core P. van der Stok Internet-Draft consultant Intended status: Informational B. Greevenbosch Expires: August 17, 2014 Huawei Technologies February 13, 2014 CoAp Management Interfaces draft-vanderstok-core-comi-03 Abstract The draft describes an interface based on CoAP to manage constrained devices via MIBs. The proposed integration of CoAP with SNMP reduces the code- and application development complexity by accessing MIBs via a standard CoAP server. The payload of the MIB request is CBOR based on JSON. The mapping from SMI to CBOR is specified. Note Discussion and suggestions for improvement are requested, and should be sent to core@ietf.org. Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at http://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on August 17, 2014. Copyright Notice Copyright (c) 2014 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of van der Stok & GreevenbosExpires August 17, 2014 [Page 1] Internet-Draft CoMI February 2014 publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 1.1. Terminology . . . . . . . . . . . . . . . . . . . . . . . 4 2. CoAP Interface . . . . . . . . . . . . . . . . . . . . . . . 5 3. MIB Function Set . . . . . . . . . . . . . . . . . . . . . . 5 3.1. SNMP/MIB architecture . . . . . . . . . . . . . . . . . . 5 3.1.1. SNMP functions . . . . . . . . . . . . . . . . . . . 6 3.1.2. MIB structure . . . . . . . . . . . . . . . . . . . . 7 3.2. CoMI Function Set . . . . . . . . . . . . . . . . . . . . 8 3.2.1. Single MIB values . . . . . . . . . . . . . . . . . . 9 3.2.2. multi MIB values . . . . . . . . . . . . . . . . . . 11 3.2.3. Table row . . . . . . . . . . . . . . . . . . . . . . 13 3.2.4. Error returns . . . . . . . . . . . . . . . . . . . . 14 4. Mapping SMI to CoMI payload . . . . . . . . . . . . . . . . . 14 4.1. Mapping strings to CBOR . . . . . . . . . . . . . . . . . 15 4.2. Mapping SMI to CBOR . . . . . . . . . . . . . . . . . . . 16 4.2.1. General overview . . . . . . . . . . . . . . . . . . 16 4.2.2. Conversion from YANG datatypes to CBOR datatypes . . 16 4.2.3. Examples . . . . . . . . . . . . . . . . . . . . . . 18 4.2.4. 6LoWPAN MIB . . . . . . . . . . . . . . . . . . . . . 20 5. MIB discovery . . . . . . . . . . . . . . . . . . . . . . . . 23 6. Trap functions . . . . . . . . . . . . . . . . . . . . . . . 24 7. MIB access management . . . . . . . . . . . . . . . . . . . . 24 7.1. Notify destinations . . . . . . . . . . . . . . . . . . . 24 7.2. Conversion tables . . . . . . . . . . . . . . . . . . . . 25 8. Error handling . . . . . . . . . . . . . . . . . . . . . . . 25 9. Security Considerations . . . . . . . . . . . . . . . . . . . 26 10. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 27 11. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 27 12. Changelog . . . . . . . . . . . . . . . . . . . . . . . . . . 27 13. References . . . . . . . . . . . . . . . . . . . . . . . . . 28 13.1. Normative References . . . . . . . . . . . . . . . . . . 28 13.2. Informative References . . . . . . . . . . . . . . . . . 29 Appendix A. Notational Convention for CBOR data . . . . . . . . 31 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 32 van der Stok & GreevenbosExpires August 17, 2014 [Page 2] Internet-Draft CoMI February 2014 1. Introduction The Constrained RESTful Environments (CoRE) working group aims at Machine to Machine (M2M) applications such as smart energy and building control. Small M2M devices need to be managed in an automatic fashion to handle the large quantities of devices that are expected to be installed in future installations. The management protocol of choice for Internet is SNMP [RFC3410] as is testified by the large number of Management Information Base (MIB) [RFC3418] specifications currently published [STD0001]. More recently, the NETCONF protocol [RFC6241] was developed with an extended set of messages using XML [XML] as data format. The data syntax is specified with YANG [RFC6020] and a mapping from Yang to XML is specified. In [RFC6643] SMIv2 syntax is expressed in Yang. Contrary to SNMP and also CoAP, NETCONF assumes persistent connections for example provided by SSH. The NETCONF protocol provides operations to retrieve, configure, copy, and delete configuration data-stores. Configuring data-stores distinguishes NETCONF from SNMP which operates on standardized MIBs. The CoRE Management Interface (CoMI) is intended to work on standardized data-sets in a stateless client-server fashion and is thus closer to SNMP than to NETCONF. Standardized data sets promote interoperability between small devices and applications from different manufacturers. Stateless communication is encouraged to keep communications simple and the amount of state information small in line with the design objectives of 6lowpan [RFC4944] [RFC6775], RPL [RFC6650], and CoAP [I-D.ietf-core-coap]. The draft [I-D.bierman-netconf-restconf] describes a restful interface to NETCONF data stores and approaches the CoMI approach. CoMI uses SMI encoded in CBOR, and CoAP/UDP to access MIBs, where restconf uses YANG encoded in JSON and HTTP/TCP to access NETCONF data stores. CoMI is more low resource oriented than restconf is. Currently, managed devices need to support two protocols: CoAP and SNMP. When the MIB can be accessed with the CoAP protocol, the SNMP protocol can be replaced with the CoAP protocol. This arrangement reduces the code complexity of the stack in the constrained device, and harmonizes applications development. The objective of CoMI is to provide a CoAP based Function Set that reads and sets values of MIB variables in devices to (1) initialize parameter values at start-up, (2) acquire statistics during operation, and (3) maintain nodes by adjusting parameter values during operation. van der Stok & GreevenbosExpires August 17, 2014 [Page 3] Internet-Draft CoMI February 2014 The payload of CoMI is encoded in CBOR [RFC7049] which similar to JSON [JSON], but has a binary format and hence has more coding efficiency. CoMI is intended for small devices. The JSON overhead can be prohibitive. It is therefore chosen to transport CBOR in the payload. CBOR, like BER used for SNMP, transports the data type in the payload. The end goal of CoMI is to provide information exchange over the CoAP transport protocol in a uniform manner to approach the full management functionality as specified in [I-D.ersue-constrained-mgmt]. 1.1. Terminology The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY",and "OPTIONAL" in this document are to be interpreted as described in [RFC2119]. Readers of this specification are required to be familiar with all the terms and concepts discussed in [RFC3410], [RFC3416], and [RFC2578]. Core Management Interface (CoMI) specifies the profile of Function Sets which access MIBs with the purpose of managing the operation of constrained devices in a network. The following list defines the terms used in this document: Managing Entity: An entity that manages one or more managed devices. Within the CoMI framework, the managing entity acts as a CoAP client for CoMI. Managed Device: An entity that is being managed. The managed device acts as a CoAP server for CoMI. NOTE: It is assumed that the managed device is the most constrained entity. The managing entity might be more capable, however this is not necessarily the case. The following list contains the abbreviations used in this document. OID: ASN.1 OBJECT-IDENTIFIER, which is used to uniquely identify MIB objects in the managed device. van der Stok & GreevenbosExpires August 17, 2014 [Page 4] Internet-Draft CoMI February 2014 2. CoAP Interface In CoRE a group of links can constitute a Function Set. The format of the links is specified in [I-D.ietf-core-interfaces]. This note specifies a Management Function Set. CoMI end-points that implement the CoMI management protocol support at least one discoverable management resource of resource type (rt): core.mg, with path: /mg, where mg is short-hand for management. The mg resource has two sub- resources accessible with the paths: o MIB with path /mg/mib and a CBOR content format. o XLAT with path /mg/xlat and CBOR content format. The mib resource provides access to the MIBs as described in Section 3.2. The xlat resource provides access to a string to CBOR identifier table as described in Section 4.1. The mib and xlat resources are introduced as sub resources to mg to permit later additions to CoMI mg resource. The profile of the management function set, with IF=core.mg.mib, is shown in the table below, following the guidelines of [I-D.ietf-core-interfaces]: +-----------------+-----------+---------------+-------------------+ | name | path | RT | Data Type | +-----------------+-----------+---------------+-------------------+ | Management | /mg | core.mg | n/a | | | | | | | MIB | /mg/mib | core.mg.mib | application/cbor | | | | | | | XLAT | /mg/xlat | core.mg.xlat | application/cbor | +-----------------+-----------+---------------+-------------------+ 3. MIB Function Set The MIB Function Set provides a CoAP interface to perform equivalent functions to the ones provided by SNMP. Section 3.1 explains the structure of SNMP Protocol Data Units (PDU), their transport, and the structure of the MIB modules. An excellent overview of the documents describing the SNMP/MIB architecture is provided in section 7 of [RFC3410]. 3.1. SNMP/MIB architecture The architecture of the Internet Standard management framework consists of: van der Stok & GreevenbosExpires August 17, 2014 [Page 5] Internet-Draft CoMI February 2014 o A data definition language that is referred to as Structure of Management Information (SMI)[RFC2578]. o The Management Information Base (MIB) which contains the information to be managed and is defined for each specific function to be managed [RFC3418]. o A protocol definition referred to as Simple Network Management Protocol (SNMP) [RFC3416]. o Security and administration that provides SNMP message based security on the basis of the user-based security model [RFC3414]. o A management domain definition where a SNMP entity has access to a collection of management information called a "context" [RFC3411]. In addition [RFC4088] describes a URI scheme to refer to a specific MIB instance. Separation in modules was motivated by the wish to respond to the evolution of Internet. The protocol part (SNMP) and data definition part (MIB) are independent of each other. The separation has enabled the progressive passage from SNMPv1 via SNMPv2 to SNMPv3. This draft leverages this separation to replace the SNMP protocol with a CoAP based protocol. 3.1.1. SNMP functions The SNMP protocol supports seven types of access supported by as many Protocol Data Unit (PDU) types: o Get Request, transmits a list of OBJECT-IDENTIFIERs to be paired with values. o GetNext Request, transmits a list of OBJECT-IDENTIFIERs to which lexicographic successors are returned for table traversal. o GetBulk Request, transmits a list of OBJECT-IDENTIFIERs and the maximum number of expected paired values. o Response, returns an error or the (OBJECT-IDENTIFIER, value) pairs for the OBJECT-IDENTIFIERs specified in Get, GetNext, GetBulk, Set, or Inform Requests. o Set Request, transmits a list of (OBJECT-IDENTIFIERs, value) pairs to be set in the specified MIB object. van der Stok & GreevenbosExpires August 17, 2014 [Page 6] Internet-Draft CoMI February 2014 o Trap, sends an unconfirmed message with a list of (OBJECT- IDENTIFIERs, value) pairs to a notification requesting end-point. o Inform Request, sends a confirmed message with a list of (OBJECT- IDENTIFIERs, value) pairs to a notification requesting end-point. The binding of the notification to a destination is discussed in Section 6. 3.1.2. MIB structure A MIB module is composed of MIB objects. MIB objects are standardized by the IETF or by other relevant Standards Developing Organizations (SDO). MIB objects have a descriptor and an identifier: OBJECT-IDENTIFIER (OID). The identifier, following the OSI hierarchy, is an ordered list of non-negative numbers [RFC2578]. OID values are unique. Each number in the list is referred as a sub-identifier. The descriptor is unique within a module. Different modules may contain the same descriptor. Consequently, a descriptor can be related to several OIDs. Many instances of an object type exist within a management domain. Each instance can be identified within some scope or "context", where there are multiple such contexts within the management domain. Often, a context is a physical or logical device. A context is always defined as a subset of a single SNMP entity. To identify an individual item of management information within the management domain, its contextName and contextEngineID must be identified in addition to its object type and its instance. A default context is assumed when no context is specified. A MIB object is usually a scalar object. A MIB object may have a tabular form with rows and columns. Such an object is composed of a sequence of rows, with each row composed of a sequence of typed values. The index is a subset (1-2 items) of the typed values in the row. An index value identifies the row in the table. In SMI, a table is constructed as a SEQUENCE OF its entries. For example, the IpAddrTable from [RFC4293] has the following definition: van der Stok & GreevenbosExpires August 17, 2014 [Page 7] Internet-Draft CoMI February 2014 ipv6InterfaceTable OBJECT-TYPE SYNTAX SEQUENCE OF Ipv6InterfaceEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "The table containing per-interface IPv6-specific information." ::= { ip 30 } ipv6InterfaceEntry OBJECT-TYPE SYNTAX Ipv6InterfaceEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "An entry containing IPv6-specific information for a given interface." INDEX { ipv6InterfaceIfIndex } ::= { ipv6InterfaceTable 1 } Ipv6InterfaceEntry ::= SEQUENCE { ipv6InterfaceIfIndex InterfaceIndex, ipv6InterfaceReasmMaxSize Unsigned32, ipv6InterfaceIdentifier Ipv6AddressIfIdentifierTC, ipv6InterfaceEnableStatus INTEGER, ipv6InterfaceReachableTime Unsigned32, ipv6InterfaceRetransmitTime Unsigned32, ipv6InterfaceForwarding INTEGER } The descriptor (name) of the MIB table is used for the name of the CoMI variable. However, there is no explicit mention of the names "ipv6InterfaceEntry" and "Ipv6InterfaceEntry". Instead, the value of the main CoMI variable consists of an array, each element of which contains 7 CoMI variables: one element for "ipv6InterfaceIfIndex", one for "ipv6InterfaceReasmMaxSize" and so on until "ipv6InterfaceForwarding". 3.2. CoMI Function Set Two types of interfaces are supported by CoMI: single value Reading/Writing one MIB variable, specified in the URI with path /mg/mib/descriptor or with path /mg/mib/OID. multiple values Reading writing arrays or multiple MIB variables, specified in the payload. van der Stok & GreevenbosExpires August 17, 2014 [Page 8] Internet-Draft CoMI February 2014 The examples in this section use a JSON payload with one or more entries describing the pair (descriptor, value), or (OID, value). The CBOR syntax of the payloads is specified in Section 4. 3.2.1. Single MIB values A request to read the value of a MIB variable is sent with a confirmable CoAP GET message. The single MIB variable is specified in the URI path with the OID or descriptor suffixing the /mg/mib/ path name. When the descriptor is used to specify the MIB value, the same descriptor may be present in multiple module. To disambiguate the descriptor the "mod" uri-query attribute specifies the enveloping modules. A request to set the value of a MIB variable is sent with a confirmable CoAP PUT message. The Response is piggybacked to the CoAP ACK message corresponding with the Request. TODO: for multicast send unconfirmed PUT Using for example the same MIB from [RFC1213] as used in [RFC3416], a request is sent to retrieve the value of sysUpTime specified in module SNMPv2-MIB. The answer to the request returns a (descriptor, value) pair. For clarity of the examples, in this and all following examples the payload is expressed in JSON, although the operational payload is specified to be in CBOR, as described in Section 4. REQ: GET example.com/mg/mib/sysUpTime?mod=SNMPv2-MIB RES: 2.05 Content (Content-Format: application/json) { "sysUpTime" : 123456 } Another way to express the descriptor of the required value is by specifying the pair (descriptor or oid, null value) in the payload of the request message. van der Stok & GreevenbosExpires August 17, 2014 [Page 9] Internet-Draft CoMI February 2014 REQ: GET example.com/mg/mib/(Content-Format: application/json) { "SNMPv2-MIB.sysUpTime" : "null" } RES: 2.05 Content (Content-Format: application/json) { "SNMPv2-MIB.sysUpTime" : 123456 } The module name SNMPv2-MIB can be omitted when there is no possibility of ambiguity. The module.descriptor can of course be replaced with the corresponding oid. In some cases it is necessary to determine the "context" by specifying a context name and a contextEngine identifier. The context can be specified in the URI with the uri-query attribute "con". Based on the example of figure 3 in section 3.3 of [RFC3411], the context name, bridge1, and the context Engine Identifier, 800002b804616263, separated by an underscore, are specified in the following example: REQ: GET example.com/mg/mib/sysUPTime?con=bridge1_800002b804616263 RES: 2.05 Content (Content-Format: application/json) { "sysUpTime" : 123456 } The specified object can be a table. The returned payload is composed of all the rows associated with the table. Each row is returned as a set of (column name, value) pairs. For example the GET of the ipNetToMediaTable, sent by the managing entity, results in the following returned payload sent by the managed entity: van der Stok & GreevenbosExpires August 17, 2014 [Page 10] Internet-Draft CoMI February 2014 REQ: GET example.com/mg/mib/ipNetToMediaTable RES: 2.05 Content (Content-Format: application/json) { "ipNetTOMediaTable" : [ { "ipNetToMediaIfIndex" : 1, "ipNetToMediaPhysAddress" : "00:00::10:01:23:45", "ipNetToMediaNetAddress" : "10.0.0.51", "ipNetToMediaType" : "static" }, { "ipNetToMediaIfIndex" : 1, "ipNetToMediaPhysAddress" : "00:00::10:54:32:10", "ipNetToMediaNetAddress" : "9.2.3.4", "ipNetToMediaType" : "dynamic" }, { "ipNetToMediaIfIndex" : 2, "ipNetToMediaPhysAddress" : "00:00::10:98:76:54", "ipNetToMediaNetAddress" : "10.0.0.15", "ipNetToMediaType" : "dynamic" } ] } It is possible that the size of the returned payload is too large to fit in a single message. CoMI gives the possibility to send the contents of the objects in several fragments with a maximum size. The "sz" link-format attribute [RFC6690] can be used to specify the expected maximum size of the mib resource in (identifier, value) pairs. The returned data MUST terminate with a complete (identifier, value) pair. In the case that management data is bigger than the maximum supported payload size, the Block mechanism from [I-D.ietf-core-block] is used. Notice that the Block mechanism splits the data at fixed positions, such that individual data fields may become fragmented. Therefore, assembly of multiple blocks may be required to process the complete data field. 3.2.2. multi MIB values A request to read multiple MIB variables is done by expressing the pairs (MIB descriptor, null) in the payload of the GET request message. A request to set multiple MIB variables is done by expressing the pairs (MIB descriptor, null value) in the payload of van der Stok & GreevenbosExpires August 17, 2014 [Page 11] Internet-Draft CoMI February 2014 the PUT request message. The key word _multiMIB is used as array name to signal that the payload contains multiple MIB values as separate _multiMIB array entries. The following example shows a request that specifies to return the values of sysUpTime and ipNetToMediaTable: REQ: GET example.com/mg/mib (Content-Format: application/json) { "_multiMIB" : [ { "sysUpTime" : "null"}, { "ipNetToMediaTable" : "null" } ] } RES: 2.05 Content (Content-Format: application/json) { "_multiMIB" : [ { "sysUpTime" : 123456}, { "ipNetTOMediaTable" : [ { "ipNetToMediaIfIndex" : 1, "ipNetToMediaPhysAddress" : "00:00::10:01:23:45", "ipNetToMediaNetAddress" : "10.0.0.51", "ipNetToMediaType" : "static" }, { "ipNetToMediaIfIndex" : 1, "ipNetToMediaPhysAddress" : "00:00::10:54:32:10", "ipNetToMediaNetAddress" : "9.2.3.4", "ipNetToMediaType" : "dynamic" }, { "ipNetToMediaIfIndex" : 2, "ipNetToMediaPhysAddress" : "00:00::10:98:76:54", "ipNetToMediaNetAddress" : "10.0.0.15", "ipNetToMediaType" : "dynamic" } ] } ] } van der Stok & GreevenbosExpires August 17, 2014 [Page 12] Internet-Draft CoMI February 2014 3.2.3. Table row The managing entity MAY be interested only in certain table entries. One way to specify a row is to specify its row number in the URI with the "row" uri-query attribute. The specification of row=1 returns row 1 values of the ipNetToMediaTable in the example: REQ: GET example.com/mg/mib/ipNetToMediaTable?row=1 RES: 2.05 Content (Content-Format: application/json) { "ipNetTOMediaTable" : [ { "ipNetToMediaIfIndex" : 1, "ipNetToMediaPhysAddress" : "00:00::10:01:23:45", "ipNetToMediaNetAddress" : "10.0.0.51", "ipNetToMediaType" : "static" } ] } An alternative mode of selection is by specifying the value of the INDEX attributes. Towards this end, the managing entity can include the required entries in the payload of its "GET" request by specifying the values of the index attributes. The key word _indexMIB is used to specify the index value. For example, to obtain a table entry from ipNetToMediaTable, the rows are specified by specifying the index attributes: ipNetToMediaIfIndex and ipNetToMediaNetAddress. The managing entity could have sent a GET with the following payload: van der Stok & GreevenbosExpires August 17, 2014 [Page 13] Internet-Draft CoMI February 2014 REQ: GET example.com/mg/mib/ipNetToMediaTable(Content-Format: application/json) { "_indexMIB" : { "ipNetToMediaIfIndex" : 1, "ipNetToMediaNetAddress" : "9.2.3.4" } } RES: 2.05 Content (Content-Format: application/json) { "ipNetTOMediaTable" : [ { "ipNetToMediaIfIndex" : 1, "ipNetToMediaPhysAddress" : "00:00::10:01:23:45", "ipNetToMediaNetAddress" : "9.2.3.4", "ipNetToMediaType" : "static" } ] } Constrained devices MAY support this kind of filtering. However, if they don't support it, they MUST ignore the payload in the GET request and handle the message as if the payload was empty. It is advised to keep MIBs for constrained entities as simple as possible, and therefore it would be best to avoid extensive tables. TODO: Describe how the contents of the next lexicographical row can be returned. 3.2.4. Error returns When a variable with the specified name cannot be processed, CoAP Error code 5.01 is returned. In addition, a MIB specific error can be returned in the payload as specified in Section 8. 4. Mapping SMI to CoMI payload The SMI syntax is mapped to CBOR necessary for the transport of MIB data in the CoAP payload. This section first describes an additional data reduction technique by creating a table that maps string values to numbers used in CBOR encoded data. The section continues by describing the mapping from SMI to CBOR. The mapping is inspired by the mapping from SMI to JSON via YANG [RFC6020], as described in [RFC6643] defining a mapping from SMI to van der Stok & GreevenbosExpires August 17, 2014 [Page 14] Internet-Draft CoMI February 2014 YANG, and [I-D.lhotka-netmod-yang-json] defining a mapping from YANG to JSON. Notice that such conversion chain MAY be virtual only, as SMI could be converted directly to JSON by combining the rules from the above documents. 4.1. Mapping strings to CBOR Because descriptors may be rather long and may occur repeatedly, CoMI allows for association of a string with an integer, henceforth called "string number". The association between string and string number is done through a translation table, leveraging CBOR encoding. Using the notational convention from Appendix A, the CBOR data has the following syntax: cBorMIB : CBorMIB; *CBorMIB { xlatTableID : uint; mibString : map( uint, . ); } The main structure consist of an array of two elements: "xlatTableID" and "mibString". The values of the MIB strings are stored in the "mibString" field. This field consist of integer-value pairs. The integers correspond to the string numbers, whereas the values contain the actual value of the associated string. The "xlatTableID" contains an integer that is used to indentify the translation table. The translation table can be acquired as follows: GET /mg/xlat/[xlatTableID] where "[xlatTableID]" is replaced by the the value of xlatId from the CBorMIB structure, encoded as a hexidecimal integer without leading zeros. The maintenance of the table is described in Section 7.2. The use of the table is to initialize devices with the strings which will be frequently used, such as the strings of the descriptors in the MIB variables. The transmitted CBOR data will contain the string van der Stok & GreevenbosExpires August 17, 2014 [Page 15] Internet-Draft CoMI February 2014 numbers and not the entire descriptor strings, leading to appreciable data reduction. It is important that sender and receiver have identical versions of the table. The translation table is serialized to the payload in the following fashion: xlatTable : XLatTable; *XLatTable { xlatId : uint; xlatData : map( uint, tstr ); } where "xlatId" has the same value as "xlatId" in the CBorMIB structure, and "xlatData" is a CBOR map between the string number and associated variable descriptor. 4.2. Mapping SMI to CBOR 4.2.1. General overview Starting from the intermediate conversion from SMI to YANG as defined in [RFC6643], This section defines how to convert the resulting YANG structure to CBOR [RFC7049]. The actual conversion code from SMI to YANG and subsequently YANG to CBOR MAY be direct conversion code from SMI to CBOR or a sequence of existing SMI to YANG conversion code followed by YANG to CBOR conversion code. 4.2.2. Conversion from YANG datatypes to CBOR datatypes Table 1 defines the mapping between YANG datatypes and CBOR datatypes. Elements of types not in this table, and of which the type cannot be inferred from a type in this table, are ignored in the CBOR encoding by default. Examples include the "description" and "key" elements. However, conversion rules for some elements to CBOR MAY be defined elsewhere. +-------------+------------------+----------------------------------+ | YANG type | CBOR type | Specification | +-------------+------------------+----------------------------------+ | int8, | unsigned int | The CBOR integer type depends on | | int16, | (major type 0) | the sign of the actual value. | van der Stok & GreevenbosExpires August 17, 2014 [Page 16] Internet-Draft CoMI February 2014 | int32, | or negative int | | | int64, | (mayor type 1) | | | uint16, | | | | uint32, | | | | uint64, | | | | decimal64 | | | | | | | | boolean | either "true" | | | | (major type 7, | | | | simple value 21) | | | | or "false" | | | | (major type 7, | | | | simple value 20) | | | | | | | string | text string | | | | (major type 3) | | | | | | | enumeration | unsigned int | | | | (major type 0) | | | | | | | bits | array of text | Each text string contains the | | | strings | name of a bit value that is set. | | | | | | binary | byte string | | | | (major type 2) | | | | | | | empty | null (major type | TBD: This MAY not be applicable | | | 7, simple value | to true MIBs, as SNMP may not | | | 22) | support empty variables... | | | | | | union | | Similar ot the JSON | | | | transcription from | | | | [I-D.lhotka-netmod-yang-json], | | | | the elements in a union MUST be | | | | determined using the procedure | | | | specified in section 9.12 of | | | | [RFC6020]. | | | | | | leaf-list | array (major | The array is encapsulated in the | | | type 4) | map associated with the | | | | descriptor. | | | | | | list | map (major type | Like the higher level map, the | | | 4) | lower level map contains | | | | descriptor number - value pairs | | | | of the elements in the list. | | | | | | container | map (major type | The map contains decriptor | van der Stok & GreevenbosExpires August 17, 2014 [Page 17] Internet-Draft CoMI February 2014 | | 5) | number - value pairs | | | | corresponding to the elements in | | | | the container. | | | | | | smiv2:oid | array of | Each integer contains an element | | | integers | of the OID, the first integer in | | | | the array corresponds to the | | | | most left element in the OID. | +-------------+------------------+----------------------------------+ Table 1: Conversion of YANG datatypes to CBOR 4.2.3. Examples 4.2.3.1. ipNetToMediaTable to JSON/CBOR The YANG translation of the SMI specifying the ipNetToMediaTable yields: container ipNetToMediaTable { list ipNetToMediaEntry { leaf ipNetToMediaIfIndex { type: int32; } leaf ipNetToPhysAddress { type: phys-address; } leaf ipNetToMediaNetAddress { type: ipv4-address; } leaf ipNetToMediaType { type: int32; } } } The coresponding JSON looks like: van der Stok & GreevenbosExpires August 17, 2014 [Page 18] Internet-Draft CoMI February 2014 { "ipNetToMediaTable" : { "ipNetToMediaEntry" : [ { "ipNetToMediaIfIndex" : 1. "ipNetToMediaPhysAddress" : "00:00::10:01:23:45", "ipNetToMediaNetAddress" : "10.0.0.51", "ipNetToMediaType" : "static" }, { "ipNetToMediaIfIndex " : 1, "ipNetToMediaPhysAddress " : "00:00::10:54:32:10", "ipNetToMediaNetAddress" : "9.2.3.4", "ipNetToMediaType " : "dynamic" } ] } } An example CBOR instance of the MIB can be found in Figure 1. The names "ipNetToMediaTable", "ipNetToMediaEntry", and "ipNetToMediaIfIndex" are represented with the string numbers 00, 01, and 02 as described in Section 4.1. 82 # two element array 19 43 A1 # translation table ID 43A1 BF # indefinite length map 00 # descriptor number related to # ipNetToMediaTable BF # indefinite length map related to # ipNetToMediaTable 01 # descriptor number related to # ipNetToMediaEntry BF # map related to ipNetToMediaEntry 02 # descriptor number associated with # ipNetToMediaIfIndex 1A 00 00 00 01 # associated value as 32-bit integer # ... FF FF FF Figure 1: Example CBOR encoding for ifTable The associated "descriptor string" to "string number" translation table is given in Figure 2. van der Stok & GreevenbosExpires August 17, 2014 [Page 19] Internet-Draft CoMI February 2014 82 # two element array 19 43 A1 # translation table ID 43A1 BF # indefinite length map 00 # descriptor number related to # ipNetToMediaTable 72 69 70 50 65 74 57 6F 51 65 64 61 57 61 62 6C 65 # "ipNetToMediaTable" 01 # descriptor number related to # ipNetToMediaEntry 72 69 70 50 65 74 57 6F 51 65 64 61 45 6E 74 72 78 # "ipNetToMediaEntry" 02 # descriptor number related to # ipNetToMediaIfIndex 75 69 70 50 65 74 57 6F 51 65 64 61 61 49 66 49 6E 64 65 77 # "ipNetToMediaIfIndex" # ... FF Figure 2: Translation table for ifTable 4.2.4. 6LoWPAN MIB A MIB for 6LoWPAN is defined in [I-D.schoenw-6lowpan-mib]. The document also provides an example JSON representation in its Appendix A. Figure 3 shows the associated CBOR representation with string number, and Figure 4 shows the corresponding string to string number conversion table. 82 # two element array 1A 8B 47 88 F3 # translation table ID 8B4788F3 BF # indefinite length map 00 # "LOWPAN-MIB:LOWPAN-MIB" BF # indefinite length map related to ifTable 01 # "lowpanReasmTimeout" 14 # 20 02 # "lowpanInReceives" 18 2A # 42 03 # "lowpanInHdrErrors" 00 # 0 04 # "lowpanInMeshReceives" 08 # 8 05 # "lowpanInMeshForwds" 00 # 0 06 # "lowpanInMeshDelivers" van der Stok & GreevenbosExpires August 17, 2014 [Page 20] Internet-Draft CoMI February 2014 00 # 0 07 # "lowpanInReasmReqds" 16 # 22 08 # "lowpanInReasmFails" 02 # 02 09 # "lowpanInReasmOKs" 14 # 20 0A # "lowpanInCompReqds" 10 # 16 0B # "lowpanInCompFails" 02 # 2 0C # "lowpanInCompOKs" 0E # 14 0D # "lowpanInDiscards" 01 # 01 0E # "lowpanInDelivers" 0C # 12 0F # "lowpanOutRequests" 0C # 12 10 # "lowpanOutCompReqds" 00 # 0 11 # "lowpanOutCompFails" 00 # 0 12 # "lowpanOutCompOKs" 00 # 0 13 # "lowpanOutFragReqds" 05 # 5 14 # "lowpanOutFragFails" 00 # 0 15 # "lowpanOutFragOKs" 05 # 5 16 # "lowpanOutFragCreates" 08 # 8 17 # "lowpanOutMeshHopLimitExceeds" 00 # 0 18 18 # "lowpanOutMeshNoRoutes" 00 # 0 18 19 # "lowpanOutMeshRequests" 00 # 0 18 1A # "lowpanOutMeshForwds" 00 # 0 18 1B # "lowpanOutMeshTransmits" 00 # 0 18 1C # "lowpanOutDiscards" 00 # 0 18 1D # "lowpanOutTransmits" 0F # 15 FF van der Stok & GreevenbosExpires August 17, 2014 [Page 21] Internet-Draft CoMI February 2014 FF Figure 3: Example CBOR encoding for the 6LoWPAN MIB 82 # two element array 1A 8B 47 88 F3 # translation table ID 8B4788F3 BF # indefinite length map 00 75 # "LOWPAN-MIB:LOWPAN-MIB" 01 # 72 ... # "lowpanReasmTimeout" 02 70 ... # "lowpanInReceives" 03 71 ... # "lowpanInHdrErrors" 04 74 ... # "lowpanInMeshReceives" 05 72 ... # "lowpanInMeshForwds" 06 74 ... # "lowpanInMeshDelivers" 07 72 ... # "lowpanInReasmReqds" 08 72 ... # "lowpanInReasmFails" 09 70 ... # "lowpanInReasmOKs" 0A 71 ... # "lowpanInCompReqds" 0B 71 ... # "lowpanInCompFails" 0C 6F ... # "lowpanInCompOKs" 0D 70 ... # "lowpanInDiscards" 0E 70 ... # "lowpanInDelivers" 0F 71 ... # "lowpanOutRequests" 10 72 ... # "lowpanOutCompReqds" 11 72 ... # "lowpanOutCompFails" 12 70 ... # "lowpanOutCompOKs" 13 72 ... # "lowpanOutFragReqds" van der Stok & GreevenbosExpires August 17, 2014 [Page 22] Internet-Draft CoMI February 2014 14 72 ... # "lowpanOutFragFails" 15 70 ... # "lowpanOutFragOKs" 16 74 ... # "lowpanOutFragCreates" 17 78 1B ... # "lowpanOutMeshHopLimitExceeds" 18 18 75 ... # "lowpanOutMeshNoRoutes" 18 19 75 ... # "lowpanOutMeshRequests" 18 1A 73 ... # "lowpanOutMeshForwds" 18 1B 76 ... # "lowpanOutMeshTransmits" 18 1C 71 ... # "lowpanOutDiscards" 18 1D 72 ... # "lowpanOutTransmits" FF Figure 4: Translation table for the 6LoWPAN MIB In this example, a GET to /mg/mib/lowpanOutFragFails would give: 82 # two element array 1A 8B 47 88 F3 # translation table ID 8B4788F3 BF # indefinite length map 14 # "lowpanOutFragFails" 00 # 0 FF 5. MIB discovery MIB objects are discovered like resources with the standard CoAP resource discovery. Performing a GET on "/.well-known/core" with rt=core.mg.mib returns all MIB descriptors and all OIDs which are available on this device. For table objects there is no further possibility to discover the row descriptors. For example, consider there are two MIB objects with descriptors "sysUpTime" and "ipNetToMediaTable" associated with OID 1.3.6.1.2.1.1.3 and 1.3.6.1.2.1.4.22 van der Stok & GreevenbosExpires August 17, 2014 [Page 23] Internet-Draft CoMI February 2014 REQ: GET example.com/.well-known/core?rt=core.mg.mib RES: 2.05 Content (Content-Format: application/text) ;rt="core.mg.mib";oid="1.3.6.1.2.1.1.3";mod="SNMPv2-MIB" ;rt="core.mg.mib";oid="1.3.6.1.2.1.4.22";mod="ipMIB" The link format attribute 'oid' is used to associate the name of the MIB resource with its OID. The OID is written as a string in its conventional form. Notice that a MIB variable normally is associated with a descriptor and an OID. The OID is unique, whereas the descriptor is unique in combination with the module name. The "mod", "con", and "rt" attributes can be used to filter resource queries as specified in [RFC6690]. 6. Trap functions A trap can be set through the CoAP Observe [I-D.ietf-core-observe] function. As regular with Observe, the managing entity subscribes to the variable by sending a GET request with an "Observe" option. TODO: Observe example In the registration request, the managing entity MAY include a "Response-To-Uri-Host" and optionally "Response-To-Uri-Port" option as defined in [I-D.becker-core-coap-sms-gprs]. In this case, the observations SHOULD be sent to the address and port indicated in these options. This can be useful when the managing entity wants the managed device to send the trap information to a multicast address. 7. MIB access management Two topics are relevant: (1) the definition of the destination of Notify messages, and (2) the creation and maintenance of "string to number" tables. 7.1. Notify destinations The destination of notifications need to be communicated to the applications sending them. Draft [I-D.ietf-core-interfaces] describes the binding of end-points to end-points on remote devices. The object with type "binding table" contains a sequence of bindings. The contents of bindings contains the methods, location, the interval specifications, and the step value as suggested in [I-D.ietf-core-interfaces]. The method "notify" has been added to van der Stok & GreevenbosExpires August 17, 2014 [Page 24] Internet-Draft CoMI February 2014 the binding methods "poll", "obs" and "push", to cater for the binding of notification source to the receiver. TODO: describe interface for NOTIFY destination definition. 7.2. Conversion tables POST is used to initialize a conversion table. At the arrival of the POST, all existing tables are removed and new tables as specified by the payload are created with the contents specified in the payload. When the payload of the POST is empty, no table is created. PUT is used to create new entries in an existing table and overwrite existing entries. When the payload of the PUT contains a non existing table, a new table with the new identity is created. When the payload of the PUT contains a table with an already existing identifier, two possiblities exist: exiting string value the contents of the existing pair is overwritten with the pair in the payload. new string value A new pair is created in the table with the pair in the payload. 8. Error handling In case a request is received which cannot be processed properly, the managed entity MUST return an error message. This error message MUST contain a CoAP 4.xx or 5.xx response code, and SHOULD include additional information in the payload. Such an error message payload is encoded in CBOR, using the following structure: errorMsg : ErrorMsg; *ErrorMsg { errorCode : uint; ?errorText : tstr; } The variable "errorCode" has one of the values from the table below, and the OPTIONAL "errorText" field contains a human readible explanation of the error. van der Stok & GreevenbosExpires August 17, 2014 [Page 25] Internet-Draft CoMI February 2014 +----------------+----------------+---------------------------------+ | CoMI Error | CoAP Error | Description | | Code | Code | | +----------------+----------------+---------------------------------+ | 0 | 4.00 | General error | | | | | | 1 | 4.00 | Malformed CBOR data | | | | | | 2 | 4.00 | Incorrect CBOR datatype | | | | | | 3 | 4.00 | Unknown MIB variable | | | | | | 4 | 4.00 | Unknown translation table | | | | | | 5 | 4.05 | Attempt to write read-only | | | | variable | | | | | | 0..2 | 5.01 | Access exceptions | | | | | | 0..18 | 5.00 | SMI error status | +----------------+----------------+---------------------------------+ The CoAP error code 5.01 is associted with the exceptions defined in [RFC3416] and CoAP error code 5.00 is associated with the error- status defined in [RFC3416]. 9. Security Considerations For secure network management, it is important to restrict access to MIB variables only to authorised parties. This requires integrity protection of both requests and responses, and depending on the application encryption. CoMI re-uses the security mechanisms already available to CoAP as much as possible. This includes DTLS for protected access to resources, as well suitable authentication and authorisation mechanisms. Among the security decisions that need to be made are selecting security modes and encryption mechanisms (see [I-D.ietf-core-coap]). This requires a trade-off, as the NoKey mode gives no protection at all, but is easy to implement, whereas the X.509 mode is quite secure, but may be too complex for constrained devices. In addition, mechanisms for authentication and authorisation may need to be selected. van der Stok & GreevenbosExpires August 17, 2014 [Page 26] Internet-Draft CoMI February 2014 CoMI avoids defining new security mechanisms as much as possible. However some adaptations may still be required, to cater for CoMI's specific requirements. 10. IANA Considerations 'rt="core.mg.mib"' needs registration with IANA. Content types to be registered: o application/comi+json o application/comi+cbor 11. Acknowledgements Mehmet Ersue and Bert Wijnen explained the encoding aspects of PDUs transported under SNMP. Carsten Bormann has given feedback on the use of CBOR. Juergen Schoenwalder has commented on inconsistencies and missing aspects of SNMP in earlier versions of the draft. The draft has benefited from comments by Thomas Watteyne, Dee Denteneer, Esko Dijk, and Michael van Hartskamp. The CBOR encoding borrows extensively from Ladislav Lhotka's description on conversion from YANG to JSON. 12. Changelog Changes from version 00 to version 01 o Focus on MIB only o Introduced CBOR, JSON, removed BER o defined mappings from SMI to xx o Introduced the concept of addressable table rows Changes from version 01 to version 02 o Focus on CBOR, used JSON for examples, removed XML and EXI o added uri-query attributes mod and con to specify modules and contexts o Definition of CBOR string conversion tables for data reduction o use of Block for multiple fragments van der Stok & GreevenbosExpires August 17, 2014 [Page 27] Internet-Draft CoMI February 2014 o Error returns generalized o SMI - YANG - CBOR conversion Changes from version 02 to version 03 o Added security considerations 13. References 13.1. Normative References [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997. [RFC6020] Bjorklund, M., "YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)", RFC 6020, October 2010. [RFC7049] Bormann, C. and P. Hoffman, "Concise Binary Object Representation (CBOR)", RFC 7049, October 2013. [I-D.becker-core-coap-sms-gprs] Becker, M., Li, K., Poetsch, T., and K. Kuladinithi, "Transport of CoAP over SMS", draft-becker-core-coap-sms- gprs-04 (work in progress), August 2013. [I-D.ietf-core-block] Bormann, C. and Z. Shelby, "Blockwise transfers in CoAP", draft-ietf-core-block-14 (work in progress), October 2013. [I-D.ietf-core-coap] Shelby, Z., Hartke, K., and C. Bormann, "Constrained Application Protocol (CoAP)", draft-ietf-core-coap-18 (work in progress), June 2013. [I-D.ietf-core-observe] Hartke, K., "Observing Resources in CoAP", draft-ietf- core-observe-11 (work in progress), October 2013. [I-D.ietf-json-rfc4627bis] Bray, T., "The JSON Data Interchange Format", draft-ietf- json-rfc4627bis-10 (work in progress), December 2013. [I-D.lhotka-netmod-yang-json] Lhotka, L., "Modeling JSON Text with YANG", draft-lhotka- netmod-yang-json-02 (work in progress), September 2013. van der Stok & GreevenbosExpires August 17, 2014 [Page 28] Internet-Draft CoMI February 2014 13.2. Informative References [RFC1213] McCloghrie, K. and M. Rose, "Management Information Base for Network Management of TCP/IP-based internets:MIB-II", STD 17, RFC 1213, March 1991. [RFC2578] McCloghrie, K., Ed., Perkins, D., Ed., and J. Schoenwaelder, Ed., "Structure of Management Information Version 2 (SMIv2)", STD 58, RFC 2578, April 1999. [RFC2863] McCloghrie, K. and F. Kastenholz, "The Interfaces Group MIB", RFC 2863, June 2000. [RFC3410] Case, J., Mundy, R., Partain, D., and B. Stewart, "Introduction and Applicability Statements for Internet- Standard Management Framework", RFC 3410, December 2002. [RFC3411] Harrington, D., Presuhn, R., and B. Wijnen, "An Architecture for Describing Simple Network Management Protocol (SNMP) Management Frameworks", STD 62, RFC 3411, December 2002. [RFC3414] Blumenthal, U. and B. Wijnen, "User-based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3)", STD 62, RFC 3414, December 2002. [RFC3416] Presuhn, R., "Version 2 of the Protocol Operations for the Simple Network Management Protocol (SNMP)", STD 62, RFC 3416, December 2002. [RFC3418] Presuhn, R., "Management Information Base (MIB) for the Simple Network Management Protocol (SNMP)", STD 62, RFC 3418, December 2002. [RFC3986] Berners-Lee, T., Fielding, R., and L. Masinter, "Uniform Resource Identifier (URI): Generic Syntax", STD 66, RFC 3986, January 2005. [RFC4088] Black, D., McCloghrie, K., and J. Schoenwaelder, "Uniform Resource Identifier (URI) Scheme for the Simple Network Management Protocol (SNMP)", RFC 4088, June 2005. [RFC4113] Fenner, B. and J. Flick, "Management Information Base for the User Datagram Protocol (UDP)", RFC 4113, June 2005. [RFC4291] Hinden, R. and S. Deering, "IP Version 6 Addressing Architecture", RFC 4291, February 2006. van der Stok & GreevenbosExpires August 17, 2014 [Page 29] Internet-Draft CoMI February 2014 [RFC4293] Routhier, S., "Management Information Base for the Internet Protocol (IP)", RFC 4293, April 2006. [RFC4944] Montenegro, G., Kushalnagar, N., Hui, J., and D. Culler, "Transmission of IPv6 Packets over IEEE 802.15.4 Networks", RFC 4944, September 2007. [RFC6241] Enns, R., Bjorklund, M., Schoenwaelder, J., and A. Bierman, "Network Configuration Protocol (NETCONF)", RFC 6241, June 2011. [RFC6347] Rescorla, E. and N. Modadugu, "Datagram Transport Layer Security Version 1.2", RFC 6347, January 2012. [RFC6643] Schoenwaelder, J., "Translation of Structure of Management Information Version 2 (SMIv2) MIB Modules to YANG Modules", RFC 6643, July 2012. [RFC6650] Falk, J. and M. Kucherawy, "Creation and Use of Email Feedback Reports: An Applicability Statement for the Abuse Reporting Format (ARF)", RFC 6650, June 2012. [RFC6690] Shelby, Z., "Constrained RESTful Environments (CoRE) Link Format", RFC 6690, August 2012. [RFC6775] Shelby, Z., Chakrabarti, S., Nordmark, E., and C. Bormann, "Neighbor Discovery Optimization for IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs)", RFC 6775, November 2012. [I-D.ietf-core-groupcomm] Rahman, A. and E. Dijk, "Group Communication for CoAP", draft-ietf-core-groupcomm-18 (work in progress), December 2013. [I-D.ietf-core-interfaces] Shelby, Z. and M. Vial, "CoRE Interfaces", draft-ietf- core-interfaces-01 (work in progress), December 2013. [I-D.ersue-constrained-mgmt] Ersue, M., Romascanu, D., and J. Schoenwaelder, "Management of Networks with Constrained Devices: Problem Statement, Use Cases and Requirements", draft-ersue- constrained-mgmt-03 (work in progress), February 2013. van der Stok & GreevenbosExpires August 17, 2014 [Page 30] Internet-Draft CoMI February 2014 [I-D.schoenw-6lowpan-mib] Schoenwaelder, J., Sehgal, A., Tsou, T., and C. Zhou, "Definition of Managed Objects for IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs)", draft- schoenw-6lowpan-mib-03 (work in progress), February 2013. [I-D.bierman-netconf-restconf] Bierman, A., Bjorklund, M., Watsen, K., and R. Fernando, "RESTCONF Protocol", draft-bierman-netconf-restconf-03 (work in progress), December 2013. [STD0001] "Official Internet Protocols Standard", Web http://www.rfc-editor.org/rfcxx00.html, . [XML] "Extensible Markup Language (XML)", Web http://www.w3.org/xml, . [JSON] "JavaScript Object Notation (JSON)", Web http://www.json.org, . Appendix A. Notational Convention for CBOR data To express CBOR structures [RFC7049], this document uses the following conventions: A declaration of a CBOR variable has the form: name : datatype; where "name" is the name of the variable, and "datatype" its CBOR datatype. The name of the variable has no encoding in the CBOR data. "datatype" can be a CBOR primitive such as: tstr: A text string (major type 3) uint: An unsigned integer (major type 0) map(x,y): A map (major type 5), where each first element of a pair is of datatype x, and each second element of datatype y. A '.' character for either x or y means that all datatypes for that element are valid. A datatype can also be a CBOR structure, in which case the variable's "datatype" field contains the name of the CBOR structure. Such CBOR structure is defined by a character sequence consisting of first its van der Stok & GreevenbosExpires August 17, 2014 [Page 31] Internet-Draft CoMI February 2014 name, then a '{' character, then its subfields and finally a '}' character. A CBOR structure can be encapsulated in an array, in which case its name in its definition is preceeded by a '*' character. Otherwise the structure is just a grouping of fields, but without actual encoding of such grouping. The name of an optional field is preceded by a '?' character. This means, that the field may be omitted if not required. Authors' Addresses Peter van der Stok consultant Phone: +31-492474673 (Netherlands), +33-966015248 (France) Email: consultancy@vanderstok.org URI: www.vanderstok.org Bert Greevenbosch Huawei Technologies Co., Ltd. Huawei Industrial Base Bantian, Longgang District Shenzhen 518129 P.R. China Email: bert.greevenbosch@huawei.com van der Stok & GreevenbosExpires August 17, 2014 [Page 32]