| < draft-vilajosana-6tsch-basic-00.txt | draft-vilajosana-6tsch-basic-01.txt > | |||
|---|---|---|---|---|
| 6TSCH X. Vilajosana, Ed. | 6TSCH X. Vilajosana, Ed. | |||
| Internet-Draft Universitat Oberta de Catalunya | Internet-Draft Universitat Oberta de Catalunya | |||
| Intended status: Informational June 20, 2013 | Intended status: Informational K. Pister | |||
| Expires: December 22, 2013 | Expires: January 15, 2014 University of California Berkeley | |||
| July 14, 2013 | ||||
| Minimal 6TSCH Configuration | Minimal 6TSCH Configuration | |||
| draft-vilajosana-6tsch-basic-00 | draft-vilajosana-6tsch-basic-01 | |||
| Abstract | Abstract | |||
| This document describes the minimal set of rules to operate a | This document describes the minimal set of rules to operate a | |||
| [IEEE802154e] Timeslotted Channel Hopping (TSCH) network. These | [IEEE802154e] Timeslotted Channel Hopping (TSCH) network. These | |||
| rules can be used during early interoperability testing and | rules can be used during early interoperability testing and | |||
| development, when the centralized and distributed solutions developed | development, when the centralized and distributed solutions developed | |||
| by the 6TSCH group are not fully implemented yet, or otherwise not | by the 6TSCH group are not fully implemented yet, or otherwise not | |||
| available. | available. | |||
| skipping to change at page 1, line 35 ¶ | skipping to change at page 1, line 36 ¶ | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at http://datatracker.ietf.org/drafts/current/. | Drafts is at http://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on December 22, 2013. | This Internet-Draft will expire on January 15, 2014. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2013 IETF Trust and the persons identified as the | Copyright (c) 2013 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (http://trustee.ietf.org/license-info) in effect on the date of | (http://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| carefully, as they describe your rights and restrictions with respect | carefully, as they describe your rights and restrictions with respect | |||
| to this document. Code Components extracted from this document must | to this document. Code Components extracted from this document must | |||
| include Simplified BSD License text as described in Section 4.e of | include Simplified BSD License text as described in Section 4.e of | |||
| the Trust Legal Provisions and are provided without warranty as | the Trust Legal Provisions and are provided without warranty as | |||
| described in the Simplified BSD License. | described in the Simplified BSD License. | |||
| Table of Contents | Table of Contents | |||
| 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 | 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 | |||
| 2. Schedule . . . . . . . . . . . . . . . . . . . . . . . . . . 3 | 2. Basic Schedule . . . . . . . . . . . . . . . . . . . . . . . 2 | |||
| 2.1. Slotframe . . . . . . . . . . . . . . . . . . . . . . . . 3 | 2.1. Slotframe . . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
| 2.2. Cells and cells Options . . . . . . . . . . . . . . . . . 4 | 2.2. Cell Options . . . . . . . . . . . . . . . . . . . . . . 4 | |||
| 2.3. Retransmissions . . . . . . . . . . . . . . . . . . . . . 5 | 2.3. Retransmissions . . . . . . . . . . . . . . . . . . . . . 5 | |||
| 2.4. Time Slot timming . . . . . . . . . . . . . . . . . . . . 5 | 2.4. Time Slot timming . . . . . . . . . . . . . . . . . . . . 5 | |||
| 3. Enhanced Beacons Configuration and Content . . . . . . . . . 6 | 3. Enhanced Beacons Configuration and Content . . . . . . . . . 6 | |||
| 3.1. Sync IE . . . . . . . . . . . . . . . . . . . . . . . . . 7 | 3.1. Sync IE . . . . . . . . . . . . . . . . . . . . . . . . . 7 | |||
| 3.1.1. IE Header . . . . . . . . . . . . . . . . . . . . . . 7 | 3.1.1. IE Header . . . . . . . . . . . . . . . . . . . . . . 7 | |||
| 3.1.2. IE Content . . . . . . . . . . . . . . . . . . . . . 7 | 3.1.2. IE Content . . . . . . . . . . . . . . . . . . . . . 7 | |||
| 3.2. Frame and Link IE . . . . . . . . . . . . . . . . . . . . 7 | 3.2. Frame and Link IE . . . . . . . . . . . . . . . . . . . . 7 | |||
| 3.2.1. IE Header . . . . . . . . . . . . . . . . . . . . . . 7 | 3.2.1. IE Header . . . . . . . . . . . . . . . . . . . . . . 7 | |||
| 3.2.2. IE Content . . . . . . . . . . . . . . . . . . . . . 7 | 3.2.2. IE Content . . . . . . . . . . . . . . . . . . . . . 8 | |||
| 4. Acknowledgement . . . . . . . . . . . . . . . . . . . . . . . 8 | 4. Acknowledgement . . . . . . . . . . . . . . . . . . . . . . . 8 | |||
| 4.1. ACK/NACK Time Correction IE . . . . . . . . . . . . . . . 8 | 4.1. ACK/NACK Time Correction IE . . . . . . . . . . . . . . . 8 | |||
| 4.1.1. IE Header . . . . . . . . . . . . . . . . . . . . . . 8 | 4.1.1. IE Header . . . . . . . . . . . . . . . . . . . . . . 8 | |||
| 4.1.2. IE Content . . . . . . . . . . . . . . . . . . . . . 8 | 4.1.2. IE Content . . . . . . . . . . . . . . . . . . . . . 8 | |||
| 5. Neighbor information . . . . . . . . . . . . . . . . . . . . 9 | 5. Neighbor information . . . . . . . . . . . . . . . . . . . . 9 | |||
| 5.1. Neighbor Table . . . . . . . . . . . . . . . . . . . . . 9 | 5.1. Neighbor Table . . . . . . . . . . . . . . . . . . . . . 9 | |||
| 5.2. Time Parent Selection . . . . . . . . . . . . . . . . . . 10 | 5.2. Time Parent Selection . . . . . . . . . . . . . . . . . . 10 | |||
| 6. Queues and Priorities . . . . . . . . . . . . . . . . . . . . 10 | 6. Queues and Priorities . . . . . . . . . . . . . . . . . . . . 10 | |||
| 7. References . . . . . . . . . . . . . . . . . . . . . . . . . 10 | 7. References . . . . . . . . . . . . . . . . . . . . . . . . . 10 | |||
| 7.1. Normative References . . . . . . . . . . . . . . . . . . 10 | 7.1. Normative References . . . . . . . . . . . . . . . . . . 10 | |||
| 7.2. Informative References . . . . . . . . . . . . . . . . . 11 | 7.2. Informative References . . . . . . . . . . . . . . . . . 11 | |||
| 7.3. External Informative References . . . . . . . . . . . . . 11 | 7.3. External Informative References . . . . . . . . . . . . . 12 | |||
| Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 12 | Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 12 | |||
| 1. Introduction | 1. Introduction | |||
| The nodes in a [IEEE802154e] TSCH network follow a communication | The nodes in a [IEEE802154e] TSCH network follow a communication | |||
| schedule. The entity responsible for building and maintaining that | schedule. The entity (centralized or decentralized) responsible for | |||
| schedule has very precise control over the trade-off between the | building and maintaining that schedule has very precise control over | |||
| network's latency, bandwidth, reliability and power consumption. | the trade-off between the network's latency, bandwidth, reliability | |||
| During early interoperability testing and development, however, | and power consumption. During early interoperability testing and | |||
| simplicity is often more important than efficiency. The goal of this | development, however, simplicity is often more important than | |||
| document is to defines the simplest set of rules for building a | efficiency. The goal of this document is to define the simplest set | |||
| of rules for building a [IEEE802154e] TSCH-compliant network, at the | ||||
| [IEEE802154e] TSCH-compliant network, at the necessary price of | necessary price of lesser efficiency. | |||
| lesser efficiency. | ||||
| 2. Schedule | ||||
| 2. Basic Schedule | ||||
| In order to form a network, a minimum schedule configuration is | In order to form a network, a minimum schedule configuration is | |||
| required so nodes can advertise the presence of the network, and | required so nodes can advertise the presence of the network, and | |||
| exchange data. | allow other nodes to join. | |||
| 2.1. Slotframe | 2.1. Slotframe | |||
| The slotframe, as defined by | The Slotframe, as defined in [I-D.palattella-6tsch-terminology], is | |||
| [I-D.draft-palattella-6tsch-terminology], is an abstraction of the | an abstraction of the MAC layer that defines a collection of time | |||
| MAC layer that defines a collection of time slots of equal length and | slots of equal length and priority, and which repeats over time. In | |||
| priority, and which repeats over time. In order to set up a minimal | order to set up a basic TSCH network, nodes need to be synchronized | |||
| TSCH network, nodes need to use the same slotframe configuration so | with the same slotframe configuration so they can exchange Enhanced | |||
| they can exchange Enhanced Beacons (EBs) and data packets. This | Beacons (EBs) and data packets. This document recommends the | |||
| document recommends the following slotframe configuration. | following slotframe configuration. | |||
| Basic configuration configuration | Basic configuration | |||
| +---------------------------------+----------------------+ | +------------------------------------+----------------------+ | |||
| | Property | Value | | | Property | Value | | |||
| +---------------------------------+----------------------+ | +------------------------------------+----------------------+ | |||
| | Number of time slots | 101 | | | Number of time slots per Slotframe | 101 | | |||
| +---------------------------------+----------------------+ | +------------------------------------+----------------------+ | |||
| | Number of available channels | 16 | | | Number of available channels | 16 | | |||
| +---------------------------------+----------------------+ | +------------------------------------+----------------------+ | |||
| | Number of EBs slots | 1 (slotOffset 0) | | | Number of EBs cells | 1 (slotOffset 0) | | |||
| +---------------------------------+----------------------+ | +------------------------------------+----------------------+ | |||
| | Number of active cells | 5 (slotOffsets | | | Number of scheduled cells | 5 (slotOffsets | | |||
| | | 1,2,3,4,5) | | | | 1,2,3,4,5) | | |||
| +---------------------------------+----------------------+ | +------------------------------------+----------------------+ | |||
| | Number of inactive slots | 95 (from slotOffset | | | Number of unscheduled cells | 95 (from slotOffset | | |||
| | | 6 to 100) | | | | 6 to 100) | | |||
| +---------------------------------+----------------------+ | +------------------------------------+----------------------+ | |||
| | Number of MAC retransmissions | 3 | | | Number of MAC retransmissions (max)| 3 | | |||
| +---------------------------------+----------------------+ | +------------------------------------+----------------------+ | |||
| | Time Slot duration | 15ms | | | Time Slot duration | 15ms | | |||
| +---------------------------------+----------------------+ | +------------------------------------+----------------------+ | |||
| This schedule is hard-coded in each node. The slotframe is composed | The suggested basic schedule is hard-coded in each node. The | |||
| of 101 time slots, the first slot in the slotframe is used to send | slotframe is composed of 101 time slots. The first slot in the | |||
| Enhanced Beacons to announce the presence of the network. These EBs | slotframe is used to send Enhanced Beacons announcing the presence of | |||
| are not acknowledged. Five cells are scheduled for exchangeing data | the network. These EBs are not acknowledged. Five cells are | |||
| packets, as described in Section 2.2. These cells are scheduled at | scheduled for exchanging data packets, as described in Section 2.2. | |||
| slotOffset 1 to 5, and channeOffset 0. Per the IEEE802.15.4e TSCH | These cells are scheduled at slotOffset 1 to 5, and channeOffset 0. | |||
| standard, data packets sent on these cells to a unicast MAC address | Per the IEEE802.15.4e TSCH standard, data packets sent on these cells | |||
| are acknowledged by the receiver. The 95 remaining cells are | to a unicast MAC address are acknowledged by the receiver. The 95 | |||
| inactive, i.e. the radio of the nodes remains off. | remaining cells are unscheduled, i.e., the radio of the nodes remains | |||
| off. | ||||
| Basic schedule overview | Basic schedule overview | |||
| +-----+-----+-----+-----+-----+-----+-----+ +-----+ | +-----+-----+-----+-----+-----+-----+-----+ +-----+ | |||
| chan.Off. 0 | EB |TxRxS|TxRxS|TxRxS|TxRxS|TxRxS| OFF | ... | OFF | | chan.Off. 0 | EB |TxRxS|TxRxS|TxRxS|TxRxS|TxRxS| OFF | ... | OFF | | |||
| +-----+-----+-----+-----+-----+-----+-----+ +-----+ | +-----+-----+-----+-----+-----+-----+-----+ +-----+ | |||
| chan.Off. 1 | | | | | | | | ... | | | chan.Off. 1 | | | | | | | | ... | | | |||
| +-----+-----+-----+-----+-----+-----+-----+ +-----+ | +-----+-----+-----+-----+-----+-----+-----+ +-----+ | |||
| ... | ... | |||
| +-----+-----+-----+-----+-----+-----+-----+ +-----+ | +-----+-----+-----+-----+-----+-----+-----+ +-----+ | |||
| chan.Off. 15 | | | | | | | | ... | | | chan.Off. 15 | | | | | | | | ... | | | |||
| +-----+-----+-----+-----+-----+-----+-----+ +-----+ | +-----+-----+-----+-----+-----+-----+-----+ +-----+ | |||
| 0 1 2 3 4 5 6 100 | 0 1 2 3 4 5 6 100 | |||
| 2.2. Cells and cells Options | 2.2. Cell Options | |||
| Per the [IEEE802154e] TSCH standard, each active cell is assigned a | Per the [IEEE802154e] TSCH standard, each scheduled cell has a bitmap | |||
| bitmap of cell options. | of cell options assigned. All scheduled cells in the basic schedule | |||
| are configured as Hard cells | ||||
| [I-D.watteyne-6tsch-tsch-lln-context][I-D.draft-wang-6tsch-6top] | ||||
| since reallocation is not considered in that simple approach. | ||||
| The EB cell is assigned the following bitmap of cell options: | The EB cell is assigned the following bitmap of cell options: | |||
| b0 = Transmit = 1 (set) | b0 = Transmit = 1 (set) | |||
| b1 = Receive = 0 (clear) | b1 = Receive = 0 (clear) | |||
| b2 = Shared = 0 (clear) | b2 = Shared = 0 (clear) | |||
| b3 = Timekeeping = 0 (clear) | b3 = Timekeeping = 0 (clear) | |||
| b4 = Hard = 1 (set) | b4 = Hard = 1 (set) | |||
| b5-b7 = Reserved (clear) | b5-b7 = Reserved (clear) | |||
| The data cells are assigned the bitmap of cell options below. This | The data cells are assigned the bitmap of cell options below that | |||
| results in "Slotted Aloha" behavior. Because both the "Transmit" and | results in "Slotted Aloha" behavior. Because both the "Transmit" and | |||
| "Receive" bits are set, the either transmits, or listens when it has | "Receive" bits are set, a node either transmits, if there is a packet | |||
| nothing to transmit. Because the "shared" bit it set, it uses the | in its queue, or listens if it has nothing to transmit. Because the | |||
| backoff mechanism defined in [IEEE802154e] TSCH to resolve | "shared" bit is set,in presence of collisions it uses the backoff | |||
| collisions. | mechanism defined in [IEEE802154e]. | |||
| b0 = Transmit = 1 (set) | b0 = Transmit = 1 (set) | |||
| b1 = Receive = 1 (set) | b1 = Receive = 1 (set) | |||
| b2 = Shared = 1 (set) | ||||
| b2 = Shared = 1 (set) | ||||
| b3 = Timekeeping = 0 (clear) | b3 = Timekeeping = 0 (clear) | |||
| b4 = Hard = 1 (set) | b4 = Hard = 1 (set) | |||
| b5-b7 = Reserved (clear) | b5-b7 = Reserved (clear) | |||
| All remaining cells are inactive, and so the nodes' radios remain | All remaining cells are unscheduled. Thus the nodes can keep their | |||
| off. In a memory efficient implementation, active cells could be | radio off. In a memory efficient implementation, scheduled cells | |||
| represented by a circular linked list. Inactive cells should not | could be represented by a circular linked list. Unscheduled cells | |||
| occupy any memory. | should not occupy any memory. | |||
| 2.3. Retransmissions | 2.3. Retransmissions | |||
| The maximum number of MAC-layer retransmissions is set to 3. For | The maximum number of MAC-layer retransmissions is set to 3. For | |||
| packets which require an acknowledgement, if none is received after a | packets which require an acknowledgement, if none is received after a | |||
| total of 4 attempts, the transmissions is considered failed at the | total of 4 attempts, the transmissions is considered failed at the | |||
| MAC layer, and the upper layer needs to be notified. Packets sent to | MAC layer, and the upper layer needs to be notified. Packets sent to | |||
| the broadcast MAC address (including EBs) are not acknowledged and | the broadcast MAC address (including EBs) are not acknowledged and | |||
| therefore not retransmitted. | therefore not retransmitted. | |||
| skipping to change at page 6, line 29 ¶ | skipping to change at page 6, line 29 ¶ | |||
| Slot Slot | Slot Slot | |||
| [IEEE802154e] does not define the different durations of a time slot. | [IEEE802154e] does not define the different durations of a time slot. | |||
| It does allow those durations to be sent in the EBs (through a | It does allow those durations to be sent in the EBs (through a | |||
| TimeSlot IE), but for simplicity, this document recommends to hard- | TimeSlot IE), but for simplicity, this document recommends to hard- | |||
| code the different durations to the values listed below. | code the different durations to the values listed below. | |||
| Timeslot durations | Timeslot durations | |||
| +---------------------------------+------------------+ | +---------------------------------+------------------+ | |||
| | IEEE802.15.4e TSCH duration | Value | | | IEEE802.15.4e TSCH parmeter | Value | | |||
| +---------------------------------+------------------+ | +---------------------------------+------------------+ | |||
| | TsTxOffset | 4000us | | | TsTxOffset | 4000us | | |||
| +---------------------------------+------------------+ | +---------------------------------+------------------+ | |||
| | TsLongGT | 1300us | | | TsLongGT | 2600us | | |||
| +---------------------------------+------------------+ | +---------------------------------+------------------+ | |||
| | TsTxAckDelay | 4606us | | | TsTxAckDelay | 4606us | | |||
| +---------------------------------+------------------+ | +---------------------------------+------------------+ | |||
| | TsShortGT | 500us | | | TsShortGT | 1000us | | |||
| +---------------------------------+------------------+ | +---------------------------------+------------------+ | |||
| | Time Slot duration | 15000us | | | Time Slot duration | 15000us | | |||
| +---------------------------------+------------------+ | +---------------------------------+------------------+ | |||
| 3. Enhanced Beacons Configuration and Content | 3. Enhanced Beacons Configuration and Content | |||
| [IEEE802154e] does not define when EBs are sent. The choice of the | [IEEE802154e] does not define how often or which EBs are sent. The | |||
| duration between two EBs needs to take into account whether EBs are | choice of the duration between two EBs needs to take into account | |||
| used as the only mechanism to synchronize devices, or whether a Keep- | whether EBs are used as the only mechanism to synchronize devices, or | |||
| Alive (KA) mechanism is used in parallel. For a simplest TSCH | whether a Keep-Alive (KA) mechanism is used in parallel. For a | |||
| configuration, it is recommended to sent EBs at least once every 10s. | simplest TSCH configuration, it is recommended to sent EBs at least | |||
| once every 10s. For additional reference see | ||||
| [I-D.watteyne-6tsch-tsch-lln-context] where different synchronization | ||||
| approaches are summarized. | ||||
| EBs must be sent with the Beacon IEEE802.15.4 frame type and this | EBs must be sent with the Beacon IEEE802.15.4 frame type and this | |||
| document recommends that they carry the following Information | document recommends that they carry the following Information | |||
| Elements (IEs): | Elements (IEs): | |||
| 3.1. Sync IE | 3.1. Sync IE | |||
| Contains synchronization information such as ASN and join priority. | Contains synchronization information such as ASN and join priority. | |||
| 3.1.1. IE Header | 3.1.1. IE Header | |||
| skipping to change at page 8, line 4 ¶ | skipping to change at page 8, line 6 ¶ | |||
| 3.2.1. IE Header | 3.2.1. IE Header | |||
| Length (b0-b7) = variable | Length (b0-b7) = variable | |||
| Sub-ID (b8-b14) = 0x1b | Sub-ID (b8-b14) = 0x1b | |||
| Type (b15) = 0x00 (short) | Type (b15) = 0x00 (short) | |||
| 3.2.2. IE Content | 3.2.2. IE Content | |||
| # Slotframes (b16-b23) = 0x01 | # Slotframes (b16-b23) = 0x01 | |||
| Slotframe ID (b24-b31) = 0x01 | Slotframe ID (b24-b31) = 0x01 | |||
| Size Slotframe (b32-b47) = 0x65 | Size Slotframe (b32-b47) = 0x65 | |||
| # Links (b48-b55) = 0x06 | # Links (b48-b55) = 0x06 | |||
| For each link in the basic schedule: | For each link in the basic schedule: | |||
| Channel Offset (2B) = 0x00 | Channel Offset (2B) = 0x00 | |||
| Slot Number (2B) = from (0x00 to 0x05) | Slot Number (2B) = from (0x00 to 0x05) | |||
| LinkOption (1B) = as described in Section 2.2 | LinkOption (1B) = as described in Section 2.2 | |||
| 4. Acknowledgement | 4. Acknowledgement | |||
| MAC-layer acknowledgement frames are built according to | MAC-layer acknowledgement frames are built according to | |||
| [IEEE802154e]. Data frames and command frames sent to a unicast MAC | [IEEE802154e]. Data frames and command frames sent to a unicast MAC | |||
| destination address request an acknowledged. The acknowledgement | destination address request an acknowledgement. The acknowledgement | |||
| frame is of type ACK (0x10). Each acknowledgement contains the | frame is of type ACK (0x10). Each acknowledgement contains the | |||
| following IE: | following IE: | |||
| 4.1. ACK/NACK Time Correction IE | 4.1. ACK/NACK Time Correction IE | |||
| The ACK/NACK time correction IE is used to carry the measured | The ACK/NACK time correction IE is used to carry the measured | |||
| desynchronization between the sender and the receiver. | desynchronization between the sender and the receiver. | |||
| 4.1.1. IE Header | 4.1.1. IE Header | |||
| skipping to change at page 9, line 19 ¶ | skipping to change at page 9, line 19 ¶ | |||
| +-----------------------------------+------------------+ | +-----------------------------------+------------------+ | |||
| | ACK with negative time correction | 0x0800 - 0x0fff | | | ACK with negative time correction | 0x0800 - 0x0fff | | |||
| +-----------------------------------+------------------+ | +-----------------------------------+------------------+ | |||
| | NACK with positive time correction| 0x8000 - 0x87ff | | | NACK with positive time correction| 0x8000 - 0x87ff | | |||
| +-----------------------------------+------------------+ | +-----------------------------------+------------------+ | |||
| | NACK with negative time correction| 0x8800 - 0x8fff | | | NACK with negative time correction| 0x8800 - 0x8fff | | |||
| +-----------------------------------+------------------+ | +-----------------------------------+------------------+ | |||
| 5. Neighbor information | 5. Neighbor information | |||
| [IEEE802154e] does not define when information is be kept at each | [IEEE802154e] does not define how and when each node in the network | |||
| node about each neighbor. This document recommends to keep the | keeps information about its neighbors. This document recommends to | |||
| following information in the neighbor table: | keep the following information in the neighbor table: | |||
| 5.1. Neighbor Table | 5.1. Neighbor Table | |||
| The exact format of the neighbor table is implementation-specific, | The exact format of the neighbor table is implementation-specific, | |||
| but it should at least contain the following information, for each | but it should at least contain the following information, for each | |||
| neighbor: | neighbor: | |||
| Neighbor statistics: | Neighbor statistics: | |||
| number of transmitted packets to that neighbor | number of transmitted packets to that neighbor | |||
| skipping to change at page 9, line 43 ¶ | skipping to change at page 9, line 43 ¶ | |||
| number of transmitted packets that have been acknowledged by | number of transmitted packets that have been acknowledged by | |||
| that neighbor | that neighbor | |||
| number of received packets from that neighbor | number of received packets from that neighbor | |||
| number of received packets that have been acknowledged for that | number of received packets that have been acknowledged for that | |||
| neighbor | neighbor | |||
| Neighbor address. | Neighbor address. | |||
| ASN when that neighbor was last heard. This can be used to | ASN when that neighbor was heard for the last time. This can be | |||
| trigger a keep-alive. | used to trigger a keep-alive message. | |||
| RPL rank of that neighbor. | RPL rank of that neighbor. | |||
| A flag which indicates whether this neighbor is a time source | A flag which indicates whether this neighbor is a time source | |||
| neighbor. | neighbor. | |||
| Connectivity statistics (RSSI, LQI, etc), which can be used to | Connectivity statistics (RSSI, LQI, etc), which can be used to | |||
| help determine the quality of the link. | determine the quality of the link. | |||
| In addition of that information, each node has to be able to compute | In addition of that information, each node has to be able to compute | |||
| some RPL objective function (OF) taking into account the neighbor and | some RPL objective function (OF) taking into account the neighbor and | |||
| connectivity statistics. An example RPL objective function is the | connectivity statistics. An example RPL objective function is the | |||
| ETX. | ETX. | |||
| 5.2. Time Parent Selection | 5.2. Time Parent Selection | |||
| Each node selects a time parent amongst its known neighbors. When a | Each node selects a time parent amongst its known neighbors. When a | |||
| node joins a network, it has no routing information yet. Its | node joins a network, it has no routing information yet. Its | |||
| (possibly temporary) time parent is the node it can hear "best", for | (possibly temporary) time parent is the node it can hear "best", for | |||
| example based on RSSI measurements of the EBs it received. After | example based on RSSI measurements of the EBs it received. After | |||
| having acquired a RPL rank, the RPL routing parents should also be | having acquired a RPL rank, the RPL routing parents should also be | |||
| IEEE802.15.4e time source neighbors. | IEEE802.15.4e time source neighbors. | |||
| Optionally, a node can choose to use an counter to avoid frequent | Optionally, a node can choose to use an counter to avoid frequent | |||
| changes in time source neighbor selection. Based on some thresholds | changes in time source neighbor selection. Based on some thresholds | |||
| (on RSSI for example), if the quality of the link with time parent | (on RSSI for example), if the quality of the link with time parent | |||
| changes over or below the thresholds for a certain number of times | changes over or below the thresholds for a certain number of times | |||
| (e.g. 3), the instability counter is incremented and another time | (e.g., 3), the instability counter is incremented and another time | |||
| parent is selected. | parent is selected. | |||
| 6. Queues and Priorities | 6. Queues and Priorities | |||
| [IEEE802154e] does not define the use of queues to handle upper layer | [IEEE802154e] does not define the use of queues to handle upper layer | |||
| data (either application or control data from upper layers). This | data (either application or control data from upper layers). This | |||
| document recommends to use a single queue with the following rules: | document recommends to use a single queue with the following rules: | |||
| When the node is not synchronized to the network, higher layers | When the node is not synchronized to the network, higher layers | |||
| are not able to insert packets into the queue. | are not able to insert packets into the queue. | |||
| skipping to change at page 11, line 5 ¶ | skipping to change at page 11, line 5 ¶ | |||
| One entry in the queue is reserved at all times for a IEEE802.15.4 | One entry in the queue is reserved at all times for a IEEE802.15.4 | |||
| frames of types Beacon or Command frames. | frames of types Beacon or Command frames. | |||
| 7. References | 7. References | |||
| 7.1. Normative References | 7.1. Normative References | |||
| [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | |||
| Requirement Levels", BCP 14, RFC 2119, March 1997. | Requirement Levels", BCP 14, RFC 2119, March 1997. | |||
| 7.2. Informative References | ||||
| [RFC6550] Winter, T., Thubert, P., Brandt, A., Hui, J., Kelsey, R., | [RFC6550] Winter, T., Thubert, P., Brandt, A., Hui, J., Kelsey, R., | |||
| Levis, P., Pister, K., Struik, R., Vasseur, JP., and R. | Levis, P., Pister, K., Struik, R., Vasseur, JP., and R. | |||
| Alexander, "RPL: IPv6 Routing Protocol for Low-Power and | Alexander, "RPL: IPv6 Routing Protocol for Low-Power and | |||
| Lossy Networks", RFC 6550, March 2012. | Lossy Networks", RFC 6550, March 2012. | |||
| 7.2. Informative References | ||||
| [I-D.watteyne-6tsch-tsch-lln-context] | ||||
| Watteyne, T., Palattella, M., and L. Grieco, "Using | ||||
| IEEE802.15.4e TSCH in an LLN context: Overview, Problem | ||||
| Statement and Goals", draft-watteyne-6tsch-tsch-lln- | ||||
| context-02 (work in progress), May 2013. | ||||
| [I-D.thubert-6tsch-architecture] | ||||
| Thubert, P., Assimiti, R., and T. Watteyne, "An | ||||
| Architecture for IPv6 over Time Slotted Channel Hopping", | ||||
| draft-thubert-6tsch-architecture-01 (work in progress), | ||||
| April 2013. | ||||
| [I-D.palattella-6tsch-terminology] | ||||
| Palattella, M., Thubert, P., Watteyne, T., and Q. Wang, | ||||
| "Terminology in IPv6 over Time Slotted Channel Hopping", | ||||
| draft-palattella-6tsch-terminology-00 (work in progress), | ||||
| March 2013. | ||||
| [I-D.draft-wang-6tsch-6top] | ||||
| Wang, Q., Ed., Vilajosana, X., and T. Watteyne, "6TSCH | ||||
| Operation Sublayer (6top). draft-wang-6tsch-6top-00 (work | ||||
| in progress) ", July 2013. | ||||
| [I-D.ohba-6tsch-security] | ||||
| Chasko, S., Das, S., Lopez, R., Ohba, Y., Thubert, P., and | ||||
| A. Yegin, "Security Framework and Key Management Protocol | ||||
| Requirements for 6TSCH", draft-ohba-6tsch-security-01 | ||||
| (work in progress), July 2013. | ||||
| [I-D.ietf-roll-terminology] | [I-D.ietf-roll-terminology] | |||
| Vasseur, J., "Terminology in Low power And Lossy | Vasseur, J., "Terminology in Low power And Lossy | |||
| Networks", draft-ietf-roll-terminology-12 (work in | Networks", draft-ietf-roll-terminology-12 (work in | |||
| progress), March 2013. | progress), March 2013. | |||
| [I-D.phinney-roll-rpl-industrial-applicability] | [I-D.phinney-roll-rpl-industrial-applicability] | |||
| Phinney, T., Thubert, P., and R. Assimiti, "RPL | Phinney, T., Thubert, P., and R. Assimiti, "RPL | |||
| applicability in industrial networks", draft-phinney-roll- | applicability in industrial networks", draft-phinney-roll- | |||
| rpl-industrial-applicability-02 (work in progress), | rpl-industrial-applicability-02 (work in progress), | |||
| February 2013. | February 2013. | |||
| [I-D.watteyne-6tsch-tsch-lln-context] | ||||
| Watteyne, T., Palattella, M., and L. Grieco, "Using | ||||
| IEEE802.15.4e TSCH in an LLN context: Overview, Problem | ||||
| Statement and Goals", draft-watteyne-6tsch-tsch-lln- | ||||
| context-02 (work in progress), May 2013. | ||||
| [I-D.draft-palattella-6tsch-terminology] | ||||
| Palattella, MR., Ed., Thubert, P., Watteyne, T., and Q. | ||||
| Wang, "Terminology in IPv6 over Time Slotted Channel | ||||
| Hopping. draft-palattella-6tsch-terminology-00 (work in | ||||
| progress) ", March 2013. | ||||
| [I-D.draft-thubert-6tsch-architecture] | ||||
| Thubert, P., Ed., Assimiti, R., and T. Watteyne, "An | ||||
| Architecture for IPv6 over Time Synchronized Channel | ||||
| Hopping. draft-thubert-6tsch-architecture-00 (work in | ||||
| progress) ", March 2013. | ||||
| [I-D.draft-wang-6tsch-6tus] | ||||
| Wang, Q., Ed., Vilajosana, X., and T. Watteyne, "6tus Sub- | ||||
| Layer Specification. draft-wang-6tsch-6tus-01 (work in | ||||
| progress) ", May 2013. | ||||
| 7.3. External Informative References | 7.3. External Informative References | |||
| [IEEE802154e] | [IEEE802154e] | |||
| IEEE standard for Information Technology, "IEEE std. | IEEE standard for Information Technology, "IEEE std. | |||
| 802.15.4e, Part. 15.4: Low-Rate Wireless Personal Area | 802.15.4e, Part. 15.4: Low-Rate Wireless Personal Area | |||
| Networks (LR-WPANs) Amendament 1: MAC sublayer", April | Networks (LR-WPANs) Amendament 1: MAC sublayer", April | |||
| 2012. | 2012. | |||
| [IEEE802154] | [IEEE802154] | |||
| IEEE standard for Information Technology, "IEEE std. | IEEE standard for Information Technology, "IEEE std. | |||
| 802.15.4, Part. 15.4: Wireless Medium Access Control (MAC) | 802.15.4, Part. 15.4: Wireless Medium Access Control (MAC) | |||
| and Physical Layer (PHY) Specifications for Low-Rate | and Physical Layer (PHY) Specifications for Low-Rate | |||
| Wireless Personal Area Networks", June 2011. | Wireless Personal Area Networks", June 2011. | |||
| [OpenWSN] , "Berkeley's OpenWSN Project Homepage", , | [OpenWSN] , "Berkeley's OpenWSN Project Homepage", , | |||
| <http://www.openwsn.org/>. | <http://www.openwsn.org/>. | |||
| Author's Address | Authors' Addresses | |||
| Xavier Vilajosana (editor) | Xavier Vilajosana (editor) | |||
| Universitat Oberta de Catalunya | Universitat Oberta de Catalunya | |||
| 156 Rambla Poblenou | 156 Rambla Poblenou | |||
| Barcelona, Catalonia 08018 | Barcelona, Catalonia 08018 | |||
| Spain | Spain | |||
| Phone: +34 (646) 633 681 | Phone: +34 (646) 633 681 | |||
| Email: xvilajosana@uoc.edu | Email: xvilajosana@uoc.edu | |||
| Kris Pister | ||||
| University of California Berkeley | ||||
| 490 Cory Hall | ||||
| Berkeley, California 94720 | ||||
| USA | ||||
| Email: pister@eecs.berkeley.edu | ||||
| End of changes. 36 change blocks. | ||||
| 112 lines changed or deleted | 126 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||