Internet Engineering Task Force (IETF)                         A. Brandt
Request for Comments: 5826                                      J. Buron
Category: Informational                              Sigma Designs, Inc.
ISSN: 2070-1721                                                 G. Porcu
                                                          Telecom Italia
                                                              April 2010
        
Internet Engineering Task Force (IETF)                         A. Brandt
Request for Comments: 5826                                      J. Buron
Category: Informational                              Sigma Designs, Inc.
ISSN: 2070-1721                                                 G. Porcu
                                                          Telecom Italia
                                                              April 2010
        

Home Automation Routing Requirements in Low-Power and Lossy Networks

低功耗和有损网络中的家庭自动化路由要求

Abstract

摘要

This document presents requirements specific to home control and automation applications for Routing Over Low power and Lossy (ROLL) networks. In the near future, many homes will contain high numbers of wireless devices for a wide set of purposes. Examples include actuators (relay, light dimmer, heating valve), sensors (wall switch, water leak, blood pressure), and advanced controllers (radio-frequency-based AV remote control, central server for light and heat control). Because such devices only cover a limited radio range, routing is often required. The aim of this document is to specify the routing requirements for networks comprising such constrained devices in a home-control and automation environment.

本文档介绍了在低功耗和有损(ROLL)网络上路由的家庭控制和自动化应用的特定要求。在不久的将来,许多家庭将拥有大量用于各种用途的无线设备。示例包括执行器(继电器、调光器、加热阀)、传感器(墙壁开关、漏水、血压)和高级控制器(基于射频的AV远程控制、用于光和热控制的中央服务器)。由于此类设备仅覆盖有限的无线电范围,因此通常需要路由。本文件的目的是规定家庭控制和自动化环境中由此类受约束设备组成的网络的路由要求。

Status of This Memo

关于下段备忘

This document is not an Internet Standards Track specification; it is published for informational purposes.

本文件不是互联网标准跟踪规范;它是为了提供信息而发布的。

This document is a product of the Internet Engineering Task Force (IETF). It represents the consensus of the IETF community. It has received public review and has been approved for publication by the Internet Engineering Steering Group (IESG). Not all documents approved by the IESG are a candidate for any level of Internet Standard; see Section 2 of RFC 5741.

本文件是互联网工程任务组(IETF)的产品。它代表了IETF社区的共识。它已经接受了公众审查,并已被互联网工程指导小组(IESG)批准出版。并非IESG批准的所有文件都适用于任何级别的互联网标准;见RFC 5741第2节。

Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at http://www.rfc-editor.org/info/rfc5286.

有关本文件当前状态、任何勘误表以及如何提供反馈的信息,请访问http://www.rfc-editor.org/info/rfc5286.

Copyright Notice

版权公告

Copyright (c) 2010 IETF Trust and the persons identified as the document authors. All rights reserved.

版权所有(c)2010 IETF信托基金和确定为文件作者的人员。版权所有。

This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.

本文件受BCP 78和IETF信托有关IETF文件的法律规定的约束(http://trustee.ietf.org/license-info)自本文件出版之日起生效。请仔细阅读这些文件,因为它们描述了您对本文件的权利和限制。从本文件中提取的代码组件必须包括信托法律条款第4.e节中所述的简化BSD许可证文本,并提供简化BSD许可证中所述的无担保。

This document may contain material from IETF Documents or IETF Contributions published or made publicly available before November 10, 2008. The person(s) controlling the copyright in some of this material may not have granted the IETF Trust the right to allow modifications of such material outside the IETF Standards Process. Without obtaining an adequate license from the person(s) controlling the copyright in such materials, this document may not be modified outside the IETF Standards Process, and derivative works of it may not be created outside the IETF Standards Process, except to format it for publication as an RFC or to translate it into languages other than English.

本文件可能包含2008年11月10日之前发布或公开的IETF文件或IETF贡献中的材料。控制某些材料版权的人员可能未授予IETF信托允许在IETF标准流程之外修改此类材料的权利。在未从控制此类材料版权的人员处获得充分许可的情况下,不得在IETF标准流程之外修改本文件,也不得在IETF标准流程之外创建其衍生作品,除了将其格式化以RFC形式发布或将其翻译成英语以外的其他语言。

Table of Contents

目录

   1. Introduction ....................................................3
      1.1. Terminology ................................................4
      1.2. Requirements Language ......................................6
   2. Home Automation Applications ....................................6
      2.1. Lighting Application in Action .............................6
      2.2. Energy Conservation and Optimizing Energy Consumption ......6
      2.3. Moving a Remote Control Around .............................7
      2.4. Adding a New Module to the System ..........................7
      2.5. Controlling Battery-Operated Window Shades .................8
      2.6. Remote Video Surveillance ..................................8
      2.7. Healthcare .................................................9
           2.7.1. At-Home Health Reporting ...........................10
           2.7.2. At-Home Health Monitoring ..........................10
      2.8. Alarm Systems .............................................10
   3. Unique Routing Requirements of Home Automation Applications ....11
      3.1. Constraint-Based Routing ..................................12
      3.2. Support of Mobility .......................................12
      3.3. Scalability ...............................................13
      3.4. Convergence Time ..........................................13
      3.5. Manageability .............................................14
      3.6. Stability .................................................14
   4. Traffic Pattern ................................................14
   5. Security Considerations ........................................15
   6. Acknowledgments ................................................16
   7. References .....................................................16
      7.1. Normative References ......................................16
      7.2. Informative References ....................................17
        
   1. Introduction ....................................................3
      1.1. Terminology ................................................4
      1.2. Requirements Language ......................................6
   2. Home Automation Applications ....................................6
      2.1. Lighting Application in Action .............................6
      2.2. Energy Conservation and Optimizing Energy Consumption ......6
      2.3. Moving a Remote Control Around .............................7
      2.4. Adding a New Module to the System ..........................7
      2.5. Controlling Battery-Operated Window Shades .................8
      2.6. Remote Video Surveillance ..................................8
      2.7. Healthcare .................................................9
           2.7.1. At-Home Health Reporting ...........................10
           2.7.2. At-Home Health Monitoring ..........................10
      2.8. Alarm Systems .............................................10
   3. Unique Routing Requirements of Home Automation Applications ....11
      3.1. Constraint-Based Routing ..................................12
      3.2. Support of Mobility .......................................12
      3.3. Scalability ...............................................13
      3.4. Convergence Time ..........................................13
      3.5. Manageability .............................................14
      3.6. Stability .................................................14
   4. Traffic Pattern ................................................14
   5. Security Considerations ........................................15
   6. Acknowledgments ................................................16
   7. References .....................................................16
      7.1. Normative References ......................................16
      7.2. Informative References ....................................17
        
1. Introduction
1. 介绍

This document presents requirements specific to home control and automation applications for Routing Over Low power and Lossy (ROLL) networks. In the near future, many homes will contain high numbers of wireless devices for a wide set of purposes. Examples include actuators (relay, light dimmer, heating valve), sensors (wall switch, water leak, blood pressure), and advanced controllers. Basic home-control modules such as wall switches and plug-in modules may be turned into an advanced home automation solution via the use of an IP-enabled application responding to events generated by wall switches, motion sensors, light sensors, rain sensors, and so on.

本文档介绍了在低功耗和有损(ROLL)网络上路由的家庭控制和自动化应用的特定要求。在不久的将来,许多家庭将拥有大量用于各种用途的无线设备。示例包括执行器(继电器、调光器、加热阀)、传感器(墙壁开关、漏水、血压)和高级控制器。通过使用支持IP的应用程序响应墙壁开关、运动传感器、光线传感器、雨水传感器等产生的事件,可以将墙壁开关和插件模块等基本家庭控制模块转变为高级家庭自动化解决方案。

Network nodes may be sensors and actuators at the same time. An example is a wall switch for replacement in existing homes. The push buttons may generate events for a controller node or for activating other actuator nodes. At the same time, a built-in relay may act as actuator for a controller or other remote sensors.

网络节点可以同时是传感器和执行器。一个例子是在现有住宅中更换的墙壁开关。按钮可为控制器节点或激活其他执行器节点生成事件。同时,内置继电器可作为控制器或其他远程传感器的执行器。

Because ROLL nodes only cover a limited radio range, routing is often required. These devices are usually highly constrained in terms of resources such as battery and memory and operate in unstable environments. Persons moving around in a house, opening or closing a door, or starting a microwave oven affect the reception of weak radio signals. Reflection and absorption may cause a reliable radio link to turn unreliable for a period of time and then become reusable again, thus the term "lossy". All traffic in a ROLL network is carried as IPv6 packets.

由于滚动节点仅覆盖有限的无线电范围,因此通常需要路由。这些设备通常在电池和内存等资源方面受到高度限制,并且在不稳定的环境中运行。人们在房子里走动、开关门或启动微波炉都会影响微弱无线电信号的接收。反射和吸收可能导致可靠的无线电链路在一段时间内变得不可靠,然后再次变得可重复使用,因此术语“有损”。滚动网络中的所有流量都作为IPv6数据包进行传输。

The connected home area is very much consumer oriented. The implication on network nodes is that devices are very cost sensitive, which leads to resource-constrained environments having slow CPUs and small memory footprints. At the same time, nodes have to be physically small, which puts a limit to the physical size of the battery, and thus, the battery capacity. As a result, it is common for battery-operated, sensor-style nodes to shut down radio and CPU resources for most of the time. The radio tends to use the same power for listening as for transmitting.

互联家庭区域非常面向消费者。对网络节点的影响是,设备对成本非常敏感,这导致资源受限的环境具有较慢的CPU和较小的内存占用。同时,节点的物理尺寸必须很小,这限制了电池的物理尺寸,从而限制了电池的容量。因此,电池供电、传感器式节点通常会在大部分时间关闭无线电和CPU资源。收音机倾向于使用与发射相同的功率进行收听。

Although this document focuses its text on radio-based wireless networks, home-automation networks may also operate using a variety of links, such as IEEE 802.15.4, Bluetooth, Low-Power WiFi, wired or other low-power PLC (Power-Line Communication) links. Many such low-power link technologies share similar characteristics with low-power wireless and this document should be regarded as applying equally to all such links.

尽管本文件的重点是基于无线电的无线网络,但家庭自动化网络也可以使用各种链路运行,如IEEE 802.15.4、蓝牙、低功耗WiFi、有线或其他低功耗PLC(电力线通信)链路。许多此类低功率链路技术与低功率无线具有相似的特性,本文件应被视为同等适用于所有此类链路。

Section 2 describes a few typical use cases for home automation applications. Section 3 discusses the routing requirements for networks comprising such constrained devices in a home network environment. These requirements may be overlapping requirements derived from other application-specific routing requirements presented in [BUILDING-REQS], [RFC5673], and [RFC5548].

第2节描述了家庭自动化应用的几个典型用例。第3节讨论了家庭网络环境中包含此类受限设备的网络的路由要求。这些要求可能是从[BUILDING-REQS]、[RFC5673]和[RFC5548]中提出的其他特定于应用的路由要求衍生出来的重叠要求。

A full list of requirements documents may be found in Section 7.

要求文件的完整列表见第7节。

1.1. Terminology
1.1. 术语

ROLL: Routing Over Low-power and Lossy networks. A ROLL node may be classified as a sensor, actuator, or controller.

滚动:在低功耗和有损网络上路由。滚动节点可分为传感器、执行器或控制器。

Actuator: Network node that performs some physical action. Dimmers and relays are examples of actuators. If sufficiently powered, actuator nodes may participate in routing network messages.

执行器:执行某些物理操作的网络节点。调光器和继电器是执行器的示例。如果供电充足,执行器节点可参与路由网络消息。

Border router: Infrastructure device that connects a ROLL network to the Internet or some backbone network.

边界路由器:将滚动网络连接到Internet或某些骨干网络的基础设施设备。

Channel: Radio frequency band used to carry network packets.

信道:用于传输网络数据包的无线电频段。

Controller: Network node that controls actuators. Control decisions may be based on sensor readings, sensor events, scheduled actions, or incoming commands from the Internet or other backbone networks. If sufficiently powered, controller nodes may participate in routing network messages.

控制器:控制执行器的网络节点。控制决策可能基于传感器读数、传感器事件、计划动作或来自互联网或其他骨干网络的输入命令。如果电源充足,控制器节点可以参与路由网络消息。

Downstream: Data direction traveling from a Local Area Network (LAN) to a Personal Area Network (PAN) device.

下游:从局域网(LAN)到个人局域网(PAN)设备的数据方向。

DR: Demand-Response. The mechanism of users adjusting their power consumption in response to the actual pricing of power.

DR:需求响应。用户根据实际电价调整用电量的机制。

DSM: Demand-Side Management. Process allowing power utilities to enable and disable loads in consumer premises. Where DR relies on voluntary action from users, DSM may be based on enrollment in a formal program.

需求侧管理。允许电力公司在用户场所启用和禁用负载的过程。当DR依赖于用户的自愿行动时,DSM可能基于正式项目的注册。

LLNs: Low-Power and Lossy Networks.

LLNs:低功耗和有损网络。

LAN: Local Area Network.

局域网:局域网。

PAN: Personal Area Network. A geographically limited wireless network based on, e.g., 802.15.4 or Z-Wave radio.

个人区域网络。基于例如802.15.4或Z-Wave无线电的地理受限无线网络。

PDA Personal Digital Assistant. A small, handheld computer.

个人数字助理。小型手持式计算机。

PLC Power-Line Communication.

电力线通信。

RAM Random Access Memory.

随机存取存储器。

Sensor: Network node that measures some physical parameter and/or detects an event. The sensor may generate a trap message to notify a controller or directly activate an actuator. If sufficiently powered, sensor nodes may participate in routing network messages.

传感器:测量某些物理参数和/或检测事件的网络节点。传感器可生成陷阱信息以通知控制器或直接激活致动器。如果供电充足,传感器节点可以参与路由网络消息。

Upstream: Data direction traveling from a PAN to a LAN device.

上游:从PAN到LAN设备的数据方向。

Refer to the ROLL terminology reference document [ROLL-TERM] for a full list of terms used in the IETF ROLL WG.

有关IETF ROLL WG中使用的术语的完整列表,请参阅ROLL术语参考文件[ROLL-TERM]。

1.2. Requirements Language
1.2. 需求语言

The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119 [RFC2119].

本文件中的关键词“必须”、“不得”、“要求”、“应”、“不应”、“应”、“不应”、“建议”、“可”和“可选”应按照RFC 2119[RFC2119]中所述进行解释。

2. Home Automation Applications
2. 家庭自动化应用

Home automation applications represent a special segment of networked devices with its unique set of requirements. Historically, such applications used wired networks or power-line communication (PLC) but wireless solutions have emerged, allowing existing homes to be upgraded more easily.

家庭自动化应用代表了网络设备的一个特殊部分,有其独特的需求。从历史上看,此类应用程序使用有线网络或电力线通信(PLC),但无线解决方案已经出现,使现有家庭更容易升级。

To facilitate the requirements discussion in Section 3, this section lists a few typical use cases of home automation applications. New applications are being developed at a high pace and this section does not mean to be exhaustive. Most home automation applications tend to be running some kind of command/response protocol. The command may come from several places.

为了便于第3节中的需求讨论,本节列出了家庭自动化应用的几个典型用例。新的应用程序正在高速开发,本节并不意味着详尽无遗。大多数家庭自动化应用程序倾向于运行某种命令/响应协议。命令可能来自多个地方。

2.1. Lighting Application in Action
2.1. 照明在实际中的应用

A lamp may be turned on, not only by a wall switch but also by a movement sensor. The wall-switch module may itself be a push-button sensor and an actuator at the same time. This will often be the case when upgrading existing homes as existing wiring is not prepared for automation.

灯不仅可以通过墙壁开关打开,还可以通过移动传感器打开。墙壁开关模块本身可能同时是一个按钮传感器和一个执行器。当升级现有住宅时,通常会出现这种情况,因为现有的布线没有为自动化做好准备。

One event may cause many actuators to be activated at the same time.

一个事件可能导致多个执行器同时激活。

Using the direct analogy to an electronic car key, a house owner may activate the "leaving home" function from an electronic house key, mobile phone, etc. For the sake of visual impression, all lights should turn off at the same time; at least, it should appear to happen at the same time.

使用电子汽车钥匙的直接类比,房主可以通过电子汽车钥匙、手机等激活“离家”功能。为了给人留下视觉印象,所有灯应同时关闭;至少,它应该同时发生。

2.2. Energy Conservation and Optimizing Energy Consumption
2.2. 节能与优化能源消耗

In order to save energy, air conditioning, central heating, window shades, etc., may be controlled by timers, motion sensors, or remotely via Internet or cell. Central heating may also be set to a reduced temperature during nighttime.

为了节约能源,空调、中央供暖、窗帘等可由定时器、运动传感器或通过互联网或手机远程控制。夜间也可将中央供暖设置为低温。

The power grid may experience periods where more wind-generated power is produced than is needed. Typically this may happen during night hours.

电网可能会经历风力发电量超过所需量的时期。通常情况下,这可能发生在夜间。

In periods where electricity demands exceed available supply, appliances such as air conditioning, climate-control systems, washing machines, etc., can be turned off to avoid overloading the power grid.

在电力需求超过可用供应的时期,可以关闭诸如空调、气候控制系统、洗衣机等设备,以避免电网过载。

This is known as Demand-Side Management (DSM). Remote control of household appliances is well-suited for this application.

这就是所谓的需求侧管理(DSM)。家用电器的远程控制非常适合这种应用。

The start/stop decision for the appliances can also be regulated by dynamic power pricing information obtained from the electricity utility companies. This method, called Demand-Response (DR), works by motivation of users via pricing, bonus points, etc. For example, the washing machine and dish washer may just as well work while power is cheap. The electric car should also charge its batteries on cheap power.

设备的启动/停止决策也可以通过从电力公司获得的动态电价信息进行调节。这种称为需求响应(DR)的方法,通过定价、奖励积分等激励用户。例如,洗衣机和洗碗机也可以在电力便宜的情况下工作。电动汽车也应该用便宜的电力给电池充电。

In order to achieve effective electricity savings, the energy monitoring application must guarantee that the power consumption of the ROLL devices is much lower than that of the appliance itself.

为了实现有效的节电,能量监控应用程序必须保证滚动设备的功耗远低于设备本身的功耗。

Most of these appliances are mains powered and are thus ideal for providing reliable, always-on routing resources. Battery-powered nodes, by comparison, are constrained routing resources and may only provide reliable routing under some circumstances.

这些设备大多由电源供电,因此非常适合提供可靠的、始终在线的路由资源。相比之下,电池供电的节点是受限制的路由资源,只能在某些情况下提供可靠的路由。

2.3. Moving a Remote Control Around
2.3. 移动遥控器

A remote control is a typical example of a mobile device in a home automation network. An advanced remote control may be used for dimming the light in the dining room while eating and later on, turning up the music while doing the dishes in the kitchen. Reaction must appear to be instant (within a few hundred milliseconds) even when the remote control has moved to a new location. The remote control may be communicating to either a central home automation controller or directly to the lamps and the media center.

遥控器是家庭自动化网络中移动设备的典型示例。先进的遥控器可用于在用餐时调暗餐厅的灯光,然后在厨房洗碗时打开音乐。即使当遥控器移动到新位置时,反应也必须是即时的(在几百毫秒内)。遥控器可以与中央家庭自动化控制器通信,也可以直接与灯具和媒体中心通信。

2.4. Adding a New Module to the System
2.4. 向系统中添加新模块

Small-size, low-cost modules may have no user interface except for a single button. Thus, an automated inclusion process is needed for controllers to find new modules. Inclusion covers the detection of neighbors and the assignment of a unique node ID. Inclusion should be completed within a few seconds.

小尺寸、低成本的模块可能没有用户界面,只有一个按钮。因此,控制器需要一个自动包含过程来查找新模块。包含包括检测邻居和分配唯一节点ID。包含应在几秒钟内完成。

For ease of use in a consumer application space such as home control, nodes may be included without having to type in special codes before inclusion. One way to achieve an acceptable balance between security and convenience is to block inclusion during normal operation, explicitly enable inclusion support just before adding a new module, and disable it again just after adding a new module.

为了便于在家用控制等消费者应用程序空间中使用,可以包括节点,而不必在包括之前键入特殊代码。在安全性和便利性之间实现可接受平衡的一种方法是在正常操作期间阻止包含,在添加新模块之前显式启用包含支持,并在添加新模块之后再次禁用它。

For security considerations, refer to Section 5.

有关安全注意事项,请参阅第5节。

If assignment of unique addresses is performed by a central controller, it must be possible to route the inclusion request from the joining node to the central controller before the joining node has been included in the network.

如果由中央控制器执行唯一地址的分配,则在加入节点被包括在网络中之前,必须能够将加入请求从加入节点路由到中央控制器。

2.5. Controlling Battery-Operated Window Shades
2.5. 控制电池供电的窗帘

In consumer premises, window shades are often battery-powered as there is no access to mains power over the windows. For battery conservation purposes, such an actuator node is sleeping most of the time. A controller sending commands to a sleeping actuator node via ROLL devices will have no problems delivering the packet to the nearest powered router, but that router may experience a delay until the next wake-up time before the command can be delivered.

在消费场所,窗帘通常由电池供电,因为窗户上没有电源。出于节省电池的目的,此类执行器节点大部分时间处于休眠状态。控制器通过滚动设备向睡眠执行器节点发送命令时,将数据包传送到最近的供电路由器不会有问题,但该路由器可能会经历延迟,直到下一个唤醒时间,才能传送命令。

2.6. Remote Video Surveillance
2.6. 远程视频监控

Remote video surveillance is a fairly classic application for home networking. It provides the ability for the end-user to get a video stream from a web cam reached via the Internet. The video stream may be triggered by the end-user after receiving an alarm from a sensor (movement or smoke detector) or the user simply wants to check the home status via video.

远程视频监控是家庭网络中相当经典的应用。它为最终用户提供了通过互联网从网络摄像头获取视频流的能力。最终用户在接收到来自传感器(移动或烟雾探测器)的警报后可以触发视频流,或者用户只是想通过视频检查家庭状态。

Note that in the former case, more than likely, there will be a form of inter-device communication: upon detecting some movement in the home, the movement sensor may send a request to the light controller to turn on the lights, to the Web Cam to start a video stream that would then be directed to the end-user's cell phone or Personal Digital Assistant (PDA) via the Internet.

注意,在前一种情况下,很可能存在一种设备间通信形式:在检测到家庭中的某些移动时,移动传感器可向灯光控制器发送请求以打开灯光,通过网络摄像头启动视频流,然后通过互联网将视频流定向到最终用户的手机或个人数字助理(PDA)。

In contrast to other applications, e.g., industrial sensors, where data would mainly be originated by a sensor to a sink and vice versa, this scenario implicates a direct inter-device communication between ROLL devices.

与其他应用(例如工业传感器)不同,在工业传感器中,数据主要由传感器发送到接收器,反之亦然,该场景涉及滚动设备之间的直接设备间通信。

2.7. Healthcare
2.7. 保健

By adding communication capability to devices, patients and elderly citizens may be able to do simple measurements at home.

通过增加设备的通信能力,患者和老年人可以在家里进行简单的测量。

Thanks to online devices, a doctor can keep an eye on the patient's health and receive warnings if a new trend is discovered by automated filters.

多亏了在线设备,如果自动过滤器发现了新的趋势,医生可以密切关注患者的健康并收到警告。

Fine-grained, daily measurements presented in proper ways may allow the doctor to establish a more precise diagnosis.

以适当的方式呈现的细粒度、每日测量值可使医生建立更精确的诊断。

Such applications may be realized as wearable products that frequently do a measurement and automatically deliver the result to a data sink locally or over the Internet.

此类应用程序可以实现为可穿戴产品,可频繁进行测量,并在本地或通过互联网将测量结果自动发送到数据接收器。

Applications falling in this category are referred to as at-home health reporting. Whether measurements are done in a fixed interval or they are manually activated, they leave all processing to the receiving data sink.

属于这一类别的应用称为家庭健康报告。无论是在固定的时间间隔内进行测量,还是手动激活测量,都将所有处理留给接收数据接收器。

A more active category of applications may send an alarm if some alarm condition is triggered. This category of applications is referred to as at-home health monitoring. Measurements are interpreted in the device and may cause reporting of an event if an alarm is triggered.

如果触发某些报警条件,则更活跃的应用程序类别可能会发送报警。这类应用称为家庭健康监测。测量值在设备中进行解释,如果触发报警,可能会导致事件报告。

Many implementations may overlap both categories.

许多实现可能与这两个类别重叠。

Since wireless and battery operated systems may never reach 100% guaranteed operational time, healthcare and security systems will need a management layer implementing alarm mechanisms for low battery, report activity, etc.

由于无线和电池供电系统可能永远无法达到100%的保证运行时间,医疗保健和安全系统将需要一个管理层来实现电池电量不足、报告活动等的报警机制。

For instance, if a blood pressure sensor did not report a new measurement, say five minutes after the scheduled time, some responsible person must be notified.

例如,如果一个血压传感器没有报告一个新的测量值,比如在预定时间后五分钟,必须通知一些负责人。

The structure and performance of such a management layer is outside the scope of the routing requirements listed in this document.

此类管理层的结构和性能不在本文件所列路由要求的范围内。

2.7.1. At-Home Health Reporting
2.7.1. 家庭健康报告

Applications might include:

应用程序可能包括:

o Temperature o Weight o Blood pressure o Insulin level

o 温度o体重o血压o胰岛素水平

Measurements may be stored for long-term statistics. At the same time, a critically high blood pressure may cause the generation of an alarm report. Refer to Section 2.7.2.

可以存储测量值以进行长期统计。同时,严重高血压可能会导致产生报警报告。参考第2.7.2节。

To avoid a high number of request messages, nodes may be configured to autonomously do a measurement and send a report in intervals.

为了避免大量的请求消息,可以将节点配置为自动进行测量并每隔一段时间发送报告。

2.7.2. At-Home Health Monitoring
2.7.2. 家庭健康监测

An alarm event may become active, e.g., if the measured blood pressure exceeds a threshold or if a person falls to the ground. Alarm conditions must be reported with the highest priority and timeliness.

报警事件可能会激活,例如,如果测得的血压超过阈值或人员摔倒在地。必须以最高优先级和及时性报告报警情况。

Applications might include:

应用程序可能包括:

o Temperature o Weight o Blood pressure o Insulin level o Electrocardiogram (ECG) o Position tracker

o 温度o体重o血压o胰岛素水平o心电图(ECG)o位置跟踪器

2.8. Alarm Systems
2.8. 报警系统

A home security alarm system is comprised of various sensors (vibration, fire, carbon monoxide, door/window, glass-break, presence, panic button, etc.).

家庭安全报警系统由各种传感器(振动、火灾、一氧化碳、门窗、玻璃破裂、存在、紧急按钮等)组成。

Some smoke alarms are battery powered and at the same time mounted in a high place. Battery-powered safety devices should only be used for routing if no other alternatives exist to avoid draining the battery. A smoke alarm with a drained battery does not provide a lot of safety. Also, it may be inconvenient to change the batteries in a smoke alarm.

一些烟雾报警器由电池供电,同时安装在高处。只有在没有其他替代品可避免耗尽电池电量的情况下,才应使用电池供电的安全装置进行布线。电池耗尽的烟雾报警器不能提供很多安全性。此外,在烟雾报警器中更换电池可能会很不方便。

Alarm system applications may have both a synchronous and an asynchronous behavior; i.e., they may be periodically queried by a central control application (e.g., for a periodical refreshment of the network state) or send a message to the control application on their own initiative.

报警系统应用程序可能具有同步和异步行为;i、 例如,中央控制应用程序可以定期查询它们(例如,定期刷新网络状态),或者主动向控制应用程序发送消息。

When a node (or a group of nodes) identifies a risk situation (e.g., intrusion, smoke, fire), it sends an alarm message to a central controller that could autonomously forward it via the Internet or interact with other network nodes (e.g., try to obtain more detailed information or ask other nodes close to the alarm event).

当一个节点(或一组节点)识别出一种风险情况(例如入侵、烟雾、火灾)时,它会向中央控制器发送一条报警消息,中央控制器可以通过互联网自动转发该消息或与其他网络节点交互(例如,尝试获取更详细的信息或询问靠近报警事件的其他节点)。

Finally, routing via battery-powered nodes may be very slow if the nodes are sleeping most of the time (they could appear unresponsive to the alarm detection). To ensure fast message delivery and avoid battery drain, routing should be avoided via sleeping devices.

最后,如果节点大部分时间处于睡眠状态,通过电池供电的节点进行路由可能会非常慢(它们可能对警报检测没有响应)。为确保快速消息传递并避免电池耗尽,应避免通过休眠设备进行路由。

3. Unique Routing Requirements of Home Automation Applications
3. 家庭自动化应用的独特路由要求

Home automation applications have a number of specific routing requirements related to the set of home networking applications and the perceived operation of the system.

家庭自动化应用程序有许多与家庭网络应用程序集和系统感知操作相关的特定路由要求。

The relations of use cases to requirements are outlined in the table below:

用例与需求的关系如下表所示:

   +------------------------------+-----------------------------+
   | Use case                     | Requirement                 |
   +------------------------------+-----------------------------+
   |2.1. Lighting Application in  |3.2. Support of Mobility     |
   |Action                        |3.3. Scalability             |
   +------------------------------+-----------------------------+
   |2.2. Energy Conservation and  |3.1. Constraint-Based Routing|
   |Optimizing Energy Consumption |                             |
   +------------------------------+-----------------------------+
   |2.3. Moving a Remote Control  |3.2. Support of Mobility     |
   |Around                        |3.4. Convergence Time        |
   +------------------------------+-----------------------------+
   |2.4. Adding a New Module to   |3.4. Convergence Time        |
   |the System                    |3.5. Manageability           |
   +------------------------------+-----------------------------+
   |2.7. Healthcare               |3.1. Constraint-Based Routing|
   |                              |3.2. Support of Mobility     |
   |                              |3.4. Convergence Time        |
   +------------------------------+-----------------------------+
   |2.8. Alarm Systems            |3.3. Scalability             |
   |                              |3.4. Convergence Time        |
   +------------------------------+-----------------------------+
        
   +------------------------------+-----------------------------+
   | Use case                     | Requirement                 |
   +------------------------------+-----------------------------+
   |2.1. Lighting Application in  |3.2. Support of Mobility     |
   |Action                        |3.3. Scalability             |
   +------------------------------+-----------------------------+
   |2.2. Energy Conservation and  |3.1. Constraint-Based Routing|
   |Optimizing Energy Consumption |                             |
   +------------------------------+-----------------------------+
   |2.3. Moving a Remote Control  |3.2. Support of Mobility     |
   |Around                        |3.4. Convergence Time        |
   +------------------------------+-----------------------------+
   |2.4. Adding a New Module to   |3.4. Convergence Time        |
   |the System                    |3.5. Manageability           |
   +------------------------------+-----------------------------+
   |2.7. Healthcare               |3.1. Constraint-Based Routing|
   |                              |3.2. Support of Mobility     |
   |                              |3.4. Convergence Time        |
   +------------------------------+-----------------------------+
   |2.8. Alarm Systems            |3.3. Scalability             |
   |                              |3.4. Convergence Time        |
   +------------------------------+-----------------------------+
        
3.1. Constraint-Based Routing
3.1. 基于约束的路由

For convenience and low-operational costs, power consumption of consumer products must be kept at a very low level to achieve a long battery lifetime. One implication of this fact is that Random Access Memory (RAM) is limited and it may even be powered down, leaving only a few 100 bytes of RAM alive during the sleep phase.

为了方便和低运营成本,消费品的功耗必须保持在非常低的水平,以实现较长的电池寿命。这一事实的一个含义是随机存取存储器(RAM)是有限的,它甚至可能被关闭,在睡眠阶段只留下几百字节的RAM。

The use of battery-powered devices reduces installation costs and does enable installation of devices even where main power lines are not available. On the other hand, in order to be cost effective and efficient, the devices have to maximize the sleep phase with a duty cycle lower than 1%.

使用电池供电的设备可以降低安装成本,即使在没有主电源线的情况下也可以安装设备。另一方面,为了具有成本效益和效率,设备必须在占空比低于1%的情况下最大化睡眠阶段。

Some devices only wake up in response to an event, e.g., a push button.

一些设备仅在响应事件(例如,按钮)时才会唤醒。

Simple battery-powered nodes such as movement sensors on garage doors and rain sensors may not be able to assist in routing. Depending on the node type, the node never listens at all, listens rarely, or makes contact on demand to a pre-configured target node. Attempting to communicate with such nodes may at best require a long time before getting a response.

简单的电池供电节点(如车库门上的移动传感器和雨量传感器)可能无法协助路由。根据节点类型,节点根本不侦听、很少侦听或按需联系预配置的目标节点。尝试与此类节点通信最多可能需要很长时间才能得到响应。

Other battery-powered nodes may have the capability to participate in routing. The routing protocol SHOULD route via mains-powered nodes if possible.

其他电池供电的节点可能具有参与路由的能力。如果可能,路由协议应通过电源供电的节点进行路由。

The routing protocol MUST support constraint-based routing taking into account node properties (CPU, memory, level of energy, sleep intervals, safety/convenience of changing battery).

路由协议必须支持基于约束的路由,并考虑节点属性(CPU、内存、能量级别、睡眠间隔、更换电池的安全性/便利性)。

3.2. Support of Mobility
3.2. 对流动性的支持

In a home environment, although the majority of devices are fixed devices, there is still a variety of mobile devices, for example, a remote control is likely to move. Another example of mobile devices is wearable healthcare devices.

在家庭环境中,尽管大多数设备是固定设备,但仍然有各种移动设备,例如,遥控器可能会移动。移动设备的另一个例子是可穿戴医疗设备。

While healthcare devices delivering measurement results can tolerate route discovery times measured in seconds, a remote control appears unresponsive if using more than 0.5 seconds to, e.g., pause the music.

虽然提供测量结果的医疗保健设备可以容忍以秒为单位测量的路由发现时间,但如果使用超过0.5秒的时间(例如暂停音乐),则遥控器似乎没有响应。

On more rare occasions, receiving nodes may also have moved. Examples include a safety-off switch in a clothes iron, a vacuum cleaner robot, or the wireless chime of doorbell set.

在更罕见的情况下,接收节点也可能移动。例如熨斗上的安全关闭开关、吸尘器机器人或无线门铃。

Refer to Section 3.4 for routing protocol convergence times.

有关路由协议收敛时间,请参阅第3.4节。

A non-responsive node can either be caused by 1) a failure in the node, 2) a failed link on the path to the node, or 3) a moved node. In the first two cases, the node can be expected to reappear at roughly the same location in the network, whereas it can return anywhere in the network in the latter case.

非响应节点可能由1)节点故障、2)节点路径上的链路故障或3)移动的节点引起。在前两种情况下,节点可以重新出现在网络中大致相同的位置,而在后一种情况下,节点可以返回网络中的任何位置。

3.3. Scalability
3.3. 可伸缩性

Looking at the number of wall switches, power outlets, sensors of various natures, video equipment, and so on in a modern house, it seems quite realistic that hundreds of devices may form a home-automation network in a fully populated "smart" home, and a large proportion of those may be low-power devices. Moving towards professional-building automation, the number of such devices may be in the order of several thousands.

从现代住宅中墙壁开关、电源插座、各种性质的传感器、视频设备等的数量来看,在一个人满为患的“智能”家庭中,数百台设备可能构成一个家庭自动化网络,其中很大一部分可能是低功耗设备,这似乎是非常现实的。转向专业楼宇自动化,此类设备的数量可能会达到数千个。

The routing protocol needs to be able to support a basic home deployment and so MUST be able to support at least 250 devices in the network. Furthermore, the protocol SHOULD be extensible to support more sophisticated and future deployments with a larger number of devices.

路由协议需要能够支持基本的家庭部署,因此必须能够支持网络中至少250个设备。此外,该协议应具有可扩展性,以支持更复杂的未来部署和更多的设备。

3.4. Convergence Time
3.4. 收敛时间

A wireless home automation network is subject to various instabilities due to signal strength variation, moving persons, and the like.

无线家庭自动化网络由于信号强度变化、人员移动等而受到各种不稳定性的影响。

Measured from the transmission of a packet, the following convergence time requirements apply.

从数据包的传输开始测量,以下收敛时间要求适用。

The routing protocol MUST converge within 0.5 seconds if no nodes have moved (see Section 3.2 for motivation).

如果没有节点移动,路由协议必须在0.5秒内收敛(参见第3.2节了解动机)。

The routing protocol MUST converge within four seconds if nodes have moved to re-establish connectivity within a time that a human operator would find tolerable as, for example, when moving a remote control unit.

如果节点在人类操作员认为可以容忍的时间内移动以重新建立连接,则路由协议必须在四秒钟内收敛,例如,当移动远程控制单元时。

In both cases, "converge" means "the originator node has received a response from the destination node". The above-mentioned convergence time requirements apply to a home control network environment of up to 250 nodes with up to four repeating nodes between source and destination.

在这两种情况下,“converge”表示“发端节点已收到来自目的节点的响应”。上述汇聚时间要求适用于多达250个节点的家庭控制网络环境,在源和目标之间最多有四个重复节点。

3.5. Manageability
3.5. 可管理性

The ability of the home network to support auto-configuration is of the utmost importance. Indeed, most end-users will not have the expertise and the skills to perform advanced configuration and troubleshooting. Thus, the routing protocol designed for home-automation networks MUST provide a set of features including zero-configuration of the routing protocol for a new node to be added to the network. From a routing perspective, zero-configuration means that a node can obtain an address and join the network on its own, almost without human intervention.

家庭网络支持自动配置的能力至关重要。事实上,大多数最终用户将不具备执行高级配置和故障排除的专业知识和技能。因此,为家庭自动化网络设计的路由协议必须提供一组功能,包括为添加到网络中的新节点提供零配置路由协议。从路由角度来看,零配置意味着节点可以获得地址并自行加入网络,几乎不需要人工干预。

3.6. Stability
3.6. 稳定性

If a node is found to fail often compared to the rest of the network, this node SHOULD NOT be the first choice for routing of traffic.

如果与网络的其他部分相比,发现一个节点经常出现故障,则该节点不应成为流量路由的首选。

4. Traffic Pattern
4. 交通模式

Depending on the design philosophy of the home network, wall switches may be configured to directly control individual lamps or alternatively, all wall switches send control commands to a central lighting control computer, which again sends out control commands to relevant devices.

根据家庭网络的设计原理,墙壁开关可配置为直接控制单个灯具,或者,所有墙壁开关向中央照明控制计算机发送控制命令,中央照明控制计算机再次向相关设备发送控制命令。

In a distributed system, the traffic tends to be multipoint-to-multipoint. In a centralized system, it is a mix of multipoint-to-point and point-to-multipoint.

在分布式系统中,流量趋向于多点对多点。在集中式系统中,它是多点对点和点对多点的混合。

Wall switches only generate traffic when activated, which typically happens from one to ten times per hour.

墙壁交换机仅在激活时产生流量,通常每小时发生一到十次。

Remote controls have a similar transmit pattern to wall switches but may be activated more frequently in some deployments.

遥控器具有与墙壁交换机类似的传输模式,但在某些部署中可能会更频繁地激活。

Temperature/air and pressure/rain sensors send frames when queried by the user or can be preconfigured to send measurements at fixed intervals (typically minutes). Motion sensors typically send a frame when motion is first detected and another frame when an idle period with no movement has elapsed. The highest transmission frequency depends on the idle period used in the sensor. Sometimes, a timer will trigger a frame transmission when an extended period without status change has elapsed.

温度/空气和压力/雨水传感器在用户查询时发送帧,或者可以预配置为以固定间隔(通常为分钟)发送测量值。运动传感器通常在第一次检测到运动时发送一帧,在空闲时间没有运动时发送另一帧。最高传输频率取决于传感器中使用的空闲时间。有时,当经过一段没有状态变化的延长时间时,计时器将触发帧传输。

All frames sent in the above examples are quite short, typically less than five bytes of payload. Lost frames and interference from other transmitters may lead to retransmissions. In all cases, acknowledgment frames with a size of a few bytes are used.

上述示例中发送的所有帧都非常短,通常小于5字节的有效负载。丢失的帧和来自其他发射机的干扰可能会导致重传。在所有情况下,都会使用大小为几个字节的确认帧。

5. Security Considerations
5. 安全考虑

As is the case with every network, LLNs are exposed to routing security threats that need to be addressed. The wireless and distributed nature of these networks increases the spectrum of potential routing security threats. This is further amplified by the resource constraints of the nodes, thereby preventing resource-intensive routing security approaches from being deployed. A viable routing security approach SHOULD be sufficiently lightweight that it may be implemented across all nodes in a LLN. These issues require special attention during the design process, so as to facilitate a commercially attractive deployment.

与每个网络一样,LLN都面临路由安全威胁,需要解决这些威胁。这些网络的无线和分布式特性增加了潜在路由安全威胁的范围。节点的资源约束进一步放大了这一点,从而防止部署资源密集型路由安全方法。一个可行的路由安全方法应该足够轻量级,可以在LLN中的所有节点上实现。这些问题在设计过程中需要特别注意,以便于进行具有商业吸引力的部署。

An attacker can snoop, replay, or originate arbitrary messages to a node in an attempt to manipulate or disable the routing function.

攻击者可以窥探、重播或向节点发送任意消息,试图操纵或禁用路由功能。

To mitigate this, the LLN MUST be able to authenticate a new node prior to allowing it to participate in the routing decision process. The routing protocol MUST support message integrity.

为了缓解这种情况,LLN必须能够在允许新节点参与路由决策过程之前对其进行身份验证。路由协议必须支持消息完整性。

A further example of routing security issues that may arise is the abnormal behavior of nodes that exhibit an egoistic conduct, such as not obeying network rules or forwarding no or false packets.

可能出现的路由安全问题的另一个例子是节点表现出利己行为的异常行为,例如不遵守网络规则或转发no或false数据包。

Other important issues may arise in the context of denial-of-service (DoS) attacks, malicious address space allocations, advertisement of variable addresses, a wrong neighborhood, etc. The routing protocol(s) SHOULD support defense against DoS attacks and other attempts to maliciously or inadvertently cause the mechanisms of the routing protocol(s) to over-consume the limited resources of LLN nodes, e.g., by constructing forwarding loops or causing excessive routing protocol overhead traffic, etc.

在拒绝服务(DoS)攻击、恶意地址空间分配、可变地址广告、错误邻居等情况下可能会出现其他重要问题。路由协议应支持防御DoS攻击和其他恶意或无意导致路由协议机制的企图过度消耗LLN节点的有限资源,例如,通过构建转发环路或导致过多的路由协议开销流量等。

The properties of self-configuration and self-organization that are desirable in a LLN introduce additional routing security considerations. Mechanisms MUST be in place to deny any node that attempts to take malicious advantage of self-configuration and self-organization procedures. Such attacks may attempt, for example, to cause DoS, drain the energy of power-constrained devices, or to hijack the routing mechanism. A node MUST authenticate itself to a trusted node that is already associated with the LLN before the former can take part in self-configuration or self-organization. A node that has already authenticated and associated with the LLN MUST deny, to the maximum extent possible, the allocation of resources to any unauthenticated peer. The routing protocol(s) MUST deny service to any node that has not clearly established trust with the HC-LLN.

LLN中需要的自配置和自组织特性引入了额外的路由安全考虑。必须有机制来拒绝任何试图恶意利用自配置和自组织过程的节点。例如,此类攻击可能试图导致拒绝服务、耗尽受电源限制设备的能量或劫持路由机制。节点必须向已与LLN关联的受信任节点进行自身身份验证,然后LLN才能参与自配置或自组织。已通过身份验证并与LLN关联的节点必须尽可能拒绝向任何未经身份验证的对等方分配资源。路由协议必须拒绝向未明确与HC-LLN建立信任的任何节点提供服务。

In a home-control environment, it is considered unlikely that a network is constantly being snooped and at the same time, ease of use is important. As a consequence, the network key MAY be exposed for short periods during inclusion of new nodes.

在家庭控制环境中,人们认为网络不太可能经常被监听,同时,易用性也很重要。结果,在包括新节点期间,网络密钥可能短时间公开。

Electronic door locks and other critical applications SHOULD apply end-to-end application security on top of the network transport security.

电子门锁和其他关键应用程序应在网络传输安全的基础上应用端到端应用程序安全。

If connected to a backbone network, the LLN SHOULD be capable of limiting the resources utilized by nodes in said backbone network so as not to be vulnerable to DoS. This should typically be handled by border routers providing access from a backbone network to resources in the LLN.

如果连接到主干网,则LLN应当能够限制所述主干网中的节点所使用的资源,以便不易受到DoS攻击。这通常应由边界路由器处理,该路由器提供从主干网到LLN中资源的访问。

With low-computation power and scarce energy resources, LLNs' nodes may not be able to resist any attack from high-power malicious nodes (e.g., laptops and strong radios). However, the amount of damage generated to the whole network SHOULD be commensurate with the number of nodes physically compromised. For example, an intruder taking control over a single node SHOULD NOT be able to completely deny service to the whole network.

由于计算能力低且能源稀缺,LLN节点可能无法抵御来自高功率恶意节点(例如笔记本电脑和强无线电)的任何攻击。但是,对整个网络造成的损害程度应与物理上受到损害的节点数量相称。例如,控制单个节点的入侵者不应该能够完全拒绝整个网络的服务。

In general, the routing protocol(s) SHOULD support the implementation of routing security best practices across the LLN. Such an implementation ought to include defense against, for example, eavesdropping, replay, message insertion, modification, and man-in-the-middle attacks.

通常,路由协议应支持在整个LLN中实现路由安全最佳实践。这种实现应该包括防御,例如,窃听、重播、消息插入、修改和中间人攻击。

The choice of the routing security solutions will have an impact on the routing protocol(s). To this end, routing protocol(s) proposed in the context of LLNs MUST support authentication and integrity measures and SHOULD support confidentiality (routing security) measures.

路由安全解决方案的选择将对路由协议产生影响。为此,在LLN上下文中提出的路由协议必须支持身份验证和完整性措施,并应支持机密性(路由安全性)措施。

6. Acknowledgments
6. 致谢

J. P. Vasseur, Jonathan Hui, Eunsook "Eunah" Kim, Mischa Dohler, and Massimo Maggiorotti are gratefully acknowledged for their contributions to this document.

感谢J.P.Vasseur、Jonathan Hui、Eunsook“Eunah”Kim、Misha Dohler和Massimo Maggiorotti对本文件的贡献。

7. References
7. 工具书类
7.1. Normative References
7.1. 规范性引用文件

[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997.

[RFC2119]Bradner,S.,“RFC中用于表示需求水平的关键词”,BCP 14,RFC 2119,1997年3月。

7.2. Informative References
7.2. 资料性引用

[BUILDING-REQS] Martocci, J., Ed., De Mil, P., Vermeylen, W., and N. Riou, "Building Automation Routing Requirements in Low Power and Lossy Networks", Work in Progress, January 2010.

[楼宇需求]Martocci,J.,Ed.,De Mil,P.,Vermeylen,W.,和N.Riou,“低功率和有损网络中的楼宇自动化布线要求”,正在进行的工作,2010年1月。

[RFC5548] Dohler, M., Ed., Watteyne, T., Ed., Winter, T., Ed., and D. Barthel, Ed., "Routing Requirements for Urban Low-Power and Lossy Networks", RFC 5548, May 2009.

[RFC5548]Dohler,M.,Ed.,Watteyne,T.,Ed.,Winter,T.,Ed.,和D.Barthel,Ed.,“城市低功率和有损网络的路由要求”,RFC 5548,2009年5月。

[RFC5673] Pister, K., Ed., Thubert, P., Ed., Dwars, S., and T. Phinney, "Industrial Routing Requirements in Low-Power and Lossy Networks", RFC 5673, October 2009.

[RFC5673]Pister,K.,Ed.,Thubert,P.,Ed.,Dwars,S.,和T.Phinney,“低功率和有损网络中的工业路由要求”,RFC 5673,2009年10月。

[ROLL-TERM] Vasseur, JP. "Terminology in Low power And Lossy Networks", Work in Progress, October 2009.

[滚动任期]瓦瑟,JP。“低功率和有损网络术语”,正在进行的工作,2009年10月。

Authors' Addresses

作者地址

Anders Brandt Sigma Designs, Inc. Emdrupvej 26 Copenhagen, DK-2100 Denmark

安德斯·勃兰特·西格玛设计有限公司Emdrupvej 26哥本哈根,丹麦DK-2100

   EMail: abr@sdesigns.dk
        
   EMail: abr@sdesigns.dk
        

Jakob Buron Sigma Designs, Inc. Emdrupvej 26 Copenhagen, DK-2100 Denmark

Jakob Buron Sigma设计有限公司Emdrupvej 26哥本哈根,丹麦DK-2100

   EMail: jbu@sdesigns.dk
        
   EMail: jbu@sdesigns.dk
        

Giorgio Porcu Telecom Italia Piazza degli Affari, 2 20123 Milan Italy

乔治·波尔库意大利电信意大利德格利广场,2 20123意大利米兰

   EMail: gporcu@gmail.com
        
   EMail: gporcu@gmail.com