Hi,

As per the call for reviewing the COMAN documents, I have taken a look at the 
latest versions and have a few comments/recommendations for both. The reviews, 
along with suggestions on fixing them, are attached to this email in 
appropriate files.

Regards,
Anuj Sehgal

2.3 Industrial Applications

---------------------------



(a) Make the section on Building Automation section 2.3, thereby

    moving Industrial applications to 2.5 and Home automation to 2.5,

    since a reference to Building Automation like scenarios exist in

    both of these areas as well.



(b) I believe that separating Building Automation from Industrial

    Applications is important. Industrial Applications, in my view,

    are typically those systems that may be required to adapt the

    operating conditions of a manufacturing plant, monitor the

    production systems and trigger specific decision making processes

    (e.g. ordering components, trigger safety mechanisms and etc.).



    As such, I propose the following change to the first few sentences

    of the first paragraph:



       "Industrial Applications and smart manufacturing refer to

       networked control and monitoring of tasks such as equipment

       related to manufacturing, asset and situation management or

       process control.  For the management of a factory it is

       becoming essential to implement smart capabilities.  From an

       engineering standpoint, industrial applications are intelligent

       systems enabling rapid manufacturing of new products, dynamic

       response to product demand, and real-time optimization of

       manufacturing production and supply chain networks.  Potential

       industrial applications e.g. for smart factories and smart

       manufacturing are:"



(c) Of course, it is still possible that Building Automation may be

    performed or interfaced with in order to achieve the goals of an

    Industrial Application. For example, a steel manufacturing plant

    may use a building management system to control the temperature of

    a furnace in order to change the grade of steel produced.



    It is likely important to highlight that even though there might

    be some differences between the application scenarios, in some

    situations the boundaries might be blurred, so that the reader

    understands that some applications scenarios are closely

    coupled. Another example of intersect is that between Industrial

    Applications and Environmental Monitoring, especially when it

    comes to Nuclear Energy Plants.



    As such, I propose adding a new second paragraph to clarify this

    intersect that may occur, but still keep Building Automation

    separate from Industrial Applications in general:



       "Management of Industrial Applications and smart manufacturing

       may in some situations be achieved by interfacing with and

       completing Building Automation tasks such as control of energy,

       HVAC (heating, ventilation, and air conditioning), lighting,

       access control, and etc. Interacting with management systems

       from other application areas might also be important in some

       cases (e.g. environmental monitoring for nuclear energy

       production, energy management for dynamically scaling

       manufacturing, vehicular networks for mobile asset tracking and

       etc.)."



    In case an example of such a scenario is required, it could be

    added as well.



(d) As such, in totality the new first two paragraphs of this section

    would read:



       "Industrial Applications and smart manufacturing refer to

       networked control and monitoring of tasks such as equipment

       related to manufacturing, asset and situation management or

       process control.  For the management of a factory it is

       becoming essential to implement smart capabilities.  From an

       engineering standpoint, industrial applications are intelligent

       systems enabling rapid manufacturing of new products, dynamic

       response to product demand, and real-time optimization of

       manufacturing production and supply chain networks.  Potential

       industrial applications e.g. for smart factories and smart

       manufacturing are:



         * bullet points follow



       Management of Industrial Applications and smart manufacturing

       may in some situations be achieved by interfacing with and

       completing Building Automation tasks such as control of energy,

       HVAC (heating, ventilation, and air conditioning), lighting,

       access control, and etc. Interacting with management systems

       from other application areas might also be important in some

       cases (e.g. environmental monitoring for nuclear energy

       production, energy management for dynamically scaling

       manufacturing, vehicular networks for mobile asset tracking and

       etc.)."



(e) Diff of the new and old text is attached.





2.4 Home Automation

-------------------



(a) Make the section on Building Automation section 2.3, thereby

    moving Industrial applications to 2.5 and Home automation to 2.5,

    since a reference to Building Automation like scenarios exist in

    both of these areas as well.



(b) I propose including security infrastructure into home automation

    as well, since this is already a significant market that is

    operated and maintained by either home users, or contracting

    agencies like ADT. Furthermore, security services also consist of

    constrained devices, especially in the form of sensors.



    As such, the first paragraph could be changed to the following:



       "Home automation includes the control of lighting, heating,

       ventilation, air conditioning, appliances, entertainment and

       home security devices to improve convenience, comfort, energy

       efficiency, and security. It can be seen as a residential

       extension of building automation."



(c) The differentiation between home automation and building

    automation is not very clear at this point. An extension to the

    first paragraph can be made in the following way:



       "It can be seen as a residential extension of building

       automation. However, it is expected that unlike a building

       automation system the infrastructure in a home is operated in a

       considerably more ad-hoc nature, with no centralized management

       system akin to a Building Automation System (BAS) available to

       concentrate various functions together."



(d) Currently the draft suggests that home automation configuration

    services may be provided by electricians. But, in time, there

    might be other players that emerge in this market as well (ISPs,

    small private companies, device manufacturers and etc.). This

    makes it likely that configuration and management services may be

    provided to home users, similar to the way it is offered in the

    home security sphere today.



    As such, I recommend the following modification to the second

    paragraph:



       "Home automation networks need a certain amount of

       configuration (associating switches or sensors to actors) that

       is either provided by electricians deploying home automation

       solutions, third party service providers (ISPs, small

       outsourcing firms, device manufacturers, online portals and

       etc.) or done by residents by using the application user

       interface to configure (parts of) the home automation

       solution. Similarly, failures may be reported via suitable

       interfaces to residents or they might be recorded and made

       available to service providers in charge of the maintenance of

       the home automation infrastructure."



(e) Based on the addition of third party service providers, the last

    paragraph could be extended as well:



       "The management responsibility lies either with the residents

       or it may be outsourced to electricians and/or third parties

       providing management of home automation solutions as a service.

       A varying combination of electricians, service providers or the

       residents may be responsible for different aspects of managing

       the infrastructure.  The time scale for failure detection and

       resolution is in many cases likely counted in hours to days."



(f) This causes the new text of the section on Home Automation to read

    as below:



       "Home automation includes the control of lighting, heating,

       ventilation, air conditioning, appliances, entertainment and

       home security devices to improve convenience, comfort, energy

       efficiency, and security. 



       It can be seen as a residential extension of building

       automation. However, it is expected that unlike a building

       automation system the infrastructure in a home is operated in a

       considerably more ad-hoc nature, with no centralized management

       system akin to a Building Automation System (BAS) available to

       concentrate various functions together.



       Home automation networks need a certain amount of configuration

       (associating switches or sensors to actors) that is either

       provided by electricians deploying home automation solutions,

       third party service providers (ISPs, small outsourcing firms,

       device manufacturers, online portals and etc.) or done by

       residents by using the application user interface to configure

       (parts of) the home automation solution. Similarly, failures

       may be reported via suitable interfaces to residents or they

       might be recorded and made available to service providers in

       charge of the maintenance of the home automation

       infrastructure.



       The management responsibility lies either with the residents or

       it may be outsourced to electricians and/or third parties

       providing management of home automation solutions as a service.

       A varying combination of electricians, service providers or the

       residents may be responsible for different aspects of managing

       the infrastructure.  The time scale for failure detection and

       resolution is in many cases likely counted in hours to days."



   A diff of the section is attached.





2.10 Mobile Applications

------------------------



(a) The whole use case of Mobile Applications in Section 2.10 seems to

    be not really a use case, but rather special cases related to

    access technologies. 



    All the issues discussed here seem to be use case issues that

    should be part of other use case sub-sections. As such, one

    approach to overcoming this problem would be to merge this

    sub-section into the previous sub-sections. Another possibility is

    to create a new section that discusses only access technologies

    rather than application scenarios.



(b) For the sake of simplicity, I propose creating a new section for

    access technologies:



       "3. Access Technologies

        ----------------------

        

        Besides the management requirements imposed by the different

        use cases, the access technologies used by the constrained

        devices might also impose restrictions and requirements upon

        the Network Management System (NMS) and protocol of choice.



        It is possible that some networks of constrained devices might

        utilize traditional non-constrained access technologies,

        e.g. LAN, for network access. In such scenarios, the

        constrainedness of the device presents special management

        restrictions and requirements rather than the access

        technology utilized.



        However, in other situations constrained or mobile access

        technologies might be used for network access, thereby causing

        management restrictions and requirements to arise as a result

        of the underlying access technologies.



        3.1 Constrained Access Technologies

        -----------------------------------



        Due to resource restrictions, embedded devices deployed as

        sensors and actuators in the aforementioned use cases can

        utilize low-power low data-rate access technologies such as

        IEEE 802.15.4, DECT ULE or BT-LE for network connectivity.



        In such situations it is important for the NMS to be aware of

        the restrictions imposed by these technologies efficiently

        manage these constrained devices. Specifically, such low-power

        low data-rate access technologies typically have small frame

        sizes. So it would be important for the NMS and management

        protocol of choice to craft packets in a way that avoids

        fragmentation and reassembly of packets since this can use

        valuable memory on constrained devices.



        Devices using such access technologies might operate via a

        gateway that translates between these access technologies and

        more traditional Internet protocols. A hierarchical approach

        to device management in such a situation might be useful,

        wherein the gateway device is in-charge of devices connected

        to it, while the NMS conducts management operations only to

        the gateway.



        Mobile Access Technologies

        --------------------------



        M2M services are increasingly provided by mobile service

        providers as numerous devices, home appliances, utility

        meters, cars, video surveillance cameras, and health monitors,

        are connected with mobile broadband technologies. Different

        applications e.g. in a home appliance or in-car network use

        Bluetooth, Wi-Fi or Zigbee and connect to a cellular module

        acting as a gateway between the constrained environment and

        the mobile cellular network.



        Such a gateway might provide different options for the

        connectivity of mobile networks and constrained devices, e.g.:



        o a smart phone with 3G/4G and WLAN radio might use BT-LE to

          connect to the devices in a home area network,

        

        o a femtocell might be combined with home gateway

          functionality acting as a low-power cellular base station

          connecting smart devices to the application server of a

          mobile service provider,



        o an embedded cellular module with LTE radio connecting the

          devices in the car network with the server running the

          telematics service,



        o an M2M gateway connected to the mobile operator network

          supporting diverse IoT connectivity technologies including

          ZigBee and CoAP over 6LoWPAN over IEEE 802.15.4.



        Common to all scenarios above is that they are embedded in a

        service and connected to a network provided by a mobile

        service provider. Usually there is a hierarchical deployment

        and management topology in place where different parts of the

        network are managed by different management entities and the

        count of devices to manage is high (e.g.  many thousands).  In

        general, the network is comprised by manifold type and size of

        devices matching to different device classes.  As such, the

        managing entity needs to be prepared to manage devices with

        diverse capabilities using different communication or

        management protocols.  In case the devices are directly

        connected to a gateway they most likely are managed by a

        management entity integrated with the gateway, which itself is

        part of the Network Management System (NMS) run by the mobile

        operator.  Smart phones or embedded modules connected to a

        gateway might be themselves in charge to manage the devices on

        their level.  The initial and subsequent configuration of such

        a device is mainly based on self-configuration and is

        triggered by the device itself.



        The gateway might be in charge of filtering and aggregating

        the data received from the device as the information sent by

        the device might be mostly redundant."



    Talk of mobility of nodes has been removed from this section

    because this should either be merged back into individual use

    cases wherein mobility is expected, or be merged into a section on

    Vehicular Networks and a reference made to this, as necessary.





2.12 MANET Concept of Operations (CONOPS) in Military

-----------------------------------------------------



(a) Section 2.12, MANET Concept of Operations (CONOPS) in Military, is

    considerably more detailed than any of the other use case

    sections. In fact, a lot of the text here focuses on things like

    hierarchical management, special access technologies and

    mobility. This was all covered in other use cases. 



    It would, as such, make more sense to re-write this section in

    keeping with the level of detail provided in other use cases,

    while shifting the focus to purely military applications and the

    special conditions that come with military operations.



    This could cover things like increased international military unit

    cooperation that bring along with it multiple different standards,

    best practices and conflicting/contradicting implementation

    approaches.



    As such, I propose the following new text for this section:



    "2.12 Military Operations

    -------------------------



    The challenges of configuration and monitoring of networks faced

    by military agencies can be different from the other use cases

    since the requirements and operating conditions of military

    networks are quite different.

    

    With technology advancements, military networks nowadays have

    become large and consist of varieties of different types of

    equipment that run different protocols and tools that obviously

    increase complexity of the tactical networks. In many scenarios,

    configurations are, most likely, manually performed. Furthermore,

    some legacy and even modern devices do not even support IP

    networking. Majority of protocols and tools developed by vendors

    that are being used are proprietary which makes integration more

    difficult.



    The main reason for this disjoint operation scenario is that

    most military equipment is developed with specific tasks

    requirements in mind, rather than interoperability of the varied

    equipment types. For example, the operating conditions experienced

    by high altitude equipment is significantly different from that

    used in desert conditions and interoperation of tactical equipment

    with telecommunication equipment was not an expected outcome.



    Currently, most military networks operate with a fixed Network

    Operations Center (NOC) that physically manages the configuration

    and evaluation of all field devices. Once configured, the devices

    might be deployed in fixed or mobile scenarios. Any configuration

    changes required would need to be appropriately encrypted and

    authenticated to prevent unauthorized access.



    Hierarchical management of devices is a common requirement of

    military operations as well since local managers may need to

    respond to changing conditions within their platoon, regiment,

    brigade, division or corps. The level of configuration management

    available at each hierarchy must also be closely governed.

    

    Since most military networks operate in hostile environments, a

    high failure rate and disconnection rate should be tolerated by

    the Network Management System (NMS), which must also be able to

    deal with multiple gateways and disjoint management protocols.



    Multi-national military operations are becoming increasingly

    common, requiring the interoperation of a diverse set of equipment

    designed with different operating conditions in mind. Furthermore,

    different militaries are likely to have a different set of

    standards, best practices, rules and regulation, and

    implementation approaches that may contradict or conflict with

    each other. The NMS should be able to detect these and handle them

    in an acceptable manner, which may require human intervention."



2.TBD Vehicular Networks

------------------------



(a) Since there are management requirements and restrictions that

    arise out of mobility of nodes, and vehicular networks is a case

    that highlights these well, it would make sense to include this

    use case within the document as well.



    As a starting point, I propose the following text:



    "2.TBD Vehicular Networks

     ------------------------



     Networks involving mobile nodes, especially transport vehicles,

     are emerging as a new area. Such networks are used to provide

     inter-vehicle communication services, or even tracking of mobile

     assets, to develop intelligent transportation systems and drivers

     and passengers assistance services. Constrained devices are

     deployed within a larger single entity, the vehicle, and must be

     individually managed in this scenario.



     Vehicles can be either private, belonging to individuals or

     private companies, or public transportation. Scenarios consisting

     of vehicle-to-vehicle ad-hoc networks, a wired backbone with

     wireless last hops, and hybrid vehicle-to-road communications are

     expected to be common.



     Besides the access control and security, depending on the type of

     vehicle and service being provided, it would be important for a

     Network Management System (NMS) to be able to function with

     different architectures, since different manufacturers might have

     their own proprietary systems.



     Unlike some mobile networks, most vehicular networks are expected

     to have specific patterns in the mobility of the nodes. Such

     patterns could possibly be exploited, managed and monitored by

     the NMS.



     The challenges in the management of vehicles in a mobile

     application are manifold. Firstly, the issues caused through the

     device mobility need to be taken into consideration. The

     up-to-date position of each node in the network should be

     reported to the corresponding management entities, since the

     nodes could be moving within or roaming between different

     networks. Secondly, a variety of troubleshooting information,

     including sensitive location information, needs to be reported to

     the management system in order to provide accurate service to the

     customer.



     The NMS must also be able to handle partitioned networks, which

     would arise due to the dynamic nature of traffic resulting in

     large inter-vehicle gaps in sparsely populated scenarios. Constant

     changes in topology must also be contended with.



     Auto-configuration of nodes in a vehicular network remains a

     challenge since based on location, and access network, the

     vehicle might have different configurations that must be obtained

     from its management system. Operating configuration updates,

     while in remote networks also needs to be considered in the

     design of a NMS.”
2,4c2,11

< ventilation, air conditioning, appliances, and entertainment devices

< to improve convenience, comfort, energy efficiency, and security.  It

< can be seen as a residential extension of building automation.

---

> ventilation, air conditioning, appliances, entertainment and home

> security devices to improve convenience, comfort, energy efficiency,

> and security.

> 

> It can be seen as a residential extension of building

> automation. However, it is expected that unlike a building automation

> system the infrastrucutre in a home is operated in a considerably more

> ad-hoc nature, with no centralized management system akin to a

> Building Automation System (BAS) available to concentrate various

> functions together.

8,13c15,22

< electricians deploying home automation solutions or done by residents

< by using the application user interface to configure (parts of) the

< home automation solution.  Similarly, failures may be reported via

< suitable interfaces to residents or they might be recorded and made

< available to electricians in charge of the maintenance of the home

< automation infrastructure.

---

> electricians deploying home automation solutions, third party service

> providers (ISPs, small outsourcing firms, device manufacturers, online

> portals and etc.) or done by residents by using the application user

> interface to configure (parts of) the home automation

> solution. Similarly, failures may be reported via suitable interfaces

> to residents or they might be recorded and made available to service

> providers in charge of the maintenance of the home automation

> infrastructure.

16,18c25,30

< be outsourced to electricians providing management of home automation

< solutions as a service.  The time scale for failure detection and

< resolution is in many cases likely counted in hours to days.

---

> be outsourced to electricians and/or third parties providing

> management of home automation solutions as a service.  A varying

> combination of electricians, service providers or the residents may be

> responsible for different aspects of managing the infrastrucutre.  The

> time scale for failure detection and resolution is in many cases

> likely counted in hours to days.

1,10c1,9

< Industrial Applications and smart manufacturing refer not only to

< production equipment, but also to a factory that carries out

< centralized control of energy, HVAC (heating, ventilation, and air

< conditioning), lighting, access control, etc. via a network.  For the

< management of a factory it is becoming essential to implement smart

< capabilities.  From an engineering standpoint, industrial applications

< are intelligent systems enabling rapid manufacturing of new products,

< dynamic response to product demand, and real-time optimization of

< manufacturing production and supply chain networks.  Potential

< industrial applications e.g. for smart factories and smart

---

> Industrial Applications and smart manufacturing refer to networked

> control and monitoring of tasks such as equipment related to

> manufacturing, asset and situation management or process control.  For

> the management of a factory it is becoming essential to implement

> smart capabilities.  From an engineering standpoint, industrial

> applications are intelligent systems enabling rapid manufacturing of

> new products, dynamic response to product demand, and real-time

> optimization of manufacturing production and supply chain networks.

> Potential industrial applications e.g. for smart factories and smart

20c19

< o  Smart sensors detecting anomalies to avoid abnormal or

---

> o  Smart sensors detecting anomalies to avoid abnormal or 

24c23

<    system and externally with the smart grid enabling real-time

---

>    system and externally with the smart grid enabling real-time 

26a26,35

> Management of Industrial Applications and smart manufacturing may in

> some situations be achieved by interfacing with and completing

> Building Automation tasks such as control of energy, HVAC (heating,

> ventilation, and air conditioning), lighting, access control, and

> etc. Interacting with management systems from other application areas

> might also be important in some cases (e.g. environmental monitoring

> for nuclear energy production, energy management for dynamically

> scaling manufacturing, vehicular networks for mobile asset tracking

> and etc.).

> 

1.3 Network Types and Characteristics in Focus

----------------------------------------------



(a) "Mobile Adhoc networks (MANET) are self-configuring

    _infrastructureless_ networks of mobile devices connected by

    wireless technologies."



    --> Why is a differentiation being made between MANETs and other

        types of wireless networks? Couldn't moblie phones technically

        fit into the IoT as well? Is the differentiation only made

        based on the _infrastructureless_ part of it? If so, does it

        make sense to have categories of infrastructure and

        infrastructureless, rather than MANET and non-MANET networks?

    

(b) "Wireline non-constrained networks are mainly used for specific

    applications like Building Automation or Infrastructure

    Monitoring.  However, wireline and wireless networks with

    multi-hop or point-to- multipoint connectivity are especially in

    the interest of the analysis on the management of constrained

    devices in this document."



    --> This paragraph is unclear. What is it trying to convey? Is it

        saying that only wireline multi-hop and point-to-multipoint

        are within the scope of this document? Why not regular

        wireline networks that may have constrained devices as part of

        a non-constrained network?

    

    --> There is talk about bandwidth, but not frame size, which is

        likely to have a bigger impact than the overall bandwidth

        available in a channel. Maybe this should be mentioned?





1.6.  Managing the Constrainedness of a Device or Network

---------------------------------------------------------



(a) "might only be able to support one simple communication protocol,

    i.e. the management protocol needs to be possible to downscale

    from constrained (C2) to very constrained (C0) devices"



    --> Is it important that the same management protocol be

        applicable to the entire range of constrained devices? Why not

        allow the capabilities of the management protocol to scale up

        and down with the type/capabilities of the device at hand?



        SOLUTION: A new bullet point stating that different management

        protocols work on different class of devices.



(b) "might only be able to support limited or no user and/or transport

    security" AND "might only be able to support very simple

    encryption"



    --> Simple encryption doesn't make sense, maybe it should be

        efficient encryption instead?



(c) "might also need energy-efficient key management algorithms for

    security."



    --> Not just energy-efficient, but also memory, processing and

        etc. efficient. No?



        SOLUTION: Change text to only efficient key management.

_______________________________________________
OPSAWG mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/opsawg

Reply via email to