Mathematical Mesh 3.0 Part IX: Considerations for Constrained Devices
phill@hallambaker.com
The Mathematical Mesh 'The Mesh' is an infrastructure that facilitates the exchange of configuration and credential data between multiple user devices and provides end-to-end security. This document describes the
[Note to Readers]
Discussion of this draft takes place on the MATHMESH mailing list (mathmesh@ietf.org), which is archived at https://mailarchive.ietf.org/arch/search/?email_list=mathmesh.
This document is also available online at
http://mathmesh.com/Documents/draft-hallambaker-mesh-constrained.html
.
This section presents the related specifications and standard, the terms that are used as terms of art within the documents and the terms used as requirements language.
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in
.
The terms of art used in this document are described in the Mesh Architecture Guide
.
The architecture of the Mathematical Mesh is described in the Mesh Architecture Guide
. The Mesh documentation set and related specifications are described in this document.
The implementation status of the reference code base is described in the companion document
.
The security considerations for use and implementation of Mesh services and applications are described in the Mesh Security Considerations guide
.
All the IANA considerations for the Mesh documents are specified in this document
A list of people who have contributed to the design of the Mesh is presented in
.
Key words for use in RFCs to Indicate Requirement Levels
Mathematical Mesh 3.0 Part I: Architecture Guide
Mathematical Mesh Part VII: Security Considerations
Mathematical Mesh: Reference Implementation