Evaluation of the 6TiSCH Network Formation

Similar documents
Low-Power Interoperability for the IPv6 Internet of Things

AS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks

Achieving Network Consistency. Octav Chipara

Design of an energy efficient Medium Access Control protocol for wireless sensor networks. Thesis Committee

Data Gathering. Chapter 4. Ad Hoc and Sensor Networks Roger Wattenhofer 4/1

Comparing MAC Layer Implementations using Contiki-OS

SEEOF: Smart Energy Efficient Objective Function

Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks

ETSI work on IoT connectivity: LTN, CSS, Mesh and Others. Josef BERNHARD Fraunhofer IIS

Accurate Energy Consumption Modeling of IEEE e TSCH Using Dual-Band OpenMote Hardware

International Journal of Science, Environment and Technology, Vol. 6, No 2, 2017,

Computer Networks II Advanced Features (T )

Optimal Clock Synchronization in Networks. Christoph Lenzen Philipp Sommer Roger Wattenhofer

Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks

Ultra-Low Duty Cycle MAC with Scheduled Channel Polling

Internet of Things Prof. M. Cesana. Exam June 26, Family Name Given Name Student ID 3030 Course of studies 3030 Total Available time: 2 hours

TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS

Scheduling Data Collection with Dynamic Traffic Patterns in Wireless Sensor Networks

Data Dissemination in Wireless Sensor Networks

Seminar on Low Power Wide Area Networks

olsr.org 'Optimized Link State Routing' and beyond December 28th, 2005 Elektra

Medium Access Control Protocol for WBANS

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster

Energy Consumption and Performance of IEEE e TSCH and DSME

Mathematical Problems in Networked Embedded Systems

Politecnico di Milano Advanced Network Technologies Laboratory. Beyond Standard MAC Sublayer

NETWORK CONNECTIVITY FOR IoT. Hari Balakrishnan. Lecture #5 6.S062 Mobile and Sensor Computing Spring 2017

Cooperative Coexistence of BLE and Time Slotted Channel Hopping Networks

An Improved MAC Model for Critical Applications in Wireless Sensor Networks

Introduction. Introduction ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS. Smart Wireless Sensor Systems 1

Evaluation of Ultra-Wideband Radio for Industrial Wireless Control

WirelessHART Modeling and Performance Evaluation

Energy-Efficient MANET Routing: Ideal vs. Realistic Performance

Energy-Efficient Data Management for Sensor Networks

FTSP Power Characterization

On Practical Selective Jamming of Bluetooth Low Energy Advertising

LoRa for the Internet of Things

Energy-efficient and lifetime aware routing in WSNs

for Vehicular Ad Hoc Networks

Wireless Internet Routing. IEEE s

Simple, Optimal, Fast, and Robust Wireless Random Medium Access Control

Elaborate Energy Consumption Modelling for OpenWSN

Agenda. A short overview of the CITI lab. Wireless Sensor Networks : Key applications & constraints. Energy consumption and network lifetime

Overview. Ad Hoc and Wireless Mesh Networking. Ad hoc network. Ad hoc network

Simple Modifications in HWMP for Wireless Mesh Networks with Smart Antennas

Communication Networks. Braunschweiger Verkehrskolloquium

Starvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks

Part I: Introduction to Wireless Sensor Networks. Alessio Di

ODMAC: An On Demand MAC Protocol for Energy Harvesting Wireless Sensor Networks

IN4181 Lecture 2. Ad-hoc and Sensor Networks. Koen Langendoen Muneeb Ali, Aline Baggio Gertjan Halkes

The Long Range Wide Area Network - LoraWAN

MAC SCHEDULING IN INDUSTRIAL WIRELESS CELL-BASED MESH SENSOR NETWORKS

Experimental evaluation of IEEE s path selection protocols in a mesh testbed

Babel A flexible routing protocol

Adaptation of MAC Layer for QoS in WSN

MACHINE TO MACHINE (M2M) COMMUNICATIONS-PART II

Kassandra Charalampidou

TRANSMIT ONLY FOR DENSE WIRELESS NETWORKS

CS649 Sensor Networks IP Lecture 9: Synchronization

LoRa/LRSC. Wireless Long Range Network for M2M Communication

EXTENDED BLOCK NEIGHBOR DISCOVERY PROTOCOL FOR HETEROGENEOUS WIRELESS SENSOR NETWORK APPLICATIONS

Lecture on Sensor Networks

Energy-Efficient Communication Protocol for Wireless Microsensor Networks

Using Reconfigurable Radios to Increase Throughput in Wireless Sensor Networks

Feasibility and Benefits of Passive RFID Wake-up Radios for Wireless Sensor Networks

Opportunistic electromagnetic energy harvesting enabled IEEE MAC protocols employing multi-channel scheduled channel polling

Cross-layer Approach to Low Energy Wireless Ad Hoc Networks

Introduction to OSPF. ISP Workshops. Last updated 11 November 2013

Interlayer routing issues for wireless networks

M U LT I C A S T C O M M U N I C AT I O N S. Tarik Cicic

MAC Protocol with Regression based Dynamic Duty Cycle Feature for Mission Critical Applications in WSN

ENERGY EFFICIENT SENSOR NODE DESIGN IN WIRELESS SENSOR NETWORKS

Low-Power Listening Goes Multi-Channel

A survey on broadcast protocols in multihop cognitive radio ad hoc network

Collaborative transmission in wireless sensor networks

The Use of A Mobile Sink for Quality Data Collection in Energy Harvesting Sensor Networks

Guaranteeing the network lifetime in wireless sensor networks: A MAC layer approach

Optimized Asynchronous Multi-channel Neighbor Discovery

Vulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR

DiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers

Active RFID System with Wireless Sensor Network for Power

A Taxonomy for Routing Protocols in Mobile Ad Hoc Networks. Laura Marie Feeney Swedish Institute of Computer Science

ON DEMAND CHANNEL ASSIGNMENT METHOD FOR CHANNEL DIVERSITY (ODCAM)

Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks

Scalable Routing Protocols for Mobile Ad Hoc Networks

An Adaptable Energy-Efficient Medium Access Control Protocol for Wireless Sensor Networks

T. Yoo, E. Setton, X. Zhu, Pr. Goldsmith and Pr. Girod Department of Electrical Engineering Stanford University

Powertrace: Network-level Power Profiling for Low-power Wireless Networks

COSC 3213: Computer Networks I Instructor: Dr. Amir Asif Department of Computer Science York University Section B

Sensor network: storage and query. Overview. TAG Introduction. Overview. Device Capabilities

CSRmesh Beacon management and Asset Tracking Muhammad Ulislam Field Applications Engineer, Staff, Qualcomm Atheros, Inc.

A Sensor Network Protocol for Automatic Meter Reading in an Apartment Building

Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks

Partial overlapping channels are not damaging

SYSTEM SENSOR WIRELESS REMOTE INDICATOR PRODUCT SPECIFICATION

FAQs about OFDMA-Enabled Wi-Fi backscatter

LoRaWAN. All of the gateways in a network communicate to the same server, and it decides which gateway should respond to a given transmission.

Internet of Things - Exercises. Matteo Cesana

Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)

Multi-Radio Multi-Channel Protocol for Emergency Wireless Mesh Network

Transcription:

Evaluation of the 6TiSCH Network Formation Dario Fanucchi 1 Barbara Staehle 2 Rudi Knorr 1,3 1 Department of Computer Science University of Augsburg, Germany 2 Department of Computer Science University of Applied Sciences Konstanz, Germany 3 Fraunhofer Institute for Embedded Systems and Communication Technologies, Munich, Germany d.fanucchi@informatik.uni-augsburg.de Evaluation 6TiSCH Network Formation FGSN 2018, TU Braunschweig 1 / 11

Introduction Industrial IoT Industrial Wireless Sensor Networks (IWSNs) Targeted applications: Process monitoring and control Strict requirements: Reliability up to 99,999% Lifetime > 5 years Latency: tens of milliseconds Main characteristics of a IWSN: mesh, multi-hop, lossy network harsh environment a gateway and up to 100 resource constrained nodes specific designed communication protocols d.fanucchi@informatik.uni-augsburg.de Evaluation 6TiSCH Network Formation FGSN 2018, TU Braunschweig 2 / 11

Introduction Industrial IoT Industrial Wireless Sensor Networks (IWSNs) Targeted applications: Process monitoring and control Strict requirements: Reliability up to 99,999% Lifetime > 5 years Latency: tens of milliseconds Main characteristics of a IWSN: mesh, multi-hop, lossy network harsh environment a gateway and up to 100 resource constrained nodes specific designed communication protocols d.fanucchi@informatik.uni-augsburg.de Evaluation 6TiSCH Network Formation FGSN 2018, TU Braunschweig 2 / 11

Introduction Industrial IoT Industrial Wireless Sensor Networks (IWSNs) Targeted applications: Process monitoring and control Strict requirements: Reliability up to 99,999% Lifetime > 5 years Latency: tens of milliseconds Main characteristics of a IWSN: mesh, multi-hop, lossy network harsh environment a gateway and up to 100 resource constrained nodes specific designed communication protocols d.fanucchi@informatik.uni-augsburg.de Evaluation 6TiSCH Network Formation FGSN 2018, TU Braunschweig 2 / 11

Introduction Protocols and standards for Industrial IoT 6TiSCH-Stack: IETF Suite of Protocols for Industrial IoTs Upper layers: IPv6-connectivity 6LoWPAN, IPv6, CoAP etc. RPL as distributed routing protocol Glueing together: 6top protocol proposed by IETF 6TiSCH assignment of communication links definition of bootstrapping procedures At the bottom: IEEE 802.15.4-2015 2.4 GHz low-power radio MAC: Time Slotted Channel Hopping for industrial performance d.fanucchi@informatik.uni-augsburg.de Evaluation 6TiSCH Network Formation FGSN 2018, TU Braunschweig 3 / 11

Introduction Protocols and standards for Industrial IoT 6TiSCH-Stack: IETF Suite of Protocols for Industrial IoTs Upper layers: IPv6-connectivity 6LoWPAN, IPv6, CoAP etc. RPL as distributed routing protocol Glueing together: 6top protocol proposed by IETF 6TiSCH assignment of communication links definition of bootstrapping procedures At the bottom: IEEE 802.15.4-2015 2.4 GHz low-power radio MAC: Time Slotted Channel Hopping for industrial performance d.fanucchi@informatik.uni-augsburg.de Evaluation 6TiSCH Network Formation FGSN 2018, TU Braunschweig 3 / 11

Introduction Protocols and standards for Industrial IoT 6TiSCH-Stack: IETF Suite of Protocols for Industrial IoTs Upper layers: IPv6-connectivity 6LoWPAN, IPv6, CoAP etc. RPL as distributed routing protocol Glueing together: 6top protocol proposed by IETF 6TiSCH assignment of communication links definition of bootstrapping procedures At the bottom: IEEE 802.15.4-2015 2.4 GHz low-power radio MAC: Time Slotted Channel Hopping for industrial performance d.fanucchi@informatik.uni-augsburg.de Evaluation 6TiSCH Network Formation FGSN 2018, TU Braunschweig 3 / 11

Introduction Protocols and standards for Industrial IoT 6TiSCH-Stack: IETF Suite of Protocols for Industrial IoTs Upper layers: IPv6-connectivity 6LoWPAN, IPv6, CoAP etc. RPL as distributed routing protocol Glueing together: 6top protocol proposed by IETF 6TiSCH assignment of communication links definition of bootstrapping procedures At the bottom: IEEE 802.15.4-2015 2.4 GHz low-power radio MAC: Time Slotted Channel Hopping for industrial performance d.fanucchi@informatik.uni-augsburg.de Evaluation 6TiSCH Network Formation FGSN 2018, TU Braunschweig 3 / 11

Introduction Motivation and objectives Scenario: Mesh, multi-hop network for industrial wireless 6TiSCH-Stack as IETF proposal for industrial IoT Problem statement: Interplay of MAC and Routing protocols affects network performance Initial network formation is challenging Our simulative study hightlights... why a blind adoption of IETF 6TiSCH proposal is risky how to tune the MAC and Routing protocol for a successful network formation (situation dependent) d.fanucchi@informatik.uni-augsburg.de Evaluation 6TiSCH Network Formation FGSN 2018, TU Braunschweig 4 / 11

Introduction Motivation and objectives Scenario: Mesh, multi-hop network for industrial wireless 6TiSCH-Stack as IETF proposal for industrial IoT Problem statement: Interplay of MAC and Routing protocols affects network performance Initial network formation is challenging Our simulative study hightlights... why a blind adoption of IETF 6TiSCH proposal is risky how to tune the MAC and Routing protocol for a successful network formation (situation dependent) d.fanucchi@informatik.uni-augsburg.de Evaluation 6TiSCH Network Formation FGSN 2018, TU Braunschweig 4 / 11

Introduction Motivation and objectives Scenario: Mesh, multi-hop network for industrial wireless 6TiSCH-Stack as IETF proposal for industrial IoT Problem statement: Interplay of MAC and Routing protocols affects network performance Initial network formation is challenging Our simulative study hightlights... why a blind adoption of IETF 6TiSCH proposal is risky how to tune the MAC and Routing protocol for a successful network formation (situation dependent) d.fanucchi@informatik.uni-augsburg.de Evaluation 6TiSCH Network Formation FGSN 2018, TU Braunschweig 4 / 11

6TiSCH network formation Interplay of MAC and routing protocol How a 6TiSCH network is formed (1) At least two processes, before network is operational: 1 TSCH synchronisation Goal: build a globally synchronized mesh network Exchanging Enhanced Beacon (EB) frames with time information emitted every t eb 2 RPL DODAG construction Goal: organize nodes as a directed tree rooted at the sink Exchanging DODAG Information Object (DIO) packets Trickle algorithm for adaptive generation A C sink F D B E DODAG root radio link routing uplink How can we coordinate these two interplaying processes? d.fanucchi@informatik.uni-augsburg.de Evaluation 6TiSCH Network Formation FGSN 2018, TU Braunschweig 5 / 11

6TiSCH network formation Interplay of MAC and routing protocol How a 6TiSCH network is formed (1) At least two processes, before network is operational: 1 TSCH synchronisation Goal: build a globally synchronized mesh network Exchanging Enhanced Beacon (EB) frames with time information emitted every t eb 2 RPL DODAG construction Goal: organize nodes as a directed tree rooted at the sink Exchanging DODAG Information Object (DIO) packets Trickle algorithm for adaptive generation A C sink F D B E DODAG root radio link routing uplink How can we coordinate these two interplaying processes? d.fanucchi@informatik.uni-augsburg.de Evaluation 6TiSCH Network Formation FGSN 2018, TU Braunschweig 5 / 11

6TiSCH network formation Interplay of MAC and routing protocol How a 6TiSCH network is formed (1) At least two processes, before network is operational: 1 TSCH synchronisation Goal: build a globally synchronized mesh network Exchanging Enhanced Beacon (EB) frames with time information emitted every t eb 2 RPL DODAG construction Goal: organize nodes as a directed tree rooted at the sink Exchanging DODAG Information Object (DIO) packets Trickle algorithm for adaptive generation A C sink F D B E DODAG root radio link routing uplink How can we coordinate these two interplaying processes? d.fanucchi@informatik.uni-augsburg.de Evaluation 6TiSCH Network Formation FGSN 2018, TU Braunschweig 5 / 11

6TiSCH network formation Interplay of MAC and routing protocol How a 6TiSCH network is formed (1) At least two processes, before network is operational: 1 TSCH synchronisation Goal: build a globally synchronized mesh network Exchanging Enhanced Beacon (EB) frames with time information emitted every t eb 2 RPL DODAG construction Goal: organize nodes as a directed tree rooted at the sink Exchanging DODAG Information Object (DIO) packets Trickle algorithm for adaptive generation A C sink F D B E DODAG root radio link routing uplink How can we coordinate these two interplaying processes? d.fanucchi@informatik.uni-augsburg.de Evaluation 6TiSCH Network Formation FGSN 2018, TU Braunschweig 5 / 11

6TiSCH network formation Interplay of MAC and routing protocol How a 6TiSCH network is formed (1) At least two processes, before network is operational: 1 TSCH synchronisation Goal: build a globally synchronized mesh network Exchanging Enhanced Beacon (EB) frames with time information emitted every t eb 2 RPL DODAG construction Goal: organize nodes as a directed tree rooted at the sink Exchanging DODAG Information Object (DIO) packets Trickle algorithm for adaptive generation A C sink F D B E DODAG root radio link routing uplink How can we coordinate these two interplaying processes? d.fanucchi@informatik.uni-augsburg.de Evaluation 6TiSCH Network Formation FGSN 2018, TU Braunschweig 5 / 11

6TiSCH network formation Interplay of MAC and routing protocol How a 6TiSCH network is formed (1) At least two processes, before network is operational: 1 TSCH synchronisation Goal: build a globally synchronized mesh network Exchanging Enhanced Beacon (EB) frames with time information emitted every t eb 2 RPL DODAG construction Goal: organize nodes as a directed tree rooted at the sink Exchanging DODAG Information Object (DIO) packets Trickle algorithm for adaptive generation A C sink F D B E DODAG root radio link routing uplink How can we coordinate these two interplaying processes? d.fanucchi@informatik.uni-augsburg.de Evaluation 6TiSCH Network Formation FGSN 2018, TU Braunschweig 5 / 11

6TiSCH network formation Interplay of MAC and routing protocol How a 6TiSCH network is formed (1) At least two processes, before network is operational: 1 TSCH synchronisation Goal: build a globally synchronized mesh network Exchanging Enhanced Beacon (EB) frames with time information emitted every t eb 2 RPL DODAG construction Goal: organize nodes as a directed tree rooted at the sink Exchanging DODAG Information Object (DIO) packets Trickle algorithm for adaptive generation A C sink F D B E DODAG root radio link routing uplink How can we coordinate these two interplaying processes? d.fanucchi@informatik.uni-augsburg.de Evaluation 6TiSCH Network Formation FGSN 2018, TU Braunschweig 5 / 11

6TiSCH network formation Implementation proposal from 6TiSCH WG How a 6TiSCH network is formed (2) IETF 6TiSCH minimal configuration (6TiSCH-MC, RFC 8180): 1 Sink sets TSCH-schedule with one shared slot and sends EBs and DIOs 2 Joining Nodes keep their radio on and listen for EB 3 After hearing an EB: Node learns the minimal schedule and is synchronised 4 After hearing a DIO: Node selects a preferred parent and broadcasts EBs and DIOs messages on its turn. At the end: every node knowns the minimal schedule and is in the DODAG How good is 6TiSCH-MC? d.fanucchi@informatik.uni-augsburg.de Evaluation 6TiSCH Network Formation FGSN 2018, TU Braunschweig 6 / 11

6TiSCH network formation Implementation proposal from 6TiSCH WG How a 6TiSCH network is formed (2) IETF 6TiSCH minimal configuration (6TiSCH-MC, RFC 8180): 1 Sink sets TSCH-schedule with one shared slot and sends EBs and DIOs 2 Joining Nodes keep their radio on and listen for EB 3 After hearing an EB: Node learns the minimal schedule and is synchronised 4 After hearing a DIO: Node selects a preferred parent and broadcasts EBs and DIOs messages on its turn. At the end: every node knowns the minimal schedule and is in the DODAG How good is 6TiSCH-MC? d.fanucchi@informatik.uni-augsburg.de Evaluation 6TiSCH Network Formation FGSN 2018, TU Braunschweig 6 / 11

6TiSCH network formation Implementation proposal from 6TiSCH WG How a 6TiSCH network is formed (2) IETF 6TiSCH minimal configuration (6TiSCH-MC, RFC 8180): 1 Sink sets TSCH-schedule with one shared slot and sends EBs and DIOs 2 Joining Nodes keep their radio on and listen for EB 3 After hearing an EB: Node learns the minimal schedule and is synchronised 4 After hearing a DIO: Node selects a preferred parent and broadcasts EBs and DIOs messages on its turn. At the end: every node knowns the minimal schedule and is in the DODAG How good is 6TiSCH-MC? d.fanucchi@informatik.uni-augsburg.de Evaluation 6TiSCH Network Formation FGSN 2018, TU Braunschweig 6 / 11

6TiSCH network formation Implementation proposal from 6TiSCH WG How a 6TiSCH network is formed (2) IETF 6TiSCH minimal configuration (6TiSCH-MC, RFC 8180): 1 Sink sets TSCH-schedule with one shared slot and sends EBs and DIOs 2 Joining Nodes keep their radio on and listen for EB 3 After hearing an EB: Node learns the minimal schedule and is synchronised 4 After hearing a DIO: Node selects a preferred parent and broadcasts EBs and DIOs messages on its turn. At the end: every node knowns the minimal schedule and is in the DODAG How good is 6TiSCH-MC? d.fanucchi@informatik.uni-augsburg.de Evaluation 6TiSCH Network Formation FGSN 2018, TU Braunschweig 6 / 11

6TiSCH network formation Implementation proposal from 6TiSCH WG How a 6TiSCH network is formed (2) IETF 6TiSCH minimal configuration (6TiSCH-MC, RFC 8180): 1 Sink sets TSCH-schedule with one shared slot and sends EBs and DIOs 2 Joining Nodes keep their radio on and listen for EB 3 After hearing an EB: Node learns the minimal schedule and is synchronised 4 After hearing a DIO: Node selects a preferred parent and broadcasts EBs and DIOs messages on its turn. At the end: every node knowns the minimal schedule and is in the DODAG How good is 6TiSCH-MC? d.fanucchi@informatik.uni-augsburg.de Evaluation 6TiSCH Network Formation FGSN 2018, TU Braunschweig 6 / 11

6TiSCH network formation Implementation proposal from 6TiSCH WG How a 6TiSCH network is formed (2) IETF 6TiSCH minimal configuration (6TiSCH-MC, RFC 8180): 1 Sink sets TSCH-schedule with one shared slot and sends EBs and DIOs 2 Joining Nodes keep their radio on and listen for EB 3 After hearing an EB: Node learns the minimal schedule and is synchronised 4 After hearing a DIO: Node selects a preferred parent and broadcasts EBs and DIOs messages on its turn. At the end: every node knowns the minimal schedule and is in the DODAG How good is 6TiSCH-MC? d.fanucchi@informatik.uni-augsburg.de Evaluation 6TiSCH Network Formation FGSN 2018, TU Braunschweig 6 / 11

6TiSCH network formation Implementation proposal from 6TiSCH WG How a 6TiSCH network is formed (2) IETF 6TiSCH minimal configuration (6TiSCH-MC, RFC 8180): 1 Sink sets TSCH-schedule with one shared slot and sends EBs and DIOs 2 Joining Nodes keep their radio on and listen for EB 3 After hearing an EB: Node learns the minimal schedule and is synchronised 4 After hearing a DIO: Node selects a preferred parent and broadcasts EBs and DIOs messages on its turn. At the end: every node knowns the minimal schedule and is in the DODAG How good is 6TiSCH-MC? d.fanucchi@informatik.uni-augsburg.de Evaluation 6TiSCH Network Formation FGSN 2018, TU Braunschweig 6 / 11

6TiSCH network formation Implementation proposal from 6TiSCH WG How a 6TiSCH network is formed (2) IETF 6TiSCH minimal configuration (6TiSCH-MC, RFC 8180): 1 Sink sets TSCH-schedule with one shared slot and sends EBs and DIOs 2 Joining Nodes keep their radio on and listen for EB 3 After hearing an EB: Node learns the minimal schedule and is synchronised 4 After hearing a DIO: Node selects a preferred parent and broadcasts EBs and DIOs messages on its turn. At the end: every node knowns the minimal schedule and is in the DODAG How good is 6TiSCH-MC? d.fanucchi@informatik.uni-augsburg.de Evaluation 6TiSCH Network Formation FGSN 2018, TU Braunschweig 6 / 11

Performance evaluation of 6TiSCH minimal configuration Methodology Simulation Setup Contiki OS and Cooja simulator (1) open-source, (2) popular and (3) compliance with 6TiSCH-stack Different topologies and three network sizes N size {9, 16, 25} d.fanucchi@informatik.uni-augsburg.de Evaluation 6TiSCH Network Formation FGSN 2018, TU Braunschweig 7 / 11

Performance evaluation of 6TiSCH minimal configuration Methodology Simulation Setup Contiki OS and Cooja simulator (1) open-source, (2) popular and (3) compliance with 6TiSCH-stack Different topologies and three network sizes N size {9, 16, 25} d.fanucchi@informatik.uni-augsburg.de Evaluation 6TiSCH Network Formation FGSN 2018, TU Braunschweig 7 / 11

Performance evaluation of 6TiSCH minimal configuration Methodology Simulation Setup Contiki OS and Cooja simulator (1) open-source, (2) popular and (3) compliance with 6TiSCH-stack Different topologies and three network sizes N size {9, 16, 25} Varying crucial parameter of TSCH and RPL Trickle: Parameter Symbol Value TSCH number of channels N c {4, 16} TSCH EB period t eb {2048, 4096, 8192, 16384} ms RPL minimal interval I min {128, 256,..., 4096} ms d.fanucchi@informatik.uni-augsburg.de Evaluation 6TiSCH Network Formation FGSN 2018, TU Braunschweig 7 / 11

Performance evaluation of 6TiSCH minimal configuration Methodology Simulation Setup Contiki OS and Cooja simulator (1) open-source, (2) popular and (3) compliance with 6TiSCH-stack Different topologies and three network sizes N size {9, 16, 25} Varying crucial parameter of TSCH and RPL Trickle: Parameter Symbol Value TSCH number of channels N c {4, 16} TSCH EB period t eb {2048, 4096, 8192, 16384} ms RPL minimal interval I min {128, 256,..., 4096} ms Performance metrics: (1) time, (2) charge consumed and (3) number of control frames exchanged until completed network formation d.fanucchi@informatik.uni-augsburg.de Evaluation 6TiSCH Network Formation FGSN 2018, TU Braunschweig 7 / 11

Performance evaluation of 6TiSCH minimal configuration Lessons learned Results: Limits of 6TiSCH-MC In dense network or with improper setting of TSCH and RPL parameters: 1 some nodes are not yet operational after 30 minutes 2 high battery consumption in several nodes Table: Successful DODAG formations within 30 min Grid Ellipse Random N size N size N size t eb N c 9 16 25 9 16 25 9 16 25 2048 ms 4 0% 0% 0% 70% 16% 0% 0% 0% 0% 4096 ms 4 84% 0% 0% 100% 100% 86% 46% 0% 0% 8192 ms 4 100% 20% 0% 100% 100% 100% 100% 2% 0% 16384 ms 4 100% 70% 0% 100% 100% 100% 100% 14% 0% With slotframe duration T sf = 1.01 s (i.e. N s = 101, t s = 10 ms) and I min = 1024 ms Due to... collisions of control frame queuing delay of DIO packets d.fanucchi@informatik.uni-augsburg.de Evaluation 6TiSCH Network Formation FGSN 2018, TU Braunschweig 8 / 11

Performance evaluation of 6TiSCH minimal configuration Lessons learned Results: Limits of 6TiSCH-MC In dense network or with improper setting of TSCH and RPL parameters: 1 some nodes are not yet operational after 30 minutes 2 high battery consumption in several nodes Table: Successful DODAG formations within 30 min Grid Ellipse Random N size N size N size t eb N c 9 16 25 9 16 25 9 16 25 2048 ms 4 0% 0% 0% 70% 16% 0% 0% 0% 0% 4096 ms 4 84% 0% 0% 100% 100% 86% 46% 0% 0% 8192 ms 4 100% 20% 0% 100% 100% 100% 100% 2% 0% 16384 ms 4 100% 70% 0% 100% 100% 100% 100% 14% 0% With slotframe duration T sf = 1.01 s (i.e. N s = 101, t s = 10 ms) and I min = 1024 ms Due to... collisions of control frame queuing delay of DIO packets d.fanucchi@informatik.uni-augsburg.de Evaluation 6TiSCH Network Formation FGSN 2018, TU Braunschweig 8 / 11

Performance evaluation of 6TiSCH minimal configuration Lessons learned Main Observations and Recommendations (1) Network formation time: Network formation time (s) 600 400 200 In dense topologies: t eb =8192 ms t eb =16384 ms TSCH DODAG Grid 128 256 512 1024 2048 4096 Ellipse 128 256 512 1024 2048 4096 RPL minimal interval (ms) Random 128 256 512 1024 2048 4096 1 Time gap between TSCH-synchronisation and DODAG completion 2 RPL minimal interval I min matters Recommendations for implementers Set t eb 4 (slotframe duration) and I min = (slotframe duration) + ɛ d.fanucchi@informatik.uni-augsburg.de Evaluation 6TiSCH Network Formation FGSN 2018, TU Braunschweig 9 / 11

Performance evaluation of 6TiSCH minimal configuration Lessons learned Main Observations and Recommendations (1) Network formation time: Network formation time (s) 600 400 200 In dense topologies: t eb =8192 ms t eb =16384 ms TSCH DODAG Grid 128 256 512 1024 2048 4096 Ellipse 128 256 512 1024 2048 4096 RPL minimal interval (ms) Random 128 256 512 1024 2048 4096 1 Time gap between TSCH-synchronisation and DODAG completion 2 RPL minimal interval I min matters Recommendations for implementers Set t eb 4 (slotframe duration) and I min = (slotframe duration) + ɛ d.fanucchi@informatik.uni-augsburg.de Evaluation 6TiSCH Network Formation FGSN 2018, TU Braunschweig 9 / 11

Performance evaluation of 6TiSCH minimal configuration Lessons learned Main Observations and Recommendations (2) Extending 6TiSCH-MC with N b = 2 shared slots: Ellipse,N b = 1 Ellipse,N b = 2 Grid,N b = 1 Grid,N b = 2 Random,N b = 1 Random,N b = 2 Total charge consumed (C) 35 0.02% of total charge in network 30 25 20 15 128 256 512 1024 2048 4096 RPL minimal interval (ms) 1 theoretical twice duty-cycle, but reduced charge consumed 2 reduction of the time spent for network formation Recommendation for implementers: If dense topologies: Add additional shared slots for time and energy savings d.fanucchi@informatik.uni-augsburg.de Evaluation 6TiSCH Network Formation FGSN 2018, TU Braunschweig 10 / 11

Performance evaluation of 6TiSCH minimal configuration Lessons learned Main Observations and Recommendations (2) Extending 6TiSCH-MC with N b = 2 shared slots: Ellipse,N b = 1 Ellipse,N b = 2 Grid,N b = 1 Grid,N b = 2 Random,N b = 1 Random,N b = 2 Total charge consumed (C) 35 0.02% of total charge in network 30 25 20 15 128 256 512 1024 2048 4096 RPL minimal interval (ms) 1 theoretical twice duty-cycle, but reduced charge consumed 2 reduction of the time spent for network formation Recommendation for implementers: If dense topologies: Add additional shared slots for time and energy savings d.fanucchi@informatik.uni-augsburg.de Evaluation 6TiSCH Network Formation FGSN 2018, TU Braunschweig 10 / 11

Conclusions Summary Herein: Overview of the IETF 6TiSCH minimal configuration (6TiSCH-MC) Extensive simulations to characterize its behaviour Conclusions: Potential downsides of 6TiSCH-MC with dense topologies Recommendations for setting TSCH and RPL parameters Future work: Validate the results with testbeds/realistic channel Develop an algorithm for allocation of broadcast links in TSCH d.fanucchi@informatik.uni-augsburg.de Evaluation 6TiSCH Network Formation FGSN 2018, TU Braunschweig 11 / 11

Conclusions Summary Herein: Overview of the IETF 6TiSCH minimal configuration (6TiSCH-MC) Extensive simulations to characterize its behaviour Conclusions: Potential downsides of 6TiSCH-MC with dense topologies Recommendations for setting TSCH and RPL parameters Future work: Validate the results with testbeds/realistic channel Develop an algorithm for allocation of broadcast links in TSCH d.fanucchi@informatik.uni-augsburg.de Evaluation 6TiSCH Network Formation FGSN 2018, TU Braunschweig 11 / 11

Conclusions Summary Herein: Overview of the IETF 6TiSCH minimal configuration (6TiSCH-MC) Extensive simulations to characterize its behaviour Conclusions: Potential downsides of 6TiSCH-MC with dense topologies Recommendations for setting TSCH and RPL parameters Future work: Validate the results with testbeds/realistic channel Develop an algorithm for allocation of broadcast links in TSCH d.fanucchi@informatik.uni-augsburg.de Evaluation 6TiSCH Network Formation FGSN 2018, TU Braunschweig 11 / 11

Conclusions Summary Herein: Overview of the IETF 6TiSCH minimal configuration (6TiSCH-MC) Extensive simulations to characterize its behaviour Conclusions: Potential downsides of 6TiSCH-MC with dense topologies Recommendations for setting TSCH and RPL parameters Future work: Validate the results with testbeds/realistic channel Develop an algorithm for allocation of broadcast links in TSCH Thank you! Any questions? d.fanucchi@informatik.uni-augsburg.de Evaluation 6TiSCH Network Formation FGSN 2018, TU Braunschweig 11 / 11