Internet DRAFT - draft-wei-roll-scheduling-routing

draft-wei-roll-scheduling-routing



ROLL                                                             M. Wei
Internet Draft                                                   H. Wang
Interned status: Standards Track                                 P. Wang
Expires: October 15, 2013                        Chongqing University of
                                            Posts and Telecommunications
                                                                 C. Zhou
                                                           Cisco Systems
                                                          April 15, 2013


   Industrial Deterministic Routing Extension for Low-Power and Lossy
                                Networks

                draft-wei-roll-scheduling-routing-02.txt



Abstract


   Low power and Lossy Networks (LLNs) have unique characteristics
   compared with traditional wired and ad-hoc networks. Deterministic
   networks is specified in IEEE 802.15.4e which is for deterministic
   applications in the industrial environment. Some routing metrics
   and constraints has been described in [RFC6551],[RFC5867] [RFC5826],
   [RFC5673], and [RFC5548]. There are several special characteristics
   and requirements in the industrial environment. This document
   defines a new Link Metric/Constraint Object-Scheduling Waiting
   Time to make RPL support deterministic scheduling mechanism, which
   could improve the determinacy and reliability of the LLNs in
   industrial environment.


Status of this Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.


   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document. Please review these documents
   carefully, as they describe your rights and restrictions with
   respect to this document.






Wei, et al.            Expires Oct. 15, 2013                 [Page 1]

Internet-Draft draft-ietf-roll-scheduling-routing-02 Apirl 2013


   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-Drafts.

   The list of current Internet-Drafts is at
   http://datatracker.ietf.org/drafts/current/.

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/1id-abstracts.html

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time. It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsolete by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html



This Internet-Draft will expire October 15, 2013.



Copyright Notice

   Copyright (c) 2012 IETF Trust and the persons identified as the
   document authors. All rights reserved.



   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document. Please review these documents carefully,
   as they describe your rights and restrictions with respect to this
   document.  Code Components extracted from this document must include
   Simplified BSD License text as described in Section 4.e of the Trust
   Legal Provisions and are provided without warranty as described in
   the Simplified BSD License.




Wei, et al.            Expires Oct. 15, 2013                 [Page 2]

Internet-Draft draft-ietf-roll-scheduling-routing-02 April 2013


Table of Contents

   1. Introduction ................................................ 3
      1.1. Terminology ............................................ 5
      1.2. Terms Used ............................................. 5
   2. Requirements ................................................ 6
   3. Object Formats .............................................. 7
   4. Scheduling Waiting Time Object .............................. 7
      4.1. Scheduling Waiting Time Description .....................7
      4.2. Mode of Operation ...................................... 8
   5. RPL instance with Scheduling Waiting Time object .............9
   6. Security Considerations .................................... 12
   7. IANA Considerations ........................................ 13
   8. References ................................................. 14
      8.1. Normative References................................... 14
      8.2. Informative References ................................ 14
      8.3. External Informative References ........................15
   Authors' Addresses .............................................17






1. Introduction

   This document makes use of the terminology defined in [ROLL-TERMS].

   Low-power and Lossy Networks (LLNs) consist largely of constrained
   nodes (with limited processing power, memory, and sometimes energy
   when they are battery operated or energy scavenging). Low-power and
   Lossy Networks (LLNs) have specific routing characteristics compared
   with traditional wired or ad hoc networks that have been spelled out
   in [RFC5548], [RFC5673], [RFC5826], and [RFC5867].

   IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) is
   specified in [RFC6550], which provides a mechanism whereby
   multipoint-to-point traffic from devices inside the LLN towards a
   central control point as well as point-to-multipoint traffic from the
   central control point to the devices inside the LLN are supported.
   The routing metrics and constraints are specified in [RFC6551], which
   provides a high degree of flexibility and a set of routing metrics
   and constraints. A variety of node constraints/metrics must be
   possible taken into account during path computation (see RFC[6551]).

   The routing metrics and constraints specified in [RFC6551] are not
   specific to any particular link layer. It is really an excellent


Wei, et al.            Expires Oct. 15, 2013                 [Page 3]

Internet-Draft draft-ietf-roll-scheduling-routing-02   April 2013


   design criterion that the independence between RPL and link layer.
   However, RPL is expected to be more suitable for industrial
   application. In industrial wireless application, cross-layer design
   needed to be considered to promote the performances of the
   determinism scheduling, which is not only related to link layer, but
   also affects the routing. This document focuses on the determinism
   applications, such as wireless industrial applications. In this case,
   the data link layer is designed based on the determinism scheduling
   mechanism to meet the deterministic during communications. The main
   factor of influencing the communication latency is scheduling waiting
   time. The DLL cannot avoid influencing routing choice. The specific
   routing metrics and constraints should be considered to promote using
   RPL in the industrial deterministic application. Therefore, we design
   a new metrics and constraints, to make RPL support determinism
   scheduling applications.

   IEEE 802.15.4e specifies some specific application, such as Low
   latency deterministic networks (LLDN) and Timeslotted channel
   hopping (TSCH) which are organized as a star topologies as well as
   partial or full mesh topologies with a superframe structure and using
   low latency frames. In this document, we will discuss how to use RPL
   with Object-Scheduling Time in IEEE 802.15.4e networks. The network
   coordinator of a low latency network indicates the existence of such
   a low latency network by periodically sending low latency-beacons.
   Allocating a dedicated time slot for each device provides a
   deterministic system. The IEEE 802.15.4 DSSS coding together with
   the exclusive channel access for each device ensures high reliability
   of the system. Small time slots and short packets lead to superframes
   as small as 10ms, which provides a latency of less than 10ms and a
   low round trip time. The number of slots in a superframe determines
   the number of devices that can access each channel.

   Determinism is one of the most important requirements in industrial
   application. It has two meanings, one is the deterministic during
   single-hop communication, and the other is the deterministic during
   multi-hop  communication.  The  deterministic  during  single-hop
   communication is guaranteed by the determinism scheduling mechanism.
   The determinism scheduling mechanism makes certain nodes communicate
   in certain slot. The determinism during multi-hop communication is
   guaranteed by routing. Routing could ensure the whole scheduling time
   during the path inside the constraint of users.

   This document specifies Object-Scheduling Waiting Time as the routing
   metrics and constraints to be used in path calculation for Low
   Latency Deterministic Networks.

   The new metrics and constraints we define in this document could be
   advertised as a metric to optimize the computed path and as a


Wei, et al.            Expires . 15, 2013                 [Page 4]

Internet-Draft draft-ietf-roll-scheduling-routing-02   April 2013


   constraint. It could be used as one of the multi-metrics and work
   with the others. When using a dynamic routing metric in LLND, a RPL
   implementation should use multi-threshold schemes to void spurious
   and unnecessary routing changes. For the object format structure, the
   additional field is not added. The reserved bit is used. However, the
   new object needs to be transmitted during the networking stage, which
   in fact needs extra overhead of 4 bytes. While the network scheduling
   information changes, we need re-send a new value. Otherwise, if
   network scheduling information does not change, there is no need to
   send new value.

   It must be noted that the superframe structure has been decided during
   the networking period in IEEE 802.15.4e networks. We assume the
   superframe structure has been known for each node.

   Note that the deterministic system is based on global synchronization.
   Time synchronization is very crucial in industrial wireless
   applications. Usually some special mechanisms and protocols are
   designed and implemented to ensure time synchronization. This
   document focuses on determinism routing. The determinism routing
   metrics and constraints specified in this document are not specific
   to any particular synchronization mechanism.



1.1. Terminology

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
   "OPTIONAL" in this document are to be interpreted as described in
   [RFC2119].

1.2. Terms Used

   MAC:     Medium Access Control

   CSMA/CA: Carrier Sense Multiple Access/Collision Avoidance

   TDMA:    Time Division Multiple Address

   GTS:     Guaranteed Time Slot

   Safety:   It means the system's safety of industrial environment,
   including the safety of devices and human safety.

   Security:  It means the specific security mechanism or security
   algorithm.


Wei, et al.            Expires Oct. 15, 2013                 [Page 5]

Internet-Draft draft-ietf-roll-scheduling-routing-02   April 2013


   Scheduling waiting time: The time is used to for a node have to wait
   to send data to a special node in a period. When the MAC layer
   schedules the slot time and channel resources of network with TDMA
   mechanism, every node get send slots and receive slots. In this
   case if node A wants to send data to node B, it have to send data in
   its send time slot, which is also the receive time slot of node B.
   The time from the start time of transmit period to the slot above
   mentioned is the scheduling waiting time from node A to node B. If
   the network supports broadcasting mechanism, when node A broadcast a
   messages in a slot, while the other nodes are just at their receive
   slots.

   Determinism:  It is usually meant that access to the control network
   by a node may be delayed, where t is known. In industrial wireless
   network, it also means that data is sent and received within the
   stipulated time.



2. Requirements

   Wireless system has been widely used in factory automation area for
   its low cost and availability. The requirements from the industrial
   environment for a routing protocol in Low power and Lossy Networks
   (LLNs) is analyzed in [RFC5673] based on IPv6 to power the next
   generation of control technology, such as traffic characteristics
   reliability requirements; device-aware routing requirements;
   broadcast/multicast requirements; protocol performance requirements;
   mobility requirements; manageability requirements; antagonistic
   requirements and so on.

   RPL has a lot of abilities to support the industrial environments,
   which includes:

     a)
        RPL coexists with optimized routes, for construction of initial
        suboptimal routes and for repair of optimized routes;

     b)
        RPL is adequate for non-production phases (unit startup and
        shutdown),   for   emergency   rerouting,   for   non-critical
        applications, for small plants;

     c)
        Mobile devices (e.g., cranes) may need RPL;

     d)
        When using a reference (optimize d) DODAG version from a
        centralized computer, RPL would provide local repair.



Wei, et al.            Expires Oct. 15, 2013                 [Page 6]

Internet-Draft draft-ietf-roll-scheduling-routing-02   Apirl 2013



   However, an emphasis is placed on the requirements to be met by
   deterministic  applications  with  regard  to  reliability  and
   availability. In this document, we will discuss the deterministic
   networks metrics and design the mechanism to use these metrics to
   optimize routing.



3. Object Formats

   Routing metrics and constraints are carried within the DAG Metric
   Container object defined in [RFC6550].The Routing Metric/Constraint
   objects represent a metric or a constraint of a particular type. They
   may appear in any order in the DAG Metric Container (specified in
   [RFC6550]). They have a common format consisting of one or more bytes
   with a common header. The Routing Metric/Constraint Object Generic
   Format has been defined in [RFC6551] as following.

     0                   1               2                   3
     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |Routing-MC-Type|Res Flags|P|C|O|R| A   |  Prec | Length (bytes)|
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |                                                               |
    //              (object body)                                  //
    |                                                               |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
          Figure 1 Routing Metric/Constraint Object Generic Format



4. Scheduling Waiting Time Object

4.1. Scheduling Waiting Time Description

   In this section, the Scheduling Waiting Time Object is defined to be
   attached to the Link Metric/Constraint Objects, used for supporting
   scheduling operations.

   Similar to Link Latency Object, the Scheduling Waiting Time of many
   LLN MAC sub-layers can vary over many orders of magnitude, again with
   a corresponding change in power consumption. The Scheduling Waiting
   Time Object is optional, and it is used based on user's requirement.

   The Scheduling Waiting Time object SHOULD be present in the DAG


Wei, et al.            Expires Oct. 15, 2013                 [Page 7]

Internet-Draft draft-ietf-roll-scheduling-routing-02 April 2013


   Metric Container. There MUST NOT be more than one Scheduling Waiting
   Time object as a constraint per DAG Metric Container, and there MUST
   NOT be more than one Scheduling Waiting Time object as a metric per
   DAG Metric Container.

   The Scheduling Time object is made of Scheduling Waiting Time sub-
   objects and MUST at least comprise one Scheduling Time sub-object.
   Each Scheduling Waiting Time sub-object has a fixed length of 4 bytes.

   The Scheduling Waiting Time object does not contain any additional
   TLVs.

   The Scheduling Waiting Time object Type is proposed to be set to 9 of
   the reserved symbols, which must be confirmed by IANA. The format of
   the Scheduling Waiting Time object body is as follows:

    0                   1
    0 1 2 3 4 5 6 7 8 9 0 1 2 3
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   | (sub-object) .....
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+

            Figure 2 Scheduling Waiting Time Object Body Format



     0                   1                   2                   3
     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |                        Scheduling Waiting Time                |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
                 Figure 3 Scheduling Waiting Time sub-object Format

   Scheduling Waiting Time: 32 bits. The Scheduling Time is encoded in
   32 bits in unsigned integer format, expressed in microseconds.

4.2. Mode of Operation

   The Scheduling Waiting Time may be used as a constraint or a path
   metric.

   For example, user may want the Scheduling Waiting Time not to exceed
   some value.  In this case, the Scheduling Waiting Time object common
   header indicates that the provided value relates to a constraint. In
   another example, the Scheduling Waiting Time object may be used as an
   aggregated additive metric where the value is updated along the path
   to reflect the path Scheduling Waiting Time.


Wei, et al.            Expires Oct. 15, 2013                [Page 8]

Internet-Draft draft-ietf-roll-scheduling-routing-02 April 2013




5. RPL instance with Scheduling Waiting Time object

   There is an instance to explain how to use Scheduling Waiting Time
   object to be as a metric and constraint. The topology of the network
   is show as Fig.4. D is root node.



               +---+
         +---  | D | -------+
         |     +---+        |
         |                  |
         |                  |
       +----+            +-----+
       |  E |            |  C  |
       +----+            +-----+
         |                  |
         |                  |
       +----+            +-----+
       | B  |  -------   |  A  |
       +----+            +-----+
                           Figure 4 RPL instance

   In the original RPL, DIO and DAO are used to construct and maintain
   these DODAGs. The Objective Function (OF) defines how RPL nodes
   select and optimize routes within a RPL instance. The OF defines how
   nodes translate one or more metrics and constraints, which are
   defined in [RFC6551], into a value called Rank, which approximates
   the node's distance from a DODAG root.

   There are two possible routings from A to D. We will discuss the
   situation deterministic system, in the case, Scheduling Waiting Time
   object could be used as the metric and constraint.  For example, it
   is noted that the MAC layer in industrial standards, including
   ISA100.11a, WirelessHART and WIA-PA standards, defines the slot time
   and channel resources of network with TDMA and ACA  Adaptive Channel
   Allocation  mechanism. In the following example, we define a
   timeslot as 10ms. Each node gets the all networks scheduling
   information during the network initialization by network manager.



Wei, et al.            Expires Oct. 15, 2013                 [Page 9]

Internet-Draft draft-ietf-roll-scheduling-routing-02 April 2013



 +-----------------------------------------------------------------+
 |    A->B   A->C B->A   C->A B->E   C->D E->B   E->D    D->E D->C |
 |   +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+ |
 |SF | Y |   | Y | Y |   | Y | Y |   | Y | Y |   | Y |   | Y | Y | |
 |   +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+ |
 |    A->B   A->C B->A    C->A                                     |
 |   +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+ |
 | A | Y |   | Y | Y |   | Y |   |   |   |   |   |   |   |   |   | |
 |   +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+ |
 |    A->B        B->A        B->E        E->B                     |
 |   +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+ |
 | B | Y |   |   | Y |   |   | Y |   |   | Y |   |   |   |   |   | |
 |   +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+ |
 |            A->C        C->A       C->D                    D->C  |
 |   +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+ |
 | C |   |   | Y |   |   | Y |   |   | Y |   |   |   |   |   | Y | |
 |   +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+ |
 |                                    C->D         E->D  D->E D->C |
 |   +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+ |
 | D |   |   |   |   |   |   |   |   | Y |   |   | Y |   | Y | Y | |
 |   +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+ |
 |                            B->E       E->B     E->D   D->E      |
 |   +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+ |
 | E |   |   |   |   |   |   | Y |   |   | Y |   | Y |   | Y |   | |
 |   +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+ |
 |                                                                 |
 |  Y----used slot; SF-- superframe                                |
 |                                                                 |
 +-----------------------------------------------------------------+


 Figure 5 A scheduling instance in a IEEE802.15.4 network



   As mentioned before, node A has two routes choices to send data to
   node D. In the case of deterministic system, each node has to receive
   or send data in a scheduled timeslots, which is decided by superframe.


   As shown in Fig.5, allocating a dedicated time slot for each
   device provides a deterministic system. There is a superframe, which
   is decided by the system manager. Small time slots and short packets
   lead to superframes as small as 10ms, which provides a latency of
   less than 10ms and a low round trip time. The number of slots in a


Wei, et al.            Expires Oct. 15, 2013                [Page 10]

Internet-Draft draft-ietf-roll-scheduling-routing-02   April 2013


   superframe determines the number of devices that can access each
   channel.

   There are 15 timeslots in the superframe, which has been allocated to
   each node. We define them as timeslot 1, timeslot 2 ... timeslot 15.



               +---+
         +---- | D | <------+
         |     +---+        |
         |                  |
         |                  |
       +----+            +-----+
       |  E |            |  C  |
       +----+            +-----+
          |                 ^
          |                 |
       +----+            +-----+
       |  B |  -------   |  A  |
       +----+            +-----+
                     Figure 6 The data flow from A-C-D

  The routing construct messages are advertised from node A. In the
  timeslot 1, node A could send data to node B. Then in the timeslot 3,
  node A could send data to node C. Therefore, the Scheduling Waiting
  Time from A to B is 10ms, as well as, the Scheduling Waiting Time
  from A to C is 30ms.



   As shown in Fig.6, when the message has been sent to node C from node
   A, node C forward the message to node D. In this deterministic system,
   if node C wants to send data to node D, it have to send data at
   timeslot 9 according to the superframe. Therefore the Scheduling
   Waiting Time from C to D is 60ms. Then the total schedule waiting
   time in the route A-C-D is 9 timeslots, which is equal to 90ms.











Wei, et al.            Expires Oct. 15, 2013                [Page 11]

Internet-Draft draft-ietf-roll-scheduling-routing-02   April 2013


               +---+
         +---> | D | -------+
         |     +---+        |
         |                  |
         |                  |
       +----+            +-----+
       |  E |            |  C  |
       +----+            +-----+
          ^                  |
          |                  |
       +----+            +-----+
       | B  |  <---      |  A  |
       +----+            +-----+


                    Figure 7 The data flow from A-B-E-D

   It is similar for the situation in the other side as shown in Fig.7.

   The Schedule Waiting Time from node A to node B is 10ms. Then the
   message has been forward to E, node B has to wait 60ms to get the
   send timeslot in timeslot 7. Then node E must wait 5 timeslots. When
   the message has been to node D, the total Schedule Waiting Time is
   120ms.

   The total Schedule Waiting Times of the different routes are
   different. There are about 3 timeslots delay could be optimized if we
   consider Schedule Waiting Time as a metric.

   It is similar to use the Schedule Waiting Time as a metric in
   construct downward routes.

   The Schedule Waiting Time may be used as a constraint also. When used
   as constraint, the Schedule Waiting Time object may be inserted in
   the DAG Metric Container to indicate that links with a specific Schedule
   Waiting Time should be included or excluded from the computed path.



6. Security Considerations

   This document has no requirement for a change to the security models
   within associated protocols.



Wei, et al.            Expires April 15, 2013                [Page 12]

Internet-Draft draft-ietf-roll-scheduling-routing-02 April 2013


7. IANA Considerations

   The definition of each field is defined in [RFC6551].
   In this document, the Scheduling Waiting Time Object follows the
   format. Considering several fields of this format is managed by IANA.
   We discuss the possibility of new registry for the new object.

   A new top-level registry, called "RPL Routing Metric/Constraint", has
   been established by IANA to contain all Routing Metric/Constraint
   objects codepoints and sub-registries.

   The allocation policy for each new registry is by IETF review: new
   values are assigned through the IETF review process (see [RFC5226]).
   Specifically, new assignments are made via RFCs approved by the IESG.
   Typically, the IESG will seek input on prospective assignments from
   appropriate persons (e.g., a relevant working group if one exists).

   New bit numbers may be allocated only by an IETF Review action.  Each
   bit should be tracked with the following qualities:

          1. Bit number

          2. Capability Description

          3. Defining RFC

   As shown in Fig.1, Routing Metric/Constraint object types has been
   defined by IANA as following, which range from 0 to 255.  Value 0 is
   unassigned.

              Value     Meaning                         Reference
                 1       Node State and Attribute        RFC6551
                 2       Node Energy                     RFC6551
                 3       Hop Count                       RFC6551
                 4       Link Throughput                 RFC6551
                 5       Link Latency                    RFC6551
                 6       Link Quality Level              RFC6551
                 7       Link ETX                        RFC6551
                 8       Link Color                      RFC6551
                 9     Scheduling Waiting Time          This document

   This document defines a new Scheduling Waiting Time Object for RPL to
   support scheduling mechanism and to meet the industrial requirement


Wei, et al.            Expires Oct. 15, 2013                [Page 13]

Internet-Draft draft-ietf-roll-scheduling-routing-02 April 2013


   of determinism. There we propose to choose 9 for the Link Scheduling
   Waiting Time.

8. References

 8.1. Normative References

   [KEYWORDS]    Bradner, S., "Key words for use in RFCs to Indicate

                 Requirement Levels", BCP 14, RFC 2119, March 1997.

   [RFC 4234]     Crocker, D. and Overell, P. (Editors), "Augmented BNF

                 for Syntax Specifications: ABNF", RFC 2234, Internet

                 Mail Consortium and Demon Internet Ltd., November 1997.

   [RFC 5673]     K. Pister, P. Thubert, S. Dwars, T. Phinney "Industrial

                 Routing Requirements in Low-Power and Lossy Networks",

                 October 2009.

   [RFC 5867]    J. Martocci, P. De Mil, N. Riou, W. Vermeylen "Building

                Automation Routing Requirements in Low-Power and Lossy

                Networks"  June 2010.

   [RFC 5826]    A. Brandt, J. Buron, G. Porcu, "Home Automation Routing

                Requirements in Low-Power and Lossy Networks", April,

                2010.

   [RFC 5548]    M. Dohler, T. Watteyne, T. Winter, D. Barthel "Routing

                Requirements for Urban Low-Power and Lossy Networks"

                May, 2009.

   [RFC 6206]    P. Levis, T. Clausen, J. Hui, O. Gnawali, J. Ko, "The

                 Trickle Algorithm", RFC 6206, March 2011.



    Wei, et al.            Expires April 15, 2013                [Page 14]






Wei, et al.            Expires Oct. 15, 2013                [Page 14]

Internet-Draft draft-ietf-roll-scheduling-routing-02 April 2013

   [RFC 6550]     T. Winter, P. Thubert, A. Brandt, J. Hui, R. Kelsey,

                 P. Levis, K. Pister, R. Struik, JP. Vasseur,

                 R. Alexander, "RPL: IPv6 Routing Protocol for

                 Low-Power and Lossy Networks", March 2012.

   [RFC 6551]     JP. Vasseur, M. Kim, K. Pister, N. Dejean, D. Barthel,

                 "Routing Metrics Used for Path Calculation in Low-

                 Power and Lossy Networks", March 2012.

   [RFC 6552]     P. Thubert, "Objective Function Zero for the Routing

                 Protocol for Low-Power and Lossy Networks (RPL)",

                 March 2012.

  [draft-palattella-6tsch-terminology-00]  MR. Palattella, P. Thubert,

                                           T. Watteyne, Q. Wang, "

                                           Terminology in IPv6 over

                                           Time Slotted Channel Hopping",

                                           March 10, 2013.

 [draft-thubert-6tsch-architecture-00]     P. Thubert, RA. Assimiti, T.

                                           Watteyne, "An Architecture

                                           for IPv6 over Time Synchronized

                                           Channel Hopping", March 11, 2013.






Wei, et al.            Expires April 15, 2013                [Page 15]


 [draft-wang-6tsch-6tus-00]                Q. Wang, X. Vilajosana,

                                           T. Watteyne, "6tus Adaptation

                                           Layer Specification", March 11,

                                           2013.

 [draft-watteyne-6tsch-tsch-lln-context-01] T.Watteyne, "Using IEEE802.15.4e

                                            TSCH in an LLN context: Overview,

                                            Problem Statement and Goals",

                                            February 21, 2013.


8.2. Informative References

   [I-D.wang-6lowpan-scheduling-00]  H. Wang, P. Wang, C. Zhou,

                                    "Transmission Scheduling of IPv6

                                    Packets over IEEE 802.15.4

                                    Networks--Extension for Industrial

                                    Application Space", draft-wang-

                                    6lowpan-scheduling-00 (work in

                                    progress), April 2012.



8.3. External Informative References



  [IEEE802.15.4e]           Ludwig Winkel, Zafer Sahinoglu, Liang Li,"

                            IEEE P802.15.4e/D0.01 Draft Standard for

                            Information technology-Telecommunications




Wei, et al.            Expires Oct. 15, 2013                [Page 16]

Internet-Draft draft-ietf-roll-scheduling-routing-02   Apirl 2013


			                and information exchange between systems

                            Local and metropolitan area networks-

                            Specific requirements-Part 15.4: Wireless

                            Medium Access Control (MAC) and Physical

                            Layer (PHY) Specifications for Low-Rate

                            Wireless Personal Area Networks (WPANs)

                            Amendment 1: Add MAC enhancements for

                            industrial applications and CWPAN"


   [IEC 62591]              HCF, WirelessHART Device Specification,

                            HCF_SPEC-290[S], Revision1.1. HART

                            Communication Foundation, May 2009.


   [IEC 62734]              Industrial communication networks - Wireless

                            communication network and communication

                            profiles - ISA 100.11a, 2012

   [IEC 62601]              Industrial communication networks-Fieldbus

                            specification-WIA-PA communication network

                            and communication profile. 2011.

9 . Acknowledgments

   Thanks to the authors of RFC 6550, RFC 6551 and RFC 6552. And, thanks
   to JP. Vasseur for giving some comments for this document. And, thanks
   to experts who were giving some comments for this document.And, thanks
   to Wang Na and Pu Chenggen editing of this document. This document
   was prepared using 2-Word-v2.0.template.dot.















Wei, et al.            Expires Oct. 15, 2013                [Page 17]

Internet-Draft draft-ietf-roll-scheduling-routing-02   April 2013


Authors' Addresses



       Min Wei
       Chongqing University of Posts and Telecommunications
       2 Chongwen Road,
       Chongqing, 400065, China

       Phone: (86) -13452333003
       EMail: weimin@cqupt.edu.cn


       Heng Wang
       Chongqing University of Posts and Telecommunications
       Administrative Building, Chongqing University of Posts and
       Telecommunications
       Chongqing, 400065
       China

       Phone: (86) -23- 6248- 7845
       Email: wangheng@cqupt.edu.cn


       Ping Wang
       Chongqing University of Posts and Telecommunications
       Administrative Building, Chongqing University of Posts and
       Telecommunications
       Chongqing, 400065
       China

       Phone: (86) -23- 6246- 1061
       Email: wangping@cqupt.edu.cn


       Chao Zhou
       Cisco Systems (China)
       Research and Development Co., Ltd.
       8Floor, Xinsi Mansion
       926 Yinshan Lu, Caohejing Hi-Tech Park,
       Shanghai, 200233
       China

       Phone: (86) -21- 2407- 3419
       Email: czhou@cisco.com