Slide #1IETF 75 – Roll WG – July 2009 RPL (ripple) Routing Protocol for Low Power and Lossy Networks Walkthrough draft-dt-roll-rpl-01.txt Anders Brandt.

Slides:



Advertisements
Similar presentations
© 2008 Pearson Addison Wesley. All rights reserved Chapter Seven Costs.
Advertisements

Copyright © 2003 Pearson Education, Inc. Slide 1 Computer Systems Organization & Architecture Chapters 8-12 John D. Carpinelli.
Copyright © 2003 Pearson Education, Inc. Slide 1.
Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 10 User.
Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 12 Cross-Layer.
Copyright © 2011, Elsevier Inc. All rights reserved. Chapter 6 Author: Julia Richards and R. Scott Hawley.
Author: Julia Richards and R. Scott Hawley
Properties Use, share, or modify this drill on mathematic properties. There is too much material for a single class, so you’ll have to select for your.
Path Splicing Nick Feamster, Murtaza Motiwala, Megan Elmore, Santosh Vempala.
MSTP Reflection VectorIEEE March 2005 Atlanta 1 MSTP Reflection Vector Norman Finn, Cisco Systems.
UNITED NATIONS Shipment Details Report – January 2006.
RXQ Customer Enrollment Using a Registration Agent (RA) Process Flow Diagram (Move-In) Customer Supplier Customer authorizes Enrollment ( )
1 Hyades Command Routing Message flow and data translation.
Slide #1IETF 75 – Roll WG – July 2009 RPL (pronounced ripple) Routing Protocol for Low Power and Lossy Networks IETF 75 status draft-dt-roll-rpl-01.txt.
1 Multi-Channel Wireless Networks: Capacity and Protocols Nitin H. Vaidya University of Illinois at Urbana-Champaign Joint work with Pradeep Kyasanur Chandrakanth.
and 6.855J Spanning Tree Algorithms. 2 The Greedy Algorithm in Action
1 Introducing the Specifications of the Metro Ethernet Forum MEF 19 Abstract Test Suite for UNI Type 1 February 2008.
1 RA I Sub-Regional Training Seminar on CLIMAT&CLIMAT TEMP Reporting Casablanca, Morocco, 20 – 22 December 2005 Status of observing programmes in RA I.
Properties of Real Numbers CommutativeAssociativeDistributive Identity + × Inverse + ×
Custom Statutory Programs Chapter 3. Customary Statutory Programs and Titles 3-2 Objectives Add Local Statutory Programs Create Customer Application For.
FACTORING ax2 + bx + c Think “unfoil” Work down, Show all steps.
Polygon Scan Conversion – 11b
Multipath Routing for Video Delivery over Bandwidth-Limited Networks S.-H. Gary Chan Jiancong Chen Department of Computer Science Hong Kong University.
Solve Multi-step Equations
REVIEW: Arthropod ID. 1. Name the subphylum. 2. Name the subphylum. 3. Name the order.
Break Time Remaining 10:00.
Table 12.1: Cash Flows to a Cash and Carry Trading Strategy.
Local Area Networks - Internetworking
PP Test Review Sections 6-1 to 6-6
Chapter 17 Linked Lists.
1 Atomic Routing Games on Maximum Congestion Costas Busch Department of Computer Science Louisiana State University Collaborators: Rajgopal Kannan, LSU.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Distance Vector Routing Protocols Routing Protocols and Concepts –
Mobile IP: Multicast Service Reference: Multicast routing protocol in mobile networks; Hee- Sook Shin; Young-Joo Suh;, Proc. IEEE International Conference.
Outline Minimum Spanning Tree Maximal Flow Algorithm LP formulation 1.
Developing a Project Plan CHAPTER SIX Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Chapter 6: Developing a Project Plan
Project Management 6e..
Developing the Project Plan
Where We Are Now Copyright © 2011 The McGraw-Hill Companies, All Rights Reserved.
Developing a Project Plan
Project Scheduling: Lagging, Crashing, and Activity Networks
Association Rule Mining
1 RA III - Regional Training Seminar on CLIMAT&CLIMAT TEMP Reporting Buenos Aires, Argentina, 25 – 27 October 2006 Status of observing programmes in RA.
Factor P 16 8(8-5ab) 4(d² + 4) 3rs(2r – s) 15cd(1 + 2cd) 8(4a² + 3b²)
Basel-ICU-Journal Challenge18/20/ Basel-ICU-Journal Challenge8/20/2014.
1..
CONTROL VISION Set-up. Step 1 Step 2 Step 3 Step 5 Step 4.
© 2012 National Heart Foundation of Australia. Slide 2.
Adding Up In Chunks.
Model and Relationships 6 M 1 M M M M M M M M M M M M M M M M
10 -1 Chapter 10 Amortized Analysis A sequence of operations: OP 1, OP 2, … OP m OP i : several pops (from the stack) and one push (into the stack)
Analyzing Genes and Genomes
©Brooks/Cole, 2001 Chapter 12 Derived Types-- Enumerated, Structure and Union.
Essential Cell Biology
© Ericsson Interception Management Systems, 2000 CELLNET Drop Administering IMS Database Module Objectives To add a network elements to the database.
CSE Lecture 17 – Balanced trees
PSSA Preparation.
Essential Cell Biology
Immunobiology: The Immune System in Health & Disease Sixth Edition
Energy Generation in Mitochondria and Chlorplasts
Select a time to count down from the clock above
Murach’s OS/390 and z/OS JCLChapter 16, Slide 1 © 2002, Mike Murach & Associates, Inc.
CPSC 322, Lecture 5Slide 1 Uninformed Search Computer Science cpsc322, Lecture 5 (Textbook Chpt 3.5) Sept, 14, 2012.
Slide #1IETF 75 – Roll WG – July 2009 RPL (pronounced ripple) Routing Protocol for Low Power and Lossy Networks IETF 75 status draft-dt-roll-rpl-01.txt.
Slide #1IETF 77 – Roll WG – March 2010 ROLL RPL IETF 77 status draft-ietf-roll-rpl Tim Winter Pascal Thubert Design Team.
IETF-76, Hiroshima, Nov 2009 ROLL Working Group Meeting IETF-76, Nov 2009, Hiroshima Routing Metrics used for Path Calculation in Low Power and Lossy Networks.
The Semantic IoT Amr El Mougy Slim Abdennadher Ghada Fakhry.
Wireless Sensor Networks 6. WSN Routing
Presentation transcript:

Slide #1IETF 75 – Roll WG – July 2009 RPL (ripple) Routing Protocol for Low Power and Lossy Networks Walkthrough draft-dt-roll-rpl-01.txt Anders Brandt Thomas Heide Clausen Stephen Dawson-Haggerty Jonathan W. Hui Kris Pister Pascal Thubert Tim Winter

Slide #2IETF 75 – Roll WG – July 2009 Overview RPL approach RPL basic mechanisms –DAG construction & MP2P traffic –Destination announcement & P2MP traffic –P2P traffic –DAG maintenance

Slide #3IETF 75 – Roll WG – July 2009 RPL Approach Construct and maintain a DAG supporting MP2P flows –multiple successors when available (vs. Tree) –implementation specific metrics and objective functions to find the least cost paths Use DAG to constrain & guide computation of routes supporting P2MP flows Use MP2P + P2MP as basic P2P support –More optimal P2P provisioned with complementary mechanisms

Slide #4IETF 75 – Roll WG – July 2009 Approach – the DAG Nodes taking up a position in the DAG compute a Depth value, specific to the metric and objective function in use Depth value may be used to gauge relative position in the DAG

Slide #5IETF 75 – Roll WG – July 2009 Approach - Forwarding Forwarding MP2P traffic to nodes of lesser depth avoids loops –only occur in presence of depth inconsistency, which is avoided or discovered and resolved –Ample redundancy in most networks Forwarding traffic to nodes of equal depth (DAG siblings) may be used if forwarding to lesser depth is temporarily failed –Increases redundancy, but additional protection against loops, e.g., ids, should be added Forwarding MP2P traffic to nodes of deeper depth is unlikely to make forward progress and likely to loop

Slide #6IETF 75 – Roll WG – July 2009 Approach - Loops Deeper nodes may be in the nodes own sub-DAG, which significantly increases the chance of loops –Forwarding traffic into ones own sub-DAG means it may come back around! RPL constructs and maintains the DAG in a coordinated way that avoids forming loops

Slide #7IETF 75 – Roll WG – July 2009 DAG Construction LLN links are depicted Links are annotated w/ ETX It is expected that ETX variations will be averaged/filtered as per [ROLL-METRICS] to be stable enough for route computation –Nodes are also to observe the metric and gain confidence before use ABC EDF GHI LBR-1

Slide #8IETF 75 – Roll WG – July 2009 DAG Construction Objective Code Point for example –Metric: ETX –Objective: Minimize ETX –Depth computation: Depth ~ ETX Note that a practical computation may be more coarse ABC EDF GHI LBR-1

Slide #9IETF 75 – Roll WG – July 2009 DAG Construction LBR-1 multicasts RA-DIO Nodes A, B, C receive and process RA-DIO Nodes A, B, C consider link metrics to LBR-1 and the optimization objective The optimization objective can be satisfied by joining the DAG rooted at LBR-1 Nodes A, B, C add LBR-1 as a DAG parent and join the DAG ABC EDF GHI LBR-1

Slide #10IETF 75 – Roll WG – July 2009 DAG Construction Node A is at Depth 1 in the DAG, as calculated by the routine indicated by the example OCP (Depth ~ ETX) Node B is at Depth 3, Node C is at Depth 2 Nodes A, B, C have installed default routes (::/0) with LBR-1 as successor ABC EDF GHI LBR

C Slide #11IETF 75 – Roll WG – July 2009 DAG Construction The RA timer on Node C expires Node C multicasts RA-DIO LBR-1 ignores RA-DIO from deeper node Node B can add Node C as alternate DAG Parent, remaining at Depth 3 Node E joins the DAG at Depth 3 by adding Node C as DAG Parent AB EDF GHI LBR

Slide #12IETF 75 – Roll WG – July 2009 DAG Construction Node A is at Depth 1, and can reach ::/0 via LBR-1 with ETX 1 Node B is at Depth 3, with DAG Parents LBR-1, and can reach ::/0 via LBR-1 or C with ETX 3 Node C is at Depth 2, ::/0 via LBR-1 with ETX 2 Node E is at Depth 3, ::/0 via C with ETX 3 ABC EDF GHI LBR

DAG Construction C Slide #13IETF 75 – Roll WG – July 2009 The RA timer on Node A expires Node A multicasts RA-DIO LBR-1 ignores RA-DIO from deeper node Node B adds Node A Node B can improve to a more optimum position in the DAG Node B removes LBR-1, Node C as DAG Parents AB EDF GHI LBR

Slide #14IETF 75 – Roll WG – July 2009 DAG Construction Node A is at Depth 1, ::/0 via LBR-1 with ETX 2 Node B is at Depth 2, ::/0 via A with ETX 2 Node C is at Depth 2, ::/0 via LBR-1 with ETX 2 Node E is at Depth 3, ::/0 via C with ETX 3 ABC EDF GHI LBR

Slide #15IETF 75 – Roll WG – July 2009 DAG Construction DAG Construction continues… And is continuously maintained ABC EDF GHI LBR

A EDF GH Slide #16IETF 75 – Roll WG – July 2009 MP2P Traffic MP2P traffic flows inwards along DAG, toward DAG Root DAG Root may also extend connectivity to other prefixes beyond the DAG root, as specified in the DIO Nodes may join multiple DAGs as necessary to satisfy application constraints LBR I BC

Slide #17IETF 75 – Roll WG – July 2009 Destination Advertisements Destination Advertisements build up routing state in support of P2MP traffic flows outward, from the sink to other nodes DA uses the same DAG For simplicity, we will focus on a subset of DA in the example ABC EDF GHI LBR

Slide #18IETF 75 – Roll WG – July 2009 Destination Advertisements Some nodes may be able to store routing state for outward flows (LBR-1, A, F) Some nodes may not (B, D) Some nodes may have a limited ability; DAs may indicate a priority for storage AB DF GH 1 LBR

Slide #19IETF 75 – Roll WG – July 2009 Destination Advertisements DAs may be triggered by DAG root or node who detects a change DA timers configured such that DAs start at greater depth, and may aggregate as they move up AB DF GH 1 LBR

Slide #20IETF 75 – Roll WG – July 2009 Destination Advertisements LBR-1 triggers Destination Advertisement mechanism in DIO G emits NA to F with DAO indicating reachability to destination prefix G:: F stores G:: via G H emits NA to F for destination prefix H:: F stores H:: via H 1 LBR H AB DF G

G Slide #21IETF 75 – Roll WG – July 2009 Destination Advertisements Suppose in this example F has a prefix F*:: capable of aggregating {F::, G::, H::} –The method to provision such a prefix is beyond the scope of RPL F emits NA to D with DAO indicating reachability to destination prefix F*:: D cannot store… (continued) AB DF H 1 LBR

F G A H Slide #22IETF 75 – Roll WG – July 2009 Destination Advertisements D adds F to the Reverse Route Stack in the DAO, and passes DAO on to B for F*:: [F] D also emits a DAO indicating prefix D:: to B B cannot store routing state… (continued) 1 LBR B D

Slide #23IETF 75 – Roll WG – July 2009 Destination Advertisements B adds D to the Reverse Route Stack in the DAO for D::, and passes DAO D:: [D] on to A A stores D:: via B, with the piecewise source route [D] B also emits a DAO indicating prefix B:: to A A stores B:: via B (continued) 1 LBR DF GH BA

Slide #24IETF 75 – Roll WG – July 2009 Destination Advertisements A emits DAOs to LBR-1 for destination prefixes A::, B::, D::, and F* LBR-1 stores A:: via A, B:: via A, D:: via A, and F*:: via A A stored B:: via B, D:: via B [D], F* via B [D, F] B, D stored nothing F stored G:: via G, H:: via H B LBR-1 DF GH A

Slide #25IETF 75 – Roll WG – July 2009 P2MP Traffic The routing state setup by Destination Advertisement is used to direct P2MP traffic outward LBR-1 directs traffic for G (F*::) to A A adds source routing directive, [D, F], and forwards to B B uses source routing directive to forward to D F GH AB LBR-1 D

Slide #26IETF 75 – Roll WG – July 2009 P2MP Traffic D uses source routing directive to forward to F F uses routing state to forward to G Note the use of source routing to traverse the stateless region of the LLN –The details of the source routing mechanism are still to be defined DF GH AB LBR-1

By default, P2P traffic follows the default route until a node is encountered who has a more explicit route P2P traffic flows inwards along the DAG until a common node is reached to direct the traffic outwards Slide #27IETF 75 – Roll WG – July 2009 P2P Traffic A EDF GH LBR-1 I BC

The default scheme allows P2P traffic with minimal state required of nodes – but is not appropriate in all cases More optimal P2P routes may be computed and installed if the application requires –RPL does not specify nor preclude such a mechanism at this time Slide #28IETF 75 – Roll WG – July 2009 P2P Traffic A EDF GH LBR-1 I BC

Consider the case where the link BD goes bad Node D will remove B from its DAG parent set Node D no longer has any DAG parents in the grounded DAG, so it will become the root of its own floating DAG Slide #29IETF 75 – Roll WG – July 2009 DAG Maintenance Loop Avoidance A EDF GH LBR-1 I BC

Node D multicasts an RA- DIO to inform its sub-DAG of the change Node I has an alternate DAG Parent, E, and does not have to leave the DAG rooted at LBR-1. Node I removes Node D as a DAG Parent Slide #30IETF 75 – Roll WG – July 2009 DAG Maintenance Loop Avoidance A E GH LBR-1 BC F I D

Node F does not have an option to stay in the DAG rooted at LBR-1 (no alternate DAG Parents), so Node F follows Node D into the floating DAG Node F multicasts an RA- DIO Nodes G and H follow Node F into the floating DAG Slide #31IETF 75 – Roll WG – July 2009 DAG Maintenance Loop Avoidance A E LBR-1 BC IGH FD

The sub-DAG of node D has now been frozen Nodes contained in the sub-DAG have been identified, and by following node D into the floating DAG, all old routes to LBR-1 have been purged The floating DAG seeks to rejoin a grounded DAG… Slide #32IETF 75 – Roll WG – July 2009 DAG Maintenance Loop Avoidance A E LBR-1 BC IGH FD

Node I multicasts an RA- DIO Node D sees a chance to rejoin grounded DAG at depth 5 through Node I Node D starts a DAG Hop timer of duration 4 associated with Node I Slide #33IETF 75 – Roll WG – July 2009 DAG Maintenance Loop Avoidance A LBR-1 GH FE BC D I

Suppose a link AF becomes viable Node A multicasts an RA- DIO Node F sees a chance to rejoin grounded DAG at depth 2 through Node A Node F starts a DAG Hop timer of duration 1 associated with Node A Slide #34IETF 75 – Roll WG – July 2009 DAG Maintenance Loop Avoidance I A LBR-1 GH FE BC D

Node Fs DAG Hop Timer expires Node F joins to the grounded DAG at depth 2 by adding A as a DAG parent, and removing D Node F multicasts an RA- DIO Nodes G and H follow Node F to the grounded DAG Slide #35IETF 75 – Roll WG – July 2009 DAG Maintenance Loop Avoidance I LBR-1 E BCA GH FD

Node D sees a chance to rejoin DAG LBR-1 at depth 3 through Node F Node D starts a DAG Hop timer of duration 2 associated with Node F, in addition the DAG Hop timer already running with duration 4 associated with Node I Slide #36IETF 75 – Roll WG – July 2009 DAG Maintenance Loop Avoidance I LBR-1 E BCA GH FD

Node Ds DAG Hop timer of duration 2 tends to expire first Node D joins the grounded DAG at depth 3 by adding Node F as a DAG Parent The breaking-off and re- joining of the broken sub- DAG is thus coordinated with loop avoidance Slide #37IETF 75 – Roll WG – July 2009 DAG Maintenance Loop Avoidance I LBR-1 E BCA GH FD

Two mechanisms to avoid count-to-infinity Floating DAG –Leave DAG, color sub-DAG, then look for new routes –Operation local to nodes that must increase their depth –Does not guarantee loop freedom Sequence number change –Loop freedom, but expensive network-wide operation –Used infrequently if possible SlideIETF 75 – Roll WG – July 2009 Loop Avoidance

Trickle Concerns –Broadcast is expensive –Wireless channel is a shared, spatial resource Idea –Dynamic adjustment of transmission period –Suppress transmissions that may be redundant Slide #39IETF 75 – Roll WG – July 2009

Trickle Parameters: –T_min: Minimum advertisement period –T_max: Maximum advertisement period –k: Suppression threshold Period adjustment: –On receiving inconsistent route information, reset to T_min –Otherwise, double up to T_max Suppression: –Increment count when receiving similar advertisement –At end of period, transmit if c < k, set c = 0 Proposal: –Carry T_min, T_max, and k in RA DIO Slide #40IETF 75 – Roll WG – July 2009

Slide #41IETF 75 – Roll WG – July END-