I have also reviewed this draft, and am definitely supportive of it moving 
forward as a WG document. I agree with Carsten's comments, especially with 
regard to 6LoWPAN-ND. I understand that an update is already in progress to 
address those comments.

In addition, I found Figure 4 in Section 5.3 to be confusing at first. It 
should be clarified that this is a G.9959 link-layer address. 

Since this is a less widely known link-layer, a couple examples would not hurt 
as to the structure of the MAC framing with the address mapping defined in 
Section 5.3 for both unicast and multicast addresses.

Regards,
Zach

On Mar 9, 2013, at 1:16 PM, Carsten Bormann <[email protected]> wrote:

> Here's my review of draft-brandt-6man-lowpanz-00.  This is a worthy
> addition to the collection of IP-over foo documents, and I think it
> properly positions itself in the 6lowpan family of
> IP-over-constrained-node-network specifications.  With one exception:
> 
> I'm not sure how this document positions itself with respect to ND.
> It says it tries to parallel RFC 4944.  4944 has been updated by RFC
> 6775.  Is this document thus also referencing 6775?  There is also an
> obscure reference to a section of 4861.  Is the intention maybe that
> 4861 be used unchanged?  If yes, how does this mesh with section 3.2?
> 
> My other technical problem is with section 3.4.  I don't think an
> IP-over-foo document is the right place to change the IP service
> model.  Besides, this kind of indication may be available about the
> first-hop link, but what about mid-path?  On the socket interface, it
> is hard to do a MUST here if you then don't say how it should look
> like.
> 
> More on the editorial level:
> 
> I'm not happy with the "mission-critical" wording, and also not with
> the SHOULD.  How about:
> 
>   The network key is intended to address security requiments in
>   the home at the normal security requirements level.
>   For applications with high or very high requirements on
>   confidentiality and/or integrity, such as door locks and meters,
>   additional application layer security measures for end-to-end
>   authentication and encryption will need to be applied.
>   The availability of the network relies on the security properties
>   of the network key in any case.
> 
> What does "mapped into restricted space" mean?
> 
> Grüße, Carsten
> 
> _______________________________________________
> 6lowpan mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/6lowpan

-- 
Zach Shelby, Chief Nerd, Sensinode Ltd.
http://www.sensinode.com @SensinodeIoT
Mobile: +358 40 7796297
Twitter: @zach_shelby
LinkedIn: http://fi.linkedin.com/in/zachshelby
6LoWPAN Book: http://6lowpan.net




_______________________________________________
6lowpan mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/6lowpan

Reply via email to