| < draft-ietf-detnet-problem-statement-06.txt | draft-ietf-detnet-problem-statement-07.txt > | |||
|---|---|---|---|---|
| detnet N. Finn | DetNet N. Finn | |||
| Internet-Draft Huawei Technologies Co. Ltd | Internet-Draft Huawei Technologies Co. Ltd | |||
| Intended status: Informational P. Thubert | Intended status: Informational P. Thubert | |||
| Expires: January 17, 2019 Cisco | Expires: April 6, 2019 Cisco | |||
| July 16, 2018 | October 3, 2018 | |||
| Deterministic Networking Problem Statement | Deterministic Networking Problem Statement | |||
| draft-ietf-detnet-problem-statement-06 | draft-ietf-detnet-problem-statement-07 | |||
| Abstract | Abstract | |||
| This paper documents the needs in various industries to establish | This paper documents the needs in various industries to establish | |||
| multi-hop paths for characterized flows with deterministic | multi-hop paths for characterized flows with deterministic | |||
| properties. | properties. | |||
| Status of This Memo | Status of This Memo | |||
| This Internet-Draft is submitted in full conformance with the | This Internet-Draft is submitted in full conformance with the | |||
| skipping to change at page 1, line 33 ¶ | skipping to change at page 1, line 33 ¶ | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at https://datatracker.ietf.org/drafts/current/. | Drafts is at https://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on January 17, 2019. | This Internet-Draft will expire on April 6, 2019. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2018 IETF Trust and the persons identified as the | Copyright (c) 2018 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (https://trustee.ietf.org/license-info) in effect on the date of | (https://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| skipping to change at page 2, line 19 ¶ | skipping to change at page 2, line 19 ¶ | |||
| 3. Problem Statement . . . . . . . . . . . . . . . . . . . . . . 6 | 3. Problem Statement . . . . . . . . . . . . . . . . . . . . . . 6 | |||
| 3.1. Supported topologies . . . . . . . . . . . . . . . . . . 6 | 3.1. Supported topologies . . . . . . . . . . . . . . . . . . 6 | |||
| 3.2. Flow Characterization . . . . . . . . . . . . . . . . . . 6 | 3.2. Flow Characterization . . . . . . . . . . . . . . . . . . 6 | |||
| 3.3. Centralized Path Computation and Installation . . . . . . 6 | 3.3. Centralized Path Computation and Installation . . . . . . 6 | |||
| 3.4. Distributed Path Setup . . . . . . . . . . . . . . . . . 7 | 3.4. Distributed Path Setup . . . . . . . . . . . . . . . . . 7 | |||
| 3.5. Duplicated data format . . . . . . . . . . . . . . . . . 8 | 3.5. Duplicated data format . . . . . . . . . . . . . . . . . 8 | |||
| 4. Security Considerations . . . . . . . . . . . . . . . . . . . 8 | 4. Security Considerations . . . . . . . . . . . . . . . . . . . 8 | |||
| 5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 9 | 5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 9 | |||
| 6. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 9 | 6. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 9 | |||
| 7. Informative References . . . . . . . . . . . . . . . . . . . 9 | 7. Informative References . . . . . . . . . . . . . . . . . . . 9 | |||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 10 | Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 11 | |||
| 1. Introduction | 1. Introduction | |||
| The Deterministic Networking Use Cases [I-D.ietf-detnet-use-cases] | The Deterministic Networking Use Cases [I-D.ietf-detnet-use-cases] | |||
| document illustrates that beyond the classical case of industrial | document illustrates that beyond the classical case of industrial | |||
| automation and control systems (IACS), there are in fact multiple | automation and control systems (IACS), there are in fact multiple | |||
| industries with strong and yet relatively similar needs for | industries with strong and yet relatively similar needs for | |||
| deterministic network services with latency guarantees and ultra-low | deterministic network services with latency guarantees and ultra-low | |||
| packet loss. | packet loss. | |||
| skipping to change at page 2, line 50 ¶ | skipping to change at page 2, line 50 ¶ | |||
| 2 control systems, whereas public infrastructures such as Electricity | 2 control systems, whereas public infrastructures such as Electricity | |||
| Automation require deterministic properties over the Wide Area. The | Automation require deterministic properties over the Wide Area. The | |||
| realization is now coming that the convergence of IT and Operational | realization is now coming that the convergence of IT and Operational | |||
| Technology (OT) networks requires Layer-3, as well as Layer-2, | Technology (OT) networks requires Layer-3, as well as Layer-2, | |||
| capabilities. | capabilities. | |||
| While the initial user base has focused almost entirely on Ethernet | While the initial user base has focused almost entirely on Ethernet | |||
| physical media and Ethernet-based bridging protocol (from several | physical media and Ethernet-based bridging protocol (from several | |||
| Standards Development Organizations), the need for Layer-3 expressed | Standards Development Organizations), the need for Layer-3 expressed | |||
| above, must not be confined to Ethernet and Ethernet-like media, and | above, must not be confined to Ethernet and Ethernet-like media, and | |||
| while such media must be encompassed by any useful DetNet | while such media must be encompassed by any useful Deterministic | |||
| architecture, cooperation between IETF and other SDOs must not be | Networking (DetNet) Architecture, cooperation between IETF and other | |||
| limited to IEEE or IEEE 802. Furthermore, while the work completed | SDOs must not be limited to IEEE or IEEE 802. Furthermore, while the | |||
| and ongoing in other SDOs, and in IEEE 802 in particular, provide an | work completed and ongoing in other SDOs, and in IEEE 802 in | |||
| obvious starting point for a DetNet architecture, we must not assume | particular, provide an obvious starting point for a DetNet | |||
| that these other SDOs' work confines the space in which the DetNet | architecture, we must not assume that these other SDOs' work confines | |||
| architecture progresses. | the space in which the DetNet architecture progresses. | |||
| The properties of deterministic networks will have specific | The properties of deterministic networks will have specific | |||
| requirements for the use of routed networks to support these | requirements for the use of routed networks to support these | |||
| applications and a new model must be proposed to integrate | applications and a new model must be proposed to integrate | |||
| determinism in IT technology. The proposed model should enable a | determinism in IT technology. The proposed model should enable a | |||
| fully scheduled operation orchestrated by a central controller, and | fully scheduled operation orchestrated by a central controller, and | |||
| may support a more distributed operation with probably lesser | may support a more distributed operation with probably lesser | |||
| capabilities. In any fashion, the model should not compromise the | capabilities. In any fashion, the model should not compromise the | |||
| ability of a network to keep carrying the sorts of traffic that is | ability of a network to keep carrying the sorts of traffic that is | |||
| already carried today in conjunction with new, more deterministic | already carried today in conjunction with new, more deterministic | |||
| flows. | flows. Forward note: The DetNet Architecture | |||
| [I-D.ietf-detnet-architecture] is the document produced by the DetNet | ||||
| WG to describe that model. | ||||
| Once the abstract model is agreed upon, the IETF will need to specify | Once the abstract model is agreed upon, the IETF will need to specify | |||
| the signaling elements to be used to establish a path and the tagging | the signaling elements to be used to establish a path and the tagging | |||
| elements to be used identify the flows that are to be forwarded along | elements to be used identify the flows that are to be forwarded along | |||
| that path. The IETF will also need to specify the necessary | that path. The IETF will also need to specify the necessary | |||
| protocols, or protocol additions, based on relevant IETF | protocols, or protocol additions, based on relevant IETF | |||
| technologies, to implement the selected model. | technologies, to implement the selected model. | |||
| As a result of this work, it will be possible to establish a multi- | As a result of this work, it will be possible to establish a multi- | |||
| hop path over the IP or MPLS network, for a particular flow with | hop path over the IP or MPLS network, for a particular flow with | |||
| skipping to change at page 4, line 7 ¶ | skipping to change at page 4, line 8 ¶ | |||
| The Internet is not the only digital network that has grown | The Internet is not the only digital network that has grown | |||
| dramatically over the last 30-40 years. Video and audio | dramatically over the last 30-40 years. Video and audio | |||
| entertainment, and control systems for machinery, manufacturing | entertainment, and control systems for machinery, manufacturing | |||
| processes, and vehicles are also ubiquitous, and are now based almost | processes, and vehicles are also ubiquitous, and are now based almost | |||
| entirely on digital technologies. Over the past 10 years, engineers | entirely on digital technologies. Over the past 10 years, engineers | |||
| in these fields have come to realize that significant advantages in | in these fields have come to realize that significant advantages in | |||
| both cost and in the ability to accelerate growth can be obtained by | both cost and in the ability to accelerate growth can be obtained by | |||
| basing all of these disparate digital technologies on packet | basing all of these disparate digital technologies on packet | |||
| networks. | networks. | |||
| The goals of Deterministic Networking (DetNet) are to enable the | The goals of Deterministic Networking are to enable the migration of | |||
| migration of applications with critical timing and reliability issues | applications with critical timing and reliability issues that | |||
| that currently use special-purpose fieldbus technologies (HDMI, | currently use special-purpose fieldbus technologies (HDMI, CANbus, | |||
| CANbus, ProfiBus, etc... even RS-232!) to packet technologies in | ProfiBus, etc... even RS-232!) to packet technologies in general, and | |||
| general, and the Internet Protocol in particular, and to support both | the Internet Protocol in particular, and to support both these new | |||
| these new applications, and existing packet network applications, | applications, and existing packet network applications, over the same | |||
| over the same physical network. | physical network. In other words, a Deterministic Network is | |||
| backwards compatible with - capable of transporting - statistically | ||||
| multiplexed traffic while preserving the properties of the accepted | ||||
| deterministic flows. | ||||
| Considerable experience ([ODVA]/[EIP],[AVnu], | Considerable experience ([ODVA]/[EIP],[AVnu], | |||
| [Profinet],[HART],[IEC62439], [ISA100.11a] and [WirelessHART], | [Profinet],[HART],[IEC62439], [ISA100.11a] and [WirelessHART], | |||
| etc...) has shown that these applications need a some or all of a | etc...) has shown that these applications need a some or all of a | |||
| suite of features that includes: | suite of features that includes: | |||
| 1. Time synchronization of all host and network nodes (routers and/ | 1. Time synchronization of all host and network nodes (routers and/ | |||
| or bridges), accurate to something between 10 nanoseconds and 10 | or bridges), accurate to something between 10 nanoseconds and 10 | |||
| microseconds, depending on the application. | microseconds, depending on the application. | |||
| skipping to change at page 5, line 8 ¶ | skipping to change at page 5, line 12 ¶ | |||
| transmission schedule, or by a maximum bandwidth and packet | transmission schedule, or by a maximum bandwidth and packet | |||
| size; | size; | |||
| 3. Multiple methods to schedule, shape, limit, and otherwise control | 3. Multiple methods to schedule, shape, limit, and otherwise control | |||
| the transmission of critical packets at each hop through the | the transmission of critical packets at each hop through the | |||
| network data plane; | network data plane; | |||
| 4. Robust defenses against misbehaving hosts, routers, or bridges, | 4. Robust defenses against misbehaving hosts, routers, or bridges, | |||
| both in the data and control planes, with guarantees that a | both in the data and control planes, with guarantees that a | |||
| critical flow within its guaranteed resources cannot be affected | critical flow within its guaranteed resources cannot be affected | |||
| by other flows whatever the pressures on the network; | by other flows whatever the pressures on the network - more on | |||
| the specific threats against DetNet in the DetNet Security | ||||
| Considerations [I-D.ietf-detnet-security] document; | ||||
| 5. One or more methods to reserve resources in bridges and routers | 5. One or more methods to reserve resources in bridges and routers | |||
| to carry these flows. | to carry these flows. | |||
| Time synchronization techniques need not be addressed by an IETF | Time synchronization techniques need not be addressed by an IETF | |||
| Working Group; there are a number of standards available for this | Working Group; there are a number of standards available for this | |||
| purpose, including IEEE 1588, IEEE 802.1AS, and more. | purpose, including IEEE 1588, IEEE 802.1AS, and more. | |||
| The multicast, latency, loss ratio, and non-throttling needs are made | The multicast, latency, loss ratio, and non-throttling needs are made | |||
| necessary by the algorithms employed by the applications. They are | necessary by the algorithms employed by the applications. They are | |||
| skipping to change at page 9, line 4 ¶ | skipping to change at page 9, line 11 ¶ | |||
| other flows at other times. | other flows at other times. | |||
| The overall security of a deterministic system must cover: | The overall security of a deterministic system must cover: | |||
| o the protection of the signaling protocol | o the protection of the signaling protocol | |||
| o the authentication and authorization of the controlling nodes | o the authentication and authorization of the controlling nodes | |||
| including plug-and-play participating end systems. | including plug-and-play participating end systems. | |||
| o the identification and shaping of the flows | o the identification and shaping of the flows | |||
| o the isolation of flows from leakage and other influences from any | o the isolation of flows from leakage and other influences from any | |||
| activity sharing physical resources. | activity sharing physical resources. | |||
| The specific threats against DetNet are further discussed in the | ||||
| DetNet Security Considerations [I-D.ietf-detnet-security] document. | ||||
| 5. IANA Considerations | 5. IANA Considerations | |||
| This document does not require an action from IANA. | This document does not require an action from IANA. | |||
| 6. Acknowledgments | 6. Acknowledgments | |||
| The authors wish to thank Lou Berger, Stewart Bryant, Janos Farkas, | The authors wish to thank Lou Berger, Stewart Bryant, Janos Farkas, | |||
| Andrew Malis, Jouni Korhonen, Erik Nordmark, George Swallow, Rudy | Andrew Malis, Jouni Korhonen, Erik Nordmark, George Swallow, Lou | |||
| Klecka, Anca Zamfir, David Black, Thomas Watteyne, Shitanshu Shah, | Berger, Ines Robles, Shwetha Bhandari, Rudy Klecka, Anca Zamfir, | |||
| Kiran Makhijani, Craig Gunther, Rodney Cummings, Wilfried Steiner, | David Black, Thomas Watteyne, Shitanshu Shah, Kiran Makhijani, Craig | |||
| Marcel Kiessling, Karl Weber, Ethan Grossman, Patrick Wetterwald, | Gunther, Rodney Cummings, Wilfried Steiner, Marcel Kiessling, Karl | |||
| Subha Dhesikan, Rudy Klecka and Pat Thaler for their various | Weber, Ethan Grossman, Patrick Wetterwald, Subha Dhesikan, Rudy | |||
| contributions to this work. | Klecka and Pat Thaler for their various contributions to this work. | |||
| 7. Informative References | 7. Informative References | |||
| [AVnu] http://www.avnu.org/, "The AVnu Alliance tests and | [AVnu] http://www.avnu.org/, "The AVnu Alliance tests and | |||
| certifies devices for interoperability, providing a simple | certifies devices for interoperability, providing a simple | |||
| and reliable networking solution for AV network | and reliable networking solution for AV network | |||
| implementation based on the IEEE Audio Video Bridging | implementation based on the IEEE Audio Video Bridging | |||
| (AVB) and Time-Sensitive Networking (TSN) standards.". | (AVB) and Time-Sensitive Networking (TSN) standards.". | |||
| [EIP] http://www.odva.org/, "EtherNet/IP provides users with the | [EIP] http://www.odva.org/, "EtherNet/IP provides users with the | |||
| skipping to change at page 9, line 42 ¶ | skipping to change at page 10, line 5 ¶ | |||
| automation applications while enabling Internet and | automation applications while enabling Internet and | |||
| enterprise connectivity data anytime, anywhere.", | enterprise connectivity data anytime, anywhere.", | |||
| <http://www.odva.org/Portals/0/Library/ | <http://www.odva.org/Portals/0/Library/ | |||
| Publications_Numbered/ | Publications_Numbered/ | |||
| PUB00138R3_CIP_Adv_Tech_Series_EtherNetIP.pdf>. | PUB00138R3_CIP_Adv_Tech_Series_EtherNetIP.pdf>. | |||
| [HART] www.hartcomm.org, "Highway Addressable Remote Transducer, | [HART] www.hartcomm.org, "Highway Addressable Remote Transducer, | |||
| a group of specifications for industrial process and | a group of specifications for industrial process and | |||
| control devices administered by the HART Foundation". | control devices administered by the HART Foundation". | |||
| [I-D.ietf-detnet-architecture] | ||||
| Finn, N., Thubert, P., Varga, B., and J. Farkas, | ||||
| "Deterministic Networking Architecture", draft-ietf- | ||||
| detnet-architecture-08 (work in progress), September 2018. | ||||
| [I-D.ietf-detnet-security] | ||||
| Mizrahi, T., Grossman, E., Hacker, A., Das, S., Dowdell, | ||||
| J., Austad, H., Stanton, K., and N. Finn, "Deterministic | ||||
| Networking (DetNet) Security Considerations", draft-ietf- | ||||
| detnet-security-02 (work in progress), April 2018. | ||||
| [I-D.ietf-detnet-use-cases] | [I-D.ietf-detnet-use-cases] | |||
| Grossman, E., "Deterministic Networking Use Cases", draft- | Grossman, E., "Deterministic Networking Use Cases", draft- | |||
| ietf-detnet-use-cases-17 (work in progress), June 2018. | ietf-detnet-use-cases-18 (work in progress), September | |||
| 2018. | ||||
| [IEC62439] | [IEC62439] | |||
| IEC, "Industrial communication networks - High | IEC, "Industrial communication networks - High | |||
| availability automation networks - Part 3: Parallel | availability automation networks - Part 3: Parallel | |||
| Redundancy Protocol (PRP) and High-availability Seamless | Redundancy Protocol (PRP) and High-availability Seamless | |||
| Redundancy (HSR) - IEC62439-3", 2012, | Redundancy (HSR) - IEC62439-3", 2012, | |||
| <https://webstore.iec.ch/publication/7018>. | <https://webstore.iec.ch/publication/7018>. | |||
| [IEEE802.1TSNTG] | [IEEE802.1TSNTG] | |||
| IEEE Standards Association, "IEEE 802.1 Time-Sensitive | IEEE Standards Association, "IEEE 802.1 Time-Sensitive | |||
| End of changes. 14 change blocks. | ||||
| 29 lines changed or deleted | 52 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||