| < draft-ietf-raw-technologies-01.txt | draft-ietf-raw-technologies-02.txt > | |||
|---|---|---|---|---|
| RAW P. Thubert, Ed. | RAW P. Thubert, Ed. | |||
| Internet-Draft Cisco Systems | Internet-Draft Cisco Systems | |||
| Intended status: Informational D. Cavalcanti | Intended status: Informational D. Cavalcanti | |||
| Expires: 23 August 2021 Intel | Expires: 9 December 2021 Intel | |||
| X. Vilajosana | X. Vilajosana | |||
| Universitat Oberta de Catalunya | Universitat Oberta de Catalunya | |||
| C. Schmitt | C. Schmitt | |||
| Research Institute CODE, UniBwM | Research Institute CODE, UniBwM | |||
| J. Farkas | J. Farkas | |||
| Ericsson | Ericsson | |||
| 19 February 2021 | 7 June 2021 | |||
| Reliable and Available Wireless Technologies | Reliable and Available Wireless Technologies | |||
| draft-ietf-raw-technologies-01 | draft-ietf-raw-technologies-02 | |||
| Abstract | Abstract | |||
| This document presents a series of recent technologies that are | This document presents a series of recent technologies that are | |||
| capable of time synchronization and scheduling of transmission, | capable of time synchronization and scheduling of transmission, | |||
| making them suitable to carry time-sensitive flows with high | making them suitable to carry time-sensitive flows with high | |||
| reliability and availability. | reliability and availability. | |||
| Status of This Memo | Status of This Memo | |||
| skipping to change at page 1, line 40 ¶ | skipping to change at page 1, line 40 ¶ | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at https://datatracker.ietf.org/drafts/current/. | Drafts is at https://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on 23 August 2021. | This Internet-Draft will expire on 9 December 2021. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2021 IETF Trust and the persons identified as the | Copyright (c) 2021 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents (https://trustee.ietf.org/ | Provisions Relating to IETF Documents (https://trustee.ietf.org/ | |||
| license-info) in effect on the date of publication of this document. | license-info) in effect on the date of publication of this document. | |||
| skipping to change at page 2, line 34 ¶ | skipping to change at page 2, line 34 ¶ | |||
| 4.3.1. General Characteristics . . . . . . . . . . . . . . . 11 | 4.3.1. General Characteristics . . . . . . . . . . . . . . . 11 | |||
| 4.3.2. Applicability to deterministic flows . . . . . . . . 11 | 4.3.2. Applicability to deterministic flows . . . . . . . . 11 | |||
| 4.4. 802.11ad and 802.11ay (mmWave operation) . . . . . . . . 12 | 4.4. 802.11ad and 802.11ay (mmWave operation) . . . . . . . . 12 | |||
| 4.4.1. General Characteristics . . . . . . . . . . . . . . . 13 | 4.4.1. General Characteristics . . . . . . . . . . . . . . . 13 | |||
| 4.4.2. Applicability to deterministic flows . . . . . . . . 13 | 4.4.2. Applicability to deterministic flows . . . . . . . . 13 | |||
| 5. IEEE 802.15.4 . . . . . . . . . . . . . . . . . . . . . . . . 13 | 5. IEEE 802.15.4 . . . . . . . . . . . . . . . . . . . . . . . . 13 | |||
| 5.1. Provenance and Documents . . . . . . . . . . . . . . . . 13 | 5.1. Provenance and Documents . . . . . . . . . . . . . . . . 13 | |||
| 5.2. TimeSlotted Channel Hopping . . . . . . . . . . . . . . . 15 | 5.2. TimeSlotted Channel Hopping . . . . . . . . . . . . . . . 15 | |||
| 5.2.1. General Characteristics . . . . . . . . . . . . . . . 15 | 5.2.1. General Characteristics . . . . . . . . . . . . . . . 15 | |||
| 5.2.2. Applicability to Deterministic Flows . . . . . . . . 17 | 5.2.2. Applicability to Deterministic Flows . . . . . . . . 17 | |||
| 6. 5G . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 | 6. 5G . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 | |||
| 6.1. Provenance and Documents . . . . . . . . . . . . . . . . 31 | 6.1. Provenance and Documents . . . . . . . . . . . . . . . . 30 | |||
| 6.2. General Characteristics . . . . . . . . . . . . . . . . . 33 | 6.2. General Characteristics . . . . . . . . . . . . . . . . . 32 | |||
| 6.3. Deployment and Spectrum . . . . . . . . . . . . . . . . . 34 | 6.3. Deployment and Spectrum . . . . . . . . . . . . . . . . . 33 | |||
| 6.4. Applicability to Deterministic Flows . . . . . . . . . . 35 | 6.4. Applicability to Deterministic Flows . . . . . . . . . . 34 | |||
| 6.4.1. System Architecture . . . . . . . . . . . . . . . . . 35 | 6.4.1. System Architecture . . . . . . . . . . . . . . . . . 34 | |||
| 6.4.2. Overview of The Radio Protocol Stack . . . . . . . . 37 | 6.4.2. Overview of The Radio Protocol Stack . . . . . . . . 36 | |||
| 6.4.3. Radio (PHY) . . . . . . . . . . . . . . . . . . . . . 38 | 6.4.3. Radio (PHY) . . . . . . . . . . . . . . . . . . . . . 37 | |||
| 6.4.4. Scheduling and QoS (MAC) . . . . . . . . . . . . . . 40 | 6.4.4. Scheduling and QoS (MAC) . . . . . . . . . . . . . . 39 | |||
| 6.4.5. Time-Sensitive Networking (TSN) Integration . . . . . 42 | 6.4.5. Time-Sensitive Networking (TSN) Integration . . . . . 41 | |||
| 6.5. Summary . . . . . . . . . . . . . . . . . . . . . . . . . 45 | 6.5. Summary . . . . . . . . . . . . . . . . . . . . . . . . . 45 | |||
| 7. L-band Digital Aeronautical Communications System . . . . . . 46 | 7. L-band Digital Aeronautical Communications System . . . . . . 46 | |||
| 7.1. Provenance and Documents . . . . . . . . . . . . . . . . 47 | 7.1. Provenance and Documents . . . . . . . . . . . . . . . . 47 | |||
| 7.2. General Characteristics . . . . . . . . . . . . . . . . . 48 | 7.2. General Characteristics . . . . . . . . . . . . . . . . . 48 | |||
| 7.3. Deployment and Spectrum . . . . . . . . . . . . . . . . . 49 | 7.3. Deployment and Spectrum . . . . . . . . . . . . . . . . . 49 | |||
| 7.4. Applicability to Deterministic Flows . . . . . . . . . . 49 | 7.4. Applicability to Deterministic Flows . . . . . . . . . . 49 | |||
| 7.4.1. System Architecture . . . . . . . . . . . . . . . . . 50 | 7.4.1. System Architecture . . . . . . . . . . . . . . . . . 50 | |||
| 7.4.2. Overview of The Radio Protocol Stack . . . . . . . . 50 | 7.4.2. Overview of The Radio Protocol Stack . . . . . . . . 50 | |||
| 7.4.3. Radio (PHY) . . . . . . . . . . . . . . . . . . . . . 51 | 7.4.3. Radio (PHY) . . . . . . . . . . . . . . . . . . . . . 51 | |||
| 7.4.4. Scheduling, Frame Structure and QoS (MAC) . . . . . . 52 | 7.4.4. Scheduling, Frame Structure and QoS (MAC) . . . . . . 52 | |||
| skipping to change at page 4, line 23 ¶ | skipping to change at page 4, line 23 ¶ | |||
| and retries. ARQ is a typical model at Layer-2 on a wireless | and retries. ARQ is a typical model at Layer-2 on a wireless | |||
| medium. It is typically avoided end-to-end on deterministic flows | medium. It is typically avoided end-to-end on deterministic flows | |||
| because it introduces excessive indetermination in latency, but a | because it introduces excessive indetermination in latency, but a | |||
| limited number of retries within a bounded time may be used over a | limited number of retries within a bounded time may be used over a | |||
| wireless link and yet respect end-to-end constraints. | wireless link and yet respect end-to-end constraints. | |||
| Available: That is exempt of unscheduled outage, the expectation for | Available: That is exempt of unscheduled outage, the expectation for | |||
| a network being that the flow is maintained in the face of any | a network being that the flow is maintained in the face of any | |||
| single breakage. | single breakage. | |||
| Deterministic Networking We refer to section 2 of [RFC8557] for this | ||||
| term. | ||||
| FEC: Forward error correction, sending redundant coded data to help | FEC: Forward error correction, sending redundant coded data to help | |||
| the receiver recover transmission errors without the delays | the receiver recover transmission errors without the delays | |||
| incurred with ARQ. | incurred with ARQ. | |||
| HARQ: Hybrid ARQ, a combination of FEC and ARQ. | HARQ: Hybrid ARQ, a combination of FEC and ARQ. | |||
| PCE: Path Computation Element. | PCE: Path Computation Element. | |||
| PAREO (functions): the wireless extension of DetNet PREOF. PAREO | PAREO (functions): the wireless extension of DetNet PREOF. PAREO | |||
| functions include scheduled ARQ at selected hops, and expect the | functions include scheduled ARQ at selected hops, and expect the | |||
| skipping to change at page 14, line 28 ¶ | skipping to change at page 14, line 28 ¶ | |||
| capabilities provided by TSCH. The group designed the essential | capabilities provided by TSCH. The group designed the essential | |||
| mechanisms to enable the management plane operation while ensuring | mechanisms to enable the management plane operation while ensuring | |||
| IPv6 is supported. Yet the charter did not focus to providing a | IPv6 is supported. Yet the charter did not focus to providing a | |||
| solution to establish end to end Tracks while meeting quality of | solution to establish end to end Tracks while meeting quality of | |||
| service requirements. 6TiSCH, through the RFC8480 [RFC8480] defines | service requirements. 6TiSCH, through the RFC8480 [RFC8480] defines | |||
| the 6P protocol which provides a pairwise negotiation mechanism to | the 6P protocol which provides a pairwise negotiation mechanism to | |||
| the control plane operation. The protocol supports agreement on a | the control plane operation. The protocol supports agreement on a | |||
| schedule between neighbors, enabling distributed scheduling. 6P goes | schedule between neighbors, enabling distributed scheduling. 6P goes | |||
| hand-in-hand with a Scheduling Function (SF), the policy that decides | hand-in-hand with a Scheduling Function (SF), the policy that decides | |||
| how to maintain cells and trigger 6P transactions. The Minimal | how to maintain cells and trigger 6P transactions. The Minimal | |||
| Scheduling Function (MSF) [I-D.ietf-6tisch-msf] is the default SF | Scheduling Function (MSF) [RFC9033] is the default SF defined by the | |||
| defined by the 6TiSCH WG; other standardized SFs can be defined in | 6TiSCH WG; other standardized SFs can be defined in the future. MSF | |||
| the future. MSF extends the minimal schedule configuration, and is | extends the minimal schedule configuration, and is used to add child- | |||
| used to add child-parent links according to the traffic load. | parent links according to the traffic load. | |||
| Time sensitive networking on low power constrained wireless networks | Time sensitive networking on low power constrained wireless networks | |||
| have been partially addressed by ISA100.11a [ISA100.11a] and | have been partially addressed by ISA100.11a [ISA100.11a] and | |||
| WirelessHART [WirelessHART]. Both technologies involve a central | WirelessHART [WirelessHART]. Both technologies involve a central | |||
| controller that computes redundant paths for industrial process | controller that computes redundant paths for industrial process | |||
| control traffic over a TSCH mesh. Moreover, ISA100.11a introduces | control traffic over a TSCH mesh. Moreover, ISA100.11a introduces | |||
| IPv6 capabilities with a Link-Local Address for the join process and | IPv6 capabilities with a Link-Local Address for the join process and | |||
| a global unicast addres for later exchanges, but the IPv6 traffic | a global unicast addres for later exchanges, but the IPv6 traffic | |||
| typically ends at a local application gateway and the full power of | typically ends at a local application gateway and the full power of | |||
| IPv6 for end-to-end communication is not enabled. Compared to that | IPv6 for end-to-end communication is not enabled. Compared to that | |||
| state of the art, work at the IETF and in particular at RAW could | state of the art, work at the IETF and in particular at RAW could | |||
| provide additional techniques such as optimized P2P routing, PAREO | provide additional techniques such as optimized P2P routing, PAREO | |||
| functions, and end-to-end secured IPv6/CoAP connectivity. | functions, and end-to-end secured IPv6/CoAP connectivity. | |||
| The 6TiSCH architecture [I-D.ietf-6tisch-architecture] identifies | The 6TiSCH architecture [RFC9030] identifies different models to | |||
| different models to schedule resources along so-called Tracks (see | schedule resources along so-called Tracks (see Section 5.2.2.2) | |||
| Section 5.2.2.2) exploiting the TSCH schedule structure however the | exploiting the TSCH schedule structure however the focus at 6TiSCH is | |||
| focus at 6TiSCH is on best effort traffic and the group was never | on best effort traffic and the group was never chartered to produce | |||
| chartered to produce standard work related to Tracks. | standard work related to Tracks. | |||
| Useful References include: | Useful References include: | |||
| 1. IEEE Std 802.15.4: "IEEE Std. 802.15.4, Part. 15.4: Wireless | 1. IEEE Std 802.15.4: "IEEE Std. 802.15.4, Part. 15.4: Wireless | |||
| Medium Access Control (MAC) and Physical Layer (PHY) | Medium Access Control (MAC) and Physical Layer (PHY) | |||
| Specifications for Low-Rate Wireless Personal Area Networks" | Specifications for Low-Rate Wireless Personal Area Networks" | |||
| [IEEE Std. 802.15.4]. The latest version at the time of this | [IEEE Std. 802.15.4]. The latest version at the time of this | |||
| writing is dated year 2015. | writing is dated year 2015. | |||
| 2. Morell, A. , Vilajosana, X. , Vicario, J. L. and Watteyne, T. | 2. Morell, A. , Vilajosana, X. , Vicario, J. L. and Watteyne, T. | |||
| skipping to change at page 16, line 31 ¶ | skipping to change at page 16, line 31 ¶ | |||
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | |||
| +-------------------------------------------------+ +-----+ | +-------------------------------------------------+ +-----+ | |||
| ch. | ch. | |||
| offset | offset | |||
| Figure 1: Slotframe example with scheduled cells between nodes A, | Figure 1: Slotframe example with scheduled cells between nodes A, | |||
| B and C | B and C | |||
| This schedule represents the possible communications of a node with | This schedule represents the possible communications of a node with | |||
| its neighbors, and is managed by a Scheduling Function such as the | its neighbors, and is managed by a Scheduling Function such as the | |||
| Minimal Scheduling Function (MSF) [I-D.ietf-6tisch-msf]. Each cell | Minimal Scheduling Function (MSF) [RFC9033]. Each cell in the | |||
| in the schedule is identified by its slotoffset and channeloffset | schedule is identified by its slotoffset and channeloffset | |||
| coordinates. A cell's timeslot offset indicates its position in | coordinates. A cell's timeslot offset indicates its position in | |||
| time, relative to the beginning of the slotframe. A cell's channel | time, relative to the beginning of the slotframe. A cell's channel | |||
| offset is an index which maps to a frequency at each iteration of the | offset is an index which maps to a frequency at each iteration of the | |||
| slotframe. Each packet exchanged between neighbors happens within | slotframe. Each packet exchanged between neighbors happens within | |||
| one cell. The size of a cell is a timeslot duration, between 10 to | one cell. The size of a cell is a timeslot duration, between 10 to | |||
| 15 milliseconds. An Absolute Slot Number (ASN) indicates the number | 15 milliseconds. An Absolute Slot Number (ASN) indicates the number | |||
| of slots elapsed since the network started. It increments at every | of slots elapsed since the network started. It increments at every | |||
| slot. This is a 5 byte counter that can support networks running for | slot. This is a 5 byte counter that can support networks running for | |||
| more than 300 years without wrapping (assuming a 10 ms timeslot). | more than 300 years without wrapping (assuming a 10 ms timeslot). | |||
| Channel hopping provides increased reliability to multi-path fading | Channel hopping provides increased reliability to multi-path fading | |||
| skipping to change at page 17, line 5 ¶ | skipping to change at page 17, line 5 ¶ | |||
| hopping sequence referred as macHopSeq in the IEEE802.15.4 | hopping sequence referred as macHopSeq in the IEEE802.15.4 | |||
| specification. | specification. | |||
| The Time-Frequency Division Multiple Access provided by TSCH enables | The Time-Frequency Division Multiple Access provided by TSCH enables | |||
| the orchestration of traffic flows, spreading them in time and | the orchestration of traffic flows, spreading them in time and | |||
| frequency, and hence enabling an efficient management of the | frequency, and hence enabling an efficient management of the | |||
| bandwidth utilization. Such efficient bandwidth utilization can be | bandwidth utilization. Such efficient bandwidth utilization can be | |||
| combined to OFDM modulations also supported by the IEEE802.15.4 | combined to OFDM modulations also supported by the IEEE802.15.4 | |||
| standard [IEEE Std. 802.15.4] since the 2015 version. | standard [IEEE Std. 802.15.4] since the 2015 version. | |||
| TSCH networks operate in ISM bands in which the spectrum is shared by | ||||
| different coexisting technologies. Regulations such as FCC, ETSI and | ||||
| ARIB impose duty cycle regulations to limit the use of the bands but | ||||
| yet interference may constraint the probability to deliver a packet. | ||||
| Part of these reliability challenges are addressed at the MAC | ||||
| introducing redundancy and diversity, thanks to channel hopping, | ||||
| scheduling and ARQ policies. Yet, the MAC layer operates with a | ||||
| 1-hop vision, being limited to local actions to mitigate | ||||
| underperforming links. | ||||
| In the RAW context, low power reliable networks should address non- | In the RAW context, low power reliable networks should address non- | |||
| critical control scenarios such as Class 2 and monitoring scenarios | critical control scenarios such as Class 2 and monitoring scenarios | |||
| such as Class 4 defined by the RFC5673 [RFC5673]. As a low power | such as Class 4 defined by the RFC5673 [RFC5673]. As a low power | |||
| technology targeting industrial scenarios radio transducers provide | technology targeting industrial scenarios radio transducers provide | |||
| low data rates (typically between 50kbps to 250kbps) and robust | low data rates (typically between 50kbps to 250kbps) and robust | |||
| modulations to trade-off performance to reliability. TSCH networks | modulations to trade-off performance to reliability. TSCH networks | |||
| are organized in mesh topologies and connected to a backbone. | are organized in mesh topologies and connected to a backbone. | |||
| Latency in the mesh network is mainly influenced by propagation | Latency in the mesh network is mainly influenced by propagation | |||
| aspects such as interference. ARQ methods and redundancy techniques | aspects such as interference. ARQ methods and redundancy techniques | |||
| such as replication and elimination should be studied to provide the | such as replication and elimination should be studied to provide the | |||
| skipping to change at page 18, line 39 ¶ | skipping to change at page 18, line 49 ¶ | |||
| --- 6TiSCH------6TiSCH------6TiSCH------6TiSCH-- | --- 6TiSCH------6TiSCH------6TiSCH------6TiSCH-- | |||
| 6TiSCH / Device Device Device Device \ | 6TiSCH / Device Device Device Device \ | |||
| Device- - 6TiSCH | Device- - 6TiSCH | |||
| \ 6TiSCH 6TiSCH 6TiSCH 6TiSCH / Device | \ 6TiSCH 6TiSCH 6TiSCH 6TiSCH / Device | |||
| ----Device------Device------Device------Device-- | ----Device------Device------Device------Device-- | |||
| Figure 2 | Figure 2 | |||
| 5.2.2.1.1. Packet Marking and Handling | 5.2.2.1.1. Packet Marking and Handling | |||
| Section "Packet Marking and Handling" of | Section "Packet Marking and Handling" of [RFC9030] describes the | |||
| [I-D.ietf-6tisch-architecture] describes the packet tagging and | packet tagging and marking that is expected in 6TiSCH networks. | |||
| marking that is expected in 6TiSCH networks. | ||||
| 5.2.2.1.1.1. Tagging Packets for Flow Identification | 5.2.2.1.1.1. Tagging Packets for Flow Identification | |||
| For packets that are routed by a PCE along a Track, the tuple formed | For packets that are routed by a PCE along a Track, the tuple formed | |||
| by the IPv6 source address and a local RPLInstanceID is tagged in the | by the IPv6 source address and a local RPLInstanceID is tagged in the | |||
| packets to identify uniquely the Track and associated transmit bundle | packets to identify uniquely the Track and associated transmit bundle | |||
| of timeSlots. | of timeSlots. | |||
| It results that the tagging that is used for a DetNet flow outside | It results that the tagging that is used for a DetNet flow outside | |||
| the 6TiSCH LLN MUST be swapped into 6TiSCH formats and back as the | the 6TiSCH LLN MUST be swapped into 6TiSCH formats and back as the | |||
| skipping to change at page 22, line 13 ¶ | skipping to change at page 22, line 13 ¶ | |||
| It is possible for centralized and distributed routing to share a | It is possible for centralized and distributed routing to share a | |||
| same topology. Generally they will operate in different slotFrames, | same topology. Generally they will operate in different slotFrames, | |||
| and centralized routes will be used for scheduled traffic and will | and centralized routes will be used for scheduled traffic and will | |||
| have precedence over distributed routes in case of conflict between | have precedence over distributed routes in case of conflict between | |||
| the slotFrames. | the slotFrames. | |||
| 5.2.2.1.4. SlotFrames and Priorities | 5.2.2.1.4. SlotFrames and Priorities | |||
| A slotFrame is the base object that a PCE needs to manipulate to | A slotFrame is the base object that a PCE needs to manipulate to | |||
| program a schedule into an LLN node. Elaboration on that concept can | program a schedule into an LLN node. Elaboration on that concept can | |||
| be fond in section "SlotFrames and Priorities" of | be fond in section "SlotFrames and Priorities" of [RFC9030] | |||
| [I-D.ietf-6tisch-architecture] | ||||
| IEEE802.15.4 TSCH avoids contention on the medium by formatting time | IEEE802.15.4 TSCH avoids contention on the medium by formatting time | |||
| and frequencies in cells of transmission of equal duration. In order | and frequencies in cells of transmission of equal duration. In order | |||
| to describe that formatting of time and frequencies, the 6TiSCH | to describe that formatting of time and frequencies, the 6TiSCH | |||
| architecture defines a global concept that is called a Channel | architecture defines a global concept that is called a Channel | |||
| Distribution and Usage (CDU) matrix; a CDU matrix is a matrix of | Distribution and Usage (CDU) matrix; a CDU matrix is a matrix of | |||
| cells with an height equal to the number of available channels | cells with an height equal to the number of available channels | |||
| (indexed by ChannelOffsets) and a width (in timeSlots) that is the | (indexed by ChannelOffsets) and a width (in timeSlots) that is the | |||
| period of the network scheduling operation (indexed by slotOffsets) | period of the network scheduling operation (indexed by slotOffsets) | |||
| for that CDU matrix. The size of a cell is a timeSlot duration, and | for that CDU matrix. The size of a cell is a timeSlot duration, and | |||
| skipping to change at page 23, line 20 ¶ | skipping to change at page 23, line 14 ¶ | |||
| Multiple slotFrames can coexist in a node schedule, i.e., a node can | Multiple slotFrames can coexist in a node schedule, i.e., a node can | |||
| have multiple activities scheduled in different slotFrames, based on | have multiple activities scheduled in different slotFrames, based on | |||
| the precedence of the 6TiSCH topologies. The slotFrames may be | the precedence of the 6TiSCH topologies. The slotFrames may be | |||
| aligned to different CDU matrices and thus have different width. | aligned to different CDU matrices and thus have different width. | |||
| There is typically one slotFrame for scheduled traffic that has the | There is typically one slotFrame for scheduled traffic that has the | |||
| highest precedence and one or more slotFrame(s) for RPL traffic. The | highest precedence and one or more slotFrame(s) for RPL traffic. The | |||
| timeSlots in the slotFrame are indexed by the SlotOffset; the first | timeSlots in the slotFrame are indexed by the SlotOffset; the first | |||
| cell is at SlotOffset 0. | cell is at SlotOffset 0. | |||
| The 6TiSCH architecture introduces the concept of chunks | The 6TiSCH architecture introduces the concept of chunks ([RFC9030]) | |||
| ([I-D.ietf-6tisch-architecture]) to operate such spectrum | to operate such spectrum distribution for a whole group of cells at a | |||
| distribution for a whole group of cells at a time. The CDU matrix is | time. The CDU matrix is formatted into a set of chunks, each of them | |||
| formatted into a set of chunks, each of them identified uniquely by a | identified uniquely by a chunk-ID, see Figure 5. The PCE MUST | |||
| chunk-ID, see Figure 5. The PCE MUST compute the partitioning of CDU | compute the partitioning of CDU matrices into chunks and shared that | |||
| matrices into chunks and shared that knowledge with all the nodes in | knowledge with all the nodes in a 6TiSCH network. | |||
| a 6TiSCH network. | ||||
| +-----+-----+-----+-----+-----+-----+-----+ +-----+ | +-----+-----+-----+-----+-----+-----+-----+ +-----+ | |||
| chan.Off. 0 |chnkA|chnkP|chnk7|chnkO|chnk2|chnkK|chnk1| ... |chnkZ| | chan.Off. 0 |chnkA|chnkP|chnk7|chnkO|chnk2|chnkK|chnk1| ... |chnkZ| | |||
| +-----+-----+-----+-----+-----+-----+-----+ +-----+ | +-----+-----+-----+-----+-----+-----+-----+ +-----+ | |||
| chan.Off. 1 |chnkB|chnkQ|chnkA|chnkP|chnk3|chnkL|chnk2| ... |chnk1| | chan.Off. 1 |chnkB|chnkQ|chnkA|chnkP|chnk3|chnkL|chnk2| ... |chnk1| | |||
| +-----+-----+-----+-----+-----+-----+-----+ +-----+ | +-----+-----+-----+-----+-----+-----+-----+ +-----+ | |||
| ... | ... | |||
| +-----+-----+-----+-----+-----+-----+-----+ +-----+ | +-----+-----+-----+-----+-----+-----+-----+ +-----+ | |||
| chan.Off. 15 |chnkO|chnk6|chnkN|chnk1|chnkJ|chnkZ|chnkI| ... |chnkG| | chan.Off. 15 |chnkO|chnk6|chnkN|chnk1|chnkJ|chnkZ|chnkI| ... |chnkG| | |||
| +-----+-----+-----+-----+-----+-----+-----+ +-----+ | +-----+-----+-----+-----+-----+-----+-----+ +-----+ | |||
| skipping to change at page 24, line 8 ¶ | skipping to change at page 23, line 43 ¶ | |||
| The appropriation of a chunk can be requested explicitly by the PCE | The appropriation of a chunk can be requested explicitly by the PCE | |||
| to any node. After a successful appropriation, the PCE owns the | to any node. After a successful appropriation, the PCE owns the | |||
| cells in that chunk, and may use them as hard cells to set up Tracks. | cells in that chunk, and may use them as hard cells to set up Tracks. | |||
| Then again, 6TiSCH did not propose a method for chunk definition and | Then again, 6TiSCH did not propose a method for chunk definition and | |||
| a protocol for appropriation. This is to be done at RAW. | a protocol for appropriation. This is to be done at RAW. | |||
| 5.2.2.2. 6TiSCH Tracks | 5.2.2.2. 6TiSCH Tracks | |||
| A Track at 6TiSCH is the application to wireless of the concept of a | A Track at 6TiSCH is the application to wireless of the concept of a | |||
| path in the Detnet architecture [I-D.ietf-detnet-architecture]. A | path in the "Detnet architecture" [RFC8655]. A Track can follow a | |||
| Track can follow a simple sequence of relay nodes or can be | simple sequence of relay nodes or can be structured as a more complex | |||
| structured as a more complex Destination Oriented Directed Acyclic | Destination Oriented Directed Acyclic Graph (DODAG) to a unicast | |||
| Graph (DODAG) to a unicast destination. Along a Track, 6TiSCH nodes | destination. Along a Track, 6TiSCH nodes reserve the resources to | |||
| reserve the resources to enable the efficient transmission of packets | enable the efficient transmission of packets while aiming to optimize | |||
| while aiming to optimize certain properties such as reliability and | certain properties such as reliability and ensure small jitter or | |||
| ensure small jitter or bounded latency. The Track structure enables | bounded latency. The Track structure enables Layer-2 forwarding | |||
| Layer-2 forwarding schemes, reducing the overhead of taking routing | schemes, reducing the overhead of taking routing decisions at the | |||
| decisions at the Layer-3. | Layer-3. | |||
| Serial Tracks can be understood as the concatenation of cells or | Serial Tracks can be understood as the concatenation of cells or | |||
| bundles along a routing path from a source towards a destination. | bundles along a routing path from a source towards a destination. | |||
| The serial Track concept is analogous to the circuit concept where | The serial Track concept is analogous to the circuit concept where | |||
| resources are chained through the multi-hop topology. For example, A | resources are chained through the multi-hop topology. For example, A | |||
| bundle of Tx Cells in a particular node is paired to a bundle of Rx | bundle of Tx Cells in a particular node is paired to a bundle of Rx | |||
| Cells in the next hop node following a routing path. | Cells in the next hop node following a routing path. | |||
| Whereas scheduling ensures reliable delivery in bounded time along | Whereas scheduling ensures reliable delivery in bounded time along | |||
| any Track, high availability requires the application of PAREO | any Track, high availability requires the application of PAREO | |||
| skipping to change at page 27, line 13 ¶ | skipping to change at page 26, line 29 ¶ | |||
| the 6TiSCH devices support. | the 6TiSCH devices support. | |||
| 5.2.2.2.2. Track Forwarding | 5.2.2.2.2. Track Forwarding | |||
| By forwarding, this specification means the per-packet operation that | By forwarding, this specification means the per-packet operation that | |||
| allows to deliver a packet to a next hop or an upper layer in this | allows to deliver a packet to a next hop or an upper layer in this | |||
| node. Forwarding is based on pre-existing state that was installed | node. Forwarding is based on pre-existing state that was installed | |||
| as a result of the routing computation of a Track by a PCE. The | as a result of the routing computation of a Track by a PCE. The | |||
| 6TiSCH architecture supports three different forwarding model, G-MPLS | 6TiSCH architecture supports three different forwarding model, G-MPLS | |||
| Track Forwarding (TF), 6LoWPAN Fragment Forwarding (FF) and IPv6 | Track Forwarding (TF), 6LoWPAN Fragment Forwarding (FF) and IPv6 | |||
| Forwarding (6F) which is the classical IP operation | Forwarding (6F) which is the classical IP operation [RFC9030]. The | |||
| [I-D.ietf-6tisch-architecture]. The DetNet case relates to the Track | DetNet case relates to the Track Forwarding operation under the | |||
| Forwarding operation under the control of a PCE. | control of a PCE. | |||
| A Track is a unidirectional path between a source and a destination. | A Track is a unidirectional path between a source and a destination. | |||
| In a Track cell, the normal operation of IEEE802.15.4 Automatic | In a Track cell, the normal operation of IEEE802.15.4 Automatic | |||
| Repeat-reQuest (ARQ) usually happens, though the acknowledgment may | Repeat-reQuest (ARQ) usually happens, though the acknowledgment may | |||
| be omitted in some cases, for instance if there is no scheduled cell | be omitted in some cases, for instance if there is no scheduled cell | |||
| for a retry. | for a retry. | |||
| Track Forwarding is the simplest and fastest. A bundle of cells set | Track Forwarding is the simplest and fastest. A bundle of cells set | |||
| to receive (RX-cells) is uniquely paired to a bundle of cells that | to receive (RX-cells) is uniquely paired to a bundle of cells that | |||
| are set to transmit (TX-cells), representing a layer-2 forwarding | are set to transmit (TX-cells), representing a layer-2 forwarding | |||
| skipping to change at page 56, line 10 ¶ | skipping to change at page 56, line 10 ¶ | |||
| [RFC8200] Deering, S. and R. Hinden, "Internet Protocol, Version 6 | [RFC8200] Deering, S. and R. Hinden, "Internet Protocol, Version 6 | |||
| (IPv6) Specification", STD 86, RFC 8200, | (IPv6) Specification", STD 86, RFC 8200, | |||
| DOI 10.17487/RFC8200, July 2017, | DOI 10.17487/RFC8200, July 2017, | |||
| <https://www.rfc-editor.org/info/rfc8200>. | <https://www.rfc-editor.org/info/rfc8200>. | |||
| [RFC5673] Pister, K., Ed., Thubert, P., Ed., Dwars, S., and T. | [RFC5673] Pister, K., Ed., Thubert, P., Ed., Dwars, S., and T. | |||
| Phinney, "Industrial Routing Requirements in Low-Power and | Phinney, "Industrial Routing Requirements in Low-Power and | |||
| Lossy Networks", RFC 5673, DOI 10.17487/RFC5673, October | Lossy Networks", RFC 5673, DOI 10.17487/RFC5673, October | |||
| 2009, <https://www.rfc-editor.org/info/rfc5673>. | 2009, <https://www.rfc-editor.org/info/rfc5673>. | |||
| [I-D.ietf-detnet-architecture] | [RFC8557] Finn, N. and P. Thubert, "Deterministic Networking Problem | |||
| Finn, N., Thubert, P., Varga, B., and J. Farkas, | Statement", RFC 8557, DOI 10.17487/RFC8557, May 2019, | |||
| "Deterministic Networking Architecture", Work in Progress, | <https://www.rfc-editor.org/info/rfc8557>. | |||
| Internet-Draft, draft-ietf-detnet-architecture-13, 6 May | ||||
| 2019, <https://tools.ietf.org/html/draft-ietf-detnet- | ||||
| architecture-13>. | ||||
| [I-D.ietf-6tisch-architecture] | [RFC8655] Finn, N., Thubert, P., Varga, B., and J. Farkas, | |||
| Thubert, P., "An Architecture for IPv6 over the TSCH mode | "Deterministic Networking Architecture", RFC 8655, | |||
| of IEEE 802.15.4", Work in Progress, Internet-Draft, | DOI 10.17487/RFC8655, October 2019, | |||
| draft-ietf-6tisch-architecture-30, 26 November 2020, | <https://www.rfc-editor.org/info/rfc8655>. | |||
| <https://tools.ietf.org/html/draft-ietf-6tisch- | ||||
| architecture-30>. | [RFC9030] Thubert, P., Ed., "An Architecture for IPv6 over the Time- | |||
| Slotted Channel Hopping Mode of IEEE 802.15.4 (6TiSCH)", | ||||
| RFC 9030, DOI 10.17487/RFC9030, May 2021, | ||||
| <https://www.rfc-editor.org/info/rfc9030>. | ||||
| [RFC9033] Chang, T., Ed., Vucinic, M., Vilajosana, X., Duquennoy, | ||||
| S., and D. Dujovne, "6TiSCH Minimal Scheduling Function | ||||
| (MSF)", RFC 9033, DOI 10.17487/RFC9033, May 2021, | ||||
| <https://www.rfc-editor.org/info/rfc9033>. | ||||
| 13. Informative References | 13. Informative References | |||
| [RFC6550] Winter, T., Ed., Thubert, P., Ed., Brandt, A., Hui, J., | [RFC6550] Winter, T., Ed., Thubert, P., Ed., Brandt, A., Hui, J., | |||
| Kelsey, R., Levis, P., Pister, K., Struik, R., Vasseur, | Kelsey, R., Levis, P., Pister, K., Struik, R., Vasseur, | |||
| JP., and R. Alexander, "RPL: IPv6 Routing Protocol for | JP., and R. Alexander, "RPL: IPv6 Routing Protocol for | |||
| Low-Power and Lossy Networks", RFC 6550, | Low-Power and Lossy Networks", RFC 6550, | |||
| DOI 10.17487/RFC6550, March 2012, | DOI 10.17487/RFC6550, March 2012, | |||
| <https://www.rfc-editor.org/info/rfc6550>. | <https://www.rfc-editor.org/info/rfc6550>. | |||
| skipping to change at page 57, line 11 ¶ | skipping to change at page 57, line 17 ¶ | |||
| and Maintenance (OAM) Tools", RFC 7276, | and Maintenance (OAM) Tools", RFC 7276, | |||
| DOI 10.17487/RFC7276, June 2014, | DOI 10.17487/RFC7276, June 2014, | |||
| <https://www.rfc-editor.org/info/rfc7276>. | <https://www.rfc-editor.org/info/rfc7276>. | |||
| [RFC8279] Wijnands, IJ., Ed., Rosen, E., Ed., Dolganow, A., | [RFC8279] Wijnands, IJ., Ed., Rosen, E., Ed., Dolganow, A., | |||
| Przygienda, T., and S. Aldrin, "Multicast Using Bit Index | Przygienda, T., and S. Aldrin, "Multicast Using Bit Index | |||
| Explicit Replication (BIER)", RFC 8279, | Explicit Replication (BIER)", RFC 8279, | |||
| DOI 10.17487/RFC8279, November 2017, | DOI 10.17487/RFC8279, November 2017, | |||
| <https://www.rfc-editor.org/info/rfc8279>. | <https://www.rfc-editor.org/info/rfc8279>. | |||
| [I-D.ietf-6tisch-msf] | ||||
| Chang, T., Vucinic, M., Vilajosana, X., Duquennoy, S., and | ||||
| D. Dujovne, "6TiSCH Minimal Scheduling Function (MSF)", | ||||
| Work in Progress, Internet-Draft, draft-ietf-6tisch-msf- | ||||
| 18, 12 September 2020, | ||||
| <https://tools.ietf.org/html/draft-ietf-6tisch-msf-18>. | ||||
| [I-D.pthubert-raw-architecture] | [I-D.pthubert-raw-architecture] | |||
| Thubert, P., Papadopoulos, G., and R. Buddenberg, | Thubert, P., Papadopoulos, G. Z., and R. Buddenberg, | |||
| "Reliable and Available Wireless Architecture/Framework", | "Reliable and Available Wireless Architecture/Framework", | |||
| Work in Progress, Internet-Draft, draft-pthubert-raw- | Work in Progress, Internet-Draft, draft-pthubert-raw- | |||
| architecture-05, 15 November 2020, | architecture-05, 15 November 2020, | |||
| <https://tools.ietf.org/html/draft-pthubert-raw- | <https://tools.ietf.org/html/draft-pthubert-raw- | |||
| architecture-05>. | architecture-05>. | |||
| [I-D.ietf-roll-nsa-extension] | [I-D.ietf-roll-nsa-extension] | |||
| Koutsiamanis, R., Papadopoulos, G., Montavont, N., and P. | Koutsiamanis, R., Papadopoulos, G., Montavont, N., and P. | |||
| Thubert, "Common Ancestor Objective Function and Parent | Thubert, "Common Ancestor Objective Function and Parent | |||
| Set DAG Metric Container Extension", Work in Progress, | Set DAG Metric Container Extension", Work in Progress, | |||
| skipping to change at page 58, line 16 ¶ | skipping to change at page 58, line 20 ¶ | |||
| dispatch-06>. | dispatch-06>. | |||
| [I-D.ietf-bier-te-arch] | [I-D.ietf-bier-te-arch] | |||
| Eckert, T., Cauchie, G., and M. Menth, "Tree Engineering | Eckert, T., Cauchie, G., and M. Menth, "Tree Engineering | |||
| for Bit Index Explicit Replication (BIER-TE)", Work in | for Bit Index Explicit Replication (BIER-TE)", Work in | |||
| Progress, Internet-Draft, draft-ietf-bier-te-arch-09, 30 | Progress, Internet-Draft, draft-ietf-bier-te-arch-09, 30 | |||
| October 2020, | October 2020, | |||
| <https://tools.ietf.org/html/draft-ietf-bier-te-arch-09>. | <https://tools.ietf.org/html/draft-ietf-bier-te-arch-09>. | |||
| [I-D.ietf-6tisch-coap] | [I-D.ietf-6tisch-coap] | |||
| Sudhaakar, R. and P. Zand, "6TiSCH Resource Management and | Sudhaakar, R. S. and P. Zand, "6TiSCH Resource Management | |||
| Interaction using CoAP", Work in Progress, Internet-Draft, | and Interaction using CoAP", Work in Progress, Internet- | |||
| draft-ietf-6tisch-coap-03, 9 March 2015, | Draft, draft-ietf-6tisch-coap-03, 9 March 2015, | |||
| <https://tools.ietf.org/html/draft-ietf-6tisch-coap-03>. | <https://tools.ietf.org/html/draft-ietf-6tisch-coap-03>. | |||
| [I-D.svshah-tsvwg-deterministic-forwarding] | [I-D.svshah-tsvwg-deterministic-forwarding] | |||
| Shah, S. and P. Thubert, "Deterministic Forwarding PHB", | Shah, S. and P. Thubert, "Deterministic Forwarding PHB", | |||
| Work in Progress, Internet-Draft, draft-svshah-tsvwg- | Work in Progress, Internet-Draft, draft-svshah-tsvwg- | |||
| deterministic-forwarding-04, 30 August 2015, | deterministic-forwarding-04, 30 August 2015, | |||
| <https://tools.ietf.org/html/draft-svshah-tsvwg- | <https://tools.ietf.org/html/draft-svshah-tsvwg- | |||
| deterministic-forwarding-04>. | deterministic-forwarding-04>. | |||
| [IEEE Std. 802.15.4] | [IEEE Std. 802.15.4] | |||
| skipping to change at page 62, line 13 ¶ | skipping to change at page 62, line 13 ¶ | |||
| SpecificationDetails.aspx?specificationId=3144>. | SpecificationDetails.aspx?specificationId=3144>. | |||
| [TS38300] "3GPP TS 38.300, NR Overall description", | [TS38300] "3GPP TS 38.300, NR Overall description", | |||
| <https://portal.3gpp.org/desktopmodules/Specifications/ | <https://portal.3gpp.org/desktopmodules/Specifications/ | |||
| SpecificationDetails.aspx?specificationId=3191>. | SpecificationDetails.aspx?specificationId=3191>. | |||
| [IMT2020] "ITU towards IMT for 2020 and beyond", | [IMT2020] "ITU towards IMT for 2020 and beyond", | |||
| <https://www.itu.int/en/ITU-R/study-groups/rsg5/rwp5d/imt- | <https://www.itu.int/en/ITU-R/study-groups/rsg5/rwp5d/imt- | |||
| 2020/Pages/default.aspx>. | 2020/Pages/default.aspx>. | |||
| [RFC8655] Finn, N., Thubert, P., Varga, B., and J. Farkas, | ||||
| "Deterministic Networking Architecture", RFC 8655, | ||||
| DOI 10.17487/RFC8655, October 2019, | ||||
| <https://www.rfc-editor.org/info/rfc8655>. | ||||
| [I-D.ietf-detnet-ip-over-tsn] | [I-D.ietf-detnet-ip-over-tsn] | |||
| Varga, B., Farkas, J., Malis, A., and S. Bryant, "DetNet | Varga, B., Farkas, J., Malis, A. G., and S. Bryant, | |||
| Data Plane: IP over IEEE 802.1 Time Sensitive Networking | "DetNet Data Plane: IP over IEEE 802.1 Time Sensitive | |||
| (TSN)", Work in Progress, Internet-Draft, draft-ietf- | Networking (TSN)", Work in Progress, Internet-Draft, | |||
| detnet-ip-over-tsn-05, 13 December 2020, | draft-ietf-detnet-ip-over-tsn-07, 19 February 2021, | |||
| <https://tools.ietf.org/html/draft-ietf-detnet-ip-over- | <https://tools.ietf.org/html/draft-ietf-detnet-ip-over- | |||
| tsn-05>. | tsn-07>. | |||
| [IEEE802.1TSN] | [IEEE802.1TSN] | |||
| IEEE 802.1, "Time-Sensitive Networking (TSN) Task Group", | IEEE 802.1, "Time-Sensitive Networking (TSN) Task Group", | |||
| <http://www.ieee802.org/1/pages/tsn.html>. | <http://www.ieee802.org/1/pages/tsn.html>. | |||
| [IEEE802.1AS] | [IEEE802.1AS] | |||
| IEEE, "IEEE Standard for Local and metropolitan area | IEEE, "IEEE Standard for Local and metropolitan area | |||
| networks -- Timing and Synchronization for Time-Sensitive | networks -- Timing and Synchronization for Time-Sensitive | |||
| Applications", IEEE 802.1AS-2020, | Applications", IEEE 802.1AS-2020, | |||
| <https://standards.ieee.org/content/ieee-standards/en/ | <https://standards.ieee.org/content/ieee-standards/en/ | |||
| End of changes. 23 change blocks. | ||||
| 82 lines changed or deleted | 85 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||