Internet DRAFT - draft-roux-roll-mpl-eval
draft-roux-roll-mpl-eval
Network Working Group P. Roux
Internet-Draft A. Petrescu
Intended status: Experimental M. Kellil
Expires: April 24, 2014 CEA
October 21, 2013
Preliminary results about MPL performance evaluation
draft-roux-roll-mpl-eval-00.txt
Abstract
This draft presents simulation work and first results related to MPL
performance evaluation. The simulation makes it possible to evaluate
MPL performances in the context of a large network. The simulated
network introduces 500 nodes. The general principles of the
simulator are described. Then reference settings are introduced, and
evaluation indicators are proposed. Finally preliminary results are
presented under the form of a few tables, that show the proposed
indicator values depending on some specific parameter which is used
as a variable argument. Among various results, the advantage of
using reactive mode for MPL is shown in terms of the capability to
maintain loss free diffusion in harsh radio conditions.
Status of this Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on April 24, 2014.
Copyright Notice
Copyright (c) 2013 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
Roux, et al. Expires April 24, 2014 [Page 1]
Internet-Draft mpl-eval October 2013
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3
3. Simulated Network Layout . . . . . . . . . . . . . . . . . . . 3
4. Simulator Principle . . . . . . . . . . . . . . . . . . . . . 4
5. Radio Simulation Aspects . . . . . . . . . . . . . . . . . . . 4
6. Simulation Conditions . . . . . . . . . . . . . . . . . . . . 5
7. Types of Results . . . . . . . . . . . . . . . . . . . . . . . 6
7.1. Preliminary Results with Respect to Achievable Data
Rate . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
7.2. Preliminary results with respect to the influence of
redundancy constants . . . . . . . . . . . . . . . . . . . 8
7.3. Preliminary results with respect to the influence of
transmit poser . . . . . . . . . . . . . . . . . . . . . . 9
8. Security Considerations . . . . . . . . . . . . . . . . . . . 10
9. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 10
10. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 10
11. Normative References . . . . . . . . . . . . . . . . . . . . . 10
Appendix A. ChangeLog . . . . . . . . . . . . . . . . . . . . . . 10
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 10
Roux, et al. Expires April 24, 2014 [Page 2]
Internet-Draft mpl-eval October 2013
1. Introduction
The RPL protocol is an IPv6 protocol for low-power and lossy
networks, defined in [RFC6550].
The [I-D.ietf-roll-trickle-mcast] draft introduces the so called MPL
algorithm, with a lot of freedom in terms of possible configuration.
The current draft is a preliminary attempt to provide guidance for
finding good algorithm settings for MPL.
Simulation makes it possible to address algorithmic capabilities in
terms of scalability. A network made of 500 nodes is considered in
this document. The proposed objective is to assess performance of
the MPL protocol in such large networks, and to compare various MPL
settings, in order to understand their influence on performances, so
that setting guidelines may be derived.
However, the presented results are still not mature enough to propose
solid and motivated guidelines. This draft should be considered as a
preliminary attempt in this direction. Depending on the feedback, a
more complete set of results may be presented in the coming months.
2. Terminology
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 [RFC2119].
3. Simulated Network Layout
A reference network layout has been assumed for all simulations. It
is composed of 500 nodes randomly distributed within a rectangular
area, excluding a void sub-area in its center, as shown in Figure 1.
The main area width is 20 km and the height is 10 km. The void sub-
area is 2 km and its height is 5 km. The layout is built by dropping
nodes randomly in the main area. Once a potential node has been
dropped at a random location in the main area, it is retained only if
it is not located in the void sub-area, and if its closest neighbour
among previously defined nodes, is not closer than 20 meters. This
process continues until 500 nodes has been retained in the area.
Then the closest node to the point of coordinates (x=2km,y=5km) is
selected as the seed node.
Roux, et al. Expires April 24, 2014 [Page 3]
Internet-Draft mpl-eval October 2013
+----------------------------------------+
| |
| +-----+ |
| |void | 500 nodes, |
| o seed |sub | random |
| |area | locations |
| | | |
| +-----+ |
| |
+----------------------------------------+
4. Simulator Principle
The simulator elementary time step has been set in such a way that it
takes 4 elementary steps for a sender to send the longest messages,
which are supposed not to exceed 128 bytes. The simulator doesn't
address anything below this time step. As an example the simulator
doesn't actually fill messages with bits.
At each elementary step, the simulator spans each node in the network
several times in order to:
o Check data trickle timers and control trickle timer (if one
exists).
o Treat incoming messages.
o Take care of (data or control) message transmission (start,
continue or complete a message transmission).
5. Radio Simulation Aspects
As said above, only a fragment of a message can be transmitted during
an elementary time step of the simulator. The term of fragment, as
used in this document, refers to the part of a message which can be
transmitted during an elementary simulator step time.
The radio coverage radius if set to 100m, which means that beyond
this distance, no fragment can be transmitted between 2 nodes. Below
this distance, there is a probability for a transmitted fragment to
be received which depends on the simulated power received at the
receiver.
The static attenuation in dB is assumed to be equal to 50 +
30.log10(d/50), with d in meters, which means that we assume 3 as the
Roux, et al. Expires April 24, 2014 [Page 4]
Internet-Draft mpl-eval October 2013
path loss exponent. A log normal shadowing with 3 dB as standard
deviation is added as a dynamical attenuation. Dynamical attenuation
spectrum is limited with a 3 Hz cut off frequency.
A fragment being sent may not be received (or corrupted) at the
receiver depending on a probability which is bound to the received
level at the receiver at the receiving time. A predefined table
defines the probability for a fragment to be received depending on
the received power.
For a message to be transmitted between a sender and a receiver it is
necessary that all segments involved in the message are received
uncorrupted. Otherwise, the message is assumed to be lost (because
of the UDP checksum mechanism, it is assumed that a message received
corrupted is also a non delivered UDP message). If any segment has
been lost then the message is lost as well.
Collisions are simulated as well: if a receiver receives fragments
from multiples neighbour nodes under its coverage, then a collision
may occur for the received fragment. For a message to be delivered,
it is necessary that no collision occurs on any fragment of this
message. A collision condition occurs if the received power from a
first neighbour is interfered with the received power from one or a
set of other neighbours which a total interfering power which is
equal at least to half the useful received power from the first
neighbour.
6. Simulation Conditions
When not explicitly stated, preliminary results are obtained with the
following parameter values:
Roux, et al. Expires April 24, 2014 [Page 5]
Internet-Draft mpl-eval October 2013
+-----------------------------------------+-------------------------+
| Parameter | Value |
+-----------------------------------------+-------------------------+
| Maximum number of messages in buffer | 10 |
| message set | |
| Seed message rate | 1 per each 4 seconds |
| | period |
| Number of messages sent during one | 200 |
| simulation | |
| DATA_MESSAGE_IMIN | 1.28 second (128 simul. |
| | steps) |
| DATA_MESSAGE_IMAX | 10 (max interval = 21 |
| | minutes) |
| DATA_MESSAGE_K | 1 |
| DATA_MESSAGE_TIMER_EXPIRATIONS | No expiration |
| CONTROL_MESSAGE_IMIN | 128 |
| CONTROL_MESSAGE_IMAX | 10 |
| CONTROL_MESSAGE_K | 1 |
| Transmission power | 5 mW |
+-----------------------------------------+-------------------------+
Default values assumed for simulation
Table 1
This set of default values should not be seen as a proposed
configuration which would be optimum in some sense. It is just meant
as a reference point to explore configuration space. A future
contribution may propose a more optimized reference configuration,
once systematic simulations will have been run.
7. Types of Results
The following performance indicators are exploited:
Roux, et al. Expires April 24, 2014 [Page 6]
Internet-Draft mpl-eval October 2013
+-------------+-----------------------------------------------------+
| Indicator | Explanation |
+-------------+-----------------------------------------------------+
| Proactive, | Data message loss ratio observed in each node after |
| or reactive | simulation, and averaged across all nodes in the |
| date loss | network. |
| ratio | |
| Proactive, | Total number of data messages transmitted from any |
| or reactive | node during simulation, divided by the number of |
| data | nodes in the network, and divided again by the |
| expansion | number of data messages sent from the seed. |
| Reactive | Total number of control messages transmitted from |
| control | any node during simulation, divided by the number |
| expansion | of nodes in the network, and divided again by the |
| | number of data messages sent from the seed. |
| Reactive | Sum of the reactive data expansion plus the |
| expansion | reactive control expansion |
+-------------+-----------------------------------------------------+
Performance indicators
Table 2
With respect to expansion figures, there is no claim about any
generic properties for the results which are presented in this
document. Given the present definitions, it is expected that the
denser is the network (in terms of average number of neighbours per
node) the lower expansions rates will be. Therefore expansion rates
are not only depending on the routing algorithmic aspects, they also
depend on the network layout. Their interest in the context of this
document is to compare different configuration settings, rather than
to obtain generic performance indicators.
Roux, et al. Expires April 24, 2014 [Page 7]
Internet-Draft mpl-eval October 2013
7.1. Preliminary Results with Respect to Achievable Data Rate
+---------------------------------------+------+------+------+------+
| Data message generation period at the | 0.5s | 1s | 2s | 4s |
| seed | | | | |
+---------------------------------------+------+------+------+------+
| Proactive data loss ratio | 0.38 | 0.15 | 0.03 | 0 |
| Proactive data expansion | 0.37 | 0.85 | 1.37 | 1.79 |
| Reactive data loss ratio | 0.38 | 0.2 | 0.02 | 0 |
| Reactive data expansion | 0.36 | 0.91 | 1.58 | 1.93 |
| Reactive control expansion | 0.1 | 0.22 | 0.44 | 0.72 |
| Reactive total expansion | 0.46 | 1.13 | 2.02 | 2.65 |
+---------------------------------------+------+------+------+------+
Preliminary results with respect to achievable data rates
Table 3
Table 3 provides results for several message rates at the seed. It
can be seen that a saturation phenomenon is observed (introducing
significant message loss ratios) when the message rate is too high.
Of course, this result is strongly related to the DATA_MESSAGE_IMIN
and CONTROL_MESSAGE_IMIN parameters, which have both been set in this
case to 1.28 s.
The other observation seems to be that the reactive mode introduces
more transmissions in the network (higher total expansion), with no
real benefit in terms of achievable message rate given the
constraints of negligible message loss ratios.
7.2. Preliminary results with respect to the influence of redundancy
constants
+--------------------------+------+------+-----+
| DATA_MESSAGE_K | 1 | 2 | 4 |
+--------------------------+------+------+-----+
| Proactive data expansion | 1.79 | 2.95 | 4.4 |
+--------------------------+------+------+-----+
Data expansion in proactive mode, versus redundancy constant
Table 4
Roux, et al. Expires April 24, 2014 [Page 8]
Internet-Draft mpl-eval October 2013
+----------------------------+------+------+------+
| DATA_MESSAGE_K | 1 | 2 | 4 |
+----------------------------+------+------+------+
| Reactive data expansion | 1.93 | 2.88 | 4.18 |
| Reactive control expansion | 0.72 | 0.7 | 0.72 |
| Reactive total expansion | 2.65 | 3.58 | 4.9 |
+----------------------------+------+------+------+
Data and control expansion in reactive mode, versus redundancy
constants
Table 5
Table 4 shows the effect of redundancy constant of trickle timers on
data expansion, in case of proactive mode. The other configuration
parameters are set as described in the simulation conditions section.
In particular, the message rate is 1 message for 4s, so that there
are not message losses in any simulation. With no surprise, it can
be observed that the redundancy constant has a strong influence on
expansion ratio.
Table 5 shows the same result with respect to proactive mode. It
shows that expansion figures are higher when reactive mode is used,
as compared to proactive mode. The influence of introducing vlues
that are different of 1 for CONTROL_MESSAGE_K will be studied later.
7.3. Preliminary results with respect to the influence of transmit
poser
+----------------------------+------+------+------+------+------+
| Tx power (mW) | 1 | 2 | 3 | 4 | 5 |
+----------------------------+------+------+------+------+------+
| Proactive data loss ratio | 0.56 | 0.14 | 0.03 | 0.01 | 0 |
| Proactive data expansion | 0.8 | 1.85 | 1.95 | 1.88 | 1.8 |
| Reactive data loss ratio | 0.4 | 0.07 | 0.01 | 0 | 0 |
| Reactive data expansion | 1.61 | 2.55 | 2.29 | 2.07 | 1.92 |
| Reactive control expansion | 0.68 | 0.88 | 0.81 | 0.76 | 0.72 |
| Reactive total expansion | 2.29 | 3.43 | 3.1 | 2.83 | 2.64 |
+----------------------------+------+------+------+------+------+
Results versus transmit power
Table 6
Table 6 shows the effect of varying the transmit power.
It shows the interest of using reactive mode has it is able to
achieve lower message loss ratios in harsh radio environments. Of
Roux, et al. Expires April 24, 2014 [Page 9]
Internet-Draft mpl-eval October 2013
course this result is obtained at the cost of higher expansion rates.
8. Security Considerations
9. IANA Considerations
10. Acknowledgements
This work has been supported by the A2NETS project (Autonomic
Services in M2M Networks) which is funded by the ITEA 2 program.
11. Normative References
[I-D.ietf-roll-trickle-mcast]
Hui, J. and R. Kelsey, "Multicast Protocol for Low power
and Lossy Networks (MPL)",
draft-ietf-roll-trickle-mcast-05 (work in progress),
August 2013.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
[RFC6550] Winter, T., Thubert, P., Brandt, A., Hui, J., Kelsey, R.,
Levis, P., Pister, K., Struik, R., Vasseur, JP., and R.
Alexander, "RPL: IPv6 Routing Protocol for Low-Power and
Lossy Networks", RFC 6550, March 2012.
Appendix A. ChangeLog
The changes are listed in reverse chronological order, most recent
changes appearing at the top of the list.
From draft-roux-roll-mpl-eval-00.txt to
draft-authors-ipv6-over-80211p-00.txt:
o first version.
Roux, et al. Expires April 24, 2014 [Page 10]
Internet-Draft mpl-eval October 2013
Authors' Addresses
Pierre Roux
CEA
http://www.cea.fr,
France
Phone:
Email: Pierre.Roux@cea.fr
Alexandru Petrescu
CEA
http://www.cea.fr,
France
Phone:
Email: Alexandru.Petrescu@cea.fr
Mounir Kellil
CEA
http://www.cea.fr,
France
Phone:
Email: Mounir.Kellil@cea.fr
Roux, et al. Expires April 24, 2014 [Page 11]