Internet DRAFT - draft-wang-6lowpan-scheduling
draft-wang-6lowpan-scheduling
6LoWPAN Working Group H. Wang
Internet Draft P. Wang
Interned status: Standards Track Chongqing University of
Expires: October 21, 2012 Posts and Telecommunications
C. Zhou
Cisco Systems
April 20, 2012
Transmission Scheduling of IPv6 Packets over IEEE 802.15.4 Networks-- -
Extension for Industrial Application Space
draft-wang-6lowpan-scheduling-00.txt
Status of this Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six
months and may be updated, replaced, or obsoleted by other documents
at any time. It is inappropriate to use Internet-Drafts as
reference material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html
This Internet-Draft will expire on mouth date year.
Copyright Notice
Copyright (c) 2012 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with
respect to this document. Code Components extracted from this
document must include Simplified BSD License text as described in
Wang, et al. Expires October 21, 2012 [Page 1]
Internet-Draft draft-wang-6lowpan-scheduling-00 April 2012
Section 4.e of the Trust Legal Provisions and are provided without
warranty as described in the Simplified BSD License.
Abstract
These years, wireless technologies, including the application of
6LoWPAN protocol, are more and more been applied in industrial
environment to improve productivity and safety of the plants. In
spite of the fact that [RFC4944] has introduced the methods of
transmitting IPv6 packets over IEEE 802.15.4 networks, industrial
automation field, either process automation or factory automation,
has its special characteristics and requirements. If 6LoWPAN is been
used in industrial environment, some change SHOULD be made in the
adaption layer. This document defines a Scheduling Header, to make
the adaption layer meet the requirements of industrial scheduling for
transmission of IPv6 packets over IEEE 802.15.4 networks.
Additionally, this document also provides an application example of
Scheduling Header.
Table of Contents
1. Introduction ................................................ 2
1.1. Requirements Notation .................................. 4
1.2. Terms Uesd ............................................. 4
2. Scheduling Header ........................................... 5
2.1. Scheduling dispatch and IPv6 header stack .............. 5
2.2. Scheduling Header ...................................... 6
3. An example using Scheduling Header .......................... 7
3.1. Route Discovery......................................... 7
3.2. Route Maintenance ..................................... 12
4. IANA Considerations ........................................ 12
5. Security Considerations .................................... 12
6. Conclusions ................................................ 13
7. References ................................................. 13
7.1. Normative References .................................. 13
7.2. Informative References ................................ 13
7.3. External Informative References ....................... 13
8. Acknowledgments ............................................ 14
1. Introduction
Wireless technology has been demonstrated as an effective option for
industrial applications. For convenient and fast deployment in a
global world, it has attracted huge attention to introduce IPv6
technology to wireless industrial networks. But in the industrial
environment, especially the environments (eg. a coal mine) with high
Wang, et al. Expires October 21, 2012 [Page 2]
Internet-Draft draft-wang-6lowpan-scheduling-00 April 2012
risk and low bandwidth, the resources are too limited. Which MUST be
scheduled properly to ensure every significant thing be done in its
specific time and channel and to ensure the safety and reliability.
It is worth mentioning that the MAC layers of some industrial
standards, [ISA100.11a]/[Wireless Hart]/[WIA-PA] standards, schedule
the slot time and channel resources of network with TDMA and ACA
Adaptive Channel Allocation mechanism. Through the investigation
of the data features and the application class of wireless
industrial applications, a conclusion can be draw that the important
requirements for wireless industrial networks are:
* Determinism
* Reliability
* Real time
* Security
* Synchronization
However, the adaption layer of 6LoWPAN defined in RFC 4944 is mainly
based on contention access and best effort delivery. It does not
make special optimization for industrial applications. To meet above
requirements, it is recommended to improve the design of the
adaption layer for transmission of IPv6 packets.
ISA100.11a adopts 6LoWPAN as its network layer, but the function of
6LoWPAN in is limited. For example, the operations of scheduling and
routing in the wireless subnet are performed by upper data link
layer of ISA100.11a rather than network layer. Moreover, ISA100.11a
is an integrated solution for industrial control net, including
system manager, gateway, provisioning and a series of new protocols
for every layer except physical layer. 6LoWPAN is just a part of
ISA100.11a system. For simple or lightweight industrial applications
which want to use IPv6 technology, the ISA100.11a has too much
overhead to deploy. Thus, it is attractive to add direct support
mechanism for industrial applications in 6LoWPAN. Industrial users
will benefit from more choices for different kinds of applications.
Consequently, it's hoped that 6LoWPAN supports the schedule
mechanism, and to be more suitable for industrial application. In
this case, the MAC layer is based on slot time, while the upper
layer, called the adaption layer, is based on non-slot. Therefore,
it is necessary to improve the frame format of the adaptation layer,
to make it support scheduling operations.
Wang, et al. Expires October 21, 2012 [Page 3]
Internet-Draft draft-wang-6lowpan-scheduling-00 April 2012
As a result, this document improves the frame format of the
adaptation and defines a scheduling header. In addition, this
document also introduces an application example of the Scheduling
Header.
1.1. Requirements Notation
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119]
1.2. Terms Uesd
MAC: Medium Access Control
Industrial Wireless Standard: At present, there are three main
industrial wireless standards, ISA100.11a, WirelessHART, and WIA-PA.
ISA: ''International Society of Automation''. ISA is an ANSI
accredited standards-making society. ISA100 is an ISA committee
whose charter includes defining a family of standards for industrial
automation. [ISA100.11a] is a working group within ISA100 that is
working on a standard for monitoring and non-critical process
control applications.
HART: ''Highway Addressable Remote Transducer'', a group of
specifications for industrial process and control devices
administered by the HART Foundation. The specifications include the
additions for Wireless HART.
WIA-PA: ''Wireless Networks for Industrial Automation-Process
Automation'', a Chinese industrial wireless specification, is passed
by 96% of IEC(International Electrotechnical Commission) members,
and formally released as IEC/PAS 62601 standard document.
CSMA/CA: Carrier Sense Multiple Access / Collision Avoidance
TDMA: Time Division Multiple Address
GTS: Guaranteed Time Slot
Safety: It means the system's safety of industrial environment,
including the safety of devices and human safety.
Security: It means the specific security mechanism or security
algorithm.
Wang, et al. Expires October 21, 2012 [Page 4]
Internet-Draft draft-wang-6lowpan-scheduling-00 April 2012
Scheduling time: It means the time a node must to wait between the
time it wanted to send data or received data and the moment it send
data to a special node. When the MAC layer schedules the slot time
and channel resources of network with TDMA mechanism, every node get
send slots and receive slots. In this case if node A wants to send
data to node B, it have to send data at its send slot, which is also
the receive slot of node B. The time from the time A wanted to send
data to the slot above mentioned is the scheduling time from node A
to node B. It is noteworthy that the scheduling time from A to B is
usually different from the scheduling time from B to A.
Determinism: It is usually meant that access to the control
network by a node may be delayed by at most some time t, where t is
known. In industrial wireless network, it also means that data is
sent and received within the stipulated time.
Neighbor domain: It means the neighbors a node could reach to.
Node could use neighbor discovery to find its neighbors and store
the neighbors' addresses in its neighbor table.
2. Scheduling Header
In this section, we define the scheduling dispatch value and the
field of Scheduling Header, used for supporting scheduling
operations.
2.1. Scheduling dispatch and IPv6 header stack
The definition of LoWPAN headers, other than mesh addressing and
fragmentation, consists of the dispatch value, and the definition of
the header fields that follow. Note that [RFC 4944] has defined some
values for some headers. In order to avoid any conflicts with the
existing standard documents, including [RFC 4944] and [RFC 6282], we
make full use of the reserved symbols of dispatch. Here, we set the
value of Scheduling dispatch is 01 000011. The Scheduling dispatch
and the Scheduling Header are shown here:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0 1|0 0 0 0 1 1| Scheduling Header
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 1 Scheduling dispatch and Scheduling Header
The dispatch value may be treated as unstructured namespace. Only a
few symbols have been used to represent current LoWPAN functionality
Wang, et al. Expires October 21, 2012 [Page 5]
Internet-Draft draft-wang-6lowpan-scheduling-00 April 2012
according to [RFC 4944]. We can use the non-defined values to encode
additional functionality.
According to RFC 4944, all LoWPAN encapsulated datagrams transported
over IEEE 802.15.4 are prefixed by an encapsulated header stack.
Whereas in an IPv6 header stack, the Scheduling dispatch and the
Scheduling Header follow the Mesh Header and the next are other
headers, or options, finally payload. An Ipv6 header stack
containing Scheduling Header is shown as figure 2.
+---------+------------+--------------------+------------------+-------------+--------+
|Mesh Type| Mesh Header| scheduling dispatch| Scheduling Header| other header| payload|
+---------+------------+--------------------+------------------+-------------+--------+
Figure 2 An Ipv6 header stack containing Scheduling Header
Here, the other headers contain IPv6 header or other compressed IPv6
headers, and other types of header.
2.2. Scheduling Header
The Scheduling Header is shown here:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Sequence ID | Scheduling ID | Scheduling Time Limit |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 3 Scheduling Header
Field definitions are as follows:
Sequence ID: This 8-bit field is a local counter maintained
separately by each node and SHALL be incremented by the originator
whenever it sends a datagram with a Scheduling Header. This field is
used for follow-up maintenance, for example it could be used to tell
new datagrams from old datagrams.
Scheduling ID: This 8-bit field is used for identifying paths or
other scheduling parameter, which SHALL meet the industrial
requirements mentioned in the above section of Introduction,
especially the requirements of determinism. During the transmission
of the datagram, the Scheduling ID could show the information of
propagation path.
Wang, et al. Expires October 21, 2012 [Page 6]
Internet-Draft draft-wang-6lowpan-scheduling-00 April 2012
Scheduling Time Limit: This 16-bit field is used mainly to identify
the maximum scheduling time a packet allowed to be sent. It is the
key field to ensure the requirement of determinism, and in units of
milliseconds. This field can contain values up to 65535.
Additionally, it is an accumulated metric, an aggregation of
scheduling time value of every node along the path. Especially, when
a datagram with the requirement of determinism is sent for the first
time, this field is necessary for it to choose a satisfying path.
It is worth noting that the above definition of the Scheduling
Header is originally envisaged. With the subsequent increase in
scheduling applications, it MAY be further modified. Meanwhile, the
definition of the fields SHOULD be applied flexibly, according to
actual needs.
3. An example using Scheduling Header
Scheduling Header defined aims to support scheduling operation, and
to meet the industrial application requirements of determinism.
According to the initial consideration, the Scheduling Time Limit is
the key field to ensure determinism, which is used mainly to
identify the maximum scheduling time a packet allowed along the
transmission path. It is also to say that a datagram must be
transmitted from source node to destination node with the given
Scheduling Time Limit. So, we can see it as an accumulated routing
metric. Along this train of thought, route discovery MAY be an
obvious application of Scheduling Header defined above.
The aim of this section is simply to provide an example of
Scheduling Header application, using it in route discovery. Needless
to say that the MAC layer SHOULD based on TDMA and ACA mechanism,
which schedules the slot time and channel resources of network.
3.1. Route Discovery
The way of route discovery in this section is an on-demand algorithm,
that is, it determines a route to some destination only when
somebody wants to send packet to this destination within a
Scheduling Time Limit. The Scheduling Time Limit is set by users.
The route discovery process is similar to AODV (Ad hoc On-demand
Distance Vector) routing algorithm. However, the broadcast slots in
the deterministic scheduling mechanism are usually for organizing
network and time synchronization, using broadcast slots in route
discovery MAY effect the functional aspects of whole network.
Meanwhile, the route discovery for datagram is on-demand and
optional. So, it usually uses the non-broadcast slot for route
Wang, et al. Expires October 21, 2012 [Page 7]
Internet-Draft draft-wang-6lowpan-scheduling-00 April 2012
discovery. One of the solutions is that node use a group of unicast
messages to realize the broadcast effectiveness.
In order to describe route discovery process in detail, we make
following assumptions:
o The MAC layer is based on TDMA, if node A could send packet to
node B in a slot, then node B could send packet to node A in a
slot too.
o Before the route discovery process, the scheduling process is
over, and every node knows its send slot and scheduling time to a
special node.
o The mesh network can be described by a graph of the nodes
(routers + end devices). Two nodes are connected (i.e., have an
arc between them in the graph) if they are in each other's
neighbor domain.
To describe the algorithm, consider the mesh network of figure 4, in
which a process on node A wants to send a packet to node H. This
algorithm maintains some tables at each node, including:
o Scheduling Path History Table, which is maintained by source node,
stores information about that destination, including the Path ID,
the destination address, as well as the Scheduling Time Limit.
o Neighbor Table, which is got from the neighbor discovery process
before scheduling process, stores the address information of the
node's neighbors.
o Route Table, which is maintained by routers, stores information
about that destination, including the Path ID, the destination
address, as well as the next hop address.
o Local History Table, which is maintained by routers, stores the
tuple (Source address, Request ID, Destination address) for
determining duplicate packet.
o Reverse Route Table, which is maintained by every node, stores
the reverse route information. This information used to construct
the reverse route so the reply packet can get back to the source
later. Meanwhile, a timer is also started for the newly-made
reverse route entry. If it expires, the entry is deleted.
According to the user's requirements, A wants to send data with
Scheduling Header to H. Suppose that A looks in its Scheduling Path
Wang, et al. Expires October 21, 2012 [Page 8]
Internet-Draft draft-wang-6lowpan-scheduling-00 April 2012
History table and does not find an entry for H to ensure the
requirements of Scheduling Time Limit. It now has to discover a path
to H, which could meet the constraints. This property of discovering
paths only when they are needed is what makes this algorithm ''on
demand.''
+-------------------------------------------------------------+
| +---------------+ +---------------+ +---------------+ |
| | (A) | | (A) | | (A) | |
| | / \ | | / \ | | / \ | |
| | / \ | | / \ | | / \ | |
| | [B]---[C] | | (B)---(C) | | (B)---(C) | |
| | / / \ | | / / \ | | / / \ | |
| | / / \ | | / / \ | | / / \ | |
| | (E) (F)--(G)| | [E] [F]--[G]| | (E) (F)--(G)| |
| | \ / | | \ / | | \ / | |
| | \ / | | \ / | | \ / | |
| | (H) | | (H) | | [H] | |
| +---------------+ +---------------+ +---------------+ |
| (a) (b) (c) |
+-------------------------------------------------------------+
Figure 4 The process of path discovery
In figure 4, every node has a neighbor domain. Node B and node C are
in A's neighbor domain, then B and C could receive A's message. In
the graph of (a), B and C have received A's messages. In the graph
of (b), E, F and G have received A's messages forwarded by B and C.
And in the graph of (c), node H has received A's messages forward by
E and F. The nodes in [square brackets] are new recipients.
To locate H, node A May construct a Scheduling Route Request (SRR)
message and send it to all of his neighbors to find a satisfying
path to H. This packet reaches B and C, as illustrated in (a) of
figure 4. In fact, the reason B and C are connected to A in the
graph is that they can receive communication from A. G, for example,
is not shown with an arc to A because it cannot receive A's radio
signal. Thus, G is not a neighbor to A and also not connected to A.
The main format of SRR message is shown in figure 5. It contains the
source and destination address, which identify who is looking for
whom. It also contains a Request ID, which is a local counter
maintained separately by each node and incremented each time a group
of SRR packets is sent to its neighbors. Together, the originator
address and the Request ID uniquely identify the special group of
SRR messages to allow nodes to discard any duplicates they may
receive.
Wang, et al. Expires October 21, 2012 [Page 9]
Internet-Draft draft-wang-6lowpan-scheduling-00 April 2012
+--------------+----------+-------------------+---------------+---------+---------------------+
|Source address|Request ID|Destination address|Source sequence|Hop limit|Scheduling time limit|
+--------------+----------+-------------------+---------------+---------+---------------------+
Figure 5 Main format of a Scheduling Route Request packet
In addition to the Request ID counter, there is also a second
sequence counter, Source sequence, which is incremented whenever a
SRR message is sent (or forward someone else's SRR message). It
functions a little bit like a clock. The fourth field of figure 5 is
A's sequence counter.
The Hop limit of SRR is used for terminating the diffusion of SRR
messages in the network. It SHALL be decremented by each forwarding
node before sending this packet towards its next hop. The packet is
not forwarded any further if Hops Left is decremented to zero.
The Scheduling time limit of SRR message is an accumulated limit of
path. Every time node sends a packet to its neighbor, the Scheduling
time limit will minus the scheduling time value of the send node to
its special neighbor, whatever the originator or the forwarding
nodes. When it is decremented to zero, the node will discard the
packet, and stop to send it to his neighbor. The original value of
Scheduling time limit in SRR is the same to the Scheduling Time
Limit in Scheduling Header. The use of these fields will become
clear shortly.
Before sending it to his neighbors, Node A will firstly compute the
scheduling time to every neighbor node according to scheduling
mechanism, and then compute the Scheduling Time Limit to every
neighbor (the old Scheduling time limit minus scheduling time to the
neighbor). If the new Scheduling time limit to a neighbor becomes to
0 or negative, A will not send the SRR to the neighbor.
When a SRR arrives at a node (B and C in this case), it is processed
in the following steps.
o Step 1: The tuple of (Source address, Request ID, Destination
address) is looked up in a local history table to see if this
request has already been seen and processed. If is a duplicate,
it is discarded and processing stops. If it is not a duplicate,
the tuple is entered into the history table so future duplicates
can be rejected, and processing continues.
o Step2: The receiver looks up its Neighbor Table, compute the
scheduling time to every neighbor node according to scheduling
mechanism, and then compute the Scheduling Time Limit to every
Wang, et al. Expires October 21, 2012 [Page 10]
Internet-Draft draft-wang-6lowpan-scheduling-00 April 2012
neighbor. If the new Scheduling time limit to a neighbor becomes
to 0 or negative, A will not send the SRR to the neighbor.
Instead, it will decrease the Hop left, increase the Source
sequence and renew the Scheduling time limit, and then resend the
SRR message to its neighbor. It is worth noting that if the Hop
left field becomes to 0, the sending process is terminated too.
o Step3: The receiver also extracts the data from the packet and
stories it as a new entry in its Reverse Route Table. This
information will be used to construct the reverse route so that
the acknowledgement packet can get back to the source later. And
a timer is also started for the newly-made reverse route entry.
If it expires, the entry is deleted.
Neither B nor C knows where H is, so each of them creates a reverse
route entry pointing back to A, and resend the SRR with a new Hop
Left, a new Source sequence, and a new Scheduling Time Limit. The
SRR from B reaches E and C. E makes an entry for it in its reverse
route table and resend it. In contrast, C rejects it as a duplicate.
Similarly, C's SRR is rejected by B. The process goes on, until H
receives the broadcast, and the special datagram reaches a
destination that knows where H is, namely H, as illustrated in (c)
graph of Figure 4. Note that although we have shown the sending
process in three discrete steps here, the SRR forwarded from
different nodes are not coordinated in any way.
In response to the incoming SRR message, H SHOULD builds an
acknowledgement packet, here called Scheduling Route Acknowledgement
(SRA) message. The main format of SRA message is shown in figure 6.
+--------------+----------+-------------------+-------+---------+
|Source address|Request ID|Destination address|Path ID|Hop count|
+--------------+----------+-------------------+-------+---------+
Figure 6 Main format of a Scheduling Route Acknowledgement packet
The Source address, Destination address, and Request ID are copied
from the incoming request message, but the Hop count field is
initialized to 0. The Path ID is a counter maintained by the
destination node. Each time, the destination node receives a SRR
message sent or forwarded by different node, it will increase the
Path ID, which means there is a new path. This message is unicast to
the node that the SRR message came from, in this case, E and F. It
then follows the reverse path to B or C, and finally to A. At each
node, Hop count is incremented so the node can see how far from the
destination (H) it is.
Wang, et al. Expires October 21, 2012 [Page 11]
Internet-Draft draft-wang-6lowpan-scheduling-00 April 2012
At each intermediate node on the way back, the message is inspected.
It is entered into the Route Table as a path to H.
In this way, all the nodes on the reverse route learn the path with
Path ID to H. And the original node (A) set the Path ID of SRA into
the Scheduling ID of the Scheduling header. When data with
Scheduling Header is sending, the intermediate nodes will know which
path to forward the data.
This document only shows the main fields of the SRR and SRA messages,
in fact, the SRR and SRA could be extended from the RPL messages or
other exiting protocols. The specific extension methods are out of
this document.
3.2. Route Maintenance
Because nodes can move or be switched off, the topology can change
spontaneously. When the topology has changed, the algorithm needs to
be able to deal with the failure.
4. IANA Considerations
This document defines a new Scheduling Header for 6LoWPAN to support
scheduling mechanism and to meet the industrial requirement of
determinism.
[RFC 4944] has allocated some values of dispatch for some headers.
This assignment preempts the assignment of 01 111111 for ESC [RFC
4944]; this preemption is possible because extension bytes that
would enable the use of ESC have not been allocated yet. But [RFC
6282] takes 01 000000 as a replacement value for ESC, and allocates
the value between 01 100000 to 01 111111 for LoWPAN_IPHC. Meanwhile,
it also creates a new IANA registry for LoWPAN_NHC, and has used the
value from 1110000 to 1110111.
As a result, the document allocates 01 000011 of the dispatch for
Scheduling dispatch.
5. Security Considerations
In industrial environment, the wireless networks share the same
place and time. In this case, if the security mechanism is not very
brilliant, it will seriously affect the system's information
security. The security mechanism is beyond the scope of this draft.
Wang, et al. Expires October 21, 2012 [Page 12]
Internet-Draft draft-wang-6lowpan-scheduling-00 April 2012
6. Conclusions
This document describes the method of transmission scheduling
information over 6LoWPAN Adaption layer for industrial application.
6LoWPAN nodes use the Scheduling Header to determine the packets
scheduling information, including the transmission path and
constraints, to meet the requirement of determinism.
7. References
7.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
[RFC2234] Crocker, D. and Overell, P. (Editors), "Augmented BNF for
Syntax Specifications: ABNF", RFC 2234, Internet Mail
Consortium and Demon Internet Ltd., November 1997.
[RFC4919] N. Kushalnagar, and G. Montenegro, ''IPv6 over Low-Power
Wireless Personal Area Networks (6LoWPANs): Overview,
Assumptions, Problem Statement, and Goals'', RFC4919,
August 2007.
[RFC4944] Montenegro, G., Kushalnagar, N., Hui, J., and Culler, D.,
"Transmission of IPv6 Packets over IEEE 802.15.4 Networks",
RFC 4944, September 2007.
[RFC6282] J. Hui, Ed, "Compression Format for IPv6 Datagrams over
IEEE 802.15.4-Based Networks", RFC 6282, September 2011.
7.2. Informative References
[I-D.ietf-roll-indus-routing-reqs] Dust Networks, ''Industrial
Routing Requirements in Low Power and Lossy Networks",
draft-ietf-roll-indus-routing-reqs-06 (work in progress),
June 2009.
7.3. External Informative References
[HART] HART Communication Foundation, HART 7.0 Specification[S],
2008
[IEEE802.15.4] IEEE Computer Society, "IEEE Std. 802.15.4-2006",
June 2006
Wang, et al. Expires October 21, 2012 [Page 13]
Internet-Draft draft-wang-6lowpan-scheduling-00 April 2012
[ISA100.11a] ISA100.11a Working Group,''Wireless systems for
industrial automation: Process control and related
applications,'' ISA100.11a Draft standard, September 2008.
[WIA-PA] IEC/PAS 62601 Ed.1.0[S], WIA-PA communication network and
communication profile, 2009
Perkins, C.E., and Royer, E., ''The Ad Hoc On-demand Distance Vector
Routing,'' IEEE Workshop on Mobile Computing Systems and
Applications, IEEE, pp. 90-100, 1999
8. Acknowledgments
Thanks to the authors of RFC 4944 and RFC 6282.And, thanks to XXX for
edit of this document. Also thanks to XXX et al.
This document was prepared using 2-Word-v2.0.template.dot.
Wang, et al. Expires October 21, 2012 [Page 14]
Internet-Draft draft-wang-6lowpan-scheduling-00 April 2012
Authors' Addresses
Heng Wang
Chongqing University of Posts and Telecommunications
Administrative Building, Chongqing University of Posts and
Telecommunications
Chongqing, 400065
China
Phone: (86) -23- 6248- 7845
Email: wangheng@cqupt.edu.cn
Ping Wang
Chongqing University of Posts and Telecommunications
Administrative Building, Chongqing University of Posts and
Telecommunications
Chongqing, 400065
China
Phone: (86) -23- 6246- 1061
Email: wangping@cqupt.edu.cn
Chao Zhou
Cisco Systems (China)
Research and Development Co., Ltd.
8Floor, Xinsi Mansion
926 Yishan Lu, Caohejing Hi-Tech Park,
Shanghai, 200233
China
Phone: (86) -21- 2407- 3419
Email: czhou@cisco.com
Wang, et al. Expires October 21, 2012 [Page 15]