Standards Certification Education & Training Publishing Conferences & Exhibits 13 February 20071 Sensicast Systems Network Layer General Comments This.

Slides:



Advertisements
Similar presentations
 WAN uses Serial ports  Ethernet Ports:  Straight through  Cross over.
Advertisements

Omniran TG 1 Cooperation for OmniRAN P802.1CF Max Riegel, NSN (Chair OmniRAN TG)
H. 323 Chapter 4.
07/24/200769th IETF Meeting - 6LoWPAN WG1 6LoWPAN Interoperability Jonathan Hui Zach Shelby David Culler.
Rev A8/8/021 ABC Networks
How do Networks work – Really The purposes of set of slides is to show networks really work. Most people (including technical people) don’t know Many people.
Institute of Technology, Sligo Dept of Computing Routing & IGRP Semester 3, Chapter 5.
CSEE W4140 Networking Laboratory Lecture 4: IP Routing (RIP) Jong Yul Kim
CSEE W4140 Networking Laboratory Lecture 4: IP Routing (RIP) Jong Yul Kim
Standards Certification Education & Training Publishing Conferences & Exhibits 13 February 2007 PHY / MAC Task Group Network / Transport Presentation This.
Routing & IGRP Semester 3, Chapter 5 Allan Johnson.
CMPE 151 Routing Marc Mosko. 2 Talk Outline Routing basics Why segment networks? IP address/subnet mask The gateway decision based on dest IP address.
Computer Networks: Wireless Networks Ivan Marsic Rutgers University Chapter 6 – Wireless Networks.
Delivery, Forwarding, and Routing
MULTICASTING Network Security.
Institute of Technology Sligo - Dept of Computing Chapter 11 Layer 3 Protocols Paul Flynn.
COMPUTER NETWORKS.
Fault Tolerance in ZigBee Wireless Sensor Networks
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
Connectivity Capability Features TOSCA. Aspects of Connectivity GenericIP Connectivity Resolvability: ARP: IP/MAC DNS: Name/IP MDNS: Netconf Routing/bridging/tunneling:
Wave Relay System and General Project Details. Wave Relay System Provides seamless multi-hop connectivity Operates at layer 2 of networking stack Seamless.
Multicast Routing Protocols NETE0514 Presented by Dr.Apichan Kanjanavapastit.
Unicast Routing Protocols  A routing protocol is a combination of rules and procedures that lets routers in the internet inform each other of changes.
Common Devices Used In Computer Networks
EAIT, February 2006 A Pragmatic Approach towards the Improvement of Performance of Ad Hoc Routing ProtocolsOptimizations To Multipath Routing Protocols.
AD HOC WIRELESS MUTICAST ROUTING. Multicasting in wired networks In wired networks changes in network topology is rare In wired networks changes in network.
1 /160 © NOKIA 2001 MobileIPv6_Workshop2001.PPT / / Tutorial Mobile IPv6 Kan Zhigang Nokia Research Center Beijing, P.R.China
Technical Refresher Session 3. Overview Difference between communication between devices on a single logical network and communication between different.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Connecting to the Network Networking for Home and Small Businesses – Chapter.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
Doc.: IEEE /033r2 Submission July 1999 Simon Baatz, University of BonnSlide 1 Integration of Bluetooth into LAN Environments Simon Baatz, Matthias.
1 TCP/IP Internetting ä Subnet layer ä Links stations on same subnet ä Often IEEE LAN standards ä PPP for telephone connections ä TCP/IP specifies.
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
March 12, 2008© Copyright 2008 John Buford SAM Overlay Protocol draft-buford-irtf-sam-overlay-protocol-01.txt John Buford, Avaya Labs Research IETF 71.
1 Kyung Hee University Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs.
Doc.: mes Submission 7 May 2004 Tricci SoSlide 1 Need Clarification on The Definition of ESS Mesh Prepared by Tricci So.
1 Route Optimization for Large Scale Network Mobility Assisted by BGP Feriel Mimoune, Farid Nait-Abdesselam, Tarik Taleb and Kazuo Hashimoto GLOBECOM 2007.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
A Membership Management Protocol for Mobile P2P Networks Mohamed Karim SBAI, Emna SALHI, Chadi BARAKAT.
A Multicast Mechanism in WiMax Mesh Network Jianfeng Chen, Wenhua Jiao, Pin Jiang, Qian Guo Asia-Pacific Conference on Communications, (APCC '06)
BY SANTHOSH G. What is Networking Network Requirements What is Topology Types of Topologies.
6lowpan ND Optimization draft Update Samita Chakrabarti Erik Nordmark IETF 69, 2007 draft-chakrabarti-6lowpan-ipv6-nd-03.txt.
An Efficient Wireless Mesh Network A New Architecture 指導教授:許子衡 教授 學生:王志嘉.
Doc.: IEEE 11-04/0319r0 Submission March 2004 W. Steven Conner, Intel Corporation Slide 1 Architectural Considerations and Requirements for ESS.
Network Layer4-1 Today Collect homework New homework: Ch4 #16,19,21-24,26,27,29,31 (half graded, as usual) Due Wednesday Oct 15 in class Final programming.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 16 Connecting LANs, Backbone Networks, and Virtual LANs.
V0.2ROLL Routing Requirements; The connected home1 Anders Brandt March 2008.
+ Routing Concepts 1 st semester Objectives  Describe the primary functions and features of a router.  Explain how routers use information.
Network Router Security Packeting Filtering. OSI Model 1.It is the most commonly refrenced protocol model. It provides common ground when describing any.
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: IEEE d base ideas and prototype implementation Date Submitted: Presented at.
Network Virtualization Sandip Chakraborty. In routing table we keep both the next hop IP (gateway) as well as the default interface. Why do we require.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Omniran IEEE 802 Scope of OmniRAN Date: Authors: NameAffiliationPhone Max RiegelNSN
DMET 602: Networks and Media Lab Amr El Mougy Yasmeen EssamAlaa Tarek.
1 Internet Protocol, Version 6 (IPv6) Special Topics in Computer Sciences Second Term 1433/1434 H Dr. Loai Bani Melhim.
ECE 544 Group Project : Routing KC Huang. Objective Application: message multicast. A message is sent from one sender to 1~3 recipients. Reach a protocol.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
Chapter 5 Network and Transport Layers
DMET 602: Networks and Media Lab
Semester 3, Chapter 5 Allan Johnson
Department of Computer Science Southern Illinois University Carbondale CS441-Mobile & Wireless Computing Zigbee Standard Dr.
Ad-hoc Networks.
Delivery, Forwarding, and Routing
DMET 602: Networks and Media Lab
ECE 544 Software Project 3: Description and Timeline
The OSI 7 Layer Model Ben, Stuart, Charles.
doc.: IEEE <doc#>
doc.: IEEE <doc#>
Computer Networks: Wireless Networks
Naval Research Laboratory Dynamic Backbone Subnets
Presentation transcript:

Standards Certification Education & Training Publishing Conferences & Exhibits 13 February Sensicast Systems Network Layer General Comments This document is provided strictly for the purpose of gathering information leading to the development of an ISA standard, recommended practice or technical report. Copies may be reproduced and distributed, in whole or in part, but only for the following purposes: Review of and comment on the ISA-SP100 draft proposal Submission to the ISA-SP100 Committee Informing and educating others about the ISA-SP100 draft standard development process. Jay Werb Chief Technology Officer jwerb06 at sensicast.com

2 Agenda 15 minute overview, 15 minute discussion Covers a lot of material at a very superficial level –I hold these truths to be self-evident –Intended to take the temperature of the group –Not intended to be comprehensive –Not a tutorial!!!

3 Network Overview

4 Mesh “Classic”

5 Same Mesh with Tunnels

6 Same Mesh with Tunnels, Logical View

7 “Gateway” Basics The network has an Address Zero –There is something analogous to the ZigBee Coordinator at Address Zero –We’ve been calling this the Network Manager –Does the Security Manager work through the Network Manager? TBD. –The SP100 network terminates at Address Zero –Network Manager will frequently reside in a device called “The Gateway” –“The Gateway” is an application somewhere on the backbone –The Gateway and Network Manager will frequently be co-located at Address Zero –HOWEVER, there may be multiple Gateways, each located somewhere on the Backbone SP100.11a will be optimized for communication to and from the Backbone –Network Manager at Address Zero –One or several Gateways, on backbone addresses provided by Network Manager Nature of (most) communication between Backbone and nodes  Inbound data reports from field device application to Gateway application  Outbound Network Management commands to nodes & responses  Periodic “interactive” sessions for commissioning  Inbound unicast of data blocks (e.g. waveforms)  Outbound multicast of data blocks (e.g. firmware updates)

8 Comments on Tunnels Tunnel is a router with a really good connection to the “Gateway”. We define the SAP and include it in the network design Any wire or bridge is a candidate for a tunnel IP and other tunnels may be standardized

9 Decentralized Mode Building block for the Network MAC connection to two parents Routing based on those connections Each Router is a member of 3 “PANs” Each “PAN” operates more or less autonomously Centralized mode is different! (See other presentations)

10 Network Formation (Decentralized Mode) Three-step Process to Join a Network –Temporarily connect to a neighbor –Get authorized by Network Manager to participate in the network –Establish connections –Inbound a priori routing, with some path diversity, directed toward gateway –Outbound routing follows the reverse route –Peer-to-peer routing through common ancestor –The details can get a little hairy, but the techniques are well understood in this room Route selection –Devices can pick primary and secondary parents based on simple criteria –Signal strength etc. –Hop count to gateway etc. –Simple rules to avoid circular routes –MAC maintains link quality metrics that may trigger a search for better routes –For more optimal routing, Network Manager can intervene –Device scans available connections in neighborhood on request –Reports neighborhood information to Network Manager –Network Manager accumulates comprehensive picture and selects optimal routes –Device changes routes on command from Network Manager

11 Time Keeping Network Clock –Network Manager supplies the master clock for a subnet (?) –MAC TG will need a 1 ms network clock to support some modes of TDMA –This needs to be designed collaboratively by the two groups Instantaneous Time –Some modes of TDMA will not need a 1 ms network clock –Some applications will need better than 1 ms accuracy –Solution: Measure and report end-to-end message propagation time –We should be able to deliver ~30 µsec/hop instantaneous accuracy –And people will thank us.

12 Miscellaneous Topics Discovery vs. Registration –Network Manager has a complete picture of the network –New devices register with Network Manager –“Discovery” through queries to Network Manager Subnetting –Several proposals put a limit of 256 nodes per backbone connection (gateway) –Many implementations limit number of descendents per router –Don’t bake these limitations into the standard!! –With tunneling, products will support thousands of nodes per gateway –Let the Network Manager handle subnetting decisions –Support group code to help node find the right network Latency –Latency & QoS is largely constrained by the MAC. –In multihop configurations, the network’s role is important too –MAC and Network groups design collaboratively.

13 And What About ZigBee? We don’t have time to discuss this today  But we should discuss it at some point

14 Discussion