datatracker.ietf.org
Sign in
Version 5.4.2, 2014-04-30
Report a bug

Network Coding for Enhancing Data Robustness in Low-Power and Lossy Networks
draft-wang-roll-data-robustness-00

Document type: Active Internet-Draft (individual)
Document stream: No stream defined
Last updated: 2013-11-28
Intended RFC status: Unknown
Other versions: plain text, pdf, html

Stream State:No stream defined
Document shepherd: No shepherd assigned

IESG State: I-D Exists
Responsible AD: (None)
Send notices to: No addresses provided

Network Working Group                                         G. Wang 
    Internet Draft                                                G. Feng 
    Intended status: Standards Track                                UESTC 
    Expires: May 2014                                    November 29, 2013 
                                       
     
                                          
        Network Coding for Enhancing Data Robustness in Low-Power and Lossy 
                                     Networks 
                      draft-wang-roll-data-robustness-00.txt 

    Status of this Memo 

       This Internet-Draft is submitted in full conformance with the 
       provisions of BCP 78 and BCP 79.  

       Internet-Drafts are working documents of the Internet Engineering 
       Task Force (IETF). Note that other groups may also distribute working 
       documents as Internet-Drafts. The list of current Internet-Drafts is 
       at http://datatracker.ietf.org/drafts/current. 

       Internet-Drafts are draft documents valid for a maximum of six months 
       and may be updated, replaced, or obsoleted by other documents at any 
       time. It is inappropriate to use Internet-Drafts as reference 
       material or to cite them other than as "work in progress." 

       This Internet-Draft will expire on May 29, 2014. 

    Copyright Notice 

       Copyright (c) 2013 IETF Trust and the persons identified as the 
       document authors. All rights reserved. 

       This document is subject to BCP 78 and the IETF Trust's Legal 
       Provisions Relating to IETF Documents 
       (http://trustee.ietf.org/license-info) in effect on the date of 
       publication of this document. Please review these documents carefully, 
       as they describe your rights and restrictions with respect to this 
       document.  

    Abstract 

       This document specifies a solution for improving the robustness of 
       data transmission in multi-hop Low-Power and Lossy Networks (LLNs). 
       It uses the network coding technique in conjunction with the Routing 
       Protocol for LLNs (RPL) to increase the success rate of data 

     

     
     
    Wang                    Expires May 29, 2014                  [Page 1] 
     

    Internet-Draft         Network Coding in LLNs            November 2013 
        

       collection at the sink node, with reasonable processing and traffic 
       cost. 

    Table of Contents 

        
       1. Introduction ................................................ 3 
       2. Terminology ................................................. 3 
       3. Protocol Overview ........................................... 5 
       4. Packet Format ............................................... 6 
          4.1. Coding Option .......................................... 6 
          4.2. Coding Control Messages ................................ 7 
             4.2.1. Degree Advertisement Message ...................... 7 
             4.2.2. Coding Period Start Message ....................... 8 
             4.2.3. Coding Procedure Pause Message .................... 8 
       5. Retrieve Information from Network ........................... 9 
          5.1. Sensor Nodes Number .................................... 9 
          5.2. Neighbor Nodes Number .................................. 9 
          5.3. Child Nodes Number .................................... 10 
       6. Coding Procedure Control ................................... 11 
          6.1. Coding Period ......................................... 11 
          6.2. Growth of Coding Degree ............................... 12 
       7. Coding Packet Processing ................................... 15 
          7.1. Coding Packet and Codewords ........................... 15 
             7.1.1. Codewords and Packets Transformation ............. 15 
             7.1.2. The Addition of Codewords ........................ 17 
          7.2. Receiving Packet ...................................... 18 
          7.3. Sending Packet ........................................ 19 
          7.4. Encoding and Decoding ................................. 21 
       8. Constants and Variables .................................... 21 
       9. Security Considerations .................................... 22 
       10. IANA Considerations........................................ 23 
          10.1. Additions to Hop-by-Hop Options ...................... 23 
          10.2. New Registry for Coding Option's Flags ............... 23 
          10.3. Coding Control Message ............................... 24 
          10.4. New Registry for Coding Control Codes ................ 24 
          10.5. Child Flag ........................................... 24 
       11. References ................................................ 25 
          11.1. Normative References ................................. 25 
          11.2. Informative References ............................... 25 

[include full document text]