Internet DRAFT - draft-satish-6tisch-aodv-rpl

draft-satish-6tisch-aodv-rpl






6tisch                                                    S. Anamalamudi
Internet-Draft                                                  M. Zhang
Intended status: Standards Track                     Huawei Technologies
Expires: September 19, 2016                                   C. Perkins
                                                               Futurewei
                                                                  D. Liu
                                                   China Telcom Co., Ltd
                                                             S.V.R.Anand
                                             Indian Institute of Science
                                                          March 18, 2016


              Asymmetrical AODV-P2P-RPL in 6tisch Networks
                    draft-satish-6tisch-aodv-rpl-00

Abstract

   Asymmetrical link based time-sensitive traffic flows with highly
   reliable shortest end-to-end route discovery is pre-requisite in IPv6
   over the TSCH mode of IEEE 802.15.4e (6tisch) Networks.  To achieve,
   this document specifies a resource reservation based reactive P2P
   route discovery mechanism for hop-by-hop routing (storing mode) based
   on Ad Hoc On-demand Distance Vector Routing (AODV) RPL protocol for
   6tisch Networks.  Two separate instances are used to achieve
   directional paths based on asymmetric links in between source and
   destination.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on September 19, 2016.








Anamalamudi, et al.    Expires September 19, 2016               [Page 1]

Internet-Draft         draft-satish-tisch-AODV-RPL            March 2016


Copyright Notice

   Copyright (c) 2016 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
   2.  Terminology . . . . . . . . . . . . . . . . . . . . . . . . .   4
   3.  Overview of AODV-RPL  . . . . . . . . . . . . . . . . . . . .   5
   4.  AODV Route Discovery Mode . . . . . . . . . . . . . . . . . .   5
     4.1.  Route Discovery mode for DIO-RREQ-Instance-1  . . . . . .   8
     4.2.  Route Discovery mode for DIO-RREQ-Instance-2  . . . . . .  10
   5.  Resource reservation for P2P Communication  at 6TOP . . . . .  12
     5.1.  Operation of Trickle TImer  . . . . . . . . . . . . . . .  14
   6.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .  14
     6.1.  Additions to Mode of Operation  . . . . . . . . . . . . .  14
     6.2.  Additions to RPL Control Message Options  . . . . . . . .  14
   7.  Security Considerations . . . . . . . . . . . . . . . . . . .  15
   8.  References  . . . . . . . . . . . . . . . . . . . . . . . . .  15
     8.1.  References  . . . . . . . . . . . . . . . . . . . . . . .  15
     8.2.  Informative References  . . . . . . . . . . . . . . . . .  16
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  17

1.  Introduction

   Deterministic Networks enable time sensitive traffic flows that are
   highly sensitive to jitter, quite sensitive to latency, and with a
   high degree of operational criticality.  This clearly depicts that
   nodes in the Deterministic networks need to be scheduled to support
   critical packet flows.  To achieve this, 6TiSCH Working Group focus
   on the Time Slotted Channel Hopping (TSCH) mode of the IEEE802.15.4e
   standard to schedule traffic flows through Channel Distribution and
   Usage (CDU) matrix.  [I-D.ietf-6tisch-minimal] describes about
   initial formation of 6tisch network during network bootstrap through
   Enhanced Beacons (EB).  RPL [RFC6550], the IPv6 distance vector
   routing protocol for Low-power and Lossy Networks (LLNs), is used on
   the resulting 6tisch network.  RPL is designed to support multiple



Anamalamudi, et al.    Expires September 19, 2016               [Page 2]

Internet-Draft         draft-satish-tisch-AODV-RPL            March 2016


   traffic flows through a root-based Destination Oriented Directed
   Acyclic Graph (DODAG).  For Point-to-Point (P2P) traffic flows
   (meaning that two routers within the RPL network need to
   communicate), this mean that data packets either have to traverse the
   root in non-storing mode (source routing), or traverse a common
   ancestor in storing mode (hop-by-hop routing).  Such P2P traffic
   thereby flows along sub-optimal routes between arbitrary router pairs
   and may suffer severe traffic congestion near the DAG root [RFC6997],
   [RFC6998].  This sub-optimal paths in RPL[RFC6550] result in
   increased resource reservation control overhead (6top control message
   overhead) and in-efficient bandwidth allocation (cells) for P2P
   traffic flows in 6tisch networks.  To avoid this issue, it is
   desirable for child node to acquire resources (cells) reactively from
   its next hop neighbor (temporary parent) towards destination instead
   of original parent of RPL.  In addition, severe traffic congestion
   near the DAG root MAY leads to increased packet drops that need to be
   taken care more efficiently for time-sensitive traffic flows in
   6tisch networks.

   To overcome sub-optimal paths for P2P traffic flows in RPL, P2P-RPL
   [RFC6997] is proposed with a temporary DODAG where the source acts as
   temporary root.  The source initiates "P2P Route Discovery mode (P2P-
   RDO)" with "address vector" for both non-storing mode (H=0) and
   storing mode (H=1).  Subsequently, each intermediate router will add
   its IP address and multicast the P2P-RDO message again, until it
   reaches the destination.  The destination will send "Discovery reply
   option", using either "hop-by-hop routing" or "source routing", based
   on "H" field in P2P-RDO.  The proposed solution is efficient for
   source routing, but much less efficient for hop-by-hop routing.  This
   is due to the extra address vector overhead in hop-by-hop routing.
   In fact, when the P2P-RDO message is being multicast from the source
   hop-by-hop, receiving nodes are able to figure out a next hop towards
   the source in symmetric links.  Subsequently, when the destination
   replies to the source along the established routes, receiving nodes
   can once again figure out the next hop towards the destination.  In
   other words, it is efficient to use only routing tables for P2P-RDO
   message instead of "Address vector" for purely hop-by-hop routes
   (H=1) in symmetrical links.

   Both RPL and P2P-RPL is proposed for single DODAG where bi-
   directional symmetrical links are assumed.  But, application-specific
   routing requirements that are defined in IETF ROLL Working Group
   [RFC5548], [RFC5673], [RFC5826] and [RFC5867] may have routing
   metrics and routing constraints that refer to links with bi-
   directional asymmetric properties.  To achieve this,
   [I-D.thubert-roll-asymlink] describes about bi-directional
   asymmetrical links for RPL [RFC6550] with Paired DODAGs where the DAG
   root (DODAGID) is common for two Instances.  This satisfies the



Anamalamudi, et al.    Expires September 19, 2016               [Page 3]

Internet-Draft         draft-satish-tisch-AODV-RPL            March 2016


   application-specific routing requirements for bi-directional
   asymmetrical links in root based RPL [RFC6550].  However, P2P-RPL
   [RFC6997] for Paired DODAGs may need to have two DAG roots: one for
   the source and the other for the destination due to on-demand
   temporary DODAG formation.  Moreover, applications in deterministic
   networks [I-D.grossman-detnet-use-cases] MAY also need to allocate
   asymmetrical links for P2P traffic flows where resource reservation
   (cell allocation) is different for bi-directional links.  To achieve,
   this document specifies P2P route discovery through AODV-RPL, given
   the network supports bi-directional asymmetric links (See Section 4)
   and describes how 6top reserves resources (See Section 5) required by
   the discovered route [I-D.wang-6tisch-6top-sublayer].  This scenario
   requires two multicast messages to discover routes for bi-directional
   asymmetric links.  With AODV-RPL, there is no "Address vector"
   control overhead during route discovery for paired DODAG scenarios.
   It is noteworthy that proposed AODV-RPL is designed on the top of the
   RPL routing protocol[RFC6550].

   The main objective of AODV-RPL with bi-directional asymmetric links
   is to discover P2P routes reactively rather than those available
   along a global DAG [I-D.thubert-roll-asymlink].  The discovered
   routes of each bi-directional path must meet the application specific
   metrics and constraints that are separately defined in each Objective
   Function for each instance [RFC6552].  In this specification, all the
   nodes within the constrained network are required to support both
   instances to enable on-demand route establishment.

2.  Terminology

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
   "OPTIONAL" in this document are to be interpreted as described in
   [RFC2119].  Additionally, this document uses the following terms:

   AODV
      Ad Hoc On-demand Distance Vector Routing[RFC3561].

   Source
      The IPv6 router initiating the AODV-RPL route discovery.

   Destination
      The IPv6 router at the other end point of the P2P route(s) within
      the LLN network.

   Bi-directional Asymmetric Link
      A link that can be used in both directions but with different link
      characteristics.  [I-D.thubert-roll-asymlink]




Anamalamudi, et al.    Expires September 19, 2016               [Page 4]

Internet-Draft         draft-satish-tisch-AODV-RPL            March 2016


   Instance-1
      Instance used for control transmission from Source to Destination
      and data transmission from Destination to Source.

   Instance-2
      Instance used for control transmission from Destination to Source
      and data transmission from Source to Destination.

   hop-by-hop routing
      Routing when each node stores routing information about the next
      hop towards Source or Destination.

   Paired DODAGs
      Two DODAGs for a single application.

   P2P
      Point-to-Point.

   source routing
      The mechanism by which the source supplies the complete route to
      the destination along with each data packet [RFC6997].

3.  Overview of AODV-RPL

   With AODV-RPL, routes from Source to Destination within the LLN
   network are "on-demand"; in other words, the route discovery
   mechanism in AODV-RPL will be performed reactively when source has
   data for delivery to the Destination but existing routes do not
   satisfy the application's requirements.  Unlike base RPL [RFC6550]
   and P2P-RPL [RFC6997], AODV-RPL can determine routes in networks with
   bi-directional asymmetric links.  In other words, AODV-RPL is
   designed to discover two routes namely one from Source to Destination
   and other from Destination to Source.  In addition, AODV-RPL can also
   support purely symmetric links for Paired DODAGs through "A" bit that
   is explained in Section 4.

4.  AODV Route Discovery Mode

   In AODV-RPL, route discovery is initiated by forming a temporary DAG
   rooted at the Source.  Paired DODAGs are used to achieve bi-
   directional asymmetrical link formation in between Source and
   Destination.  AODV-RPL is designed to support two instances.
   Instance-1 is used for the route control messages from Source to
   Destination whereas Instance-2 is used for route control messages
   from Destination to Source (as shown in Figure 2).  Intermediate
   routers join the Paired DODAGs based on the rank determined from the
   DIO message.  Henceforth in this document, the DIO-RREQ-Instance-1
   message represents the Route Discovery message from Source to



Anamalamudi, et al.    Expires September 19, 2016               [Page 5]

Internet-Draft         draft-satish-tisch-AODV-RPL            March 2016


   Destination whereas DIO-RREQ-Instance-2 represents the Route
   Discovery message from Destination to Source.  Subsequently,
   Instance-1 is used for data transmission from Destination to Source
   and Instance-2 is used for Data transmission from Source to
   Destination.  The operation of the discovery mechanism resembles base
   RPL, extended by a new option called AODV-RREQ in a modified DIO
   message [I-D.thubert-roll-asymlink].  A new bit called Asymmetric bit
   ("A") is added to the base DIO message as shown in Figure 1.  Source
   will always set the "D" bit to 1 and "A" bit to 0 while initiating
   the DIO-RREQ-Instance-1 message.

     0                   1                   2                   3
     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     | RPLInstanceID |Version Number |             Rank              |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     |G|D| MOP | Prf |     DTSN      |     Flags     |A|  Reserved   |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     |                                                               |
     +                                                               +
     |                                                               |
     +                            DODAGID                            +
     |                                                               |
     +                                                               +
     |                                                               |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     |   Option(s)...

            Figure 1: Modified DI0 to support asymmetric links

   The "D" bit in the DIO message indicates the directional DODAG
   information whereas "A" bit describes the link nature (Asymmetric or
   Symmetric).  Figure 2 describes about operation of "A" bit for
   symmetrical and asymmetrical links.If the DIO-RREQ-Instance-1 arrives
   over an interface (Intermediate router) that is known to be
   symmetric, and the 'A' bit is set to 0, then it remains set at 0 (see
   Figure 2(a)).  If the DIO-RREQ-Instance-1 arrives over an interface
   that is not known to be symmetric, or is known to be asymmetric, then
   the 'A' bit is set to be 1.  If the 'A' bit arrives already set to be
   '1', it is set to be '1' on retransmission (Figure 2(b)).  The 'A'
   bit is set to mean that the route is asymmetric.  If any Intermediate
   router along the way believes that the incoming link is asymmetric,
   then the "A" bit is set to be 1 and remains set to be 1 all the way
   to the destination.  Otherwise if there are no asymmetric links the
   "A" bit remains set to zero.  Based on the "A" bit received by
   Destination in DIO-RREQ-Instance-1, link nature (Asymmetric or
   Symmetric) is decided to transmit DIO-RREQ-Instance-2 message back to
   Source.



Anamalamudi, et al.    Expires September 19, 2016               [Page 6]

Internet-Draft         draft-satish-tisch-AODV-RPL            March 2016


    --Instance-1 (Control:S->D;Data:D->S) ------>

                   A=0     A=0       A=0
                  <-->    <-->      <-->
               R--------R--------R--------R
               |        |        |        |
               | A=0    |        |    A=0 |
           A=0 |<-->    |        |   <--> |   A=0       A=0
          <--> |        |        |        |  <-->      <-->
      S--------R--------R--------R--------R--------R---------D
               |        |        |        |        |         |
               |        |        |        |        |         |
               |        |        |        |        |         |
               R--------R--------R--------R--------R---------R

                   <--Instance-2(Control:D->S;Data:S->D)--------

                     (a). AODV-RPL with Symmetrical links

            --Instance-1 (Control:S->D;Data:D->S) ------>
                   A=0      A=0      A=1
                   -->      -->      -->
               R--------R--------R--------R
               |        |        |        |
               |A=0     |        |    A=1 |
          A=0  |-->     |        |    --> |   A=1       A=1
          -->  |        |        |   ------   -->       -->
      S--------R--------R--------R--------R--------R---------D
               |        |        |        |        |         |
         A=1   |        |        |        |        |         |
         <--   |A=1     |        |        |        |         |A=1
               |<--     |        |        |        |         |<--
               |        |        |        |        |         |
               R--------R--------R--------R--------R---------R

                  A=1      A=1      A=1       A=1      A=1
                  <--      <--      <--       <--      <--

               <--Instance-2(Control:D->S;Data:S->D)--------

                     (b). AODV-RPL with Asymmetrical links

                                           S :Source
                                   R :Intermediate nodes
                                   D :Destination

                 Figure 2: AODV-RPL with Paired Instances




Anamalamudi, et al.    Expires September 19, 2016               [Page 7]

Internet-Draft         draft-satish-tisch-AODV-RPL            March 2016


   The value of 'A' bit (Symmetric or Asymmetric) can be decided by the
   available radio resources (cells) (See Section.5) during DIO-RREQ-
   Instance-1 message.  Based on the received number of cell requests
   (NumCell) from ADDRequest in DIO-RREQ-Instance-1, Intermediate node
   will decide to set 'A' bit to '1' or remain to set 'A' bit to '0'.
   For example, if intermediate node has resource (cells) to transmit
   data for only one direction then it set A bit to '1'.  If it has
   resources (cells) to support data in both directions then it can
   remain the 'A' bit to '0'.  Even if there is atleast one link along
   the path of DIO-RREQ-Instance-1 that does not have cells for both
   directions then 'A' bit is set to '1' and Destination will start to
   multicast DIO-RREQ-Instance-2(see Figure 2(b)).  If all the
   Intermediate nodes have cells for both directions then 'A' bit will
   be remain to '0' and DIO-RREQ-Instance-2 is unicast back in same path
   of DIO-RREQ-Instance-1 (see Figure 2(a)).

4.1.  Route Discovery mode for DIO-RREQ-Instance-1

   The AODV-RPL Source specifies the following information in the DIO-
   RREQ-Instance-1 message:

   - D-bit

      Directional bit in the DIO base object (D=1 for DIO-RREQ-
      Instance-1 message)[I-D.thubert-roll-asymlink].

   - A-bit

      Asymmetric bit in the DIO base object (A=0 for DIO-RREQ-Instance-1
      message).

   - MOP bit

      MOP operation in the DIO object MUST be set to "5(tbd)" by Source
      for "AODV-RPL".

   - RPLInstanceID

      RPLInstanceID in the DIO object MUST be the InstanceID of
      Instance-1.

   - DODAGID

      DODAGID in the DIO object MUST be the IPv6 address of the Source
      that initiates the DIO-RREQ message of Instance-1.

   - Rank




Anamalamudi, et al.    Expires September 19, 2016               [Page 8]

Internet-Draft         draft-satish-tisch-AODV-RPL            March 2016


      Rank in the DIO object MUST be the the rank of Instance-1.

   - Metric Container Options

      DIO-RREQ-Instance-1 message from Source MAY carry one or more
      Metric Container options to specify the relevant routing metrics.

   - Destination address

      IPv6 address of the Destination that receives DIO-RREQ-Instance-1
      message.  This address MUST be in the modified RREQ option (see
      Figure 3) of AODV [RFC3561].

   - G bit

      G(Gratuitous RREP flag) bit is set to "1" when Source has
      Destination Sequence number.  When an intermediate node has a
      route towards destination with higher Destination Sequence number
      then Gratuitous DIO-RREP messages are unicast from the
      intermediate node to Destination.  Note that Intermediate nodes
      never reply unicast Gratuitous DIO-RREP messages back to Source in
      Instance-1.

   - J bit

      Derived from [RFC3561].Out of scope for this specification.

   - R bit

      Derived from [RFC3561].Out of scope for this specification.

   - D bit

      Derived from [RFC3561].Out of scope for this specification.

   - U bit

      Derived from [RFC3561].Out of scope for this specification.

   The Source in Figure 2 will multicast the DIO-RREQ-Instance-1 message
   (see Figure 3) to its one-hop neighbours.  Intermediate nodes will
   compute the rank for Instance-1 and create a routing table entry for
   path towards the source if the routing metrics/constraints are
   satisfied.  Subsequently, it checks for already existing path towards
   destination by comparing the Destination Sequence Numbers.  Whenever
   the path exists from intermediate node to Destination, it unicast the
   Gratuitous DIO-RREP towards destination and creates the path towards
   Source for Instance-1.  This helps to minimize the route control



Anamalamudi, et al.    Expires September 19, 2016               [Page 9]

Internet-Draft         draft-satish-tisch-AODV-RPL            March 2016


   message multicast overhead during Route Discovery process.  The
   message format of Gratuitous DIO-RREP is same as [RFC3561] with the
   exception of the Source IP address which can be obtained through
   DODAGID of DIO base (see Figure 1).  If the path towards Destination
   does not exist, the intermediate node has to re-multicast the DIO-
   RREQ-Instance-1 message with updated rank to the next-hop neighbours
   until the message reaches to Destination(Figure 2).  Based on the "A"
   bit in received DIO-RREQ_instance-1, Destination will decide to
   unicast or multicast the DIO-RREQ-Instance-2 message back to Source.

        0                   1                   2                   3
        0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |    Type       |J|R|G|D|U|      Reserved       |   Hop Count   |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |                     Destination IP Address                    |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |                   Destination Sequence Number                 |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |                    Originator Sequence Number                 |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

                Figure 3: Modified DIO-RREQ message format

        0                   1                   2                   3
        0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |    Type       |R|A|     Reserved    |Prefix Sz|   Hop Count   |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |                    Destination IP Address                     |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |                  Destination Sequence Number                  |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |                          Lifetime                             |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

               Figure 4: DIO-Gratuitous-RREP message format

4.2.  Route Discovery mode for DIO-RREQ-Instance-2

   The AODV-RPL Destination specifies the following information in the
   DIO-RREQ-Instance-2 message:

   - D-bit

      Directional bit in the DIO base object (D=1 for DIO-RREQ-
      Instance-2 message)[I-D.thubert-roll-asymlink].




Anamalamudi, et al.    Expires September 19, 2016              [Page 10]

Internet-Draft         draft-satish-tisch-AODV-RPL            March 2016


   - A-bit

      Asymmetric bit in the DIO base object (value of "A" bit for DIO-
      RREQ-Instance-2 is directly copied from "A" bit of DIO-RREQ-
      Instance-1 message).

   - MOP bit

      MOP operation in the DIO object MUST be set to "5(tbd)" by
      Destination for "AODV-RPL".

   - RPLInstanceID

      RPLInstanceID in the DIO object MUST be the InstanceID of
      Instance-2.

   - DODAGID

      DODAGID in the DIO object MUST be the IPv6 address of the
      Destination that initiates the DIO-RREQ message of Instance-2.

   - Rank

      Rank in the DIO object MUST be the the rank of Instance-2.

   - Metric Container Options

      DIO-RREQ-Instance-2 message from Destination MAY carry one or more
      Metric Container options to specify the relevant routing metrics.

   - Destination address

      IPv6 address of the Source that receives DIO-RREQ-Instance-2
      message.  This address MUST be in the modified RREQ option (see
      Figure 3) of AODV [RFC3561].

   - G bit

      G(Gratuitous RREP flag) bit is set to "1" when Destination has
      Source Sequence number.  When an Intermediate node has a route
      towards Source with higher Source Sequence number then Gratuitous
      DIO-RREP messages are unicast from Intermediate node to Source.
      Note that Intermediate nodes never reply unicast DIO-RREP messages
      back to Destination in Instance-2.

   - J bit

      Derived from [RFC3561].Out of scope for this specification.



Anamalamudi, et al.    Expires September 19, 2016              [Page 11]

Internet-Draft         draft-satish-tisch-AODV-RPL            March 2016


   - R bit

      Derived from [RFC3561].Out of scope for this specification.

   - D bit

      Derived from [RFC3561].Out of scope for this specification.

   - U bit

      Derived from [RFC3561].Out of scope for this specification.

   The Destination in Figure 2 start to multicast the DIO-RREQ-
   Instance-2 message when the received "A" bit in DIO-RREQ-Instance-1
   is set to 1.  Intermediate nodes will create the routing tables for
   the path towards the Destination during DIO-RREQ-Instance-2 messages
   to Source.  If the intermediate nodes have path towards the Source,
   then it unicast the Gratuitous DIO-RREP towards the Source and
   creates the path towards Destination for Instance-2.  Once the route
   control message is reached to Source, it will start transmitting the
   application data packets to the Destination in the path that is
   discovered through DIO-RREQ-Instance-2 messages.  Similarly,
   application data from Destination to Source is transmitted through
   the path that is discovered from DIO-RREQ-Instance-1 message.

   The Destination in Figure 2 start to unicast the DIO-RREQ-Instance-2
   message when the received "A" bit in DIO-RREQ-Instance-1 is set to 0.
   In this case, route control messages and application data in between
   Source and Destination for both Instance-1 and Instance-2 are
   transmitted in symmetrical links.

5.  Resource reservation for P2P Communication at 6TOP

   Whenever, Source has data to destination it runs the Bandwidth
   Estimation Algorithm (BEA)[I-D.dujovne-6tisch-6top-sf0] to estimate
   the application bandwidth requirement and map it to required number
   of cells.  Subsequently, 6P ADD Request
   [I-D.wang-6tisch-6top-sublayer] is appended to the DIO-RREQ-
   Instance-1 with NumCells equal to application bandwidth requirement
   that is known through BEA.  It is noteworthy that CellList
   (slotoffset, channeloffset) and Container information in 6P ADD
   Request is set to zero during DIO-RREQ-Instance-1 multicast from
   Source.  Once the DIO-RREQ-Instance-1 with 6P ADD Request is reached
   to intermediate node, it checks the NumCells field.  When an
   Intermediate node is able to allocate its transmit and receive cells
   that are equal to NumCells of 6P ADD Request, then it is eligible to
   re-multicast the DIO-RREQ-Instance-1 with 6P ADD Request.  At this
   point, link nature (Symmetrical or Asymmetrical) is decided by



Anamalamudi, et al.    Expires September 19, 2016              [Page 12]

Internet-Draft         draft-satish-tisch-AODV-RPL            March 2016


   Intermediate node based on the available resources (cells).  If an
   Intermediate node has transmit and receive cells for both directions
   that are greater than or equal to NumCells of 6P ADD Request then 'A'
   bit is remain to set to '0'.  If an intermediate node has cells
   available only for one direction (Destination to Source) then 'A' bit
   is set to '1' and it re-multicast the DIO-RREQ-Instance-1.  Whenever,
   the intermediate node has Destination Sequence number that is greater
   than Sequence number specified in modified-RREQ then Gratuitous-RREP
   is unicast with 6P ADD Request.  It is assumed that Intermediate
   nodes who know the path towards the Destination must be able to
   allocate both transmit and receive cells that are specified in
   NumCells to either single direction (Asymmetric) or both directions
   (Symmetric).  Once the DIO-RREQ-Instance-1 with 6P ADD Request
   reaches to the Destination, it checks the 'A' bit to reply the DIO-
   RREQ_Instance-2 messages.

   For Asymmetrical links(A=1) to Instance-1, it is notable that Source
   will allocate only receive cells, Destination will allocate only
   transmit cells and Intermediate nodes that multicast route control
   messages will allocate both transmit and receive cells to perform
   data transmission from Destination to Source in Instance-1.

   For asymmetrical links (A=1) to Instance-2, Destination will estimate
   the application bandwidth requirement through BEA and map it to
   Numcell for DIO-RREQ-Instance-2.  It is noteworthy that
   CellList(slotoffset, channeloffset) and Container information in 6P
   ADD Request is set to zero during DIO-RREQ-Instance-2 multicast from
   Destination.  Intermediate nodes that are able to allocate it's both
   transmit and receive cells of Numcell in 6P ADD Request will re-
   multicast the DIO-RREQ-Instance-2 with 6P ADD Request until it
   reaches to Source.  In this case, 'A' bit is always set to '1'.  From
   this operation, it is notable that Source will allocate only transmit
   cells, Destination will allocate only receive cells and Intermediate
   nodes that multicast route control messages will allocate both
   transmit and receive cells to perform data transmission from Source
   to Destination in Instance-2.

   Once the Source know the path towards the Destination in Instance-2,
   it performs the actual 6P negotiation (6P ADD Request, 6P ADD
   Response) [I-D.wang-6tisch-6top-sublayer] to request and allocates
   the CellList (slotoffset, channeloffset) hop-by-hop for actual data
   transmission.  Similarly, Destination will perform 6P negotiation (6P
   ADD Request, 6P ADD Response) [I-D.wang-6tisch-6top-sublayer] to
   request and allocate the CellList(slotoffset, channeloffset) hop-by-
   hop towards Source in Instance-1 for data transmission.  The
   cells(bundle) allocated for end-to-end path in Instance-1 is
   associated with one TrackID and the cells allocated for end-to-end
   path in Instance-2 is associated with another TrackID.



Anamalamudi, et al.    Expires September 19, 2016              [Page 13]

Internet-Draft         draft-satish-tisch-AODV-RPL            March 2016


   For asymmetrical links (A=1), allocation of transmit-receive cells
   for Instance-1 and allocation of transmit-receive cells for
   Instance-2 will be in different paths.

   For symmetrical links (A=0), Source and Destination will use same
   path for both Instance-1 and Instance-2 to transmit data.  Hence,
   allocation of transmit-receive cells for Instance-1 and allocation of
   transmit-receive cells for Instance-2 need to be in same path.

   With AODV-RPL, the address vector is not required and resource
   reservation (cell allocation) is on-demand during reactive route-
   discovery.  This efficiently utilizes the control packet size and
   radio resources that is most significant in 6tisch networks.

5.1.  Operation of Trickle TImer

   The operation of Trickle timer to control DIO-RREQ-Instance 1/
   Instance-2 message is similar to P2P-RPL Trickle operation [RFC6997].

6.  IANA Considerations

6.1.  Additions to Mode of Operation

   IANA is required to assign a new Mode of Operation, named "AODV-RPL"
   for Point-to-Point(P2P) hop-by-hop routing under the RPL registry.
   The value of tbd1 is assigned from the "Mode of Operation" space
   [RFC6550].

            +-------------+---------------+---------------+
            |    Value    |  Description  |   Reference   |
            +-------------+---------------+---------------+
            |    tbd1(5)  |   AODV-RPL    | This document |
            +-------------+---------------+---------------+

                        Figure 5: Mode of Operation

6.2.  Additions to RPL Control Message Options

   IANA is require to assign two entries for a new RPL options: "DIO-
   RREQ-Instance-1" and "DIO-RREQ-Instance-1" values of tbd2 (0x0a) and
   tbd3(0x0b) from the "RPL Control Message Options" space [RFC6550].










Anamalamudi, et al.    Expires September 19, 2016              [Page 14]

Internet-Draft         draft-satish-tisch-AODV-RPL            March 2016


             +-------------+----------------------+---------------+
             |     Value   |        Meaning       |   Reference   |
             +-------------+----------------------+---------------+
             |  tbd2(0x0a) | DIO-RREQ-Instance-1  | This document |
             +-------------+----------------------+---------------+
             |  tbd3(0x0b) | DIO-RREQ-Instance-2  | This document |
             +-------------+----------------------+---------------+

                   Figure 6: RPL Control Message Options

7.  Security Considerations

   This document does not introduce additional security issues to
   [RFC6550].  For general RPL security considerations, see [RFC6550].

8.  References

8.1.  References

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119,
              DOI 10.17487/RFC2119, March 1997,
              <http://www.rfc-editor.org/info/rfc2119>.

   [RFC3561]  Perkins, C., Belding-Royer, E., and S. Das, "Ad hoc On-
              Demand Distance Vector (AODV) Routing", RFC 3561,
              DOI 10.17487/RFC3561, July 2003,
              <http://www.rfc-editor.org/info/rfc3561>.

   [RFC5548]  Dohler, M., Ed., Watteyne, T., Ed., Winter, T., Ed., and
              D. Barthel, Ed., "Routing Requirements for Urban Low-Power
              and Lossy Networks", RFC 5548, DOI 10.17487/RFC5548, May
              2009, <http://www.rfc-editor.org/info/rfc5548>.

   [RFC5673]  Pister, K., Ed., Thubert, P., Ed., Dwars, S., and T.
              Phinney, "Industrial Routing Requirements in Low-Power and
              Lossy Networks", RFC 5673, DOI 10.17487/RFC5673, October
              2009, <http://www.rfc-editor.org/info/rfc5673>.

   [RFC5826]  Brandt, A., Buron, J., and G. Porcu, "Home Automation
              Routing Requirements in Low-Power and Lossy Networks",
              RFC 5826, DOI 10.17487/RFC5826, April 2010,
              <http://www.rfc-editor.org/info/rfc5826>.

   [RFC5867]  Martocci, J., Ed., De Mil, P., Riou, N., and W. Vermeylen,
              "Building Automation Routing Requirements in Low-Power and
              Lossy Networks", RFC 5867, DOI 10.17487/RFC5867, June
              2010, <http://www.rfc-editor.org/info/rfc5867>.



Anamalamudi, et al.    Expires September 19, 2016              [Page 15]

Internet-Draft         draft-satish-tisch-AODV-RPL            March 2016


   [RFC6550]  Winter, T., Ed., Thubert, P., Ed., Brandt, A., Hui, J.,
              Kelsey, R., Levis, P., Pister, K., Struik, R., Vasseur,
              JP., and R. Alexander, "RPL: IPv6 Routing Protocol for
              Low-Power and Lossy Networks", RFC 6550,
              DOI 10.17487/RFC6550, March 2012,
              <http://www.rfc-editor.org/info/rfc6550>.

   [RFC6552]  Thubert, P., Ed., "Objective Function Zero for the Routing
              Protocol for Low-Power and Lossy Networks (RPL)",
              RFC 6552, DOI 10.17487/RFC6552, March 2012,
              <http://www.rfc-editor.org/info/rfc6552>.

   [RFC6997]  Goyal, M., Ed., Baccelli, E., Philipp, M., Brandt, A., and
              J. Martocci, "Reactive Discovery of Point-to-Point Routes
              in Low-Power and Lossy Networks", RFC 6997,
              DOI 10.17487/RFC6997, August 2013,
              <http://www.rfc-editor.org/info/rfc6997>.

   [RFC6998]  Goyal, M., Ed., Baccelli, E., Brandt, A., and J. Martocci,
              "A Mechanism to Measure the Routing Metrics along a Point-
              to-Point Route in a Low-Power and Lossy Network",
              RFC 6998, DOI 10.17487/RFC6998, August 2013,
              <http://www.rfc-editor.org/info/rfc6998>.

8.2.  Informative References

   [I-D.dujovne-6tisch-6top-sf0]
              Dujovne, D., Grieco, L., Palattella, M., and N. Accettura,
              "6TiSCH 6top Scheduling Function Zero (SF0)", draft-
              dujovne-6tisch-6top-sf0-00 (work in progress), October
              2015.

   [I-D.grossman-detnet-use-cases]
              Grossman, E., Gunther, C., Thubert, P., Wetterwald, P.,
              Raymond, J., Korhonen, J., Kaneko, Y., Das, S., and Y.
              Zha, "Deterministic Networking Use Cases", draft-grossman-
              detnet-use-cases-01 (work in progress), November 2015.

   [I-D.ietf-6tisch-minimal]
              Vilajosana, X. and K. Pister, "Minimal 6TiSCH
              Configuration", draft-ietf-6tisch-minimal-15 (work in
              progress), February 2016.

   [I-D.thubert-roll-asymlink]
              Thubert, P., "RPL adaptation for asymmetrical links",
              draft-thubert-roll-asymlink-02 (work in progress),
              December 2011.




Anamalamudi, et al.    Expires September 19, 2016              [Page 16]

Internet-Draft         draft-satish-tisch-AODV-RPL            March 2016


   [I-D.wang-6tisch-6top-sublayer]
              Wang, Q. and X. Vilajosana, "6TiSCH Operation Sublayer
              (6top)", draft-wang-6tisch-6top-sublayer-04 (work in
              progress), November 2015.

Authors' Addresses

   Satish Anamalamudi
   Huawei Technologies
   No. 156 Beiqing Rd. Haidian District
   Beijing  100095
   China

   Email: satish.anamalamudi@huawei.com


   Mingui Zhang
   Huawei Technologies
   No. 156 Beiqing Rd. Haidian District
   Beijing  100095
   China

   Email: zhangmingui@huawei.com


   Charles E. Perkins
   Futurewei
   2330 Central Expressway
   Santa Clara  95050
   Unites States

   Email: charliep@computer.org


   Dongxin Liu
   China Telcom Co., Ltd
   109 West Zhongshan Ave, Tianhe District
   Guangzhou  510630
   China

   Email: liudx@gsta.com










Anamalamudi, et al.    Expires September 19, 2016              [Page 17]

Internet-Draft         draft-satish-tisch-AODV-RPL            March 2016


   S.V.R Anand
   Indian Institute of Science
   Bangalore
   560012
   India

   Email: anand@ece.iisc.ernet.in












































Anamalamudi, et al.    Expires September 19, 2016              [Page 18]