Internet DRAFT - draft-do-roll-p2p-backup

draft-do-roll-p2p-backup



ROLL                                                          D.S. Do
Internet Draft                                              N.T. Dinh
Intended status: Standards Track                               Y. Kim
Expires: December 18 2013                          Soongsil University
                                                         June 18, 2013



        Backup Path for Point-to-Point Routes in Low Power and Lossy
                                 Networks
                        draft-do-roll-p2p-backup-01


Abstract

   In this draft, a backup path setup mechanism is proposed for the
   P2P-RPL protocol in Low Power and Lossy Networks (LLNs). This
   mechanism allows sensor nodes to send packets over the backup path
   without rediscovering the p2p path in case of path failure, thus
   improving the reliability of p2p transmission.

Status of this Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six
   months and may be updated, replaced, or obsoleted by other documents
   at any time.  It is inappropriate to use Internet-Drafts as
   reference material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html

   This Internet-Draft will expire on December 18, 2013.

Copyright Notice

   Copyright (c) 2013 IETF Trust and the persons identified as the
   document authors. All rights reserved.



Do & Dinh & Kim       Expires December 18, 2013               [Page 1]

Internet-Draft  Backup Path for Point-to-Point Routes        June 2013


   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document. Please review these documents
   carefully, as they describe your rights and restrictions with
   respect to this document. Code Components extracted from this
   document must include Simplified BSD License text as described in
   Section 4.e of the Trust Legal Provisions and are provided without
   warranty as described in the Simplified BSD License.

Table of Contents


   1. Introduction ................................................ 2
   2. Target Use Cases ............................................ 3
   3. Terminology ................................................. 3
   4. P2P backup path setup with Local RPLInstanceID in LLNs....... 4
   5. P2P backup path setup with Global RPLInstanceID in LLNs...... 4
   6. Message Format .............................................. 7
     6.1. Backup Path Establishing Option.......................... 7
     6.2. Backup Path Confirming Option............................ 8
   7. Security Considerations...................................... 9
   8. IANA Considerations ......................................... 9
   9. Acknowledgments ............................................. 9
   10. References ................................................. 9
   10.1. Normative References...................................... 9
   10.2. Informative References................................... 10



1. Introduction

   Reliable routing is the general name for those mechanisms in which
   data is transmitted from a node to another node with a highly
   successful delivering ratio. Normally, reliable routing establishes
   a reliable path from the source to the destination. Then, the data
   packet is forwarded to the destination based on those paths.
   However, links in WSNs maybe frequently broken due to scheduling or
   sensor node failure. Therefore, data may not reach the destination.
   Then, the source needs to reestablish the path to the destination to
   send these packets. This increases costs and delays the transmission
   process. However, nodes in WSNs have resource constraints in terms
   of energy and memory. Thus, energy efficiency, reliability, and
   delay are crucial problems.

   Currently, the P2P-RPL routing protocol [1] in the ROLL working
   group provides a standard protocol for communication between two


Do & Dinh & Kim         Expires June 18, 2013                 [Page 2]

Internet-Draft  Backup Path for Point-to-Point Routes        June 2013


   nodes in Low power and Lossy Networks. This protocol relies on the
   RPL routing protocol [RFC6550]. First, the source acts as a sink and
   builds its own directed acyclic graph (DAG) to discover the
   destination. Then, the destination sends a unicast message back to
   the source node to confirm the path from the source to the
   destination. The current P2P-RPL routing protocol focuses on
   building only one point-to-point path. However, in an LLN
   environment, this path can be frequently broken at any time during
   the transmission phase. In this case, the overhead to rebuild the
   path from the beginning is very high.

   This document describes an extension to the P2P-RPL routing protocol
   on recovery after path failure. Nodes utilize the interactive path
   as alternative to quickly recover from failure to send packets to
   the destination instead of recreating the path. In particular, the
   purpose of the P2P-RPL-BACKUP is to immediately repair the path
   locally at the failed point to minimize cost and latency. The
   interactive path was created for this purpose without high extra
   overhead, which is composed of links including primary links and
   backup links for an optimal recovery path. In addition, this
   mechanism helps improve the performance of p2P-RPL routing in case
   of failure. Primary links and interactive links are defined in the
   terminology section.

2. Targeted Use Cases

   This document aims at point-to-point communication in LLN scenarios
   where reliability and delay constraints are not satisfied by P2P
   routes, especially in high broken link scenarios, including in
   industrial zone, home automation, and building automation.

   One typical example is due to the changes in the climate, a sensor
   to inform the cluster head of sensors in an area to change its
   parameters related to living conditions. In these applications,
   reliable transmission and delay are important. The message should be
   sent as quickly as possible. Then, retransmission of messages should
   be minimized.

3. Terminology

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in [RFC2119]

   Besides the terminology from [1], this draft also uses the following
   terms:



Do & Dinh & Kim         Expires June 18, 2013                 [Page 3]

Internet-Draft  Backup Path for Point-to-Point Routes        June 2013


   Source: The node that initiates route discovery.

   Destination: The node at the end point of the discovery process.

   Intermediate: The nodes between the Source and the Destination.

   Primary path: The path is established between the source and the
   destination based on P2P-RPL routing protocol.

   Primary node: The nodes on the Primary path.

   Primary link: The links on the Primary path.

   Backup node: The nodes selected for backup forwarding in case of
   failure on the Primary path.

   Backup link: The links created between a primary node and a backup
   node or between two backup nodes.

   Backup path: The path created by backup nodes.

   Interactive path: The path created between the primary link and
   backup link for an optimal recovery path from the failure.

   Forward direction: The direction from a primary node to a backup
   node.

   Backward direction: The direction from a backup node to a primary
   node.

   Hop-by-hop route: The route by which each node uses the routing
   table to determine the next-hop.

4. P2P backup path setup with Local RPLInstanceID in LLNs

   This section briefly describes the P2P-RPL-BACKUP process.

   Our proposal is an extension of the P2P-RPL routing algorithm [1].
   As with the P2P-RPL routing protocol, the Source starts building its
   own new DAG by using IPv6 link-local multicast DIO messages to
   discover the destination. However, unlike P2P-RPL routing, which
   only focuses on creating one path, the P2P-RPL-BACKUP tries to build
   a recovery path in addition to the Primary path. The recovery path
   is used in case of failure in the Primary path. The backup path can
   be used as a recovery path to avoid rediscovering processes that may
   result in high overhead and latency.



Do & Dinh & Kim         Expires June 18, 2013                 [Page 4]

Internet-Draft  Backup Path for Point-to-Point Routes        June 2013


   However, the failure may occur at any node or link on the Primary
   path. Therefore, retransmission on the backup path is not an optimal
   solution. P2P-RPL-BACKUP aims at repairing the path locally at the
   failed point immediately to minimize cost and latency. The
   interactive path is created for this purpose without high extra
   overhead and is composed of links, such as the primary link and
   backup link, for an optimal recovery path.

   The interactive path has special characteristics. The Primary path
   is responsible for transmitting packets from the Source to the
   Destination. The other paths are used as backup paths in the event a
   link is lost in the primary path. In this context, each node in the
   primary path has only one backup node in the secondary path. In
   addition, a node in the secondary path has connections with two
   nodes in the primary path. Once a packet arrives at a node, it has
   two options: It can be forwarded along the primary path or along the
   secondary path. Naturally, by utilizing the backup link at each
   node, the probability of a packet's successful transmission to the
   Destination is increased. Moreover, this algorithm helps reduce data
   packet transmission when the primary path is disrupted. Furthermore,
   the number of nodes in the secondary path are estimated and limited
   by the number of nodes in the primary path because each node in the
   primary path has a backup node.

   The Interactive-path-establishing process relies on the above
   characteristics. After the destination discovery phase, each node
   has its own position in the DAG of the Source by setting up its own
   rank [RFC6206]. Next, the Destination sends a discovery reply
   message back to its parent in the DAG of the Source to establish the
   Primary node. Then, this process is repeated until the Primary path
   is completely setup. The process of setting up the Interactive path
   occurs simultaneously. This is also based on the Discovery Reply
   message, which contains the Backup Path Establishing option and is
   defined in the next section, and includes two processes-establishing
   the connection between the Primary node and the Backup nodes and
   establishing the connection between the backup nodes. For the first
   process, the Destination sends its neighbors a Discovery Reply
   message that contains the above options and the rank of the
   Destination. If the rank of a neighbor is smaller than the rank
   contained in the option, the neighbor continues forwarding the reply
   message to its neighbor. Otherwise, this message is discarded. After
   the second-packet-broadcasting process occurs in the Destination's
   neighbor, if a node in the Primary path receives this message, based
   on the rank contained in each message, the node will choose the node
   with a greater than its rank, making it the smallest rank among the
   satisfying ranks. If multiple nodes satisfy the above condition, one
   of them is randomly chosen. For the second process, a DIO message


Do & Dinh & Kim         Expires June 18, 2013                 [Page 5]

Internet-Draft  Backup Path for Point-to-Point Routes        June 2013


   that contains the Backup Path Confirming option (which is defined in
   the next section) is sent back to the chosen backup node. Then, this
   process is repeats to choose the next backup node. The entire
   process stops when it reaches the Source.

   In the above process, the Source has to clarify the following
   information:

   o The IPv6 address of the Destination: This address could be a
      unicast or multicast address.

   o The forwarding mechanism: hop-by-hop.

   In addition, one of the most important factors is the distance
   between the Source and the Destination, which determines whether the
   Destination should establish a path to the Source. If this distance
   is too great, energy is wasted forming a path from the Source to the
   Sink and from the Sink to the Destination.

   After setting up the paths, except the interactive links, other
   links are unnecessary, and nodes do not keep those connections. Then,
   the DAG is released.

   Finally, the data packets are forwarded along the Interactive path
   and adhere to the following rule: The Source sends data along the
   Primary path. If there is a broken link in this path, the
   intermediate node will redirect the data to the node in the
   Interactive path. At this node, the data are forwarded to the next
   hop in the Primary path if the link is available. Otherwise, the
   data are forwarded to the next-hop in the Interactive path.

5. P2P backup path setup with Global RPLInstanceID in LLNs

   This part provides a method of guaranteeing the path for
   transmitting data packets over multiple domains. This path includes
   three sub-paths. The first one is from the Source to the Sink which
   has the same RPLInstanceID with the Source. The second is between
   the above Sink and the Sink which has the same RPLInstanceID with
   the Destination. And the third is from the latter Sink to the
   Destination. Specifically, there are two sub-paths, the first and
   the third, are protected with high reliability. The second must
   establish the tunnel between them. However, it is out of the scope
   of this draft.

   The process of establishing above path is similar to the process
   which is presented in the section 4. However, the RPLInstanceID of
   the Destination and the Source MUST be supplemented.


Do & Dinh & Kim         Expires June 18, 2013                 [Page 6]

Internet-Draft  Backup Path for Point-to-Point Routes        June 2013


   Therefore, in order to meet the above functional requirements, some
   parameters should be added in the header of the packet.

    o Flag G: Must be set to one if RPLInstaceID of the Destination and
      the Source are different

    o Additional header length

    o RPLInstanceID Source: the RPLInstanceID of the Source

    o RPLInstanceID Destination: the RPLInstanceID of the Destination

6. Message Format

6.1. Backup Path Establishing Option

       0                   1                   2                   3
        0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |   Type =10    |D|H|             R                 |  Reserved |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |                                                               |
       |                       Target Address                          |
       |                                                               |
       |                                                               |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

          Figure 1: Format of the Backup Path Establishing Option

   The Backup path Establishing Option is an alternative to the
   Discovery Reply Object in establishing the path between the backup
   and primary nodes.

   o Option Type = 0x10 (to be confirmed by IANA).

   o Target Address: The IPv6 address of the target node.

   o D: A 1-bit field that indicates the direction of the desired
      routes.

            D = 0x0: Forward from the primary node to the backup node.

            D = 0x1: Backward from the backup node to the primary node.

   o H: Limit the scale of sending message within one hop

   o R: Rank of the sending node


Do & Dinh & Kim         Expires June 18, 2013                 [Page 7]

Internet-Draft  Backup Path for Point-to-Point Routes        June 2013


6.2. Backup Path Confirming Option


       0                   1                   2                   3
        0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |    Type=11    |D|H|                Reserved                   |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |                                                               |
       |                  Destination Address                          |
       |                                                               |
       |                                                               |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
           Figure 2. Format of the Backup Path Confirming Option

   o Option Type = 0x11 (to be confirmed by IANA).

   o Target Address: The IPv6 address of the selected node.

   o D: A 1-bit field that indicates the direction of the desired
      routes:

            D = 0x0: Forward from the primary node to the backup node.

            D = 0x1: Backward from the backup node to the primary node.

   o H: Limit the scale of sending message within one hop

7. Security Considerations

8. IANA Considerations

9. Acknowledgments

10. References

10.1. Normative References

   [RFC6550] Winter, T., Thubert., P, and R. Team, "RPL: IPv6 routing
             protocol for low power and lossy networks, "RFC 6550, March
             2012.

   [RFC6206] Levis, P., Clausen, T., Hui, J., Gnawali, O., and J. Ko,
             "The Trickle Algorithm", RFC 6206, March 2011.

   [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
             Requirement Levels", BCP 14, RFC 2119, March 1997.


Do & Dinh & Kim         Expires June 18, 2013                 [Page 8]

Internet-Draft  Backup Path for Point-to-Point Routes        June 2013


10.2.  Informative References

   [1]  Goyal, M., Baccelli, E., Philipp, M., Brandt, A., and J.
         Martocci, "Reactive Discovery of Point-to-Point Routes in Low
         Power and Lossy Networks, "draft-ietf-roll-p2p-rpl-15 (work in
         progress), October 2012.



Authors' Addresses

   Dinh-Sy Do
   Soongsil University
   Huyngnam Enginerring Building 424, Soongsil Univ, Sangdo-do,
   Dongjak-Gu, Seoul, Korea 156-743

   Phone: 00828200841
   Email: sydodinh@dcn.ssu.ac.kr

   Ngoc-Thanh Dinh
   Soongsil University
   Huyngnam Enginerring Building 424, Soongsil Univ, Sangdo-do,
   Dongjak-Gu, Seoul, Korea 156-743

   Phone: 00828200841
   Email: ngocthanhdinh@dcn.ssu.ac.kr

   Younghan Kim
   Soongsil University
   Huyngnam Enginerring Building 424, Soongsil Univ, Sangdo-do,
   Dongjak-Gu, Seoul, Korea 156-743

   Phone: 00828200841
   Email: younghak@ssu.ac.kr














Do & Dinh & Kim         Expires June 18, 2013                 [Page 9]