Internet DRAFT - draft-bormann-core-roadmap

draft-bormann-core-roadmap







CoRE Working Group                                            C. Bormann
Internet-Draft                                   Universitaet Bremen TZI
Intended status: Standards Track                        October 22, 2013
Expires: April 25, 2014


                 CoRE Roadmap and Implementation Guide
                     draft-bormann-core-roadmap-05

Abstract

   The CoRE set of protocols, in particular the CoAP protocol, is
   defined in draft-ietf-core-coap in conjunction with a number of
   specifications that are currently nearing completion.  There are also
   several dozen more individual Internet-Drafts in various states of
   development, with various levels of WG review and interest.

   Today, this is simply a bewildering array of documents.  Beyond the
   main four documents, it is hard to find relevant information and
   assess the status of proposals.  At the level of Internet-Drafts, the
   IETF has only adoption as a WG document to assign status - too crude
   an instrument to assess the level of development and standing for
   anyone who does not follow the daily proceedings of the WG.

   With a more long-term perspective, as additional drafts mature and
   existing specifications enter various levels of spec maintenance, the
   entirety of these specifications may become harder to understand,
   pose specific implementation problems, or be simply inconsistent.

   The present guide aims to provide a roadmap to these documents as
   well as provide specific advice how to use these specifications in
   combination.  In certain cases, it may provide clarifications or even
   corrections to the specifications referenced.

   This guide is intended as a continued work-in-progress, i.e. a long-
   lived Internet-Draft, to be updated whenever new information becomes
   available and new consensus on how to handle issues is formed.
   Similar to the ROHC implementation guide, RFC 4815, it might be
   published as an RFC at some future time later in the acceptance curve
   of the specifications.

   This document does not describe a new protocol or attempt to set a
   new standard of any kind - it mostly describes good practice in using
   the existing specifications, but it may also document emerging
   consensus where a correction needs to be made.






Bormann                  Expires April 25, 2014                 [Page 1]

Internet-Draft    CoRE Roadmap and Implementation Guide     October 2013


   (TODO: The present version does not completely cover the new
   Internet-Drafts submitted concurrently with it; it is to be updated
   by the start of IETF88.)

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on April 25, 2014.

Copyright Notice

   Copyright (c) 2013 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   3
     1.1.  Terminology . . . . . . . . . . . . . . . . . . . . . . .   3
   2.  The Main Four . . . . . . . . . . . . . . . . . . . . . . . .   3
     2.1.  The CoAP protocol . . . . . . . . . . . . . . . . . . . .   4
     2.2.  Discovery . . . . . . . . . . . . . . . . . . . . . . . .   5
     2.3.  Further reading . . . . . . . . . . . . . . . . . . . . .   6
   3.  Informational Drafts  . . . . . . . . . . . . . . . . . . . .   6
     3.1.  Implementation  . . . . . . . . . . . . . . . . . . . . .   6
     3.2.  Multicast and Group Communication . . . . . . . . . . . .   7
     3.3.  Security  . . . . . . . . . . . . . . . . . . . . . . . .   8



Bormann                  Expires April 25, 2014                 [Page 2]

Internet-Draft    CoRE Roadmap and Implementation Guide     October 2013


     3.4.  Intermediaries  . . . . . . . . . . . . . . . . . . . . .   9
     3.5.  Congestion Control  . . . . . . . . . . . . . . . . . . .   9
   4.  CoAP over X . . . . . . . . . . . . . . . . . . . . . . . . .   9
   5.  Optional components of CoRE . . . . . . . . . . . . . . . . .  10
     5.1.  CoAP-misc . . . . . . . . . . . . . . . . . . . . . . . .  10
     5.2.  Generalizing Media Types  . . . . . . . . . . . . . . . .  11
     5.3.  Patience, Leisure, Pledge, or: Timing extensions  . . . .  11
     5.4.  Extending Observe . . . . . . . . . . . . . . . . . . . .  11
     5.5.  Service discovery . . . . . . . . . . . . . . . . . . . .  11
     5.6.  Server discovery, Naming, etc.  . . . . . . . . . . . . .  12
     5.7.  More support for sleepy nodes . . . . . . . . . . . . . .  12
   6.  Replaced drafts . . . . . . . . . . . . . . . . . . . . . . .  14
   7.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .  15
   8.  Security Considerations . . . . . . . . . . . . . . . . . . .  15
   9.  Acknowledgements  . . . . . . . . . . . . . . . . . . . . . .  15
   10. References  . . . . . . . . . . . . . . . . . . . . . . . . .  15
     10.1.  Normative References . . . . . . . . . . . . . . . . . .  15
     10.2.  Informative References . . . . . . . . . . . . . . . . .  16
   Author's Address  . . . . . . . . . . . . . . . . . . . . . . . .  22

1.  Introduction

   (To be written - for now please see the Abstract.)

1.1.  Terminology

   This document is a guide.  However, it might evolve to make specific
   recommendations on how to use standards-track specifications.
   Therefore: The key words "MUST", "MUST NOT", "REQUIRED", "SHALL",
   "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and
   "OPTIONAL" in this document are to be interpreted as described in RFC
   2119.  They indicate requirement levels for compliant CoRE
   implementations [RFC2119].  Note that these keywords are not only
   used where a correction or clarification is intended; the latter are
   explicitly identified as such.

   The term "byte" is used in its now customary sense as a synonym for
   "octet".

2.  The Main Four

   The main component of the CoRE architecture is the Constrained
   Application Protocol (CoAP).  It aims to provide a RESTful transfer
   service, not unlike HTTP, but radically simplified for the use on
   constrained devices on constrained networks.  REST is the
   architectural style that informed the design of HTTP [REST].  The
   terms "constrained device" and "constrained network" refer to
   limited-capability devices such as sensors operating on networks such



Bormann                  Expires April 25, 2014                 [Page 3]

Internet-Draft    CoRE Roadmap and Implementation Guide     October 2013


   as the IEEE 802.15.4 based 6LoWPAN [RFC4919].
   [I-D.ietf-lwig-terminology] provides a more detailed discussion of
   what we mean by these terms.

2.1.  The CoAP protocol

   The CoAP protocol is defined in three specifications:

   o  [I-D.ietf-core-coap]

   o  [I-D.ietf-core-block]

   o  [I-D.ietf-core-observe]

   The first specification, [I-D.ietf-core-coap], provides the core
   transfer protocol, including the means to provide communication
   security using the DTLS protocol [RFC6347] (compare this to the way
   [RFC2616] and [RFC2818] define HTTP and HTTPS).  The protocol is
   structured into a message layer, which provides duplicate detection
   and optional message reliability on top of UDP, and a request/
   response layer, which provides the usual REST operations GET, PUT,
   POST, and DELETE.  A highly efficient protocol encoding carries the
   4-byte base header, a sequence of _Options_, and the payload (body)
   of a message.  The main extension points of CoAP are its Options,
   similar to the way new header fields are used to extend HTTP.

   Since CoAP is a very simple protocol running on top of UDP, it is
   limited in its transfer size by the datagram sizes provided by UDP.
   As a further constraint, many constrained networks do not provide
   good reliability of delivery once their small frame sizes are
   exceeded and the adaptation layer is forced to fragment [WEI].  This
   may lead to a practical limitation to payload sizes as small as 64
   bytes.  [I-D.ietf-core-block] extends the base CoAP protocol with
   three options that enable _blockwise_ transfer, i.e., splitting up a
   larger transfer into a sequence of smaller transactions, as well as
   the early determination of the overall size of the resource
   representation.

   In HTTP, transactions are always client initiated, and it is the
   responsibility of the client to perform GET operations again and
   again (polling) if it wants to stay up to date about the status of a
   resource.  This "pull model" becomes expensive in an environment with
   limited power, limited network resources, and nodes that sleep most
   of the time.  Some more or less savory workarounds have been
   developed for HTTP [RFC6202], but, as a new protocol, CoAP can do
   better.  [I-D.ietf-core-observe] extends the base CoAP protocol with
   an option that a client can use to indicate its interest in further
   updates from a resource.  If the server accepts this option, the



Bormann                  Expires April 25, 2014                 [Page 4]

Internet-Draft    CoRE Roadmap and Implementation Guide     October 2013


   client becomes an _Observer_ of this resource and receives an
   asynchronous notification message each time it changes.  Each such
   notification message is identical in structure to the response to the
   initial GET request.

   While the "Block" and "Observe" specifications are optional additions
   to the CoAP protocol (just as the core specification already defines
   14 options most of which will not need to be used in every message),
   they together form what is now generally considered to be the CoAP
   protocol.

   The CoRE Working Group has completed its work on the base CoAP
   protocol specification [I-D.ietf-core-coap] and it has been approved
   by the IESG for publication as a Standards-Track RFC on 2013-07-15.
   The completed document is currently waiting in the RFC editor queue
   for two of its normative references in the security area,
   [I-D.mcgrew-tls-aes-ccm-ecc] and [I-D.ietf-tls-oob-pubkey], to be
   completed and approved.

   The other two CoAP specifications are, at the time of this writing,
   in the process of being updated based on the comments to the first
   Working-Group Last-Call [RFC2418], and in the second Working-Group
   Last-Call, respectively; these are prerequisites to submitting them
   to the IESG for publication as a Standards-Track RFC.

   The specifications, together with link-format (below), have been
   widely implemented in highly interoperable implementations: an ETSI
   "plugtest" event in March 2012 was attended by 15 organizations with
   20 implementations; in over 3000 tests performed only about 6 %
   failed; a second plugtest was conducted in November 2012 and led to
   some final adjustments of some details in the specifications.
   Another plugtest is planned for November 2013 [COAP3].

2.2.  Discovery

   The fourth specification in the main set now nearing completion does
   not extend the CoAP protocol but addresses a different problem.

   In the Web, a number of methods for discovery of resources are
   common.  Initially, Web discovery was just performed by humans based
   on an entry resource to a server (e.g., "/index.html").  This
   resource then includes links that directly or indirectly allow a
   human to reach the other Web resources that make up the Web site.

   Web discovery can be performed by machines if standardized interfaces
   and resource descriptions are available.  Among the component
   mechanisms for Web discovery that are standardized in the IETF are
   the well-known resource path "/.well-known/..." [RFC5785] and the



Bormann                  Expires April 25, 2014                 [Page 5]

Internet-Draft    CoRE Roadmap and Implementation Guide     October 2013


   HTTP link header [RFC5988].  Several related techniques are in common
   use today.

   Clearly, in the machine-to-machine environments that will be typical
   of CoAP applications, it is important to enable devices to discover
   each other and their resources.  Autonomous devices and embedded
   systems necessitate uniform, interoperable resource discovery.

   A basic component for this is provided by a standardized description
   format for the resources a server provides, the _link-format_.
   Unless other methods of discovery are available, CoAP servers should
   provide such a description via the well-known URI "/.well-known/
   core", available for access via a GET request on that URI.  (More
   advanced resource discovery schemes might make the same description
   available by other means, e.g. by posting it to a resource
   directory.)

   The description format has been adapted from the format used in the
   HTTP link header [RFC5988], which is simple and easy to parse.  In
   contrast to the HTTP specification, link-format is specified as an
   Internet media type (what used to be called "MIME type") and intended
   to be carried around in the payload [RFC6690].

   [RFC6690] was the first RFC of the CoRE working group.

2.3.  Further reading

   A recent article provides a more detailed overview over the CoRE
   documents nearing completion [SB].

   While the specification documents themselves have to go into
   meticulous details on every aspect of their protocols, they are the
   ultimate reference source and are the recommended reading if this
   basic overview is not sufficient.

3.  Informational Drafts

3.1.  Implementation

   In the IETF, a separate working group is working on informational
   documents concerning guidance in lightweight implementation of
   protocols, the LWIG working group.  LWIG has several drafts pertinent
   here:

   [I-D.ietf-lwig-terminology] provides some common terms that are
   useful for discussing implementations and specification in the
   constrained node network space.  Section 2 and 3 of this document are
   quite stable at this time; a new section 4 is in preparation that



Bormann                  Expires April 25, 2014                 [Page 6]

Internet-Draft    CoRE Roadmap and Implementation Guide     October 2013


   will include discussion of power-related terminology.
   [I-D.ietf-lwig-cellular] provides a well-founded discussion of
   methods for power conservation in CoAP nodes connected via cellular
   networks, from which some of the material will be used.

   [I-D.ietf-lwig-guidance] was originally intended as the main working
   document of the WG.  It contains some discussion about CoAP
   implementation in its section 3.4.2, including the efficient
   representation of managing duplicate detection state.
   [I-D.kovatsch-lwig-class1-coap] contains additional considerations
   that, over time, might move into [I-D.ietf-lwig-guidance].
   [I-D.castellani-lwig-coap-separate-responses] contains some examples
   for message exchanges, focusing on elaborating exchanges involving
   separate responses.  Since IETF86, work is under way to merge the
   CoAP-related information from these three drafts into a new document,
   [I-D.kovatsch-lwig-coap].

   A new working group has been established in the IETF Security Area to
   address the use of DTLS In Constrained Environments (DICE); several
   drafts are available for discussion at IETF88 in Vancouver.  On the
   implementation side, two drafts show how to build minimal
   implementations of security protocols relevant for CoAP:
   [I-D.ietf-lwig-tls-minimal] for TLS, which is relevant for CoAP's use
   of DTLS; and [I-D.ietf-lwig-ikev2-minimal] for IKEv2, the protocol
   for setting up IPsec security associations.  Similarly,
   [I-D.hartke-core-codtls] looks specifically into the use of DTLS in
   constrained networks.  It raises issues that pertain both to the LWIG
   and CoRE working groups of the IETF.

   Further drafts submitted to LWIG address energy efficient
   implementation [I-D.hex-lwig-energy-efficient] and recent
   developments in operating systems for constrained devices
   [I-D.hahm-lwig-painless-constrained-programming].

   After a somewhat slow start, LWIG is now picking up considerable
   energy.

3.2.  Multicast and Group Communication

   As it is based on UDP, CoAP easily supports the use of IP multicast
   to confer messages.  However, there are difficult issues around
   making the desirable multicast applications actually work well.

   This led to an additional milestone on the CoRE charter:

   Nov 2012:  Using CoAP for group communications to IESG as
      Informational




Bormann                  Expires April 25, 2014                 [Page 7]

Internet-Draft    CoRE Roadmap and Implementation Guide     October 2013


   The informational WG draft [I-D.ietf-core-groupcomm] discusses
   fundamentals and use cases for group communication with CoAP.  This
   is now very close to Working Group last call.

   [I-D.dijk-core-groupcomm-misc] gives some additional considerations,
   listing requirements, providing some taxonomy, proposing deployment
   guidelines, and discussing approaches that are not (yet?) in the
   focus of the WG.  Its section 5 can serve as an overview over the
   status of multicast in constrained node/networks.

3.3.  Security

   Several individual drafts analyze the issues around the security of
   constrained devices in constrained networks.

   [I-D.garcia-core-security] in particular describes the "Thing
   Lifecycle" and discusses resulting architectural considerations.

   [I-D.sarikaya-core-secure-bootsolution] documents the approach taken
   in the ZigBee IP specification (used in Smart Energy Profile 2.0);
   the CoRE WG currently is not working on replicating this
   specification as an IETF document.
   [I-D.jennings-core-transitive-trust-enrollment] demonstrates a
   specific approach to securing the Thing Lifecycle based on defined
   roles of security players, including a Manufacturer, an Introducer,
   and a Transfer Agent.  There is considerable interest in the CoRE
   working group to complete one or more specifications in this space.

   Further work around Thing Lifecycles was expected to occur in the
   SOLACE initiative (Smart Object Lifecycle Architecture for
   Constrained Environments), with its early mailing list at
   solace@ietf.org -- developed after the model of the COMAN
   initiative (Management for Constrained Management Networks and
   Devices, coman@ietf.org, [I-D.ersue-constrained-mgmt]).

   Besides [I-D.garcia-core-security], recently, more work has been
   focused on the Authentication and Authorization aspects of CoRE:

   o  [I-D.gerdes-core-dcaf-authorize]

   o  [I-D.greevenbosch-core-authreq]

   o  [I-D.pporamba-dtls-certkey]

   o  [I-D.urien-core-racs]

   o  [I-D.schmitt-two-way-authentication-for-iot]




Bormann                  Expires April 25, 2014                 [Page 8]

Internet-Draft    CoRE Roadmap and Implementation Guide     October 2013


   o  [I-D.seitz-core-sec-usecases]

   o  [I-D.selander-core-access-control]

   o  [I-D.zhu-core-groupauth]

3.4.  Intermediaries

   [I-D.castellani-core-http-mapping] discusses some ideas about what
   HTTP/CoAP intermediaries could do beyond the basic mapping defined in
   [I-D.ietf-core-coap]; in the IETF86 WG meeting, this document was
   agreed as a future working group item (with validation of the
   adoption on the mailing list still pending).  An earlier version of
   this draft was split into the current document describing best
   practices for mapping between HTTP and CoAP (beyond what is already
   described in [I-D.ietf-core-coap]), and one additional document that
   describes usages that serve as additional useful examples for more
   advanced forms of mapping, a first draft of the latter is available
   in [I-D.castellani-core-advanced-http-mapping].

3.5.  Congestion Control

   [I-D.ietf-core-coap] only defines a very basic congestion control
   scheme that is focused on being safe in a wide variety of
   applications.  Additional documents will define more advanced
   congestion control schemes that can provide more optimized
   performance in exchange for more implementation complexity and/or a
   narrower field of application.

   Several drafts are contributing to this active subject of discussion
   in the WG:

   | draft-bormann-core-congestion-control    | -02 | 2012-08-01 |
   | draft-bormann-core-cocoa                 | -00 | 2012-08-13 |


   [I-D.greevenbosch-core-minimum-request-interval] proposes adding an
   option that allows a server to indicate its desire for some pacing of
   the requests sent to it by one client; enabling a form of server load
   control.

4.  CoAP over X









Bormann                  Expires April 25, 2014                 [Page 9]

Internet-Draft    CoRE Roadmap and Implementation Guide     October 2013


   [I-D.becker-core-coap-sms-gprs] shows how to run CoAP over cellular
   SMS and in mixed SMS/GPRS environments.  This draft optionally makes
   use of an SMS-oriented encoding for CoAP that is described in
   [I-D.bormann-coap-misc].
   [I-D.silverajan-core-coap-alternative-transports] discusses how to
   indicate the alternative transport in a URI.

   [I-D.li-core-coap-payload-length-option] defines a way to indicate
   the length of the payload in case the underlying transport does not
   provide a suitable definite length indication.

5.  Optional components of CoRE

   Additional sub-protocols are being discussed in the IETF that may
   become optional protocols in CoREs.

   The present document will track these sub-protocols and be amended
   once the sub-protocols reach formal status in the IETF.

   Since the WG is cautious in adopting additional work while the main
   specifications near completion, none of the additional protocols
   proposed have become WG documents yet.

5.1.  CoAP-misc

   One draft is a little different from the other drafts in this
   category: [I-D.bormann-coap-misc] is a running document capturing
   CoAP extensions that are in various states of being cooked.

   Some of these extensions may finally be adopted for the WG documents
   and then vanish from CoAP-misc.  For other extensions, we may decide
   that they are not very good ideas.  Instead of deleting them from
   CoAP-misc, they are moved to an appendix.  This documents the
   approach, the best implementation of that approach that was reached,
   and the reasons why it was not adopted.  This documentation should
   spare the WG and its contributors from the continuous reinvention of
   bad ideas.

   As of the time of writing, the main body of CoAP-misc is almost
   empty, as most urgent developments have found their way into the WG
   documents, and many other ideas wait in the "nursery" section of the
   document.









Bormann                  Expires April 25, 2014                [Page 10]

Internet-Draft    CoRE Roadmap and Implementation Guide     October 2013


5.2.  Generalizing Media Types

   CoAP defines a registry for combinations of an Internet Media Type
   ("MIME type") and a Content Encoding (e.g. some form of compression),
   enabling its compact encoding of this information in one or two
   bytes.  Each entry in the registry defines a single, fixed set of
   media type parameters (as in ";charset=utf-8"), if any.  This does
   not work well with media types that rely on more complex combinations
   of parameter settings.  [I-D.doi-core-parameter-option] proposes to
   add an option to carry parameters for media types.

   [I-D.fossati-core-multipart-ct] defines a new media type that can
   carry multiple embedded representations employing different media
   types using a binary type-length-value format.

5.3.  Patience, Leisure, Pledge, or: Timing extensions

   Several proposals intend to extend the amount of information
   available during an exchange about the timing requirements of the
   participants.

   | draft-li-core-coap-patience-option | -01 | 2012-10-22 |


   Another discussion is in Appendix B.4 of [I-D.bormann-coap-misc].

   The question of whether some of this functionality should be
   introduced into the main WG documents now is currently also the
   subject of an active issue tracker ticket [CoRE204].

5.4.  Extending Observe

5.5.  Service discovery

   Basic service discovery is defined in [RFC6690].  A JSON
   representation of the same information is defined in
   [I-D.ietf-core-links-json].  The intention is to make this
   information available in an equivalent format that is more accessible
   to classic Web servers, both as a file format (Internet media type)
   and as a format that can be used in e.g. a JavaScript API.

   [I-D.arkko-core-dev-urn] defines a new Uniform Resource Name (URN)
   namespace that can be used to provide hardware device identifiers in
   resource descriptions.







Bormann                  Expires April 25, 2014                [Page 11]

Internet-Draft    CoRE Roadmap and Implementation Guide     October 2013


   [I-D.ietf-core-interfaces] provides additional semantics that can be
   used to make resource descriptions more directly machine-
   interpretable.  This ties in to a more general discussion about CoRE
   profiles that has only just begun.

   [I-D.greevenbosch-core-profile-description] ties into this and
   defines a basic JSON format for indicating what CoAP Options and what
   Content-Formats (still called media-types there) are available for a
   resource.  At IETF86 there was fairly good consensus in the CoRE WG
   that we should be working on something addressing the underlying
   problem statement, while there was not yet agreement on the specific
   solution.

   [I-D.fossati-core-fp-link-format-attribute] defines a link-format
   attribute that indicates a certain resource is best reached via a
   specific proxy.

5.6.  Server discovery, Naming, etc.

   On the boundary between service and server discovery, resource
   directory servers provide a way to collect resource descriptions from
   multiple servers into one accessible location.

   [I-D.bormann-core-simple-server-discovery] provided a basic way to
   discover such servers in a constrained node/network without
   necessarily having to resort to multicast.  It has been merged into
   [I-D.ietf-core-resource-directory], which defines protocol elements
   that can be used for setting up such a resource directory.

   An attempt to merge mDNS/DNS-SD-based discovery (colloquially known
   as zeroconf or Bonjour), including recent approaches to extend these
   for constrained networks, into the picture is documented in
   [I-D.vanderstok-core-dna]; at IETF86 the authors showed interest to
   continue work on this.

5.7.  More support for sleepy nodes

   The basic communication model of CoAP was imported from the Web.
   This applies well to some communication requirements in constrained
   node/networks, but leaves some other requirements open.

   The assumption underlying the current set of WG documents is that the
   communication layers below the application provide support functions
   for sleeping nodes.  Adding support at the application layer might be
   able to further reduce the power requirements of "sleepy nodes" that
   can sleep most of the time.





Bormann                  Expires April 25, 2014                [Page 12]

Internet-Draft    CoRE Roadmap and Implementation Guide     October 2013


   [I-D.rahman-core-sleepy-problem-statement] summarizes the overall
   problem statement for sleepy nodes without getting into any specific
   solution.

   A number of drafts aim to extend the CoAP communication model towards
   more support for sleepy nodes.

   The base CoAP spec [I-D.ietf-core-coap] already provides some
   rudimentary support of sleepy nodes by supporting caching in
   intermediaries: resources from a sleepy node may be available from a
   caching proxy (if previously retrieved) even though the node is
   asleep.  [I-D.ietf-core-observe] enhances this support by enabling
   sleepy nodes to update caching intermediaries on their own schedule.

   A number of drafts more extensively extend the concept of an
   intermediary by introducing an additional kind of server that is
   hosting the resources of the sleepy node:

   The approach of [I-D.vial-core-mirror-server] is to store the actual
   resource representations in a special type of Resource Directory
   called the Mirror Server.  Communicating devices can then fetch the
   resource from the Mirror Server regardless of the state of the sleepy
   server.  ([I-D.vial-core-mirror-proxy] simply appears to be a
   previous version of this draft.)

   Similar to the above, the approach of
   [I-D.fossati-core-publish-option] is to temporarily delegate
   authority of its resources (when it is sleeping) to a proxy server
   that is always on.

   Also, the approach of [I-D.giacomin-core-sleepy-option] is to define
   a proxy that acts as a store-and-forward agent for a sleepy node.

   Other drafts introduce a variety of signaling based approaches to
   facilitate communicating with sleepy nodes: The approach of
   [I-D.castellani-core-alive] is to define a new CoAP message type
   (called "Alive") which the sleepy node multicasts to all interested
   devices when it wakes up.  The approach of [I-D.rahman-core-sleepy]
   is to introduce storing of sleep characteristics in the Resource
   Directory.  Communicating devices can then query the RD to learn the
   sleep status of the sleepy node before attempting communications.

   Finally, some drafts build on the concept of the Observe mechanism to
   help keep track of the sleepy node information.  The approach of
   [I-D.fossati-core-monitor-option] is to extend the Observe pattern to
   handle the scenario when both server and clients are sleepy nodes.
   Note that some of the other drafts (e.g.,
   [I-D.vial-core-mirror-server], [I-D.rahman-core-sleepy]) include



Bormann                  Expires April 25, 2014                [Page 13]

Internet-Draft    CoRE Roadmap and Implementation Guide     October 2013


   using/extending the Observe mechanism as part of their overall
   approach.

   Support for sleepy nodes is currently a very active subject of
   discussion in the WG; it is clear that there is a high level of
   interest in the WG in addressing application-level support for sleepy
   nodes in future specifications.  See also the discussion of
   [I-D.ietf-lwig-cellular] in Section 3.1 above.

6.  Replaced drafts

   Internet-Drafts often get replaced by merged drafts or get promoted
   to WG drafts.  As the relationships between drafts are not always
   accurately captured by the secretariat tools, this table provides a
   mapping from current drafts to any previous drafts they are
   replacing:

   +------------------------------------+------------------------------+
   | current draft                      | replaced draft               |
   +------------------------------------+------------------------------+
   | [I-D.ietf-core-coap]               | draft-shelby-core-coap       |
   |                                    |                              |
   | [I-D.ietf-core-block]              | draft-bormann-core-coap-     |
   |                                    | block                        |
   |                                    |                              |
   |                                    | draft-li-core-coap-size-     |
   |                                    | option                       |
   |                                    |                              |
   | [I-D.ietf-core-observe]            | draft-hartke-coap-observe    |
   |                                    |                              |
   | [RFC6690]                          | draft-shelby-core-link-      |
   |                                    | format                       |
   |                                    |                              |
   | [I-D.ietf-core-groupcomm]          | draft-rahman-core-groupcomm  |
   |                                    |                              |
   | [I-D.becker-core-coap-sms-gprs]    | draft-li-core-coap-over-sms  |
   |                                    |                              |
   | [I-D.vanderstok-core-dna]          | draft-vanderstok-core-bc     |
   |                                    |                              |
   | [I-D.ietf-core-resource-directory] | draft-bormann-core-simple-   |
   |                                    | server-discovery             |
   |                                    |                              |
   | [I-D.greevenbosch-core-minimum-    | draft-greevenbosch-core-     |
   | request-interval]                  | block-minimum-time           |
   +------------------------------------+------------------------------+






Bormann                  Expires April 25, 2014                [Page 14]

Internet-Draft    CoRE Roadmap and Implementation Guide     October 2013


   Note that draft-scim-core-schema is just named against the naming
   conventions and actually unrelated to the CoRE working group.

7.  IANA Considerations

   This document has no actions for IANA.

8.  Security Considerations

   (None so far; this section will certainly grow as additional security
   considerations beyond those listed in the base specifications become
   known.)

9.  Acknowledgements

   (The concept for this document is borrowed from [RFC4815], which was
   invented by Lars-Erik Jonsson.  Thanks!)

   Akbar Rahman contributed text to this roadmap.

10.  References

10.1.  Normative References

   [I-D.ietf-core-block]
              Bormann, C. and Z. Shelby, "Blockwise transfers in CoAP",
              draft-ietf-core-block-13 (work in progress), October 2013.

   [I-D.ietf-core-coap]
              Shelby, Z., Hartke, K., and C. Bormann, "Constrained
              Application Protocol (CoAP)", draft-ietf-core-coap-18
              (work in progress), June 2013.

   [I-D.ietf-core-observe]
              Hartke, K., "Observing Resources in CoAP", draft-ietf-
              core-observe-11 (work in progress), October 2013.

   [I-D.ietf-tls-oob-pubkey]
              Wouters, P., Tschofenig, H., Gilmore, J., Weiler, S., and
              T. Kivinen, "Using Raw Public Keys in Transport Layer
              Security (TLS) and Datagram Transport Layer Security
              (DTLS)", draft-ietf-tls-oob-pubkey-10 (work in progress),
              October 2013.

   [I-D.mcgrew-tls-aes-ccm-ecc]
              McGrew, D., Bailey, D., Campagna, M., and R. Dugal, "AES-
              CCM ECC Cipher Suites for TLS", draft-mcgrew-tls-aes-ccm-
              ecc-07 (work in progress), August 2013.



Bormann                  Expires April 25, 2014                [Page 15]

Internet-Draft    CoRE Roadmap and Implementation Guide     October 2013


   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119, March 1997.

   [RFC5785]  Nottingham, M. and E. Hammer-Lahav, "Defining Well-Known
              Uniform Resource Identifiers (URIs)", RFC 5785, April
              2010.

   [RFC6347]  Rescorla, E. and N. Modadugu, "Datagram Transport Layer
              Security Version 1.2", RFC 6347, January 2012.

   [RFC6690]  Shelby, Z., "Constrained RESTful Environments (CoRE) Link
              Format", RFC 6690, August 2012.

10.2.  Informative References

   [COAP3]    ETSI plugtests, "CoAP 3 & OMA Lightweight M2M", 2013,
              <http://www.etsi.org/coap-oma-lightweight-m2m>.

   [CoRE204]  Bormann, C., "Introduce a minimal version of Pledge", CoRE
              ticket #204, 2012,
              <http://trac.tools.ietf.org/wg/core/trac/ticket/204>.

   [I-D.arkko-core-dev-urn]
              Arkko, J., Jennings, C., and Z. Shelby, "Uniform Resource
              Names for Device Identifiers", draft-arkko-core-dev-urn-03
              (work in progress), July 2012.

   [I-D.becker-core-coap-sms-gprs]
              Becker, M., Li, K., Poetsch, T., and K. Kuladinithi,
              "Transport of CoAP over SMS", draft-becker-core-coap-sms-
              gprs-04 (work in progress), August 2013.

   [I-D.bormann-coap-misc]
              Bormann, C. and K. Hartke, "Miscellaneous additions to
              CoAP", draft-bormann-coap-misc-25 (work in progress), May
              2013.

   [I-D.bormann-core-simple-server-discovery]
              Bormann, C., "CoRE Simple Server Discovery", draft-
              bormann-core-simple-server-discovery-01 (work in
              progress), March 2012.

   [I-D.castellani-core-advanced-http-mapping]
              Castellani, A., Loreto, S., Rahman, A., Fossati, T., and
              E. Dijk, "Best Practices for HTTP-CoAP Mapping
              Implementation", draft-castellani-core-advanced-http-
              mapping-02 (work in progress), July 2013.




Bormann                  Expires April 25, 2014                [Page 16]

Internet-Draft    CoRE Roadmap and Implementation Guide     October 2013


   [I-D.castellani-core-alive]
              Castellani, A. and S. Loreto, "CoAP Alive Message", draft-
              castellani-core-alive-00 (work in progress), March 2012.

   [I-D.castellani-core-http-mapping]
              Castellani, A., Loreto, S., Rahman, A., Fossati, T., and
              E. Dijk, "Best Practices for HTTP-CoAP Mapping
              Implementation", draft-castellani-core-http-mapping-07
              (work in progress), February 2013.

   [I-D.castellani-lwig-coap-separate-responses]
              Castellani, A., "Learning CoAP separate responses by
              examples", draft-castellani-lwig-coap-separate-
              responses-00 (work in progress), March 2012.

   [I-D.dijk-core-groupcomm-misc]
              Dijk, E. and A. Rahman, "Miscellaneous CoAP Group
              Communication Topics", draft-dijk-core-groupcomm-misc-04
              (work in progress), June 2013.

   [I-D.doi-core-parameter-option]
              Doi, Y. and K. Lynn, "CoAP Content-Type Parameter Option",
              draft-doi-core-parameter-option-03 (work in progress),
              August 2013.

   [I-D.ersue-constrained-mgmt]
              Ersue, M., Romascanu, D., and J. Schoenwaelder,
              "Management of Networks with Constrained Devices: Problem
              Statement, Use Cases and Requirements", draft-ersue-
              constrained-mgmt-03 (work in progress), February 2013.

   [I-D.fossati-core-fp-link-format-attribute]
              Fossati, T. and S. Loreto, "Resource Discovery through
              Proxies", draft-fossati-core-fp-link-format-attribute-00
              (work in progress), July 2012.

   [I-D.fossati-core-monitor-option]
              Fossati, T., Giacomin, P., and S. Loreto, "Monitor Option
              for CoAP", draft-fossati-core-monitor-option-00 (work in
              progress), July 2012.

   [I-D.fossati-core-multipart-ct]
              Fossati, T., "Multipart Content-Format Encoding for CoAP",
              draft-fossati-core-multipart-ct-03 (work in progress),
              October 2013.

   [I-D.fossati-core-publish-option]




Bormann                  Expires April 25, 2014                [Page 17]

Internet-Draft    CoRE Roadmap and Implementation Guide     October 2013


              Fossati, T., Giacomin, P., and S. Loreto, "Publish Option
              for CoAP", draft-fossati-core-publish-option-02 (work in
              progress), October 2013.

   [I-D.garcia-core-security]
              Garcia-Morchon, O., Kumar, S., Keoh, S., Hummen, R., and
              R. Struik, "Security Considerations in the IP-based
              Internet of Things", draft-garcia-core-security-06 (work
              in progress), September 2013.

   [I-D.gerdes-core-dcaf-authorize]
              Gerdes, S., Bergmann, O., and C. Bormann, "Delegated CoAP
              Authorization Function (DCAF)", draft-gerdes-core-dcaf-
              authorize-00 (work in progress), July 2013.

   [I-D.giacomin-core-sleepy-option]
              Fossati, T., Giacomin, P., Loreto, S., and M. Rossini,
              "Sleepy Option for CoAP", draft-giacomin-core-sleepy-
              option-00 (work in progress), February 2012.

   [I-D.greevenbosch-core-authreq]
              Greevenbosch, B., "Use cases and requirements for
              authentication and authorisation in CoAP", draft-
              greevenbosch-core-authreq-00 (work in progress), September
              2013.

   [I-D.greevenbosch-core-minimum-request-interval]
              Greevenbosch, B., "CoAP Minimum Request Interval", draft-
              greevenbosch-core-minimum-request-interval-01 (work in
              progress), April 2013.

   [I-D.greevenbosch-core-profile-description]
              Greevenbosch, B., Hoebeke, J., Ishaq, I., and F. Abeele,
              "CoAP Profile Description Format", draft-greevenbosch-
              core-profile-description-02 (work in progress), June 2013.

   [I-D.hahm-lwig-painless-constrained-programming]
              Hahm, O., Baccelli, E., and K. Schleiser, "Painless Class
              1 Devices Programming", draft-hahm-lwig-painless-
              constrained-programming-00 (work in progress), March 2013.

   [I-D.hartke-core-codtls]
              Hartke, K. and O. Bergmann, "Datagram Transport Layer
              Security in Constrained Environments", draft-hartke-core-
              codtls-02 (work in progress), July 2012.

   [I-D.hex-lwig-energy-efficient]




Bormann                  Expires April 25, 2014                [Page 18]

Internet-Draft    CoRE Roadmap and Implementation Guide     October 2013


              Cao, Z., He, X., Kovatsch, M., Tian, H., and C. Gomez,
              "Energy Efficient Implementation of IETF Constrained
              Protocol Suite", draft-hex-lwig-energy-efficient-02 (work
              in progress), October 2013.

   [I-D.ietf-core-groupcomm]
              Rahman, A. and E. Dijk, "Group Communication for CoAP",
              draft-ietf-core-groupcomm-16 (work in progress), October
              2013.

   [I-D.ietf-core-interfaces]
              Shelby, Z. and M. Vial, "CoRE Interfaces", draft-ietf-
              core-interfaces-00 (work in progress), June 2013.

   [I-D.ietf-core-links-json]
              Bormann, C., "Representing CoRE Link Collections in JSON",
              draft-ietf-core-links-json-00 (work in progress), June
              2013.

   [I-D.ietf-core-resource-directory]
              Shelby, Z., Krco, S., and C. Bormann, "CoRE Resource
              Directory", draft-ietf-core-resource-directory-00 (work in
              progress), June 2013.

   [I-D.ietf-lwig-cellular]
              Arkko, J., Eriksson, A., and A. Keranen, "Building Power-
              Efficient CoAP Devices for Cellular Networks", draft-ietf-
              lwig-cellular-00 (work in progress), August 2013.

   [I-D.ietf-lwig-guidance]
              Bormann, C., "Guidance for Light-Weight Implementations of
              the Internet Protocol Suite", draft-ietf-lwig-guidance-03
              (work in progress), February 2013.

   [I-D.ietf-lwig-ikev2-minimal]
              Kivinen, T., "Minimal IKEv2", draft-ietf-lwig-
              ikev2-minimal-01 (work in progress), October 2013.

   [I-D.ietf-lwig-terminology]
              Bormann, C., Ersue, M., and A. Keranen, "Terminology for
              Constrained Node Networks", draft-ietf-lwig-terminology-05
              (work in progress), July 2013.

   [I-D.ietf-lwig-tls-minimal]







Bormann                  Expires April 25, 2014                [Page 19]

Internet-Draft    CoRE Roadmap and Implementation Guide     October 2013


              Kumar, S., Keoh, S., and H. Tschofenig, "A Hitchhiker's
              Guide to the (Datagram) Transport Layer Security Protocol
              for Smart Objects and Constrained Node Networks", draft-
              ietf-lwig-tls-minimal-00 (work in progress), September
              2013.

   [I-D.jennings-core-transitive-trust-enrollment]
              Jennings, C., "Transitive Trust Enrollment for Constrained
              Devices", draft-jennings-core-transitive-trust-
              enrollment-01 (work in progress), October 2012.

   [I-D.kovatsch-lwig-class1-coap]
              Kovatsch, M., "Implementing CoAP for Class 1 Devices",
              draft-kovatsch-lwig-class1-coap-00 (work in progress),
              October 2012.

   [I-D.kovatsch-lwig-coap]
              Kovatsch, M., Bergmann, O., Dijk, E., He, X., and C.
              Bormann, "CoAP Implementation Guidance", draft-kovatsch-
              lwig-coap-01 (work in progress), July 2013.

   [I-D.li-core-coap-payload-length-option]
              Li, K., "CoAP Payload-Length Option Extension", draft-li-
              core-coap-payload-length-option-02 (work in progress),
              August 2013.

   [I-D.pporamba-dtls-certkey]
              Porambage, P., Kumar, P., Gurtov, A., Ylianttila, M., and
              E. Harjula, "Certificate based keying scheme for DTLS
              secured IoT", draft-pporamba-dtls-certkey-00 (work in
              progress), June 2013.

   [I-D.rahman-core-sleepy-problem-statement]
              Rahman, A., Fossati, T., Loreto, S., and M. Vial, "Sleepy
              Devices in CoAP - Problem Statement", draft-rahman-core-
              sleepy-problem-statement-01 (work in progress), October
              2012.

   [I-D.rahman-core-sleepy]
              Rahman, A., "Enhanced Sleepy Node Support for CoAP",
              draft-rahman-core-sleepy-04 (work in progress), October
              2013.

   [I-D.sarikaya-core-secure-bootsolution]
              Sarikaya, B., "Security Bootstrapping Solution for
              Resource-Constrained Devices", draft-sarikaya-core-secure-
              bootsolution-00 (work in progress), February 2013.




Bormann                  Expires April 25, 2014                [Page 20]

Internet-Draft    CoRE Roadmap and Implementation Guide     October 2013


   [I-D.schmitt-two-way-authentication-for-iot]
              Schmitt, C., Stiller, B., Kothmayr, T., and W. Hu, "DTLS-
              based Security with two-way Authentication for IoT",
              draft-schmitt-two-way-authentication-for-iot-01 (work in
              progress), October 2013.

   [I-D.seitz-core-sec-usecases]
              Seitz, L., Gerdes, S., and G. Selander, "Use cases for
              CoRE security", draft-seitz-core-sec-usecases-00 (work in
              progress), September 2013.

   [I-D.selander-core-access-control]
              Selander, G., Sethi, M., and L. Seitz, "Access Control
              Framework for Constrained Environments", draft-selander-
              core-access-control-01 (work in progress), October 2013.

   [I-D.silverajan-core-coap-alternative-transports]
              Silverajan, B. and T. Savolainen, "CoAP Communication with
              Alternative Transports", draft-silverajan-core-coap-
              alternative-transports-03 (work in progress), October
              2013.

   [I-D.urien-core-racs]
              Urien, P., "Remote APDU Call Secure (RACS)", draft-urien-
              core-racs-00 (work in progress), August 2013.

   [I-D.vanderstok-core-dna]
              Stok, P., Lynn, K., and A. Brandt, "CoRE Discovery,
              Naming, and Addressing", draft-vanderstok-core-dna-02
              (work in progress), July 2012.

   [I-D.vial-core-mirror-proxy]
              Vial, M., "CoRE Mirror Server", draft-vial-core-mirror-
              proxy-01 (work in progress), July 2012.

   [I-D.vial-core-mirror-server]
              Vial, M., "CoRE Mirror Server", draft-vial-core-mirror-
              server-01 (work in progress), April 2013.

   [I-D.zhu-core-groupauth]
              Zhu, J. and M. Qi, "Group Authentication", draft-zhu-core-
              groupauth-01 (work in progress), September 2013.

   [REST]     Fielding, R., "Architectural Styles and the Design of
              Network-based Software Architectures", Ph.D. Dissertation,
              University of California, Irvine, 2000, <http://
              www.ics.uci.edu/~fielding/pubs/dissertation/
              fielding_dissertation.pdf>.



Bormann                  Expires April 25, 2014                [Page 21]

Internet-Draft    CoRE Roadmap and Implementation Guide     October 2013


   [RFC2418]  Bradner, S., "IETF Working Group Guidelines and
              Procedures", BCP 25, RFC 2418, September 1998.

   [RFC2616]  Fielding, R., Gettys, J., Mogul, J., Frystyk, H.,
              Masinter, L., Leach, P., and T. Berners-Lee, "Hypertext
              Transfer Protocol -- HTTP/1.1", RFC 2616, June 1999.

   [RFC2818]  Rescorla, E., "HTTP Over TLS", RFC 2818, May 2000.

   [RFC4815]  Jonsson, L-E., Sandlund, K., Pelletier, G., and P. Kremer,
              "RObust Header Compression (ROHC): Corrections and
              Clarifications to RFC 3095", RFC 4815, February 2007.

   [RFC4919]  Kushalnagar, N., Montenegro, G., and C. Schumacher, "IPv6
              over Low-Power Wireless Personal Area Networks (6LoWPANs):
              Overview, Assumptions, Problem Statement, and Goals", RFC
              4919, August 2007.

   [RFC5988]  Nottingham, M., "Web Linking", RFC 5988, October 2010.

   [RFC6202]  Loreto, S., Saint-Andre, P., Salsano, S., and G. Wilkins,
              "Known Issues and Best Practices for the Use of Long
              Polling and Streaming in Bidirectional HTTP", RFC 6202,
              April 2011.

   [SB]       Bormann, C., Castellani, A., and Z. Shelby, "CoAP: An
              Application Protocol for Billions of Tiny Internet Nodes",
              DOI 10.1109/MIC.2012.29, 2012.

   [WEI]      Shelby, Z. and C. Bormann, "6LoWPAN: the Wireless Embedded
              Internet", ISBN 9780470747995, 2009.

Author's Address

   Carsten Bormann
   Universitaet Bremen TZI
   Postfach 330440
   Bremen  D-28359
   Germany

   Phone: +49-421-218-63921
   Email: cabo@tzi.org









Bormann                  Expires April 25, 2014                [Page 22]