SlideShare una empresa de Scribd logo
1 de 99
• Telecom Bretagne, February 2014
© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Pascal Thubert
Cisco Confidential

1
Challenge: harness
innovation
• More efficient operations
• New and/or improved experience

Shaking up the
competitive landscape
• Between small and large entities
• Leveraging IT, data and analytics
http://internetofeverything.cisco.com/explore
© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

2
1000*scale => No leak in the Internet
=> Opaque Fringe operations

Reachability

=> Radio

Addressing => IPv6

Density

=> spatial
reuse
=> Routing

© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

3
The Fringe of the Internet
LLNs
IEEE 802.15.4

IEEE 802.15.4e TSCH
6TiSCH

© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

4
Routing IP in LLNs
Routing over radios
RPL concepts

Applying RPL

© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

5
The Fringe of
the
Internet

BRKEWN-3012

© 2010 Cisco and/or its affiliates. All rights reserved.

Unclassified

6
• The Internet
•

Fully engineered
• Hierarchical, Aggregations, ASs, Wire links

•

Fully distributed States
• Shows limits (BGP tables, addr. depletion)

Reached adult size, mature to aging
Conceptually unchanged by IPv6

• IPv4 Intranets
Same structure as the Internet
• Yet decoupled from the Internet
•

• NAT, Socks, Proxies

First model for Internet extension
© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

7
L2 mesh Under

A

Multi-hop Public Access Points,
Proprietary mission specific products
Address the scale issue at L2/ND

4

3
2

Edge

1

L3 Route Over
Migration to IETF Protocols (RPL)
Internet of Things (IOT, M2M)
Different IPv6 (6LoWPAN, SDN)

NEMO

A‟s
Home

B‟s
Home

Mobile Overlays
Global reachability
Route Projection
Network virtualization

Fixed wired
Infrastructure

5
Mesh

6

7
8
B

C

© 2013-2014 Cisco and/or its affiliates. All rights reserved.

MANET

The Fringe DOES NOT LEAK
into the
Routing Infrastructure
Cisco Confidential

8
Low Power Lossy
Networks

9
New level of cost effectiveness
Deploying wire is slow and costly
Low incremental cost per device

Reaching farther out
New types of devices (Internet Of Things)
New usages (widespread monitoring, IoE)
Global Coverage from Near Field to Satellite via 3/4G

© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

10
• LLNs comprise a large number of highly

constrained devices (smart objects)
interconnected by predominantly wireless links of
unpredictable quality
• LLNs cover a wide scope of applications

• Industrial Monitoring, Building Automation,
Connected Home, Healthcare, Environmental
Monitoring, Urban Sensor Networks, Energy
Management, Asset Tracking, Refrigeration
• Several IETF working groups and Industry

Alliance addressing LLNs
• IETF - CoRE, 6Lowpan, ROLL
• Alliances - IP for Smart Objects Alliance (IPSO)

World‟s smallest web server
© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

11
• LLNs operate with a hard, very small bound on state

• LLNs are optimised for saving energy in the majority of

cases
• Traffic patterns can be MP2P, P2P and P2MP flows
• Typically LLNs deployed over link layers with restricted

frame-sizes
• Minimise the time a packet is enroute (in the air/on the wire) hence
the small frame size
• The routing protocol for LLNs should be adapted for such links

• LLN routing protocols must consider efficiency versus

generality
• LLN nodes are typically very conservative in resources
© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

12
IEEE 802.15.4

13
Initial activities focused on wearable
devices “Personal Area Networks”
Activities have proven to be much more
diverse and varied

•Data rates from Kb/s to
Gb/s
•Ranges from tens of metres
up to a Kilometre
•Frequencies from MHz to THz
•Various applications not
necessarily IP based
Focus is on “specialty”, typically short
range,
communications

•If it is wireless and not a
LAN, MAN, RAN, or WAN, it
http://www.ieee802.org/15/pub/TG4.html is
IEEE 802.15to be Task Group 4 (TG4) Charter
likely WPAN™ 802.15 (PAN)
© 2013-2014 Cisco and/or its affiliates. All rights reserved.

The only IEEE 802 Working Group with

Cisco Confidential

14
802.15.4
Amendments

802.11 Wireless
LAN

WiFi
802.11a/b/g/n/ah

802.15 Personal
Area Network

802.15.1
Bluetooth

802.15.4c
PHY for China

802.15.2
Co-existence

802.15.4d
PHY for Japan

802.15.3
High Rate WPAN

802.15.4e
MAC
Enhancements

802.15.4
Low Rate WPAN

802.15.4f
PHY for RFID

802.15.5
Mesh Networking

802.15.4g
Smart Utility Networks

802.15.6 Body Area
Networking

TV White Space PHY
15.4 Study Group

IEEE 802
LAN/MAN
802.16 Wireless
Broadband Access

802.22 Wireless
Regional Area Network

802.15.7 Visible
Light
Communications
© 2013-2014 Cisco and/or its affiliates. All rights reserved.

TSCH

• Industrial strength
• Minimised listening
costs
• Improved security
• Improved link
reliability

• Support smart-grid
networks
• Up to 1 Km
transmission
• >100Kbps
• Millions of fixed
endpoints
• Outdoor use
• Larger frame size
• PHY Amendment
• Neighborhood Area
Networks
Cisco Confidential

15
• Designed for low bandwidth, low transmit power, small frame size
•

More limited than other WPAN technologies such as Bluetooth

•

Basic packet size is 127 bytes (802.15.4g is up to 2047 bytes) (Smaller packets, less errors)

•

Transmission Range varies (802.15.4g is up to 1km)

• Fully acknowledged protocol for transfer reliability
• Data rates of 851, 250, 100, 40 and 20 kbps (IEEE 802.15.4-2011 05-Sep-2011)
•

Frequency and coding dependent

• Two addressing modes; 16-bit short (local allocation) and 64-bit IEEE (unique global)
• Several frequency bands (Different PHYs)
•

Europe 868-868.8 MHz – 3 chans , USA 902-928 MHz – 30 chans, World 2400-2483.5 MHz – 16 chans

•

China - 314–316 MHz, 430–434 MHz, and 779–787 MHz Japan - 920 MHz

• Security Modes: None, ACL only, Secured Mode (using AES-CCM mode)
• 802.15.4e multiple modes including Time Synchronized Channel Hopping (TSCH)

© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

16
• Specifies PHY and MAC only
• Medium Access Control Sub-Layer (MAC)
• Responsible for reliable communication between two devices
• Data framing and validation of RX frames
• Device addressing
• Channel access management
• Device association/disassociation
• Sending ACK frames
• Physical Layer (PHY)
• Provides bit stream air transmission
• Activation/Deactivation of radio transceiver
• Frequency channel tuning
• Carrier sensing
• Received signal strength indication (RSSI)
• Link Quality Indicator (LQI)
• Data coding and modulation, Error correction
© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Upper Layers
(Network &
App)

MAC Layer
(MAC)

Physical Layer
(PHY)

Cisco Confidential

17
R
F

R
P

• Full Function Device (FFD)

R

F

• Can operate as a PAN co-ordinator (allocates local
addresses, gateway to other PANs)
• Can communicate with any other device (FFD or
RFD)
• Ability to relay messages (PAN co-ordinator)
• Reduced Function Device (RFD)

• Very simple device, modest resource requirements
• Can only communicate with FFD
• Intended for extremely simple applications

© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

18
Operates at Layer 2

• Star Topology

• Mesh Topology

R
F

F
R

R

R

F

P

• All devices
communicate to PAN
co-ordinator which uses
mains power
• Other devices can be
battery/scavenger

R
R

P

F

F

• Cluster Tree
F

R

F

F
R

F

P
F

R

• Devices can
communicate directly if
within range

R

F
R

R

• Higher layer protocols
like RPL may create
their own topology that
do not follow 802.15.4
topologies

Single PAN co-ordinator exists for all topologies
© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

19
IEEE 802.15.4e
TimeSlotted
Channel Hopping

20
• Better process optimization and more accurate

predictive maintenance increase profit; 1%
improvement in a refinery with a $1.5B annual
profit leads to $40k/day ($15M/yr) more profit
• Thus more and different sensors can be justified

economically, if they can be connected
• But wire buried in conduit has a high installation

and maintenance cost, with long lead times to
change, and is difficult to repair
• The solution: wireless sensors in non-critical

applications, designed for the industrial
environment: temperature, corrosion, intrinsic
safety, lack of power sources (particularly when
there is no wire)
• For critical control loops, use wireless control room

links with controllers located in the field, possibly
connected over local wiring
© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

21
Converging ICT and OT

Operational technology (OT) is hardware and
software that detects or causes a change through
the direct monitoring and/or control of physical
devices, processes and events in the enterprise.
Convergence of IT and OT technologies, aka the Industrial Internet,
represents a multibillion opportunity for IT vendors and long term job
creation.
Deterministic Wireless Networking is one of the key elements.
For each „critical‟ wired measurement there are hundreds missing
ones that could be addressed through wireless (Industrial Internet)
Architecture and Standards are necessary for Industry adoption
© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

22
Industrial connected device growth

WWAN: GSM – LTE
© 2013-2014 Cisco and/or its affiliates. All rights reserved.

WLAN: 802.11 WPAN: 802.15.4, ISA100.11a, WirelessHART
Cisco Confidential

23
ISA100: Wireless Systems
for Industrial Automation
ISA100.11a industrial WSN
• Wireless systems for industrial automation
• Process control and related applications
Leverages 802.15.4(e) + IPv6
• Link Local Join process
• Global Address runtime
• 6LoWPAN Header Compression
• Yet specific routing and ND
• Next: Backbone Router
ISA100.15 backhaul
© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

24
IEEE 802.15.4e


Amendment to the 802.15.4-2006 MAC needed for the applications
served by


802.15.4f PHY Amendment for Active RFID
 802.15.4g PHY Amendment for Smart Utility Networks
 initially for Industrial applications

(such as those addressed by wiHART and the ISA100.11a standards)


Security: support for secured ack



Low Energy MAC extension




Channel Hopping




Coordinated Sampled Listening (CSL)
Not built-in, subject to vendor design. Open std work started with 6TSCH

New Frame Types


Enhanced (secure) Acknowledgement (EACK)
 Enhanced Beacon and Beacon Request (EB and EBR)
 Optional Information Elements (IE)
© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

25
Channel Hopping :
• retry around interference,
• round robin strategy

Time Slotted (or Synchronized) :
•
•
•
•

Deterministic: Synchronized + Time formatted in SlotFrame(s)
Tracks: below IP, can be orchestrated by a third party like virtual circuits
Slotted: benefits of slotted aloha vs. aloha => reduce collisions
Battery operation: if traffic profile is known, devices wake upon need

© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

26
Reliability through (all possible!)
Code diversity

Spatial diversity

Code Division Multiplex Access

Dynamic Power Control

Network Coding (WIP)

DAG routing topology + ARCs

Frequency diversity

Duo/Bi-casting (live-live)

Channel hopping

B/W listing

Time Diversity
ARQ + FEC (HARQ)

© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

27
• Schedule => direct trade-off between throughput, latency and
power consumption.
• A collision-free communication schedule is typical in industrial
applications.
• IEEE802.15.4e published April 2012.

A

B

16 channel offsets

C

E

D

F

G

e.g. 31 time slots (310ms)

I
H

© 2013-2014 Cisco and/or its affiliates. All rights reserved.

J

Cisco Confidential

28
29
Why IPv6 ?

Going IP

BRKEWN-3012

© 2010 Cisco and/or its affiliates. All rights reserved.

Unclassified

30
Why IP ?
Open Standards vs. proprietary
• COTS* suppliers drive costs down but
• Reliability, Availability and Security up
IP abstraction vs. per MAC/App

• 802.11, 802.15.4 (e), Sat, 3G, UWB
• Keep L2 topology simple
To Infinity and Beyond… But End-to-End.
• No intermediate gateway, tunnel, middle boxes & other
trick

* Commercial, off-the-shelf
© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

31
Which IP
version ?
The current Internet comprises
several billion devices
Smart Objects will add tens of billions
of additional devices
IPv6 is the only viable way forward
IPv4 Unallocated pool exhausted March 2011 !
RIPE NCC: Sept 2012; ARIN March 2015 (last /8)

Things
Mobile
Fixed
© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Tens of
Billions
Smart Objects
2~4 Billions
Phones & cars

1~2 Billions
PCs & servers

Cisco Confidential

32
Application

Core

Constrained Restful
Environments
Charter to provide a framework for resourceoriented applications intended to run on
constrained IP networks.

General

6lo
IPv6 over the TSCH mode of 802.15.4e

Internet

6TiSCH

Initial charter to produce an architecture, a
minimal RPL operation over a static schedule
and a data model to control the LLC (6top)

Lightweight Implementation Guidance

Ops and Mgmt

LWIG

Routing

IETF

ROLL

Charter is to provide guidance in building
minimal yet interoperable IP-capable devices for
the most constrained environments. .

Routing over Low Power Lossy
Networks
Charter focusses on routing issues for low power
lossy networks.

Security
Reuse work done here where possible
Transport
© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

33
Requirement for a new standard
• Industrial requires standard-based products
• Must support equivalent features as incumbent

protocols
• Must provide added value to justify migration
• 6TiSCH value proposition
• Design for same time-sensitive MAC (802.15.4e TSCH)
• Direct IPv6 access to device (common network mgt)
• RPL Distributed routing for scalability (for monitoring)
• Large scale IPv6 subnet for mobility (50K +)

© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

34
Active IETF WG, 4 WG docs being adopted
Define an Architecture that links it all together
Align existing standards
• (RPL, 6LoWPAN, PANA?, RSVP, PCEP, MPLS)
over 802.15.4e TSCH

Support Mix of centralized and distributed
deterministic routing
Design 6top sublayer for L3 interactions
Open source implementations (openWSN…)
Multiple companies and universities participating
© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

35
Management
and Setup
Discovery
Pub/Sub

Centralized
route and track
computation
and installation

Authentication
for Network
Access
Wireless ND
(NPD proxy)

PCEP/PCC

CoAP/DTLS

TCP

Distributed
Distributed
route and track
route and track
computation
computation
and installation
and installation

AAA 6LoWPAN ND RPL

UDP

ICMP

Time Slot
scheduling
and track
G-MPLS
forwarding

RSVP

IPv6
6LoWPAN HC

6top
IEEE 802.15.4e TSCH
© 2013-2014 Cisco and/or its affiliates. All rights reserved.

}

Cisco Confidential

36
CoAP

CoAP

CoAP

CoAP

UDP

UDP

UDP

UDP

IPv6

IPv6

IPv6

IPv6

6LoWPAN-HC

6LoWPAN-HC

6LoWPAN-HC

6LoWPAN-HC

6top

6top

6top

6top

15.4e TSCH

15.4e TSCH

15.4e TSCH

15.4e TSCH

15.4 PHY

15.4 PHY

15.4 PHY

15.4 PHY

A

X

Y

U

© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

37
CoAP

CoAP

CoAP

CoAP

UDP

UDP

UDP

UDP

IPv6

IPv6

IPv6

IPv6

6LoWPAN-HC

6LoWPAN-HC

6LoWPAN-HC

6LoWPAN-HC

6top

6top

6top

6top

15.4e TSCH

15.4e TSCH

15.4e TSCH

15.4e TSCH

15.4 PHY

15.4 PHY

15.4 PHY

15.4 PHY

A

© 2013-2014 Cisco and/or its affiliates. All rights reserved.

X

Y

U

Cisco Confidential

38
CoAP

CoAP

CoAP

CoAP

UDP

UDP

UDP

UDP

IPv6

IPv6

IPv6

IPv6

6LoWPAN-HC

6LoWPAN-HC

6LoWPAN-HC

6LoWPAN-HC

6top

6top

6top

6top

15.4e TSCH

15.4e TSCH

15.4e TSCH

15.4e TSCH

15.4 PHY

15.4 PHY

15.4 PHY

15.4 PHY

15.4 PHY

15.4 PHY

TSCH

TSCH

Multi-protocol

Multi-protocol

© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

39
CoAP

CoAP

CoAP

CoAP

UDP

UDP

UDP

UDP

IPv6

1st IPv6

1stIPv6

IPv6

6LoWPAN-HC

6LoWPAN-HC
Next

6LoWPAN-HC
Next

6LoWPAN-HC

6top

6top

6top

6top

15.4e TSCH

15.4e TSCH

15.4e TSCH

15.4e TSCH

15.4 PHY

15.4 PHY

15.4 PHY

15.4 PHY

A

© 2013-2014 Cisco and/or its affiliates. All rights reserved.

X

Y

U

Cisco Confidential

40
Backbone
Router

intra/
Internet

6TiSCH
LLN

Backbone

Attached
LLN*

6TiSCH
LLN

PCE

Virtual
devices
NMS

* LLN ==
Low Power Lossy Network
© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

41
Common ND based abstraction over a
backbone
Scales DAD operations (distributes 6LoWPAN
ND LBR)

Scales the subnetwork (high speed backbone)
Allows interaction with nodes on the backbone
or in other subnets running different operations
http://tools.ietf.org/html/draft-thubert-6lowpan-backbone-router
© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

42
© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

43
Connected
Route to
subnet

© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

44
Default
Route
In RIB

© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Gateway to the outside
participates to some
IGP with external
network and attracts all
extra-subnet traffic via
protocols over the
backbone

Cisco Confidential

45
Directly upon NS(ARO)
or indirectly upon DAR
message, the backbone
router performs DAD on
behalf of the wireless
device.

NS DAD
(ARO)

DAD

NS
(ARO)
NS
(ARO)

© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

46
The BR maintains a
route to the WSN
node for the DAO
Lifetime over instance
VRF. VFR may be
mapped onto a VLAN
on the backbone.

Optional
NA(O)
NA
(ARO)
DAC

© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

47
The BR maintains a
route to the WSN
node for the DAO
Lifetime over instance
VRF. VFR may be
mapped onto a VLAN
on the backbone.

Optional
NA(O)
RPL
DAO
Host
Route

© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

48
DAD option has:
Unique ID
TID (SeqNum)
Defend with NA if:
Different OUID
Newer TID

NS DAD
(ARO)
NA (ARO)
NS
(ARO)

© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

49
DAD option has:
Unique ID
TID (SeqNum)
Defend with NA if:
Different OUID
Newer TID

Optional
NA(ARO)

NA (ARO) with
older TID (loses)

RPL
DAO
Host
Route

© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

50
NA ARO option has:
Unique ID
TID (SeqNum)

NS
lookup
NA (ARO)
Packet

© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

51
Resolution (2)
NS
lookup

Mixed mode ND
BBR proxying over
the backbone

NA (ARO)

Packet

© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

52
• Used to resolve conflicts
• Need In ND: TID to detect movement ->eARO
• Need In RPL: Object Unique ID if we use RPL for DAD
0

1
2
3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
Type
|
Length = 2 |
Status
|
Reserved
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
Reserved |T|
TID
|
Registration Lifetime
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
+
OUID
( EUI-64 or equivalent )
+
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Figure 2: EARO

Cisco Confidential

53
6TiSCH at a glance
Deterministic IPv6 over IEEE802.15.4e TimeSlotted Channel
Hopping (6TiSCH)
The Working Group will focus on enabling IPv6 over the TSCH
mode of the IEEE802.15.4e standard. The scope of the WG
includes one or more LLNs, each one connected to a backbone
through one or more LLN Border Routers (LBRs).

Active drafts
http://tools.ietf.org/html/draft-ietf-6tisch-terminology
http://tools.ietf.org/html/draft-ietf-6tisch-tsch
http://tools.ietf.org/html/draft-ietf-6tisch-architecture
http://tools.ietf.org/html/draft-ietf-6tisch-minimal
http://tools.ietf.org/html/draft-wang-6tisch-6top
http://tools.ietf.org/html/draft-ohba-6tisch-security
http://tools.ietf.org/html/draft-sudhaakar-6tisch-coap
© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

54
Routing IP
in
LLNs

BRKEWN-3012

© 2010 Cisco and/or its affiliates. All rights reserved.

Unclassified

55
• Hidden terminal

• Interference domains grows faster that range
• Density => low power => multihop => routing
© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

56
Aka

stateful
vs.
On-demand routing
Note: on-demand breaks
control vs. Data plane
separation

© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

57
• Aka SPF vs. Bellman-Ford
• LS requires full state and convergence
• LS can be very quiet on stable topologies
• DV hides topolical complexities and changes

© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

58
0

Optimized Routing Approach
(ORA) spans advertisements
for any change

Routing overhead can be
reduced if stretch is allowed:
Least Overhead Routing
Approach (LORA)
For instance Fisheye and
zone routing provide a
precise routing when closeby
and sense of direction when
afar
© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

59
A Directed Acyclic Graph (DAG) is
formed by a collection of vertices (nodes)
and edges (links).

0
1

Clusterhead

2
1

1

2

Each edge connecting one node to
another (directed) in such a way that it is
not possible to start at Node X and follow
a directed path that cycles back to Node
X (acyclic).

0
2

3

2
3

2

3
2

4
3
3

A Destination Oriented DAG (DODAG) is
a DAG that comprises a single root node.
Here a DAG that is partitioned in 2
DODAG

3

4
3

5
5
6

44 5
4

© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

60
0

• In Green: A‟s subDAG.

1
1

• Impacted if A‟s connectivity is
broken
• Domain for routing recovery
(or reverse subDAG)
Potential SPAN on B‟s DAO
Thus potential return paths
Fanout must be controlled to
limit intermediate states

1

2

0
2

3

A
2

3

2

3

• In Red: B‟s fanout DAG

•
•
•
•

Clusterhead

2

2

4
3
3

3

4
3

5
5
6

44 5
4

B

© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

61
Routing over radios

63
No preexisting physical topology
Can be computed by a mesh under protocol,
but…
Else Routing must infer its topology

Movement
natural and unescapable
Yet difficult to predict or detect

© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

64
Potentially Large Peer Set
Highly Variable Capabilities

Metrics (e.g. RSSI, ETX…)
L3 Reachability (::/0, …)
Constraints (Power …)

Selection Per Objective

© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

65
• Smart object are usually

• Small & Numerous
• « sensor Dust »
• Battery is critical

• Deep Sleep
• Limited memory
• Small CPU
• Savings are REQUIRED

Control plane
Data plane (Compression)

© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

66
Neither transit nor P2P
More like a changing NBMA
• a new paradigm for routing
Changing metrics
• (tons of them!)
• (but no classical cost!)
Inefficient flooding
• Self interfering
QoS and CAC

© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

67
Stretch vs. Control
Optimize table sizes and updates
Optimized Routing Approach (ORA) vs
Least Overhead Routing Approach (LORA)

Non Equal Cost multipath
Directed Acyclic Graphs (DAG) a MUST
Maybe also, Sibling routing

on-demand routes (reactive)

Forwarding and retries
Same vs. Different next hop
Validation of the Routing plane

© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Objective Routing
Weighted Hop Count the wrong metric
Instances per constraints and metrics

Cisco Confidential

68
Pervasive Access
• Satellite
• 3/4G coverage
• 802.11, 802.15.4
Always Reachable
• at a same identifier
• Preserving connections
• Or not ? (CORE*, DTN**)
Fast roaming
• Within technology (L2)
• Between Technologies (L3)

* Constrained RESTful Environments

** Delay-Tolerant Networking
© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

69
RPL Concepts

70
RPL is an extensible proactive IPv6 DV protocol
Supports MP2P, P2MP and P2P
P2P reactive extension

RPL specifically designed for LLNs
Agnostic to underlying link layer technologies
(802.15.4, PLC, Low Power WiFi)

Minimum topological awareness
Data Path validation
Non-Equal Cost Multipath Fwd
Instantiation per constraints/metrics

Autonomic Subnet G/W Protocol
Optimized Diffusion over NBMA
© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

71
Controlling the control … by design
Distance Vector as opposed to Link State
• Knowledge of SubDAG addresses and children links
• Lesser topology awareness => lesser sensitivity to change
• No database Synchronization => Adapted to movement
Optimized for Edge operation
• Optimized for P2MP

/ MP2P, stretch for arbitrary P2P

• Least Overhead Routing Approach via common ancestor
Proactive as opposed to Reactive
• Actually both with so-called P2P experimental specification
Datapath validation

© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

72
Control Information in Data Packets:

•
•
•

Instance ID
Hop-By-Hop Header Sender Rank
Direction
(UP/Down)

Errors detected if:
No route further down for packet going down
No route for packet going down
Rank and direction do not match
© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

73
In the context of routing, a DAG is formed by a
collection of vertices (nodes) and edges (links), each
edge connecting one node to another (directed) in
such a way that it is not possible to start at Node
X and follow a directed path that cycles back to Node
X (acyclic).

© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

74
0
1
2
3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| RPLInstanceID |Version Number |
Rank
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|G|0| MOP | Prf |
DTSN
|
Flags
|
Reserved
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
+
+
|
|
+
DODAGID
+
|
|
+
+
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
Option(s)...
+-+-+-+-+-+-+-+-+
© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

76
•

: : A new DODAG iteration
• Rebuild the DAG …
Then repaint the prefixes upon changes
• A new Sequence number generated by the root
• A router forwards to a parent or as a host over next
iteration

•

•
•
•
•

: find a “quick” local repair path
Only requiring local changes !
May not be optimal according to the OF
Moving UP and Jumping are cool.
Moving Down is risky: Count to Infinity Control

© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

77
Extend the generic behavior
• For a specific need / use case

Used in parent selection
• Contraints
• Policies
• Metrics

Position in the DAG

Computes the Rank increment
• Based on hop metrics
• Do NOT use OF0 for adhoc radios!
• (OF 0 uses traditional weighted hop count)

© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

78
0
1
2
3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| RPLInstanceID |Version Number |
Rank
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|G|0| MOP | Prf |
DTSN
|
Flags
|
Reserved
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
+
+
|
|
+
DODAGID
+
|
|
+
+
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
Option(s)...
+-+-+-+-+-+-+-+-+
© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

79
+-----+-----------------------------------------------------+
| MOP | Description

|

+-----+-----------------------------------------------------+
|

0

| No Downward routes maintained by RPL

|

|

1

| Non-Storing Mode of Operation

|

|

2

| Storing Mode of Operation with no multicast support |

|

3

| Storing Mode of Operation with multicast support

|

|

|

|

|

| All other values are unassigned

|

+-----+-----------------------------------------------------+

© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

80
0

1

2

3

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

| RPLInstanceID |K|D|

Flags

|

Reserved

| DAOSequence

|

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|

|

+

+

|

|

+

DODAGID*

+

|

|

+

+

|

|

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|

Option(s)...

+-+-+-+-+-+-+-+-+
© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

81
Parent is default GW, advertizes owned PIO (L bit on)
RPL Router autoconfigures Addr from parent PIO
RPL Router advertises Prefix via self to parent
RPL Router also advertises children Prefix

A::A

A
C:

A::B

::/0 via B::B

::/0 via A::A

C:: connected

B

B:

B:: connected

B::B

A::

B::D

B::C

B:: connected
D:

C

D

connected

::/0 via B::B

C::

via

B::C

D::

via

B::D

A:
A::

connected

B::

via

A::B

C::

via

A::B

D::

via

A::B

B:: connected
D:: connected
© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

82
For Your
Reference

Parent is default GW, propagates root PIO (L-bit off)
Parent Address in the PIO (with R bit)
RPL Router autoconfigures Address from parent PIO
RPL Router advertises Address via self to parent
RPL Router also advertises children Addresses

A::A

A

C:
::/0 via A::B

A::B

A::B
A::C

B

A::
A::D

A::C

C

D

connected
self
~onlink

::/0 via A::A

A::A connected
A::B

::/0 via A::B
connected

A::D

connected

A::D

connected

A::

~onlink

A:
A::A self
A::B

connected

A::C

via

A::B

A::D

via

A::B

A::

~onlink

self

A::

self

A::C

D:
A::B

© 2013-2014 Cisco and/or its affiliates. All rights reserved.

B:

~onlink
Cisco Confidential

83
Parent is default GW, propagates root PIO (L-bit off)
Parent Address in the PIO (with R bit)
RPL Router autoconfigures Address from parent PIO
RPL Router advertises Address via Parent to Root
Root recursively builds a Routing Header back

A::A

A
C:
::/0 via A::B

A::B

Target A::C via
Transit A::B

A::B
A::C
A::D

A::C

self
~onlink

::/0 via A::A

A::A self
A::B

A::D

via

A::B

~onlink

A::B

connected

self
~onlink

via

~onlink

A::
© 2013-2014 Cisco and/or its affiliates. All rights reserved.

A::

A::C

self

connected

connected

A::

::/0 via A::B

A::B

A::B

A::A connected

A::D

D

D:
A::B

C

A: (root)

B:

A::

B

connected

A::D

via

Cisco Confidential

84
For Your
Reference

Parent is default GW, advertizes owned PIO (L bit on)
RPL Router autoconfigures Address from parent PIO
RPL Router advertises Prefix via Address to Root
Root recursively builds a Routing Header back

A::A

A
C:
A::B

B:: connected

B::B

C:: connected

B

A::
D:

C

D

A: (root)

B:

A::

::/0 via A::A

B::D

B::C

Target C::/ via
Transit B::C

::/0 via B::B

connected

B::

via

A::B

C::

via

B::C

D::

via

B::D

connected

B:: connected

::/0 via B::B
B:: connected
D:: connected

© 2013-2014 Cisco and/or its affiliates. All rights reserved.

D::3

via

B::D

via

A::B

connected
Cisco Confidential

85
Hidden node/terminal/station
A

B

C

D
© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Flooding interferes with itself

Cisco Confidential

86
Suppression of redundant copies
Do not send copy if K copies received

Jitter for Collision Avoidance
First half is mute, second half is jittered

Exponential backoff
Double I after period I, Reset I on inconsistency

© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

87
For Your
Reference

Node Metrics

Link Metrics

Node State and Attributes Object
Purpose is to reflects node workload (CPU,
Memory…)
“O” flag signals overload of resource
“A” flag signal node can act as traffic
aggregator

Throughput Object
Currently available throughput (Bytes per
second)
Throughput range supported

Node Energy Object
“T” flag: Node type: 0 = Mains, 1 = Battery, 2 =
Scavenger
“I” bit: Use node type as a constraint
(include/exclude)
“E” flag: Estimated energy remaining

Latency
Can be used as a metric or constraint
Constraint - max latency allowable on path
Metric - additive metric updated along path

Hop Count Object
Can be used as a metric or constraint
Constraint - max number of hops that can be
traversed
Metric - total number of hops traversed

Link Reliability
Link Quality Level Reliability (LQL)
0=Unknown, 1=High, 2=Medium, 3=Low
Expected Transmission Count (ETX)
(Average number of TX to deliver a
packet)
Link Colour
Metric or constraint, arbitrary admin value

© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

88
Applying RPL

89
At a given point of time
connectivity is

(fuzzy)

Radio link
© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

91
1st
•
•
•
•

pass (DIO)
Establishes a logical DAG topology
Trickle Subnet/config Info
Sets default route
Self forming / self healing

0
1

Clusterhead

2
1

1

2
2

3

2
3

2
3

4

2

2nd pass (DAO)
•
•
•
•
•

paints with addresses and prefixes
Any to any reachability
But forwarding over DAG only
saturates upper links of the DAG
And does not use the full mesh
properly

4
4
3

5

6

3

4

5
5

Potential link
Link selected as parent link
© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

92
0
1

Clusterhead

2

A‟s link to root fails

1

1

2

A loses connectivity
Either poisons or detaches a subdag

A

2

3

2
3

2
3

4

In black:

2
4
4

the potentially impacted zone
That is A‟s subDAG

3

5

6

3

4

5
5

Potential link
Link selected as parent link
© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

93
0
1

Clusterhead

2
1

B can reparent a same Rank so
B‟s subDAG is safe

0

2

A

2

3

2

B

3

1

The rest of A‟s subDAG is isolated

3
1

4
4
4

Either poison ar build a floating
DAG as illustrated
In the floating DAG A is root
The structure is preserved

2

5

6

2

4

5
5

Potential link
Link selected as parent link
© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

94
0
1

Clusterhead

2
1

Once poisined nodes are
identified

2

2

It is possible for A to reparent safely

A

2

3

2
3

A‟s descendants inherit from Rank
shift

3
3

4

3
4

Note: a depth dependent timer can
help order things

4
4

5

6

4

4

5
5

Potential link
Link selected as parent link
© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

95
0
1

Clusterhead

3
1

A new DAG iteration
• In Grey, the new DAG
progressing

2

3

2
3

Metrics have changed, the DAG
may be different

Forwarding upwards traffic
from old to new iteration is
allowed but not the other way
around

1

2

2
3

4

2
4
4
3

5

6

3

4

5
5

Potential link
Link selected as parent link
© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

96
0

A second root is available

1

• (within the same instance)

1

0
2

3

2

1 root = 1 DODAG

3

2

3

1 Node belongs to 1 DODAG

2

4

• (at most, per instance)

3
3

Nodes may JUMP

3

4

• from one DODAG to the next
• up the DODAG

1

2

The DAG is partitioned

Nodes may MOVE

Clusterhead

2

3

5
5
6

44 5
4

Going Down MAY cause loops
• May be done under CTI control
Potential link

Link selected and oriented by DIO
© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

97
0

Running as Ships-in-the-night

1

Clusterhead

2
1

1 instance = 1 DAG

1

2

A DAG implements constraints

2

3

2
3

Serving different Objective
Functions

2
3

4

2
3

For different optimizations
Forwarding along a DODAG (like
A
a vlan)

3
3

4
5

4

3

4

Potential link

Constrained instance

Default instance
© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

98
New Radios issues:

Addressed in RPL by:

Dynamic Topologies

DV, ORA P2MP/MP2P, LORA P2P

Peer selection

Objective Functions, Metrics

Constrained Objects

Controlling the control

Fuzzy Links

NECM Directed Acyclic Graphs
Trickle and Datapath validation

Routing, local Mobility

Local and Global Recovery

Global Mobility

N/A

© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

99
RFC 6206: The Trickle Algorithm

RFC 6550: RPL: IPv6 Routing Protocol for LLNs
RFC 6551: Routing Metrics Used for Path Calculation in LLNs
RFC 6552: Objective Function Zero for the Routing Protocol for LLNs
RFC 6553: RPL Option for Carrying RPL Information in Data-Plane Datagrams

RFC 6554: An IPv6 Routing Header for Source Routes with RPL
RFC 6719: MRHOF Objective Function with hysteresis
draft-ietf-roll-trickle-mcast: Multicast Protocol for LLNs
draft-vilajosana-6tisch-minimal: Minimal 6TiSCH Configuration

© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

100
The Internet is going through its most considerable change
since the first days, adding a nervous system to the bug
brain. Potential is immense and unpredictable.

Made possible by IPv6
But not at the core and unbeknownst to the core
Stimulated by radio access
Enabling new devices and usages
The change happens in the Fringe, which is in fact a
collection of virtualized fringes. The polymorphic Internet is
already there.

© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

101
“We might be at the eve of
pervasive networking, a vision
for the Internet where every
person and every device is
connected to the network in the
ultimate realization of Metcalf's
Law.”
© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

102

Más contenido relacionado

La actualidad más candente

The constrained application protocol (CoAP)
The constrained application protocol (CoAP)The constrained application protocol (CoAP)
The constrained application protocol (CoAP)Hamdamboy (함담보이)
 
Cisco Live! :: Introduction to Segment Routing :: BRKRST-2124 | Las Vegas 2017
Cisco Live! :: Introduction to Segment Routing :: BRKRST-2124  | Las Vegas 2017Cisco Live! :: Introduction to Segment Routing :: BRKRST-2124  | Las Vegas 2017
Cisco Live! :: Introduction to Segment Routing :: BRKRST-2124 | Las Vegas 2017Bruno Teixeira
 
Nova: Openstack Compute-as-a-service
Nova: Openstack Compute-as-a-serviceNova: Openstack Compute-as-a-service
Nova: Openstack Compute-as-a-servicePratik Bandarkar
 
Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)rjain51
 
Red Hat OpenStack - Open Cloud Infrastructure
Red Hat OpenStack - Open Cloud InfrastructureRed Hat OpenStack - Open Cloud Infrastructure
Red Hat OpenStack - Open Cloud InfrastructureAlex Baretto
 
Cisco CCNA-CCNP IP SLA Configuration
Cisco CCNA-CCNP IP SLA ConfigurationCisco CCNA-CCNP IP SLA Configuration
Cisco CCNA-CCNP IP SLA ConfigurationHamed Moghaddam
 
Brkarc 3470 - cisco nexus 7000-7700 switch architecture (2016 las vegas) - 2 ...
Brkarc 3470 - cisco nexus 7000-7700 switch architecture (2016 las vegas) - 2 ...Brkarc 3470 - cisco nexus 7000-7700 switch architecture (2016 las vegas) - 2 ...
Brkarc 3470 - cisco nexus 7000-7700 switch architecture (2016 las vegas) - 2 ...kds850
 
Vxlan deep dive session rev0.5 final
Vxlan deep dive session rev0.5   finalVxlan deep dive session rev0.5   final
Vxlan deep dive session rev0.5 finalKwonSun Bae
 
Alta disponibilidad. El arte de eliminar puntos únicos de fallo
 Alta disponibilidad. El arte de eliminar puntos únicos de fallo Alta disponibilidad. El arte de eliminar puntos únicos de fallo
Alta disponibilidad. El arte de eliminar puntos únicos de falloNETGEAR Iberia
 
Multi-Protocol Label Switching
Multi-Protocol Label SwitchingMulti-Protocol Label Switching
Multi-Protocol Label Switchingseanraz
 
Software Defined Network - SDN
Software Defined Network - SDNSoftware Defined Network - SDN
Software Defined Network - SDNVenkata Naga Ravi
 
Ovs dpdk hwoffload way to full offload
Ovs dpdk hwoffload way to full offloadOvs dpdk hwoffload way to full offload
Ovs dpdk hwoffload way to full offloadKevin Traynor
 
Software Defined Networking (SDN) Technology Brief
Software Defined Networking (SDN) Technology BriefSoftware Defined Networking (SDN) Technology Brief
Software Defined Networking (SDN) Technology BriefZivaro Inc
 
Juniper Networks Router Architecture
Juniper Networks Router ArchitectureJuniper Networks Router Architecture
Juniper Networks Router Architecturelawuah
 

La actualidad más candente (20)

Socks Over RDP
Socks Over RDPSocks Over RDP
Socks Over RDP
 
The constrained application protocol (CoAP)
The constrained application protocol (CoAP)The constrained application protocol (CoAP)
The constrained application protocol (CoAP)
 
Cisco Live! :: Introduction to Segment Routing :: BRKRST-2124 | Las Vegas 2017
Cisco Live! :: Introduction to Segment Routing :: BRKRST-2124  | Las Vegas 2017Cisco Live! :: Introduction to Segment Routing :: BRKRST-2124  | Las Vegas 2017
Cisco Live! :: Introduction to Segment Routing :: BRKRST-2124 | Las Vegas 2017
 
Nova: Openstack Compute-as-a-service
Nova: Openstack Compute-as-a-serviceNova: Openstack Compute-as-a-service
Nova: Openstack Compute-as-a-service
 
Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)
 
Red Hat OpenStack - Open Cloud Infrastructure
Red Hat OpenStack - Open Cloud InfrastructureRed Hat OpenStack - Open Cloud Infrastructure
Red Hat OpenStack - Open Cloud Infrastructure
 
Cisco CCNA-CCNP IP SLA Configuration
Cisco CCNA-CCNP IP SLA ConfigurationCisco CCNA-CCNP IP SLA Configuration
Cisco CCNA-CCNP IP SLA Configuration
 
6lowpan
6lowpan6lowpan
6lowpan
 
CCNA presentation.
CCNA presentation.CCNA presentation.
CCNA presentation.
 
Brkarc 3470 - cisco nexus 7000-7700 switch architecture (2016 las vegas) - 2 ...
Brkarc 3470 - cisco nexus 7000-7700 switch architecture (2016 las vegas) - 2 ...Brkarc 3470 - cisco nexus 7000-7700 switch architecture (2016 las vegas) - 2 ...
Brkarc 3470 - cisco nexus 7000-7700 switch architecture (2016 las vegas) - 2 ...
 
Vxlan deep dive session rev0.5 final
Vxlan deep dive session rev0.5   finalVxlan deep dive session rev0.5   final
Vxlan deep dive session rev0.5 final
 
Alta disponibilidad. El arte de eliminar puntos únicos de fallo
 Alta disponibilidad. El arte de eliminar puntos únicos de fallo Alta disponibilidad. El arte de eliminar puntos únicos de fallo
Alta disponibilidad. El arte de eliminar puntos únicos de fallo
 
Multi-Protocol Label Switching
Multi-Protocol Label SwitchingMulti-Protocol Label Switching
Multi-Protocol Label Switching
 
IS-IS Protocol Introduction
IS-IS Protocol IntroductionIS-IS Protocol Introduction
IS-IS Protocol Introduction
 
Software Defined Network - SDN
Software Defined Network - SDNSoftware Defined Network - SDN
Software Defined Network - SDN
 
Ovs dpdk hwoffload way to full offload
Ovs dpdk hwoffload way to full offloadOvs dpdk hwoffload way to full offload
Ovs dpdk hwoffload way to full offload
 
Software Defined Networking (SDN) Technology Brief
Software Defined Networking (SDN) Technology BriefSoftware Defined Networking (SDN) Technology Brief
Software Defined Networking (SDN) Technology Brief
 
Juniper Networks Router Architecture
Juniper Networks Router ArchitectureJuniper Networks Router Architecture
Juniper Networks Router Architecture
 
IS-IS Protocol
IS-IS ProtocolIS-IS Protocol
IS-IS Protocol
 
Ethernet VPN (EVPN) EVerything Provider Needs
Ethernet VPN (EVPN) EVerything Provider NeedsEthernet VPN (EVPN) EVerything Provider Needs
Ethernet VPN (EVPN) EVerything Provider Needs
 

Destacado

6Tisch telecom_bretagne_2016
6Tisch telecom_bretagne_20166Tisch telecom_bretagne_2016
6Tisch telecom_bretagne_2016Pascal Thubert
 
6TiSCH @Telecom Bretagne 2015
6TiSCH @Telecom Bretagne 20156TiSCH @Telecom Bretagne 2015
6TiSCH @Telecom Bretagne 2015Pascal Thubert
 
Energy consumption study of a WSN using 6TiSCH architecture
Energy consumption study of a WSN using 6TiSCH architectureEnergy consumption study of a WSN using 6TiSCH architecture
Energy consumption study of a WSN using 6TiSCH architectureFederico Sismondi
 
Networking Protocols for Internet of Things
Networking Protocols for Internet of ThingsNetworking Protocols for Internet of Things
Networking Protocols for Internet of Thingsrjain51
 
Building day 2 upload Building the Internet of Things with Thingsquare and ...
Building day 2   upload Building the Internet of Things with Thingsquare and ...Building day 2   upload Building the Internet of Things with Thingsquare and ...
Building day 2 upload Building the Internet of Things with Thingsquare and ...Adam Dunkels
 
Towards the Internet of Relevant Things: the IEEE 802.15.4e Standard
Towards the Internet of Relevant Things: the IEEE 802.15.4e StandardTowards the Internet of Relevant Things: the IEEE 802.15.4e Standard
Towards the Internet of Relevant Things: the IEEE 802.15.4e StandardGiuseppe Anastasi
 
RPL - business opportunity & pedagogical imperative
RPL - business opportunity & pedagogical imperativeRPL - business opportunity & pedagogical imperative
RPL - business opportunity & pedagogical imperativeMerilyn Childs
 
CU Alliance RPL e-Portfolio_Assessment Tool
CU Alliance RPL e-Portfolio_Assessment Tool CU Alliance RPL e-Portfolio_Assessment Tool
CU Alliance RPL e-Portfolio_Assessment Tool Gavin Clinch
 
Carte mentale structure d'un rapport pfe v2
Carte mentale structure d'un rapport pfe v2Carte mentale structure d'un rapport pfe v2
Carte mentale structure d'un rapport pfe v2Dr, Noureddine IDBOUFKER
 
Carte mentale du cours qualité de servie ip
Carte mentale du cours qualité de servie ip Carte mentale du cours qualité de servie ip
Carte mentale du cours qualité de servie ip Dr, Noureddine IDBOUFKER
 
Slide RPL- Routing Protocol for Loossy and Low-power LLNs
Slide RPL- Routing Protocol for Loossy and Low-power LLNsSlide RPL- Routing Protocol for Loossy and Low-power LLNs
Slide RPL- Routing Protocol for Loossy and Low-power LLNsQuang Do
 
Recognition of prior learning – the MCI way
Recognition of prior learning – the MCI wayRecognition of prior learning – the MCI way
Recognition of prior learning – the MCI wayThe Focus Learning Group
 
Rpl:Routing Protocol for Low-Power and Lossy Networks
Rpl:Routing Protocol for Low-Power and Lossy NetworksRpl:Routing Protocol for Low-Power and Lossy Networks
Rpl:Routing Protocol for Low-Power and Lossy NetworksLandry Simo
 

Destacado (20)

6Tisch telecom_bretagne_2016
6Tisch telecom_bretagne_20166Tisch telecom_bretagne_2016
6Tisch telecom_bretagne_2016
 
6TiSCH @Telecom Bretagne 2015
6TiSCH @Telecom Bretagne 20156TiSCH @Telecom Bretagne 2015
6TiSCH @Telecom Bretagne 2015
 
Energy consumption study of a WSN using 6TiSCH architecture
Energy consumption study of a WSN using 6TiSCH architectureEnergy consumption study of a WSN using 6TiSCH architecture
Energy consumption study of a WSN using 6TiSCH architecture
 
6 tsch orlando
6 tsch orlando6 tsch orlando
6 tsch orlando
 
Networking Protocols for Internet of Things
Networking Protocols for Internet of ThingsNetworking Protocols for Internet of Things
Networking Protocols for Internet of Things
 
Building day 2 upload Building the Internet of Things with Thingsquare and ...
Building day 2   upload Building the Internet of Things with Thingsquare and ...Building day 2   upload Building the Internet of Things with Thingsquare and ...
Building day 2 upload Building the Internet of Things with Thingsquare and ...
 
802 15-4 tutorial
802 15-4 tutorial802 15-4 tutorial
802 15-4 tutorial
 
Rpl telecom bretagne
Rpl telecom bretagneRpl telecom bretagne
Rpl telecom bretagne
 
Luxbg arcs
Luxbg arcsLuxbg arcs
Luxbg arcs
 
Luxbg fringe
Luxbg fringeLuxbg fringe
Luxbg fringe
 
Towards the Internet of Relevant Things: the IEEE 802.15.4e Standard
Towards the Internet of Relevant Things: the IEEE 802.15.4e StandardTowards the Internet of Relevant Things: the IEEE 802.15.4e Standard
Towards the Internet of Relevant Things: the IEEE 802.15.4e Standard
 
RPL - business opportunity & pedagogical imperative
RPL - business opportunity & pedagogical imperativeRPL - business opportunity & pedagogical imperative
RPL - business opportunity & pedagogical imperative
 
CU Alliance RPL e-Portfolio_Assessment Tool
CU Alliance RPL e-Portfolio_Assessment Tool CU Alliance RPL e-Portfolio_Assessment Tool
CU Alliance RPL e-Portfolio_Assessment Tool
 
Carte mentale structure d'un rapport pfe v2
Carte mentale structure d'un rapport pfe v2Carte mentale structure d'un rapport pfe v2
Carte mentale structure d'un rapport pfe v2
 
Carte mentale du cours qualité de servie ip
Carte mentale du cours qualité de servie ip Carte mentale du cours qualité de servie ip
Carte mentale du cours qualité de servie ip
 
Slide RPL- Routing Protocol for Loossy and Low-power LLNs
Slide RPL- Routing Protocol for Loossy and Low-power LLNsSlide RPL- Routing Protocol for Loossy and Low-power LLNs
Slide RPL- Routing Protocol for Loossy and Low-power LLNs
 
Recognition of prior learning – the MCI way
Recognition of prior learning – the MCI wayRecognition of prior learning – the MCI way
Recognition of prior learning – the MCI way
 
Rpl dodag
Rpl dodagRpl dodag
Rpl dodag
 
Rpl2016
Rpl2016Rpl2016
Rpl2016
 
Rpl:Routing Protocol for Low-Power and Lossy Networks
Rpl:Routing Protocol for Low-Power and Lossy NetworksRpl:Routing Protocol for Low-Power and Lossy Networks
Rpl:Routing Protocol for Low-Power and Lossy Networks
 

Similar a 6TiSCH + RPL @ Telecom Bretagne 2014

IRJET- Dynamic Adaption of DCF and PCF Mode of IEEE 802.11 WLAN
IRJET-  	  Dynamic Adaption of DCF and PCF Mode of IEEE 802.11 WLANIRJET-  	  Dynamic Adaption of DCF and PCF Mode of IEEE 802.11 WLAN
IRJET- Dynamic Adaption of DCF and PCF Mode of IEEE 802.11 WLANIRJET Journal
 
Overview of Wireless Sensor Networks
Overview of Wireless Sensor NetworksOverview of Wireless Sensor Networks
Overview of Wireless Sensor NetworksDuncan Purves
 
Communication & information security final
Communication & information security finalCommunication & information security final
Communication & information security finalneerajchor
 
ComNet NW3 Data Sheet
ComNet NW3 Data SheetComNet NW3 Data Sheet
ComNet NW3 Data SheetJMAC Supply
 
Elements of IoT connectivity technologies
Elements of IoT connectivity technologiesElements of IoT connectivity technologies
Elements of IoT connectivity technologiesusman sarwar
 
76924356 synopsis-network
76924356 synopsis-network76924356 synopsis-network
76924356 synopsis-networklklokesh
 
IoT Standards & Ecosystem
IoT Standards & EcosystemIoT Standards & Ecosystem
IoT Standards & EcosystemHarish Vadada
 
BRKIOT-2108.pdf
BRKIOT-2108.pdfBRKIOT-2108.pdf
BRKIOT-2108.pdfJokaTek
 
Apresentação ccna en_SWITCH_v6_Ch01.pptx
Apresentação ccna en_SWITCH_v6_Ch01.pptxApresentação ccna en_SWITCH_v6_Ch01.pptx
Apresentação ccna en_SWITCH_v6_Ch01.pptxrodrigomateus007
 
IoT Connectivity: The Technical & Potential
IoT Connectivity: The Technical & PotentialIoT Connectivity: The Technical & Potential
IoT Connectivity: The Technical & PotentialAndri Yadi
 
Link Labs LPWA Webinar
Link Labs LPWA WebinarLink Labs LPWA Webinar
Link Labs LPWA WebinarBrian Ray
 
ETE405-lec4.pdf
ETE405-lec4.pdfETE405-lec4.pdf
ETE405-lec4.pdfmashiur
 
Hardened Ethernet In ITS 2010
Hardened Ethernet In ITS 2010Hardened Ethernet In ITS 2010
Hardened Ethernet In ITS 2010ethersteve
 
Layer 1 Encryption in WDM Transport Systems
Layer 1 Encryption in WDM Transport SystemsLayer 1 Encryption in WDM Transport Systems
Layer 1 Encryption in WDM Transport SystemsADVA
 
LTE and Satellite: Solutions for Rural and Public Safety Networking
LTE and Satellite: Solutions for Rural and Public Safety NetworkingLTE and Satellite: Solutions for Rural and Public Safety Networking
LTE and Satellite: Solutions for Rural and Public Safety NetworkingSmall Cell Forum
 

Similar a 6TiSCH + RPL @ Telecom Bretagne 2014 (20)

Rpl2018
Rpl2018Rpl2018
Rpl2018
 
IRJET- Dynamic Adaption of DCF and PCF Mode of IEEE 802.11 WLAN
IRJET-  	  Dynamic Adaption of DCF and PCF Mode of IEEE 802.11 WLANIRJET-  	  Dynamic Adaption of DCF and PCF Mode of IEEE 802.11 WLAN
IRJET- Dynamic Adaption of DCF and PCF Mode of IEEE 802.11 WLAN
 
Overview of Wireless Sensor Networks
Overview of Wireless Sensor NetworksOverview of Wireless Sensor Networks
Overview of Wireless Sensor Networks
 
Communication & information security final
Communication & information security finalCommunication & information security final
Communication & information security final
 
ITE7_Chp5.pptx
ITE7_Chp5.pptxITE7_Chp5.pptx
ITE7_Chp5.pptx
 
ComNet NW3 Data Sheet
ComNet NW3 Data SheetComNet NW3 Data Sheet
ComNet NW3 Data Sheet
 
ITE7_Chp5.pptx
ITE7_Chp5.pptxITE7_Chp5.pptx
ITE7_Chp5.pptx
 
Elements of IoT connectivity technologies
Elements of IoT connectivity technologiesElements of IoT connectivity technologies
Elements of IoT connectivity technologies
 
76924356 synopsis-network
76924356 synopsis-network76924356 synopsis-network
76924356 synopsis-network
 
UNIT III- 1.RPL.pptx
UNIT III- 1.RPL.pptxUNIT III- 1.RPL.pptx
UNIT III- 1.RPL.pptx
 
IoT Standards & Ecosystem
IoT Standards & EcosystemIoT Standards & Ecosystem
IoT Standards & Ecosystem
 
BRKIOT-2108.pdf
BRKIOT-2108.pdfBRKIOT-2108.pdf
BRKIOT-2108.pdf
 
Apresentação ccna en_SWITCH_v6_Ch01.pptx
Apresentação ccna en_SWITCH_v6_Ch01.pptxApresentação ccna en_SWITCH_v6_Ch01.pptx
Apresentação ccna en_SWITCH_v6_Ch01.pptx
 
IoT Connectivity: The Technical & Potential
IoT Connectivity: The Technical & PotentialIoT Connectivity: The Technical & Potential
IoT Connectivity: The Technical & Potential
 
Link Labs LPWA Webinar
Link Labs LPWA WebinarLink Labs LPWA Webinar
Link Labs LPWA Webinar
 
IOT - Unit 3.pptx
IOT - Unit 3.pptxIOT - Unit 3.pptx
IOT - Unit 3.pptx
 
ETE405-lec4.pdf
ETE405-lec4.pdfETE405-lec4.pdf
ETE405-lec4.pdf
 
Hardened Ethernet In ITS 2010
Hardened Ethernet In ITS 2010Hardened Ethernet In ITS 2010
Hardened Ethernet In ITS 2010
 
Layer 1 Encryption in WDM Transport Systems
Layer 1 Encryption in WDM Transport SystemsLayer 1 Encryption in WDM Transport Systems
Layer 1 Encryption in WDM Transport Systems
 
LTE and Satellite: Solutions for Rural and Public Safety Networking
LTE and Satellite: Solutions for Rural and Public Safety NetworkingLTE and Satellite: Solutions for Rural and Public Safety Networking
LTE and Satellite: Solutions for Rural and Public Safety Networking
 

Último

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdfssuserdda66b
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 

Último (20)

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 

6TiSCH + RPL @ Telecom Bretagne 2014

  • 1. • Telecom Bretagne, February 2014 © 2013-2014 Cisco and/or its affiliates. All rights reserved. Pascal Thubert Cisco Confidential 1
  • 2. Challenge: harness innovation • More efficient operations • New and/or improved experience Shaking up the competitive landscape • Between small and large entities • Leveraging IT, data and analytics http://internetofeverything.cisco.com/explore © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
  • 3. 1000*scale => No leak in the Internet => Opaque Fringe operations Reachability => Radio Addressing => IPv6 Density => spatial reuse => Routing © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
  • 4. The Fringe of the Internet LLNs IEEE 802.15.4 IEEE 802.15.4e TSCH 6TiSCH © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
  • 5. Routing IP in LLNs Routing over radios RPL concepts Applying RPL © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
  • 6. The Fringe of the Internet BRKEWN-3012 © 2010 Cisco and/or its affiliates. All rights reserved. Unclassified 6
  • 7. • The Internet • Fully engineered • Hierarchical, Aggregations, ASs, Wire links • Fully distributed States • Shows limits (BGP tables, addr. depletion) Reached adult size, mature to aging Conceptually unchanged by IPv6 • IPv4 Intranets Same structure as the Internet • Yet decoupled from the Internet • • NAT, Socks, Proxies First model for Internet extension © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
  • 8. L2 mesh Under A Multi-hop Public Access Points, Proprietary mission specific products Address the scale issue at L2/ND 4 3 2 Edge 1 L3 Route Over Migration to IETF Protocols (RPL) Internet of Things (IOT, M2M) Different IPv6 (6LoWPAN, SDN) NEMO A‟s Home B‟s Home Mobile Overlays Global reachability Route Projection Network virtualization Fixed wired Infrastructure 5 Mesh 6 7 8 B C © 2013-2014 Cisco and/or its affiliates. All rights reserved. MANET The Fringe DOES NOT LEAK into the Routing Infrastructure Cisco Confidential 8
  • 10. New level of cost effectiveness Deploying wire is slow and costly Low incremental cost per device Reaching farther out New types of devices (Internet Of Things) New usages (widespread monitoring, IoE) Global Coverage from Near Field to Satellite via 3/4G © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
  • 11. • LLNs comprise a large number of highly constrained devices (smart objects) interconnected by predominantly wireless links of unpredictable quality • LLNs cover a wide scope of applications • Industrial Monitoring, Building Automation, Connected Home, Healthcare, Environmental Monitoring, Urban Sensor Networks, Energy Management, Asset Tracking, Refrigeration • Several IETF working groups and Industry Alliance addressing LLNs • IETF - CoRE, 6Lowpan, ROLL • Alliances - IP for Smart Objects Alliance (IPSO) World‟s smallest web server © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
  • 12. • LLNs operate with a hard, very small bound on state • LLNs are optimised for saving energy in the majority of cases • Traffic patterns can be MP2P, P2P and P2MP flows • Typically LLNs deployed over link layers with restricted frame-sizes • Minimise the time a packet is enroute (in the air/on the wire) hence the small frame size • The routing protocol for LLNs should be adapted for such links • LLN routing protocols must consider efficiency versus generality • LLN nodes are typically very conservative in resources © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
  • 14. Initial activities focused on wearable devices “Personal Area Networks” Activities have proven to be much more diverse and varied •Data rates from Kb/s to Gb/s •Ranges from tens of metres up to a Kilometre •Frequencies from MHz to THz •Various applications not necessarily IP based Focus is on “specialty”, typically short range, communications •If it is wireless and not a LAN, MAN, RAN, or WAN, it http://www.ieee802.org/15/pub/TG4.html is IEEE 802.15to be Task Group 4 (TG4) Charter likely WPAN™ 802.15 (PAN) © 2013-2014 Cisco and/or its affiliates. All rights reserved. The only IEEE 802 Working Group with Cisco Confidential 14
  • 15. 802.15.4 Amendments 802.11 Wireless LAN WiFi 802.11a/b/g/n/ah 802.15 Personal Area Network 802.15.1 Bluetooth 802.15.4c PHY for China 802.15.2 Co-existence 802.15.4d PHY for Japan 802.15.3 High Rate WPAN 802.15.4e MAC Enhancements 802.15.4 Low Rate WPAN 802.15.4f PHY for RFID 802.15.5 Mesh Networking 802.15.4g Smart Utility Networks 802.15.6 Body Area Networking TV White Space PHY 15.4 Study Group IEEE 802 LAN/MAN 802.16 Wireless Broadband Access 802.22 Wireless Regional Area Network 802.15.7 Visible Light Communications © 2013-2014 Cisco and/or its affiliates. All rights reserved. TSCH • Industrial strength • Minimised listening costs • Improved security • Improved link reliability • Support smart-grid networks • Up to 1 Km transmission • >100Kbps • Millions of fixed endpoints • Outdoor use • Larger frame size • PHY Amendment • Neighborhood Area Networks Cisco Confidential 15
  • 16. • Designed for low bandwidth, low transmit power, small frame size • More limited than other WPAN technologies such as Bluetooth • Basic packet size is 127 bytes (802.15.4g is up to 2047 bytes) (Smaller packets, less errors) • Transmission Range varies (802.15.4g is up to 1km) • Fully acknowledged protocol for transfer reliability • Data rates of 851, 250, 100, 40 and 20 kbps (IEEE 802.15.4-2011 05-Sep-2011) • Frequency and coding dependent • Two addressing modes; 16-bit short (local allocation) and 64-bit IEEE (unique global) • Several frequency bands (Different PHYs) • Europe 868-868.8 MHz – 3 chans , USA 902-928 MHz – 30 chans, World 2400-2483.5 MHz – 16 chans • China - 314–316 MHz, 430–434 MHz, and 779–787 MHz Japan - 920 MHz • Security Modes: None, ACL only, Secured Mode (using AES-CCM mode) • 802.15.4e multiple modes including Time Synchronized Channel Hopping (TSCH) © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
  • 17. • Specifies PHY and MAC only • Medium Access Control Sub-Layer (MAC) • Responsible for reliable communication between two devices • Data framing and validation of RX frames • Device addressing • Channel access management • Device association/disassociation • Sending ACK frames • Physical Layer (PHY) • Provides bit stream air transmission • Activation/Deactivation of radio transceiver • Frequency channel tuning • Carrier sensing • Received signal strength indication (RSSI) • Link Quality Indicator (LQI) • Data coding and modulation, Error correction © 2013-2014 Cisco and/or its affiliates. All rights reserved. Upper Layers (Network & App) MAC Layer (MAC) Physical Layer (PHY) Cisco Confidential 17
  • 18. R F R P • Full Function Device (FFD) R F • Can operate as a PAN co-ordinator (allocates local addresses, gateway to other PANs) • Can communicate with any other device (FFD or RFD) • Ability to relay messages (PAN co-ordinator) • Reduced Function Device (RFD) • Very simple device, modest resource requirements • Can only communicate with FFD • Intended for extremely simple applications © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
  • 19. Operates at Layer 2 • Star Topology • Mesh Topology R F F R R R F P • All devices communicate to PAN co-ordinator which uses mains power • Other devices can be battery/scavenger R R P F F • Cluster Tree F R F F R F P F R • Devices can communicate directly if within range R F R R • Higher layer protocols like RPL may create their own topology that do not follow 802.15.4 topologies Single PAN co-ordinator exists for all topologies © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
  • 21. • Better process optimization and more accurate predictive maintenance increase profit; 1% improvement in a refinery with a $1.5B annual profit leads to $40k/day ($15M/yr) more profit • Thus more and different sensors can be justified economically, if they can be connected • But wire buried in conduit has a high installation and maintenance cost, with long lead times to change, and is difficult to repair • The solution: wireless sensors in non-critical applications, designed for the industrial environment: temperature, corrosion, intrinsic safety, lack of power sources (particularly when there is no wire) • For critical control loops, use wireless control room links with controllers located in the field, possibly connected over local wiring © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
  • 22. Converging ICT and OT Operational technology (OT) is hardware and software that detects or causes a change through the direct monitoring and/or control of physical devices, processes and events in the enterprise. Convergence of IT and OT technologies, aka the Industrial Internet, represents a multibillion opportunity for IT vendors and long term job creation. Deterministic Wireless Networking is one of the key elements. For each „critical‟ wired measurement there are hundreds missing ones that could be addressed through wireless (Industrial Internet) Architecture and Standards are necessary for Industry adoption © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
  • 23. Industrial connected device growth WWAN: GSM – LTE © 2013-2014 Cisco and/or its affiliates. All rights reserved. WLAN: 802.11 WPAN: 802.15.4, ISA100.11a, WirelessHART Cisco Confidential 23
  • 24. ISA100: Wireless Systems for Industrial Automation ISA100.11a industrial WSN • Wireless systems for industrial automation • Process control and related applications Leverages 802.15.4(e) + IPv6 • Link Local Join process • Global Address runtime • 6LoWPAN Header Compression • Yet specific routing and ND • Next: Backbone Router ISA100.15 backhaul © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
  • 25. IEEE 802.15.4e  Amendment to the 802.15.4-2006 MAC needed for the applications served by  802.15.4f PHY Amendment for Active RFID  802.15.4g PHY Amendment for Smart Utility Networks  initially for Industrial applications  (such as those addressed by wiHART and the ISA100.11a standards)  Security: support for secured ack  Low Energy MAC extension   Channel Hopping   Coordinated Sampled Listening (CSL) Not built-in, subject to vendor design. Open std work started with 6TSCH New Frame Types  Enhanced (secure) Acknowledgement (EACK)  Enhanced Beacon and Beacon Request (EB and EBR)  Optional Information Elements (IE) © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
  • 26. Channel Hopping : • retry around interference, • round robin strategy Time Slotted (or Synchronized) : • • • • Deterministic: Synchronized + Time formatted in SlotFrame(s) Tracks: below IP, can be orchestrated by a third party like virtual circuits Slotted: benefits of slotted aloha vs. aloha => reduce collisions Battery operation: if traffic profile is known, devices wake upon need © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
  • 27. Reliability through (all possible!) Code diversity Spatial diversity Code Division Multiplex Access Dynamic Power Control Network Coding (WIP) DAG routing topology + ARCs Frequency diversity Duo/Bi-casting (live-live) Channel hopping B/W listing Time Diversity ARQ + FEC (HARQ) © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
  • 28. • Schedule => direct trade-off between throughput, latency and power consumption. • A collision-free communication schedule is typical in industrial applications. • IEEE802.15.4e published April 2012. A B 16 channel offsets C E D F G e.g. 31 time slots (310ms) I H © 2013-2014 Cisco and/or its affiliates. All rights reserved. J Cisco Confidential 28
  • 29. 29
  • 30. Why IPv6 ? Going IP BRKEWN-3012 © 2010 Cisco and/or its affiliates. All rights reserved. Unclassified 30
  • 31. Why IP ? Open Standards vs. proprietary • COTS* suppliers drive costs down but • Reliability, Availability and Security up IP abstraction vs. per MAC/App • 802.11, 802.15.4 (e), Sat, 3G, UWB • Keep L2 topology simple To Infinity and Beyond… But End-to-End. • No intermediate gateway, tunnel, middle boxes & other trick * Commercial, off-the-shelf © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
  • 32. Which IP version ? The current Internet comprises several billion devices Smart Objects will add tens of billions of additional devices IPv6 is the only viable way forward IPv4 Unallocated pool exhausted March 2011 ! RIPE NCC: Sept 2012; ARIN March 2015 (last /8) Things Mobile Fixed © 2013-2014 Cisco and/or its affiliates. All rights reserved. Tens of Billions Smart Objects 2~4 Billions Phones & cars 1~2 Billions PCs & servers Cisco Confidential 32
  • 33. Application Core Constrained Restful Environments Charter to provide a framework for resourceoriented applications intended to run on constrained IP networks. General 6lo IPv6 over the TSCH mode of 802.15.4e Internet 6TiSCH Initial charter to produce an architecture, a minimal RPL operation over a static schedule and a data model to control the LLC (6top) Lightweight Implementation Guidance Ops and Mgmt LWIG Routing IETF ROLL Charter is to provide guidance in building minimal yet interoperable IP-capable devices for the most constrained environments. . Routing over Low Power Lossy Networks Charter focusses on routing issues for low power lossy networks. Security Reuse work done here where possible Transport © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
  • 34. Requirement for a new standard • Industrial requires standard-based products • Must support equivalent features as incumbent protocols • Must provide added value to justify migration • 6TiSCH value proposition • Design for same time-sensitive MAC (802.15.4e TSCH) • Direct IPv6 access to device (common network mgt) • RPL Distributed routing for scalability (for monitoring) • Large scale IPv6 subnet for mobility (50K +) © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
  • 35. Active IETF WG, 4 WG docs being adopted Define an Architecture that links it all together Align existing standards • (RPL, 6LoWPAN, PANA?, RSVP, PCEP, MPLS) over 802.15.4e TSCH Support Mix of centralized and distributed deterministic routing Design 6top sublayer for L3 interactions Open source implementations (openWSN…) Multiple companies and universities participating © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
  • 36. Management and Setup Discovery Pub/Sub Centralized route and track computation and installation Authentication for Network Access Wireless ND (NPD proxy) PCEP/PCC CoAP/DTLS TCP Distributed Distributed route and track route and track computation computation and installation and installation AAA 6LoWPAN ND RPL UDP ICMP Time Slot scheduling and track G-MPLS forwarding RSVP IPv6 6LoWPAN HC 6top IEEE 802.15.4e TSCH © 2013-2014 Cisco and/or its affiliates. All rights reserved. } Cisco Confidential 36
  • 37. CoAP CoAP CoAP CoAP UDP UDP UDP UDP IPv6 IPv6 IPv6 IPv6 6LoWPAN-HC 6LoWPAN-HC 6LoWPAN-HC 6LoWPAN-HC 6top 6top 6top 6top 15.4e TSCH 15.4e TSCH 15.4e TSCH 15.4e TSCH 15.4 PHY 15.4 PHY 15.4 PHY 15.4 PHY A X Y U © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
  • 38. CoAP CoAP CoAP CoAP UDP UDP UDP UDP IPv6 IPv6 IPv6 IPv6 6LoWPAN-HC 6LoWPAN-HC 6LoWPAN-HC 6LoWPAN-HC 6top 6top 6top 6top 15.4e TSCH 15.4e TSCH 15.4e TSCH 15.4e TSCH 15.4 PHY 15.4 PHY 15.4 PHY 15.4 PHY A © 2013-2014 Cisco and/or its affiliates. All rights reserved. X Y U Cisco Confidential 38
  • 39. CoAP CoAP CoAP CoAP UDP UDP UDP UDP IPv6 IPv6 IPv6 IPv6 6LoWPAN-HC 6LoWPAN-HC 6LoWPAN-HC 6LoWPAN-HC 6top 6top 6top 6top 15.4e TSCH 15.4e TSCH 15.4e TSCH 15.4e TSCH 15.4 PHY 15.4 PHY 15.4 PHY 15.4 PHY 15.4 PHY 15.4 PHY TSCH TSCH Multi-protocol Multi-protocol © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
  • 40. CoAP CoAP CoAP CoAP UDP UDP UDP UDP IPv6 1st IPv6 1stIPv6 IPv6 6LoWPAN-HC 6LoWPAN-HC Next 6LoWPAN-HC Next 6LoWPAN-HC 6top 6top 6top 6top 15.4e TSCH 15.4e TSCH 15.4e TSCH 15.4e TSCH 15.4 PHY 15.4 PHY 15.4 PHY 15.4 PHY A © 2013-2014 Cisco and/or its affiliates. All rights reserved. X Y U Cisco Confidential 40
  • 41. Backbone Router intra/ Internet 6TiSCH LLN Backbone Attached LLN* 6TiSCH LLN PCE Virtual devices NMS * LLN == Low Power Lossy Network © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41
  • 42. Common ND based abstraction over a backbone Scales DAD operations (distributes 6LoWPAN ND LBR) Scales the subnetwork (high speed backbone) Allows interaction with nodes on the backbone or in other subnets running different operations http://tools.ietf.org/html/draft-thubert-6lowpan-backbone-router © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
  • 43. © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
  • 44. Connected Route to subnet © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44
  • 45. Default Route In RIB © 2013-2014 Cisco and/or its affiliates. All rights reserved. Gateway to the outside participates to some IGP with external network and attracts all extra-subnet traffic via protocols over the backbone Cisco Confidential 45
  • 46. Directly upon NS(ARO) or indirectly upon DAR message, the backbone router performs DAD on behalf of the wireless device. NS DAD (ARO) DAD NS (ARO) NS (ARO) © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46
  • 47. The BR maintains a route to the WSN node for the DAO Lifetime over instance VRF. VFR may be mapped onto a VLAN on the backbone. Optional NA(O) NA (ARO) DAC © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47
  • 48. The BR maintains a route to the WSN node for the DAO Lifetime over instance VRF. VFR may be mapped onto a VLAN on the backbone. Optional NA(O) RPL DAO Host Route © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48
  • 49. DAD option has: Unique ID TID (SeqNum) Defend with NA if: Different OUID Newer TID NS DAD (ARO) NA (ARO) NS (ARO) © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49
  • 50. DAD option has: Unique ID TID (SeqNum) Defend with NA if: Different OUID Newer TID Optional NA(ARO) NA (ARO) with older TID (loses) RPL DAO Host Route © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 50
  • 51. NA ARO option has: Unique ID TID (SeqNum) NS lookup NA (ARO) Packet © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51
  • 52. Resolution (2) NS lookup Mixed mode ND BBR proxying over the backbone NA (ARO) Packet © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 52
  • 53. • Used to resolve conflicts • Need In ND: TID to detect movement ->eARO • Need In RPL: Object Unique ID if we use RPL for DAD 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type | Length = 2 | Status | Reserved | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Reserved |T| TID | Registration Lifetime | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | + OUID ( EUI-64 or equivalent ) + | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ © 2013-2014 Cisco and/or its affiliates. All rights reserved. Figure 2: EARO Cisco Confidential 53
  • 54. 6TiSCH at a glance Deterministic IPv6 over IEEE802.15.4e TimeSlotted Channel Hopping (6TiSCH) The Working Group will focus on enabling IPv6 over the TSCH mode of the IEEE802.15.4e standard. The scope of the WG includes one or more LLNs, each one connected to a backbone through one or more LLN Border Routers (LBRs). Active drafts http://tools.ietf.org/html/draft-ietf-6tisch-terminology http://tools.ietf.org/html/draft-ietf-6tisch-tsch http://tools.ietf.org/html/draft-ietf-6tisch-architecture http://tools.ietf.org/html/draft-ietf-6tisch-minimal http://tools.ietf.org/html/draft-wang-6tisch-6top http://tools.ietf.org/html/draft-ohba-6tisch-security http://tools.ietf.org/html/draft-sudhaakar-6tisch-coap © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 54
  • 55. Routing IP in LLNs BRKEWN-3012 © 2010 Cisco and/or its affiliates. All rights reserved. Unclassified 55
  • 56. • Hidden terminal • Interference domains grows faster that range • Density => low power => multihop => routing © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 56
  • 57. Aka stateful vs. On-demand routing Note: on-demand breaks control vs. Data plane separation © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 57
  • 58. • Aka SPF vs. Bellman-Ford • LS requires full state and convergence • LS can be very quiet on stable topologies • DV hides topolical complexities and changes © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 58
  • 59. 0 Optimized Routing Approach (ORA) spans advertisements for any change Routing overhead can be reduced if stretch is allowed: Least Overhead Routing Approach (LORA) For instance Fisheye and zone routing provide a precise routing when closeby and sense of direction when afar © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 59
  • 60. A Directed Acyclic Graph (DAG) is formed by a collection of vertices (nodes) and edges (links). 0 1 Clusterhead 2 1 1 2 Each edge connecting one node to another (directed) in such a way that it is not possible to start at Node X and follow a directed path that cycles back to Node X (acyclic). 0 2 3 2 3 2 3 2 4 3 3 A Destination Oriented DAG (DODAG) is a DAG that comprises a single root node. Here a DAG that is partitioned in 2 DODAG 3 4 3 5 5 6 44 5 4 © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 60
  • 61. 0 • In Green: A‟s subDAG. 1 1 • Impacted if A‟s connectivity is broken • Domain for routing recovery (or reverse subDAG) Potential SPAN on B‟s DAO Thus potential return paths Fanout must be controlled to limit intermediate states 1 2 0 2 3 A 2 3 2 3 • In Red: B‟s fanout DAG • • • • Clusterhead 2 2 4 3 3 3 4 3 5 5 6 44 5 4 B © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 61
  • 63. No preexisting physical topology Can be computed by a mesh under protocol, but… Else Routing must infer its topology Movement natural and unescapable Yet difficult to predict or detect © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 64
  • 64. Potentially Large Peer Set Highly Variable Capabilities Metrics (e.g. RSSI, ETX…) L3 Reachability (::/0, …) Constraints (Power …) Selection Per Objective © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 65
  • 65. • Smart object are usually • Small & Numerous • « sensor Dust » • Battery is critical • Deep Sleep • Limited memory • Small CPU • Savings are REQUIRED Control plane Data plane (Compression) © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 66
  • 66. Neither transit nor P2P More like a changing NBMA • a new paradigm for routing Changing metrics • (tons of them!) • (but no classical cost!) Inefficient flooding • Self interfering QoS and CAC © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 67
  • 67. Stretch vs. Control Optimize table sizes and updates Optimized Routing Approach (ORA) vs Least Overhead Routing Approach (LORA) Non Equal Cost multipath Directed Acyclic Graphs (DAG) a MUST Maybe also, Sibling routing on-demand routes (reactive) Forwarding and retries Same vs. Different next hop Validation of the Routing plane © 2013-2014 Cisco and/or its affiliates. All rights reserved. Objective Routing Weighted Hop Count the wrong metric Instances per constraints and metrics Cisco Confidential 68
  • 68. Pervasive Access • Satellite • 3/4G coverage • 802.11, 802.15.4 Always Reachable • at a same identifier • Preserving connections • Or not ? (CORE*, DTN**) Fast roaming • Within technology (L2) • Between Technologies (L3) * Constrained RESTful Environments ** Delay-Tolerant Networking © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 69
  • 70. RPL is an extensible proactive IPv6 DV protocol Supports MP2P, P2MP and P2P P2P reactive extension RPL specifically designed for LLNs Agnostic to underlying link layer technologies (802.15.4, PLC, Low Power WiFi) Minimum topological awareness Data Path validation Non-Equal Cost Multipath Fwd Instantiation per constraints/metrics Autonomic Subnet G/W Protocol Optimized Diffusion over NBMA © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 71
  • 71. Controlling the control … by design Distance Vector as opposed to Link State • Knowledge of SubDAG addresses and children links • Lesser topology awareness => lesser sensitivity to change • No database Synchronization => Adapted to movement Optimized for Edge operation • Optimized for P2MP / MP2P, stretch for arbitrary P2P • Least Overhead Routing Approach via common ancestor Proactive as opposed to Reactive • Actually both with so-called P2P experimental specification Datapath validation © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 72
  • 72. Control Information in Data Packets: • • • Instance ID Hop-By-Hop Header Sender Rank Direction (UP/Down) Errors detected if: No route further down for packet going down No route for packet going down Rank and direction do not match © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 73
  • 73. In the context of routing, a DAG is formed by a collection of vertices (nodes) and edges (links), each edge connecting one node to another (directed) in such a way that it is not possible to start at Node X and follow a directed path that cycles back to Node X (acyclic). © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 74
  • 74. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | RPLInstanceID |Version Number | Rank | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |G|0| MOP | Prf | DTSN | Flags | Reserved | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | + + | | + DODAGID + | | + + | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Option(s)... +-+-+-+-+-+-+-+-+ © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 76
  • 75. • : : A new DODAG iteration • Rebuild the DAG … Then repaint the prefixes upon changes • A new Sequence number generated by the root • A router forwards to a parent or as a host over next iteration • • • • • : find a “quick” local repair path Only requiring local changes ! May not be optimal according to the OF Moving UP and Jumping are cool. Moving Down is risky: Count to Infinity Control © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 77
  • 76. Extend the generic behavior • For a specific need / use case Used in parent selection • Contraints • Policies • Metrics Position in the DAG Computes the Rank increment • Based on hop metrics • Do NOT use OF0 for adhoc radios! • (OF 0 uses traditional weighted hop count) © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 78
  • 77. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | RPLInstanceID |Version Number | Rank | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |G|0| MOP | Prf | DTSN | Flags | Reserved | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | + + | | + DODAGID + | | + + | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Option(s)... +-+-+-+-+-+-+-+-+ © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 79
  • 78. +-----+-----------------------------------------------------+ | MOP | Description | +-----+-----------------------------------------------------+ | 0 | No Downward routes maintained by RPL | | 1 | Non-Storing Mode of Operation | | 2 | Storing Mode of Operation with no multicast support | | 3 | Storing Mode of Operation with multicast support | | | | | | All other values are unassigned | +-----+-----------------------------------------------------+ © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 80
  • 79. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | RPLInstanceID |K|D| Flags | Reserved | DAOSequence | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | + + | | + DODAGID* + | | + + | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Option(s)... +-+-+-+-+-+-+-+-+ © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 81
  • 80. Parent is default GW, advertizes owned PIO (L bit on) RPL Router autoconfigures Addr from parent PIO RPL Router advertises Prefix via self to parent RPL Router also advertises children Prefix A::A A C: A::B ::/0 via B::B ::/0 via A::A C:: connected B B: B:: connected B::B A:: B::D B::C B:: connected D: C D connected ::/0 via B::B C:: via B::C D:: via B::D A: A:: connected B:: via A::B C:: via A::B D:: via A::B B:: connected D:: connected © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 82
  • 81. For Your Reference Parent is default GW, propagates root PIO (L-bit off) Parent Address in the PIO (with R bit) RPL Router autoconfigures Address from parent PIO RPL Router advertises Address via self to parent RPL Router also advertises children Addresses A::A A C: ::/0 via A::B A::B A::B A::C B A:: A::D A::C C D connected self ~onlink ::/0 via A::A A::A connected A::B ::/0 via A::B connected A::D connected A::D connected A:: ~onlink A: A::A self A::B connected A::C via A::B A::D via A::B A:: ~onlink self A:: self A::C D: A::B © 2013-2014 Cisco and/or its affiliates. All rights reserved. B: ~onlink Cisco Confidential 83
  • 82. Parent is default GW, propagates root PIO (L-bit off) Parent Address in the PIO (with R bit) RPL Router autoconfigures Address from parent PIO RPL Router advertises Address via Parent to Root Root recursively builds a Routing Header back A::A A C: ::/0 via A::B A::B Target A::C via Transit A::B A::B A::C A::D A::C self ~onlink ::/0 via A::A A::A self A::B A::D via A::B ~onlink A::B connected self ~onlink via ~onlink A:: © 2013-2014 Cisco and/or its affiliates. All rights reserved. A:: A::C self connected connected A:: ::/0 via A::B A::B A::B A::A connected A::D D D: A::B C A: (root) B: A:: B connected A::D via Cisco Confidential 84
  • 83. For Your Reference Parent is default GW, advertizes owned PIO (L bit on) RPL Router autoconfigures Address from parent PIO RPL Router advertises Prefix via Address to Root Root recursively builds a Routing Header back A::A A C: A::B B:: connected B::B C:: connected B A:: D: C D A: (root) B: A:: ::/0 via A::A B::D B::C Target C::/ via Transit B::C ::/0 via B::B connected B:: via A::B C:: via B::C D:: via B::D connected B:: connected ::/0 via B::B B:: connected D:: connected © 2013-2014 Cisco and/or its affiliates. All rights reserved. D::3 via B::D via A::B connected Cisco Confidential 85
  • 84. Hidden node/terminal/station A B C D © 2013-2014 Cisco and/or its affiliates. All rights reserved. Flooding interferes with itself Cisco Confidential 86
  • 85. Suppression of redundant copies Do not send copy if K copies received Jitter for Collision Avoidance First half is mute, second half is jittered Exponential backoff Double I after period I, Reset I on inconsistency © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 87
  • 86. For Your Reference Node Metrics Link Metrics Node State and Attributes Object Purpose is to reflects node workload (CPU, Memory…) “O” flag signals overload of resource “A” flag signal node can act as traffic aggregator Throughput Object Currently available throughput (Bytes per second) Throughput range supported Node Energy Object “T” flag: Node type: 0 = Mains, 1 = Battery, 2 = Scavenger “I” bit: Use node type as a constraint (include/exclude) “E” flag: Estimated energy remaining Latency Can be used as a metric or constraint Constraint - max latency allowable on path Metric - additive metric updated along path Hop Count Object Can be used as a metric or constraint Constraint - max number of hops that can be traversed Metric - total number of hops traversed Link Reliability Link Quality Level Reliability (LQL) 0=Unknown, 1=High, 2=Medium, 3=Low Expected Transmission Count (ETX) (Average number of TX to deliver a packet) Link Colour Metric or constraint, arbitrary admin value © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 88
  • 88. At a given point of time connectivity is (fuzzy) Radio link © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 91
  • 89. 1st • • • • pass (DIO) Establishes a logical DAG topology Trickle Subnet/config Info Sets default route Self forming / self healing 0 1 Clusterhead 2 1 1 2 2 3 2 3 2 3 4 2 2nd pass (DAO) • • • • • paints with addresses and prefixes Any to any reachability But forwarding over DAG only saturates upper links of the DAG And does not use the full mesh properly 4 4 3 5 6 3 4 5 5 Potential link Link selected as parent link © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 92
  • 90. 0 1 Clusterhead 2 A‟s link to root fails 1 1 2 A loses connectivity Either poisons or detaches a subdag A 2 3 2 3 2 3 4 In black: 2 4 4 the potentially impacted zone That is A‟s subDAG 3 5 6 3 4 5 5 Potential link Link selected as parent link © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 93
  • 91. 0 1 Clusterhead 2 1 B can reparent a same Rank so B‟s subDAG is safe 0 2 A 2 3 2 B 3 1 The rest of A‟s subDAG is isolated 3 1 4 4 4 Either poison ar build a floating DAG as illustrated In the floating DAG A is root The structure is preserved 2 5 6 2 4 5 5 Potential link Link selected as parent link © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 94
  • 92. 0 1 Clusterhead 2 1 Once poisined nodes are identified 2 2 It is possible for A to reparent safely A 2 3 2 3 A‟s descendants inherit from Rank shift 3 3 4 3 4 Note: a depth dependent timer can help order things 4 4 5 6 4 4 5 5 Potential link Link selected as parent link © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 95
  • 93. 0 1 Clusterhead 3 1 A new DAG iteration • In Grey, the new DAG progressing 2 3 2 3 Metrics have changed, the DAG may be different Forwarding upwards traffic from old to new iteration is allowed but not the other way around 1 2 2 3 4 2 4 4 3 5 6 3 4 5 5 Potential link Link selected as parent link © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 96
  • 94. 0 A second root is available 1 • (within the same instance) 1 0 2 3 2 1 root = 1 DODAG 3 2 3 1 Node belongs to 1 DODAG 2 4 • (at most, per instance) 3 3 Nodes may JUMP 3 4 • from one DODAG to the next • up the DODAG 1 2 The DAG is partitioned Nodes may MOVE Clusterhead 2 3 5 5 6 44 5 4 Going Down MAY cause loops • May be done under CTI control Potential link Link selected and oriented by DIO © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 97
  • 95. 0 Running as Ships-in-the-night 1 Clusterhead 2 1 1 instance = 1 DAG 1 2 A DAG implements constraints 2 3 2 3 Serving different Objective Functions 2 3 4 2 3 For different optimizations Forwarding along a DODAG (like A a vlan) 3 3 4 5 4 3 4 Potential link Constrained instance Default instance © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 98
  • 96. New Radios issues: Addressed in RPL by: Dynamic Topologies DV, ORA P2MP/MP2P, LORA P2P Peer selection Objective Functions, Metrics Constrained Objects Controlling the control Fuzzy Links NECM Directed Acyclic Graphs Trickle and Datapath validation Routing, local Mobility Local and Global Recovery Global Mobility N/A © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 99
  • 97. RFC 6206: The Trickle Algorithm RFC 6550: RPL: IPv6 Routing Protocol for LLNs RFC 6551: Routing Metrics Used for Path Calculation in LLNs RFC 6552: Objective Function Zero for the Routing Protocol for LLNs RFC 6553: RPL Option for Carrying RPL Information in Data-Plane Datagrams RFC 6554: An IPv6 Routing Header for Source Routes with RPL RFC 6719: MRHOF Objective Function with hysteresis draft-ietf-roll-trickle-mcast: Multicast Protocol for LLNs draft-vilajosana-6tisch-minimal: Minimal 6TiSCH Configuration © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 100
  • 98. The Internet is going through its most considerable change since the first days, adding a nervous system to the bug brain. Potential is immense and unpredictable. Made possible by IPv6 But not at the core and unbeknownst to the core Stimulated by radio access Enabling new devices and usages The change happens in the Fringe, which is in fact a collection of virtualized fringes. The polymorphic Internet is already there. © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 101
  • 99. “We might be at the eve of pervasive networking, a vision for the Internet where every person and every device is connected to the network in the ultimate realization of Metcalf's Law.” © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 102

Notas del editor

  1. So let’s take a look at the characteristics on an LLN. What is it that makes an LLNAs mentioned before the devices are highly constrained, so we need to keep the state in each device to a minimum – for example we would not want the entire Link State database in every SensorIt is critical than an LLN uses the minimum amount of energyThere is a various array of traffic patterns - multipoint and point2pointProbably the most important thing to note is LLNs operate over networks with very restricted frame sizesWe can’t have giant packets running over poor quality linksThe routing protocol has to be really efficient – we can’t have it catering for every event/situation possible.
  2. Wespeak of iot but most of the time thisisreally about ITOT, thatis the integrationof OT and IT.Benefits of convergence. 40 yearsago, OT = OsTralia. In convergence isindustrialthat’scalled indus internet.Cheerscale => IPv6Evolution thatis happening. Eg HART-IP . Startingnaturally in the plant net, then control net thendevices. We are creating a cross fire to accelerate the adoption.130 millions ports, 25% Ethernet. Split of H1 (FF, wireless) and H2 (ethernet) fieldbuses .The convergence of IT and OT technologies, aka the Industrial Internet, represents a multibillion opportunity for IT vendors.Our strategy to promote that convergence includes pushing IPv6 to the industrial M2M endpoints to enable end-to-end connectivity over deterministic wireless networks that are being developed at IEEE to emulate the characteristics of incumbent OT networks This work will benefit IOTG (CIBU)IOTG has already started to incorporate partner solutions (1552S, 1552WU) but in a fragmented market. This project approach will converge and promote an international standard solution (IPv6, 6TiSCH, CoAP, 802.15.4e based). The project leverages standards to drive IPv6 at the endpoints (that we do not own), which in turn justifies the introduction of Cisco equipment in the factory
  3. • Direct-sequence spread spectrum (DSSS) modulation technique - this makes the ISA100.11a signal look like noise to other wireless systems.• Spatial diversity - Two field access points receive transmission from the field instrument.• Frequency diversity - Frequency hopping over the available channels in the bandwidth of the device's transmitting frequency.• Dynamic power control - Reduces possible interference with other wireless networks.• Channel black listing and adaptive channel hopping - Avoids congested channels. • Implementation of IEEE 802.15.4-2006 - Proven to coexist in very congested environments. • Careful management of the ISA100.11a wireless network implementation.
  4. RPL builds a routing topology in the form of a DAG – a Directed Acyclic Graph (tree vsDAGs)It is a distance vector protocol that is proactive – it can build alternate paths during topology setup – rather than reactive where we rely on control plane messages after the failure to figure out the alternate path DV was chosen because the size of a link state DB would be way too largeHistorically, a number of interesting research initiatives on routing in WSN,Main focus on algorithms … a bit less on architectureMost work assuming the use of MAC addresses – L2 “routing” (mesh-under)Support of multiple PHY/MAC is a MUST: IEEE 802.15.4, LP Wifi, PLC (number of flavors), …Now … if what you want is a layered architecture supporting multiple PHY/MAC, there aren’t that many options …IP !RPL has been designed for lossy links including PLC such as P1901.2, which are of the utmost important for example for AMI in Europe. Sincethese links do exhibit similar properties in terms of instability, BER, ... RPL is well suited for these networks too. I had to fight a bit when we first determineROLL's charter to make sure that non RF links such as PLC were part of the charter (strictly speaking we are independent of the L3 of course but this was to insist onthat decoupling and point out that RPL was a routing protocol for LLN). 
  5. RPL builds a routing topology in the form of a DAG – a Directed Acyclic Graph (tree vsDAGs)It is a distance vector protocol that is proactive – it can build alternate paths during topology setup – rather than reactive where we rely on control plane messages after the failure to figure out the alternate path DV was chosen because the size of a link state DB would be way too largeHistorically, a number of interesting research initiatives on routing in WSN,Main focus on algorithms … a bit less on architectureMost work assuming the use of MAC addresses – L2 “routing” (mesh-under)Support of multiple PHY/MAC is a MUST: IEEE 802.15.4, LP Wifi, PLC (number of flavors), …Now … if what you want is a layered architecture supporting multiple PHY/MAC, there aren’t that many options …IP !RPL has been designed for lossy links including PLC such as P1901.2, which are of the utmost important for example for AMI in Europe. Sincethese links do exhibit similar properties in terms of instability, BER, ... RPL is well suited for these networks too. I had to fight a bit when we first determineROLL's charter to make sure that non RF links such as PLC were part of the charter (strictly speaking we are independent of the L3 of course but this was to insist onthat decoupling and point out that RPL was a routing protocol for LLN). 
  6. A local RPLInstanceID is autoconfigured by the node that owns the DODAGID and it MUST be unique for that DODAGID. The DODAGID used to configure the local RPLInstanceID MUST be a reachable IPv6 address of the node, and MUST be used as an endpoint of all communications within that local instance.
  7. RPL builds a routing topology in the form of a DAG – a Directed Acyclic Graph (tree vsDAGs)It is a distance vector protocol that is proactive – it can build alternate paths during topology setup – rather than reactive where we rely on control plane messages after the failure to figure out the alternate path DV was chosen because the size of a link state DB would be way too largeHistorically, a number of interesting research initiatives on routing in WSN,Main focus on algorithms … a bit less on architectureMost work assuming the use of MAC addresses – L2 “routing” (mesh-under)Support of multiple PHY/MAC is a MUST: IEEE 802.15.4, LP Wifi, PLC (number of flavors), …Now … if what you want is a layered architecture supporting multiple PHY/MAC, there aren’t that many options …IP !RPL has been designed for lossy links including PLC such as P1901.2, which are of the utmost important for example for AMI in Europe. Sincethese links do exhibit similar properties in terms of instability, BER, ... RPL is well suited for these networks too. I had to fight a bit when we first determineROLL's charter to make sure that non RF links such as PLC were part of the charter (strictly speaking we are independent of the L3 of course but this was to insist onthat decoupling and point out that RPL was a routing protocol for LLN).