• Publications
  • Influence
Terminology for Constrained-Node Networks
TLDR
This document provides a number of basic terms that have been useful in the standardization work for constrained-node networks. Expand
Management of Networks with Constrained Devices: Use Cases
This document discusses use cases concerning the management of networks in which constrained devices are involved. A problem statement, deployment options, and the requirements on the networks withExpand
Management of Networks with Constrained Devices: Problem Statement and Requirements
This document provides a problem statement, deployment and management topology options, as well as requirements addressing the different use cases of the management of networks where constrainedExpand
An Overview of the IETF Network Management Standards
This document gives an overview of the IETF network management standards and summarizes existing and ongoing development of IETF Standards Track network management protocols and data models. TheExpand
Management of Networks with Constrained Devices: Problem Statement, Use Cases and Requirements
TLDR
This document is subject to BCP 78 and the IETF Trust’s Legal Provisions Relating to IETF Documents in effect on the date of publication of this document. Expand
Extending YANG with Language Abstractions
TLDR
This memo suggests to enhance YANG with supplementary modeling features and language abstractions with the aim of improve the model extensibility and reuse. Expand
TLS with PSK for Constrained Devices
In the recent years the advances in the area of Wireless Sensor Networks (WSNs) have led to extensive research of the question of securing WSNs, a challenging problem, mostly due to the constraintsExpand
Network function virtualization: opportunities and challenges [Guest editorial]
TLDR
By reducing the cost of equipment and increasing the revenue with virtualized services, NFV has the potential to revolutionize the entire telecommunication industry. Expand
Internet Engineering Task Force (ietf) an Overview of the Ietf Network Management Standards Structure of Managed Information (smi) .............11 2.1.4. Snmp Security and Access Control Models
This document gives an overview of the IETF network management standards and summarizes existing and ongoing development of IETF Standards Track network management protocols and data models. TheExpand
...
1
2
...