but it
+ may also have other constraints that already make it a constrained
+ network.
+
+ The rest of this subsection introduces two additional terms that are
+ in active use in the area of constrained-node networks, without an
+ intent to define them: LLN and (6)LoWPAN.
+
+2.3.1. LLN
+
+ A related term that has been used to describe the focus of the IETF
+ ROLL working group is "Low-Power and Lossy Network (LLN)". The ROLL
+ (Routing Over Low-Power and Lossy) terminology document [RFC7102]
+ defines LLNs as follows:
+
+ LLN: Low-Power and Lossy Network. Typically composed of many
+ embedded devices with limited power, memory, and processing
+ resources interconnected by a variety of links, such as IEEE
+ 802.15.4 or low-power Wi-Fi. There is a wide scope of application
+ areas for LLNs, including industrial monitoring, building
+ automation (heating, ventilation, and air conditioning (HVAC),
+ lighting, access control, fire), connected home, health care,
+ environmental monitoring, urban sensor networks, energy
+ management, assets tracking, and refrigeration.
+
+ Beyond that, LLNs often exhibit considerable loss at the physical
+ layer, with significant variability of the delivery rate, and some
+ short-term unreliability, coupled with some medium-term stability
+ that makes it worthwhile to both construct directed acyclic graphs
+ that are medium-term stable for routing and do measurements on the
+ edges such as Expected Transmission Count (ETX) [RFC6551]. Not all
+ LLNs comprise low-power nodes [RPL-DEPLOYMENT].
+
+
+
+Bormann, et al. Informational [Page 7]
+
+RFC 7228 CNN Terminology May 2014
+
+
+ LLNs typically are composed of constrained nodes; this leads to the
+ design of operation modes such as the "non-storing mode" defined by
+ RPL (the IPv6 Routing Protocol for Low-Power and Lossy Networks
+ [RFC6550]). So, in the terminology of the present document, an LLN
+ is a constrained-node network with certain network characteristics,
+ which include constraints on the network as well.
+
+2.3.2. LoWPAN, 6LoWPAN
+
+ One interesting class of a constrained network often used as a
+ constrained-node network is "LoWPAN" [RFC4919], a term inspired from
+ the name of an IEEE 802.15.4 working group (low-rate wireless
+ personal area networks (LR-WPANs)). The expansion of the LoWPAN
+ acronym, "Low-Power Wireless Personal Area Network", contains a hard-
+ to-justify "Personal" that is due to the history of task group naming
+ in IEEE 802 more than due to an orientation of LoWPANs around a
+ single person. Actually, LoWPANs have been suggested for urban
+ monitoring, control of large buildings, and industrial control
+ applications, so the "Personal" can only be considered a vestige.
+ Occasionally, the term is read as "Low-Power Wireless Area Networks"
+ [WEI]. Originally focused on IEEE 802.15.4, "LoWPAN" (or when used
+ for IPv6, "6LoWPAN") also refers to networks built from similarly
+ constrained link-layer technologies [V6-BTLE] [V6-DECT-ULE]
+ [V6-G9959].
+
+3. Classes of Constrained Devices
+
+ Despite the overwhelming variety of Internet-connected devices that
+ can be envisioned, it may be worthwhile to have some succinct
+ terminology for different classes of constrained devices. In this
+ document, the class designations in Table 1 may be used as rough
+ indications of device capabilities:
+
+ +-------------+-----------------------+-------------------------+
+ | Name | data size (e.g., RAM) | code size (e.g., Flash) |
+ +-------------+-----------------------+-------------------------+
+ | Class 0, C0 | << 10 KiB | << 100 KiB |
+ | | | |
+ | Class 1, C1 | ~ 10 KiB | ~ 100 KiB |
+ | | | |
+ | Class 2, C2 | ~ 50 KiB | ~ 250 KiB |
+ +-------------+-----------------------+-------------------------+
+
+ Table 1: Classes of Constrained Devices (KiB = 1024 bytes)
+
+ As of the writing of this document, these characteristics correspond
+ to distinguishable clusters of commercially available chips and
+ design cores for constrained devices. While it is expected that the
+
+
+
+Bormann, et al. Informational [Page 8]
+
+RFC 7228 CNN Terminology May 2014
+
+
+ boundaries of these classes will move over time, Moore's law tends to
+ be less effective in the embedded space than in personal computing
+ devices: gains made available by increases in transistor count and
+ density are more likely to be invested in reductions of cost and
+ power requirements than into continual increases in computing power.
+
+ Class 0 devices are very constrained sensor-like motes. They are so
+ severely constrained in memory and processing capabilities that most
+ likely they will not have the resources required to communicate
+ directly with the Internet in a secure manner (rare heroic, narrowly
+ targeted implementation efforts notwithstanding). Class 0 devices
+ will participate in Internet communications with the help of larger
+ devices acting as proxies, gateways, or servers. Class 0 devices
+ generally cannot be secured or managed comprehensively in the
+ traditional sense. They will most likely be preconfigured (and will
+ be reconfigured rarely, if at all) with a very small data set. For
+ management purposes, they could answer keepalive signals and send on/
+ off or basic health indications.
+
+ Class 1 devices are quite constrained in code space and processing
+ capabilities, such that they cannot easily talk to other Internet
+ nodes employing a full protocol stack such as using HTTP, Transport
+ Layer Security (TLS), and related security protocols and XML-based
+ data representations. However, they are capable enough to use a
+ protocol stack specifically designed for constrained nodes (such as
+ the Constrained Application Protocol (CoAP) over UDP [COAP]) and
+ participate in meaningful conversations without the help of a gateway
+ node. In particular, they can provide support for the security
+ functions required on a large network. Therefore, they can be
+ integrated as fully developed peers into an IP network, but they need
+ to be parsimonious with state memory, code space, and often power
+ expenditure for protocol and application usage.
+
+ Class 2 devices are less constrained and fundamentally capable of
+ supporting most of the same protocol stacks as used on notebooks or
+ servers. However, even these devices can benefit from lightweight
+ and energy-efficient protocols and from consuming less bandwidth.
+ Furthermore, using fewer resources for networking leaves more
+ resources available to applications. Thus, using the protocol stacks
+ defined for more constrained devices on Class 2 devices might reduce
+ development costs and increase the interoperability.
+
+ Constrained devices with capabilities significantly beyond Class 2
+ devices exist. They are less demanding from a standards development
+ point of view as they can largely use existing protocols unchanged.
+ The present document therefore does not make any attempt to define
+ classes beyond Class 2. These devices can still be constrained by a
+ limited energy supply.
+
+
+
+Bormann, et al. Informational [Page 9]
+
+RFC 7228 CNN Terminology May 2014
+
+
+ With respect to examining the capabilities of constrained nodes,
+ particularly for Class 1 devices, it is important to understand what
+ type of applications they are able to run and which protocol
+ mechanisms would be most suitable. Because of memory and other
+ limitations, each specific Class 1 device might be able to support
+ only a few selected functions needed for its intended operation. In
+ other words, the set of functions that can actually be supported is
+ not static per device type: devices with similar constraints might
+ choose to support different functions. Even though Class 2 devices
+ have some more functionality available and may be able to provide a
+ more complete set of functions, they still need to be assessed for
+ the type of applications they will be running and the protocol
+ functions they would need. To be able to derive any requirements,
+ the use cases and the involvement of the devices in the application
+ and the operational scenario need to be analyzed. Use cases may
+ combine constrained devices of multiple classes as well as more
+ traditional Internet nodes.
+
+4. Power Terminology
+
+ Devices not only differ in their computing capabilities but also in
+ available power and/or energy. While it is harder to find
+ recognizable clusters in this space, it is still useful to introduce
+ some common terminology.
+
+4.1. Scaling Properties
+
+ The power and/or energy available to a device may vastly differ, from
+ kilowatts to microwatts, from essentially unlimited to hundreds of
+ microjoules.
+
+ Instead of defining classes or clusters, we simply state, using the
+ International System of Units (SI units), an approximate value for
+ one or both of the quantities listed in Table 2:
+
+ +------+--------------------------------------------------+---------+
+ | Name | Definition | SI Unit |
+ +------+--------------------------------------------------+---------+
+ | Ps | Sustainable average power available for the | W |
+ | | device over the time it is functioning | (Watt) |
+ | | | |
+ | Et | Total electrical energy available before the | J |
+ | | energy source is exhausted | (Joule) |
+ +------+--------------------------------------------------+---------+
+
+ Table 2: Quantities Relevant to Power and Energy
+
+
+
+
+
+Bormann, et al. Informational [Page 10]
+
+RFC 7228 CNN Terminology May 2014
+
+
+ The value of Et may need to be interpreted in conjunction with an
+ indication over which period of time the value is given; see
+ Section 4.2.
+
+ Some devices enter a "low-power" mode before the energy available in
+ a period is exhausted or even have multiple such steps on the way to
+ exhaustion. For these devices, Ps would need to be given for each of
+ the modes/steps.
+
+4.2. Classes of Energy Limitation
+
+ As discussed above, some devices are limited in available energy as
+ opposed to (or in addition to) being limited in available power.
+ Where no relevant limitations exist with respect to energy, the
+ device is classified as E9. The energy limitation may be in total
+ energy available in the usable lifetime of the device (e.g., a device
+ that is discarded when its non-replaceable primary battery is
+ exhausted), classified as E2. Where the relevant limitation is for a
+ specific period, the device is classified as E1, e.g., a solar-
+ powered device with a limited amount of energy available for the
+ night, a device that is manually connected to a charger and has a
+ period of time between recharges, or a device with a periodic
+ (primary) battery replacement interval. Finally, there may be a
+ limited amount of energy available for a specific event, e.g., for a
+ button press in an energy-harvesting light switch; such devices are
+ classified as E0. Note that, in a sense, many E1 devices are also
+ E2, as the rechargeable battery has a limited number of useful
+ recharging cycles.
+
+ Table 3 provides a summary of the classifications described above.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Bormann, et al. Informational [Page 11]
+
+RFC 7228 CNN Terminology May 2014
+
+
+ +------+------------------------------+-----------------------------+
+ | Name | Type of energy limitation | Example Power Source |
+ +------+------------------------------+-----------------------------+
+ | E0 | Event energy-limited | Event-based harvesting |
+ | | | |
+ | E1 | Period energy-limited | Battery that is |
+ | | | periodically recharged or |
+ | | | replaced |
+ | | | |
+ | E2 | Lifetime energy-limited | Non-replaceable primary |
+ | | | battery |
+ | | | |
+ | E9 | No direct quantitative | Mains-powered |
+ | | limitations to available | |
+ | | energy | |
+ +------+------------------------------+-----------------------------+
+
+ Table 3: Classes of Energy Limitation
+
+4.3. Strategies for Using Power for Communication
+
+ Especially when wireless transmission is used, the radio often
+ consumes a big portion of the total energy consumed by the device.
+ Design parameters, such as the available spectrum, the desired range,
+ and the bitrate aimed for, influence the power consumed during
+ transmission and reception; the duration of transmission and
+ reception (including potential reception) influence the total energy
+ consumption.
+
+ Different strategies for power usage and network attachment may be
+ used, based on the type of the energy source (e.g., battery or mains-
+ powered) and the frequency with which a device needs to communicate.
+
+ The general strategies for power usage can be described as follows:
+
+ Always-on: This strategy is most applicable if there is no reason
+ for extreme measures for power saving. The device can stay on in
+ the usual manner all the time. It may be useful to employ power-
+ friendly hardware or limit the number of wireless transmissions,
+ CPU speeds, and other aspects for general power-saving and cooling
+ needs, but the device can be connected to the network all the
+ time.
+
+ Normally-off: Under this strategy, the device sleeps such long
+ periods at a time that once it wakes up, it makes sense for it to
+ not pretend that it has been connected to the network during
+
+
+
+
+
+Bormann, et al. Informational [Page 12]
+
+RFC 7228 CNN Terminology May 2014
+
+
+ sleep: the device reattaches to the network as it is woken up.
+ The main optimization goal is to minimize the effort during the
+ reattachment process and any resulting application communications.
+
+ If the device sleeps for long periods of time and needs to
+ communicate infrequently, the relative increase in energy
+ expenditure during reattachment may be acceptable.
+
+ Low-power: This strategy is most applicable to devices that need to
+ operate on a very small amount of power but still need to be able
+ to communicate on a relatively frequent basis. This implies that
+ extremely low-power solutions need to be used for the hardware,
+ chosen link-layer mechanisms, and so on. Typically, given the
+ small amount of time between transmissions, despite their sleep
+ state, these devices retain some form of attachment to the
+ network. Techniques used for minimizing power usage for the
+ network communications include minimizing any work from re-
+ establishing communications after waking up and tuning the
+ frequency of communications (including "duty cycling", where
+ components are switched on and off in a regular cycle) and other
+ parameters appropriately.
+
+ Table 4 provides a summary of the strategies described above.
+
+ +------+--------------+---------------------------------------------+
+ | Name | Strategy | Ability to communicate |
+ +------+--------------+---------------------------------------------+
+ | P0 | Normally-off | Reattach when required |
+ | | | |
+ | P1 | Low-power | Appears connected, perhaps with high |
+ | | | latency |
+ | | | |
+ | P9 | Always-on | Always connected |
+ +------+--------------+---------------------------------------------+
+
+ Table 4: Strategies of Using Power for Communication
+
+ Note that the discussion above is at the device level; similar
+ considerations can apply at the communications-interface level. This
+ document does not define terminology for the latter.
+
+ A term often used to describe power-saving approaches is "duty-
+ cycling". This describes all forms of periodically switching off
+ some function, leaving it on only for a certain percentage of time
+ (the "duty cycle").
+
+
+
+
+
+
+Bormann, et al. Informational [Page 13]
+
+RFC 7228 CNN Terminology May 2014
+
+
+ [RFC7102] only distinguishes two levels, defining a Non-Sleepy Node
+ as a node that always remains in a fully powered-on state (always
+ awake) where it has the capability to perform communication (P9) and
+ a Sleepy Node as a node that may sometimes go into a sleep mode (a
+ low-power state to conserve power) and temporarily suspend protocol
+ communication (P0); there is no explicit mention of P1.
+
+5. Security Considerations
+
+ This document introduces common terminology that does not raise any
+ new security issues. Security considerations arising from the
+ constraints discussed in this document need to be discussed in the
+ context of specific protocols. For instance, Section 11.6 of [COAP],
+ "Constrained node considerations", discusses implications of specific
+ constraints on the security mechanisms employed. [ROLL-SEC-THREATS]
+ provides a security threat analysis for the RPL routing protocol.
+ Implementation considerations for security protocols on constrained
+ nodes are discussed in [IKEV2-MINIMAL] and [TLS-MINIMAL]. A wider
+ view of security in constrained-node networks is provided in
+ [IOT-SECURITY].
+
+6. Acknowledgements
+
+ Dominique Barthel and Peter van der Stok provided useful comments;
+ Charles Palmer provided a full editorial review.
+
+ Peter van der Stok insisted that we should include power terminology,
+ hence Section 4. The text for Section 4.3 is mostly lifted from a
+ previous version of [COAP-CELLULAR] and has been adapted for this
+ document.
+
+7. Informative References
+
+ [COAP] Shelby, Z., Hartke, K., and C. Bormann, "Constrained
+ Application Protocol (CoAP)", Work in Progress, June 2013.
+
+ [COAP-CELLULAR]
+ Arkko, J., Eriksson, A., and A. Keranen, "Building Power-
+ Efficient CoAP Devices for Cellular Networks", Work in
+ Progress, February 2014.
+
+ [FALL] Fall, K., "A Delay-Tolerant Network Architecture for
+ Challenged Internets", SIGCOMM 2003, 2003.
+
+
+
+
+
+
+
+
+Bormann, et al. Informational [Page 14]
+
+RFC 7228 CNN Terminology May 2014
+
+
+ [FIFTY-BILLION]
+ Ericsson, "More Than 50 Billion Connected Devices",
+ Ericsson White Paper 284 23-3149 Uen, February 2011,
+ <http://www.ericsson.com/res/docs/whitepapers/
+ wp-50-billions.pdf>.
+
+ [IKEV2-MINIMAL]
+ Kivinen, T., "Minimal IKEv2", Work in Progress, October
+ 2013.
+
+ [IOT-SECURITY]
+ Garcia-Morchon, O., Kumar, S., Keoh, S., Hummen, R., and
+ R. Struik, "Security Considerations in the IP-based
+ Internet of Things", Work in Progress, September 2013.
+
+ [ISQ-13] International Electrotechnical Commission, "International
+ Standard -- Quantities and units -- Part 13: Information
+ science and technology", IEC 80000-13, March 2008.
+
+ [RFC0793] Postel, J., "Transmission Control Protocol", STD 7, RFC
+ 793, September 1981.
+
+ [RFC4838] Cerf, V., Burleigh, S., Hooke, A., Torgerson, L., Durst,
+ R., Scott, K., Fall, K., and H. Weiss, "Delay-Tolerant
+ Networking Architecture", RFC 4838, April 2007.
+
+ [RFC4919] Kushalnagar, N., Montenegro, G., and C. Schumacher, "IPv6
+ over Low-Power Wireless Personal Area Networks (6LoWPANs):
+ Overview, Assumptions, Problem Statement, and Goals", RFC
+ 4919, August 2007.
+
+ [RFC6550] Winter, T., Thubert, P., Brandt, A., Hui, J., Kelsey, R.,
+ Levis, P., Pister, K., Struik, R., Vasseur, JP., and R.
+ Alexander, "RPL: IPv6 Routing Protocol for Low-Power and
+ Lossy Networks", RFC 6550, March 2012.
+
+ [RFC6551] Vasseur, JP., Kim, M., Pister, K., Dejean, N., and D.
+ Barthel, "Routing Metrics Used for Path Calculation in
+ Low-Power and Lossy Networks", RFC 6551, March 2012.
+
+ [RFC6606] Kim, E., Kaspar, D., Gomez, C., and C. Bormann, "Problem
+ Statement and Requirements for IPv6 over Low-Power
+ Wireless Personal Area Network (6LoWPAN) Routing", RFC
+ 6606, May 2012.
+
+ [RFC7102] Vasseur, JP., "Terms Used in Routing for Low-Power and
+ Lossy Networks", RFC 7102, January 2014.
+
+
+
+
+Bormann, et al. Informational [Page 15]
+
+RFC 7228 CNN Terminology May 2014
+
+
+ [ROLL-SEC-THREATS]
+ Tsao, T., Alexander, R., Dohler, M., Daza, V., Lozano, A.,
+ and M. Richardson, "A Security Threat Analysis for Routing
+ Protocol for Low-power and lossy networks (RPL)", Work in
+ Progress, December 2013.
+
+ [RPL-DEPLOYMENT]
+ Vasseur, J., Ed., Hui, J., Ed., Dasgupta, S., and G. Yoon,
+ "RPL deployment experience in large scale networks", Work
+ in Progress, July 2012.
+
+ [TLS-MINIMAL]
+ Kumar, S., Keoh, S., and H. Tschofenig, "A Hitchhiker's
+ Guide to the (Datagram) Transport Layer Security Protocol
+ for Smart Objects and Constrained Node Networks", Work in
+ Progress, March 2014.
+
+ [V6-BTLE] Nieminen, J., Ed., Savolainen, T., Ed., Isomaki, M.,
+ Patil, B., Shelby, Z., and C. Gomez, "Transmission of IPv6
+ Packets over BLUETOOTH Low Energy", Work in Progress, May
+ 2014.
+
+ [V6-DECT-ULE]
+ Mariager, P., Ed., Petersen, J., and Z. Shelby,
+ "Transmission of IPv6 Packets over DECT Ultra Low Energy",
+ Work in Progress, July 2013.
+
+ [V6-G9959] Brandt, A. and J. Buron, "Transmission of IPv6 packets
+ over ITU-T G.9959 Networks", Work in Progress, May 2014.
+
+ [WEI] Shelby, Z. and C. Bormann, "6LoWPAN: the Wireless Embedded
+ Internet", ISBN 9780470747995, 2009.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Bormann, et al. Informational [Page 16]
+
+RFC 7228 CNN Terminology May 2014
+
+
+Authors' Addresses
+
+ Carsten Bormann
+ Universitaet Bremen TZI
+ Postfach 330440
+ D-28359 Bremen
+ Germany
+
+ Phone: +49-421-218-63921
+ EMail: cabo@tzi.org
+
+
+ Mehmet Ersue
+ Nokia Solutions and Networks
+ St.-Martinstrasse 76
+ 81541 Munich
+ Germany
+
+ Phone: +49 172 8432301
+ EMail: mehmet.ersue@nsn.com
+
+
+ Ari Keranen
+ Ericsson
+ Hirsalantie 11
+ 02420 Jorvas
+ Finland
+
+ EMail: ari.keranen@ericsson.com
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Bormann, et al. Informational [Page 17]
+