| < draft-ietf-raw-architecture-01.txt | draft-ietf-raw-architecture-02.txt > | |||
|---|---|---|---|---|
| RAW P. Thubert, Ed. | RAW P. Thubert, Ed. | |||
| Internet-Draft Cisco Systems | Internet-Draft Cisco Systems | |||
| Intended status: Informational G.Z. Papadopoulos | Intended status: Informational G.Z. Papadopoulos | |||
| Expires: 29 January 2022 IMT Atlantique | Expires: 2 June 2022 IMT Atlantique | |||
| L. Berger | 29 November 2021 | |||
| LabN Consulting, L.L.C. | ||||
| 28 July 2021 | ||||
| Reliable and Available Wireless Architecture/Framework | Reliable and Available Wireless Architecture | |||
| draft-ietf-raw-architecture-01 | draft-ietf-raw-architecture-02 | |||
| Abstract | Abstract | |||
| Reliable and Available Wireless (RAW) provides for high reliability | Reliable and Available Wireless (RAW) provides for high reliability | |||
| and availability for IP connectivity over a wireless medium. The | and availability for IP connectivity over a wireless medium. The | |||
| wireless medium presents significant challenges to achieve | wireless medium presents significant challenges to achieve | |||
| deterministic properties such as low packet error rate, bounded | deterministic properties such as low packet error rate, bounded | |||
| consecutive losses, and bounded latency. This document defines the | consecutive losses, and bounded latency. This document defines the | |||
| RAW Architecture following an OODA loop that involves OAM, PCE, PSE | RAW Architecture following an OODA loop that involves OAM, PCE, PSE | |||
| and PAREO functions. It builds on the DetNet Architecture and | and PAREO functions. It builds on the DetNet Architecture and | |||
| skipping to change at page 1, line 43 ¶ | skipping to change at page 1, line 41 ¶ | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at https://datatracker.ietf.org/drafts/current/. | Drafts is at https://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on 29 January 2022. | This Internet-Draft will expire on 2 June 2022. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2021 IETF Trust and the persons identified as the | Copyright (c) 2021 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents (https://trustee.ietf.org/ | Provisions Relating to IETF Documents (https://trustee.ietf.org/ | |||
| license-info) in effect on the date of publication of this document. | license-info) in effect on the date of publication of this document. | |||
| Please review these documents carefully, as they describe your rights | Please review these documents carefully, as they describe your rights | |||
| and restrictions with respect to this document. Code Components | and restrictions with respect to this document. Code Components | |||
| extracted from this document must include Simplified BSD License text | extracted from this document must include Revised BSD License text as | |||
| as described in Section 4.e of the Trust Legal Provisions and are | described in Section 4.e of the Trust Legal Provisions and are | |||
| provided without warranty as described in the Simplified BSD License. | provided without warranty as described in the Revised BSD License. | |||
| Table of Contents | Table of Contents | |||
| 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 | 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
| 2. The RAW problem . . . . . . . . . . . . . . . . . . . . . . . 5 | 2. The RAW problem . . . . . . . . . . . . . . . . . . . . . . . 5 | |||
| 2.1. Terminology . . . . . . . . . . . . . . . . . . . . . . . 5 | 2.1. Terminology . . . . . . . . . . . . . . . . . . . . . . . 5 | |||
| 2.2. Reliability and Availability . . . . . . . . . . . . . . 8 | 2.1.1. Acronyms . . . . . . . . . . . . . . . . . . . . . . 6 | |||
| 2.2.1. High Availability Engineering Principles . . . . . . 8 | 2.1.2. Link and Direction . . . . . . . . . . . . . . . . . 6 | |||
| 2.2.2. Applying Reliability Concepts to Networking . . . . . 11 | 2.1.3. Path and Tracks . . . . . . . . . . . . . . . . . . . 7 | |||
| 2.2.3. Reliability in the Context of RAW . . . . . . . . . . 11 | 2.1.4. Deterministic Networking . . . . . . . . . . . . . . 8 | |||
| 2.3. Use Cases and Requirements Served . . . . . . . . . . . . 13 | 2.1.5. Reliability and Availability . . . . . . . . . . . . 9 | |||
| 2.3.1. Radio Access Protection . . . . . . . . . . . . . . . 13 | 2.1.6. OAM variations . . . . . . . . . . . . . . . . . . . 10 | |||
| 2.3.2. End-to-End Protection in a Wireless Mesh . . . . . . 14 | 2.2. Reliability and Availability . . . . . . . . . . . . . . 11 | |||
| 2.4. Related Work at The IETF . . . . . . . . . . . . . . . . 14 | 2.2.1. High Availability Engineering Principles . . . . . . 11 | |||
| 3. The RAW Framework . . . . . . . . . . . . . . . . . . . . . . 15 | 2.2.2. Applying Reliability Concepts to Networking . . . . . 14 | |||
| 3.1. Scope and Prerequisites . . . . . . . . . . . . . . . . . 16 | 2.2.3. Reliability in the Context of RAW . . . . . . . . . . 15 | |||
| 3.2. Routing Time Scale vs. Forwarding Time Scale . . . . . . 16 | 2.3. Routing Time Scale vs. Forwarding Time Scale . . . . . . 16 | |||
| 3.3. Wireless Tracks . . . . . . . . . . . . . . . . . . . . . 18 | 3. The RAW Conceptual Model . . . . . . . . . . . . . . . . . . 18 | |||
| 3.4. Flow Identification vs. Path Identification . . . . . . . 19 | 4. The OODA Loop . . . . . . . . . . . . . . . . . . . . . . . . 20 | |||
| 3.5. Source-Routed vs. Distributed Forwarding Decision . . . . 21 | 5. Observe: The RAW OAM . . . . . . . . . . . . . . . . . . . . 21 | |||
| 3.6. Encapsulation and Decapsulation . . . . . . . . . . . . . 22 | 6. Orient: The Path Computation Engine . . . . . . . . . . . . . 22 | |||
| 4. The RAW Architecture . . . . . . . . . . . . . . . . . . . . 22 | 7. Decide: The Path Selection Engine . . . . . . . . . . . . . . 22 | |||
| 4.1. The RAW Conceptual Model . . . . . . . . . . . . . . . . 22 | 8. Act: The PAREO Functions . . . . . . . . . . . . . . . . . . 24 | |||
| 4.2. The OODA Loop . . . . . . . . . . . . . . . . . . . . . . 24 | 8.1. Packet Replication . . . . . . . . . . . . . . . . . . . 25 | |||
| 4.3. Observe: The RAW OAM . . . . . . . . . . . . . . . . . . 25 | 8.2. Packet Elimination . . . . . . . . . . . . . . . . . . . 26 | |||
| 4.3.1. DetNet OAM . . . . . . . . . . . . . . . . . . . . . 26 | 8.3. Promiscuous Overhearing . . . . . . . . . . . . . . . . . 26 | |||
| 4.3.2. RAW Extensions . . . . . . . . . . . . . . . . . . . 27 | 8.4. Constructive Interference . . . . . . . . . . . . . . . . 27 | |||
| 4.3.3. Observed Metrics . . . . . . . . . . . . . . . . . . 27 | 9. Security Considerations . . . . . . . . . . . . . . . . . . . 27 | |||
| 4.4. Orient: The Path Computation Engine . . . . . . . . . . . 28 | 9.1. Forced Access . . . . . . . . . . . . . . . . . . . . . . 27 | |||
| 4.5. Decide: The Path Selection Engine . . . . . . . . . . . . 28 | 10. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 27 | |||
| 4.6. Act: The PAREO Functions . . . . . . . . . . . . . . . . 30 | 11. Contributors . . . . . . . . . . . . . . . . . . . . . . . . 27 | |||
| 4.6.1. Packet Replication . . . . . . . . . . . . . . . . . 31 | 12. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 28 | |||
| 4.6.2. Packet Elimination . . . . . . . . . . . . . . . . . 32 | 13. References . . . . . . . . . . . . . . . . . . . . . . . . . 28 | |||
| 4.6.3. Promiscuous Overhearing . . . . . . . . . . . . . . . 32 | 13.1. Normative References . . . . . . . . . . . . . . . . . . 28 | |||
| 4.6.4. Constructive Interference . . . . . . . . . . . . . . 33 | 13.2. Informative References . . . . . . . . . . . . . . . . . 29 | |||
| 5. Security Considerations . . . . . . . . . . . . . . . . . . . 33 | Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 31 | |||
| 5.1. Forced Access . . . . . . . . . . . . . . . . . . . . . . 33 | ||||
| 6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 33 | ||||
| 7. Contributors . . . . . . . . . . . . . . . . . . . . . . . . 33 | ||||
| 8. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 34 | ||||
| 9. References . . . . . . . . . . . . . . . . . . . . . . . . . 34 | ||||
| 9.1. Normative References . . . . . . . . . . . . . . . . . . 34 | ||||
| 9.2. Informative References . . . . . . . . . . . . . . . . . 36 | ||||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 39 | ||||
| 1. Introduction | 1. Introduction | |||
| Deterministic Networking is an attempt to emulate the properties of a | Deterministic Networking is an attempt to emulate the properties of a | |||
| serial link over a switched fabric, by providing a bounded latency | serial link over a switched fabric, by providing a bounded latency | |||
| and eliminating congestion loss, even when co-existing with best- | and eliminating congestion loss, even when co-existing with best- | |||
| effort traffic. It is getting traction in various industries | effort traffic. It is getting traction in various industries | |||
| including professional A/V, manufacturing, online gaming, and | including professional A/V, manufacturing, online gaming, and | |||
| smartgrid automation, enabling cost and performance optimizations | smartgrid automation, enabling cost and performance optimizations | |||
| (e.g., vs. loads of P2P cables). | (e.g., vs. loads of P2P cables). | |||
| skipping to change at page 3, line 32 ¶ | skipping to change at page 3, line 28 ¶ | |||
| physical resources to maintain the amount of traffic within a | physical resources to maintain the amount of traffic within a | |||
| budgetted volume of data per unit of time that fits the physical | budgetted volume of data per unit of time that fits the physical | |||
| capabilities of the underlying network, and the use of time-shared | capabilities of the underlying network, and the use of time-shared | |||
| resources (bandwidth and buffers) per circuit, and/or by shaping and/ | resources (bandwidth and buffers) per circuit, and/or by shaping and/ | |||
| or scheduling the packets at every hop. | or scheduling the packets at every hop. | |||
| This innovation was initially introduced on wired networks, with IEEE | This innovation was initially introduced on wired networks, with IEEE | |||
| 802.1 Time Sensitive networking (TSN) - for Ethernet LANs - and IETF | 802.1 Time Sensitive networking (TSN) - for Ethernet LANs - and IETF | |||
| DetNet. But the wired and the wireless media are fundamentally | DetNet. But the wired and the wireless media are fundamentally | |||
| different at the physical level and in the possible abstractions that | different at the physical level and in the possible abstractions that | |||
| can be built for IP [IPoWIRELESS]. Wireless networks operate on a | can be built for IPv6 [IPoWIRELESS]. Nevertheless, deterministic | |||
| shared medium where uncontrolled interference, including the self- | capabilities are required in a number of wireless use cases as well | |||
| induced multipath fading, cause random transmission losses and add | [RAW-USE-CASES]. With new scheduled radios such as TSCH and OFDMA | |||
| new dimensions to the statistical effects that affect reachability | [RAW-TECHNOS] being developped to provide determinism over wireless | |||
| and packet delivery. | links at the lower layers, providing DetNet capabilities is now | |||
| becoming possible. | ||||
| To defeat those additional causes of transmission delay and loss, | Wireless networks operate on a shared medium where uncontrolled | |||
| Reliable and Available Wireless (RAW) leverages scheduled | interference, including the self-induced multipath fading cause | |||
| transmissions with redundancy and diversity in the spatial, time, | random transmission losses. Fixed and mobile obstacles and | |||
| code, and frequency domains. The challenge is to provide enough | reflectors may block or alter the signal, causing transient and | |||
| diversity and redundancy to ensure the timely packet delivery while | unpredictable variations of the throughput and packet delivery ratio | |||
| preserving energy and optimizing the use of the shared spectrum. | (PDR) of a wireless link. This adds new dimensions to the | |||
| statistical effects that affect the quality and reliability of the | ||||
| link. Multiple links and transmissions must be used, and the | ||||
| challenge is to provide enough diversity and redundancy to ensure the | ||||
| timely packet delivery while preserving energy and optimizing the use | ||||
| of the shared spectrum. | ||||
| Reliable and Available Wireless (RAW) takes up the challenge of | ||||
| providing highly available and reliable end-to-end performances in a | ||||
| network with scheduled wireless segments. To defeat those additional | ||||
| causes of transmission delay and loss, RAW leverages deterministic | ||||
| layer-2 capabilities while controlling the use of diversity in the | ||||
| spatial, time, code, radio technology, and frequency domains from | ||||
| layer-3. | ||||
| While the generic "Deterministic Networking Problem Statement" | While the generic "Deterministic Networking Problem Statement" | |||
| [RFC8557] applies to both the wired and the wireless media, the | [RFC8557] applies to both the wired and the wireless media, the | |||
| methods to achieve RAW must extend those used to support time- | methods to achieve RAW must extend those used to support time- | |||
| sensitive networking over wires, as a RAW solution has to address | sensitive networking over wires, as a RAW solution has to address | |||
| less consistent transmissions, energy conservation and shared | less consistent transmissions, energy conservation and shared | |||
| spectrum efficiency. | spectrum efficiency. | |||
| Uncontrolled interference and transmission obstacles may impede the | RAW provides DetNet elements that are specialized for IPv6 flows | |||
| wireless transmission, causing rapid variations of the throughput and | [IPv6] over deterministic short range radios [RAW-TECHNOS]. | |||
| packet delivery ratio (PDR) of the link. This uncertainty limits the | Conceptually, RAW is agnostic to the radio layer underneath though | |||
| volume and/or duration of traffic that can be safely transmitted on | the capability to schedule transmissions is assumed. How the PHY is | |||
| the same link while conforming to a RAW Service Level Agreement | programmed to do so, and whether the radio is single-hop or meshed, | |||
| (SLA). | are unknown at the IP layer and not part of the RAW abstraction. | |||
| Nevertheless, cross-layer optimizations may take place to ensure | ||||
| This increased complexity explains why the development of | proper link awareness (think, link quality) and packet handling | |||
| deterministic wireless technologies has been lagging behind the | (think, scheduling). | |||
| similar efforts for wired systems, both at the IEEE and the IETF. | ||||
| But recent progress on scheduled radios such as TSCH and OFDMA | ||||
| indicates that wireless is finally catching up at the lower layers. | ||||
| Sitting at the layer above, RAW takes up the challenge of providing | ||||
| highly available and reliable end-to-end performances in a network | ||||
| with scheduled wireless segments. | ||||
| RAW provides DetNet elements that are specialized for short range | ||||
| radios. From this inheritance, RAW stays agnostic to the radio layer | ||||
| underneath though the capability to schedule transmissions is | ||||
| assumed. How the PHY is programmed to do so, and whether the radio | ||||
| is single-hop or meshed, are unknown at the IP layer and not part of | ||||
| the RAW abstraction. | ||||
| The "Deterministic Networking Architecture" [RFC8655] is composed of | The "Deterministic Networking Architecture" [RFC8655] is composed of | |||
| three planes: the Application (User) Plane, the Controller Plane, and | three planes: the Application (User) Plane, the Controller Plane, and | |||
| the Network Plane. The RAW Architecture extends the DetNet Network | the Network Plane. The RAW Architecture extends the DetNet Network | |||
| Plane, to accommodate one or multiple hops of homogeneous or | Plane, to accommodate one or multiple hops of homogeneous or | |||
| heterogeneous wireless technologies, e.g. a Wi-Fi6 Mesh or parallel | heterogeneous wireless technologies, e.g. a Wi-Fi6 Mesh or parallel | |||
| CBRS access links federated by a 5G backhaul. | CBRS access links federated by a 5G backhaul. | |||
| RAW and DetNet associate application that that require a particular | ||||
| treatment to a path that was provisionned to procure that treatment. | ||||
| This may be seen as a form of Path Aware Networking and may be | ||||
| subject to impediments documented in [RFC9049]. | ||||
| The establishment of a path is not in-scope for RAW. It may be the | The establishment of a path is not in-scope for RAW. It may be the | |||
| product of a centralized Controller Plane as described for DetNet. | product of a centralized Controller Plane as described for DetNet. | |||
| As opposed to wired networks, the action of installing a path over a | As opposed to wired networks, the action of installing a path over a | |||
| set of wireless links may be very slow relative to the speed at which | set of wireless links may be very slow relative to the speed at which | |||
| the radio conditions vary, and it makes sense in the wireless case to | the radio conditions vary, and it makes sense in the wireless case to | |||
| provide redundant forwarding solutions along a complex path and to | provide redundant forwarding solutions along a complex path and to | |||
| leave it to the Network Plane to select which of those forwarding | leave it to the Network Plane to select which of those forwarding | |||
| solutions are to be used for a given packet based on the current | solutions are to be used for a given packet based on the current | |||
| conditions. | conditions. | |||
| skipping to change at page 5, line 17 ¶ | skipping to change at page 5, line 25 ¶ | |||
| 1. Network Plane measurement protocols for Operations, | 1. Network Plane measurement protocols for Operations, | |||
| Administration and Maintenance (OAM) to Observe some or all hops | Administration and Maintenance (OAM) to Observe some or all hops | |||
| along a Track as well as the end-to-end packet delivery | along a Track as well as the end-to-end packet delivery | |||
| 2. Controller plane elements to reports the links statistics to a | 2. Controller plane elements to reports the links statistics to a | |||
| Path computation Element (PCE) in a centralized controller that | Path computation Element (PCE) in a centralized controller that | |||
| computes and installs the Tracks and provides meta data to Orient | computes and installs the Tracks and provides meta data to Orient | |||
| the routing decision | the routing decision | |||
| 3. A Runtime distributed Path Selection Engine (PSE) thar Decides | 3. A Runtime distributed Path Selection Engine (PSE) that Decides | |||
| which subTrack to use for the next packet(s) that are routed | which subTrack to use for the next packet(s) that are routed | |||
| along the Track | along the Track | |||
| 4. Packet (hybrid) ARQ, Replication, Elimination and Ordering | 4. Packet (hybrid) ARQ, Replication, Elimination and Ordering | |||
| Dataplane actions that operate at the DetNet Service Layer to | Dataplane actions that operate at the DetNet Service Layer to | |||
| increase the reliability of the end-to-end transmission. The RAW | increase the reliability of the end-to-end transmission. The RAW | |||
| architecture also covers in-situ signalling when the decision is | architecture also covers in-situ signalling when the decision is | |||
| Acted by a node that down the Track from the PSE. | Acted by a node that down the Track from the PSE. | |||
| The overall OODA Loop optimizes the use of redundancy to achieve the | The overall OODA Loop optimizes the use of redundancy to achieve the | |||
| skipping to change at page 5, line 48 ¶ | skipping to change at page 6, line 13 ¶ | |||
| Replication, Elimination and Ordering Functions. | Replication, Elimination and Ordering Functions. | |||
| RAW also reuses terminology defined for 6TiSCH in [6TiSCH-ARCHI] such | RAW also reuses terminology defined for 6TiSCH in [6TiSCH-ARCHI] such | |||
| as the term Track. A Track as a complex path with associated PAREO | as the term Track. A Track as a complex path with associated PAREO | |||
| operations. The concept is abstract to the underlaying technology | operations. The concept is abstract to the underlaying technology | |||
| and applies to any fully or partially wireless mesh, including, e.g., | and applies to any fully or partially wireless mesh, including, e.g., | |||
| a Wi-Fi mesh. RAW specifies strict and loose Tracks depending on | a Wi-Fi mesh. RAW specifies strict and loose Tracks depending on | |||
| whether the path is fully controlled by RAW or traverses an opaque | whether the path is fully controlled by RAW or traverses an opaque | |||
| network where RAW cannot observe and control the individual hops. | network where RAW cannot observe and control the individual hops. | |||
| RAW uses the following terminology: | RAW uses the following terminology and acronyms: | |||
| OODA: Observe, Orient, Decide, Act. The OODA Loop is a conceptual | 2.1.1. Acronyms | |||
| cyclic model developed by USAF Colonel John Boyd, and that is | ||||
| applicable in multiple domains where agility can provide benefits | ||||
| against brute force. | ||||
| PAREO: Packet (hybrid) ARQ, Replication, Elimination and Ordering. | 2.1.1.1. ARQ | |||
| PAREO is a superset Of DetNet's PREOF that includes radio-specific | ||||
| techniques such as short range broadcast, MUMIMO, constructive | ||||
| interference and overhearing, which can be leveraged separately or | ||||
| combined to increase the reliability. | ||||
| Flow: A collection of consecutive packets that must be placed on the | Automatic Repeat Request, enabling an acknowledged transmission and | |||
| same Track to receive an equivalent treatment from Ingress to | retries. ARQ is a typical model at Layer-2 on a wireless medium. It | |||
| Egress within the Track. Multiple flows may be transported along | is typically avoided end-to-end on deterministic flows because it | |||
| the same Track. The subTrack that is selected for the flow may | introduces excessive indetermination in latency, but a limited number | |||
| change over time under the control of the PSE. | of retries within a bounded time may be used over a wireless link and | |||
| yet respect end-to-end constraints. | ||||
| Track: A networking graph that can be used as a "path" to transport | 2.1.1.2. OAM | |||
| RAW packets with equivalent treatment; as opposed to the usual | ||||
| understanding of a path (see for instance the definition of "path" | ||||
| in section 1.1 of [RFC9049]), a Track may fork and rejoin to | ||||
| enable the PAREO operations. | ||||
| In DetNet [RFC8655] terms, a Track has the following properties: | OAM stands for Operations, Administration, and Maintenance, and | |||
| covers the processes, activities, tools, and standards involved with | ||||
| operating, administering, managing and maintaining any system. This | ||||
| document uses the terms Operations, Administration, and Maintenance, | ||||
| in conformance with the 'Guidelines for the Use of the "OAM" Acronym | ||||
| in the IETF' [RFC6291] and the system observed by the RAW OAM is the | ||||
| Track. | ||||
| * A Track has one Ingress and one Egress nodes, which operate as | 2.1.1.3. OODA | |||
| DetNet Edge nodes. | ||||
| * A Track is reversible, meaning that packets can be routed | Observe, Orient, Decide, Act. The OODA Loop is a conceptual cyclic | |||
| against the flow of data packets, e.g., to carry OAM | model developed by USAF Colonel John Boyd, and that is applicable in | |||
| measurements or control messages back to the Ingress. | multiple domains where agility can provide benefits against brute | |||
| force. | ||||
| * The vertices of the Track are DetNet Relay nodes that operate | 2.1.1.4. PAREO | |||
| at the DetNet Service sublayer and provide the PAREO functions. | ||||
| * The topological edges of the graph are serial sequences of | Packet (hybrid) ARQ, Replication, Elimination and Ordering. PAREO is | |||
| DetNet Transit nodes that operate at the DetNet Forwarding | a superset Of DetNet's PREOF that includes radio-specific techniques | |||
| sublayer. | such as short range broadcast, MUMIMO, constructive interference and | |||
| overhearing, which can be leveraged separately or combined to | ||||
| increase the reliability. | ||||
| SubTrack: A Track within a Track. The RAW PSE selects a subTrack on | 2.1.2. Link and Direction | |||
| a per-packet or a per-collection of packets basis to provide the | 2.1.2.1. Flapping | |||
| desired reliability for the transported flows. | ||||
| Segment: A serial path formed by a topological edge of a Track. | In the context of RAW, a link flaps when the reliability of the | |||
| East-West Segments are oriented from Ingress (East) to Egress | wireless connectivity drops abruptly for a short period of time, | |||
| (West). North/South Segments can be bidirectional; to avoid | typically of a subsecond to seconds duration. | |||
| loops, measures must be taken to ensure that a given packet flows | ||||
| either Northwards or Southwards along a bidirectional Segment, but | ||||
| never bounces back. | ||||
| Flapping: In the context of RAW, a link flaps when the reliability | 2.1.2.2. Uplink | |||
| of the wireless connectivity drops abruptly for a short period of | ||||
| time, typically of a subsecond to seconds duration. | ||||
| OAM: OAM stands for Operations, Administration, and Maintenance, and | Connection from end-devices to a data communication equipment. In | |||
| covers the processes, activities, tools, and standards involved | the context of wireless, uplink refers to the connection between a | |||
| with operating, administering, managing and maintaining any | station (STA) and a controller (AP) or a User Equipment (UE) to a | |||
| system. This document uses the terms Operations, Administration, | Base Station (BS) such as a 3GPP 5G gNodeB (gNb). | |||
| and Maintenance, in conformance with the 'Guidelines for the Use | ||||
| of the "OAM" Acronym in the IETF' [RFC6291] and the system | ||||
| observed by the RAW OAM is the Track. | ||||
| Active OAM: See [RFC7799]. In the context of RAW, Active OAM is | 2.1.2.3. Downlink | |||
| used to observe a particular Track, subTrack, or Segment of a | ||||
| Track regardless of whether it is used for traffic at that time. | ||||
| In-Band OAM: An active OAM packet is considered in-band for the | The reverse direction from uplink. | |||
| monitored Track when it traverses the same set of links and | ||||
| interfaces and if the OAM packet receives the same QoS and PAREO | ||||
| treatment as the packets of the data flows that are injected in | ||||
| the Track. | ||||
| Out-of-Band OAM: Out-of-band OAM is an active OAM whose path is not | 2.1.2.4. Downstream | |||
| topologically congruent to the Track, or its test packets receive | ||||
| a QoS and/or PAREO treatment that is different from that of the | ||||
| packets of the data flows that are injected in the Track, or both. | ||||
| Limited OAM: An active OAM packet is a Limited OAM packet when it | Following the the direction of the flow data path along a Track. | |||
| observes the RAW operation over a node, a segment, or a subTrack | ||||
| of the Track, though not from Ingress to Egress. It is injected | ||||
| in the datapath and extracted from the datapath around the | ||||
| particular function or subnetwork (e.g., around a relay providing | ||||
| a service layer replication point) that is being tested. | ||||
| Upstream OAM: An upstream OAM packet is an Out-of-Band OAM packet | 2.1.2.5. Upstream | |||
| that traverses the Track from egress to ingress on the reverse | ||||
| direction, to capture and report OAM measurements upstream. The | ||||
| collection may capture all information along the whole Track, or | ||||
| it may only learn select data across all, or only a particular | ||||
| subTrack, or Segment of a Track. | ||||
| [DetNet-OAM] provides additional terminology related to OAM in the | Against the direction of the flow data path along a Track. | |||
| context of DetNet and by extension of RAW, whereas [RFC7799] defines | ||||
| the Active, Passive, and Hybrid OAM methods. | 2.1.3. Path and Tracks | |||
| 2.1.3.1. Path | ||||
| Quoting section 1.1.3 of [INT-ARCHI]: | ||||
| | "At a given moment, all the IP datagrams from a particular source | ||||
| | host to a particular destination host will typically traverse the | ||||
| | same sequence of gateways. We use the term "path" for this | ||||
| | sequence. Note that a path is uni-directional; it is not unusual | ||||
| | to have different paths in the two directions between a given host | ||||
| | pair.". | ||||
| Section 2 of [I-D.irtf-panrg-path-properties] points to a longer, | ||||
| more modern definition of path, which begins as follows: | ||||
| | A sequence of adjacent path elements over which a packet can be | ||||
| | transmitted, starting and ending with a node. A path is | ||||
| | unidirectional. Paths are time-dependent, i.e., the sequence of | ||||
| | path elements over which packets are sent from one node to another | ||||
| | may change. A path is defined between two nodes. | ||||
| It follows that the general acceptance of a path is a linear sequence | ||||
| of nodes, as opposed to a multi-dimensional graph. In the context of | ||||
| this document, a path is observed by following one copy of a packet | ||||
| that is injected in a Track and possibly replicated within. | ||||
| 2.1.3.2. Track | ||||
| A networking graph that can be followed to transport packets with | ||||
| equivalent treatment; as opposed to the definition of a path above, a | ||||
| Track Track is not necessarily linear. It may contain multiple paths | ||||
| that may fork and rejoin, for instance to enable the RAW PAREO | ||||
| operations. | ||||
| In DetNet [RFC8655] terms, a Track has the following properties: | ||||
| * A Track has one Ingress and one Egress nodes, which operate as | ||||
| DetNet Edge nodes. | ||||
| * A Track is reversible, meaning that packets can be routed against | ||||
| the flow of data packets, e.g., to carry OAM measurements or | ||||
| control messages back to the Ingress. | ||||
| * The vertices of the Track are DetNet Relay nodes that operate at | ||||
| the DetNet Service sublayer and provide the PAREO functions. | ||||
| * The topological edges of the graph are serial sequences of DetNet | ||||
| Transit nodes that operate at the DetNet Forwarding sublayer. | ||||
| 2.1.3.3. SubTrack | ||||
| A Track within a Track. The RAW PSE selects a subTrack on a per- | ||||
| packet or a per-collection of packets basis to provide the desired | ||||
| reliability for the transported flows. | ||||
| 2.1.3.4. Segment | ||||
| A serial path formed by a topological edge of a Track. East-West | ||||
| Segments are oriented from Ingress (East) to Egress (West). North/ | ||||
| South Segments can be bidirectional; to avoid loops, measures must be | ||||
| taken to ensure that a given packet flows either Northwards or | ||||
| Southwards along a bidirectional Segment, but never bounces back. | ||||
| 2.1.4. Deterministic Networking | ||||
| This document reuses the terminology in section 2 of [RFC8557] and | ||||
| section 4.1.2 of [RFC8655] for deterministic networking and | ||||
| deterministic networks. | ||||
| 2.1.4.1. Flow | ||||
| A collection of consecutive packets that must be placed on the same | ||||
| Track to receive an equivalent treatment from Ingress to Egress | ||||
| within the Track. Multiple flows may be transported along the same | ||||
| Track. The subTrack that is selected for the flow may change over | ||||
| time under the control of the PSE. | ||||
| 2.1.4.2. Deterministic Flow Identifier (L2) | ||||
| A tuple identified by a stream_handle, and provided by a bridge, in | ||||
| accordance with IEEE 802.1CB. The tuple comprises at least src MAC, | ||||
| dst MAC, VLAN ID, and L2 priority. Continuous streams are | ||||
| characterized by bandwidth and max packet size; scheduled streams are | ||||
| characterized by a repeating pattern of timed transmissions. | ||||
| 2.1.4.3. Deterministic Flow Identifier (L3) | ||||
| See section 3.3 of [DetNet-DP]. The classical IP 5-tuple that | ||||
| identifies a flow comprises the src IP, dst IP, src port, dest port, | ||||
| and the upper layer protocol (ULP). DetNet uses a 6-tuple where the | ||||
| extra field is the DSCP field in the packet. The IPv6 flow label is | ||||
| not used. for that purpose. | ||||
| 2.1.5. Reliability and Availability | ||||
| In the context of the RAW work, Reliability and Availability are | In the context of the RAW work, Reliability and Availability are | |||
| defined as follows: | defined as follows: | |||
| Reliability: Reliability is a measure of the probability that an | 2.1.5.1. Service Level Agreement | |||
| item will perform its intended function for a specified interval | ||||
| under stated conditions. For RAW, the service that is expected is | ||||
| delivery within a bounded latency and a failure is when the packet | ||||
| is either lost or delivered too late. RAW expresses reliability | ||||
| in terms of Mean Time Between Failure (MTBF) and Maximum | ||||
| Consecutive Failures (MCF). More in [NASA]. | ||||
| Availability: Availability is a measure of the relative amount of | In the context of RAW, an SLA (service level agreement) is a contract | |||
| time where a path operates in stated condition, in other words | between a provider, the network, and a client, the application flow, | |||
| (uptime)/(uptime+downtime). Because a serial wireless path may | about measurable metrics such as latency boundaries, consecutive | |||
| not be good enough to provide the required reliability, and even 2 | losses, and packet delivery ratio (PDR). | |||
| parallel paths may not be over a longer period of time, the RAW | ||||
| availability implies a path that is a lot more complex than what | ||||
| DetNet typically envisages (a Track). | ||||
| Residence Time: A residence time (RT) is defined as the time period | 2.1.5.2. Service Level Objective | |||
| between the reception of a packet starts and the transmission of | ||||
| the packet begins. In the context of RAW, RT is useful for a | A service level objective (SLO) is one term in the SLO, for which | |||
| transit node, not ingress or egress. | specific network setting and operations are implemented. For | |||
| instance, a dynamic tuning of the packet redundancy will address an | ||||
| SLO of consecutive losses in a row by augmenting the chances of | ||||
| delivery of a packet that follows a loss.). | ||||
| 2.1.5.3. Service Level Indicator | ||||
| A service level indicator (SLI) measures the complience of an SLO to | ||||
| the terms of the contrast. It can be for instance the statistics of | ||||
| individual losses and losses in a row as time series.). | ||||
| 2.1.5.4. Reliability | ||||
| Reliability is a measure of the probability that an item will perform | ||||
| its intended function for a specified interval under stated | ||||
| conditions (SLA). RAW expresses reliability in terms of Mean Time | ||||
| Between Failure (MTBF) and Maximum Consecutive Failures (MCF). More | ||||
| in [NASA].). | ||||
| 2.1.5.5. Available | ||||
| That is exempt of unscheduled outage or derivation from the terms of | ||||
| the SLA. A basic expectation for a RAW network is that the flow is | ||||
| maintained in the face of any single breakage or flapping. | ||||
| 2.1.5.6. Availability | ||||
| Availability is a measure of the relative amount of time where a RAW | ||||
| Network operates in stated condition (SLA), expressed as | ||||
| (uptime)/(uptime+downtime). Because a serial wireless path may not | ||||
| be good enough to provide the required reliability, and even 2 | ||||
| parallel paths may not be over a longer period of time, the RAW | ||||
| availability implies a journey that is a lot more complex than | ||||
| following a serial path. | ||||
| 2.1.6. OAM variations | ||||
| 2.1.6.1. Active OAM | ||||
| See [RFC7799]. In the context of RAW, Active OAM is used to observe | ||||
| a particular Track, subTrack, or Segment of a Track regardless of | ||||
| whether it is used for traffic at that time. | ||||
| 2.1.6.2. In-Band OAM | ||||
| An active OAM packet is considered in-band for the monitored Track | ||||
| when it traverses the same set of links and interfaces and if the OAM | ||||
| packet receives the same QoS and PAREO treatment as the packets of | ||||
| the data flows that are injected in the Track. | ||||
| 2.1.6.3. Out-of-Band OAM | ||||
| Out-of-band OAM is an active OAM whose path is not topologically | ||||
| congruent to the Track, or its test packets receive a QoS and/or | ||||
| PAREO treatment that is different from that of the packets of the | ||||
| data flows that are injected in the Track, or both. | ||||
| 2.1.6.4. Limited OAM | ||||
| An active OAM packet is a Limited OAM packet when it observes the RAW | ||||
| operation over a node, a segment, or a subTrack of the Track, though | ||||
| not from Ingress to Egress. It is injected in the datapath and | ||||
| extracted from the datapath around the particular function or | ||||
| subnetwork (e.g., around a relay providing a service layer | ||||
| replication point) that is being tested. | ||||
| 2.1.6.5. Upstream OAM | ||||
| An upstream OAM packet is an Out-of-Band OAM packet that traverses | ||||
| the Track from egress to ingress on the reverse direction, to capture | ||||
| and report OAM measurements upstream. The collection may capture all | ||||
| information along the whole Track, or it may only learn select data | ||||
| across all, or only a particular subTrack, or Segment of a Track. | ||||
| 2.1.6.6. Residence Time | ||||
| A residence time (RT) is defined as the time period between the | ||||
| reception of a packet starts and the transmission of the packet | ||||
| begins. In the context of RAW, RT is useful for a transit node, not | ||||
| ingress or egress. | ||||
| 2.1.6.7. Additional References | ||||
| [DetNet-OAM] provides additional terminology related to OAM in the | ||||
| context of DetNet and by extension of RAW, whereas [RFC7799] defines | ||||
| the Active, Passive, and Hybrid OAM methods. | ||||
| 2.2. Reliability and Availability | 2.2. Reliability and Availability | |||
| 2.2.1. High Availability Engineering Principles | 2.2.1. High Availability Engineering Principles | |||
| The reliability criteria of a critical system pervade through its | The reliability criteria of a critical system pervade through its | |||
| elements, and if the system comprises a data network then the data | elements, and if the system comprises a data network then the data | |||
| network is also subject to the inherited reliability and availability | network is also subject to the inherited reliability and availability | |||
| criteria. It is only natural to consider the art of high | criteria. It is only natural to consider the art of high | |||
| availability engineering and apply it to wireless communications in | availability engineering and apply it to wireless communications in | |||
| skipping to change at page 11, line 52 ¶ | skipping to change at page 15, line 18 ¶ | |||
| Networking Use Cases" [RFC8578]. | Networking Use Cases" [RFC8578]. | |||
| 2.2.3. Reliability in the Context of RAW | 2.2.3. Reliability in the Context of RAW | |||
| In contrast with wired networks, errors in transmission are the | In contrast with wired networks, errors in transmission are the | |||
| predominant source of packet loss in wireless networks. | predominant source of packet loss in wireless networks. | |||
| The root cause for the loss may be of multiple origins, calling for | The root cause for the loss may be of multiple origins, calling for | |||
| the use of different forms of diversity: | the use of different forms of diversity: | |||
| Multipath Fading: A destructive interference by a reflection of the | Multipath Fading A destructive interference by a reflection of the | |||
| original signal. | original signal. | |||
| A radio signal may be received directly (line-of-sight) and/or as | A radio signal may be received directly (line-of-sight) and/or as | |||
| a reflection on a physical structure (echo). The reflections take | a reflection on a physical structure (echo). The reflections take | |||
| a longer path and are delayed by the extra distance divided by the | a longer path and are delayed by the extra distance divided by the | |||
| speed of light in the medium. Depending on the frequency, the | speed of light in the medium. Depending on the frequency, the | |||
| echo lands with a different phase which may add up to | echo lands with a different phase which may add up to | |||
| (constructive interference) or cancel the direct signal | (constructive interference) or cancel the direct signal | |||
| (destructive interference). | (destructive interference). | |||
| The affected frequencies depend on the relative position of the | The affected frequencies depend on the relative position of the | |||
| sender, the receiver, and all the reflecting objects in the | sender, the receiver, and all the reflecting objects in the | |||
| environment. A given hop will suffer from multipath fading for | environment. A given hop will suffer from multipath fading for | |||
| multiple packets in a row till the something moves that changes | multiple packets in a row till the something moves that changes | |||
| the reflection patterns. | the reflection patterns. | |||
| Co-channel Interference: Energy in the spectrum used for the | Co-channel Interference Energy in the spectrum used for the | |||
| transmission confuses the receiver. | transmission confuses the receiver. | |||
| The wireless medium itself is a Shared Risk Link Group (SRLG) for | The wireless medium itself is a Shared Risk Link Group (SRLG) for | |||
| nearby users of the same spectrum, as an interference may affect | nearby users of the same spectrum, as an interference may affect | |||
| multiple co-channel transmissions between different peers within | multiple co-channel transmissions between different peers within | |||
| the interference domain of the interferer, possibly even when they | the interference domain of the interferer, possibly even when they | |||
| use different technologies. | use different technologies. | |||
| Obstacle in Fresnel Zone: The optimal transmission happens when the | Obstacle in Fresnel Zone The optimal transmission happens when the | |||
| Fresnel Zone between the sender and the receiver is free of | Fresnel Zone between the sender and the receiver is free of | |||
| obstacles. | obstacles. | |||
| As long as a physical object (e.g., a metallic trolley between | As long as a physical object (e.g., a metallic trolley between | |||
| peers) that affects the transmission is not removed, the quality | peers) that affects the transmission is not removed, the quality | |||
| of the link is affected. | of the link is affected. | |||
| In an environment that is rich of metallic structures and mobile | In an environment that is rich of metallic structures and mobile | |||
| objects, a single radio link will provide a fuzzy service, meaning | objects, a single radio link will provide a fuzzy service, meaning | |||
| that it cannot be trusted to transport the traffic reliably over a | that it cannot be trusted to transport the traffic reliably over a | |||
| skipping to change at page 13, line 14 ¶ | skipping to change at page 16, line 30 ¶ | |||
| A single packet may be sent at different times (time diversity) over | A single packet may be sent at different times (time diversity) over | |||
| diverse paths (spatial diversity) that rely on diverse radio channels | diverse paths (spatial diversity) that rely on diverse radio channels | |||
| (frequency diversity) and diverse PHY technologies, e.g., narrowband | (frequency diversity) and diverse PHY technologies, e.g., narrowband | |||
| vs. spread spectrum, or diverse codes. Using time diversity will | vs. spread spectrum, or diverse codes. Using time diversity will | |||
| defeat short-term interferences; spatial diversity combats very local | defeat short-term interferences; spatial diversity combats very local | |||
| causes such as multipath fading; narrowband and spread spectrum are | causes such as multipath fading; narrowband and spread spectrum are | |||
| relatively innocuous to one another and can be used for diversity in | relatively innocuous to one another and can be used for diversity in | |||
| the presence of the other. | the presence of the other. | |||
| 2.3. Use Cases and Requirements Served | 2.3. Routing Time Scale vs. Forwarding Time Scale | |||
| In order to focus on real-worlds issues and assert the feasibility of | ||||
| the proposed capabilities, RAW focuses on selected technologies that | ||||
| can be scheduled at the lower layers: IEEE Std. 802.15.4 timeslotted | ||||
| channel hopping (TSCH), 3GPP 5G ultra-reliable low latency | ||||
| communications (URLLC), IEEE 802.11ax/be where 802.11be is extreme | ||||
| high throughput (EHT), and L-band Digital Aeronautical Communications | ||||
| System (LDACS). See [RAW-TECHNOS] for more. | ||||
| "Deterministic Networking Use Cases" [RFC8578] presents a number of | ||||
| wireless use cases including Wireless, such as application to | ||||
| Industrial Applications, Pro-Audio, and SmartGrid Automation. | ||||
| [RAW-USE-CASES] adds a number of use cases that demonstrate the need | ||||
| for RAW capabilities for new applications such as Pro-Gaming and | ||||
| drones. The use cases can be abstracted in two families, Loose | ||||
| Protection, e.g., protecting the first hop in Radio Access Protection | ||||
| and Strict Protection, e.g., providing End-to-End Protection in a | ||||
| wireless mesh. | ||||
| 2.3.1. Radio Access Protection | ||||
| To maintain the required SLA at all times, a wireless Host may use | ||||
| more than one Radio Access Network (RAN) in parallel. | ||||
| ... .. | ||||
| RAN 1 ----- ... .. ... | ||||
| / . .. .... | ||||
| +--------+ / . .... +-----------+ | ||||
| |Wireless|- . ..... | Service | | ||||
| | Device |-***-- RAN 2 -- . Internet ....---| / | | ||||
| |(STA/UE)|- .. ..... |Application| | ||||
| +--------+ $$$ . ....... +-----------+ | ||||
| \ ... ... ..... | ||||
| RAN n -------- ... ..... | ||||
| *** = flapping at this time $$$ expensive | ||||
| Figure 1: Radio Access Protection | ||||
| The RANs may be heterogeneous, e.g., 3GPP 5G [RAW-5G] and Wi-Fi | ||||
| [RAW-TECHNOS] for high-speed communication, in which case a Layer-3 | ||||
| abstraction becomes useful to select which of the RANs are used at a | ||||
| particular point of time, and the amount of traffic that is | ||||
| distributed over each RAN. | ||||
| The idea is that the rest of the path to the destination(s) is | ||||
| protected separately (e.g., uses non-congruent paths, leverages | ||||
| DetNet / TSN, etc...) and is a lot more reliable, e.g., wired. In | ||||
| that case, RAW observes the reliability of the end-to-end operation | ||||
| through each of the RANs but only observes and controls the wireless | ||||
| operation the first hop. | ||||
| A variation of that use case has a pair of wireless Hosts connected | ||||
| over a wired core / backbone network. In that case, RAW observes and | ||||
| controls the Ingress and Egress RANs, while neglecting the hops in | ||||
| the core. The resulting loose Track may be instantiated, e.g., using | ||||
| tunneling or loose source routing between the RANs. | ||||
| 2.3.2. End-to-End Protection in a Wireless Mesh | ||||
| In radio technologies that support mesh networking (e.g., Wi-Fi and | ||||
| TSCH), a Track is a complex path with distributed PAREO capabilities. | ||||
| In that case, RAW operates through the multipath and makes decisions | ||||
| either at the Ingress or at every hop (more in Section 3.3). | ||||
| A-------B-------C-----D | ||||
| / \ / / \ | ||||
| Ingress ----M-------N--zzzzz--- Egress | ||||
| \ \ / / | ||||
| P--zzz--Q-------------R | ||||
| zzz = flapping now | ||||
| Figure 2: End-to-End Protection | ||||
| The Protection may be imposed by the source based on end-to-end OAM, | ||||
| or performed hop-by-hop, in which case the OAM must enables the | ||||
| intermediate Nodes to estimate the quality of the rest of the | ||||
| feasible paths in the remainder of the Track to the destination. | ||||
| 2.4. Related Work at The IETF | ||||
| RAW intersects with protocols or practices in development at the IETF | ||||
| as follows: | ||||
| * The Dynamic Link Exchange Protocol (DLEP) [RFC8175] from [MANET] | ||||
| can be leveraged at each hop to derive generic radio metrics | ||||
| (e.g., based on LQI, RSSI, queueing delays and ETX) on individual | ||||
| hops. | ||||
| * [detnet] provides an OAM framework with [DetNet-OAM] that applies | ||||
| within the DetNet dataplane described in [DetNet-DP],which is | ||||
| typically based on MPLS or IPv6 pseudowires. | ||||
| * [BFD] detect faults in the path between an Ingress and an Egress | ||||
| forwarding engines, but is unaware of the complexity of a path | ||||
| with replication, and expects bidirectionality. BFD asynchronous | ||||
| mode considers delivery as success whereas with DetNet and RAW, | ||||
| the bounded latency can be as important as the delivery itself, | ||||
| and delivering too late is actually a failure. Note that the BFD | ||||
| Demand mode with unsolicited notifications may be more suitable | ||||
| then the Asynchronous BFD mode. The use of the Demand mode in | ||||
| MPLS is analyzed in [I-D.mirsky-bfd-mpls-demand] and similar | ||||
| considerations could apply to IP as well. | ||||
| * [SPRING] and [BIER] define in-band signaling that influences the | ||||
| routing when decided at the head-end on the path. There's already | ||||
| one RAW-related draft at BIER [BIER-PREF] more may follow. RAW | ||||
| will need new in-band signaling when the decision is distributed, | ||||
| e.g., required chances of reliable delivery to destination within | ||||
| latency. This signaling enables relays to tune retries and | ||||
| replication to meet the required SLA. | ||||
| * [CCAMP] defines protocol-independent metrics and parameters | ||||
| (measurement attributes) for describing links and paths that are | ||||
| required for routing and signaling in technology-specific | ||||
| networks. RAW would be a source of requirements for CCAMP to | ||||
| define metrics that are significant to the focus radios. | ||||
| * [IPPM] develops and maintains standard metrics that can be applied | ||||
| to the quality, performance, and reliability of Internet data | ||||
| delivery services and applications running over transport layer | ||||
| protocols (e.g. TCP, UDP) over IP. | ||||
| 3. The RAW Framework | ||||
| 3.1. Scope and Prerequisites | ||||
| A prerequisite to the RAW operation is that an end-to-end routing | ||||
| function computes a complex sub-topology along which forwarding can | ||||
| happen between a source and one or more destinations. The concept of | ||||
| Track is specified in the 6TiSCH Architecture [6TiSCH-ARCHI] to | ||||
| represent that complex sub-topology. Tracks provide a high degree of | ||||
| redundancy and diversity and enable the DetNet PREOF, network coding, | ||||
| and possibly RAW specific techniques such as PAREO, leveraging | ||||
| frequency diversity, time diversity, and possibly other forms of | ||||
| diversity as well. | ||||
| How the routing operation (e.g., PCE) in the Controller Plane | ||||
| computes the Track is out of scope for RAW. The scope of the RAW | ||||
| operation is one Track, and the goal of the RAW operation is to | ||||
| optimize the use of the Track at the forwarding timescale to maintain | ||||
| the expected SLA while optimizing the usage of constrained resources | ||||
| such as energy and spectrum. | ||||
| Another prerequisite is that an IP link can be established over the | ||||
| radio with some guarantees in terms of service reliability, e.g., it | ||||
| can be relied upon to transmit a packet within a bounded latency and | ||||
| provides a guaranteed BER/PDR outside rare but existing transient | ||||
| outage windows that can last from split seconds to minutes. The | ||||
| radio layer can be programmed with abstract parameters, and can | ||||
| return an abstract view of the state of the Link to help the Network | ||||
| Layer forwarding decision (think DLEP from MANET). | ||||
| How the radio interface manages its lower layers is out of control | ||||
| and out of scope for RAW. In the same fashion, the non-RAW portion | ||||
| along a loose Track is by definition out of control and out of scope | ||||
| for RAW. Whether it is a single hop or a mesh is also unknown and | ||||
| out of scope. | ||||
| 3.2. Routing Time Scale vs. Forwarding Time Scale | ||||
| With DetNet, the Controller Plane Function that handles the routing | With DetNet, the Controller Plane Function that handles the routing | |||
| computation and maintenance (the PCE) can be centralized and can | computation and maintenance (the PCE) can be centralized and can | |||
| reside outside the network. In a wireless mesh, the path to the PCE | reside outside the network. In a wireless mesh, the path to the PCE | |||
| can be expensive and slow, possibly going across the whole mesh and | can be expensive and slow, possibly going across the whole mesh and | |||
| back. Reaching to the PCE can also be slow in regards to the speed | back. Reaching to the PCE can also be slow in regards to the speed | |||
| of events that affect the forwarding operation at the radio layer. | of events that affect the forwarding operation at the radio layer. | |||
| Due to that cost and latency, the Controller Plane is not expected to | Due to that cost and latency, the Controller Plane is not expected to | |||
| be sensitive/reactive to transient changes. The abstraction of a | be sensitive/reactive to transient changes. The abstraction of a | |||
| skipping to change at page 17, line 41 ¶ | skipping to change at page 17, line 33 ¶ | |||
| . I ----M-------N--***-- E .. | . I ----M-------N--***-- E .. | |||
| .. \ \ / / ... | .. \ \ / / ... | |||
| .. P--***--Q----------R .... | .. P--***--Q----------R .... | |||
| .. .... | .. .... | |||
| . <----- Fast -------> .... | . <----- Fast -------> .... | |||
| ....... .... | ....... .... | |||
| ................. | ................. | |||
| *** = flapping at this time | *** = flapping at this time | |||
| Figure 3: Time Scales | Figure 1: Time Scales | |||
| In the case of wireless, the changes that affect the forwarding | In the case of wireless, the changes that affect the forwarding | |||
| decision can happen frequently and often for short durations, e.g., a | decision can happen frequently and often for short durations, e.g., a | |||
| mobile object moves between a transmitter and a receiver, and will | mobile object moves between a transmitter and a receiver, and will | |||
| cancel the line of sight transmission for a few seconds, or a radar | cancel the line of sight transmission for a few seconds, or a radar | |||
| measures the depth of a pool and interferes on a particular channel | measures the depth of a pool and interferes on a particular channel | |||
| for a split second. | for a split second. | |||
| There is thus a desire to separate the long term computation of the | There is thus a desire to separate the long term computation of the | |||
| route and the short term forwarding decision. In that model, the | route and the short term forwarding decision. In that model, the | |||
| skipping to change at page 18, line 25 ¶ | skipping to change at page 18, line 14 ¶ | |||
| collection of SD-WAN tunnels. RAW formalizes a forwarding time scale | collection of SD-WAN tunnels. RAW formalizes a forwarding time scale | |||
| that is an order(s) of magnitude shorter than the controller plane | that is an order(s) of magnitude shorter than the controller plane | |||
| routing time scale, and separates the protocols and metrics that are | routing time scale, and separates the protocols and metrics that are | |||
| used at both scales. Routing can operate on long term statistics | used at both scales. Routing can operate on long term statistics | |||
| such as delivery ratio over minutes to hours, but as a first | such as delivery ratio over minutes to hours, but as a first | |||
| approximation can ignore flapping. On the other hand, the RAW | approximation can ignore flapping. On the other hand, the RAW | |||
| forwarding decision is made at the scale of the packet rate, and uses | forwarding decision is made at the scale of the packet rate, and uses | |||
| information that must be pertinent at the present time for the | information that must be pertinent at the present time for the | |||
| current transmission(s). | current transmission(s). | |||
| 3.3. Wireless Tracks | 3. The RAW Conceptual Model | |||
| The "6TiSCH Architecture" [6TiSCH-ARCHI] introduces the concept of | ||||
| Track. RAW extends the concept to any wireless mesh technology, | ||||
| including, e.g., Wi-Fi. A simple Track is composed of a direct | ||||
| sequence of reserved hops to ensure the transmission of a single | ||||
| packet from a source Node to a destination Node across a multihop | ||||
| path. | ||||
| A Complex Track provides multiple N-ECMP forwarding solutions. The | ||||
| Complex Track enables to support multi-path redundant forwarding by | ||||
| employing PRE functions [RFC8655] and the ingress and within the | ||||
| Track. For example, a Complex Track may branch off and rejoin over | ||||
| non-congruent segments. | ||||
| In the context of RAW, some links or segments in the Track may be | ||||
| reversible, meaning that they can be used in either direction. In | ||||
| that case, an indication in the packet signals the direction of the | ||||
| reversible links or segments that the packet traverses and thus | ||||
| places a constraint that prevents loops from occurring. An | ||||
| individual packet follows a destination-oriented directed acyclic | ||||
| graph (DODAG) towards a destination Node inside the Complex Track. | ||||
| 3.4. Flow Identification vs. Path Identification | ||||
| Section 4.7 of the DetNet Architecture [RFC8655] ties the app-flow | ||||
| identification which is an application-layer concept with the network | ||||
| path identification that depends on the networking technology by | ||||
| "exporting of flow identification", e.g., to a MPLS label. | ||||
| With RAW, this exporting operation is injective but not bijective. | ||||
| e.g., a flow is fully placed within one RAW Track, but not all | ||||
| packets along that Track are necessarily part of the same flow. For | ||||
| instance, out-of-band OAM packets must circulate in the exact same | ||||
| fashion as the flows that they observe. It results that the flow | ||||
| identification that maps to an application layer flowat the network | ||||
| layer must be separate from the path identification that is used to | ||||
| forward a packet. | ||||
| Section 3.4 of the DetNet data-plane framework [DetNet-DP] indicates | ||||
| that for a DetNet IP Data Plane, a flow is identified by an IPv6 | ||||
| 6-tuple. With RAW, that 6-tuple is not what indicates the Track, in | ||||
| other words, the flow ID is not the Track ID. | ||||
| For instance, the 6TiSCH Architecture [6TiSCH-ARCHI] uses a | ||||
| combination of the address of the Egress End System and an instance | ||||
| identifier in a Hop-by-hop option to indicate a Track. This way, if | ||||
| a packet "escapes" the Track, it will reach the Track Egress point | ||||
| through normal routing and be treated at the service layer through, | ||||
| say, elimination and reordering. | ||||
| The RAW service includes forwarding over a subset of the Links that | ||||
| form the Track (a subTrack). Packets from the same or a different | ||||
| flow that are routed through the same Track will not necessarily | ||||
| traverse the same Links. The PSE selects a subTrack for a packet | ||||
| based on the links that are preferred and those that should be | ||||
| avoided at this time. | ||||
| Each packet is forwarded within the subTrack that provides the best | ||||
| adequation with the SLA of the flow and the energy and bandwidth | ||||
| constraints of the network. | ||||
| Flow 1 (6-tuple) ----+ | ||||
| | | ||||
| Flow 2 (6-tuple) ---+ | | ||||
| | | | ||||
| OAM -----------+ | | | ||||
| | | | | ||||
| | | | | ||||
| | | | | | | ||||
| | v v v | | ||||
| | | | ||||
| +---------+---------+ | ||||
| | | ||||
| | | ||||
| Track i (Ingress IP Address, RPLinstanceId) | ||||
| | | ||||
| | | ||||
| | | ||||
| +---------+-----+--....-------+ | ||||
| | | | | ||||
| | | | | ||||
| subTrack 1 subTrack 2 subTrack n | ||||
| | | | | ||||
| | | | | ||||
| V V V | ||||
| +-----------------------------------+ | ||||
| | | | ||||
| | Destination | | ||||
| | | | ||||
| +-----------------------------------+ | ||||
| Figure 4: Flow Injection | ||||
| With 6TiSCH, packets are tagged with the same (destination address, | ||||
| instance ID) will experience the same RAW service regardless of the | ||||
| IPv6 6-tuple that indicates the flow. The forwarding does not depend | ||||
| on whether the packets transport application flows or OAM. In the | ||||
| generic case, the Track or the subTrack can be signaled in the packet | ||||
| through other means, e.g., encoded in the suffix of the destination | ||||
| address as a Segment Routing Service Instruction [SR-ARCHI], or | ||||
| leveraging Bit Index Explicit Replication [BIER] Traffic Engineering | ||||
| [BIER-TE]. | ||||
| 3.5. Source-Routed vs. Distributed Forwarding Decision | ||||
| Within a large routed topology, the route-over mesh operation builds | ||||
| a particular complex Track with one source and one or more | ||||
| destinations; within the Track, packets may follow different paths | ||||
| and may be subject to RAW forwarding operations that include | ||||
| replication, elimination, retries, overhearing and reordering. | ||||
| The RAW forwarding decisions include the selection of points of | ||||
| replication and elimination, how many retries can take place, and a | ||||
| limit of validity for the packet beyond which the packet should be | ||||
| destroyed rather than forwarded uselessly further down the Track. | ||||
| The decision to apply the RAW techniques must be done quickly, and | ||||
| depends on a very recent and precise knowledge of the forwarding | ||||
| conditions within the complex Track. There is a need for an | ||||
| observation method to provide the RAW Data Plane with the specific | ||||
| knowledge of the state of the Track for the type of flow of interest | ||||
| (e.g., for a QoS level of interest). To observe the whole Track in | ||||
| quasi real time, RAW considers existing tools such as L2-triggers, | ||||
| DLEP, BFD and leverages in-band and out-of-band OAM to capture and | ||||
| report that information to the PSE. | ||||
| One possible way of making the RAW forwarding decisions within a | ||||
| Track is to position a unique PSE at the Ingress and express its | ||||
| decision in-band in the packet, which requires the explicit signaling | ||||
| of the subTrack within the Track. In that case, the RAW forwarding | ||||
| operation along the Track is encoded by the source, e.g., by | ||||
| indicating the subTrack in the Segment Routing (SRv6) Service | ||||
| Instruction, or by leveraging BIER-TE such as done with [BIER-PREF]. | ||||
| The alternate way is to operate the PSE in each forwarding Node, | ||||
| which makes the RAW forwarding decisions for a packet on its own, | ||||
| based on its knowledge of the expectation (timeliness and | ||||
| reliability) for that packet and a recent observation of the rest of | ||||
| the way across the possible paths based on OAM. Information about | ||||
| the desired service should be placed in the packet and matched with | ||||
| the forwarding Node's capabilities and policies. | ||||
| In either case, a per-track/subTrack state is installed in all the | ||||
| intermediate Nodes to recognize the packets that are following a | ||||
| Track and determine the forwarding operation to be applied. | ||||
| 3.6. Encapsulation and Decapsulation | ||||
| In the generic case where the Track Ingress Node is not the source of | ||||
| the Packet, the Ingress Node needs to encapsulate IP-in-IP to ensure | ||||
| that the Destination IP Address is that of the Egress Node and that | ||||
| the necessary Headers (Routing Header, Segment Routing Header and/or | ||||
| Hop-By-Hop Header) can be added to the packet to signal the Track or | ||||
| the subTrack, conforming [IPv6] that discourages the insertion of a | ||||
| Header on the fly. | ||||
| In the specific case where the Ingress Node is the source of the | ||||
| packet, the encapsulation can be avoided, provided that the source | ||||
| adds the necessary headers and that the destination is set to the | ||||
| Egress Node. Forwarding to a final destination beyond the Egress | ||||
| Node is possible, e.g., with a Segment Routing Header that signals | ||||
| the rest of the way. In that case a Hop-by-Hop Header is not | ||||
| recommmended since its validity is within the Track only. | ||||
| 4. The RAW Architecture | ||||
| 4.1. The RAW Conceptual Model | ||||
| RAW inherits the conceptual model described in section 4 of the | RAW inherits the conceptual model described in section 4 of the | |||
| DetNet Architecture [RFC8655]. RAW extends the DetNet service layer | DetNet Architecture [RFC8655]. RAW extends the DetNet service layer | |||
| to provide additional agility against transmission loss. | to provide additional agility against transmission loss. | |||
| A RAW Network Plane may be strict or loose, depending on whether RAW | A RAW Network Plane may be strict or loose, depending on whether RAW | |||
| observes and takes actions on all hops or not. For instance, the | observes and takes actions on all hops or not. For instance, the | |||
| packets between two wireless entities may be relayed over a wired | packets between two wireless entities may be relayed over a wired | |||
| infrastructure such as a Wi-Fi extended service set (ESS) or a 5G | infrastructure such as a Wi-Fi extended service set (ESS) or a 5G | |||
| Core; in that case, RAW observes and control the transmission over | Core; in that case, RAW observes and control the transmission over | |||
| skipping to change at page 23, line 25 ¶ | skipping to change at page 19, line 22 ¶ | |||
| z-- Node z-- Node z-- Node z-- Node --z | z-- Node z-- Node z-- Node z-- Node --z | |||
| Ingress --z / / z-- Egress | Ingress --z / / z-- Egress | |||
| End \ \ .. . End | End \ \ .. . End | |||
| Node ---z / / .. .. . z-- Node | Node ---z / / .. .. . z-- Node | |||
| z-- RAW --z RAW ( non-RAW ) -- RAW --z | z-- RAW --z RAW ( non-RAW ) -- RAW --z | |||
| Node z-- Node --- ( Nodes ) Node | Node z-- Node --- ( Nodes ) Node | |||
| ... . | ... . | |||
| --z wireless wired | --z wireless wired | |||
| z-- link --- link | z-- link --- link | |||
| Figure 5: RAW Nodes | Figure 2: RAW Nodes | |||
| The Link-Layer metrics are reported to the PCE in a time-aggregated, | The Link-Layer metrics are reported to the PCE in a time-aggregated, | |||
| e.g., statistical fashion. Example Link-Layer metrics include | e.g., statistical fashion. Example Link-Layer metrics include | |||
| typical Link bandwidth (the medium speed depends dynamically on the | typical Link bandwidth (the medium speed depends dynamically on the | |||
| PHY mode and the number of users sharing the spectrum) and average | PHY mode and the number of users sharing the spectrum) and average | |||
| and mean squared deviation of availability and reliability figures | and mean squared deviation of availability and reliability figures | |||
| such as Packet Delivery Ratio (PDR) over long periods of time. | such as Packet Delivery Ratio (PDR) over long periods of time. | |||
| Based on those metrics, the PCE installs the Track with enough | Based on those metrics, the PCE installs the Track with enough | |||
| redundant forwarding solutions to ensure that the Network Plane can | redundant forwarding solutions to ensure that the Network Plane can | |||
| skipping to change at page 24, line 9 ¶ | skipping to change at page 20, line 5 ¶ | |||
| segments, either interleaved inside the Track, or all the way to the | segments, either interleaved inside the Track, or all the way to the | |||
| Egress End Node (e.g., a server in the Internet). RAW observes the | Egress End Node (e.g., a server in the Internet). RAW observes the | |||
| Lower-Layer Links between RAW nodes (typically, radio links) and the | Lower-Layer Links between RAW nodes (typically, radio links) and the | |||
| end-to-end Network Layer operation to decide at all times which of | end-to-end Network Layer operation to decide at all times which of | |||
| the PAREO diversity schemes is actioned by which RAW Nodes. | the PAREO diversity schemes is actioned by which RAW Nodes. | |||
| Once a Track is established, per-segment and end-to-end reliability | Once a Track is established, per-segment and end-to-end reliability | |||
| and availability statistics are periodically reported to the PCE to | and availability statistics are periodically reported to the PCE to | |||
| assure that the SLA can be met or have it recompute the Track if not. | assure that the SLA can be met or have it recompute the Track if not. | |||
| 4.2. The OODA Loop | 4. The OODA Loop | |||
| The RAW Architecture is structured as an OODA Loop (Observe, Orient, | The RAW Architecture is structured as an OODA Loop (Observe, Orient, | |||
| Decide, Act). It involves: | Decide, Act). It involves: | |||
| 1. Network Plane measurement protocols for Operations, | 1. Network Plane measurement protocols for Operations, | |||
| Administration and Maintenance (OAM) to Observe some or all hops | Administration and Maintenance (OAM) to Observe some or all hops | |||
| along a Track as well as the end-to-end packet delivery, more in | along a Track as well as the end-to-end packet delivery, more in | |||
| Section 4.3; | Section 5; | |||
| 2. Controller plane elements to reports the links statistics to a | 2. Controller plane elements to reports the links statistics to a | |||
| Path computation Element (PCE) in a centralized controller that | Path computation Element (PCE) in a centralized controller that | |||
| computes and installs the Tracks and provides meta data to Orient | computes and installs the Tracks and provides meta data to Orient | |||
| the routing decision, more in Section 4.4; | the routing decision, more in Section 6; | |||
| 3. A Runtime distributed Path Selection Engine (PSE) thar Decides | 3. A Runtime distributed Path Selection Engine (PSE) thar Decides | |||
| which subTrack to use for the next packet(s) that are routed | which subTrack to use for the next packet(s) that are routed | |||
| along the Track, more in Section 4.5; | along the Track, more in Section 7; | |||
| 4. Packet (hybrid) ARQ, Replication, Elimination and Ordering | 4. Packet (hybrid) ARQ, Replication, Elimination and Ordering | |||
| Dataplane actions that operate at the DetNet Service Layer to | Dataplane actions that operate at the DetNet Service Layer to | |||
| increase the reliability o fthe end-to-end transmission. The RAW | increase the reliability o fthe end-to-end transmission. The RAW | |||
| architecture also covers in-situ signalling when the decision is | architecture also covers in-situ signalling when the decision is | |||
| Acted by a node that down the Track from the PSE, more in | Acted by a node that down the Track from the PSE, more in | |||
| Section 4.6. | Section 8. | |||
| +-------> Orient (PCE) --------+ | +-------> Orient (PCE) --------+ | |||
| | link stats, | | | link stats, | | |||
| | pre-trained model | | | pre-trained model | | |||
| | ... | | | ... | | |||
| | | | | | | |||
| | v | | v | |||
| Observe (OAM) Decide (PSE) | Observe (OAM) Decide (PSE) | |||
| ^ | | ^ | | |||
| | | | | | | |||
| | | | | | | |||
| +-------- Act (PAREO) <--------+ | +-------- Act (PAREO) <--------+ | |||
| At DetNet | At DetNet | |||
| Service sublayer | Service sublayer | |||
| Figure 6: The RAW OODA Loop | Figure 3: The RAW OODA Loop | |||
| The overall OODA Loop optimizes the use of redundancy to achieve the | The overall OODA Loop optimizes the use of redundancy to achieve the | |||
| required reliability and availability Service Level Agreement (SLA) | required reliability and availability Service Level Agreement (SLA) | |||
| while minimizing the use of constrained resources such as spectrum | while minimizing the use of constrained resources such as spectrum | |||
| and battery. | and battery. | |||
| 4.3. Observe: The RAW OAM | 5. Observe: The RAW OAM | |||
| RAW In-situ OAM operation in the Network Plane may observe either a | RAW In-situ OAM operation in the Network Plane may observe either a | |||
| full Track or subTracks that are being used at this time. Active RAW | full Track or subTracks that are being used at this time. Active RAW | |||
| OAM may be needed to observe the unused segments and evaluate the | OAM may be needed to observe the unused segments and evaluate the | |||
| desirability of a rerouting decision. Finally, the RAW Service Layer | desirability of a rerouting decision. Finally, the RAW Service Layer | |||
| Assurance may observe the individual PAREO operation of a relay node | Assurance may observe the individual PAREO operation of a relay node | |||
| to ensure that it is conforming; this might require injecting an OAM | to ensure that it is conforming; this might require injecting an OAM | |||
| packet at an upstream point inside the Track and extracting that | packet at an upstream point inside the Track and extracting that | |||
| packet at another point downstream before it reaches the egress. | packet at another point downstream before it reaches the egress. | |||
| skipping to change at page 25, line 39 ¶ | skipping to change at page 21, line 34 ¶ | |||
| |Ingress|- . ..... |Egress| | |Ingress|- . ..... |Egress| | |||
| | End |------ RAN 2 -- . Internet ....---| End | | | End |------ RAN 2 -- . Internet ....---| End | | |||
| |System |- .. ..... |System| | |System |- .. ..... |System| | |||
| +-------+ \ . ...... +------+ | +-------+ \ . ...... +------+ | |||
| \ ... ... ..... | \ ... ... ..... | |||
| RAN n -------- ... ..... | RAN n -------- ... ..... | |||
| <------------------> <--------------------> | <------------------> <--------------------> | |||
| Observed by OAM Opaque to OAM | Observed by OAM Opaque to OAM | |||
| Figure 7: Observed Links in Radio Access Protection | Figure 4: Observed Links in Radio Access Protection | |||
| In the case of a End-to-End Protection in a Wireless Mesh, the Track | In the case of a End-to-End Protection in a Wireless Mesh, the Track | |||
| is strict and congruent with the path so all links are observed. | is strict and congruent with the path so all links are observed. | |||
| Conversely, in the case of Radio Access Protection, the Track is | Conversely, in the case of Radio Access Protection, the Track is | |||
| Loose and in that case only the first hop is observed; the rest of | Loose and in that case only the first hop is observed; the rest of | |||
| the path is abstracted and considered infinitely reliable. | the path is abstracted and considered infinitely reliable. | |||
| In the case of the Radio Access Protection, only the first hop is | In the case of the Radio Access Protection, only the first hop is | |||
| protected; the loss of a packet that was sent over one of the | protected; the loss of a packet that was sent over one of the | |||
| possible first hops is attributed to that first hop, even if a | possible first hops is attributed to that first hop, even if a | |||
| skipping to change at page 26, line 14 ¶ | skipping to change at page 22, line 14 ¶ | |||
| The Links that are not observed by OAM are opaque to it, meaning that | The Links that are not observed by OAM are opaque to it, meaning that | |||
| the OAM information is carried across and possibly echoed as data, | the OAM information is carried across and possibly echoed as data, | |||
| but there is no information capture in intermediate nodes. In the | but there is no information capture in intermediate nodes. In the | |||
| example above, the Internet is opaque and not controlled by RAW; | example above, the Internet is opaque and not controlled by RAW; | |||
| still the RAW OAM measures the end-to-end latency and delivery ratio | still the RAW OAM measures the end-to-end latency and delivery ratio | |||
| for packets sent via each if RAN 1, RAN 2 and RAN 3, and determines | for packets sent via each if RAN 1, RAN 2 and RAN 3, and determines | |||
| whether a packet should be sent over either or a collection of those | whether a packet should be sent over either or a collection of those | |||
| access links. | access links. | |||
| 4.3.1. DetNet OAM | 6. Orient: The Path Computation Engine | |||
| [detnet] provides an OAM framework with [DetNet-OAM] that applies | ||||
| within the DetNet dataplane described in [DetNet-DP],which is | ||||
| typically based on MPLS or IPv6 pseudowires. How the framework | ||||
| applies to IPv6 is detailed in [DetNet-IP-OAM]. Within that | ||||
| framework, OAM messages follow the same forward path as the data | ||||
| packets and gather information about their individual treatment at | ||||
| each hop. When the destination receives an OAM message, it gets a | ||||
| view on the full path or at least of a segment of the path from the | ||||
| source of the flow. | ||||
| In-situ OAM (IOAM) adds telemetry information about the experience of | ||||
| one packet within the packet itself [I-D.ietf-ippm-ioam-data], with | ||||
| the caveats that the measurement and the consecutive update of the | ||||
| packet interfere with the operation being observed, e.g., may | ||||
| increase the latency of the packet for which it is measured and into | ||||
| which it is stamped. | ||||
| Note: IOAM and analogous on-path telemetry methods are capable of | ||||
| facilitating collection of useful telemetry information that | ||||
| characterizes the state of a system as experienced by the packet. | ||||
| But because of statistical character of a packet network, these | ||||
| methods may not be used to monitor the continuity of a path (Track) | ||||
| or proper connectivity of the Track (no leaking packets across | ||||
| Tracks). | ||||
| This effect can be alleviated by measuring on the fly but reporting | ||||
| later, e.g., by exporting the data as a separate management packet | ||||
| [I-D.ietf-ippm-ioam-direct-export]. | ||||
| [I-D.mirsky-ippm-hybrid-two-step] proposes an hybrid two-steps method | ||||
| (HTS) where a trigger message starts the measurement and a follow up | ||||
| along the Track packet gathers the measured data. | ||||
| "Error Performance Measurement" [I-D.mirsky-ippm-epm] uses Fault | ||||
| Management (FM) and Performance Management (PM) OAM mechanisms to | ||||
| determine availability/unavailability of a path according to | ||||
| predefined SLA. | ||||
| 4.3.2. RAW Extensions | ||||
| Classical OAM typically measures information at the transmitter, | ||||
| e.g., residence time in the node or transmit queue size. With RAW, | ||||
| there is a need to combine information at the sender (number of | ||||
| retries) with that at the receiver (LQI, RSSI). This doubles the | ||||
| operating cost of an IAOM processing that would gather the experience | ||||
| of a single packet. | ||||
| The RAW PSE may be centralized at the Track Ingress, or distributed | ||||
| long the Track. Either way, the PSE needs instant information about | ||||
| the rest of the way to the destination over the possible next-hop | ||||
| adjacencies along the Track in order to decide how to perform simple | ||||
| forwarding, load balancing, and/or replication, as well as | ||||
| determining how much latency credit is available for ARQ. | ||||
| To provide that information timely, it makes sense that the OAM | ||||
| packets that gather instantaneous values from the radio senders and | ||||
| receivers at each hop flow on the reverse path and inform the PSE at | ||||
| the source and/or the PAREO relays about the state of the rest of the | ||||
| way. This is achieved using Reverse OAM packets that flow along the | ||||
| Reversed Track, West to East. | ||||
| Because the quality of transmission over a wireless medium varies | ||||
| continuously, it is important that RAW OAM captures the state of the | ||||
| medium across an adjacency over multiple transmission and over a | ||||
| recent period of time, whether the transmitted packets belong to this | ||||
| flow or another. Some of the measured information relates to the | ||||
| medium itself. In other words, the captured information does not | ||||
| only relate to the experience of one packet as is the case for IOAM, | ||||
| but also to the medium itself. This makes an approach like HTS more | ||||
| suitable as it can trigger the capture of multiple measurements over | ||||
| a short period of time. On the other hand, the PSE needs a | ||||
| continuous measurement stream where a single trigger is followed by a | ||||
| periodic follow up capture. | ||||
| In other words, the best suited OAM method to enable the PSE make | ||||
| accurate PAREO forwarding decisions is a periodic variation of the | ||||
| two-steps method flowing along the reverse Track, as an upstream OAM | ||||
| technique. [RAW-OAM] provides more information on the RAW OAM | ||||
| problem and solution approaches. | ||||
| 4.3.3. Observed Metrics | ||||
| The Dynamic Link Exchange Protocol (DLEP) [RFC8175] from [MANET] can | ||||
| be leveraged at each hop to derive generic radio metrics (e.g., based | ||||
| on LQI, RSSI, queueing delays and ETX) on individual hops. | ||||
| Those lower-layer metrics are aggregated along a multihop segment | ||||
| into abstract layer 3 information that reflect the instant | ||||
| reliability and latency of the observed path. | ||||
| 4.4. Orient: The Path Computation Engine | ||||
| RAW separates the path computation time scale at which a complex path | RAW separates the path computation time scale at which a complex path | |||
| is recomputed from the path selection time scale at which the | is recomputed from the path selection time scale at which the | |||
| forwarding decision is taken for one or a few packets (see in | forwarding decision is taken for one or a few packets (see in | |||
| Section 3.2). | Section 2.3). | |||
| The path computation is out of scope, but RAW expects that the | The path computation is out of scope, but RAW expects that the | |||
| Controller plane protocol that installs the Track also provides | Controller plane protocol that installs the Track also provides | |||
| related knowledge in the form of meta data about the links, segments | related knowledge in the form of meta data about the links, segments | |||
| and possible subTracks. That meta data can be a pre-digested | and possible subTracks. That meta data can be a pre-digested | |||
| statistical model, and may include prediction of future flaps and | statistical model, and may include prediction of future flaps and | |||
| packet loss, as well as recommended actions when that happens. | packet loss, as well as recommended actions when that happens. | |||
| The meta data may include: | The meta data may include: | |||
| skipping to change at page 28, line 39 ¶ | skipping to change at page 22, line 44 ¶ | |||
| * Link Quality Statistics and their projected evolution | * Link Quality Statistics and their projected evolution | |||
| The Track is installed with measurable objectives that are computed | The Track is installed with measurable objectives that are computed | |||
| by the PCE to achieve the RAW SLA. The objectives can be expressed | by the PCE to achieve the RAW SLA. The objectives can be expressed | |||
| as any of maximum number of packet lost in a row, bounded latency, | as any of maximum number of packet lost in a row, bounded latency, | |||
| maximal jitter, maximum nmuber of interleaved out of order packets, | maximal jitter, maximum nmuber of interleaved out of order packets, | |||
| average number of copies received at the elimination point, and | average number of copies received at the elimination point, and | |||
| maximal delay between the first and the last received copy of the | maximal delay between the first and the last received copy of the | |||
| same packet. | same packet. | |||
| 4.5. Decide: The Path Selection Engine | 7. Decide: The Path Selection Engine | |||
| The RAW OODA Loop operates at the path selection time scale to | The RAW OODA Loop operates at the path selection time scale to | |||
| provide agility vs. the brute force approach of flooding the whole | provide agility vs. the brute force approach of flooding the whole | |||
| Track. The OODA Loop controls, within the redundant solutions that | Track. The OODA Loop controls, within the redundant solutions that | |||
| are proposed by the PCE, which will be used for each packet to | are proposed by the PCE, which will be used for each packet to | |||
| provide a Reliable and Available service while minimizing the waste | provide a Reliable and Available service while minimizing the waste | |||
| of constrained resources. | of constrained resources. | |||
| To that effect, RAW defines the Path Selection Engine (PSE) that is | To that effect, RAW defines the Path Selection Engine (PSE) that is | |||
| the counterpart of the PCE to perform rapid local adjustments of the | the counterpart of the PCE to perform rapid local adjustments of the | |||
| skipping to change at page 29, line 48 ¶ | skipping to change at page 23, line 48 ¶ | |||
| +---------------+------------------------+-------------------+ | +---------------+------------------------+-------------------+ | |||
| Table 1: PCE vs. PSE | Table 1: PCE vs. PSE | |||
| The PSE sits in the DetNet Service sub-Layer of Edge and Relay Nodes. | The PSE sits in the DetNet Service sub-Layer of Edge and Relay Nodes. | |||
| On the one hand, it operates on the packet flow, learning the Track | On the one hand, it operates on the packet flow, learning the Track | |||
| and path selection information from the packet, possibly making local | and path selection information from the packet, possibly making local | |||
| decision and retagging the packet to indicate so. On the other hand, | decision and retagging the packet to indicate so. On the other hand, | |||
| the PSE interacts with the lower layers and with its peers to obtain | the PSE interacts with the lower layers and with its peers to obtain | |||
| up-to-date information about its radio links and the quality of the | up-to-date information about its radio links and the quality of the | |||
| overall Track, respectively, as illustrated in Figure 8. | overall Track, respectively, as illustrated in Figure 5. | |||
| | | | | |||
| packet | going | packet | going | |||
| down the | stack | down the | stack | |||
| +==========v==========+=====================+=====================+ | +==========v==========+=====================+=====================+ | |||
| | (iOAM + iCTRL) | (L2 Triggers, DLEP) | (oOAM) | | | (iOAM + iCTRL) | (L2 Triggers, DLEP) | (oOAM) | | |||
| +==========v==========+=====================+=====================+ | +==========v==========+=====================+=====================+ | |||
| | Learn from Learn from | | | Learn from Learn from | | |||
| | packet tagging Maintain end-to-end | | | packet tagging Maintain end-to-end | | |||
| +----------v----------+ Forwarding OAM packets | | +----------v----------+ Forwarding OAM packets | | |||
| skipping to change at page 30, line 25 ¶ | skipping to change at page 24, line 25 ¶ | |||
| +----------v----------+ | Enrich or | | +----------v----------+ | Enrich or | | |||
| + Retag Packet | Learn abstracted > Regenerate | | + Retag Packet | Learn abstracted > Regenerate | | |||
| | and Forward | metrics about Links | OAM packets | | | and Forward | metrics about Links | OAM packets | | |||
| +..........v..........+..........^..........+.........^.v.........+ | +..........v..........+..........^..........+.........^.v.........+ | |||
| | Lower layers | | | Lower layers | | |||
| +..........v.....................^....................^.v.........+ | +..........v.....................^....................^.v.........+ | |||
| frame | sent Frame | L2 Ack oOAM | | packet | frame | sent Frame | L2 Ack oOAM | | packet | |||
| over | wireless In | In | | and out | over | wireless In | In | | and out | |||
| v | | v | v | | v | |||
| Figure 8: PSE | Figure 5: PSE | |||
| 4.6. Act: The PAREO Functions | 8. Act: The PAREO Functions | |||
| RAW may control whether and how to use packet replication and | RAW may control whether and how to use packet replication and | |||
| elimination (PRE), Automatic Repeat reQuest (ARQ), Hybrid ARQ (HARQ) | elimination (PRE), Automatic Repeat reQuest (ARQ), Hybrid ARQ (HARQ) | |||
| that includes Forward Error Correction (FEC) and coding, and other | that includes Forward Error Correction (FEC) and coding, and other | |||
| wireless-specific techniques such as overhearing and constructive | wireless-specific techniques such as overhearing and constructive | |||
| interferences, in order to increase the reliabiility and availability | interferences, in order to increase the reliabiility and availability | |||
| of the end-to-end transmission. | of the end-to-end transmission. | |||
| Collectively, those function are called PAREO for Packet (hybrid) | Collectively, those function are called PAREO for Packet (hybrid) | |||
| ARQ, Replication, Elimination and Ordering. By tuning dynamically | ARQ, Replication, Elimination and Ordering. By tuning dynamically | |||
| the use of PAREO functions, RAW avoids the waste of critical | the use of PAREO functions, RAW avoids the waste of critical | |||
| resources such as spectrum and energy while providing that the | resources such as spectrum and energy while providing that the | |||
| guaranteed SLA, e.g., by adding redundancy only when a spike of loss | guaranteed SLA, e.g., by adding redundancy only when a spike of loss | |||
| is observed. | is observed. | |||
| In a nutshell, PAREO establishes several paths in a network to | In a nutshell, PAREO establishes several paths in a network to | |||
| provide redundancy and parallel transmissions to bound the end-to-end | provide redundancy and parallel transmissions to bound the end-to-end | |||
| delay to traverse the network. Optionally, promiscuous listening | delay to traverse the network. Optionally, promiscuous listening | |||
| between paths is possible, such that the Nodes on one path may | between paths is possible, such that the Nodes on one path may | |||
| overhear transmissions along the other path. Considering the | overhear transmissions along the other path. Considering the | |||
| scenario shown in Figure 9, many different paths are possible for to | scenario shown in Figure 6, many different paths are possible for to | |||
| traverse the network from ingress to egress. A simple way to benefit | traverse the network from ingress to egress. A simple way to benefit | |||
| from this topology could be to use the two independent paths via | from this topology could be to use the two independent paths via | |||
| Nodes A, C, E and via B, D, F. But more complex paths are possible | Nodes A, C, E and via B, D, F. But more complex paths are possible | |||
| by interleaving transmissions from the lower level of the path to the | by interleaving transmissions from the lower level of the path to the | |||
| upper level. | upper level. | |||
| (A) -- (C) -- (E) | (A) -- (C) -- (E) | |||
| / \ | / \ | |||
| Ingress = | | | = Egress | Ingress = | | | = Egress | |||
| \ / | \ / | |||
| (B) -- (D) -- (F) | (B) -- (D) -- (F) | |||
| Figure 9: A Ladder Shape with Two Parallel Paths | Figure 6: A Ladder Shape with Two Parallel Paths | |||
| PAREO may also take advantage of the shared properties of the | PAREO may also take advantage of the shared properties of the | |||
| wireless medium to compensate for the potential loss that is incurred | wireless medium to compensate for the potential loss that is incurred | |||
| with radio transmissions. | with radio transmissions. | |||
| For instance, when the source sends to Node A, Node B may listen | For instance, when the source sends to Node A, Node B may listen | |||
| promiscuously and get a second chance to receive the frame without an | promiscuously and get a second chance to receive the frame without an | |||
| additional transmission. Note that B would not have to listen if it | additional transmission. Note that B would not have to listen if it | |||
| already received that particular frame at an earlier timeslot in a | already received that particular frame at an earlier timeslot in a | |||
| dedicated transmission towards B. | dedicated transmission towards B. | |||
| The PAREO model can be implemented in both centralized and | The PAREO model can be implemented in both centralized and | |||
| distributed scheduling approaches. In the centralized approach, a | distributed scheduling approaches. In the centralized approach, a | |||
| Path Computation Element (PCE) scheduler calculates a Track and | Path Computation Element (PCE) scheduler calculates a Track and | |||
| schedules the communication. In the distributed approach, the Track | schedules the communication. In the distributed approach, the Track | |||
| is computed within the network, and signaled in the packets, e.g., | is computed within the network, and signaled in the packets, e.g., | |||
| using BIER-TE, Segment Routing, or a Source Routing Header. | using BIER-TE, Segment Routing, or a Source Routing Header. | |||
| 4.6.1. Packet Replication | 8.1. Packet Replication | |||
| By employing a Packet Replication procedure, a Node forwards a copy | By employing a Packet Replication procedure, a Node forwards a copy | |||
| of each data packet to more than one successor. To do so, each Node | of each data packet to more than one successor. To do so, each Node | |||
| (i.e., Ingress and intermediate Node) sends the data packet multiple | (i.e., Ingress and intermediate Node) sends the data packet multiple | |||
| times as separate unicast transmissions. For instance, in Figure 10, | times as separate unicast transmissions. For instance, in Figure 7, | |||
| the Ingress Node is transmitting the packet to both successors, nodes | the Ingress Node is transmitting the packet to both successors, nodes | |||
| A and B, at two different times. | A and B, at two different times. | |||
| ===> (A) => (C) => (E) === | ===> (A) => (C) => (E) === | |||
| // \\// \\// \\ | // \\// \\// \\ | |||
| Ingress //\\ //\\ Egress | Ingress //\\ //\\ Egress | |||
| \\ // \\ // \\ // | \\ // \\ // \\ // | |||
| ===> (B) => (D) => (F) === | ===> (B) => (D) => (F) === | |||
| Figure 10: Packet Replication | Figure 7: Packet Replication | |||
| An example schedule is shown in Table 2. This way, the transmission | An example schedule is shown in Table 2. This way, the transmission | |||
| leverages with the time and spatial forms of diversity. | leverages with the time and spatial forms of diversity. | |||
| +=========+======+======+======+======+======+======+======+ | +=========+======+======+======+======+======+======+======+ | |||
| | Channel | 0 | 1 | 2 | 3 | 4 | 5 | 6 | | | Channel | 0 | 1 | 2 | 3 | 4 | 5 | 6 | | |||
| +=========+======+======+======+======+======+======+======+ | +=========+======+======+======+======+======+======+======+ | |||
| | 0 | S->A | S->B | B->C | B->D | C->F | E->R | F->R | | | 0 | S->A | S->B | B->C | B->D | C->F | E->R | F->R | | |||
| +---------+------+------+------+------+------+------+------+ | +---------+------+------+------+------+------+------+------+ | |||
| | 1 | | A->C | A->D | C->E | D->E | D->F | | | | 1 | | A->C | A->D | C->E | D->E | D->F | | | |||
| +---------+------+------+------+------+------+------+------+ | +---------+------+------+------+------+------+------+------+ | |||
| Table 2: Packet Replication: Sample schedule | Table 2: Packet Replication: Sample schedule | |||
| 4.6.2. Packet Elimination | 8.2. Packet Elimination | |||
| The replication operation increases the traffic load in the network, | The replication operation increases the traffic load in the network, | |||
| due to packet duplications. This may occur at several stages inside | due to packet duplications. This may occur at several stages inside | |||
| the Track, and to avoid an explosion of the number of copies, a | the Track, and to avoid an explosion of the number of copies, a | |||
| Packet Elimination procedure must be applied as well. To this aim, | Packet Elimination procedure must be applied as well. To this aim, | |||
| once a Node receives the first copy of a data packet, it discards the | once a Node receives the first copy of a data packet, it discards the | |||
| subsequent copies. | subsequent copies. | |||
| The logical functions of Replication and Elimination may be | The logical functions of Replication and Elimination may be | |||
| collocated in an intermediate Node, the Node first eliminating the | collocated in an intermediate Node, the Node first eliminating the | |||
| redundant copies and then sending the packet exactly once to each of | redundant copies and then sending the packet exactly once to each of | |||
| the selected successors. | the selected successors. | |||
| 4.6.3. Promiscuous Overhearing | 8.3. Promiscuous Overhearing | |||
| Considering that the wireless medium is broadcast by nature, any | Considering that the wireless medium is broadcast by nature, any | |||
| neighbor of a transmitter may overhear a transmission. By employing | neighbor of a transmitter may overhear a transmission. By employing | |||
| the Promiscuous Overhearing operation, the next hops have additional | the Promiscuous Overhearing operation, the next hops have additional | |||
| opportunities to capture the data packets. In Figure 11, when Node A | opportunities to capture the data packets. In Figure 8, when Node A | |||
| is transmitting to its DP (Node C), the AP (Node D) and its sibling | is transmitting to its DP (Node C), the AP (Node D) and its sibling | |||
| (Node B) may decode this data packet as well. As a result, by | (Node B) may decode this data packet as well. As a result, by | |||
| employing corellated paths, a Node may have multiple opportunities to | employing corellated paths, a Node may have multiple opportunities to | |||
| receive a given data packet. | receive a given data packet. | |||
| ===> (A) ====> (C) ====> (E) ==== | ===> (A) ====> (C) ====> (E) ==== | |||
| // ^ | \\ \\ | // ^ | \\ \\ | |||
| Ingress | | \\ Egress | Ingress | | \\ Egress | |||
| \\ | v \\ // | \\ | v \\ // | |||
| ===> (B) ====> (D) ====> (F) ==== | ===> (B) ====> (D) ====> (F) ==== | |||
| Figure 11: Unicast with Overhearing | Figure 8: Unicast with Overhearing | |||
| 4.6.4. Constructive Interference | 8.4. Constructive Interference | |||
| Constructive Interference can be seen as the reverse of Promiscuous | Constructive Interference can be seen as the reverse of Promiscuous | |||
| Overhearing, and refers to the case where two senders transmit the | Overhearing, and refers to the case where two senders transmit the | |||
| exact same signal in a fashion that the emitted symbols add up at the | exact same signal in a fashion that the emitted symbols add up at the | |||
| receiver and permit a reception that would not be possible with a | receiver and permit a reception that would not be possible with a | |||
| single sender at the same PHY mode and the same power level. | single sender at the same PHY mode and the same power level. | |||
| Constructive Interference was proposed on 5G, Wi-Fi7 and even tested | Constructive Interference was proposed on 5G, Wi-Fi7 and even tested | |||
| on IEEE Std 802.14.5. The hard piece is to synchronize the senders | on IEEE Std 802.14.5. The hard piece is to synchronize the senders | |||
| to the point that the signals are emitted at slightly different time | to the point that the signals are emitted at slightly different time | |||
| to offset the difference of propagation delay that corresponds to the | to offset the difference of propagation delay that corresponds to the | |||
| difference of distance of the transmitters to the receiver at the | difference of distance of the transmitters to the receiver at the | |||
| speed of light to the point that the symbols are superposed long | speed of light to the point that the symbols are superposed long | |||
| enough to be recognizable. | enough to be recognizable. | |||
| 5. Security Considerations | 9. Security Considerations | |||
| RAW uses all forms of diversity including radio technology and | RAW uses all forms of diversity including radio technology and | |||
| physical path to increase the reliability and availability in the | physical path to increase the reliability and availability in the | |||
| face of unpredictable conditions. While this is not done | face of unpredictable conditions. While this is not done | |||
| specifically to defeat an attacker, the amount of diversity used in | specifically to defeat an attacker, the amount of diversity used in | |||
| RAW makes an attack harder to achieve. | RAW makes an attack harder to achieve. | |||
| 5.1. Forced Access | 9.1. Forced Access | |||
| RAW will typically select the cheapest collection of links that | RAW will typically select the cheapest collection of links that | |||
| matches the requested SLA, for instance, leverage free WI-Fi vs. paid | matches the requested SLA, for instance, leverage free WI-Fi vs. paid | |||
| 3GPP access. By defeating the cheap connectivity (e.g., PHY-layer | 3GPP access. By defeating the cheap connectivity (e.g., PHY-layer | |||
| interference) the attacker can force an End System to use the paid | interference) the attacker can force an End System to use the paid | |||
| access and increase the cost of the transmission for the user. | access and increase the cost of the transmission for the user. | |||
| 6. IANA Considerations | 10. IANA Considerations | |||
| This document has no IANA actions. | This document has no IANA actions. | |||
| 7. Contributors | 11. Contributors | |||
| The editor wishes to thank: | The editor wishes to thank: | |||
| Xavi Vilajosana: Wireless Networks Research Lab, Universitat Oberta | Xavi Vilajosana: Wireless Networks Research Lab, Universitat Oberta | |||
| de Catalunya | de Catalunya | |||
| Remous-Aris Koutsiamanis: IMT Atlantique | Remous-Aris Koutsiamanis: IMT Atlantique | |||
| Nicolas Montavont: IMT Atlantique | Nicolas Montavont: IMT Atlantique | |||
| Rex Buddenberg: Individual contributor | Rex Buddenberg: Individual contributor | |||
| Greg Mirsky: ZTE | Greg Mirsky: ZTE | |||
| for their contributions to the text and ideas exposed in this | for their contributions to the text and ideas exposed in this | |||
| document. | document. | |||
| 8. Acknowledgments | 12. Acknowledgments | |||
| TBD | TBD | |||
| 9. References | 13. References | |||
| 9.1. Normative References | 13.1. Normative References | |||
| [6TiSCH-ARCHI] | [6TiSCH-ARCHI] | |||
| Thubert, P., Ed., "An Architecture for IPv6 over the Time- | Thubert, P., Ed., "An Architecture for IPv6 over the Time- | |||
| Slotted Channel Hopping Mode of IEEE 802.15.4 (6TiSCH)", | Slotted Channel Hopping Mode of IEEE 802.15.4 (6TiSCH)", | |||
| RFC 9030, DOI 10.17487/RFC9030, May 2021, | RFC 9030, DOI 10.17487/RFC9030, May 2021, | |||
| <https://www.rfc-editor.org/info/rfc9030>. | <https://www.rfc-editor.org/info/rfc9030>. | |||
| [INT-ARCHI] | ||||
| Braden, R., Ed., "Requirements for Internet Hosts - | ||||
| Communication Layers", STD 3, RFC 1122, | ||||
| DOI 10.17487/RFC1122, October 1989, | ||||
| <https://www.rfc-editor.org/info/rfc1122>. | ||||
| [RAW-TECHNOS] | [RAW-TECHNOS] | |||
| Thubert, P., Cavalcanti, D., Vilajosana, X., Schmitt, C., | Thubert, P., Cavalcanti, D., Vilajosana, X., Schmitt, C., | |||
| and J. Farkas, "Reliable and Available Wireless | and J. Farkas, "Reliable and Available Wireless | |||
| Technologies", Work in Progress, Internet-Draft, draft- | Technologies", Work in Progress, Internet-Draft, draft- | |||
| ietf-raw-technologies-02, 7 June 2021, | ietf-raw-technologies-04, 3 August 2021, | |||
| <https://datatracker.ietf.org/doc/html/draft-ietf-raw- | <https://datatracker.ietf.org/doc/html/draft-ietf-raw- | |||
| technologies-02>. | technologies-04>. | |||
| [RAW-USE-CASES] | [RAW-USE-CASES] | |||
| Papadopoulos, G. Z., Thubert, P., Theoleyre, F., and C. J. | Papadopoulos, G. Z., Thubert, P., Theoleyre, F., and C. J. | |||
| Bernardos, "RAW use cases", Work in Progress, Internet- | Bernardos, "RAW use cases", Work in Progress, Internet- | |||
| Draft, draft-ietf-raw-use-cases-02, 12 July 2021, | Draft, draft-ietf-raw-use-cases-03, 20 October 2021, | |||
| <https://datatracker.ietf.org/doc/html/draft-ietf-raw-use- | <https://datatracker.ietf.org/doc/html/draft-ietf-raw-use- | |||
| cases-02>. | cases-03>. | |||
| [RFC4655] Farrel, A., Vasseur, J.-P., and J. Ash, "A Path | [RFC4655] Farrel, A., Vasseur, J.-P., and J. Ash, "A Path | |||
| Computation Element (PCE)-Based Architecture", RFC 4655, | Computation Element (PCE)-Based Architecture", RFC 4655, | |||
| DOI 10.17487/RFC4655, August 2006, | DOI 10.17487/RFC4655, August 2006, | |||
| <https://www.rfc-editor.org/info/rfc4655>. | <https://www.rfc-editor.org/info/rfc4655>. | |||
| [BFD] Katz, D. and D. Ward, "Bidirectional Forwarding Detection | [BFD] Katz, D. and D. Ward, "Bidirectional Forwarding Detection | |||
| (BFD)", RFC 5880, DOI 10.17487/RFC5880, June 2010, | (BFD)", RFC 5880, DOI 10.17487/RFC5880, June 2010, | |||
| <https://www.rfc-editor.org/info/rfc5880>. | <https://www.rfc-editor.org/info/rfc5880>. | |||
| skipping to change at page 35, line 28 ¶ | skipping to change at page 29, line 33 ¶ | |||
| [RFC8578] Grossman, E., Ed., "Deterministic Networking Use Cases", | [RFC8578] Grossman, E., Ed., "Deterministic Networking Use Cases", | |||
| RFC 8578, DOI 10.17487/RFC8578, May 2019, | RFC 8578, DOI 10.17487/RFC8578, May 2019, | |||
| <https://www.rfc-editor.org/info/rfc8578>. | <https://www.rfc-editor.org/info/rfc8578>. | |||
| [IPv6] Deering, S. and R. Hinden, "Internet Protocol, Version 6 | [IPv6] Deering, S. and R. Hinden, "Internet Protocol, Version 6 | |||
| (IPv6) Specification", STD 86, RFC 8200, | (IPv6) Specification", STD 86, RFC 8200, | |||
| DOI 10.17487/RFC8200, July 2017, | DOI 10.17487/RFC8200, July 2017, | |||
| <https://www.rfc-editor.org/info/rfc8200>. | <https://www.rfc-editor.org/info/rfc8200>. | |||
| [SR-ARCHI] Filsfils, C., Ed., Previdi, S., Ed., Ginsberg, L., | ||||
| Decraene, B., Litkowski, S., and R. Shakir, "Segment | ||||
| Routing Architecture", RFC 8402, DOI 10.17487/RFC8402, | ||||
| July 2018, <https://www.rfc-editor.org/info/rfc8402>. | ||||
| [BIER] Wijnands, IJ., Ed., Rosen, E., Ed., Dolganow, A., | ||||
| Przygienda, T., and S. Aldrin, "Multicast Using Bit Index | ||||
| Explicit Replication (BIER)", RFC 8279, | ||||
| DOI 10.17487/RFC8279, November 2017, | ||||
| <https://www.rfc-editor.org/info/rfc8279>. | ||||
| [RFC8175] Ratliff, S., Jury, S., Satterwhite, D., Taylor, R., and B. | ||||
| Berry, "Dynamic Link Exchange Protocol (DLEP)", RFC 8175, | ||||
| DOI 10.17487/RFC8175, June 2017, | ||||
| <https://www.rfc-editor.org/info/rfc8175>. | ||||
| [RFC8557] Finn, N. and P. Thubert, "Deterministic Networking Problem | [RFC8557] Finn, N. and P. Thubert, "Deterministic Networking Problem | |||
| Statement", RFC 8557, DOI 10.17487/RFC8557, May 2019, | Statement", RFC 8557, DOI 10.17487/RFC8557, May 2019, | |||
| <https://www.rfc-editor.org/info/rfc8557>. | <https://www.rfc-editor.org/info/rfc8557>. | |||
| [RFC8655] Finn, N., Thubert, P., Varga, B., and J. Farkas, | [RFC8655] Finn, N., Thubert, P., Varga, B., and J. Farkas, | |||
| "Deterministic Networking Architecture", RFC 8655, | "Deterministic Networking Architecture", RFC 8655, | |||
| DOI 10.17487/RFC8655, October 2019, | DOI 10.17487/RFC8655, October 2019, | |||
| <https://www.rfc-editor.org/info/rfc8655>. | <https://www.rfc-editor.org/info/rfc8655>. | |||
| [RFC9049] Dawkins, S., Ed., "Path Aware Networking: Obstacles to | [RFC9049] Dawkins, S., Ed., "Path Aware Networking: Obstacles to | |||
| Deployment (A Bestiary of Roads Not Taken)", RFC 9049, | Deployment (A Bestiary of Roads Not Taken)", RFC 9049, | |||
| DOI 10.17487/RFC9049, June 2021, | DOI 10.17487/RFC9049, June 2021, | |||
| <https://www.rfc-editor.org/info/rfc9049>. | <https://www.rfc-editor.org/info/rfc9049>. | |||
| 9.2. Informative References | 13.2. Informative References | |||
| [RFC0791] Postel, J., "Internet Protocol", STD 5, RFC 791, | [RFC0791] Postel, J., "Internet Protocol", STD 5, RFC 791, | |||
| DOI 10.17487/RFC0791, September 1981, | DOI 10.17487/RFC0791, September 1981, | |||
| <https://www.rfc-editor.org/info/rfc791>. | <https://www.rfc-editor.org/info/rfc791>. | |||
| [TE] Awduche, D., Chiu, A., Elwalid, A., Widjaja, I., and X. | [TE] Awduche, D., Chiu, A., Elwalid, A., Widjaja, I., and X. | |||
| Xiao, "Overview and Principles of Internet Traffic | Xiao, "Overview and Principles of Internet Traffic | |||
| Engineering", RFC 3272, DOI 10.17487/RFC3272, May 2002, | Engineering", RFC 3272, DOI 10.17487/RFC3272, May 2002, | |||
| <https://www.rfc-editor.org/info/rfc3272>. | <https://www.rfc-editor.org/info/rfc3272>. | |||
| skipping to change at page 37, line 5 ¶ | skipping to change at page 30, line 36 ¶ | |||
| So, "Remote Loop-Free Alternate (LFA) Fast Reroute (FRR)", | So, "Remote Loop-Free Alternate (LFA) Fast Reroute (FRR)", | |||
| RFC 7490, DOI 10.17487/RFC7490, April 2015, | RFC 7490, DOI 10.17487/RFC7490, April 2015, | |||
| <https://www.rfc-editor.org/info/rfc7490>. | <https://www.rfc-editor.org/info/rfc7490>. | |||
| [DetNet-DP] | [DetNet-DP] | |||
| Varga, B., Ed., Farkas, J., Berger, L., Malis, A., and S. | Varga, B., Ed., Farkas, J., Berger, L., Malis, A., and S. | |||
| Bryant, "Deterministic Networking (DetNet) Data Plane | Bryant, "Deterministic Networking (DetNet) Data Plane | |||
| Framework", RFC 8938, DOI 10.17487/RFC8938, November 2020, | Framework", RFC 8938, DOI 10.17487/RFC8938, November 2020, | |||
| <https://www.rfc-editor.org/info/rfc8938>. | <https://www.rfc-editor.org/info/rfc8938>. | |||
| [BIER-PREF] | [I-D.irtf-panrg-path-properties] | |||
| Thubert, P., Eckert, T., Brodard, Z., and H. Jiang, "BIER- | Enghardt, T. and C. Kraehenbuehl, "A Vocabulary of Path | |||
| TE extensions for Packet Replication and Elimination | Properties", Work in Progress, Internet-Draft, draft-irtf- | |||
| Function (PREF) and OAM", Work in Progress, Internet- | panrg-path-properties-04, 25 October 2021, | |||
| Draft, draft-thubert-bier-replication-elimination-03, 3 | <https://datatracker.ietf.org/doc/html/draft-irtf-panrg- | |||
| March 2018, <https://datatracker.ietf.org/doc/html/draft- | path-properties-04>. | |||
| thubert-bier-replication-elimination-03>. | ||||
| [DetNet-IP-OAM] | ||||
| Mirsky, G., Chen, M., and D. Black, "Operations, | ||||
| Administration and Maintenance (OAM) for Deterministic | ||||
| Networks (DetNet) with IP Data Plane", Work in Progress, | ||||
| Internet-Draft, draft-ietf-detnet-ip-oam-02, 30 March | ||||
| 2021, <https://datatracker.ietf.org/doc/html/draft-ietf- | ||||
| detnet-ip-oam-02>. | ||||
| [RAW-5G] Farkas, J., Dudda, T., Shapin, A., and S. Sandberg, "5G - | ||||
| Ultra-Reliable Wireless Technology with Low Latency", Work | ||||
| in Progress, Internet-Draft, draft-farkas-raw-5g-00, 1 | ||||
| April 2020, <https://datatracker.ietf.org/doc/html/draft- | ||||
| farkas-raw-5g-00>. | ||||
| [BIER-TE] Eckert, T., Cauchie, G., and M. Menth, "Tree Engineering | ||||
| for Bit Index Explicit Replication (BIER-TE)", Work in | ||||
| Progress, Internet-Draft, draft-ietf-bier-te-arch-10, 9 | ||||
| July 2021, <https://datatracker.ietf.org/doc/html/draft- | ||||
| ietf-bier-te-arch-10>. | ||||
| [IPoWIRELESS] | [IPoWIRELESS] | |||
| Thubert, P., "IPv6 Neighbor Discovery on Wireless | Thubert, P., "IPv6 Neighbor Discovery on Wireless | |||
| Networks", Work in Progress, Internet-Draft, draft- | Networks", Work in Progress, Internet-Draft, draft- | |||
| thubert-6man-ipv6-over-wireless-09, 17 May 2021, | thubert-6man-ipv6-over-wireless-10, 18 November 2021, | |||
| <https://datatracker.ietf.org/doc/html/draft-thubert-6man- | <https://datatracker.ietf.org/doc/html/draft-thubert-6man- | |||
| ipv6-over-wireless-09>. | ipv6-over-wireless-10>. | |||
| [RAW-OAM] Theoleyre, F., Papadopoulos, G. Z., Mirsky, G., and C. J. | ||||
| Bernardos, "Operations, Administration and Maintenance | ||||
| (OAM) features for RAW", Work in Progress, Internet-Draft, | ||||
| draft-ietf-raw-oam-support-02, 3 June 2021, | ||||
| <https://datatracker.ietf.org/doc/html/draft-ietf-raw-oam- | ||||
| support-02>. | ||||
| [I-D.ietf-ippm-ioam-direct-export] | ||||
| Song, H., Gafni, B., Zhou, T., Li, Z., Brockners, F., | ||||
| Bhandari, S., Sivakolundu, R., and T. Mizrahi, "In-situ | ||||
| OAM Direct Exporting", Work in Progress, Internet-Draft, | ||||
| draft-ietf-ippm-ioam-direct-export-05, 12 July 2021, | ||||
| <https://datatracker.ietf.org/doc/html/draft-ietf-ippm- | ||||
| ioam-direct-export-05>. | ||||
| [DetNet-OAM] | [DetNet-OAM] | |||
| Mirsky, G., Theoleyre, F., Papadopoulos, G. Z., and C. J. | Mirsky, G., Theoleyre, F., Papadopoulos, G. Z., Bernardos, | |||
| Bernardos, "Framework of Operations, Administration and | C. J., Varga, B., and J. Farkas, "Framework of Operations, | |||
| Maintenance (OAM) for Deterministic Networking (DetNet)", | Administration and Maintenance (OAM) for Deterministic | |||
| Work in Progress, Internet-Draft, draft-ietf-detnet-oam- | Networking (DetNet)", Work in Progress, Internet-Draft, | |||
| framework-03, 6 July 2021, | draft-ietf-detnet-oam-framework-05, 14 October 2021, | |||
| <https://datatracker.ietf.org/doc/html/draft-ietf-detnet- | <https://datatracker.ietf.org/doc/html/draft-ietf-detnet- | |||
| oam-framework-03>. | oam-framework-05>. | |||
| [I-D.mirsky-ippm-hybrid-two-step] | ||||
| Mirsky, G., Lingqiang, W., Zhui, G., and H. Song, "Hybrid | ||||
| Two-Step Performance Measurement Method", Work in | ||||
| Progress, Internet-Draft, draft-mirsky-ippm-hybrid-two- | ||||
| step-11, 8 July 2021, | ||||
| <https://datatracker.ietf.org/doc/html/draft-mirsky-ippm- | ||||
| hybrid-two-step-11>. | ||||
| [I-D.mirsky-ippm-epm] | ||||
| Mirsky, G., Min, X., and L. Han, "Error Performance | ||||
| Measurement in Packet-switched Networks", Work in | ||||
| Progress, Internet-Draft, draft-mirsky-ippm-epm-03, 26 | ||||
| March 2021, <https://datatracker.ietf.org/doc/html/draft- | ||||
| mirsky-ippm-epm-03>. | ||||
| [I-D.mirsky-bfd-mpls-demand] | ||||
| Mirsky, G., "BFD in Demand Mode over Point-to-Point MPLS | ||||
| LSP", Work in Progress, Internet-Draft, draft-mirsky-bfd- | ||||
| mpls-demand-09, 30 March 2021, | ||||
| <https://datatracker.ietf.org/doc/html/draft-mirsky-bfd- | ||||
| mpls-demand-09>. | ||||
| [I-D.ietf-ippm-ioam-data] | ||||
| Brockners, F., Bhandari, S., and T. Mizrahi, "Data Fields | ||||
| for In-situ OAM", Work in Progress, Internet-Draft, draft- | ||||
| ietf-ippm-ioam-data-14, 24 June 2021, | ||||
| <https://datatracker.ietf.org/doc/html/draft-ietf-ippm- | ||||
| ioam-data-14>. | ||||
| [NASA] Adams, T., "RELIABILITY: Definition & Quantitative | [NASA] Adams, T., "RELIABILITY: Definition & Quantitative | |||
| Illustration", <https://kscddms.ksc.nasa.gov/Reliability/ | Illustration", <https://kscddms.ksc.nasa.gov/Reliability/ | |||
| Documents/150814-3bWhatIsReliability.pdf>. | Documents/150814-3bWhatIsReliability.pdf>. | |||
| [MANET] IETF, "Mobile Ad hoc Networking", | ||||
| <https://dataTracker.ietf.org/doc/charter-ietf-manet/>. | ||||
| [detnet] IETF, "Deterministic Networking", | ||||
| <https://dataTracker.ietf.org/doc/charter-ietf-detnet/>. | ||||
| [SPRING] IETF, "Source Packet Routing in Networking", | ||||
| <https://dataTracker.ietf.org/doc/charter-ietf-spring/>. | ||||
| [BIER] IETF, "Bit Indexed Explicit Replication", | ||||
| <https://dataTracker.ietf.org/doc/charter-ietf-bier/>. | ||||
| [BFD] IETF, "Bidirectional Forwarding Detection", | ||||
| <https://dataTracker.ietf.org/doc/charter-ietf-bfd/>. | ||||
| [CCAMP] IETF, "Common Control and Measurement Plane", | ||||
| <https://dataTracker.ietf.org/doc/charter-ietf-ccamp/>. | ||||
| [IPPM] IETF, "IP Performance Measurement", | ||||
| <https://dataTracker.ietf.org/doc/charter-ietf-ippm/>. | ||||
| Authors' Addresses | Authors' Addresses | |||
| Pascal Thubert (editor) | Pascal Thubert (editor) | |||
| Cisco Systems, Inc | Cisco Systems, Inc | |||
| Building D | Building D | |||
| 45 Allee des Ormes - BP1200 | 45 Allee des Ormes - BP1200 | |||
| 06254 MOUGINS - Sophia Antipolis | 06254 MOUGINS - Sophia Antipolis | |||
| France | France | |||
| Phone: +33 497 23 26 34 | Phone: +33 497 23 26 34 | |||
| skipping to change at page 40, line 4 ¶ | skipping to change at line 1399 ¶ | |||
| Georgios Z. Papadopoulos | Georgios Z. Papadopoulos | |||
| IMT Atlantique | IMT Atlantique | |||
| Office B00 - 114A | Office B00 - 114A | |||
| 2 Rue de la Chataigneraie | 2 Rue de la Chataigneraie | |||
| 35510 Cesson-Sevigne - Rennes | 35510 Cesson-Sevigne - Rennes | |||
| France | France | |||
| Phone: +33 299 12 70 04 | Phone: +33 299 12 70 04 | |||
| Email: georgios.papadopoulos@imt-atlantique.fr | Email: georgios.papadopoulos@imt-atlantique.fr | |||
| Lou Berger | ||||
| LabN Consulting, L.L.C. | ||||
| United States of America | ||||
| Email: lberger@labn.net | ||||
| End of changes. 85 change blocks. | ||||
| 754 lines changed or deleted | 375 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||