| < draft-ietf-6tisch-architecture-28.txt | draft-ietf-6tisch-architecture-30.txt > | |||
|---|---|---|---|---|
| 6TiSCH P. Thubert, Ed. | 6TiSCH P. Thubert, Ed. | |||
| Internet-Draft Cisco Systems | Internet-Draft Cisco Systems | |||
| Intended status: Informational 29 October 2019 | Intended status: Informational 26 November 2020 | |||
| Expires: 1 May 2020 | Expires: 30 May 2021 | |||
| An Architecture for IPv6 over the TSCH mode of IEEE 802.15.4 | An Architecture for IPv6 over the TSCH mode of IEEE 802.15.4 | |||
| draft-ietf-6tisch-architecture-28 | draft-ietf-6tisch-architecture-30 | |||
| Abstract | Abstract | |||
| This document describes a network architecture that provides low- | This document describes a network architecture that provides low- | |||
| latency, low-jitter and high-reliability packet delivery. It | latency, low-jitter and high-reliability packet delivery. It | |||
| combines a high-speed powered backbone and subnetworks using IEEE | combines a high-speed powered backbone and subnetworks using IEEE | |||
| 802.15.4 time-slotted channel hopping (TSCH) to meet the requirements | 802.15.4 time-slotted channel hopping (TSCH) to meet the requirements | |||
| of LowPower wireless deterministic applications. | of LowPower wireless deterministic applications. | |||
| Status of This Memo | Status of This Memo | |||
| skipping to change at page 1, line 34 ¶ | skipping to change at page 1, line 34 ¶ | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at https://datatracker.ietf.org/drafts/current/. | Drafts is at https://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on 1 May 2020. | This Internet-Draft will expire on 30 May 2021. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2019 IETF Trust and the persons identified as the | Copyright (c) 2020 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents (https://trustee.ietf.org/ | Provisions Relating to IETF Documents (https://trustee.ietf.org/ | |||
| license-info) in effect on the date of publication of this document. | license-info) in effect on the date of publication of this document. | |||
| Please review these documents carefully, as they describe your rights | Please review these documents carefully, as they describe your rights | |||
| and restrictions with respect to this document. Code Components | and restrictions with respect to this document. Code Components | |||
| extracted from this document must include Simplified BSD License text | extracted from this document must include Simplified BSD License text | |||
| as described in Section 4.e of the Trust Legal Provisions and are | as described in Section 4.e of the Trust Legal Provisions and are | |||
| provided without warranty as described in the Simplified BSD License. | provided without warranty as described in the Simplified BSD License. | |||
| skipping to change at page 2, line 15 ¶ | skipping to change at page 2, line 15 ¶ | |||
| Table of Contents | Table of Contents | |||
| 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 | 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
| 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 5 | 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 5 | |||
| 2.1. New Terms . . . . . . . . . . . . . . . . . . . . . . . . 5 | 2.1. New Terms . . . . . . . . . . . . . . . . . . . . . . . . 5 | |||
| 2.2. Abbreviations . . . . . . . . . . . . . . . . . . . . . . 10 | 2.2. Abbreviations . . . . . . . . . . . . . . . . . . . . . . 10 | |||
| 2.3. Related Documents . . . . . . . . . . . . . . . . . . . . 11 | 2.3. Related Documents . . . . . . . . . . . . . . . . . . . . 11 | |||
| 3. High Level Architecture . . . . . . . . . . . . . . . . . . . 12 | 3. High Level Architecture . . . . . . . . . . . . . . . . . . . 12 | |||
| 3.1. A Non-Broadcast Multi-Access Radio Mesh Network . . . . . 12 | 3.1. A Non-Broadcast Multi-Access Radio Mesh Network . . . . . 12 | |||
| 3.2. A Multi-Link Subnet Model . . . . . . . . . . . . . . . . 14 | 3.2. A Multi-Link Subnet Model . . . . . . . . . . . . . . . . 14 | |||
| 3.3. TSCH: A Deterministic MAC Layer . . . . . . . . . . . . . 15 | 3.3. TSCH: A Deterministic MAC Layer . . . . . . . . . . . . . 16 | |||
| 3.4. Scheduling TSCH . . . . . . . . . . . . . . . . . . . . . 16 | 3.4. Scheduling TSCH . . . . . . . . . . . . . . . . . . . . . 17 | |||
| 3.5. Distributed vs. Centralized Routing . . . . . . . . . . . 17 | 3.5. Distributed vs. Centralized Routing . . . . . . . . . . . 18 | |||
| 3.6. Forwarding Over TSCH . . . . . . . . . . . . . . . . . . 18 | 3.6. Forwarding Over TSCH . . . . . . . . . . . . . . . . . . 19 | |||
| 3.7. 6TiSCH Stack . . . . . . . . . . . . . . . . . . . . . . 19 | 3.7. 6TiSCH Stack . . . . . . . . . . . . . . . . . . . . . . 20 | |||
| 3.8. Communication Paradigms and Interaction Models . . . . . 21 | 3.8. Communication Paradigms and Interaction Models . . . . . 22 | |||
| 4. Architecture Components . . . . . . . . . . . . . . . . . . . 22 | 4. Architecture Components . . . . . . . . . . . . . . . . . . . 23 | |||
| 4.1. 6LoWPAN (and RPL) . . . . . . . . . . . . . . . . . . . . 22 | 4.1. 6LoWPAN (and RPL) . . . . . . . . . . . . . . . . . . . . 23 | |||
| 4.1.1. RPL-Unaware Leaves and 6LoWPAN ND . . . . . . . . . . 22 | 4.1.1. RPL-Unaware Leaves and 6LoWPAN ND . . . . . . . . . . 23 | |||
| 4.1.2. 6LBR and RPL Root . . . . . . . . . . . . . . . . . . 23 | 4.1.2. 6LBR and RPL Root . . . . . . . . . . . . . . . . . . 24 | |||
| 4.2. Network Access and Addressing . . . . . . . . . . . . . . 23 | 4.2. Network Access and Addressing . . . . . . . . . . . . . . 24 | |||
| 4.2.1. Join Process . . . . . . . . . . . . . . . . . . . . 24 | 4.2.1. Join Process . . . . . . . . . . . . . . . . . . . . 25 | |||
| 4.2.2. Registration . . . . . . . . . . . . . . . . . . . . 26 | 4.2.2. Registration . . . . . . . . . . . . . . . . . . . . 27 | |||
| 4.3. TSCH and 6top . . . . . . . . . . . . . . . . . . . . . . 27 | 4.3. TSCH and 6top . . . . . . . . . . . . . . . . . . . . . . 28 | |||
| 4.3.1. 6top . . . . . . . . . . . . . . . . . . . . . . . . 27 | 4.3.1. 6top . . . . . . . . . . . . . . . . . . . . . . . . 28 | |||
| 4.3.2. Scheduling Functions and the 6top protocol . . . . . 29 | 4.3.2. Scheduling Functions and the 6top protocol . . . . . 30 | |||
| 4.3.3. 6top and RPL Objective Function operations . . . . . 30 | 4.3.3. 6top and RPL Objective Function operations . . . . . 31 | |||
| 4.3.4. Network Synchronization . . . . . . . . . . . . . . . 31 | 4.3.4. Network Synchronization . . . . . . . . . . . . . . . 32 | |||
| 4.3.5. Slotframes and CDU matrix . . . . . . . . . . . . . . 32 | 4.3.5. Slotframes and CDU matrix . . . . . . . . . . . . . . 33 | |||
| 4.3.6. Distributing the reservation of cells . . . . . . . . 33 | 4.3.6. Distributing the reservation of cells . . . . . . . . 34 | |||
| 4.4. Schedule Management Mechanisms . . . . . . . . . . . . . 34 | 4.4. Schedule Management Mechanisms . . . . . . . . . . . . . 35 | |||
| 4.4.1. Static Scheduling . . . . . . . . . . . . . . . . . . 34 | 4.4.1. Static Scheduling . . . . . . . . . . . . . . . . . . 35 | |||
| 4.4.2. Neighbor-to-neighbor Scheduling . . . . . . . . . . . 35 | 4.4.2. Neighbor-to-neighbor Scheduling . . . . . . . . . . . 36 | |||
| 4.4.3. Remote Monitoring and Schedule Management . . . . . . 36 | 4.4.3. Remote Monitoring and Schedule Management . . . . . . 37 | |||
| 4.4.4. Hop-by-hop Scheduling . . . . . . . . . . . . . . . . 38 | 4.4.4. Hop-by-hop Scheduling . . . . . . . . . . . . . . . . 39 | |||
| 4.5. On Tracks . . . . . . . . . . . . . . . . . . . . . . . . 38 | 4.5. On Tracks . . . . . . . . . . . . . . . . . . . . . . . . 39 | |||
| 4.5.1. General Behavior of Tracks . . . . . . . . . . . . . 39 | 4.5.1. General Behavior of Tracks . . . . . . . . . . . . . 40 | |||
| 4.5.2. Serial Track . . . . . . . . . . . . . . . . . . . . 39 | 4.5.2. Serial Track . . . . . . . . . . . . . . . . . . . . 40 | |||
| 4.5.3. Complex Track with Replication and | 4.5.3. Complex Track with Replication and Elimination . . . 41 | |||
| Elimination . . . . . . . . . . . . . . . . . . . . . 40 | 4.5.4. DetNet End-to-end Path . . . . . . . . . . . . . . . 41 | |||
| 4.5.4. DetNet End-to-end Path . . . . . . . . . . . . . . . 40 | 4.5.5. Cell Reuse . . . . . . . . . . . . . . . . . . . . . 42 | |||
| 4.5.5. Cell Reuse . . . . . . . . . . . . . . . . . . . . . 41 | 4.6. Forwarding Models . . . . . . . . . . . . . . . . . . . . 43 | |||
| 4.6. Forwarding Models . . . . . . . . . . . . . . . . . . . . 42 | 4.6.1. Track Forwarding . . . . . . . . . . . . . . . . . . 43 | |||
| 4.6.1. Track Forwarding . . . . . . . . . . . . . . . . . . 42 | 4.6.2. IPv6 Forwarding . . . . . . . . . . . . . . . . . . . 46 | |||
| 4.6.2. IPv6 Forwarding . . . . . . . . . . . . . . . . . . . 45 | 4.6.3. Fragment Forwarding . . . . . . . . . . . . . . . . . 47 | |||
| 4.6.3. Fragment Forwarding . . . . . . . . . . . . . . . . . 45 | 4.7. Advanced 6TiSCH Routing . . . . . . . . . . . . . . . . . 48 | |||
| 4.7. Advanced 6TiSCH Routing . . . . . . . . . . . . . . . . . 47 | 4.7.1. Packet Marking and Handling . . . . . . . . . . . . . 48 | |||
| 4.7.1. Packet Marking and Handling . . . . . . . . . . . . . 47 | 4.7.2. Replication, Retries and Elimination . . . . . . . . 49 | |||
| 4.7.2. Replication, Retries and Elimination . . . . . . . . 48 | ||||
| 5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 50 | 5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 52 | |||
| 6. Security Considerations . . . . . . . . . . . . . . . . . . . 50 | 6. Security Considerations . . . . . . . . . . . . . . . . . . . 52 | |||
| 6.1. Availability of Remote Services . . . . . . . . . . . . . 50 | 6.1. Availability of Remote Services . . . . . . . . . . . . . 52 | |||
| 6.2. Selective Jamming . . . . . . . . . . . . . . . . . . . . 51 | 6.2. Selective Jamming . . . . . . . . . . . . . . . . . . . . 52 | |||
| 6.3. MAC-Layer Security . . . . . . . . . . . . . . . . . . . 51 | 6.3. MAC-Layer Security . . . . . . . . . . . . . . . . . . . 53 | |||
| 6.4. Time Synchronization . . . . . . . . . . . . . . . . . . 52 | 6.4. Time Synchronization . . . . . . . . . . . . . . . . . . 53 | |||
| 6.5. Validating ASN . . . . . . . . . . . . . . . . . . . . . 52 | 6.5. Validating ASN . . . . . . . . . . . . . . . . . . . . . 54 | |||
| 6.6. Network Keying and Rekeying . . . . . . . . . . . . . . . 53 | 6.6. Network Keying and Rekeying . . . . . . . . . . . . . . . 55 | |||
| 7. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 55 | 7. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 56 | |||
| 7.1. Contributors . . . . . . . . . . . . . . . . . . . . . . 55 | 7.1. Contributors . . . . . . . . . . . . . . . . . . . . . . 56 | |||
| 7.2. Special Thanks . . . . . . . . . . . . . . . . . . . . . 56 | 7.2. Special Thanks . . . . . . . . . . . . . . . . . . . . . 57 | |||
| 7.3. And Do not Forget . . . . . . . . . . . . . . . . . . . . 56 | 7.3. And Do not Forget . . . . . . . . . . . . . . . . . . . . 58 | |||
| 8. Normative References . . . . . . . . . . . . . . . . . . . . 57 | 8. Normative References . . . . . . . . . . . . . . . . . . . . 58 | |||
| 9. Informative References . . . . . . . . . . . . . . . . . . . 61 | 9. Informative References . . . . . . . . . . . . . . . . . . . 62 | |||
| Appendix A. Related Work In Progress . . . . . . . . . . . . . . 67 | Appendix A. Related Work In Progress . . . . . . . . . . . . . . 69 | |||
| A.1. Unchartered IETF work items . . . . . . . . . . . . . . . 67 | A.1. Unchartered IETF work items . . . . . . . . . . . . . . . 69 | |||
| A.1.1. 6TiSCH Zerotouch security . . . . . . . . . . . . . . 67 | A.1.1. 6TiSCH Zerotouch security . . . . . . . . . . . . . . 69 | |||
| A.1.2. 6TiSCH Track Setup . . . . . . . . . . . . . . . . . 67 | A.1.2. 6TiSCH Track Setup . . . . . . . . . . . . . . . . . 69 | |||
| A.1.3. Using BIER in a 6TiSCH Network . . . . . . . . . . . 68 | A.1.3. Using BIER in a 6TiSCH Network . . . . . . . . . . . 70 | |||
| A.2. External (non-IETF) work items . . . . . . . . . . . . . 68 | A.2. External (non-IETF) work items . . . . . . . . . . . . . 70 | |||
| Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 69 | Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 71 | |||
| 1. Introduction | 1. Introduction | |||
| Wireless Networks enable a wide variety of devices of any size to get | Wireless Networks enable a wide variety of devices of any size to get | |||
| interconnected, often at a very low marginal cost per device, at any | interconnected, often at a very low marginal cost per device, at any | |||
| range, and in circumstances where wiring may be impractical, for | range, and in circumstances where wiring may be impractical, for | |||
| instance on fast-moving or rotating devices. | instance on fast-moving or rotating devices. | |||
| On the other hand, Deterministic Networking maximizes the packet | On the other hand, Deterministic Networking maximizes the packet | |||
| delivery ratio within a bounded latency so as to enable mission- | delivery ratio within a bounded latency so as to enable mission- | |||
| skipping to change at page 9, line 41 ¶ | skipping to change at page 10, line 17 ¶ | |||
| unicast traffic. A Track enables replication, elimination and | unicast traffic. A Track enables replication, elimination and | |||
| reordering functions on the way (more on those functions in | reordering functions on the way (more on those functions in | |||
| [RFC8655]. A Track reservation locks physical resources such as | [RFC8655]. A Track reservation locks physical resources such as | |||
| cells and buffers in every node along the DODAG. A Track is | cells and buffers in every node along the DODAG. A Track is | |||
| associated with a owner that can be for instance the destination | associated with a owner that can be for instance the destination | |||
| of the Track. | of the Track. | |||
| TrackID: A TrackID is either globally unique, or locally unique to | TrackID: A TrackID is either globally unique, or locally unique to | |||
| the Track owner, in which case the identification of the owner | the Track owner, in which case the identification of the owner | |||
| must be provided together with the TrackID to provide a full | must be provided together with the TrackID to provide a full | |||
| reference to the Track. If the Track owner is the destination of | reference to the Track. typically, the Track owner is the ingress | |||
| the Track then the destination IP address of packets along the | of the Track then the IPv6 source address of packets along the | |||
| Track can be used as identification of the owner and a local | Track can be used as identification of the owner and a local | |||
| InstanceID [RFC6550] can be used as TrackID. In that case, a RPL | InstanceID [RFC6550] in the namespace of that owner can be used as | |||
| Packet Information [RFC6550] in an IPv6 packet can unambiguously | TrackID. If the Track is reversible, then the owner is found in | |||
| identify the Track and can be expressed in a compressed form using | the IPv6 destination address of a packet coming back along the | |||
| [RFC8138]. | Track. In that case, a RPL Packet Information [RFC6550] in an | |||
| IPv6 packet can unambiguously identify the Track and can be | ||||
| expressed in a compressed form using [RFC8138]. | ||||
| TSCH: A medium access mode of the IEEE Std. 802.15.4 [IEEE802154] | TSCH: A medium access mode of the IEEE Std. 802.15.4 [IEEE802154] | |||
| standard which uses time synchronization to achieve ultra-low- | standard which uses time synchronization to achieve ultra-low- | |||
| power operation, and channel hopping to enable high reliability. | power operation, and channel hopping to enable high reliability. | |||
| TSCH Schedule: A matrix of cells, each cell indexed by a slotOffset | TSCH Schedule: A matrix of cells, each cell indexed by a slotOffset | |||
| and a channelOffset. The TSCH schedule contains all the scheduled | and a channelOffset. The TSCH schedule contains all the scheduled | |||
| cells from all slotframes and is sufficient to qualify the | cells from all slotframes and is sufficient to qualify the | |||
| communication in the TSCH network. The number of channelOffset | communication in the TSCH network. The number of channelOffset | |||
| values (the "height" of the matrix) is equal to the number of | values (the "height" of the matrix) is equal to the number of | |||
| skipping to change at page 43, line 5 ¶ | skipping to change at page 44, line 5 ¶ | |||
| A data frame that is forwarded along a Track normally has a | A data frame that is forwarded along a Track normally has a | |||
| destination MAC address that is set to broadcast - or a multicast | destination MAC address that is set to broadcast - or a multicast | |||
| address depending on MAC support. This way, the MAC layer in the | address depending on MAC support. This way, the MAC layer in the | |||
| intermediate nodes accepts the incoming frame and 6top switches it | intermediate nodes accepts the incoming frame and 6top switches it | |||
| without incurring a change in the MAC header. In the case of IEEE | without incurring a change in the MAC header. In the case of IEEE | |||
| Std. 802.15.4, this means effectively broadcast, so that along the | Std. 802.15.4, this means effectively broadcast, so that along the | |||
| Track the short address for the destination of the frame is set to | Track the short address for the destination of the frame is set to | |||
| 0xFFFF. | 0xFFFF. | |||
| There are 2 modes for a Track, native mode and tunnel mode. | There are 2 modes for a Track, an IPv6 native mode and a protocol- | |||
| independant tunnel mode. | ||||
| 4.6.1.1. Native Mode | 4.6.1.1. Native Mode | |||
| In native mode, the Protocol Data Unit (PDU) is associated with flow- | In native mode, the Protocol Data Unit (PDU) is associated with flow- | |||
| dependent meta-data that refers uniquely to the Track, so the 6top | dependent meta-data that refers uniquely to the Track, so the 6top | |||
| sublayer can place the frame in the appropriate cell without | sublayer can place the frame in the appropriate cell without | |||
| ambiguity. In the case of IPv6 traffic, this flow identification may | ambiguity. In the case of IPv6 traffic, this flow identification may | |||
| be done using a 6-tuple as discussed in [I-D.ietf-detnet-ip]. In | be done using a 6-tuple as discussed in [I-D.ietf-detnet-ip]. In | |||
| particular, implementations of this document should support | particular, implementations of this document should support | |||
| identification of DetNet flows based on the IPv6 Flow Label field. | identification of DetNet flows based on the IPv6 Flow Label field. | |||
| The flow identification may also be done using a dedicated RPL | ||||
| The flow follows a Track which identification is done using a RPL | ||||
| Instance (see section 3.1.3 of [RFC6550]), signaled in a RPL Packet | Instance (see section 3.1.3 of [RFC6550]), signaled in a RPL Packet | |||
| Information (more in section 11.2.2.1 of [RFC6550]). The flow | Information (more in section 11.2.2.1 of [RFC6550]) and the | |||
| identification is validated at egress before restoring the | destination address in the case of a local instance. One or more | |||
| flows may be placed in a same Track and the Track identification | ||||
| (TrackID + owner) may be placed in an IP-in-IP encapsulation. The | ||||
| forwarding operation is based on the Track and does not depend on the | ||||
| flow therein. | ||||
| The Track identification is validated at egress before restoring the | ||||
| destination MAC address (DMAC) and punting to the upper layer. | destination MAC address (DMAC) and punting to the upper layer. | |||
| Figure 12 illustrates the Track Forwarding operation which happens at | Figure 12 illustrates the Track Forwarding operation which happens at | |||
| the 6top sublayer, below IP. | the 6top sublayer, below IP. | |||
| | Packet flowing across the network ^ | | Packet flowing across the network ^ | |||
| +--------------+ | | | +--------------+ | | | |||
| | IPv6 | | | | | IPv6 | | | | |||
| +--------------+ | | | +--------------+ | | | |||
| | 6LoWPAN HC | | | | | 6LoWPAN HC | | | | |||
| skipping to change at page 44, line 29 ¶ | skipping to change at page 45, line 40 ¶ | |||
| +--------------+ | Packet flowing across the network | | +--------------+ | Packet flowing across the network | | |||
| | TSCH MAC | | | | | TSCH MAC | | | | |||
| +--------------+ | DMAC = | DMAC = | +--------------+ | DMAC = | DMAC = | |||
| |ISA100/WiHART | | nexthop v nexthop | |ISA100/WiHART | | nexthop v nexthop | |||
| +--------------+ | +--------------+ | |||
| Source Ingress Egress Destination | Source Ingress Egress Destination | |||
| Stack Layer Node Node Node Node | Stack Layer Node Node Node Node | |||
| Figure 13: Track Forwarding, Tunnel Mode | Figure 13: Track Forwarding, Tunnel Mode | |||
| In that case, the flow information that identifies the Track at the | In that case, the TrackID that identifies the Track at the ingress | |||
| ingress 6TiSCH router is derived from the RX-cell. The DMAC is set | 6TiSCH router is derived from the RX-cell. The DMAC is set to this | |||
| to this node but the flow information indicates that the frame must | node but the TrackID indicates that the frame must be tunneled over a | |||
| be tunneled over a particular Track so the frame is not passed to the | particular Track so the frame is not passed to the upper layer. | |||
| upper layer. Instead, the DMAC is forced to broadcast and the frame | Instead, the DMAC is forced to broadcast and the frame is passed to | |||
| is passed to the 6top sublayer for switching. | the 6top sublayer for switching. | |||
| At the egress 6TiSCH router, the reverse operation occurs. Based on | At the egress 6TiSCH router, the reverse operation occurs. Based on | |||
| tunneling information of the Track, which may for instance indicate | tunneling information of the Track, which may for instance indicate | |||
| that the tunneled datagram is an IP packet, the datagram is passed to | that the tunneled datagram is an IP packet, the datagram is passed to | |||
| the appropriate Link-Layer with the destination MAC restored. | the appropriate Link-Layer with the destination MAC restored. | |||
| 4.6.1.3. Tunneling Information | 4.6.1.3. Tunneling Information | |||
| Tunneling information coming with the Track configuration provides | Tunneling information coming with the Track configuration provides | |||
| the destination MAC address of the egress endpoint as well as the | the destination MAC address of the egress endpoint as well as the | |||
| skipping to change at page 47, line 33 ¶ | skipping to change at page 48, line 40 ¶ | |||
| source to resend the missing fragments selectively. The first | source to resend the missing fragments selectively. The first | |||
| fragment may be resent to carve a new path in case of a path failure. | fragment may be resent to carve a new path in case of a path failure. | |||
| The ECN echo set indicates that the number of outstanding fragments | The ECN echo set indicates that the number of outstanding fragments | |||
| should be reduced. | should be reduced. | |||
| 4.7. Advanced 6TiSCH Routing | 4.7. Advanced 6TiSCH Routing | |||
| 4.7.1. Packet Marking and Handling | 4.7.1. Packet Marking and Handling | |||
| All packets inside a 6TiSCH domain must carry the RPLInstanceID that | All packets inside a 6TiSCH domain must carry the RPLInstanceID that | |||
| identifies the 6TiSCH topology that is to be used for routing and | identifies the 6TiSCH topology (e.g., a Track) that is to be used for | |||
| forwarding that packet. The location of that information must be the | routing and forwarding that packet. The location of that information | |||
| same for all packets forwarded inside the domain. | must be the same for all packets forwarded inside the domain. | |||
| For packets that are routed by a PCE along a Track, the tuple formed | For packets that are routed by a PCE along a Track, the tuple formed | |||
| by the IPv6 source address and a local RPLInstanceID in the packet | by 1) (typically) the IPv6 source or (possibly) destination address | |||
| identify uniquely the Track and associated transmit bundle. | in the IPv6 Header and 2) a local RPLInstanceID in the RPI that | |||
| serves as TrackID, identify uniquely the Track and associated | ||||
| transmit bundle. | ||||
| For packets that are routed by RPL, that information is the | For packets that are routed by RPL, that information is the | |||
| RPLInstanceID which is carried in the RPL Packet Information (RPI), | RPLInstanceID which is carried in the RPL Packet Information (RPI), | |||
| as discussed in section 11.2 of [RFC6550], "Loop Avoidance and | as discussed in section 11.2 of [RFC6550], "Loop Avoidance and | |||
| Detection". The RPI is transported by a RPL option in the IPv6 Hop- | Detection". The RPI is transported by a RPL option in the IPv6 Hop- | |||
| By-Hop Header [RFC6553]. | By-Hop Header [RFC6553]. | |||
| A compression mechanism for the RPL packet artifacts that integrates | A compression mechanism for the RPL packet artifacts that integrates | |||
| the compression of IP-in-IP encapsulation and the Routing Header type | the compression of IP-in-IP encapsulation and the Routing Header type | |||
| 3 [RFC6554] with that of the RPI in a 6LoWPAN dispatch/header type is | 3 [RFC6554] with that of the RPI in a 6LoWPAN dispatch/header type is | |||
| skipping to change at page 59, line 49 ¶ | skipping to change at page 61, line 37 ¶ | |||
| Model in Ad Hoc Networks", RFC 5889, DOI 10.17487/RFC5889, | Model in Ad Hoc Networks", RFC 5889, DOI 10.17487/RFC5889, | |||
| September 2010, <https://www.rfc-editor.org/info/rfc5889>. | September 2010, <https://www.rfc-editor.org/info/rfc5889>. | |||
| [RFC8655] Finn, N., Thubert, P., Varga, B., and J. Farkas, | [RFC8655] Finn, N., Thubert, P., Varga, B., and J. Farkas, | |||
| "Deterministic Networking Architecture", RFC 8655, | "Deterministic Networking Architecture", RFC 8655, | |||
| DOI 10.17487/RFC8655, October 2019, | DOI 10.17487/RFC8655, October 2019, | |||
| <https://www.rfc-editor.org/info/rfc8655>. | <https://www.rfc-editor.org/info/rfc8655>. | |||
| [MIN-SECURITY] | [MIN-SECURITY] | |||
| Vucinic, M., Simon, J., Pister, K., and M. Richardson, | Vucinic, M., Simon, J., Pister, K., and M. Richardson, | |||
| "Minimal Security Framework for 6TiSCH", Work in Progress, | "Constrained Join Protocol (CoJP) for 6TiSCH", Work in | |||
| Internet-Draft, draft-ietf-6tisch-minimal-security-12, 29 | Progress, Internet-Draft, draft-ietf-6tisch-minimal- | |||
| July 2019, <https://tools.ietf.org/html/draft-ietf-6tisch- | security-15, 10 December 2019, | |||
| minimal-security-12>. | <https://tools.ietf.org/html/draft-ietf-6tisch-minimal- | |||
| security-15>. | ||||
| [6BBR-DRAFT] | [6BBR-DRAFT] | |||
| Thubert, P., Perkins, C., and E. Levy-Abegnoli, "IPv6 | Thubert, P., Perkins, C., and E. Levy-Abegnoli, "IPv6 | |||
| Backbone Router", Work in Progress, Internet-Draft, draft- | Backbone Router", Work in Progress, Internet-Draft, draft- | |||
| ietf-6lo-backbone-router-13, 26 September 2019, | ietf-6lo-backbone-router-20, 23 March 2020, | |||
| <https://tools.ietf.org/html/draft-ietf-6lo-backbone- | <https://tools.ietf.org/html/draft-ietf-6lo-backbone- | |||
| router-13>. | router-20>. | |||
| [RECOV-FRAG] | [RECOV-FRAG] | |||
| Thubert, P., "6LoWPAN Selective Fragment Recovery", Work | Thubert, P., "6LoWPAN Selective Fragment Recovery", Work | |||
| in Progress, Internet-Draft, draft-ietf-6lo-fragment- | in Progress, Internet-Draft, draft-ietf-6lo-fragment- | |||
| recovery-05, 22 July 2019, <https://tools.ietf.org/html/ | recovery-21, 23 March 2020, <https://tools.ietf.org/html/ | |||
| draft-ietf-6lo-fragment-recovery-05>. | draft-ietf-6lo-fragment-recovery-21>. | |||
| [MIN-FRAG] Watteyne, T., Bormann, C., and P. Thubert, "6LoWPAN | [MIN-FRAG] Watteyne, T., Thubert, P., and C. Bormann, "On Forwarding | |||
| Fragment Forwarding", Work in Progress, Internet-Draft, | 6LoWPAN Fragments over a Multihop IPv6 Network", Work in | |||
| draft-ietf-6lo-minimal-fragment-04, 2 September 2019, | Progress, Internet-Draft, draft-ietf-6lo-minimal-fragment- | |||
| <https://tools.ietf.org/html/draft-ietf-6lo-minimal- | 15, 23 March 2020, <https://tools.ietf.org/html/draft- | |||
| fragment-04>. | ietf-6lo-minimal-fragment-15>. | |||
| [AP-ND] Thubert, P., Sarikaya, B., Sethi, M., and R. Struik, | [AP-ND] Thubert, P., Sarikaya, B., Sethi, M., and R. Struik, | |||
| "Address Protected Neighbor Discovery for Low-power and | "Address Protected Neighbor Discovery for Low-power and | |||
| Lossy Networks", Work in Progress, Internet-Draft, draft- | Lossy Networks", Work in Progress, Internet-Draft, draft- | |||
| ietf-6lo-ap-nd-12, 10 April 2019, | ietf-6lo-ap-nd-23, 30 April 2020, | |||
| <https://tools.ietf.org/html/draft-ietf-6lo-ap-nd-12>. | <https://tools.ietf.org/html/draft-ietf-6lo-ap-nd-23>. | |||
| [USEofRPLinfo] | [USEofRPLinfo] | |||
| Robles, I., Richardson, M., and P. Thubert, "Using RPL | Robles, I., Richardson, M., and P. Thubert, "Using RPI | |||
| Option Type, Routing Header for Source Routes and IPv6-in- | Option Type, Routing Header for Source Routes and IPv6-in- | |||
| IPv6 encapsulation in the RPL Data Plane", Work in | IPv6 encapsulation in the RPL Data Plane", Work in | |||
| Progress, Internet-Draft, draft-ietf-roll-useofrplinfo-31, | Progress, Internet-Draft, draft-ietf-roll-useofrplinfo-42, | |||
| 7 August 2019, <https://tools.ietf.org/html/draft-ietf- | 12 November 2020, <https://tools.ietf.org/html/draft-ietf- | |||
| roll-useofrplinfo-31>. | roll-useofrplinfo-42>. | |||
| [RUL-DRAFT] | [RUL-DRAFT] | |||
| Thubert, P. and M. Richardson, "Routing for RPL Leaves", | Thubert, P. and M. Richardson, "Routing for RPL Leaves", | |||
| Work in Progress, Internet-Draft, draft-ietf-roll-unaware- | Work in Progress, Internet-Draft, draft-ietf-roll-unaware- | |||
| leaves-04, 9 September 2019, <https://tools.ietf.org/html/ | leaves-23, 10 November 2020, <https://tools.ietf.org/html/ | |||
| draft-ietf-roll-unaware-leaves-04>. | draft-ietf-roll-unaware-leaves-23>. | |||
| [ENH-BEACON] | [ENH-BEACON] | |||
| Dujovne, D. and M. Richardson, "IEEE802.15.4 Informational | Dujovne, D. and M. Richardson, "IEEE 802.15.4 Information | |||
| Element encapsulation of 6tisch Join and Enrollment | Element encapsulation of 6TiSCH Join and Enrollment | |||
| Information", Work in Progress, Internet-Draft, draft- | Information", Work in Progress, Internet-Draft, draft- | |||
| ietf-6tisch-enrollment-enhanced-beacon-05, 16 September | ietf-6tisch-enrollment-enhanced-beacon-14, 21 February | |||
| 2019, <https://tools.ietf.org/html/draft-ietf-6tisch- | 2020, <https://tools.ietf.org/html/draft-ietf-6tisch- | |||
| enrollment-enhanced-beacon-05>. | enrollment-enhanced-beacon-14>. | |||
| [MSF] Chang, T., Vucinic, M., Vilajosana, X., Duquennoy, S., and | [MSF] Chang, T., Vucinic, M., Vilajosana, X., Duquennoy, S., and | |||
| D. Dujovne, "6TiSCH Minimal Scheduling Function (MSF)", | D. Dujovne, "6TiSCH Minimal Scheduling Function (MSF)", | |||
| Work in Progress, Internet-Draft, draft-ietf-6tisch-msf- | Work in Progress, Internet-Draft, draft-ietf-6tisch-msf- | |||
| 07, 17 October 2019, | 18, 12 September 2020, | |||
| <https://tools.ietf.org/html/draft-ietf-6tisch-msf-07>. | <https://tools.ietf.org/html/draft-ietf-6tisch-msf-18>. | |||
| 9. Informative References | 9. Informative References | |||
| [RFC5340] Coltun, R., Ferguson, D., Moy, J., and A. Lindem, "OSPF | [RFC5340] Coltun, R., Ferguson, D., Moy, J., and A. Lindem, "OSPF | |||
| for IPv6", RFC 5340, DOI 10.17487/RFC5340, July 2008, | for IPv6", RFC 5340, DOI 10.17487/RFC5340, July 2008, | |||
| <https://www.rfc-editor.org/info/rfc5340>. | <https://www.rfc-editor.org/info/rfc5340>. | |||
| [RFC6275] Perkins, C., Ed., Johnson, D., and J. Arkko, "Mobility | [RFC6275] Perkins, C., Ed., Johnson, D., and J. Arkko, "Mobility | |||
| Support in IPv6", RFC 6275, DOI 10.17487/RFC6275, July | Support in IPv6", RFC 6275, DOI 10.17487/RFC6275, July | |||
| 2011, <https://www.rfc-editor.org/info/rfc6275>. | 2011, <https://www.rfc-editor.org/info/rfc6275>. | |||
| skipping to change at page 63, line 32 ¶ | skipping to change at page 65, line 21 ¶ | |||
| V. Mercieca, "Ad Hoc On-demand Distance Vector Version 2 | V. Mercieca, "Ad Hoc On-demand Distance Vector Version 2 | |||
| (AODVv2) Routing", Work in Progress, Internet-Draft, | (AODVv2) Routing", Work in Progress, Internet-Draft, | |||
| draft-ietf-manet-aodvv2-16, 4 May 2016, | draft-ietf-manet-aodvv2-16, 4 May 2016, | |||
| <https://tools.ietf.org/html/draft-ietf-manet-aodvv2-16>. | <https://tools.ietf.org/html/draft-ietf-manet-aodvv2-16>. | |||
| [RFC8578] Grossman, E., Ed., "Deterministic Networking Use Cases", | [RFC8578] Grossman, E., Ed., "Deterministic Networking Use Cases", | |||
| RFC 8578, DOI 10.17487/RFC8578, May 2019, | RFC 8578, DOI 10.17487/RFC8578, May 2019, | |||
| <https://www.rfc-editor.org/info/rfc8578>. | <https://www.rfc-editor.org/info/rfc8578>. | |||
| [I-D.ietf-detnet-ip] | [I-D.ietf-detnet-ip] | |||
| Varga, B., Farkas, J., Berger, L., Fedyk, D., Malis, A., | Varga, B., Farkas, J., Berger, L., Fedyk, D., and S. | |||
| Bryant, S., and J. Korhonen, "DetNet Data Plane: IP", Work | Bryant, "DetNet Data Plane: IP", Work in Progress, | |||
| in Progress, Internet-Draft, draft-ietf-detnet-ip-01, 1 | Internet-Draft, draft-ietf-detnet-ip-07, 3 July 2020, | |||
| July 2019, | <https://tools.ietf.org/html/draft-ietf-detnet-ip-07>. | |||
| <https://tools.ietf.org/html/draft-ietf-detnet-ip-01>. | ||||
| [I-D.ietf-anima-bootstrapping-keyinfra] | [I-D.ietf-anima-bootstrapping-keyinfra] | |||
| Pritikin, M., Richardson, M., Eckert, T., Behringer, M., | Pritikin, M., Richardson, M., Eckert, T., Behringer, M., | |||
| and K. Watsen, "Bootstrapping Remote Secure Key | and K. Watsen, "Bootstrapping Remote Secure Key | |||
| Infrastructures (BRSKI)", Work in Progress, Internet- | Infrastructures (BRSKI)", Work in Progress, Internet- | |||
| Draft, draft-ietf-anima-bootstrapping-keyinfra-28, 19 | Draft, draft-ietf-anima-bootstrapping-keyinfra-45, 11 | |||
| September 2019, <https://tools.ietf.org/html/draft-ietf- | November 2020, <https://tools.ietf.org/html/draft-ietf- | |||
| anima-bootstrapping-keyinfra-28>. | anima-bootstrapping-keyinfra-45>. | |||
| [I-D.ietf-roll-aodv-rpl] | [I-D.ietf-roll-aodv-rpl] | |||
| Anamalamudi, S., Zhang, M., Perkins, C., Anand, S., and B. | Anamalamudi, S., Zhang, M., Perkins, C., Anand, S., and B. | |||
| Liu, "Asymmetric AODV-P2P-RPL in Low-Power and Lossy | Liu, "AODV based RPL Extensions for Supporting Asymmetric | |||
| Networks (LLNs)", Work in Progress, Internet-Draft, draft- | P2P Links in Low-Power and Lossy Networks", Work in | |||
| ietf-roll-aodv-rpl-07, 12 April 2019, | Progress, Internet-Draft, draft-ietf-roll-aodv-rpl-08, 7 | |||
| <https://tools.ietf.org/html/draft-ietf-roll-aodv-rpl-07>. | May 2020, | |||
| <https://tools.ietf.org/html/draft-ietf-roll-aodv-rpl-08>. | ||||
| [I-D.ietf-lwig-6lowpan-virtual-reassembly] | [I-D.ietf-lwig-6lowpan-virtual-reassembly] | |||
| Bormann, C. and T. Watteyne, "Virtual reassembly buffers | Bormann, C. and T. Watteyne, "Virtual reassembly buffers | |||
| in 6LoWPAN", Work in Progress, Internet-Draft, draft-ietf- | in 6LoWPAN", Work in Progress, Internet-Draft, draft-ietf- | |||
| lwig-6lowpan-virtual-reassembly-01, 11 March 2019, | lwig-6lowpan-virtual-reassembly-02, 9 March 2020, | |||
| <https://tools.ietf.org/html/draft-ietf-lwig-6lowpan- | <https://tools.ietf.org/html/draft-ietf-lwig-6lowpan- | |||
| virtual-reassembly-01>. | virtual-reassembly-02>. | |||
| [I-D.ietf-roll-dao-projection] | [I-D.ietf-roll-dao-projection] | |||
| Thubert, P., Jadhav, R., Gillmore, M., and J. Pylakutty, | Thubert, P., Jadhav, R., and M. Gillmore, "Root initiated | |||
| "Root initiated routing state in RPL", Work in Progress, | routing state in RPL", Work in Progress, Internet-Draft, | |||
| Internet-Draft, draft-ietf-roll-dao-projection-06, 24 May | draft-ietf-roll-dao-projection-14, 2 October 2020, | |||
| 2019, <https://tools.ietf.org/html/draft-ietf-roll-dao- | <https://tools.ietf.org/html/draft-ietf-roll-dao- | |||
| projection-06>. | projection-14>. | |||
| [I-D.rahul-roll-mop-ext] | [I-D.rahul-roll-mop-ext] | |||
| Jadhav, R. and P. Thubert, "RPL Mode of Operation | Jadhav, R. and P. Thubert, "RPL Mode of Operation | |||
| extension", Work in Progress, Internet-Draft, draft-rahul- | extension", Work in Progress, Internet-Draft, draft-rahul- | |||
| roll-mop-ext-01, 9 June 2019, | roll-mop-ext-01, 9 June 2019, | |||
| <https://tools.ietf.org/html/draft-rahul-roll-mop-ext-01>. | <https://tools.ietf.org/html/draft-rahul-roll-mop-ext-01>. | |||
| [I-D.selander-ace-cose-ecdhe] | [I-D.selander-ace-cose-ecdhe] | |||
| Selander, G., Mattsson, J., and F. Palombini, "Ephemeral | Selander, G., Mattsson, J., and F. Palombini, "Ephemeral | |||
| Diffie-Hellman Over COSE (EDHOC)", Work in Progress, | Diffie-Hellman Over COSE (EDHOC)", Work in Progress, | |||
| skipping to change at page 65, line 15 ¶ | skipping to change at page 67, line 8 ¶ | |||
| [I-D.thubert-6man-unicast-lookup] | [I-D.thubert-6man-unicast-lookup] | |||
| Thubert, P. and E. Levy-Abegnoli, "IPv6 Neighbor Discovery | Thubert, P. and E. Levy-Abegnoli, "IPv6 Neighbor Discovery | |||
| Unicast Lookup", Work in Progress, Internet-Draft, draft- | Unicast Lookup", Work in Progress, Internet-Draft, draft- | |||
| thubert-6man-unicast-lookup-00, 29 July 2019, | thubert-6man-unicast-lookup-00, 29 July 2019, | |||
| <https://tools.ietf.org/html/draft-thubert-6man-unicast- | <https://tools.ietf.org/html/draft-thubert-6man-unicast- | |||
| lookup-00>. | lookup-00>. | |||
| [I-D.pthubert-raw-problem-statement] | [I-D.pthubert-raw-problem-statement] | |||
| Thubert, P. and G. Papadopoulos, "Reliable and Available | Thubert, P. and G. Papadopoulos, "Reliable and Available | |||
| Wireless Problem Statement", Work in Progress, Internet- | Wireless Problem Statement", Work in Progress, Internet- | |||
| Draft, draft-pthubert-raw-problem-statement-03, 8 October | Draft, draft-pthubert-raw-problem-statement-04, 23 October | |||
| 2019, <https://tools.ietf.org/html/draft-pthubert-raw- | 2019, <https://tools.ietf.org/html/draft-pthubert-raw- | |||
| problem-statement-03>. | problem-statement-04>. | |||
| [I-D.tiloca-6tisch-robust-scheduling] | [I-D.tiloca-6tisch-robust-scheduling] | |||
| Tiloca, M., Duquennoy, S., and G. Dini, "Robust Scheduling | Tiloca, M., Duquennoy, S., and G. Dini, "Robust Scheduling | |||
| against Selective Jamming in 6TiSCH Networks", Work in | against Selective Jamming in 6TiSCH Networks", Work in | |||
| Progress, Internet-Draft, draft-tiloca-6tisch-robust- | Progress, Internet-Draft, draft-tiloca-6tisch-robust- | |||
| scheduling-02, 10 June 2019, <https://tools.ietf.org/html/ | scheduling-02, 10 June 2019, <https://tools.ietf.org/html/ | |||
| draft-tiloca-6tisch-robust-scheduling-02>. | draft-tiloca-6tisch-robust-scheduling-02>. | |||
| [I-D.ietf-ace-coap-est] | [I-D.ietf-ace-coap-est] | |||
| Stok, P., Kampanakis, P., Richardson, M., and S. Raza, | Stok, P., Kampanakis, P., Richardson, M., and S. Raza, | |||
| "EST over secure CoAP (EST-coaps)", Work in Progress, | "EST over secure CoAP (EST-coaps)", Work in Progress, | |||
| Internet-Draft, draft-ietf-ace-coap-est-15, 1 October | Internet-Draft, draft-ietf-ace-coap-est-18, 6 January | |||
| 2019, | 2020, | |||
| <https://tools.ietf.org/html/draft-ietf-ace-coap-est-15>. | <https://tools.ietf.org/html/draft-ietf-ace-coap-est-18>. | |||
| [I-D.ietf-anima-constrained-voucher] | [I-D.ietf-anima-constrained-voucher] | |||
| Richardson, M., Stok, P., and P. Kampanakis, "Constrained | Richardson, M., Stok, P., and P. Kampanakis, "Constrained | |||
| Voucher Artifacts for Bootstrapping Protocols", Work in | Voucher Artifacts for Bootstrapping Protocols", Work in | |||
| Progress, Internet-Draft, draft-ietf-anima-constrained- | Progress, Internet-Draft, draft-ietf-anima-constrained- | |||
| voucher-05, 8 July 2019, <https://tools.ietf.org/html/ | voucher-09, 2 November 2020, <https://tools.ietf.org/html/ | |||
| draft-ietf-anima-constrained-voucher-05>. | draft-ietf-anima-constrained-voucher-09>. | |||
| [IEEE802154] | [IEEE802154] | |||
| IEEE standard for Information Technology, "IEEE Std. | IEEE standard for Information Technology, "IEEE Std. | |||
| 802.15.4, Part. 15.4: Wireless Medium Access Control (MAC) | 802.15.4, Part. 15.4: Wireless Medium Access Control (MAC) | |||
| and Physical Layer (PHY) Specifications for Low-Rate | and Physical Layer (PHY) Specifications for Low-Rate | |||
| Wireless Personal Area Networks", October 2019. | Wireless Personal Area Networks". | |||
| [CCMstar] Struik, R., "Formal Specification of the CCM* Mode of | [CCMstar] Struik, R., "Formal Specification of the CCM* Mode of | |||
| Operation", September 2004, <www.ieee802.org/15/ | Operation", September 2004, <www.ieee802.org/15/ | |||
| pub/2004/15-04-0537-00-004b-formal-specification-ccm-star- | pub/2004/15-04-0537-00-004b-formal-specification-ccm-star- | |||
| mode-operation.doc>. | mode-operation.doc>. | |||
| [IEEE802154e] | [IEEE802154e] | |||
| IEEE standard for Information Technology, "IEEE standard | IEEE standard for Information Technology, "IEEE standard | |||
| for Information Technology, IEEE Std. 802.15.4, Part. | for Information Technology, IEEE Std. 802.15.4, Part. | |||
| 15.4: Wireless Medium Access Control (MAC) and Physical | 15.4: Wireless Medium Access Control (MAC) and Physical | |||
| skipping to change at page 66, line 19 ¶ | skipping to change at page 68, line 12 ¶ | |||
| Networks (LR-WPANs) Amendment 1: MAC sublayer", April | Networks (LR-WPANs) Amendment 1: MAC sublayer", April | |||
| 2012. | 2012. | |||
| [WirelessHART] | [WirelessHART] | |||
| www.hartcomm.org, "Industrial Communication Networks - | www.hartcomm.org, "Industrial Communication Networks - | |||
| Wireless Communication Network and Communication Profiles | Wireless Communication Network and Communication Profiles | |||
| - WirelessHART - IEC 62591", 2010. | - WirelessHART - IEC 62591", 2010. | |||
| [HART] www.hartcomm.org, "Highway Addressable remote Transducer, | [HART] www.hartcomm.org, "Highway Addressable remote Transducer, | |||
| a group of specifications for industrial process and | a group of specifications for industrial process and | |||
| control devices administered by the HART Foundation", | control devices administered by the HART Foundation". | |||
| October 2019. | ||||
| [ISA100.11a] | [ISA100.11a] | |||
| ISA/ANSI, "Wireless Systems for Industrial Automation: | ISA/ANSI, "Wireless Systems for Industrial Automation: | |||
| Process Control and Related Applications - ISA100.11a-2011 | Process Control and Related Applications - ISA100.11a-2011 | |||
| - IEC 62734", 2011, <http://www.isa.org/Community/ | - IEC 62734", 2011, <http://www.isa.org/Community/ | |||
| SP100WirelessSystemsforAutomation>. | SP100WirelessSystemsforAutomation>. | |||
| [ISA100] ISA/ANSI, "ISA100, Wireless Systems for Automation", | [ISA100] ISA/ANSI, "ISA100, Wireless Systems for Automation", | |||
| October 2019, <https://www.isa.org/isa100/>. | <https://www.isa.org/isa100/>. | |||
| [TEAS] IETF, "Traffic Engineering Architecture and Signaling", | [TEAS] IETF, "Traffic Engineering Architecture and Signaling", | |||
| October 2019, | ||||
| <https://dataTracker.ietf.org/doc/charter-ietf-teas/>. | <https://dataTracker.ietf.org/doc/charter-ietf-teas/>. | |||
| [ANIMA] IETF, "Autonomic Networking Integrated Model and | [ANIMA] IETF, "Autonomic Networking Integrated Model and | |||
| Approach", October 2019, | Approach", | |||
| <https://dataTracker.ietf.org/doc/charter-ietf-anima/>. | <https://dataTracker.ietf.org/doc/charter-ietf-anima/>. | |||
| [PCE] IETF, "Path Computation Element", October 2019, | [PCE] IETF, "Path Computation Element", | |||
| <https://dataTracker.ietf.org/doc/charter-ietf-pce/>. | <https://dataTracker.ietf.org/doc/charter-ietf-pce/>. | |||
| [CCAMP] IETF, "Common Control and Measurement Plane", October | [CCAMP] IETF, "Common Control and Measurement Plane", | |||
| 2019, | ||||
| <https://dataTracker.ietf.org/doc/charter-ietf-ccamp/>. | <https://dataTracker.ietf.org/doc/charter-ietf-ccamp/>. | |||
| [AMI] US Department of Energy, "Advanced Metering Infrastructure | [AMI] US Department of Energy, "Advanced Metering Infrastructure | |||
| and Customer Systems", 2006, | and Customer Systems", 2006, | |||
| <https://www.energy.gov/sites/prod/files/2016/12/f34/ | <https://www.energy.gov/sites/prod/files/2016/12/f34/ | |||
| AMI%20Summary%20Report_09-26-16.pdf>. | AMI%20Summary%20Report_09-26-16.pdf>. | |||
| [S-ALOHA] Roberts, L. G., "ALOHA Packet System With and Without | [S-ALOHA] Roberts, L. G., "ALOHA Packet System With and Without | |||
| Slots and Capture", doi 10.1145/1024916.1024920, April | Slots and Capture", doi 10.1145/1024916.1024920, April | |||
| 1975, <https://dl.acm.org/citation.cfm?id=1024920>. | 1975, <https://dl.acm.org/citation.cfm?id=1024920>. | |||
| skipping to change at page 69, line 18 ¶ | skipping to change at page 71, line 9 ¶ | |||
| management of resources that are controlled by heterogeneous | management of resources that are controlled by heterogeneous | |||
| protocols such as ISA100.11a [ISA100.11a], WirelessHART | protocols such as ISA100.11a [ISA100.11a], WirelessHART | |||
| [WirelessHART], and 6TiSCH. Interestingly, the establishment of | [WirelessHART], and 6TiSCH. Interestingly, the establishment of | |||
| 6TiSCH Deterministic paths, called Tracks, are also in scope, and | 6TiSCH Deterministic paths, called Tracks, are also in scope, and | |||
| ISA100.20 is working on requirements for DetNet. | ISA100.20 is working on requirements for DetNet. | |||
| Author's Address | Author's Address | |||
| Pascal Thubert (editor) | Pascal Thubert (editor) | |||
| Cisco Systems, Inc | Cisco Systems, Inc | |||
| Building D, 45 Allee des Ormes - BP1200 | Building D | |||
| 45 Allee des Ormes - BP1200 | ||||
| 06254 Mougins - Sophia Antipolis | 06254 Mougins - Sophia Antipolis | |||
| France | France | |||
| Phone: +33 497 23 26 34 | Phone: +33 497 23 26 34 | |||
| Email: pthubert@cisco.com | Email: pthubert@cisco.com | |||
| End of changes. 43 change blocks. | ||||
| 150 lines changed or deleted | 161 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||