6TSCH Webex 06/21/2013.

Slides:



Advertisements
Similar presentations
G : DCM Signaling Mechanism Using GMPLS RSVP-TE ITU-T Workshop on IP-Optical, Chitose, Japan 7/11/2002 Dimitrios Pendarakis, Tellium, Inc. ITU-T.
Advertisements

Distributed Assignment of Encoded MAC Addresses in Sensor Networks By Curt Schcurgers Gautam Kulkarni Mani Srivastava Presented By Charuka Silva.
Multicast on the Internet CSE April 2015.
1 Internet Protocol Version 6 (IPv6) What the caterpillar calls the end of the world, nature calls a butterfly. - Anonymous.
Business Data Communications Packetizing and Framing.
EECC694 - Shaaban #1 lec # 10 Spring Asynchronous Transfer Mode (ATM) ATM is a specific asynchronous packet-oriented information, multiplexing.
5/31/05CS118/Spring051 twisted pair hub 10BaseT, 100BaseT, hub r T= Twisted pair (copper wire) r Nodes connected to a hub, 100m max distance r Hub: physical.
1 Interconnection ECS 152A. 2 Interconnecting with hubs r Backbone hub interconnects LAN segments r Extends max distance between nodes r But individual.
1 Network Layer: Host-to-Host Communication. 2 Network Layer: Motivation Can we built a global network such as Internet by extending LAN segments using.
MPLS L3 and L2 VPNs Virtual Private Network –Connect sites of a customer over a public infrastructure Requires: –Isolation of traffic Terminology –PE,
1 Version 3.0 Module 10 Routing Fundamentals and Subnetting.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Mobile IP Performance Issues in Practice. Introduction What is Mobile IP? –Mobile IP is a technology that allows a "mobile node" (MN) to change its point.
Network Kernel Architectures and Implementation ( ) Naming and Addressing Chaiporn Jaikaeo Department of Computer Engineering.
1 Multi-Protocol Label Switching (MPLS). 2 MPLS Overview A forwarding scheme designed to speed up IP packet forwarding (RFC 3031) Idea: use a fixed length.
Routing and Routing Protocols Routing Protocols Overview.
Introduction to Network Layer. Network Layer: Motivation Can we built a global network such as Internet by extending LAN segments using bridges? –No!
Section 4 : The OSI Network Layer CSIS 479R Fall 1999 “Network +” George D. Hickman, CNI, CNE.
Speaker:Yi-Jie Pan Advisor:Dr. Kai-Wei Ke 2014/04/28
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Introduction Slide 1 A Communications Model Source: generates.
CS 640: Introduction to Computer Networks
Review: –Ethernet What is the MAC protocol in Ethernet? –CSMA/CD –Binary exponential backoff Is there any relationship between the minimum frame size and.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
6TSCH Webex 05/17/2013. Add note on visibility It is our collective responsibility to make 6TSCH visible and attract participant Industrial Track.
OSI Model. Switches point to point bridges two types store & forward = entire frame received the decision made, and can handle frames with errors cut-through.
Computer Networks Dr. Jorge A. Cobb The Performance of Query Control Schemes for the Zone Routing Protocol.
The Performance of Query Control Schemes for the Zone Routing Protocol Zygmunt J. Haas Marc R. Pearlman.
6TSCH Webex 05/24/2013. Agenda BoF recap[5min] Webinar announcement[5min] Centralized routing requirements draft [10min + 5min Q&A] updated TSCH draft[5min]
1 Physical and Data Link Layer Computer Network System Sirak Kaewjamnong.
Routing and Routing Protocols
1 Version 3.1 Module 6 Routed & Routing Protocols.
Teknik Routing Pertemuan 10 Matakuliah: H0524/Jaringan Komputer Tahun: 2009.
Fair and Efficient multihop Scheduling Algorithm for IEEE BWA Systems Daehyon Kim and Aura Ganz International Conference on Broadband Networks 2005.
RIP Routing Protocol. 2 Routing Recall: There are two parts to routing IP packets: 1. How to pass a packet from an input interface to the output interface.
5: DataLink Layer5-1 Hubs Hubs are essentially physical-layer repeaters: m bits coming from one link go out all other links m at the same rate m no frame.
Networks DEVICES. Repeater device to amplify or regenerate digital signals received while setting them from one part of a network into another. Works.
15.1 Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
6TSCH Webex 05/03/2013. Agenda update charter: security paragraph[5min] link / peering management[10min] 6TUS building blocks[10min] Centralized routing.
Chairs: Pascal Thubert Thomas Watteyne Etherpad for minutes: IPv6 over the TSCH mode.
The Network Layer UNIT-4 snistforum.com. Network Layer Design Issues Store-and-Forward Packet Switching Services Provided to the Transport Layer Implementation.
Advanced Computer Networks
25 September 2015 Webex IPv6 over the TSCH mode of IEEE e
Link Layer 5.1 Introduction and services
Backbone Router PlugFest demo
CS408/533 Computer Networks Text: William Stallings Data and Computer Communications, 6th edition Chapter 1 - Introduction.
Chapter 4 Introduction to Network Layer
Lecture 28 Mobile Ad hoc Network Dr. Ghalib A. Shah
Networking Devices.
6LoWPAN Backbone Router
Switching and High-Speed Networks
MAC Addresses and ARP 32-bit IP address:
ISO/OSI Model and Collision Domain
Chapter 4 Data Link Layer Switching
Hubs Hubs are essentially physical-layer repeaters:
Sensor Network Routing
Virtual LANs.
Hubs Hubs are essentially physical-layer repeaters:
What’s “Inside” a Router?
Extending IP to Low-Power, Wireless Personal Area Networks
Chapter 4 Introduction to Network Layer
Chapter 15. Internet Protocol
1 Multi-Protocol Label Switching (MPLS). 2 MPLS Overview A forwarding scheme designed to speed up IP packet forwarding (RFC 3031) Idea: use a fixed length.
Chapter 15. Connecting Devices
Wireless Sensor Networks and Internet of Things
Network and the internet
Chapter 5 Data Link Layer – Hub, Switch
Computer Networks: Wireless Networks
Data Communication: Routing algorithms
Naval Research Laboratory Dynamic Backbone Subnets
Presentation transcript:

6TSCH Webex 06/21/2013

Agenda draft-thubert-6tsch-architecture-02 [5min] draft-vilajosana-6tsch-basic-00 [10min] Architecture with remote BBR [10min] Soft cell assignment: random or not? [20min] Track IDs [10min] AOB [5min]

draft-thubert-6tsch-architecture-02 Not published yet

Centralized vs. Distributed Routing 6TSCH supports a mix model of centralized routes that are computed by a Path Computation Entity and distributed routes that are computed by RPL over a common physical LLN. Both RPL and the PCE may inject routes in the Routing Tables of the 6TSCH routers. In either case, each route is associated with a topology that is indexed by an instanceID, as defined in RPL [RFC6550]. RPL and PCE rely on shared sources to define Global and Local InstanceIDs. It is possible for RPL and PCE to share a same topology, in which case the PCE routes have precedence over RPL routes in case of a conflict. Inside the 6TSCH domain, the flow label is used to indicate the topology that must be used for routing and the associated Routing Tables as discussed in [I-D.thubert-roll-flow-label].

Tunnel Mode In tunnel mode, the frames originate from an arbitrary protocol over a compatible MAC that may or may not be perfectly synchronized with the 6TSCH network. An example of this would be a router with a dual radio that is capable to receive and send Wireless HART or ISA100.11a frames with the second radio, by presenting itself as an Access Point or a Backbone Router, respectively. In that mode, the PCE may coordinate with a WiHART Network Manager or an ISA100.11a System Manager in order to specify the flows that are to be transported transparently over the Track.

Tunnel Mode +--------------+ | IPv6 | | 6LoWPAN HC | +--------------+ set restore | 6TUS | +dmac+ +dmac+ +--------------+ | | | | | TSCH MAC | | | | | | LLN PHY | +-------+ +--...-----+ +-------+ +--------------+ | ingress egress | | | +--------------+ | | | LLN PHY | | | | TSCH MAC | | | |ISA100/WiHART | | v

Tunnel Mode In that case, the flow information that identifies the Track is uniquely derived from the information at the receiving end, for instance the incoming Timeslots, or an ISA100.11a ContractId. At the ingress 6TSCH router, the packet destination is recognized as self but the flow information indicates that the frame must be tunneled over a particular 6TUS Track so the packet is not punted to upper layer. Instead, it is passed to the 6TUS sublayer for switching. The 6TUS sublayer in the ingress router overrides the destination MAC to broadcast and forwards. At the egress 6TUS router, the reverse operation occurs. Based on metadata associated to the Track, the frame is passed to the appropriate link layer with the destination MAC restored.

Transport Mode | ^ +--------------+ | | | IPv6 | | | | 6LoWPAN HC | | | +--------------+ ingress egress | 6TUS | sets +----+ +----+ restores +--------------+ dmac to | | | | dmac to | TSCH MAC | brdcst | | | | self +--------------+ | | | | | | | LLN PHY | +-------+ +--...-----+ +-------+ +--------------+

draft-vilajosana-6tsch-basic-00

Status Follow-up on webex discussion on 06/07/2013 Published on 06/19/2013 http://tools.ietf.org/html/draft-vilajosana-6tsch-basic-00 Same ideas as discussed over the phone Comments welcome!

Architecture with remote BBR

Current Architecture ? Remote BBR ---+------------------------ | External Network | +-----+ +-----+ | | Router | | PCE | | | | | | | Subnet Backbone | +--------------------+------------------+ | | | +-----+ +-----+ +-----+ | | Backbone | | Backbone | | Backbone o | | router | | router | | router o o o o o o o o o o o o o o o o o o o LLN o o o o o o o o o o o o o o o o ? Remote BBR

Tunneling/VLAN ---+------------------------ | External Network | +-----+ +-----+ | | Router | | PCE | | | | | | | Subnet Backbone | ========== +--------------------+-------------- TUNNEL ----+ | | ========== | +-----+ +-----+ +-----+ (remote) | | Backbone | | Backbone | | Backbone o | | router | | router | | router +-----+ +-----+ +-----+ o o o o o o o o o o o o o o o o o o o LLN o o o o o o o o o o o o o o o

PCE as forwarding engine --------------+------------------- | External Network | +-----+ | | PCE/Router | | ^ ^ ^ | | | +---------------+ | +----------------+ | | | v v v +-----+ +-----+ +-----+ | | Backbone | | Backbone | | Backbone o | | router | | router | | router o o o o o o o o o o o o o o o o o o o LLN o o o o o o o o o o o o o o o o Protocol?

Hybrid ---+----------------------- | External Network | +-----+ +-----+ | | Router | | PCE | | +--| | +-----+ | +-----+ | | ^ ^ ^ | | | | | ------------------------ | | | | | | +---------------+ | +----------------+ | | | v v v +-----+ +-----+ +-----+ | | Backbone | | Backbone | | Backbone o | | router | | router | | router o o o o o o o o o o o o o o o o o o o LLN o o o o o o o o o o o o o o o o

Question PCE, ND must be maintained as separate elements 6TSCH does not need to define anything to create the connectivity between the BBRs Discovery?

soft cell assignment: random or not?

Problem Applies to distributed scheduling only Two neighbor nodes negotiate the allocation of a cell in the schedule If this cell already used by other nodes in the neighborhood  collision Options: random allocation. Collisions unlikely. Detect and fix collisions Informed allocation. Neighbors maintain state. Collisions less likely. Still detect and fix (less frequent) collisions.

Collision probability 10 node neighborhood Each node sends 3 pk/s 101 cells 16 channels Random cell allocation Collision detection Collision occurrence? Collapse? Overhead of re-negotiation? Overhead maintaining state?

Informed allocation exchanging the changes in a node’s cell usages bitmap instead of reporting all cell usage bitmap periodically Approaches: Active Passive Hybrid

Using Trickle RFC6206, used in RPL To use Trickle, we need to define What constitutes a "consistent" transmission. What constitutes an "inconsistent" transmission. What "events", if any -- besides inconsistent transmissions -- reset the Trickle timer. What information a node transmits in Trickle messages. What actions outside the algorithm the protocol takes, if any, when it detects an inconsistency.

Using track IDs

Proposal Use a TrackID to associate incoming cells and outgoing cells TrackID is internal only, i.e. is does not appear in the packets Add TrackID to cell commands Track (switching) table using trackID Schedule is union of all track tables

Any Other Business?