Networking Working Group K. Pister Internet-DraftR. EnnsDust Networks Intended status: InformationalDust Networks Expires: September 29, 2008P. Thubert Expires: October 24, 2008 Cisco Systems, IncMarch 28,April 22, 2008 Industrial Routing Requirements in Low Power and Lossy Networksdraft-pister-roll-indus-routing-reqs-00draft-pister-roll-indus-routing-reqs-01 Status of this Memo By submitting this Internet-Draft, each author represents that any applicable patent or other IPR claims of which he or she is aware have been or will be disclosed, and any of which he or she becomes aware will be disclosed, in accordance with Section 6 of BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet- Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt. The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html. This Internet-Draft will expire onSeptember 29,October 24, 2008. Abstract Wireless, low power field devices enable industrial users to significantly increase the amount of information collected and the number of control points that can be remotely managed. The deployment of these wireless devices will significantly improve the productivity and safety of the plants while increasing the efficiency of the plant workers. For wireless devices to have a significant advantage over wired devices in an industrial environment the wireless network needs to have three qualities: low power, high reliability, and easy installation and maintenance. The aim of this document is to analyze the requirements for the routing protocol used for low power and lossy networks (L2N) in industrial environments. Requirements Language The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119 [RFC2119]. Table of Contents 1. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3 2. Introduction . . . . . . . . . . . . . . . . . . . . . . . . .43 2.1. Applications and Traffic Patterns . . . . . . . . . . . . 53. Quality2.2. Network Topology ofService (QoS) Routing requirementsIndustrial Applications . . . . . . . 6 2.2.1. The Physical Topology . . . . . . . . . . . . . . . . 7 3. Service Requirements . . . . . . . . . . . . . . . . . . . . . 9 3.1. Configurable Application Requirement . . . . . . . . . . .9 4. Network Topology10 3.2. Different Routes for Different Flows . . . . . . . . . . . 11 4. Reliability Requirements . . . . . . . . . . . .9. . . . . . . 11 5. Device-Aware Routing Requirements . . . . . . . . . . . . . .1012 6. Broadcast/Multicast . . . . . . . . . . . . . . . . . . . . .1113 7. Route Establishment Time . . . . . . . . . . . . . . . . . . .1113 8. Mobility . . . . . . . . . . . . . . . . . . . . . . . . . . .1113 9. Manageabilityand Ease Of Use. . . . . . . . . . . . . . . .12 10. Security. . . . . . . . 14 10. Security . . . . . . . . . . . . . . . . . . . .12 11. Informative Reference. . . . . . . 15 11. IANA Considerations . . . . . . . . . . . . .13 12. IANA Considerations. . . . . . . . 15 12. Acknowledgements . . . . . . . . . . . . .13 13. Acknowledgements. . . . . . . . . . 15 13. References . . . . . . . . . . . . .13 14. References. . . . . . . . . . . . . 15 13.1. Normative References . . . . . . . . . . . . .13 14.1. Normative References. . . . . . 15 13.2. Informative References . . . . . . . . . . . . .13 14.2. Informative References. . . . . 16 13.3. External Informative References . . . . . . . . . . . . .1316 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . .1416 Intellectual Property and Copyright Statements . . . . . . . . . .1517 1. TerminologyAccess Point: The access point is an infrastructure device that connects the low power and lossy network system to a plant's backbone network.Actuator: a field device that moves or controls plant equipment.Channel Hopping: An algorithm by which field devices synchronously change channels during operation. Channel: RF frequency band used to transmit a modulated signal carrying packets.Closed Loop Control: A process whereby ahost applicationdevice controller controls an actuator based on information sensed by one or more field devices. Downstream: Data direction traveling from thehostplant application to the field device. Field Device: physical devices placed in the plant's operating environment (both RF and environmental). Field devices include sensors and actuators as well as network routing devices and L2N access points in the plant.Superframe: A collection of timeslots repeating at a constant rate.HART: "Highway Addressable Remote Transducer", a group of specifications for industrial process and control devices administered by the HART Foundation (see [HART]). The latest version for the specifications is HART7 which includes the additions for WirelessHART.Host Application: The host application is a process running in the plant that communicates with field devices to perform tasks on that may include control, monitoring and data gathering.ISA: "International Society of Automation". ISA is an ANSI accreditedstandards makingstandards-making society. ISA100 is an ISA working group whose charter includes defining a family of standards for industrial automation. ISA100.11a is a work group within ISA100 that is working on a standard for non-critical process and control applications.L2N: Low Power and Lossy Network Slotted-Link: a data structure thatL2N Access Point: The L2N access point isassociated with a superframe that contains a connection between field devicesan infrastructure device thatcomprises a timeslot assignment, and channelconnects the low power andusage information.lossy network system to a plant's backbone network. Open Loop Control: A process whereby a plant technician controls an actuator over the network where the decision is influenced by information sensed by field devices.Timeslot: A fixed time interval that may be used for the transmission or reception of a packet between two field devices. A timeslot used for communicationsPlant Application: The plant application isassociated withaslotted-link.process running in the plant that communicates with field devices to perform tasks on that may include control, monitoring and data gathering. Upstream: Data direction traveling from the field device to thehostplant application.RF: Radio Frequency Sensor: A field device that measures data and/or detects an event.RL2N: Routing in Low power and LossyNetworksNetworks. 2. Introduction Wireless,low powerlow-power field devices enable industrial users to significantly increase the amount of information collected and the number of control points that can be remotely managed. The deployment of these wireless devices will significantly improve the productivity and safety of the plants while increasing the efficiency of the plant workers. Wireless field devices enable expansion of networked points by appreciably reducing cost of installing a device. The cost reductions come from eliminating cabling costs and simplified planning. Cabling for a field device can run from $100s/ft to$1,000s/ft.$1,000s/ft depending on the safety regulations of the plant. Cabling alsocariescarries an overhead cost associated with planning the installation, determining where the cable has to run, and interfacing with the various organizationsthat haverequired to coordinate its deployment. Doing away with the network and power cables reduces the planning and administrative overhead of installing a device. For wireless devices to have a significant advantage over wired devices in an industrialenvironmentenvironment, the wireless network needs to have three qualities: low power, high reliability, and easy installation and maintenance. The routing protocol used for low power and lossy networks (L2N) is important to fulfilling these goals. Industrial automation is segmented into two distinct application spaces, known as "process" or "process control" and "discrete manufacturing" or "factory automation". In industrial process control, the product is typically a fluid (oil, gas, chemicals ...). In factory automation or discrete manufacturing, the products are individual elements (screws, cars, dolls). While there is some overlapbetweenof products and systems between these two segments, they are surprisingly separate communities. The specifications targeting industrial process control tend to have more tolerance for network latency than what is needed for factory automation. Both application spaces desire battery operated networks of hundreds of sensors and actuators communicating withwiredL2N access points. In an oil refinery, the total number of devices is likely to exceed one million, but the devices will be clustered into smaller networksreportingthat report to an existingwiredplant network infrastructure. Existing wired sensor networks in this space typically use communication protocols with low datarates -rates, from 1,200 baud(wired(e.g. wired HART)intoto the one to two hundredkbpsKbps range for most of the others. The existing protocols are often master/slave withcommand/response. Note that the total low power and lossy network system capacity for devices using the IEEE802.15.4-2006 2.4 GHz radio is at most 1.6 Mbps when spatial reuse of channels is not utilized.command/ response. 2.1. Applications and Traffic Patterns The industrial market classifies process applications into three broad categories and six classes. o Safety * Class 0: Emergency action - Always a critical function o Control * Class 1: Closed loop regulatory control - Often a critical function * Class 2: Closed loop supervisory control - Usually non-critical function * Class 3: Open loop control - Operator takes action and controls the actuator (human in the loop) o Monitoring * Class 4: Alerting - Short-term operational effect (for example event-based maintenance) * Class 5: Logging and downloading / uploading - No immediate operational consequence (e.g., history collection, sequence-of- events, preventive maintenance) Critical functionsareeffect the basic safety or integrity of the plant. Timely deliveries of messagesarebecomes more important as the classnumbers decrease.number decreases. Industrialcustomersusers are interested in deploying wireless networks for the monitoring classes 4 and55, and in the non-critical portions of classes 3 through 1. Classes 4 and 5 also includeequipmentasset monitoring and tracking whichis strictly speakinginclude equipment monitoring and are essentially separate from process monitoring. An example of equipment monitoring is the recording of motor vibrations to detect bearing wear.MostIn the near future, most low power and lossy network systemsin the near futurewill be for low frequency data collection. Packets containing samples will be generated continuously, and 90% of the market is covered by packet rates of between 1/s and 1/hour, with the average under 1/min. In industrialprocessprocess, these sensors include temperature, pressure, fluid flow, tank level, and corrosion.There are someSome sensorswhichare bursty, such as vibration monitorswhichthat may generate and transmit tens ofkilo-byteskilo- bytes (hundreds to thousands of packets) of time-series data at reporting rates of minutes to days. Almost all of these sensors will have built-in microprocessorswhichthat may detect alarm conditions.Time crucialTime-critical alarm packets are expected to have lower latency than sensordata, often requiring substantially more bandwidth.data. Some devices will transmit a log file every day, again with typically tens of Kbytes of data. For these applications there is very little "downstream" traffic coming from the L2N access point and traveling to particular sensors. During diagnostics, however, a technician may be investigating a fault from a control room and expect to have "low" latency (human tolerable) in a command/response mode. Low-rate control, often with a "human in the loop"or(also referred to as "openloop"loop"), is implemented today via communication to a centralizedcontroller, i.e.controller. The sensor data makes its way through the L2N access point to the centralized controller where it is processed, the operator sees the information and takes action, and the control information is then sent out to the actuator node in the network. In the future, it is envisioned that some open loop processes will be automated (closed loop) and packets will flow over local loops and not involve the L2N access point. These closed loop controls fornon- criticalnon-critical applications will be implemented on L2Ns. Non-critical closed loop applications have a latency requirement that can be as low as 100 ms but many control loops are tolerant of latencies above 1 s. In critical control,10'stens of milliseconds oflatencies arelatency is typical. In many of these systems, if a packet does not arrive within the specified interval, the systemwill enterenters an emergency shutdown state, often with substantial financial repercussions. For a1 secondone-second control loop in a system with a mean-time between shutdowns target of 30 years, the latency requirement implies nine 9s of reliability.Thus,2.2. Network Topology of Industrial Applications Although network topology is difficult to generalize, the majority of existing applications can be met by networks of 10 to 200 field devices and maximum number of hops from two to twenty. It is assumed that the field devices themselves will provide routingprotocolcapability forL2Ns MUST support multi-topology routing (e.g especially criticalthe network, and additional repeaters/routers will not be required in most cases. For most industrial applications, a manager, gateway or backbone router acts as a sink forcritical control applications).the wireless sensor network. The vast majority of the traffic is real time publish/subscribe sensor data from the field devices over a L2N towards one or more sinks. Increasingly over time, these sinks will be a part of a backbone but today they are often fragmented and isolated. The wireless sensor network is a Low Power and Lossy Network of field devices for which two logical roles are defined, the field routers and the non routingprotocol MUST providedevices. It is acceptable and even probable that theability to color slotted-links (whererepartition of thecolor correspondsroles across the field devices change over time to balance the cost of the forwarding operation amongst the nodes. The backbone is auser defined slotted-link attribute) andhigh speed network that interconnects multiple WSNs through backbone routers. Infrastructure devices can beusedconnected toinclude/exclude slotted-links fromthe backbone. A gateway / manager that interconnects the backbone to the plant network of the corporate network can be viewed as collapsing the backbone and the infrastructure devices into alogical topology. Forsingle device that operates all the required logical roles. The backbone is likely to always become an important function of the industrial network. The Internet at large is not considered as a viable option to perform the backbone function. A plant or corporate network is also present on the factory site. This is the typical IT nework for the factory operations beyond process control. That network is out of scope for this document. 2.2.1. The Physical Topology There is no specific physical topology for an industrial process control network. One extreme example is a multi-square-kilometer refinery where isolated tanks, some of them with power but most with no backbone connectivity, compose a farm that spans over of the surface of the plant. A few hundred field devices are deployed to ensure the global coverage using a wireless self-forming self-healing mesh network that might be 5 to 10 hops across. Local feedback loops and mobile workers tend to be only one or two hops. The backbone is in the refinery proper, many hops away. Even there, powered infrastructure is also typically several hops away. So hopping to/ from the powered infrastructure will in general be more costly than the direct route. In the opposite extreme case, the backbone network spans all the nodes and mostlatency-tolerant applications, route discoverynodes are in direct sight of one or more backbone router. Most communication between field devices and infrastructure devices as well as field device to field device occurs across the backbone. Form afar, this model resembles the WIFI ESS (Extended Service Set). But from a layer 3 perspective, the issues are the default (backbone) router selection and the routing inside the backbone whereas the radio hop towards the field device islikelyin fact a simple local delivery. ---+------------------------ | Plant Network | +-----+ | | Gateway | | +-----+ | | Backbone +--------------------+------------------+ | | | +-----+ +-----+ +-----+ | | Backbone | | Backbone | | Backbone | | router | | router | | router +-----+ +-----+ +-----+ o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o M o o o o o o o M o o o o o o o o o o o o o o o o o o o o o o o o o o o L2N Considering that though each field device to field device route computation has specific constraints in terms of latency and availability it can be expected that the shortest path possible will often be selected and that this path will be routed inside the LLN as opposed to via the backbone. It can also betoo slownoted that the lifetimes of the routes might range from minutes for aprocessmobile workers toinitiate whentens of years for a command and control closed loop. Finally, time- varying user requirements for latency and bandwidth will change the constraints on the routes, which might either trigger a constrained routefailure is detected. Therecomputation, a reprovisioning of the underlying L2 protocols, or both in that order. For instance, a wireless worker may initiate a bulk transfer to configure or diagnose a field device. A level sensor device may need to perform a calibration and send a bulk file to a plant. For these reasons, the ROLL routingprotocolinfrastructure MUSTsupport multiple paths (a tree-based solutionbe able to compute and update constrained routes on demand (that isnot sufficient).reactively), and it can be expected that this model will become more prevalent for field device to field device connectivity as well as for some field device to Infrastructure devices over time. 3.Quality ofService(QoS) Routing requirementsRequirements The industrial applications fall into four large servicecategories:categories [ISA100.11a]: 1.Published data.Periodic data (aka buffered). Data that is generatedperperiodically and has a well understood data bandwidthrequirement.requirement, both deterministic and predictable. Timely delivery of such data is often the core function of a wireless sensor network and permanent resources are assigned to ensure that the required bandwidth stays available. Buffered data usually exhibits a short time to live, and the newer reading obsoletes the previous. In some cases, alarms are low priority information that gets repeated over and over. The end-to-end latency of this data is not as important as the regularity with whichitthe data is presented to thehostplant application. 2. Event data. This category includes alarms and aperiodic data reports with bursty data bandwidthrequirementsrequirements. In certain cases, alarms are critical and require a priority service from the network. 3. Client/Server. Many industrial applications are based on a client/server model and implement a command response protocol. The data bandwidth required is often bursty. Theround tripacceptable round-trip latency for someoperations can be 200 ms.legacy systems was based on the time to send tens of bytes over a 1200 baud link. Hundreds of milliseconds is typical. This type of request is statistically multiplexed over the L2N and cost-based fair-share best-effort service is usually expected. 4. Bulk transfer. Bulk transfers involve the transmission of blocks of data in multiple packets where temporary resources are assigned to meet a transaction time constraint.Bulk transfers assignTransient resources are assigned for a limited period of time (related to file size and data rate) to meet theQoSbulk transfers service requirements. For industrial applicationsQoSService parametersinclude:include but might not be limited to: o Data bandwidth -periodic, burst statisticsthe bandwidth might be allocated permanently or for a period of time to a specific flow that usually exhibits well defined properties of burstiness and throughput. Some bandwidth will also be statistically shared between flows in a best effort fashion. o Latency - the time taken for the data to transit the network from the source to the destination. This may be expressed in terms of a deadline fordeliverydelivery. Most monitoring latencies will be in seconds to minutes. o Transmission phase - process applications can be synchronized to wall clock time and require coordinated transmissions. A common coordination frequency is 4 Hz (250 ms). oReliability - the end-to-end data delivery statistic. All applications have latency and reliability requirements. In industrial applications, these vary over many orders of magnitude. Some non-critical monitoring applications may tolerate latencies of days and reliability of less than 90%. Most monitoring latencies will be in seconds to minutes, and industrial standard such as HART7 has set user reliability expectations at 99.9%. Regulatory requirements are a driver for some industrial applications. Regulatory monitoring requires high data integrity because lost data is assumed to be out of compliance and subject to fines. This can drive reliability requirements to higher then 99.9%. o QoSService contract type - revocation priority. L2Ns have limited network resources that can vary with time. This means the system can become fully subscribed or even over subscribed. System policies determine how resources are allocated when resources are over subscribed. The choices are blocking and graceful degradation. o TransmissionPrioritypriority - the means by which limited resources within field devicestherearelimited resources need to beallocated across multiple services. For transmissions, a device has to select which packet in its queue will be sent at the next transmission opportunity. Packet priority is used as one criterion for selecting the next packet. Forreceptionreception, a device has to decide how to store a received packet. The field devices are memory constrained and receive buffers may become full. Packet priority is used to select which packets are stored or discarded.In industrial wireless L2Ns a time slotting technology is used. A time slotted media access protocol synchronizes channel hopping which is one of the means that is used to make the wireless network reliable. Timeslots also are employed to reduce the power by minimizing the active duty cycle for field devices. Communications between devices are assigned a combination of timeslot and channel assignment called a slotted-link.The routing protocol MUST also support different metric types for eachslotted-linklink used to compute the path according to some objective function (e.g. minimizelatency, maximize reliability, ...).latency). Industrial application data flows between field devices are not necessarily symmetric. In particular, asymmetrical cost and unidirectional routes are common for published data and alerts, which represent the most part of the sensor traffic. The routing protocol MUST be able to set up unidirectional or asymmetrical cost routes that aredirectional.composed of one or more non congruent paths. 3.1. Configurable Application Requirement Time-varying user requirements for latency and bandwidth will require changes in the provisioning of the underlying L2 protocols.The wireless workerA technician may initiate a query/response session or bulk transfer toconfigure ordiagnose or configure a field device. A level sensor device may need to perform a calibration and send a bulk file to ahost.plant. The routing protocol MUST route on pathswhichthat are changed to appropriately provision the application requirements. The routing protocol MUST support the ability to recompute paths based onslotted-linkunderlying link characteristics that may change dynamically.4. Network Topology Network topology3.2. Different Routes for Different Flows Because different services categories have different service requirements, it isvery toughoften desirable togeneralize, but networks of 10have different routes for different data flows between the same two endpoints. For example, alarm or periodic data from A to200 field devicesZ may require path diversity with specific latency andmaximum number of hops from tworeliability. A file transfer between A and Z may not need path diversity. The routing algorithm MUST be able totwenty coversgenerate different routes for different flows. 4. Reliability Requirements Another critical aspect for themajority of existing applications. Itrouting isassumed thatthefield devices themselves will provide routingcapabilityfor the network,to ensure maximum disruption time andinroute maintainance. The maximum disruption time is the time it takes at mostcases additional repeaters/routers will notfor a specific path to berequired. Timeslot sizerestored when broken. Route maintainance ensures that a path isabout 10 ms and timeslot synchronization requirements are onmonitored to be restored when broken within theorder of +/-1 msmaximum disruption time. Maintenance should also ensure that a path continues to provide the service fornon-critical processwhich it was established for instance in terms of bandwidth, jitter andcontrol data (some L2 protocols provide/require tighter synchronization). Wall clock time *accuracy*latency. In industrial applications, reliability is usually defined with respect to end-to-end delivery of packets within a bounded latency. Reliability requirements varysubstantially, but are generally about 100ms.over many orders of magnitude. Some non-critical monitoring applicationsthat time stamp data require 1 ms accuracy to determine the sequencemay tolerate a reliability ofevents reported. (Note thatless than 90% with hours of latency. Most industrial standards, such as HART7, have set user reliability expectations at 99.9%. Regulatory requirements are a driver for some industrial applications. Regulatory monitoring requires high datatime stamping does not translateintegrity because lost data is assumed toa latency requirement.) In low powerbe out of compliance andlossy network systems using the IEEE802.15.4-2006 2.4 GHz radio the total raw throughput per radio is 250 kbps. 10 ms timeslots reduces thissubject to101.6 Kbps for maximum sized packets.fines. Thisconstrains the typical throughputcan drive reliability requirements to higher then 99.9%. Hop-by-hop path diversity is used to improve latency-bounded reliability. Additionally, bicasting or pluricasting may be used over multiple non congruent / non overlapping paths to ensure that at least one instance of asingle radiocritical packet is actually delivered. Because data from field devices are aggregated and funneled at the L2N access point before they are routed toless 100 kbps. Therefore anplant applications, L2N access pointwith one IEEE 802.15.4 radio has a maximum aggregate throughput 100 packets per second and no more then about 100 Kbps.redundancy is an important factor in overall reliability. Agraphroute that connects a field device to ahostplant application may have multiple paths that go through more than one L2N access point. The routing protocol MUST support multiple L2N access points and load distributionwhen aggregate network throughputs need to exceed 100 kbps.among L2N access points. The routing protocol MUST support multiple L2N access points when L2N access point redundancy is required. Because L2Ns are lossy in nature, multiple paths in a L2N route MUST be supported. The reliability of each path in a route can change over time. Hence, it is important to measure the reliability on a per-path basis and select a path (or paths) according to the reliability requirements. 5. Device-Aware Routing Requirements Wireless L2N nodes in industrial environments are powered by a variety of sources. Battery operated devices with lifetime requirements of at least5five years are the most common. Battery operated devices have a cap on their total energy, and typically can reportsomean estimate of remaining energy, and typically do not have constraints on theshort termshort-term average power consumption. Energy scavenging devices are more complex. These systems contain both a power scavenging device (such as solar, vibration, or temperature difference) and an energy storage device, such as a rechargeable battery or a capacitor.Therefore these systemsThese systems, therefore, have limits on boththe long termlong-term average power consumption (which cannot exceed the average scavenged power over the same interval) as well as the short- term limits imposed by the energy storage requirements. For solar- powered systems, the energy storage system is generally designed to provide days of power in the absence of sunlight. Many industrial sensors run off of a4-20mA4-20 mA current loop, and can scavenge on the order ofmWmilliwatts from that source. Vibration monitoring systems are a natural choice for vibration scavenging, which typically only provides tens or hundreds of microwatts. Due to industrial temperature ranges and desired lifetimes, the choices of energy storage devices can be limited, and the resulting stored energy is often comparable to the energy cost of sending or receiving a packet rather than the energy of operating the node for several days. And ofcoursecourse, some nodes will be line-powered. Example 1: solar panel, lead-acid battery sized for two weeks of rain. Example 2: vibration scavenger, 1mF tantalumcapacitorcapacitor. Field devices have limited resources.Low power, low costLow-power, low-cost devices have limited memory for storing route information. Typical field devices will have a finite number of routes they can support for their embedded sensor/actuator application and for forwarding other devices packets in a mesh network slotted-link. Users mayhave strong preferences on lifetimestrongly prefer thatis different forthe same device have different lifetime requirements in different locations. A sensor monitoring anon- criticalnon-critical parameter in aneasily-accessedeasily accessed location may have a lifetime requirement that is shorter and tolerate more statistical variation than a mission-critical sensor in ahard to reachhard-to-reach place that requiresshutdown of thea plant shutdown in order to replace. The routing algorithm MUST supportnode constrainednode-constrained routing (e.g. taking into account the existing energy state as a node constraint). Node constraints include power andmemorymemory, as well as constraints placed on the device by theuseruser, such as battery life. 6. Broadcast/Multicast Existing industrialhostplant applications do not use broadcast or multicast addressing to communicate to field devices. Unicast address support is sufficient. However wireless field devices with communication controllers and protocol stacks will require control andconfigurationconfiguration, such as firmwaredownloadingdownloading, that may benefit from broadcastandor multicast addressing. The routing protocol SHOULD support broadcastandor multicast addressing. 7. Route Establishment Time During network formation, installers with no networking skill must be able to determine if their devices are "in the network" with sufficient connectivity to perform their function. Installers will have sufficient skill to provision the devices with a sample rate or activity profile. The routing algorithm MUST find the appropriate route(s) and report success or failure within several minutes, and SHOULD report success or failure within tens of seconds. Network connectivity in real deployments is alwaystime-varying,time varying, with time constants from seconds to months.Optimization is perhaps notSo long as theright word to use, in that network optimization will need to run continuously, and single-slotted-link failures that cause loss ofunderlying connectivityarehas notlikely to be tolerated. Once the network is formed, itbeen compromised, this link churn shouldnever need to "optimized" to a new configuration in response to a lost slotted-link.not substantially affect network operation. The routing algorithmSHOULD not have to re-optimize in responseMUST respond to normal link failure rates with routes that meet theloss of a slotted-link.Service requirements (especially latency) throughout the routing response. The routingalgorithmsalgorithm SHOULD always be in the process ofplesio-optimizing the systemfor thein response to changingRF environment.link statistics. The routing algorithm MUST re-optimize thepathpaths when field devices change due to insertion, removal orfailure.failure, and this re-optimization MUST not cause latencies greater than the specified constraints (typically seconds to minutes). 8. Mobility Various economic factors have contributed to a reduction of trained workers in the plant. The industry as a whole appears to be trying to solve this problem with what is called the "wireless worker". Carrying a PDA or something similar, this worker will be able to accomplish more work in less time than the older, better-trained workers that he or she replaces. Whether the premise is valid, the use case is commonly presented: the worker will be wirelessly connected to the plant IT system to download documentation, instructions, etc., and will need to be able to connect "directly" to the sensors and control points in or near the equipment on which he or she is working. It is possible that this "direct" connection could come via the normal L2Ns data collection network. This connection is likely to require higher bandwidth and lower latency than the normal data collection operation. The routing protocol SHOULD support the wireless worker with fast network connection times of a few of seconds, and lowlatencycommand and response latencies tohostthe plant behind the L2N accesspoints andpoints, toapplicationsapplications, and to field devices. The routing protocol SHOULD also supportconfiguring graphsthe bandwidth allocation for bulktransfers.transfers between the field device and the handheld device of the wireless worker. The routing protocolMUSTSHOULD support walking speeds for maintaining network connectivity as the handheld device changes position in the wireless network. Some field devices will be mobile. These devices may be located on moving parts such as rotating components or they may be located on vehicles such as cranes or fork lifts. The routing protocol SHOULD support vehicular speeds of up to 35 kmph. 9. Manageabilityand Ease Of UseThe process and control industry is manpower constrained. The aging demographics of plant personnel are causing a looming manpower problem for industry across many markets. The goal for the industrial networks is tomakehave the installation process not require any new skills for the plant personnel. Theindustrial customers do not even want to requireperson would install thecurrent level of networking knowledge needed for do-it-yourself home network installations.wireless sensor or wireless actuator the same way the wired sensor or wired actuator is installed, except the step to connect wire is eliminated. The routing protocol for L2Nsmustis expected to be easy to deploy and manage.In a further revision of this document, metrics to measure easeBecause the number ofdeployment forfield devices in a network is large, provisioning the devices manually would not make sense. Therefore, the routing protocolwill be detailed.MUST support auto-provisioning of field devices. The protocol also MUST support the distribution of configuration from a centralized management controller if operator-initiated configuration change is allowed. 10. SecurityWirelessGiven that wireless sensor networks in industrial automation operate in systems that have substantial financial and human safety implications, security is of considerable concern. Levels of security violationwhichthat are tolerated as a "cost of doing business" in the banking industry are not acceptable when in some cases literally thousands of lives may be at risk. Industrial wireless device manufactures are specifying security at the MAC layer and theTransporttransport layer. A shared"Network Key"key is used to authenticate messages at the MAC layer. At the transport layer, commands are encrypted with unique randomly-generatedend-to- endend-to-end Session keys. HART7 and ISA100.11a are examples of security systems for industrial wireless networks. Industrial plants may not maintain the same level of physical security for field devices that is associated with traditional network sites such as locked IT centers. In industrial plants it must be assumed that the field devices have marginal physical security and the security system needs to have limited trust in them. The routing protocol SHOULD place limited trust in the field devices deployed in the plant network. The routing protocol SHOULD compartmentalize the trust placed in field devices so that a compromised field device does not destroy the security of the whole network. The routing MUST be configured and managed using secure messages and protocols that prevent outsider attacks and limit insider attacks from field devices installed in insecure locations in the plant. 11.Informative Reference [HART] "Highway Addressable Remote Transducer", a group of specifications for industrial process and control devices administered by the HART Foundation, www.hartcomm.org. 12.IANA Considerations This document includes no request to IANA.13.12. Acknowledgements14.Many thanks to Rick Enns and Chol Su Kang for their contributions. 13. References14.1.13.1. Normative References [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997.14.2.13.2. Informative References [I-D.culler-rl2n-routing-reqs] Vasseur, J. and D. Cullerot, "Routing Requirements for Low Power And Lossy Networks", draft-culler-rl2n-routing-reqs-01 (work in progress), July 2007. 13.3. External Informative References [HART] www.hartcomm.org, "Highway Addressable Remote Transducer", a group of specifications for industrial process and control devices administered by the HART Foundation". [ISA100.11a] ISA, "SP100.11 Working Group Draft Standard, Version 0.1", December 2007. Authors' Addresses Kris Pister Dust Networks 30695 Huntwood Ave. Hayward, 94544 USA Email: kpister@dustnetworks.comRick Enns Dust Networks 30695 Huntwood Ave. Hayward, 94544 USA Email: enns@stanfordalumni.orgPascal Thubert Cisco Systems, Inc Village d'Entreprises Green Side - 400, Avenue de Roumanille Sophia Antipolis, 06410 FRANCE Email: pthubert@cisco.com Full Copyright Statement Copyright (C) The IETF Trust (2008). This document is subject to the rights, licenses and restrictions contained in BCP 78, and except as set forth therein, the authors retain all their rights. This document and the information contained herein are provided on an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Intellectual Property The IETF takes no position regarding the validity or scope of any Intellectual Property Rights or other rights that might be claimed to pertain to the implementation or use of the technology described in this document or the extent to which any license under such rights might or might not be available; nor does it represent that it has made any independent effort to identify any such rights. Information on the procedures with respect to rights in RFC documents can be found in BCP 78 and BCP 79. Copies of IPR disclosures made to the IETF Secretariat and any assurances of licenses to be made available, or the result of an attempt made to obtain a general license or permission for the use of such proprietary rights by implementers or users of this specification can be obtained from the IETF on-line IPR repository at http://www.ietf.org/ipr. The IETF invites any interested party to bring to its attention any copyrights, patents or patent applications, or other proprietary rights that may cover technology that may be required to implement this standard. Please address the information to the IETF at ietf-ipr@ietf.org.