Download - 6TiSCH + RPL @ Telecom Bretagne 2014
![Page 1: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/1.jpg)
Cisco Confidential 1© 2013-2014 Cisco and/or its affiliates. All rights reserved.
RPL and 6TiSCH
Telecom Bretagne, February 2014 Pascal Thubert
![Page 2: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/2.jpg)
Cisco Confidential 2© 2013-2014 Cisco and/or its affiliates. All rights reserved.
The Internet of Everything
Challenge: harness innovation• More efficient operations • New and/or improved experience
Shaking up the competitive landscape• Between small and large entities• Leveraging IT, data and analytics
http://internetofeverything.cisco.com/explore
![Page 3: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/3.jpg)
Cisco Confidential 3© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Scaling to Pervasive IoE/T
1000*scale => No leak in the Internet
=> Opaque Fringe operations
Reachability => Radio
Addressing => IPv6
Density => spatial
reuse
=> Routing
![Page 4: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/4.jpg)
Cisco Confidential 4© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Agenda (part 1)
The Fringe of the Internet
LLNs
IEEE 802.15.4
IEEE 802.15.4e TSCH
6TiSCH
![Page 5: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/5.jpg)
Cisco Confidential 5© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Agenda (part 2)
Routing IP in LLNs
Routing over radios
RPL concepts
Applying RPL
![Page 6: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/6.jpg)
© 2010 Cisco and/or its affiliates. All rights reserved. 6UnclassifiedBRKEWN-3012
The Fringe of the Internet
![Page 7: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/7.jpg)
Cisco Confidential 7© 2013-2014 Cisco and/or its affiliates. All rights reserved.
The routing Infrastructure today
• The Internet
• Fully engineered• Hierarchical, Aggregations, ASs, Wire links
• Fully distributed States• Shows limits (BGP tables, addr. depletion)
Þ Reached adult size, mature to agingÞ Conceptually unchanged by IPv6
• IPv4 Intranets• Same structure as the Internet• Yet decoupled from the Internet
• NAT, Socks, Proxies
Þ First model for Internet extension
![Page 8: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/8.jpg)
Cisco Confidential 8© 2013-2014 Cisco and/or its affiliates. All rights reserved.
L2 mesh UnderMulti-hop Public Access Points, Proprietary mission specific productsAddress the scale issue at L2/ND
L3 Route OverMigration to IETF Protocols (RPL)Internet of Things (IOT, M2M)Different IPv6 (6LoWPAN, SDN)
Mobile OverlaysGlobal reachability Route ProjectionNetwork virtualization
Fixed wired Infrastructure
56
78
CB
1
32
A4
A’s Home
B’sHome
MANETMesh The Fringe DOES NOT LEAK
into the Routing Infrastructure
NEMO
The emerging Fringe of the Internet
Edge
![Page 9: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/9.jpg)
9
Low Power Lossy Networks
![Page 10: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/10.jpg)
Cisco Confidential 10© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Wireless: the evolution trait
Reaching farther outNew types of devices (Internet Of Things)
New usages (widespread monitoring, IoE)
Global Coverage from Near Field to Satellite via 3/4G
New level of cost effectiveness
Deploying wire is slow and costly
Low incremental cost per device
![Page 11: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/11.jpg)
Cisco Confidential 11© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Low Power Lossy Networks
• LLNs comprise a large number of highly constrained devices (smart objects) interconnected by predominantly wireless links of unpredictable quality
• LLNs cover a wide scope of applications• Industrial Monitoring, Building Automation,
Connected Home, Healthcare, Environmental Monitoring, Urban Sensor Networks, Energy Management, Asset Tracking, Refrigeration
• Several IETF working groups and Industry Alliance addressing LLNs• IETF - CoRE, 6Lowpan, ROLL• Alliances - IP for Smart Objects Alliance
(IPSO)World’s smallest web server
![Page 12: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/12.jpg)
Cisco Confidential 12© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Characteristics of LLNs
• LLNs operate with a hard, very small bound on state
• LLNs are optimised for saving energy in the majority of cases
• Traffic patterns can be MP2P, P2P and P2MP flows
• Typically LLNs deployed over link layers with restricted frame-sizes• Minimise the time a packet is enroute (in the air/on the
wire) hence the small frame size• The routing protocol for LLNs should be adapted for such
links
• LLN routing protocols must consider efficiency versus generality• LLN nodes are typically very conservative in resources
![Page 13: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/13.jpg)
13
IEEE 802.15.4
![Page 14: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/14.jpg)
Cisco Confidential 14© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Initial activities focused on wearable devices “Personal Area Networks”
Activities have proven to be much more diverse and varied
•Data rates from Kb/s to Gb/s•Ranges from tens of metres up to a Kilometre
•Frequencies from MHz to THz•Various applications not necessarily IP based
Focus is on “specialty”, typically short range, communications
•If it is wireless and not a LAN, MAN, RAN, or WAN, it is likely to be 802.15 (PAN)
The only IEEE 802 Working Group with multiple MACs
“The IEEE 802.15 TG4 was chartered to investigate a low data rate solution with multi-month to multi-year battery life and very low complexity. It is operating in an unlicensed, international frequency band. Potential applications are sensors, interactive toys, smart badges, remote controls, and home automation.”
802.15.4 Scope
http://www.ieee802.org/15/pub/TG4.htmlIEEE 802.15 WPAN™ Task Group 4 (TG4) Charter
![Page 15: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/15.jpg)
Cisco Confidential 15© 2013-2014 Cisco and/or its affiliates. All rights reserved.
IEEE Wireless Standards
802.11 Wireless LAN
802.15 Personal Area Network
802.16 Wireless Broadband
Access
802.22 Wireless Regional Area
Network
WiFi 802.11a/b/g/n/ah
IEEE 802 LAN/MA
N
802.15.1Bluetooth
802.15.2Co-existence
802.15.3 High Rate WPAN
802.15.4 Low Rate WPAN
802.15.5 Mesh
Networking
802.15.6 Body Area Networking
802.15.7 Visible Light
Communications
802.15.4eMAC
Enhancements
802.15.4fPHY for RFID
802.15.4gSmart Utility
Networks
TV White Space PHY 15.4 Study
Group
802.15.4dPHY for Japan
802.15.4cPHY for China
• Industrial strength
• Minimised listening costs
• Improved security• Improved link
reliability
802.15.4Amendments
• Support smart-grid networks
• Up to 1 Km transmission
• >100Kbps • Millions of fixed
endpoints• Outdoor use• Larger frame size• PHY Amendment• Neighborhood
Area Networks
TSCH
![Page 16: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/16.jpg)
Cisco Confidential 16© 2013-2014 Cisco and/or its affiliates. All rights reserved.
IEEE 802.15.4 Features
• Designed for low bandwidth, low transmit power, small frame size• More limited than other WPAN technologies such as Bluetooth
• Basic packet size is 127 bytes (802.15.4g is up to 2047 bytes) (Smaller packets, less errors)
• Transmission Range varies (802.15.4g is up to 1km)
• Fully acknowledged protocol for transfer reliability
• Data rates of 851, 250, 100, 40 and 20 kbps (IEEE 802.15.4-2011 05-Sep-2011)• Frequency and coding dependent
• Two addressing modes; 16-bit short (local allocation) and 64-bit IEEE (unique global)
• Several frequency bands (Different PHYs)• Europe 868-868.8 MHz – 3 chans , USA 902-928 MHz – 30 chans, World 2400-2483.5 MHz – 16
chans
• China - 314–316 MHz, 430–434 MHz, and 779–787 MHz Japan - 920 MHz
• Security Modes: None, ACL only, Secured Mode (using AES-CCM mode)
• 802.15.4e multiple modes including Time Synchronized Channel Hopping (TSCH)
![Page 17: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/17.jpg)
Cisco Confidential 17© 2013-2014 Cisco and/or its affiliates. All rights reserved.
802.15.4 Protocol Stack
• Specifies PHY and MAC only
• Medium Access Control Sub-Layer (MAC)• Responsible for reliable communication between two devices
• Data framing and validation of RX frames
• Device addressing
• Channel access management
• Device association/disassociation
• Sending ACK frames
• Physical Layer (PHY)• Provides bit stream air transmission
• Activation/Deactivation of radio transceiver
• Frequency channel tuning
• Carrier sensing
• Received signal strength indication (RSSI)
• Link Quality Indicator (LQI)
• Data coding and modulation, Error correction
Physical Layer(PHY)
MAC Layer(MAC)
Upper Layers
(Network & App)
![Page 18: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/18.jpg)
Cisco Confidential 18© 2013-2014 Cisco and/or its affiliates. All rights reserved.
IEEE 802.15.4 Node Types
• Full Function Device (FFD)• Can operate as a PAN co-ordinator (allocates
local addresses, gateway to other PANs)• Can communicate with any other device (FFD
or RFD)• Ability to relay messages (PAN co-ordinator)
• Reduced Function Device (RFD)• Very simple device, modest resource
requirements• Can only communicate with FFD• Intended for extremely simple applications
P
R F
F
R
R
![Page 19: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/19.jpg)
Cisco Confidential 19© 2013-2014 Cisco and/or its affiliates. All rights reserved.
• Star Topology • Cluster Tree• Mesh Topology
IEEE 802.15.4 Topologies
P
R F
F
R
R
P
F F
F
R
F
R
• All devices communicate to PAN co-ordinator which uses mains power
• Other devices can be battery/scavenger
Single PAN co-ordinator exists for all topologies
• Devices can communicate directly if within range
F F
F
F
P
R
R
F
R
Operates at Layer 2
R
R
RR
• Higher layer protocols like RPL may create their own topology that do not follow 802.15.4 topologies
![Page 20: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/20.jpg)
20
IEEE 802.15.4e
TimeSlotted Channel Hopping
![Page 21: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/21.jpg)
Cisco Confidential 21© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Wireless Industrial
• Better process optimization and more accurate predictive maintenance increase profit; 1% improvement in a refinery with a $1.5B annual profit leads to $40k/day ($15M/yr) more profit
• Thus more and different sensors can be justified economically, if they can be connected
• But wire buried in conduit has a high installation and maintenance cost, with long lead times to change, and is difficult to repair
• The solution: wireless sensors in non-critical applications, designed for the industrial environment: temperature, corrosion, intrinsic safety, lack of power sources (particularly when there is no wire)
• For critical control loops, use wireless control room links with controllers located in the field, possibly connected over local wiring
![Page 22: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/22.jpg)
Cisco Confidential 22© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Converging ICT and OT
Convergence of IT and OT technologies, aka the Industrial Internet, represents a multibillion opportunity for IT vendors and long term job creation.
Deterministic Wireless Networking is one of the key elements.
For each ‘critical’ wired measurement there are hundreds missing ones that could be addressed through wireless (Industrial Internet)
Architecture and Standards are necessary for Industry adoption
Operational technology (OT) is hardware and software that detects or causes a change through the direct monitoring and/or control of physical devices, processes and events in the enterprise.
![Page 23: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/23.jpg)
Cisco Confidential 23© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Industrial connected device growth
WWAN: GSM – LTE WLAN: 802.11 WPAN: 802.15.4, ISA100.11a, WirelessHART
![Page 24: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/24.jpg)
Cisco Confidential 24© 2013-2014 Cisco and/or its affiliates. All rights reserved.
ISA100: Wireless Systems for Industrial Automation
ISA100.11a industrial WSN• Wireless systems for industrial
automation• Process control and related applications
Leverages 802.15.4(e) + IPv6• Link Local Join process• Global Address runtime• 6LoWPAN Header Compression• Yet specific routing and ND• Next: Backbone Router
ISA100.15 backhaul
![Page 25: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/25.jpg)
Cisco Confidential 25© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Amendment to the 802.15.4-2006 MAC needed for the applications served by 802.15.4f PHY Amendment for Active RFID 802.15.4g PHY Amendment for Smart Utility Networks initially for Industrial applications (such as those addressed by wiHART and the ISA100.11a
standards)
Security: support for secured ack
Low Energy MAC extension Coordinated Sampled Listening (CSL)
Channel Hopping Not built-in, subject to vendor design. Open std work started with
6TSCH
New Frame Types Enhanced (secure) Acknowledgement (EACK) Enhanced Beacon and Beacon Request (EB and EBR) Optional Information Elements (IE)
IEEE 802.15.4e
![Page 26: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/26.jpg)
Cisco Confidential 26© 2013-2014 Cisco and/or its affiliates. All rights reserved.
TSCH Properties
Channel Hopping : • retry around interference, • round robin strategy
Time Slotted (or Synchronized) : • Deterministic: Synchronized + Time formatted in SlotFrame(s)• Tracks: below IP, can be orchestrated by a third party like virtual
circuits• Slotted: benefits of slotted aloha vs. aloha => reduce collisions• Battery operation: if traffic profile is known, devices wake upon
need
![Page 27: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/27.jpg)
Cisco Confidential 27© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Reliability through (all possible!)
Code diversityCode Division Multiplex Access
Network Coding (WIP)
Frequency diversityChannel hopping
B/W listing
Time DiversityARQ + FEC (HARQ)
Spatial diversityDynamic Power Control
DAG routing topology + ARCs
Duo/Bi-casting (live-live)
![Page 28: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/28.jpg)
Cisco Confidential 28© 2013-2014 Cisco and/or its affiliates. All rights reserved.
IEEE802.15.4e TimeSlotted Channel Hopping
16 c
hann
el o
ffset
s
e.g. 31 time slots (310ms)
A
BC
DE
FG
H
I
J
• Schedule => direct trade-off between throughput, latency and power consumption.• A collision-free communication schedule is typical in industrial applications.• IEEE802.15.4e published April 2012.
defines how to execute a schedule, but not how to build/maintain it.
![Page 29: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/29.jpg)
29
![Page 30: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/30.jpg)
© 2010 Cisco and/or its affiliates. All rights reserved.BRKEWN-3012 30Unclassified
Why IPv6 ?
Going IP
![Page 31: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/31.jpg)
Cisco Confidential 31© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Why IP ?
Open Standards vs. proprietary• COTS* suppliers drive costs down but• Reliability, Availability and Security up
IP abstraction vs. per MAC/App
• 802.11, 802.15.4 (e), Sat, 3G, UWB
• Keep L2 topology simple
To Infinity and Beyond… But End-to-End.• No intermediate gateway, tunnel, middle boxes
& other trick
* Commercial, off-the-shelf
![Page 32: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/32.jpg)
Cisco Confidential 32© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Tens of Billions Smart ObjectsThings
Which IP version ?
The current Internet comprises several billion devices
Smart Objects will add tens of billions of additional devices
IPv6 is the only viable way forward
1~2 Billions PCs & servers
Mobile
Fixed
2~4 Billions Phones & cars
IPv4 Unallocated pool exhausted March 2011 !RIPE NCC: Sept 2012; ARIN March 2015 (last /8)
![Page 33: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/33.jpg)
Cisco Confidential 33© 2013-2014 Cisco and/or its affiliates. All rights reserved.
IETF LLN Related Workgroups
Reuse work done here where possible
Application
General
Internet
Ops and Mgmt
Routing
Security
Transport
Core
6TiSCH
ROLL
IETF LWIG
Constrained Restful Environments
Charter to provide a framework for resource-oriented applications intended to run on constrained IP networks.
IPv6 over the TSCH mode of 802.15.4eInitial charter to produce an architecture, a
minimal RPL operation over a static schedule and a data model to control the
LLC (6top)Lightweight Implementation Guidance
Charter is to provide guidance in building minimal yet interoperable IP-capable
devices for the most constrained environments. .
6lo
Routing over Low Power Lossy Networks
Charter focusses on routing issues for low power lossy networks.
![Page 34: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/34.jpg)
Cisco Confidential 34© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Requirement for a new standard
• Industrial requires standard-based products• Must support equivalent features as incumbent protocols
• Must provide added value to justify migration• 6TiSCH value proposition
• Design for same time-sensitive MAC (802.15.4e TSCH)• Direct IPv6 access to device (common network mgt)• RPL Distributed routing for scalability (for monitoring)• Large scale IPv6 subnet for mobility (50K +)
![Page 35: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/35.jpg)
Cisco Confidential 35© 2013-2014 Cisco and/or its affiliates. All rights reserved.
6TiSCH: IPv6 over TSCH MAC
Active IETF WG, 4 WG docs being adopted
Define an Architecture that links it all together
Align existing standards • (RPL, 6LoWPAN, PANA?, RSVP, PCEP, MPLS) over 802.15.4e TSCH
Support Mix of centralized and distributed deterministic routing
Design 6top sublayer for L3 interactions
Open source implementations (openWSN…)
Multiple companies and universities participating
![Page 36: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/36.jpg)
Cisco Confidential 36© 2013-2014 Cisco and/or its affiliates. All rights reserved.
6TiSCH Client stack
Centralized route and
track computation
and installation
Management and SetupDiscoveryPub/Sub
Authentication for Network
Access
Wireless ND(NPD proxy)
Time Slot scheduling and track G-MPLS forwarding
Distributed route and track
computation and installation
Distributed route and track
computation and installation
IEEE 802.15.4e TSCH
6LoWPAN HC
IPv6
RPL
6top
TCP UDP ICMP RSVP
PCEP/PCC CoAP/DTLS AAA 6LoWPAN ND
}
![Page 37: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/37.jpg)
Cisco Confidential 37© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Best effort routing
UYA X
15.4 PHY
15.4e TSCH
CoAP
UDP
IPv6
6LoWPAN-HC
6top
15.4 PHY
15.4e TSCH
CoAP
UDP
IPv6
6LoWPAN-HC
6top
15.4 PHY
15.4e TSCH
CoAP
UDP
IPv6
6LoWPAN-HC
6top
15.4 PHY
15.4e TSCH
CoAP
UDP
IPv6
6LoWPAN-HC
6top
![Page 38: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/38.jpg)
Cisco Confidential 38© 2013-2014 Cisco and/or its affiliates. All rights reserved.
15.4 PHY
15.4e TSCH
CoAP
UDP
IPv6
6LoWPAN-HC
6top
15.4 PHY
15.4e TSCH
CoAP
UDP
IPv6
6LoWPAN-HC
6top
15.4 PHY
15.4e TSCH
CoAP
UDP
IPv6
6LoWPAN-HC
6top
15.4 PHY
15.4e TSCH
CoAP
UDP
IPv6
6LoWPAN-HC
6top
UYA X
Track Switching in Transport Mode
![Page 39: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/39.jpg)
Cisco Confidential 39© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Multi-protocol
15.4e TSCH 15.4e TSCH 15.4e TSCH 15.4e TSCH
15.4 PHY 15.4 PHY 15.4 PHY15.4 PHY
CoAP
UDP
IPv6
6LoWPAN-HC
6top
CoAP
UDP
IPv6
6LoWPAN-HC
6top
15.4 PHY
TSCH
CoAP
UDP
IPv6
6LoWPAN-HC
6top
15.4 PHY
TSCH
Multi-protocol
UDP
IPv6
6LoWPAN-HC
6top
Track Switching in Tunnel Mode
CoAP
![Page 40: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/40.jpg)
Cisco Confidential 40© 2013-2014 Cisco and/or its affiliates. All rights reserved.
6LoWPAN Fragment forwarding
15.4 PHY
15.4e TSCH
CoAP
UDP
IPv6
6LoWPAN-HC
6top
15.4 PHY
15.4e TSCH
CoAP
UDP
IPv6
6LoWPAN-HC
6top
15.4 PHY
15.4e TSCH
CoAP
UDP
IPv6
6LoWPAN-HC
6top
15.4 PHY
15.4e TSCH
CoAP
UDP
IPv6
6LoWPAN-HC
6top
UYA X
1st
Next
1st
Next
![Page 41: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/41.jpg)
Cisco Confidential 41© 2013-2014 Cisco and/or its affiliates. All rights reserved.
6TiSCH-based Multilink Subnet
6TiSCH LLN
6TiSCH LLN
intra/Internet
intra/Internet
6TiSCHLLN
6TiSCHLLN
Backbone Router
PCE NMS
Virtual devices
Backbone
Attached LLN*
* LLN == Low Power Lossy Network
![Page 42: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/42.jpg)
Cisco Confidential 42© 2013-2014 Cisco and/or its affiliates. All rights reserved.
What’s a Backbone Router?
Common ND based abstraction over a backbone
Scales DAD operations (distributes 6LoWPAN ND LBR)
Scales the subnetwork (high speed backbone)
Allows interaction with nodes on the backbone or in other subnets running different operations
http://tools.ietf.org/html/draft-thubert-6lowpan-backbone-router
![Page 43: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/43.jpg)
Cisco Confidential 43© 2013-2014 Cisco and/or its affiliates. All rights reserved.
6TSCH reference model
![Page 44: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/44.jpg)
Cisco Confidential 44© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Initial time
ConnectedRoute to subnet
![Page 45: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/45.jpg)
Cisco Confidential 45© 2013-2014 Cisco and/or its affiliates. All rights reserved.
First advertisements from GW (RA, IGP, RPL)
DefaultRouteIn RIB
Gateway to the outside participates to some IGP with external network and attracts all extra-subnet traffic via protocols over the backbone
![Page 46: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/46.jpg)
Cisco Confidential 46© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Registration (1st step)
NS (ARO)
DAD
NS(ARO)
NS DAD(ARO)
Directly upon NS(ARO) or indirectly upon DAR message, the backbone router performs DAD on behalf of the wireless device.
![Page 47: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/47.jpg)
Cisco Confidential 47© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Registration (2nd step one second later)
DAC
NA(ARO)
Optional NA(O)
The BR maintains a route to the WSN node for the DAO Lifetime over instance VRF. VFR may be mapped onto a VLAN on the backbone.
![Page 48: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/48.jpg)
Cisco Confidential 48© 2013-2014 Cisco and/or its affiliates. All rights reserved.
IPv6 ND Proxy for RPL
RPLDAO
HostRoute
Optional NA(O)
The BR maintains a route to the WSN node for the DAO Lifetime over instance VRF. VFR may be mapped onto a VLAN on the backbone.
![Page 49: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/49.jpg)
Cisco Confidential 49© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Duplication
NS DAD(ARO)
NA (ARO)NS
(ARO)
DAD option has:Unique ID
TID (SeqNum)
Defend with NA if:Different OUID
Newer TID
![Page 50: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/50.jpg)
Cisco Confidential 50© 2013-2014 Cisco and/or its affiliates. All rights reserved.
DAD option has:Unique ID
TID (SeqNum)
Defend with NA if:Different OUID
Newer TID
Mobility
RPLDAO
Optional NA(ARO)
HostRoute
NA (ARO) with older TID (loses)
![Page 51: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/51.jpg)
Cisco Confidential 51© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Resolution
Packet
NSlookup
NA ARO option has:
Unique IDTID (SeqNum)
NA (ARO)
![Page 52: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/52.jpg)
Cisco Confidential 52© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Resolution (2)
NSlookup
Mixed mode NDBBR proxying over
the backbone
NA (ARO)
Packet
![Page 53: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/53.jpg)
Cisco Confidential 53© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Enhanced Address Registration Option
• Used to resolve conflicts
• Need In ND: TID to detect movement ->eARO
• Need In RPL: Object Unique ID if we use RPL for DAD 0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type | Length = 2 | Status | Reserved | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Reserved |T| TID | Registration Lifetime | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | + OUID ( EUI-64 or equivalent ) + | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 2: EARO
![Page 54: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/54.jpg)
Cisco Confidential 54© 2013-2014 Cisco and/or its affiliates. All rights reserved.
6TiSCH at a glanceDeterministic IPv6 over IEEE802.15.4e TimeSlotted Channel Hopping (6TiSCH)The Working Group will focus on enabling IPv6 over the TSCH mode of the IEEE802.15.4e standard. The scope of the WG includes one or more LLNs, each one connected to a backbone through one or more LLN Border Routers (LBRs).
Active drafts http://tools.ietf.org/html/draft-ietf-6tisch-terminology http://tools.ietf.org/html/draft-ietf-6tisch-tsch http://tools.ietf.org/html/draft-ietf-6tisch-architecturehttp://tools.ietf.org/html/draft-ietf-6tisch-minimal http://tools.ietf.org/html/draft-wang-6tisch-6top http://tools.ietf.org/html/draft-ohba-6tisch-security http://tools.ietf.org/html/draft-sudhaakar-6tisch-coap
![Page 55: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/55.jpg)
© 2010 Cisco and/or its affiliates. All rights reserved. 55UnclassifiedBRKEWN-3012
Routing IPinLLNs
![Page 56: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/56.jpg)
Cisco Confidential 56© 2013-2014 Cisco and/or its affiliates. All rights reserved.
• Hidden terminal
• Interference domains grows faster that range
• Density => low power => multihop => routing
Routing for Spatial Reuse
![Page 57: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/57.jpg)
Cisco Confidential 57© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Proactive vs. Reactive
Aka
stateful
vs.
On-demand routing
Note: on-demand breaks control vs. Data plane separation
![Page 58: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/58.jpg)
Cisco Confidential 58© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Link State vs. Distance Vector
• Aka SPF vs. Bellman-Ford
• LS requires full state and convergence
• LS can be very quiet on stable topologies
• DV hides topolical complexities and changes
![Page 59: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/59.jpg)
Cisco Confidential 59© 2013-2014 Cisco and/or its affiliates. All rights reserved.
0
Route stretch and fisheye
Optimized Routing Approach (ORA) spans advertisements for any change
Routing overhead can be reduced if stretch is allowed: Least Overhead Routing Approach (LORA)
For instance Fisheye and zone routing provide a precise routing when closeby and sense of direction when afar
![Page 60: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/60.jpg)
Cisco Confidential 60© 2013-2014 Cisco and/or its affiliates. All rights reserved.
DAG, DODAG
A Directed Acyclic Graph (DAG) is formed by a collection of vertices (nodes) and edges (links).
Each edge connecting one node to another (directed) in such a way that it is not possible to start at Node X and follow a directed path that cycles back to Node X (acyclic).
A Destination Oriented DAG (DODAG) is a DAG that comprises a single root node.
Here a DAG that is partitioned in 2 DODAG
Clusterhead
5
4
4
01
3
1 1
2
2
2
22
3
3
3
3
3
3
2
4
4
5
0
65
4
![Page 61: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/61.jpg)
Cisco Confidential 61© 2013-2014 Cisco and/or its affiliates. All rights reserved.
SubDAG, and Fanout DAG
• In Green: A’s subDAG. • Impacted if A’s
connectivity is broken• Domain for routing
recovery
• In Red: B’s fanout DAG • (or reverse subDAG)• Potential SPAN on B’s DAO• Thus potential return paths• Fanout must be controlled
to limit intermediate states
Clusterhead
5
4
4
01
3
1 1
2
2
2
22
3
3
3
3
3
3
2
4
4
5
0
65
4
A
B
![Page 62: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/62.jpg)
63
Routing over radios
![Page 63: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/63.jpg)
Cisco Confidential 64© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Dynamic topologies
No preexisting physical topology
Can be computed by a mesh under protocol, but…
Else Routing must infer its topology
Movement
natural and unescapable
Yet difficult to predict or detect
Topology Update
Routing Update
Fast => expensive
![Page 64: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/64.jpg)
Cisco Confidential 65© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Peer selection
Potentially Large Peer Set
Highly Variable Capabilities
Selection Per Objective {Metrics (e.g. RSSI, ETX…)
L3 Reachability (::/0, …)
Constraints (Power …)
![Page 65: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/65.jpg)
Cisco Confidential 66© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Constrained Objects
• Smart object are usually • Small & Numerous• « sensor Dust »
• Battery is critical• Deep Sleep• Limited memory• Small CPU
• Savings are REQUIREDÞ Control plane Þ Data plane (Compression)
![Page 66: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/66.jpg)
Cisco Confidential 67© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Fuzzy links
Neither transit nor P2P
More like a changing NBMA• a new paradigm for
routing
Changing metrics• (tons of them!)• (but no classical cost!)
Inefficient flooding• Self interfering
QoS and CAC
![Page 67: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/67.jpg)
Cisco Confidential 68© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Local Routing & Mobility
Stretch vs. ControlOptimize table sizes and updates
Optimized Routing Approach (ORA) vs
Least Overhead Routing Approach (LORA)
on-demand routes (reactive)
Forwarding and retriesSame vs. Different next hop
Validation of the Routing plane
Non Equal Cost multipath Directed Acyclic Graphs (DAG) a MUST
Maybe also, Sibling routing
Objective Routing Weighted Hop Count the wrong metric
Instances per constraints and metrics
![Page 68: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/68.jpg)
Cisco Confidential 69© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Global Mobility
Pervasive Access• Satellite • 3/4G coverage• 802.11, 802.15.4
Always Reachable• at a same identifier• Preserving connections• Or not ? (CORE*, DTN**)
Fast roaming• Within technology (L2) • Between Technologies (L3)
* Constrained RESTful Environments
** Delay-Tolerant Networking
![Page 69: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/69.jpg)
70
RPL Concepts
![Page 70: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/70.jpg)
Cisco Confidential 71© 2013-2014 Cisco and/or its affiliates. All rights reserved.
RPL key concepts
Minimum topological awareness
Data Path validation
Non-Equal Cost Multipath Fwd
Instantiation per constraints/metrics
Autonomic Subnet G/W Protocol
Optimized Diffusion over NBMA
RPL is an extensible proactive IPv6 DV protocol
Supports MP2P, P2MP and P2P P2P reactive extension
RPL specifically designed for LLNsAgnostic to underlying link layer technologies (802.15.4, PLC, Low Power WiFi)
![Page 71: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/71.jpg)
Cisco Confidential 72© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Controlling the control … by design
Distance Vector as opposed to Link State• Knowledge of SubDAG addresses and children links• Lesser topology awareness => lesser sensitivity to
change• No database Synchronization => Adapted to movement
Optimized for Edge operation
• Optimized for P2MP / MP2P, stretch for arbitrary P2P
• Least Overhead Routing Approach via common ancestor
Proactive as opposed to Reactive
• Actually both with so-called P2P experimental specification
Datapath validation
![Page 72: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/72.jpg)
Cisco Confidential 73© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Datapath Validation
Control Information in Data Packets:
•Instance ID
• Hop-By-Hop Header Sender Rank•
Direction (UP/Down)
Errors detected if:
No route further down for packet going downNo route for packet going downRank and direction do not match
{
![Page 73: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/73.jpg)
Cisco Confidential 74© 2013-2014 Cisco and/or its affiliates. All rights reserved.
In the context of routing, a DAG is formed by a collection of vertices (nodes) and edges (links), each edge connecting one node to another (directed) in such a way that it is not possible to start at Node X and follow a directed path that cycles back to Node X (acyclic).
Directed Acyclic Graph for NECM
![Page 74: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/74.jpg)
Cisco Confidential 76© 2013-2014 Cisco and/or its affiliates. All rights reserved.
DIO Base Object: forming the DODAG
0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | RPLInstanceID |Version Number | Rank | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |G|0| MOP | Prf | DTSN | Flags | Reserved | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | + + | | + DODAGID + | | + + | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Option(s)... +-+-+-+-+-+-+-+-+
![Page 75: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/75.jpg)
Cisco Confidential 77© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Global versus Local Repair
• Global repair: : A new DODAG iteration• Rebuild the DAG … Then repaint the prefixes upon changes• A new Sequence number generated by the root• A router forwards to a parent or as a host over
next iteration
• Local Repair: find a “quick” local repair path • Only requiring local changes !• May not be optimal according to the OF • Moving UP and Jumping are cool. • Moving Down is risky: Count to Infinity Control
![Page 76: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/76.jpg)
Cisco Confidential 78© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Objective Function
Extend the generic behavior• For a specific need / use case
Used in parent selection• Contraints• Policies Position in the DAG• Metrics
Computes the Rank increment• Based on hop metrics• Do NOT use OF0 for adhoc radios!• (OF 0 uses traditional weighted hop count)
{
![Page 77: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/77.jpg)
Cisco Confidential 79© 2013-2014 Cisco and/or its affiliates. All rights reserved.
DIO Base Object: route construction rules
0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | RPLInstanceID |Version Number | Rank | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |G|0| MOP | Prf | DTSN | Flags | Reserved | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | + + | | + DODAGID + | | + + | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Option(s)... +-+-+-+-+-+-+-+-+
![Page 78: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/78.jpg)
Cisco Confidential 80© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Mode of Operation
+-----+-----------------------------------------------------+
| MOP | Description |
+-----+-----------------------------------------------------+
| 0 | No Downward routes maintained by RPL |
| 1 | Non-Storing Mode of Operation |
| 2 | Storing Mode of Operation with no multicast support |
| 3 | Storing Mode of Operation with multicast support |
| | |
| | All other values are unassigned |
+-----+-----------------------------------------------------+
![Page 79: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/79.jpg)
Cisco Confidential 81© 2013-2014 Cisco and/or its affiliates. All rights reserved.
DAO Base Object : route construction
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| RPLInstanceID |K|D| Flags | Reserved | DAOSequence |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
+ +
| |
+ DODAGID* +
| |
+ +
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Option(s)...
+-+-+-+-+-+-+-+-+
![Page 80: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/80.jpg)
Cisco Confidential 82© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Owned prefix routing (storing mode)
A
B
C D
Parent is default GW, advertizes owned PIO (L bit on)
RPL Router autoconfigures Addr from parent PIO
RPL Router advertises Prefix via self to parent
RPL Router also advertises children Prefix
B:
::/0 via A::A
A:: connected
B:: connected
C:: via B::C
D:: via B::D
C:
::/0 via B::B
B:: connected
C:: connected
A:
A:: connected
B:: via A::B
C:: via A::B
D:: via A::BD:
::/0 via B::B
B:: connected
D:: connected
A::B
B::C B::D
B::B
A::A
![Page 81: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/81.jpg)
Cisco Confidential 83© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Subnet Routing (storing mode)
A
B
C D
Parent is default GW, propagates root PIO (L-bit off)
Parent Address in the PIO (with R bit)
RPL Router autoconfigures Address from parent PIO
RPL Router advertises Address via self to parent
RPL Router also advertises children Addresses
B:
::/0 via A::A
A::A connected
A::B self
A::C connected
A::D connected
A:: ~onlink
C:
::/0 via A::B
A::B connected
A::C self
A:: ~onlink
A:
A::A self
A::B connected
A::C via A::B
A::D via A::B
A:: ~onlink
D:
::/0 via A::B
A::B connected
A::D self
A:: ~onlink
A::B
A::C A::D
A::A
For YourReference
![Page 82: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/82.jpg)
Cisco Confidential 84© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Subnet Routing (non-storing mode)
A
B
C D
Parent is default GW, propagates root PIO (L-bit off)
Parent Address in the PIO (with R bit)
RPL Router autoconfigures Address from parent PIO
RPL Router advertises Address via Parent to Root
Root recursively builds a Routing Header back
B:
::/0 via A::A
A::A connected
A::B self
A:: ~onlink
C:
::/0 via A::B
A::B connected
A::C self
A:: ~onlink
D:
::/0 via A::B
A::B connected
A::D self
A:: ~onlink
Target A::C viaTransit A::BA::B
A::C A::D
A::A
A: (root)
A::A self
A::B connected
A::C via A::B
A::D via A::B
A:: ~onlink
A::D via A::B connectedRH4:
![Page 83: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/83.jpg)
Cisco Confidential 85© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Owned prefix routing (non-storing mode)
A
B
C D
Parent is default GW, advertizes owned PIO (L bit on)
RPL Router autoconfigures Address from parent PIO
RPL Router advertises Prefix via Address to Root
Root recursively builds a Routing Header back
B:
::/0 via A::A
A:: connected
B:: connected
C:
::/0 via B::B
B:: connected
C:: connected A: (root)
A:: connected
B:: via A::B
C:: via B::C
D:: via B::DD:
::/0 via B::B
B:: connected
D:: connected
Target C::/ viaTransit B::C
D::3 via B::D via A::B connected
A::B
B::C B::D
B::B
A::A
RH4:
For YourReference
![Page 84: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/84.jpg)
Cisco Confidential 86© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Multicast over radio NBMA
Flooding interferes with itself
B
C
D
A
Hidden node/terminal/station
1
2 ’’2’
![Page 85: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/85.jpg)
Cisco Confidential 87© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Trickle: An Optimized Diffusion
Suppression of redundant copies Do not send copy if K copies received
Jitter for Collision AvoidanceFirst half is mute, second half is jittered
Exponential backoffDouble I after period I, Reset I on inconsistency
I
2*I
K = 4
![Page 86: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/86.jpg)
Cisco Confidential 88© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Routing Metrics in LLNs
Node Metrics Link Metrics
Node State and Attributes ObjectPurpose is to reflects node workload (CPU,
Memory…)“O” flag signals overload of resource“A” flag signal node can act as traffic
aggregator
Throughput ObjectCurrently available throughput (Bytes per
second)Throughput range supported
Node Energy Object“T” flag: Node type: 0 = Mains, 1 = Battery, 2 =
Scavenger“I” bit: Use node type as a constraint
(include/exclude)“E” flag: Estimated energy remaining
LatencyCan be used as a metric or constraintConstraint - max latency allowable on pathMetric - additive metric updated along path
Hop Count ObjectCan be used as a metric or constraintConstraint - max number of hops that can be
traversedMetric - total number of hops traversed
Link ReliabilityLink Quality Level Reliability (LQL)
0=Unknown, 1=High, 2=Medium, 3=LowExpected Transmission Count (ETX)
(Average number of TX to deliver a packet)
Link ColourMetric or constraint, arbitrary admin value
For YourReference
![Page 87: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/87.jpg)
89
Applying RPL
![Page 88: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/88.jpg)
Cisco Confidential 91© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Example radio connecticity
At a given point of time connectivity is
(fuzzy)
Radio link
![Page 89: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/89.jpg)
Cisco Confidential 92© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Clusterhead
Applying RPL
1st pass (DIO)• Establishes a logical DAG
topology• Trickle Subnet/config Info• Sets default route• Self forming / self healing
2nd pass (DAO) • paints with addresses and
prefixes• Any to any reachability• But forwarding over DAG only• saturates upper links of the DAG• And does not use the full mesh
properly
Link selected as parent link
Potential link
Clusterhead0
1
11
4
44
46
3
3
3
3
3
2
2
2
22
2
5
55
![Page 90: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/90.jpg)
Cisco Confidential 93© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Clusterhead
Local recovery (step 1)
A’s link to root failsA loses connectivityEither poisons or detaches a subdag
In black: the potentially impacted zoneThat is A’s subDAG
Link selected as parent link
Potential link
Clusterhead0
1
11
4
44
46
3
3
3
3
3
2
2
2
22
2
5
55
A
1
11
3
3
3
3
3
2
2
2
22
2
5
55
4
44
4
![Page 91: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/91.jpg)
Cisco Confidential 94© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Clusterhead
Local recovery (step 2)
B can reparent a same Rank so B’s subDAG is safe
The rest of A’s subDAG is isolated
Either poison ar build a floating DAG as illustrated
In the floating DAG A is root
The structure is preserved
Link selected as parent link
Potential link
Clusterhead0
1
1
4
44
46
3
3
3
2
2
2
2
2
21
5
55
AB
0
1
![Page 92: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/92.jpg)
Cisco Confidential 95© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Clusterhead
Local recovery (step 3)
Once poisined nodes are identifiedIt is possible for A to reparent safely
A’s descendants inherit from Rank shift
Note: a depth dependent timer can help order things
Link selected as parent link
Potential link
Clusterhead0
1
12
4
44
46
3
3
3
4
4
2
2
2
23
3
5
55
A
![Page 93: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/93.jpg)
Cisco Confidential 96© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Clusterhead
Global recovery
A new DAG iteration• In Grey, the new DAG
progressing
Metrics have changed, the DAG may be different
Forwarding upwards traffic from old to new iteration is allowed but not the other way around
Link selected as parent link
Potential link
Clusterhead0
1
11
4
44
46
3
3
3
3
3
3
2
2
22
2
5
55
![Page 94: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/94.jpg)
Cisco Confidential 97© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Clusterhead
5
4
4
Multiple DODAGs within Instance
A second root is available• (within the same instance)
The DAG is partitioned
1 root = 1 DODAG
1 Node belongs to 1 DODAG• (at most, per instance)
Nodes may JUMP • from one DODAG to the next
Nodes may MOVE • up the DODAG
Going Down MAY cause loops
• May be done under CTI control
Link selected and oriented by DIO
Potential link
01
3
1 1
2
2
2
22
3
3
3
3
3
3
2
4
4
5
0
65
4
![Page 95: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/95.jpg)
Cisco Confidential 98© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Multiple Instances
Running as Ships-in-the-night
1 instance = 1 DAG
A DAG implements constraints
Serving different Objective Functions
For different optimizations
Forwarding along a DODAG (like a vlan)
Clusterhead0
1
11
2
2
2
22
3
3
3
3
3
3
23
5
4
4
4
4
Clusterhead
Constrained instance
Default instance
Potential link
A
![Page 96: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/96.jpg)
Cisco Confidential 99© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Summary
New Radios issues: Addressed in RPL by:
Dynamic Topologies
Peer selection
Constrained Objects
Fuzzy Links
Routing, local Mobility
Global Mobility
DV, ORA P2MP/MP2P, LORA P2P
Objective Functions, Metrics
Controlling the control
NECM Directed Acyclic Graphs Trickle and Datapath validation
Local and Global Recovery
N/A
![Page 97: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/97.jpg)
Cisco Confidential 100© 2013-2014 Cisco and/or its affiliates. All rights reserved.
RPL – IETF suite
RFC 6206: The Trickle Algorithm
RFC 6550: RPL: IPv6 Routing Protocol for LLNs
RFC 6551: Routing Metrics Used for Path Calculation in LLNs
RFC 6552: Objective Function Zero for the Routing Protocol for LLNs
RFC 6553: RPL Option for Carrying RPL Information in Data-Plane Datagrams
RFC 6554: An IPv6 Routing Header for Source Routes with RPL
RFC 6719: MRHOF Objective Function with hysteresis
draft-ietf-roll-trickle-mcast: Multicast Protocol for LLNs
draft-vilajosana-6tisch-minimal: Minimal 6TiSCH Configuration
![Page 98: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/98.jpg)
Cisco Confidential 101© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Conclusion
The Internet is going through its most considerable change since the first days, adding a nervous system to the bug brain. Potential is immense and unpredictable.
Made possible by IPv6 But not at the core and unbeknownst to the core
Stimulated by radio access Enabling new devices and usages
The change happens in the Fringe, which is in fact a collection of virtualized fringes. The polymorphic Internet is already there.
![Page 99: 6TiSCH + RPL @ Telecom Bretagne 2014](https://reader035.vdocuments.mx/reader035/viewer/2022081422/554f8228b4c9052a518b4d56/html5/thumbnails/99.jpg)
Cisco Confidential 102© 2013-2014 Cisco and/or its affiliates. All rights reserved.
“We might be at the eve of pervasive networking, a vision for the Internet where every person and every device is connected to the network in the ultimate realization of Metcalf's Law.”