| Thread Links | Date Links | ||||
|---|---|---|---|---|---|
| Thread Prev | Thread Next | Thread Index | Date Prev | Date Next | Date Index |
Roger,
Thank you for your comments on the 3rd SA Ballot Recirculation of the P802.15.4ac draft. After reviewing and carefully considering your comments the group arrived at the below Disposition Status and Detail. As there are no changes to the draft it has been submitted to RevCom.
As always your time and thoroughness in reviewing all drafts is greatly appreciated and valued, and we look forward to your review and feedback on all future projects/drafts.
Thanks & Best Regards,
ClintClint Powell
Managing Director – Wireless IoT Standardization, PWC LLC
IEEE 802.15 WG Chair & IEEE 802 LMSC
IEEE 802.15 TG4ab (NG-UWB) - Vice Chair
CSA IEEE 802.15.4 PHY/MAC Advisory Group - Chair
CSA Aliro CSG Certification Policy & Procedure - Tiger Team Lead
Mobile/WhatsApp: 480 586-8457
Email: cpowell@xxxxxxxx
--
Comment ID: 358623, Comment #: R3-2, MBS: Yes
Name: Marks, Roger
Category: Technical, Page: 20, Subclause: 10.9a.2.5, Line: 30
Comment:
The response to R2-2 says "there is no requirement that
requires extended privacy addresses to be globally unique,
they only need to be unique inside the same network." [It also
says "and next higher layers of the same network use same
method to allocate addresses, and for that method to work
properly it needs to maintain some level of uniqueness," which
I don't understand but also seems to support the notion that
some level of uniqueness is required.] However, as has been
indicated in several prior ballot comments, uniqueness is not
specified in the draft. There is no indication that the "next
higher layer" that assigns addresses is obligated to not
duplicate an assignment to multiple assignees, or under what
conditions it may do so (e.g. address reuse after delay). The
new sentence "The next higher layer can use different methods
to generate extended privacy addresses" provides no guidance
of any kind. Furthermore, its focus is on the generation of
addresses, whereas the focus should be on the _assignment_ of
the addresses, regardless of how they were generated. Another
issue that should be clarified regards the possibility that
multiple "next higher layer" entities could be assigning
addresses and whether the resulting possibility of duplicate
extended privacy addresses could ever lead to problems.
Proposed Change:
Restrict the assignment of extended privacy addresses to
provide an acceptably low level of harmful duplication.
Disposition status: REJECTED
Disposition detail:
This standard specifies that the extended privacy address is
provided by the higher layer. The standard specifies a format
for and a means to disseminate privacy addresses, but the
generation and correlation to a specific device is left to the
higher layer. Duplicate detection requires knowledge of
assignments and the algorithms used for generation not
available at the MAC layer (within the scope of this standard)
--
Comment ID: 358622, Comment #: R3-1, MBS: Yes
Name: Marks, Roger
Category: Technical, Page: 20, Subclause: 10.9a.2.5, Line: 30
Comment:
The draft update has added the sentence "The next higher layer
can use different methods to generate extended privacy
addresses." This meaning of this sentence is unclear. Per the
2021 IEEE SA Standards Style Manual, "The word _can_ is used
for statements of possibility and capability, whether
material, physical, or causal (can equals is able to)." So the
higher layer is physically able to use... methods. But are
some of those methods incompatible with the functionality of
the standard? And what methods qualify as "different"? What
are they different from? Is it possible for the higher layer
to use methods that are not different? It is worth considering
how one might wonder how one might write a statement of
conformance to that sentence? Would it be “My implementation
is physically capable to use different methods to generate
extended privacy addresses"?
Proposed Change:
Revise the sentence for improved clarity and specificity.
Ensure that it includes all necessary requirements regarding
the addresses assigned.
Disposition status: REJECTED
Disposition detail:
This standard states that generation of extended privacy
address is done at a higher layer and so out of scope of this
standard. The commenter is correct that this sentence is
stating a possible method that might be employed by a higher
layer entity. This is a correct use of “can”. The
implementation might be physically capable of using other
methods or it might not – thus “it is possible” is correct.
To unsubscribe from the STDS-802-LMSC list, click the following link: https://listserv.ieee.org/cgi-bin/wa?SUBED1=STDS-802-LMSC&A=1