0% found this document useful (0 votes)
106 views29 pages

CS578: Internet of Things: IEEE 802.15.4e

The document discusses the IEEE 802.15.4e standard for low-rate wireless personal area networks (LR-WPANs). It describes limitations of the 802.15.4 MAC standard and requirements for critical applications. It then introduces the 802.15.4e standard which defines five new MAC behavior modes including Time Slotted Channel Hopping (TSCH) and introduces enhancements like channel hopping, multi-channel communication and slotted channel access to provide improved reliability, scalability and bounded latency. Finally, it discusses the TSCH mode in more detail including its slotframe structure, synchronization methods and use of dedicated and shared links with CSMA/CA.

Uploaded by

shubham
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
106 views29 pages

CS578: Internet of Things: IEEE 802.15.4e

The document discusses the IEEE 802.15.4e standard for low-rate wireless personal area networks (LR-WPANs). It describes limitations of the 802.15.4 MAC standard and requirements for critical applications. It then introduces the 802.15.4e standard which defines five new MAC behavior modes including Time Slotted Channel Hopping (TSCH) and introduces enhancements like channel hopping, multi-channel communication and slotted channel access to provide improved reliability, scalability and bounded latency. Finally, it discusses the TSCH mode in more detail including its slotframe structure, synchronization methods and use of dedicated and shared links with CSMA/CA.

Uploaded by

shubham
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 29

CS578: Internet of Things

IEEE 802.15.4e
802.15.4e Standard: https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6471722
Survey Article: “IEEE 802.15.4e: A survey” https://www.sciencedirect.com/science/article/pii/S0140366416301980

Dr. Manas Khatua


Assistant Professor, Dept. of CSE, IIT Guwahati
E-mail: manaskhatua@iitg.ac.in

“The best among you is the one who doesn’t harm others with his tongue and hands.” – Muhammad
Limitations of 802.15.4 MAC
 Unbounded latency  No protection against
 Both BE and Non-BE mode use interferences/multipath fading
CSMA-CA  Due to usage of single channel
 No bound on maximum delay to
reach destination
 Powered relay nodes in multi-hop
network
 Non-reliable communication
 Relay nodes keep their radio active always.
 Very low delivery ratio due to the
 Results in complex synchronization and
inefficiency of CSMA-CA
beacon scheduling in BE mode
 Consume large energy

• So, 802.15.4 is unsuitable for many critical scenarios


• when applications have stringent requirements

02-11-2020 Dr. Manas Khatua 2


Requirements of Critical Applications
 Timeliness
 Deterministic latency for packet delivery

 Reliability
 Wire‐like reliability may be required, e.g., 99.9% or better

 Scalability
 Large network size

 Energy Efficiency
 Target battery lifetime: 5 years, or more

02-11-2020 Dr. Manas Khatua 3


Introduction to 802.15.4e
 IEEE 802.15 Task Group 4e was created in 2008

 To redesign the existing 802.15.4 MAC

 IEEE 802.15.4e MAC Enhancement Standard document approved in 2012

 Contains idea from existing WirelessHART and ISA 100.11.a


 Time slotted access
 Shared and dedicated slots
 Multi-channel communication
 Frequency hopping

 Introduce five MAC behaviour modes to support specific applications

 General functional enhancements


 Not tied to any specific application domain

02-11-2020 Dr. Manas Khatua 4


MAC behaviour modes
 Time Slotted Channel Hopping (TSCH)
 Industrial automation and process control
 Non-delay tolerant applications

 Deterministic and Synchronous Multi-channel Extension (DSME)


 Industrial and commercial applications
 Non-delay tolerant and delay tolerant applications

 Low Latency Deterministic Network (LLDN)


 Star network
 For single hop and single-channel networks
 Provides very low latency

02-11-2020 Dr. Manas Khatua 5


Cont..
 Asynchronous multi-channel adaptation (AMCA)
 For large network such as smart utility networks, infrastructure monitoring
 In large network single, common channel is not appropriate
 Used in non Beacon-Enabled PANs
 Device selects best link quality channel as its designated listening channel
 Sender node switch to receiver designated listening channel to transmit its data
 Beacon or Hello packet is used to advertise node designated listening channel

 Radio Frequency Identification Blink (BLINK)


 For Application like item/people identification, location and tracking
 Node communicate without prior association
 No ACK required
 Aloha protocol is used to transmit BLINK packet by “transmit only” devices

02-11-2020 Dr. Manas Khatua 6


General Functional Enhancements
These are not tied to any specific application domain:

 Low Energy (LE)


 Intended for applications that can trade latency for energy efficiency
 Operate in very low duty cycle (<= 1%)
 Appearing always on to the upper layers

 Information Elements (IE)


 Mechanism to exchange information at the MAC sublayer

 Enhanced Beacons (EB)


 Extension of the 802.15.4 beacon frames
 Provide greater flexibility
 Allow to create application-specific frames, by including relevant IEs

02-11-2020 Dr. Manas Khatua 7


Cont..
 Multi purpose Frame
 MAC wise frame format, differentiate on Information Elements (IE)

 MAC Performance Metric


 To provide feedback on channel quality to upper layers
 IP protocol may implement dynamic fragmentation of datagrams depending on
the channel conditions

 Fast Association (FastA)


 Allows a node to associate in a reduced amount of time
 Critical application gives priority to latency over energy

02-11-2020 Dr. Manas Khatua 8


TSCH Mode
 Topology independent

 Time slotted access


 Increase throughput by eliminating collision
among competing nodes
• So, TSCH provides
• increased network capacity,
 Predictable and bounded latency
• high reliability, and
• predictable latency,
 Multi‐channel communication • while maintaining very low
 More nodes exchange their frames at the same duty cycles
time
 Increases network capacity

 Channel hopping
 Mitigates the effects of interference and multi-
path fading
 Improve reliability

02-11-2020 Dr. Manas Khatua 9


Slotframe Structure

• TsTxOffset: Timeslot
Transmission Offset
= TsCCAOffset + TsCCA + TsRxTx

02-11-2020 Dr. Manas Khatua 10


Synchronization
 Nodes synchronize on a periodic slotframe

 Slotframe consists of a number of timeslots

 A timeslot is long enough to send a data frame and receive its ACK

 In each slotframe, EB is broadcasted by PAN Coordinator or other FFDs


 For network advertisement and synchronization
 EB contains information of
 Channel hopping, timeslot details and slotframe information for Synchronization

 A node can start sending its beacon only after getting a valid EB frame

02-11-2020 Dr. Manas Khatua 11


Re-synchronization
 Clock drift occurs due to
 Differences in manufacturing, temperature and supply voltage
 Clocks of different nodes typically pulse at a slightly different frequency

 Nodes need to periodically re-synchronize


 Frame-based synchronization
 ACK-based synchronization

02-11-2020 Dr. Manas Khatua 12


Channel Hopping
 The channel offset is translated in an operating frequency f using

𝑓 = 𝐹{ 𝐴𝑆𝑁 + 𝑐ℎ𝑂𝑓 mod 𝑛𝑐ℎ } ; ASN = k . S + t

 ASN (absolute slot number) : total # of slots elapsed since the network was deployed
 nch : number of physical channels presently available to consider
 F is implemented as a look‐up‐table containing the set of available channels
 k : count of slotframe cycle since the start of the network
 S : slotframe size
 t : timeslot in a slotframe
Max. no. of available
channel =16

Each channel is
identified by a
channelOffset

Channel could be
blacklisted because of
low quality
02-11-2020 Dr. Manas Khatua 13
TSCH Mode: Link
 Link: Pairwise assignment of a directed communication between devices in a
specific slot, with a given channel offset

 Link is denoted by [ t, chOf ]


 t is timeslot no. in the slotframe
 chOf is channel offset

 Two types of Link


 Dedicated links
 Direct access
 One transmitter – One receiver
 Generally used for Data Packet
 Shared links
 TSCH CSMA‐CA protocol
 Multiple transmitters/receivers
 Generally used for Control Packet

02-11-2020 Dr. Manas Khatua 14


TSCH CSMA/CA
 802.15.4 default CSMA/CA v/s TSCH CSMA/CA algorithm

 Backoff mechanism
 In 802.15.4 CSMA/CA, transmitting node waits for a random backoff time before trying to transmit
 In TSCH CSMA/CA, backoff mechanism is activated only after the node has experienced a collision

 Backoff unit duration


 In 802.15.4 CSMA/CA, backoff unit duration is 320μs
 In TSCH CSMA/CA, backoff unit duration corresponds to a shared slot duration

 Clear Channel Assessment (CCA)


 In 802.15.4 CSMA/CA, each node performs CCA to check the channel state, before performing
transmission
 In TSCH CSMA/CA, CCA is used to avoid the packet transmission if a strong external interference is
detected. Internal collision is not possible due to TSCH.

 Packet dropping
 In 802.15.4 CSMA/CA, a packet is dropped after the sender found channel busy for macMaxCSMABackoffs
consecutive times
 In TSCH CSMA/CA, a packet is dropped only if it reaches the maximum number of retransmissions i.e.,
macMaxFrameRetries

02-11-2020 Dr. Manas Khatua 15


Cont…

(2BE –1)

TSCH
Retransmission
Backoff Algorithm

CSMA/CA used in
shared link to avoid
repeated collisions.

In dedicated link, no
chance of collision.

02-11-2020 Dr. Manas Khatua 16


Network Formation
 PAN coordinator starts the process of network formation by sending EB frame
 Network advertisement

 EBs are special frames containing


 Synchronization information
 allows new devices to synchronize to the network

 Channel hopping information


 allows new devices to learn the channel hopping sequence

 Timeslot information
 describes when to expect a frame transmission and when to send an acknowledgment

 Initial link and slotframe information


 allows new devices to know:
o when to listen for transmissions from the advertising device
o when to transmit to the advertising device

02-11-2020 Dr. Manas Khatua 17


Cont..
 A new node starts listening for EB on a certain frequency

 Upon receiving an EB
 The MAC layer notifies the higher layer

 The higher layer initializes the slotframe and links


 Using information in the received EB message

 Switches the device into TSCH mode


 At this point the device is connected to the network

 The device allocates communication resources


 (i.e., slotframes and links)

 and starts advertising, on its turn

 the 802.15.4e standard did not define the EB advertising policy.

02-11-2020 Dr. Manas Khatua 18


Network Formation Goals
 Optimizing the network formation process
 Synchronized communication schedule consumes less energy of nodes by reducing
duty cycle

 Minimum Joining time


 Devices must keep the radio ON during the joining phase
 EBs should be sent frequently to reduce waiting time

 Minimize EB transmissions
 Frequent EB transmission consumes more communication resources
 Also Increases energy consumption at network and node level

• A. Kalita and M. Khatua, “Channel Condition Based Dynamic Beacon Interval for Faster Formation of 6TiSCH
Network”, IEEE Transaction on Mobile Computing, 2020.
• A. Kalita and M. Khatua, “Opportunistic Transmission of Control Packets for Faster Formation of 6TiSCH
Network”, ACM Transactions on Internet of Things, 2020.

02-11-2020 Dr. Manas Khatua 19


TSCH Link scheduling
 Assignment of unique link to node for data transmission

 Challenging in dynamic networks

 IEEE 802.15.4e standard does not specify how to derive an appropriate link
schedule

 Existing multi-channel scheduling schemes are not suitable for TSCH networks
 They do not allow per-packet channel hopping
 Not for resource-constrained nodes
 They are not efficient in terms of channel utilization

02-11-2020 Dr. Manas Khatua 20


Cont..
 Centralized Scheduling
 Link schedule computed and distributed by a special node
 Network coordinator
 Based on information received by all the nodes of the network
 Link schedule has to be re-computed and re-distributed every time a change in the
operating conditions occurs
 Not good for dynamic network and large scale network

 Distributed Scheduling
 Link schedule is computed autonomously by each node
 Based on local, partial information exchanged with its neighbors
 Limited Overhead
 Suitable for energy‐constrained nodes
 Good choice for dynamic network and large scale network

02-11-2020 Dr. Manas Khatua 21


TSCH: Open Issues
 Network Formation
 Current solution inefficient for
• Energy consumption
• Formation time
• Mobile Objects

 Security
 Selective Jamming (SJ) attacks
 Secure Beacons and Different Frequency hopping sequence

 TSCH network synchronization


 Energy consumption

 TSCH slot/cell scheduling


 Guaranteed QoS

02-11-2020 Dr. Manas Khatua 22


6TiSCH Network
 6TiSCH working group created by IETF
 Goal: integrate TSCH with the open source IP protocol stack
 To enable IPv6 over TSCH mode of IEEE 802.15.4e
 Defining a new functional entity in charge of TSCH scheduling

A new sublayer, called 6top


• Works on top of TSCH
• Build and manage TSCH
schedule
• add/delete links/cells
• 6top also collects
connectivity information
• Monitors the
performance of cells

Survey Article: “IETF 6TiSCH: A Tutorial” https://ieeexplore.ieee.org/document/8823863

02-11-2020 Dr. Manas Khatua 23


Need for 6TiSCH
 In 6TiSCH, the TSCH MAC mode is placed under an IPv6-enabled protocol stack:

• IPv6 over Low-Power Wireless Personal Area Network (6LoWPAN)


• IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL), and
• Constrained Application Protocol (CoAP)

 TSCH does not define


 Policies to build and maintain the communication schedule

 Mechanisms to match the schedule to the multi‐hop paths maintained by RPL

 Mechanisms to adapt the resources allocated between neighbor nodes to the data
traffic flows

 Techniques to allow differentiated treatment of packets


 data packets & control packet

02-11-2020 Dr. Manas Khatua 24


6TiSCH Architecture
 Considers low-power lossy-network (LLN)

 Allow more than 1000 nodes

 Nodes are in same IPv6 subnet

 6LoWPAN Header compression (HC) is used to


transmit packet

 Presence of high-speed backbone (e.g. WiFi


mesh) to connect all nodes

 Constrained nodes are attached to backbone


through backbone router (BBR)

 Backbone is connected to the Internet through Fig. 6TiSCH Architecture


a Gateway
02-11-2020 Dr. Manas Khatua 25
6TiSCH Protocol Stack

02-11-2020 Dr. Manas Khatua 26


6TiSCH Scheduling
 6TiSCH considers three modes for building and maintaining the TSCH schedule

 1. Minimal Scheduling [RFC 8180]


 Default schedule
 TSCH schedule is static, and either preconfigured or learnt by a node at joining time
 Used during network bootstrap, or when a better schedule is not available

 2. Centralized Scheduling
 A central entity called Path Computation Element (PCE) collects network state
information and traffic requirements
 It builds and install the schedule in the network

 3. Distributed Scheduling
 Nodes agree on a common distributed schedule by using distributed multi‐hop
scheduling protocols and neighbor‐to‐neighbor scheduling negotiation
 Reservation phase & negotiation phase

02-11-2020 Dr. Manas Khatua 27


Research Articles on Scheduling
• M. R. Palattella, N. Accettura, M. Dohler, L. A. Grieco, and G. Boggia, “Traffic aware scheduling algorithm for reliable low-power multi-hop IEEE
802.15.4e networks,” in Proc. of the PIMRC, Sydney, Australia, September 2012, pp. 327–332. <TASA>
• N. Accettura, E. Vogli, M.R. Palattella, L.A. Grieco, G. Boggia, M. Dohler, “Decentralized traffic aware scheduling in 6tisch networks: design and
experimental evaluation,” IEEE Internet Things Journal, vol. 2, no. 6, December 2015, pp. 455–470. <DeTAS>

• S. Duquennoy, B. Al Nahas, O. Landsiedel, T. Watteyne, “Orchestra: robust mesh networks through autonomously scheduled TSCH,” in: Proc. of the
13th ACM Conference on Embedded Networked Sensor Systems (SenSys), NY, USA, November 2015, pp. 337–350. <Orchestra>
• Seohyang Kim, Hyung-Sin Kim, Chongkwon Kim, “ALICE: Autonomous Link-based Cell Scheduling for TSCH”, ,” in: Proc. of the IPSN , April 16–18,
2019, Montreal, Canada, pp. 1-12. <ALICE>

• Taieb Hamza and Georges Kaddoum “Enhanced Minimal Scheduling Function for IEEE 802.15.4e TSCH Networks”, IEEE Wireless Communications
and Networking Conference, 15- 18 April 2019, Marrakesh, Morocco, pp. 1-7. <EMSF>
• Nastooh Taheri Javan, Masoud Sabaei and Vesal Hakami, “IEEE 802.15.4.e TSCH-Based Scheduling for Throughput Optimization: A Combinatorial
Multi-Armed Bandit Approach”, IEEE Sensors Journal, 2019, pp. 1-12. <CMAB>

• SEUNGBEOM JEONG, JEONGYEUP PAEKz, HYUNG-SIN KIM, and SAEWOONG BAHK “TESLA: Traffic-aware Elastic Slotframe Adjustment in TSCH
Networks”, IEEE Access, 2019, Vol. 4, pp. 1-16. <TESLA>
• Mike O. Ojo, Stefano Giordano, Davide Adami and Michele Pagano, “Throughput Maximizing and Fair Scheduling Algorithms in Industrial Internet of
Things Networks”, IEEE Transactions on Industrial Informatics, 2019. pp.1-11. <Throughput-maximum>

• Vasileios Kotsiou, Georgios Z. Papadopoulos, Periklis Chatzimisios, F. Theoleyre, “Whitelisting without Collisions for Centralized Scheduling in
Wireless Industrial Networks”, IEEE Internet of Things Journal, 2019, pp. 1-9. <Whitelist>
• T. Chang, M. Vucinic, X. Vilajosana, S. Duquennoy, and D. Dujovne, “6TiSCH Minimal Scheduling Function (MSF) draft-ietf-6tisch-msf-16,” April 2020.
<MSF>

• Seungbeom Jeong, Hyung-Sin Kimy, Jeongyeup Paek, and Saewoong Bahk, “OST: On-Demand TSCH Scheduling with Traffic-Awareness,” INFOCOM
2020. <OST>

02-11-2020 Dr. Manas Khatua 28


02-11-2020 Dr. Manas Khatua 29

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy