Module 3 - Chapter5 - Notes
Module 3 - Chapter5 - Notes
1B 1B 2B 1B
802.15.4 6LoWPAN Datagram Datagram Tag Datagram FCS
Header fragmentation Size Offset
header field
Figure 3.4: 6LoWPAN Fragmentation Header
6LoWPAN fragmentation header field - 1byte: it is set to unique bit value that tells, subsequent
fields behind it are the fragment fields. It has the following three fields:
1. Datagram size: 1 byte- specifies the total size of the unfragmented payload
2. Datagram tag: 2 bytes- it identifies the set of fragments for a payload.
3. Datagram Offset field: 1 byte- it tells how far this fragment is from the first fragment.
Hence this field is absent in the first fragment.
Mesh Addressing
The purpose of 6LoWPAN mesh addressing function is to forward packets over multiple hops
within the mesh. This can be used only in a single IP subnet. It is usually used when layer2
performs the routing (mesh under). Figure 3.5 shows 6LoWPAN Mesh Addressing Header.
1B 2B 2B
802.15.4 6LoWPAN mesh Source Address Destination Address FCS
Header Addressing header-
hop count
Figure 3.5: 6LoWPAN Mesh Addressing Header
1. Mesh-Under routing: The term "mesh under" tells that multiple link layer hops can be used to
complete a single IP hop. Here the Routing of IP packets is handled at the 6LoWPAN Adaptation
layer. Nodes have a Layer 2 forwarding table. This table is consulted to route the packets to their
final destination within the mesh. An edge gateway terminates this mesh-under domain.
2. Mesh- over routing: (also called route-over) uses IP routing (layer 3 routing) to forward the
packets to destination either inside or outside the mesh domain. Each full functioning node acts as
an IP router and each link layer hop is an IP hop. When a LoWPAN is implemented using different
link layer technologies, mesh-over routing setup is useful. Along with traditional IP routing
protocols, a specialised routing protocol for smart objects RPL can also be used.
6Lo Working Group focuses on IPV6 connectivity over constrained- node networks. This group
particularly focuses on the following:
1. IPV6-over-foo adaptation layer specifications using 6LoWPAN technologies for link layer
technologies: This includes transmission of IPV6 packets over the following:
• Bluetooth low energy
• Near field communication
• 802.11ah
• DECT Ultra Low Energy
• WIA-PA (Wireless Networks for Industrial Automation- Process Automation)
• Master Slave/ Token Passing (MS/TP)
2. Information and data models such as MIB modules
3. Optimizations that are applicable to more than one adaptation layer specification
4. Informational and maintenance publications needed for the IETF specifications in this area
6TiSCH
IEEE 802.15.4e, Time Slotted Channel Hopping (TSCH) is a standardized, deterministic
communication path over wireless networks. 6TiSCH is the IPV6 standardization of TSCH mode
of IEEE 802.15.4e. This is given by IEEE 802.15.4e working group. TSCH communicates by
following Time Division Multiple Access (TDMA) schedule. A unit of bandwidth or time slot is
scheduled between neighbor nodes. 6TiSCH performs the following two jobs:
1. Schedule Management
2. Packet Forwarding
6top
6top is a sublayer that exists in between MAC layer (i.e IEEE 802.15.e TCSH) and 6LoWPAN
Header Compression Adaptation layer as shown in figure 3.6. This sublayer provides commands
to the upper network layers. These commands enable functionalities including network layer
routing decisions, configurations and control procedures for 6TiSCH schedule management.
IPV6
6LoWPAN HC
➔ 6top
IEEE 802.15.e TCSH
Figure 3.6 Location of 6TiSCH’s 6top Sublayer
Schedule Management
Basically, 6TiSCH is scheduling algorithm that decides how the time slots are utilized. This
scheduling affects throughput, latency and power consumption. Schedules in 6TiSCH are broken
down into cells. A cell is a single element in the TSCH schedule that can be allocated for
unidirectional or bidirectional communications between specific nodes. Nodes will transmit only
when schedule announces that their cell is open for communication. The 6TiSCH architecture
defines four schedule management mechanisms:
1. Static scheduling:
All nodes in the constrained network share a fixed schedule.
Cells are shared, nodes contend for slot access using slotted ALOHA
Nodes may expect a packet at any cell in the schedule.
Energy is wasted idly listening across all cells
2. Neighbor-to-neighbor scheduling
A schedule is established by observing the correlation and number of transmissions
between nodes
Cells can be added or deleted depending on traffic requirements and bandwidth
3. Remote monitoring and scheduling management
Time slots and other resources are allocated and managed remotely
4. Hop-by-hop scheduling
A node reserves a path to a destination node that is multiple hops away by requesting
the allocation of cells in a schedule at each intermediate node hop in the path.
Packet Forwarding Models
6TiSCH architecture defines three forwarding models. They are:
1. Track Forwarding (TF)
This is a simplest and fastest forwarding model.
A track is a unidirectional path between a source and a destination.
Track is formed by pairing bundles of receive cells in a schedule with a bundle of receive
cells set to transmit
A frame received within a particular cell/cell bundle is switched to another cell/cell bundle
Network layer protocol is not involved in this forwarding
2. Fragment forwarding (FF)
First fragment is routed based on the IPV6 header.
The sub-layer learns the next-hop selection of the first fragment, which is applied to all
subsequent fragments of that packet
3. IPV6 Forwarding (6F)
This model forwards the traffic based on its IPV6 routing table
Flow of packets is prioritized by traditional QoS and RED operations. QoS(Quality of
Service) is a classification scheme for flows based on their priority and RED(Random Early
Detection) is a common congestion avoidance mechanism.
DAG Root