Re: [6tisch] 6P and Sf0 issue: Piggybacking data packet with IE confirmation

"Pascal Thubert (pthubert)" <pthubert@cisco.com> Wed, 09 March 2016 17:33 UTC

Return-Path: <pthubert@cisco.com>
X-Original-To: 6tisch@ietfa.amsl.com
Delivered-To: 6tisch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B505F12D7EA for <6tisch@ietfa.amsl.com>; Wed, 9 Mar 2016 09:33:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.521
X-Spam-Level:
X-Spam-Status: No, score=-14.521 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([127.0.0.1]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IJrVxUh-Dzrm for <6tisch@ietfa.amsl.com>; Wed, 9 Mar 2016 09:33:23 -0800 (PST)
Received: from rcdn-iport-5.cisco.com (rcdn-iport-5.cisco.com [173.37.86.76]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 267B012D5BE for <6tisch@ietf.org>; Wed, 9 Mar 2016 09:33:23 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=53142; q=dns/txt; s=iport; t=1457544803; x=1458754403; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=fmnF0VVhczosUI1s1/Sl1DnAFdr1t9K2/72rctigRcQ=; b=QLkyY89zqm6Bu+2Zi/9/Kr3d8bO/dZi6Rbj6Sy9DTRcEB8YoYYtruBxI eBGTCJnCn1TZvaDHA4UYEWySiJqRVsdZDKfW9r1w+U/PbD1wILR9uKAHx R1saAUm1wr3y4Dlv2GNF0tIm/hMp82qCI9ImE92jqllpCYt9duJq53Q2y k=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AWAgBsXeBW/5ldJa1dgm9MUm0GqhmQN?= =?us-ascii?q?QENgWoDFwEJhSRKAhyBLTgUAQEBAQEBAWQnhEEBAQEEAQEBIAocJQYFEAIBCBE?= =?us-ascii?q?EAQEhAQYDAgICJQsTAQkIAgQOBQgRh3YDEg6wFI8kAQEBAQEBAQEBAQEBAQEBA?= =?us-ascii?q?QEBAQEBFYYYhEKCPYFNEAIBKAsXCQiCCjgTgScFhh0MgTOPWwGEfIFVhTGBaIF?= =?us-ascii?q?rhEWIU4EzhV6HTAEeAQFCg2RqiBgHHRl+AQEB?=
X-IronPort-AV: E=Sophos; i="5.24,311,1454976000"; d="scan'208,217"; a="81269988"
Received: from rcdn-core-2.cisco.com ([173.37.93.153]) by rcdn-iport-5.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 09 Mar 2016 17:33:21 +0000
Received: from XCH-ALN-004.cisco.com (xch-aln-004.cisco.com [173.36.7.14]) by rcdn-core-2.cisco.com (8.14.5/8.14.5) with ESMTP id u29HXLt6025068 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 9 Mar 2016 17:33:21 GMT
Received: from xch-rcd-001.cisco.com (173.37.102.11) by XCH-ALN-004.cisco.com (173.36.7.14) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Wed, 9 Mar 2016 11:33:21 -0600
Received: from xch-rcd-001.cisco.com ([173.37.102.11]) by XCH-RCD-001.cisco.com ([173.37.102.11]) with mapi id 15.00.1104.009; Wed, 9 Mar 2016 11:33:21 -0600
From: "Pascal Thubert (pthubert)" <pthubert@cisco.com>
To: Qin Wang <qinwang6top@yahoo.com>
Thread-Topic: [6tisch] 6P and Sf0 issue: Piggybacking data packet with IE confirmation
Thread-Index: AQHReiDuK9fwYa3pDkezL/WAa3lIGZ9RXXCw
Date: Wed, 9 Mar 2016 17:33:18 +0000
Deferred-Delivery: Wed, 9 Mar 2016 17:32:42 +0000
Message-ID: <e1382254e0c6471a8b3b5921c87ccad7@XCH-RCD-001.cisco.com>
References: <9162F00F-D55B-4915-852F-ECC378AECBDB@cisco.com> <1156729211.6853109.1457540977549.JavaMail.yahoo@mail.yahoo.com>
In-Reply-To: <1156729211.6853109.1457540977549.JavaMail.yahoo@mail.yahoo.com>
Accept-Language: fr-FR, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.61.233.222]
Content-Type: multipart/alternative; boundary="_000_e1382254e0c6471a8b3b5921c87ccad7XCHRCD001ciscocom_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/6tisch/hczDhcYnH5FtLMVdjARmxXj7nDA>
Cc: Lijo Thomas <lijo@cdac.in>, "6tisch@ietf.org" <6tisch@ietf.org>, "Prof. Diego Dujovne" <diego.dujovne@mail.udp.cl>
Subject: Re: [6tisch] 6P and Sf0 issue: Piggybacking data packet with IE confirmation
X-BeenThere: 6tisch@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "Discuss link layer model for Deterministic IPv6 over the TSCH mode of IEEE 802.15.4e, and impacts on RPL and 6LoWPAN such as resource allocation" <6tisch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/6tisch>, <mailto:6tisch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/6tisch/>
List-Post: <mailto:6tisch@ietf.org>
List-Help: <mailto:6tisch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/6tisch>, <mailto:6tisch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 09 Mar 2016 17:33:26 -0000

With this method, Qin:

Step 1 is performed once and that’s probably it for life unless the child needs more than 16 cells; Step 2 is really the add/delete flow.

Child says “add 3” and the parent responds with the bitmap with 3 more bits set. If the child does not see the response it may say “add 0” and get the bitmap from the parent perspective, with either no additional bit if the request was lost or the expected 3 more bits if the response was lost.

This approach removes the need for transactionality. The parent may opportunistically / periodically resend the bitmap to the child just to make sure the child has the correct view.

Cheers,

Pascal

From: Qin Wang [mailto:qinwang6top@yahoo.com]
Sent: mercredi 9 mars 2016 17:30
To: Pascal Thubert (pthubert) <pthubert@cisco.com>
Cc: Lijo Thomas <lijo@cdac.in>in>; Prof. Diego Dujovne <diego.dujovne@mail.udp.cl>cl>; 6tisch@ietf.org
Subject: Re: [6tisch] 6P and Sf0 issue: Piggybacking data packet with IE confirmation

Hi Pascal,

I want confirm what I understood.
(1) Both step1 and step2 are extra message besides ADD/DELETE message exchange
(2) Because the step1 and step2, Child will know which cells it can use. Then, when the child wants more cells,  the child selects the cells from those set as UNUSED in the bitmap, as candidates, and send ADD request to parent. And the parent will send Response to confirm. That is 2-stages, instead of 3-stages message exchange.

Thanks
Qin



On Wednesday, March 9, 2016 3:05 AM, Pascal Thubert (pthubert) <pthubert@cisco.com<mailto:pthubert@cisco.com>> wrote:

Hello Qin:

Please consider the message by Tero.

The ack is Mac-layer before upper layer processing and does not guarantee success in the stack.

What we'd really want is suppress the MAC layer ack but not the 6P response.

Another angle (for the sake of making sure we left no stone unturned).

If we think transactionality is too difficult to achieve and that parent/child may lose sync: it is possible to avoid the issues with transactionality by using a bitmap to represent cells like LoRa does with frequencies.

Step 1 the parent provides a list of cells (say 16) that it may allocate to that child in the future. The list may differ per child and may overlap with other children to enable to parent to temporarily give a cell to one child or another.

Step 2 (runtime) the parent sends the bitmap of the cells, bit set if the cell is use child to parent. If this is sent regularly like a frame relay full status, things will eventually sync.

What do you think?

Pascal

Le 8 mars 2016 à 22:34, Qin Wang <qinwang6top@yahoo.com<mailto:qinwang6top@yahoo.com>> a écrit :
Hi Diego,

I also have question regarding to the third message, i.e. Child acknowledge.

In this case, the Child must accept the selected cells in the Parent's message if it received the message. Right? In another word, if the Parent knows the Child has received the message correctly, the Parent can be sure that the selected cells will be added/deleted into/from the Child's schedule. Since the MAC layer ACK can tell Parent the Child has received its message correctly, I think there is no need for the Child to send back the 6P layer Acknowledgement.

Do I miss something?

Thanks
Qin

On Friday, March 4, 2016 7:51 AM, Lijo Thomas <lijo@cdac.in<mailto:lijo@cdac.in>> wrote:

Hi Diego,


Do we really require 3 transactions for 6P operations as mentioned.

The second transaction from the parent contains all the required information  for the task.

In case the 2nd packet is lost, the parent will schedule a RX link which will be unutilized for the time being and can be reallocated depending on the scheduling function.

But if the 3rd transaction is lost, the client will allocate the TX link  and will start transmitting packets.

So can we avoid the ACK packet(3rd transaction) from the client, or is there any added benefit.


Thanks & Regards,
Lijo Thomas





From: 6tisch [mailto:6tisch-bounces@ietf.org] On Behalf Of Prof. Diego Dujovne
Sent: 03 March 2016 21:11
To: 6tisch@ietf.org<mailto:6tisch@ietf.org>
Subject: [6tisch] 6P and Sf0 issue: Piggybacking data packet with IE confirmation

Dear all,
            Given that there is parent preference in cell
selection, a child-initiated transaction triggers a three-step
exchange:
1- Child sends request to Parent with whitelist/blacklist of slotoffsets
2- Parent selects cells
3- Child acknowledges and finishes the transaction
The main idea is to enable an optional Piggybacking of the IE on a
data packet to reduce the number of transmitted packets, but there
are latency concerns when the (data) traffic is low.
Is it worth to enable this option given the added complexity?
Regards,
                                Diego Dujovne

--
DIEGO DUJOVNE
Académico Escuela de Ingeniería en Informática y Telecomunicaciones
Facultad de Ingeniería UDP
www.ingenieria.udp.cl<http://www.ingenieria.udp.cl/>
(56 2) 676 8125

-------------------------------------------------------------------------------------------------------------------------------
[ C-DAC is on Social-Media too. Kindly follow us at:
Facebook: https://www.facebook.com/CDACINDIA & Twitter: @cdacindia ]

This e-mail is for the sole use of the intended recipient(s) and may
contain confidential and privileged information. If you are not the
intended recipient, please contact the sender by reply e-mail and destroy
all copies and the original message. Any unauthorized review, use,
disclosure, dissemination, forwarding, printing or copying of this email
is strictly prohibited and appropriate legal action will be taken.
-------------------------------------------------------------------------------------------------------------------------------

_______________________________________________
6tisch mailing list
6tisch@ietf.org<mailto:6tisch@ietf.org>
https://www.ietf.org/mailman/listinfo/6tisch

_______________________________________________
6tisch mailing list
6tisch@ietf.org<mailto:6tisch@ietf.org>
https://www.ietf.org/mailman/listinfo/6tisch