Network Working Group G. Wang
Internet Draft G. Feng
Intended status: Standards Track UESTC
Expires: May 2014 November 29, 2013
Network Coding for Enhancing Data Robustness in Low-Power and Lossy
Networks
draft-wang-roll-data-robustness-00.txt
Status of this Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute working
documents as Internet-Drafts. The list of current Internet-Drafts is
at http://datatracker.ietf.org/drafts/current.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on May 29, 2014.
Copyright Notice
Copyright (c) 2013 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents carefully,
as they describe your rights and restrictions with respect to this
document.
Abstract
This document specifies a solution for improving the robustness of
data transmission in multi-hop Low-Power and Lossy Networks (LLNs).
It uses the network coding technique in conjunction with the Routing
Protocol for LLNs (RPL) to increase the success rate of data
Wang Expires May 29, 2014 [Page 1]
Internet-Draft Network Coding in LLNs November 2013
collection at the sink node, with reasonable processing and traffic
cost.
Table of Contents
1. Introduction ................................................ 3
2. Terminology ................................................. 3
3. Protocol Overview ........................................... 5
4. Packet Format ............................................... 6
4.1. Coding Option .......................................... 6
4.2. Coding Control Messages ................................ 7
4.2.1. Degree Advertisement Message ...................... 7
4.2.2. Coding Period Start Message ....................... 8
4.2.3. Coding Procedure Pause Message .................... 8
5. Retrieve Information from Network ........................... 9
5.1. Sensor Nodes Number .................................... 9
5.2. Neighbor Nodes Number .................................. 9
5.3. Child Nodes Number .................................... 10
6. Coding Procedure Control ................................... 11
6.1. Coding Period ......................................... 11
6.2. Growth of Coding Degree ............................... 12
7. Coding Packet Processing ................................... 15
7.1. Coding Packet and Codewords ........................... 15
7.1.1. Codewords and Packets Transformation ............. 15
7.1.2. The Addition of Codewords ........................ 17
7.2. Receiving Packet ...................................... 18
7.3. Sending Packet ........................................ 19
7.4. Encoding and Decoding ................................. 21
8. Constants and Variables .................................... 21
9. Security Considerations .................................... 22
10. IANA Considerations........................................ 23
10.1. Additions to Hop-by-Hop Options ...................... 23
10.2. New Registry for Coding Option's Flags ............... 23
10.3. Coding Control Message ............................... 24
10.4. New Registry for Coding Control Codes ................ 24
10.5. Child Flag ........................................... 24
11. References ................................................ 25
11.1. Normative References ................................. 25
11.2. Informative References ............................... 25