6tisch + rpl @ telecom bretagne 2014

99
Cisco Confidential 1 © 2013-2014 Cisco and/or its affiliates. All rights reserved. RPL and 6TiSCH Telecom Bretagne, February 2014 Pascal Thubert

Upload: pascal-thubert

Post on 10-May-2015

1.965 views

Category:

Education


0 download

DESCRIPTION

3 hours course on IEEE and IETF protocols introducing the 6TiSCH architecture and the RPL routing protocol. Course given at telecom Bretagne on Feb 12th 2014

TRANSCRIPT

Page 1: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 1© 2013-2014 Cisco and/or its affiliates. All rights reserved.

RPL and 6TiSCH

Telecom Bretagne, February 2014 Pascal Thubert

Page 2: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 2© 2013-2014 Cisco and/or its affiliates. All rights reserved.

The Internet of Everything

Challenge: harness innovation• More efficient operations • New and/or improved experience

Shaking up the competitive landscape• Between small and large entities• Leveraging IT, data and analytics

http://internetofeverything.cisco.com/explore

Page 3: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 3© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Scaling to Pervasive IoE/T

1000*scale => No leak in the Internet

=> Opaque Fringe operations

Reachability => Radio

Addressing => IPv6

Density => spatial

reuse

=> Routing

Page 4: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 4© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Agenda (part 1)

The Fringe of the Internet

LLNs

IEEE 802.15.4

IEEE 802.15.4e TSCH

6TiSCH

Page 5: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 5© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Agenda (part 2)

Routing IP in LLNs

Routing over radios

RPL concepts

Applying RPL

Page 6: 6TiSCH + RPL @ Telecom Bretagne 2014

© 2010 Cisco and/or its affiliates. All rights reserved. 6UnclassifiedBRKEWN-3012

The Fringe of the Internet

Page 7: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 7© 2013-2014 Cisco and/or its affiliates. All rights reserved.

The routing Infrastructure today

• The Internet

• Fully engineered• Hierarchical, Aggregations, ASs, Wire links

• Fully distributed States• Shows limits (BGP tables, addr. depletion)

Þ Reached adult size, mature to agingÞ Conceptually unchanged by IPv6

• IPv4 Intranets• Same structure as the Internet• Yet decoupled from the Internet

• NAT, Socks, Proxies

Þ First model for Internet extension

Page 8: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 8© 2013-2014 Cisco and/or its affiliates. All rights reserved.

L2 mesh UnderMulti-hop Public Access Points, Proprietary mission specific productsAddress the scale issue at L2/ND

L3 Route OverMigration to IETF Protocols (RPL)Internet of Things (IOT, M2M)Different IPv6 (6LoWPAN, SDN)

Mobile OverlaysGlobal reachability Route ProjectionNetwork virtualization

Fixed wired Infrastructure

56

78

CB

1

32

A4

A’s Home

B’sHome

MANETMesh The Fringe DOES NOT LEAK

into the Routing Infrastructure

NEMO

The emerging Fringe of the Internet

Edge

Page 9: 6TiSCH + RPL @ Telecom Bretagne 2014

9

Low Power Lossy Networks

Page 10: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 10© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Wireless: the evolution trait

Reaching farther outNew types of devices (Internet Of Things)

New usages (widespread monitoring, IoE)

Global Coverage from Near Field to Satellite via 3/4G

New level of cost effectiveness

Deploying wire is slow and costly

Low incremental cost per device

Page 11: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 11© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Low Power Lossy Networks

• LLNs comprise a large number of highly constrained devices (smart objects) interconnected by predominantly wireless links of unpredictable quality

• LLNs cover a wide scope of applications• Industrial Monitoring, Building Automation,

Connected Home, Healthcare, Environmental Monitoring, Urban Sensor Networks, Energy Management, Asset Tracking, Refrigeration

• Several IETF working groups and Industry Alliance addressing LLNs• IETF - CoRE, 6Lowpan, ROLL• Alliances - IP for Smart Objects Alliance

(IPSO)World’s smallest web server

Page 12: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 12© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Characteristics of LLNs

• LLNs operate with a hard, very small bound on state

• LLNs are optimised for saving energy in the majority of cases

• Traffic patterns can be MP2P, P2P and P2MP flows

• Typically LLNs deployed over link layers with restricted frame-sizes• Minimise the time a packet is enroute (in the air/on the

wire) hence the small frame size• The routing protocol for LLNs should be adapted for such

links

• LLN routing protocols must consider efficiency versus generality• LLN nodes are typically very conservative in resources

Page 13: 6TiSCH + RPL @ Telecom Bretagne 2014

13

IEEE 802.15.4

Page 14: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 14© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Initial activities focused on wearable devices “Personal Area Networks”

Activities have proven to be much more diverse and varied

•Data rates from Kb/s to Gb/s•Ranges from tens of metres up to a Kilometre

•Frequencies from MHz to THz•Various applications not necessarily IP based

Focus is on “specialty”, typically short range, communications

•If it is wireless and not a LAN, MAN, RAN, or WAN, it is likely to be 802.15 (PAN)

The only IEEE 802 Working Group with multiple MACs

“The IEEE 802.15 TG4 was chartered to investigate a low data rate solution with multi-month to multi-year battery life and very low complexity. It is operating in an unlicensed, international frequency band.  Potential applications are sensors, interactive toys, smart badges, remote controls, and home automation.”

802.15.4 Scope

http://www.ieee802.org/15/pub/TG4.htmlIEEE 802.15 WPAN™ Task Group 4 (TG4) Charter

Page 15: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 15© 2013-2014 Cisco and/or its affiliates. All rights reserved.

IEEE Wireless Standards

802.11 Wireless LAN

802.15 Personal Area Network

802.16 Wireless Broadband

Access

802.22 Wireless Regional Area

Network

WiFi 802.11a/b/g/n/ah

IEEE 802 LAN/MA

N

802.15.1Bluetooth

802.15.2Co-existence

802.15.3 High Rate WPAN

802.15.4 Low Rate WPAN

802.15.5 Mesh

Networking

802.15.6 Body Area Networking

802.15.7 Visible Light

Communications

802.15.4eMAC

Enhancements

802.15.4fPHY for RFID

802.15.4gSmart Utility

Networks

TV White Space PHY 15.4 Study

Group

802.15.4dPHY for Japan

802.15.4cPHY for China

• Industrial strength

• Minimised listening costs

• Improved security• Improved link

reliability

802.15.4Amendments

• Support smart-grid networks

• Up to 1 Km transmission

• >100Kbps • Millions of fixed

endpoints• Outdoor use• Larger frame size• PHY Amendment• Neighborhood

Area Networks

TSCH

Page 16: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 16© 2013-2014 Cisco and/or its affiliates. All rights reserved.

IEEE 802.15.4 Features

• Designed for low bandwidth, low transmit power, small frame size• More limited than other WPAN technologies such as Bluetooth

• Basic packet size is 127 bytes (802.15.4g is up to 2047 bytes) (Smaller packets, less errors)

• Transmission Range varies (802.15.4g is up to 1km)

• Fully acknowledged protocol for transfer reliability

• Data rates of 851, 250, 100, 40 and 20 kbps (IEEE 802.15.4-2011 05-Sep-2011)• Frequency and coding dependent

• Two addressing modes; 16-bit short (local allocation) and 64-bit IEEE (unique global)

• Several frequency bands (Different PHYs)• Europe 868-868.8 MHz – 3 chans , USA 902-928 MHz – 30 chans, World 2400-2483.5 MHz – 16

chans

• China - 314–316 MHz, 430–434 MHz, and 779–787 MHz Japan - 920 MHz

• Security Modes: None, ACL only, Secured Mode (using AES-CCM mode)

• 802.15.4e multiple modes including Time Synchronized Channel Hopping (TSCH)

Page 17: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 17© 2013-2014 Cisco and/or its affiliates. All rights reserved.

802.15.4 Protocol Stack

• Specifies PHY and MAC only

• Medium Access Control Sub-Layer (MAC)• Responsible for reliable communication between two devices

• Data framing and validation of RX frames

• Device addressing

• Channel access management

• Device association/disassociation

• Sending ACK frames

• Physical Layer (PHY)• Provides bit stream air transmission

• Activation/Deactivation of radio transceiver

• Frequency channel tuning

• Carrier sensing

• Received signal strength indication (RSSI)

• Link Quality Indicator (LQI)

• Data coding and modulation, Error correction

Physical Layer(PHY)

MAC Layer(MAC)

Upper Layers

(Network & App)

Page 18: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 18© 2013-2014 Cisco and/or its affiliates. All rights reserved.

IEEE 802.15.4 Node Types

• Full Function Device (FFD)• Can operate as a PAN co-ordinator (allocates

local addresses, gateway to other PANs)• Can communicate with any other device (FFD

or RFD)• Ability to relay messages (PAN co-ordinator)

• Reduced Function Device (RFD)• Very simple device, modest resource

requirements• Can only communicate with FFD• Intended for extremely simple applications

P

R F

F

R

R

Page 19: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 19© 2013-2014 Cisco and/or its affiliates. All rights reserved.

• Star Topology • Cluster Tree• Mesh Topology

IEEE 802.15.4 Topologies

P

R F

F

R

R

P

F F

F

R

F

R

• All devices communicate to PAN co-ordinator which uses mains power

• Other devices can be battery/scavenger

Single PAN co-ordinator exists for all topologies

• Devices can communicate directly if within range

F F

F

F

P

R

R

F

R

Operates at Layer 2

R

R

RR

• Higher layer protocols like RPL may create their own topology that do not follow 802.15.4 topologies

Page 20: 6TiSCH + RPL @ Telecom Bretagne 2014

20

IEEE 802.15.4e

TimeSlotted Channel Hopping

Page 21: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 21© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Wireless Industrial

• Better process optimization and more accurate predictive maintenance increase profit; 1% improvement in a refinery with a $1.5B annual profit leads to $40k/day ($15M/yr) more profit

• Thus more and different sensors can be justified economically, if they can be connected

• But wire buried in conduit has a high installation and maintenance cost, with long lead times to change, and is difficult to repair

• The solution: wireless sensors in non-critical applications, designed for the industrial environment: temperature, corrosion, intrinsic safety, lack of power sources (particularly when there is no wire)

• For critical control loops, use wireless control room links with controllers located in the field, possibly connected over local wiring

Page 22: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 22© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Converging ICT and OT

Convergence of IT and OT technologies, aka the Industrial Internet, represents a multibillion opportunity for IT vendors and long term job creation.

Deterministic Wireless Networking is one of the key elements.

For each ‘critical’ wired measurement there are hundreds missing ones that could be addressed through wireless (Industrial Internet)

Architecture and Standards are necessary for Industry adoption

Operational technology (OT) is hardware and software that detects or causes a change through the direct monitoring and/or control of physical devices, processes and events in the enterprise.

Page 23: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 23© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Industrial connected device growth

WWAN: GSM – LTE WLAN: 802.11 WPAN: 802.15.4, ISA100.11a, WirelessHART

Page 24: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 24© 2013-2014 Cisco and/or its affiliates. All rights reserved.

ISA100: Wireless Systems for Industrial Automation

ISA100.11a industrial WSN• Wireless systems for industrial

automation• Process control and related applications

Leverages 802.15.4(e) + IPv6• Link Local Join process• Global Address runtime• 6LoWPAN Header Compression• Yet specific routing and ND• Next: Backbone Router

ISA100.15 backhaul

Page 25: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 25© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Amendment to the 802.15.4-2006 MAC needed for the applications served by 802.15.4f PHY Amendment for Active RFID 802.15.4g PHY Amendment for Smart Utility Networks initially for Industrial applications (such as those addressed by wiHART and the ISA100.11a

standards)

Security: support for secured ack

Low Energy MAC extension Coordinated Sampled Listening (CSL)

Channel Hopping Not built-in, subject to vendor design. Open std work started with

6TSCH

New Frame Types Enhanced (secure) Acknowledgement (EACK) Enhanced Beacon and Beacon Request (EB and EBR) Optional Information Elements (IE)

IEEE 802.15.4e

Page 26: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 26© 2013-2014 Cisco and/or its affiliates. All rights reserved.

TSCH Properties

Channel Hopping : • retry around interference, • round robin strategy

Time Slotted (or Synchronized) : • Deterministic: Synchronized + Time formatted in SlotFrame(s)• Tracks: below IP, can be orchestrated by a third party like virtual

circuits• Slotted: benefits of slotted aloha vs. aloha => reduce collisions• Battery operation: if traffic profile is known, devices wake upon

need

Page 27: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 27© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Reliability through (all possible!)

Code diversityCode Division Multiplex Access

Network Coding (WIP)

Frequency diversityChannel hopping

B/W listing

Time DiversityARQ + FEC (HARQ)

Spatial diversityDynamic Power Control

DAG routing topology + ARCs

Duo/Bi-casting (live-live)

Page 28: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 28© 2013-2014 Cisco and/or its affiliates. All rights reserved.

IEEE802.15.4e TimeSlotted Channel Hopping

16 c

hann

el o

ffset

s

e.g. 31 time slots (310ms)

A

BC

DE

FG

H

I

J

• Schedule => direct trade-off between throughput, latency and power consumption.• A collision-free communication schedule is typical in industrial applications.• IEEE802.15.4e published April 2012.

defines how to execute a schedule, but not how to build/maintain it.

Page 29: 6TiSCH + RPL @ Telecom Bretagne 2014

29

Page 30: 6TiSCH + RPL @ Telecom Bretagne 2014

© 2010 Cisco and/or its affiliates. All rights reserved.BRKEWN-3012 30Unclassified

Why IPv6 ?

Going IP

Page 31: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 31© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Why IP ?

Open Standards vs. proprietary• COTS* suppliers drive costs down but• Reliability, Availability and Security up

IP abstraction vs. per MAC/App

• 802.11, 802.15.4 (e), Sat, 3G, UWB

• Keep L2 topology simple

To Infinity and Beyond… But End-to-End.• No intermediate gateway, tunnel, middle boxes

& other trick

* Commercial, off-the-shelf

Page 32: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 32© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Tens of Billions Smart ObjectsThings

Which IP version ?

The current Internet comprises several billion devices

Smart Objects will add tens of billions of additional devices

IPv6 is the only viable way forward

1~2 Billions PCs & servers

Mobile

Fixed

2~4 Billions Phones & cars

IPv4 Unallocated pool exhausted March 2011 !RIPE NCC: Sept 2012; ARIN March 2015 (last /8)

Page 33: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 33© 2013-2014 Cisco and/or its affiliates. All rights reserved.

IETF LLN Related Workgroups

Reuse work done here where possible

Application

General

Internet

Ops and Mgmt

Routing

Security

Transport

Core

6TiSCH

ROLL

IETF LWIG

Constrained Restful Environments

Charter to provide a framework for resource-oriented applications intended to run on constrained IP networks.

IPv6 over the TSCH mode of 802.15.4eInitial charter to produce an architecture, a

minimal RPL operation over a static schedule and a data model to control the

LLC (6top)Lightweight Implementation Guidance

Charter is to provide guidance in building minimal yet interoperable IP-capable

devices for the most constrained environments. .

6lo

Routing over Low Power Lossy Networks

Charter focusses on routing issues for low power lossy networks.

Page 34: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 34© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Requirement for a new standard

• Industrial requires standard-based products• Must support equivalent features as incumbent protocols

• Must provide added value to justify migration• 6TiSCH value proposition

• Design for same time-sensitive MAC (802.15.4e TSCH)• Direct IPv6 access to device (common network mgt)• RPL Distributed routing for scalability (for monitoring)• Large scale IPv6 subnet for mobility (50K +)

Page 35: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 35© 2013-2014 Cisco and/or its affiliates. All rights reserved.

6TiSCH: IPv6 over TSCH MAC

Active IETF WG, 4 WG docs being adopted

Define an Architecture that links it all together

Align existing standards • (RPL, 6LoWPAN, PANA?, RSVP, PCEP, MPLS) over 802.15.4e TSCH

Support Mix of centralized and distributed deterministic routing

Design 6top sublayer for L3 interactions

Open source implementations (openWSN…)

Multiple companies and universities participating

Page 36: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 36© 2013-2014 Cisco and/or its affiliates. All rights reserved.

6TiSCH Client stack

Centralized route and

track computation

and installation

Management and SetupDiscoveryPub/Sub

Authentication for Network

Access 

Wireless ND(NPD proxy)

Time Slot scheduling and track G-MPLS forwarding

Distributed route and track

computation and installation

Distributed route and track

computation and installation

IEEE 802.15.4e TSCH

6LoWPAN HC

IPv6

RPL

6top

TCP UDP ICMP RSVP

PCEP/PCC CoAP/DTLS AAA 6LoWPAN ND

}

Page 37: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 37© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Best effort routing

UYA X

15.4 PHY

15.4e TSCH

CoAP

UDP

IPv6

6LoWPAN-HC

6top

15.4 PHY

15.4e TSCH

CoAP

UDP

IPv6

6LoWPAN-HC

6top

15.4 PHY

15.4e TSCH

CoAP

UDP

IPv6

6LoWPAN-HC

6top

15.4 PHY

15.4e TSCH

CoAP

UDP

IPv6

6LoWPAN-HC

6top

Page 38: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 38© 2013-2014 Cisco and/or its affiliates. All rights reserved.

15.4 PHY

15.4e TSCH

CoAP

UDP

IPv6

6LoWPAN-HC

6top

15.4 PHY

15.4e TSCH

CoAP

UDP

IPv6

6LoWPAN-HC

6top

15.4 PHY

15.4e TSCH

CoAP

UDP

IPv6

6LoWPAN-HC

6top

15.4 PHY

15.4e TSCH

CoAP

UDP

IPv6

6LoWPAN-HC

6top

UYA X

Track Switching in Transport Mode

Page 39: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 39© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Multi-protocol

15.4e TSCH 15.4e TSCH 15.4e TSCH 15.4e TSCH

15.4 PHY 15.4 PHY 15.4 PHY15.4 PHY

CoAP

UDP

IPv6

6LoWPAN-HC

6top

CoAP

UDP

IPv6

6LoWPAN-HC

6top

15.4 PHY

TSCH

CoAP

UDP

IPv6

6LoWPAN-HC

6top

15.4 PHY

TSCH

Multi-protocol

UDP

IPv6

6LoWPAN-HC

6top

Track Switching in Tunnel Mode

CoAP

Page 40: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 40© 2013-2014 Cisco and/or its affiliates. All rights reserved.

6LoWPAN Fragment forwarding

15.4 PHY

15.4e TSCH

CoAP

UDP

IPv6

6LoWPAN-HC

6top

15.4 PHY

15.4e TSCH

CoAP

UDP

IPv6

6LoWPAN-HC

6top

15.4 PHY

15.4e TSCH

CoAP

UDP

IPv6

6LoWPAN-HC

6top

15.4 PHY

15.4e TSCH

CoAP

UDP

IPv6

6LoWPAN-HC

6top

UYA X

1st

Next

1st

Next

Page 41: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 41© 2013-2014 Cisco and/or its affiliates. All rights reserved.

6TiSCH-based Multilink Subnet

6TiSCH LLN

6TiSCH LLN

intra/Internet

intra/Internet

6TiSCHLLN

6TiSCHLLN

Backbone Router

PCE NMS

Virtual devices

Backbone

Attached LLN*

* LLN == Low Power Lossy Network

Page 42: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 42© 2013-2014 Cisco and/or its affiliates. All rights reserved.

What’s a Backbone Router?

Common ND based abstraction over a backbone

Scales DAD operations (distributes 6LoWPAN ND LBR)

Scales the subnetwork (high speed backbone)

Allows interaction with nodes on the backbone or in other subnets running different operations

http://tools.ietf.org/html/draft-thubert-6lowpan-backbone-router

Page 43: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 43© 2013-2014 Cisco and/or its affiliates. All rights reserved.

6TSCH reference model

Page 44: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 44© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Initial time

ConnectedRoute to subnet

Page 45: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 45© 2013-2014 Cisco and/or its affiliates. All rights reserved.

First advertisements from GW (RA, IGP, RPL)

DefaultRouteIn RIB

Gateway to the outside participates to some IGP with external network and attracts all extra-subnet traffic via protocols over the backbone

Page 46: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 46© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Registration (1st step)

NS (ARO)

DAD

NS(ARO)

NS DAD(ARO)

Directly upon NS(ARO) or indirectly upon DAR message, the backbone router performs DAD on behalf of the wireless device.

Page 47: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 47© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Registration (2nd step one second later)

DAC

NA(ARO)

Optional NA(O)

The BR maintains a route to the WSN node for the DAO Lifetime over instance VRF. VFR may be mapped onto a VLAN on the backbone.

Page 48: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 48© 2013-2014 Cisco and/or its affiliates. All rights reserved.

IPv6 ND Proxy for RPL

RPLDAO

HostRoute

Optional NA(O)

The BR maintains a route to the WSN node for the DAO Lifetime over instance VRF. VFR may be mapped onto a VLAN on the backbone.

Page 49: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 49© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Duplication

NS DAD(ARO)

NA (ARO)NS

(ARO)

DAD option has:Unique ID

TID (SeqNum)

Defend with NA if:Different OUID

Newer TID

Page 50: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 50© 2013-2014 Cisco and/or its affiliates. All rights reserved.

DAD option has:Unique ID

TID (SeqNum)

Defend with NA if:Different OUID

Newer TID

Mobility

RPLDAO

Optional NA(ARO)

HostRoute

NA (ARO) with older TID (loses)

Page 51: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 51© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Resolution

Packet

NSlookup

NA ARO option has:

Unique IDTID (SeqNum)

NA (ARO)

Page 52: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 52© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Resolution (2)

NSlookup

Mixed mode NDBBR proxying over

the backbone

NA (ARO)

Packet

Page 53: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 53© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Enhanced Address Registration Option

• Used to resolve conflicts

• Need In ND: TID to detect movement ->eARO

• Need In RPL: Object Unique ID if we use RPL for DAD 0 1 2 3

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type | Length = 2 | Status | Reserved | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Reserved |T| TID | Registration Lifetime | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | + OUID ( EUI-64 or equivalent ) + | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Figure 2: EARO

Page 54: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 54© 2013-2014 Cisco and/or its affiliates. All rights reserved.

6TiSCH at a glanceDeterministic IPv6 over IEEE802.15.4e TimeSlotted Channel Hopping (6TiSCH)The Working Group will focus on enabling IPv6 over the TSCH mode of the IEEE802.15.4e standard. The scope of the WG includes one or more LLNs, each one connected to a backbone through one or more LLN Border Routers (LBRs).

Active drafts http://tools.ietf.org/html/draft-ietf-6tisch-terminology http://tools.ietf.org/html/draft-ietf-6tisch-tsch http://tools.ietf.org/html/draft-ietf-6tisch-architecturehttp://tools.ietf.org/html/draft-ietf-6tisch-minimal http://tools.ietf.org/html/draft-wang-6tisch-6top http://tools.ietf.org/html/draft-ohba-6tisch-security http://tools.ietf.org/html/draft-sudhaakar-6tisch-coap

Page 55: 6TiSCH + RPL @ Telecom Bretagne 2014

© 2010 Cisco and/or its affiliates. All rights reserved. 55UnclassifiedBRKEWN-3012

Routing IPinLLNs

Page 56: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 56© 2013-2014 Cisco and/or its affiliates. All rights reserved.

• Hidden terminal

• Interference domains grows faster that range

• Density => low power => multihop => routing

Routing for Spatial Reuse

Page 57: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 57© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Proactive vs. Reactive

Aka

stateful

vs.

On-demand routing

Note: on-demand breaks control vs. Data plane separation

Page 58: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 58© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Link State vs. Distance Vector

• Aka SPF vs. Bellman-Ford

• LS requires full state and convergence

• LS can be very quiet on stable topologies

• DV hides topolical complexities and changes

Page 59: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 59© 2013-2014 Cisco and/or its affiliates. All rights reserved.

0

Route stretch and fisheye

Optimized Routing Approach (ORA) spans advertisements for any change

Routing overhead can be reduced if stretch is allowed: Least Overhead Routing Approach (LORA)

For instance Fisheye and zone routing provide a precise routing when closeby and sense of direction when afar

Page 60: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 60© 2013-2014 Cisco and/or its affiliates. All rights reserved.

DAG, DODAG

A Directed Acyclic Graph (DAG) is formed by a collection of vertices (nodes) and edges (links).

Each edge connecting one node to another (directed) in such a way that it is not possible to start at Node X and follow a directed path that cycles back to Node X (acyclic).

A Destination Oriented DAG (DODAG) is a DAG that comprises a single root node.

Here a DAG that is partitioned in 2 DODAG

Clusterhead

5

4

4

01

3

1 1

2

2

2

22

3

3

3

3

3

3

2

4

4

5

0

65

4

Page 61: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 61© 2013-2014 Cisco and/or its affiliates. All rights reserved.

SubDAG, and Fanout DAG

• In Green: A’s subDAG. • Impacted if A’s

connectivity is broken• Domain for routing

recovery

• In Red: B’s fanout DAG • (or reverse subDAG)• Potential SPAN on B’s DAO• Thus potential return paths• Fanout must be controlled

to limit intermediate states

Clusterhead

5

4

4

01

3

1 1

2

2

2

22

3

3

3

3

3

3

2

4

4

5

0

65

4

A

B

Page 62: 6TiSCH + RPL @ Telecom Bretagne 2014

63

Routing over radios

Page 63: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 64© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Dynamic topologies

No preexisting physical topology

Can be computed by a mesh under protocol, but…

Else Routing must infer its topology

Movement

natural and unescapable

Yet difficult to predict or detect

Topology Update

Routing Update

Fast => expensive

Page 64: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 65© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Peer selection

Potentially Large Peer Set

Highly Variable Capabilities

Selection Per Objective {Metrics (e.g. RSSI, ETX…)

L3 Reachability (::/0, …)

Constraints (Power …)

Page 65: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 66© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Constrained Objects

• Smart object are usually • Small & Numerous• « sensor Dust »

• Battery is critical• Deep Sleep• Limited memory• Small CPU

• Savings are REQUIREDÞ Control plane Þ Data plane (Compression)

Page 66: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 67© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Fuzzy links

Neither transit nor P2P

More like a changing NBMA• a new paradigm for

routing

Changing metrics• (tons of them!)• (but no classical cost!)

Inefficient flooding• Self interfering

QoS and CAC

Page 67: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 68© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Local Routing & Mobility

Stretch vs. ControlOptimize table sizes and updates

Optimized Routing Approach (ORA) vs

Least Overhead Routing Approach (LORA)

on-demand routes (reactive)

Forwarding and retriesSame vs. Different next hop

Validation of the Routing plane

Non Equal Cost multipath Directed Acyclic Graphs (DAG) a MUST

Maybe also, Sibling routing

Objective Routing Weighted Hop Count the wrong metric

Instances per constraints and metrics

Page 68: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 69© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Global Mobility

Pervasive Access• Satellite • 3/4G coverage• 802.11, 802.15.4

Always Reachable• at a same identifier• Preserving connections• Or not ? (CORE*, DTN**)

Fast roaming• Within technology (L2) • Between Technologies (L3)

* Constrained RESTful Environments

** Delay-Tolerant Networking

Page 69: 6TiSCH + RPL @ Telecom Bretagne 2014

70

RPL Concepts

Page 70: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 71© 2013-2014 Cisco and/or its affiliates. All rights reserved.

RPL key concepts

Minimum topological awareness

Data Path validation

Non-Equal Cost Multipath Fwd

Instantiation per constraints/metrics

Autonomic Subnet G/W Protocol

Optimized Diffusion over NBMA

RPL is an extensible proactive IPv6 DV protocol

Supports MP2P, P2MP and P2P P2P reactive extension

RPL specifically designed for LLNsAgnostic to underlying link layer technologies (802.15.4, PLC, Low Power WiFi)

Page 71: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 72© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Controlling the control … by design

Distance Vector as opposed to Link State• Knowledge of SubDAG addresses and children links• Lesser topology awareness => lesser sensitivity to

change• No database Synchronization => Adapted to movement

Optimized for Edge operation

• Optimized for P2MP / MP2P, stretch for arbitrary P2P

• Least Overhead Routing Approach via common ancestor

Proactive as opposed to Reactive

• Actually both with so-called P2P experimental specification

Datapath validation

Page 72: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 73© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Datapath Validation

Control Information in Data Packets:

•Instance ID

• Hop-By-Hop Header Sender Rank•

Direction (UP/Down)

Errors detected if:

No route further down for packet going downNo route for packet going downRank and direction do not match

{

Page 73: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 74© 2013-2014 Cisco and/or its affiliates. All rights reserved.

In the context of routing, a DAG is formed by a collection of vertices (nodes) and edges (links), each edge connecting one node to another (directed) in such a way that it is not possible to start at Node X and follow a directed path that cycles back to Node X (acyclic).

Directed Acyclic Graph for NECM

Page 74: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 76© 2013-2014 Cisco and/or its affiliates. All rights reserved.

DIO Base Object: forming the DODAG

0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | RPLInstanceID |Version Number | Rank | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |G|0| MOP | Prf | DTSN | Flags | Reserved | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | + + | | + DODAGID + | | + + | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Option(s)... +-+-+-+-+-+-+-+-+

Page 75: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 77© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Global versus Local Repair

• Global repair: : A new DODAG iteration• Rebuild the DAG … Then repaint the prefixes upon changes• A new Sequence number generated by the root• A router forwards to a parent or as a host over

next iteration

• Local Repair: find a “quick” local repair path • Only requiring local changes !• May not be optimal according to the OF • Moving UP and Jumping are cool. • Moving Down is risky: Count to Infinity Control

Page 76: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 78© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Objective Function

Extend the generic behavior• For a specific need / use case

Used in parent selection• Contraints• Policies Position in the DAG• Metrics

Computes the Rank increment• Based on hop metrics• Do NOT use OF0 for adhoc radios!• (OF 0 uses traditional weighted hop count)

{

Page 77: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 79© 2013-2014 Cisco and/or its affiliates. All rights reserved.

DIO Base Object: route construction rules

0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | RPLInstanceID |Version Number | Rank | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |G|0| MOP | Prf | DTSN | Flags | Reserved | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | + + | | + DODAGID + | | + + | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Option(s)... +-+-+-+-+-+-+-+-+

Page 78: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 80© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Mode of Operation

+-----+-----------------------------------------------------+

| MOP | Description |

+-----+-----------------------------------------------------+

| 0 | No Downward routes maintained by RPL |

| 1 | Non-Storing Mode of Operation |

| 2 | Storing Mode of Operation with no multicast support |

| 3 | Storing Mode of Operation with multicast support |

| | |

| | All other values are unassigned |

+-----+-----------------------------------------------------+

Page 79: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 81© 2013-2014 Cisco and/or its affiliates. All rights reserved.

DAO Base Object : route construction

0 1 2 3

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

| RPLInstanceID |K|D| Flags | Reserved | DAOSequence |

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

| |

+ +

| |

+ DODAGID* +

| |

+ +

| |

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

| Option(s)...

+-+-+-+-+-+-+-+-+

Page 80: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 82© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Owned prefix routing (storing mode)

A

B

C D

Parent is default GW, advertizes owned PIO (L bit on)

RPL Router autoconfigures Addr from parent PIO

RPL Router advertises Prefix via self to parent

RPL Router also advertises children Prefix

B:

::/0 via A::A

A:: connected

B:: connected

C:: via B::C

D:: via B::D

C:

::/0 via B::B

B:: connected

C:: connected

A:

A:: connected

B:: via A::B

C:: via A::B

D:: via A::BD:

::/0 via B::B

B:: connected

D:: connected

A::B

B::C B::D

B::B

A::A

Page 81: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 83© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Subnet Routing (storing mode)

A

B

C D

Parent is default GW, propagates root PIO (L-bit off)

Parent Address in the PIO (with R bit)

RPL Router autoconfigures Address from parent PIO

RPL Router advertises Address via self to parent

RPL Router also advertises children Addresses

B:

::/0 via A::A

A::A connected

A::B self

A::C connected

A::D connected

A:: ~onlink

C:

::/0 via A::B

A::B connected

A::C self

A:: ~onlink

A:

A::A self

A::B connected

A::C via A::B

A::D via A::B

A:: ~onlink

D:

::/0 via A::B

A::B connected

A::D self

A:: ~onlink

A::B

A::C A::D

A::A

For YourReference

Page 82: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 84© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Subnet Routing (non-storing mode)

A

B

C D

Parent is default GW, propagates root PIO (L-bit off)

Parent Address in the PIO (with R bit)

RPL Router autoconfigures Address from parent PIO

RPL Router advertises Address via Parent to Root

Root recursively builds a Routing Header back

B:

::/0 via A::A

A::A connected

A::B self

A:: ~onlink

C:

::/0 via A::B

A::B connected

A::C self

A:: ~onlink

D:

::/0 via A::B

A::B connected

A::D self

A:: ~onlink

Target A::C viaTransit A::BA::B

A::C A::D

A::A

A: (root)

A::A self

A::B connected

A::C via A::B

A::D via A::B

A:: ~onlink

A::D via A::B connectedRH4:

Page 83: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 85© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Owned prefix routing (non-storing mode)

A

B

C D

Parent is default GW, advertizes owned PIO (L bit on)

RPL Router autoconfigures Address from parent PIO

RPL Router advertises Prefix via Address to Root

Root recursively builds a Routing Header back

B:

::/0 via A::A

A:: connected

B:: connected

C:

::/0 via B::B

B:: connected

C:: connected A: (root)

A:: connected

B:: via A::B

C:: via B::C

D:: via B::DD:

::/0 via B::B

B:: connected

D:: connected

Target C::/ viaTransit B::C

D::3 via B::D via A::B connected

A::B

B::C B::D

B::B

A::A

RH4:

For YourReference

Page 84: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 86© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Multicast over radio NBMA

Flooding interferes with itself

B

C

D

A

Hidden node/terminal/station

1

2 ’’2’

Page 85: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 87© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Trickle: An Optimized Diffusion

Suppression of redundant copies Do not send copy if K copies received

Jitter for Collision AvoidanceFirst half is mute, second half is jittered

Exponential backoffDouble I after period I, Reset I on inconsistency

I

2*I

K = 4

Page 86: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 88© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Routing Metrics in LLNs

Node Metrics Link Metrics

Node State and Attributes ObjectPurpose is to reflects node workload (CPU,

Memory…)“O” flag signals overload of resource“A” flag signal node can act as traffic

aggregator

Throughput ObjectCurrently available throughput (Bytes per

second)Throughput range supported

Node Energy Object“T” flag: Node type: 0 = Mains, 1 = Battery, 2 =

Scavenger“I” bit: Use node type as a constraint

(include/exclude)“E” flag: Estimated energy remaining

LatencyCan be used as a metric or constraintConstraint - max latency allowable on pathMetric - additive metric updated along path

Hop Count ObjectCan be used as a metric or constraintConstraint - max number of hops that can be

traversedMetric - total number of hops traversed

Link ReliabilityLink Quality Level Reliability (LQL)

0=Unknown, 1=High, 2=Medium, 3=LowExpected Transmission Count (ETX)

(Average number of TX to deliver a packet)

Link ColourMetric or constraint, arbitrary admin value

For YourReference

Page 87: 6TiSCH + RPL @ Telecom Bretagne 2014

89

Applying RPL

Page 88: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 91© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Example radio connecticity

At a given point of time connectivity is

(fuzzy)

Radio link

Page 89: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 92© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Clusterhead

Applying RPL

1st pass (DIO)• Establishes a logical DAG

topology• Trickle Subnet/config Info• Sets default route• Self forming / self healing

2nd pass (DAO) • paints with addresses and

prefixes• Any to any reachability• But forwarding over DAG only• saturates upper links of the DAG• And does not use the full mesh

properly

Link selected as parent link

Potential link

Clusterhead0

1

11

4

44

46

3

3

3

3

3

2

2

2

22

2

5

55

Page 90: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 93© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Clusterhead

Local recovery (step 1)

A’s link to root failsA loses connectivityEither poisons or detaches a subdag

In black: the potentially impacted zoneThat is A’s subDAG

Link selected as parent link

Potential link

Clusterhead0

1

11

4

44

46

3

3

3

3

3

2

2

2

22

2

5

55

A

1

11

3

3

3

3

3

2

2

2

22

2

5

55

4

44

4

Page 91: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 94© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Clusterhead

Local recovery (step 2)

B can reparent a same Rank so B’s subDAG is safe

The rest of A’s subDAG is isolated

Either poison ar build a floating DAG as illustrated

In the floating DAG A is root

The structure is preserved

Link selected as parent link

Potential link

Clusterhead0

1

1

4

44

46

3

3

3

2

2

2

2

2

21

5

55

AB

0

1

Page 92: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 95© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Clusterhead

Local recovery (step 3)

Once poisined nodes are identifiedIt is possible for A to reparent safely

A’s descendants inherit from Rank shift

Note: a depth dependent timer can help order things

Link selected as parent link

Potential link

Clusterhead0

1

12

4

44

46

3

3

3

4

4

2

2

2

23

3

5

55

A

Page 93: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 96© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Clusterhead

Global recovery

A new DAG iteration• In Grey, the new DAG

progressing

Metrics have changed, the DAG may be different

Forwarding upwards traffic from old to new iteration is allowed but not the other way around

Link selected as parent link

Potential link

Clusterhead0

1

11

4

44

46

3

3

3

3

3

3

2

2

22

2

5

55

Page 94: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 97© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Clusterhead

5

4

4

Multiple DODAGs within Instance

A second root is available• (within the same instance)

The DAG is partitioned

1 root = 1 DODAG

1 Node belongs to 1 DODAG• (at most, per instance)

Nodes may JUMP • from one DODAG to the next

Nodes may MOVE • up the DODAG

Going Down MAY cause loops

• May be done under CTI control

Link selected and oriented by DIO

Potential link

01

3

1 1

2

2

2

22

3

3

3

3

3

3

2

4

4

5

0

65

4

Page 95: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 98© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Multiple Instances

Running as Ships-in-the-night

1 instance = 1 DAG

A DAG implements constraints

Serving different Objective Functions

For different optimizations

Forwarding along a DODAG (like a vlan)

Clusterhead0

1

11

2

2

2

22

3

3

3

3

3

3

23

5

4

4

4

4

Clusterhead

Constrained instance

Default instance

Potential link

A

Page 96: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 99© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Summary

New Radios issues: Addressed in RPL by:

Dynamic Topologies

Peer selection

Constrained Objects

Fuzzy Links

Routing, local Mobility

Global Mobility

DV, ORA P2MP/MP2P, LORA P2P

Objective Functions, Metrics

Controlling the control

NECM Directed Acyclic Graphs Trickle and Datapath validation

Local and Global Recovery

N/A

Page 97: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 100© 2013-2014 Cisco and/or its affiliates. All rights reserved.

RPL – IETF suite

RFC 6206: The Trickle Algorithm

RFC 6550: RPL: IPv6 Routing Protocol for LLNs

RFC 6551: Routing Metrics Used for Path Calculation in LLNs

RFC 6552: Objective Function Zero for the Routing Protocol for LLNs

RFC 6553: RPL Option for Carrying RPL Information in Data-Plane Datagrams

RFC 6554: An IPv6 Routing Header for Source Routes with RPL

RFC 6719: MRHOF Objective Function with hysteresis

draft-ietf-roll-trickle-mcast: Multicast Protocol for LLNs

draft-vilajosana-6tisch-minimal: Minimal 6TiSCH Configuration

Page 98: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 101© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Conclusion

The Internet is going through its most considerable change since the first days, adding a nervous system to the bug brain. Potential is immense and unpredictable.

Made possible by IPv6 But not at the core and unbeknownst to the core

Stimulated by radio access Enabling new devices and usages

The change happens in the Fringe, which is in fact a collection of virtualized fringes. The polymorphic Internet is already there.

Page 99: 6TiSCH + RPL @ Telecom Bretagne 2014

Cisco Confidential 102© 2013-2014 Cisco and/or its affiliates. All rights reserved.

“We might be at the eve of pervasive networking, a vision for the Internet where every person and every device is connected to the network in the ultimate realization of Metcalf's Law.”