Browse Prior Art Database

Management of Networks with Constrained Devices: Use Cases (RFC7548)

IP.com Disclosure Number: IPCOM000241591D
Publication Date: 2015-May-14
Document File: 52 page(s) / 71K

Publishing Venue

The IP.com Prior Art Database

Related People

M. Ersue: AUTHOR [+5]

Abstract

Constrained devices (also known as sensors, smart objects, or smart devices) with limited CPU, memory, and power resources can be connected to a network. Such a network of constrained devices itself may be constrained or challenged, e.g., with unreliable or lossy channels, wireless technologies with limited bandwidth and a dynamic topology, needing the service of a gateway or proxy to connect to the Internet. In other scenarios, the constrained devices can be connected to a unconstrained network using off-the-shelf protocol stacks. Constrained devices might be in charge of gathering information in diverse settings including natural ecosystems, buildings, and factories and sending the information to one or more server stations.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 4% of the total text.

Internet Engineering Task Force (IETF)                     M. Ersue, Ed. Request for Comments: 7548                                Nokia Networks Category: Informational                                     D. Romascanu ISSN: 2070-1721                                                    Avaya                                                         J. Schoenwaelder                                                                A. Sehgal                                                 Jacobs University Bremen                                                                 May 2015

        Management of Networks with Constrained Devices: Use Cases

Abstract

   This document discusses use cases concerning the management of    networks in which constrained devices are involved.  A problem    statement, deployment options, and the requirements on the networks    with constrained devices can be found in the companion document on    "Management of Networks with Constrained Devices: Problem Statement    and Requirements" (RFC 7547).

Status of This Memo

   This document is not an Internet Standards Track specification; it is    published for informational purposes.

   This document is a product of the Internet Engineering Task Force    (IETF).  It represents the consensus of the IETF community.  It has    received public review and has been approved for publication by the    Internet Engineering Steering Group (IESG).  Not all documents    approved by the IESG are a candidate for any level of Internet    Standard; see Section 2 of RFC 5741.

   Information about the current status of this document, any errata,    and how to provide feedback on it may be obtained at    http://www.rfc-editor.org/info/rfc7548.

Ersue, et al.                 Informational                     [Page 1]
 RFC 7548            Constrained Management: Use Cases           May 2015

 Copyright Notice

   Copyright (c) 2015 IETF Trust and the persons identified as the    document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal    Provisions Relating to IETF Documents    (http://trustee.ietf.org/license-info) in effect on the date of    publication of this document.  Please review these documents    carefully, as they describe your rights and restrictions with respect    to this document.  Code Components extracted from this document must    include Simplified BSD License text as described in Section 4.e of    the Trust Legal Provisions...