< draft-ietf-raw-use-cases-01.txt   draft-ietf-raw-use-cases-02.txt >
RAW G. Papadopoulos RAW G. Papadopoulos
Internet-Draft IMT Atlantique Internet-Draft IMT Atlantique
Intended status: Standards Track P. Thubert Intended status: Standards Track P. Thubert
Expires: August 26, 2021 Cisco Expires: January 13, 2022 Cisco
F. Theoleyre F. Theoleyre
CNRS CNRS
CJ. Bernardos CJ. Bernardos
UC3M UC3M
February 22, 2021 July 12, 2021
RAW use cases RAW use cases
draft-ietf-raw-use-cases-01 draft-ietf-raw-use-cases-02
Abstract Abstract
The wireless medium presents significant specific challenges to The wireless medium presents significant specific challenges to
achieve properties similar to those of wired deterministic networks. achieve properties similar to those of wired deterministic networks.
At the same time, a number of use cases cannot be solved with wires At the same time, a number of use cases cannot be solved with wires
and justify the extra effort of going wireless. This document and justify the extra effort of going wireless. This document
presents wireless use cases demanding reliable and available presents wireless use cases demanding reliable and available
behavior. behavior.
skipping to change at page 1, line 40 skipping to change at page 1, line 40
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet- working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/. Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
This Internet-Draft will expire on August 26, 2021. This Internet-Draft will expire on January 13, 2022.
Copyright Notice Copyright Notice
Copyright (c) 2021 IETF Trust and the persons identified as the Copyright (c) 2021 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info) in effect on the date of (https://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
skipping to change at page 2, line 37 skipping to change at page 2, line 37
4.2. Specifics . . . . . . . . . . . . . . . . . . . . . . . . 10 4.2. Specifics . . . . . . . . . . . . . . . . . . . . . . . . 10
4.2.1. Control Loops . . . . . . . . . . . . . . . . . . . . 10 4.2.1. Control Loops . . . . . . . . . . . . . . . . . . . . 10
4.2.2. Unmeasured Data . . . . . . . . . . . . . . . . . . . 10 4.2.2. Unmeasured Data . . . . . . . . . . . . . . . . . . . 10
4.3. The Need for Wireless . . . . . . . . . . . . . . . . . . 11 4.3. The Need for Wireless . . . . . . . . . . . . . . . . . . 11
4.4. Requirements for RAW . . . . . . . . . . . . . . . . . . 11 4.4. Requirements for RAW . . . . . . . . . . . . . . . . . . 11
5. Pro Audio and Video . . . . . . . . . . . . . . . . . . . . . 12 5. Pro Audio and Video . . . . . . . . . . . . . . . . . . . . . 12
5.1. Use Case Description . . . . . . . . . . . . . . . . . . 12 5.1. Use Case Description . . . . . . . . . . . . . . . . . . 12
5.2. Specifics . . . . . . . . . . . . . . . . . . . . . . . . 12 5.2. Specifics . . . . . . . . . . . . . . . . . . . . . . . . 12
5.2.1. Uninterrupted Stream Playback . . . . . . . . . . . . 12 5.2.1. Uninterrupted Stream Playback . . . . . . . . . . . . 12
5.2.2. Synchronized Stream Playback . . . . . . . . . . . . 12 5.2.2. Synchronized Stream Playback . . . . . . . . . . . . 12
5.3. The Need for Wireless . . . . . . . . . . . . . . . . . . 12 5.3. The Need for Wireless . . . . . . . . . . . . . . . . . . 13
5.4. Requirements for RAW . . . . . . . . . . . . . . . . . . 13 5.4. Requirements for RAW . . . . . . . . . . . . . . . . . . 13
6. Wireless Gaming . . . . . . . . . . . . . . . . . . . . . . . 13 6. Wireless Gaming . . . . . . . . . . . . . . . . . . . . . . . 13
6.1. Use Case Description . . . . . . . . . . . . . . . . . . 13 6.1. Use Case Description . . . . . . . . . . . . . . . . . . 13
6.2. Specifics . . . . . . . . . . . . . . . . . . . . . . . . 14 6.2. Specifics . . . . . . . . . . . . . . . . . . . . . . . . 14
6.3. The Need for Wireless . . . . . . . . . . . . . . . . . . 14 6.3. The Need for Wireless . . . . . . . . . . . . . . . . . . 14
6.4. Requirements for RAW . . . . . . . . . . . . . . . . . . 14 6.4. Requirements for RAW . . . . . . . . . . . . . . . . . . 14
7. UAV platooning and control . . . . . . . . . . . . . . . . . 15 7. UAV and V2V platooning and control . . . . . . . . . . . . . 15
7.1. Use Case Description . . . . . . . . . . . . . . . . . . 15 7.1. Use Case Description . . . . . . . . . . . . . . . . . . 15
7.2. Specifics . . . . . . . . . . . . . . . . . . . . . . . . 15 7.2. Specifics . . . . . . . . . . . . . . . . . . . . . . . . 15
7.3. The Need for Wireless . . . . . . . . . . . . . . . . . . 15 7.3. The Need for Wireless . . . . . . . . . . . . . . . . . . 16
7.4. Requirements for RAW . . . . . . . . . . . . . . . . . . 16 7.4. Requirements for RAW . . . . . . . . . . . . . . . . . . 16
8. Edge Robotics control . . . . . . . . . . . . . . . . . . . . 16 8. Edge Robotics control . . . . . . . . . . . . . . . . . . . . 16
8.1. Use Case Description . . . . . . . . . . . . . . . . . . 16 8.1. Use Case Description . . . . . . . . . . . . . . . . . . 16
8.2. Specifics . . . . . . . . . . . . . . . . . . . . . . . . 17 8.2. Specifics . . . . . . . . . . . . . . . . . . . . . . . . 17
8.3. The Need for Wireless . . . . . . . . . . . . . . . . . . 17 8.3. The Need for Wireless . . . . . . . . . . . . . . . . . . 17
8.4. Requirements for RAW . . . . . . . . . . . . . . . . . . 17 8.4. Requirements for RAW . . . . . . . . . . . . . . . . . . 17
9. Emergencies: Instrumented emergency vehicle . . . . . . . . . 17 9. Emergencies: Instrumented emergency vehicle . . . . . . . . . 17
9.1. Use Case Description . . . . . . . . . . . . . . . . . . 17 9.1. Use Case Description . . . . . . . . . . . . . . . . . . 17
9.2. Specifics . . . . . . . . . . . . . . . . . . . . . . . . 18 9.2. Specifics . . . . . . . . . . . . . . . . . . . . . . . . 18
9.3. The Need for Wireless . . . . . . . . . . . . . . . . . . 18 9.3. The Need for Wireless . . . . . . . . . . . . . . . . . . 18
9.4. Requirements for RAW . . . . . . . . . . . . . . . . . . 18 9.4. Requirements for RAW . . . . . . . . . . . . . . . . . . 18
10. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 19 10. Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
11. Security Considerations . . . . . . . . . . . . . . . . . . . 19 11. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 19
12. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 19 12. Security Considerations . . . . . . . . . . . . . . . . . . . 19
13. Informative References . . . . . . . . . . . . . . . . . . . 19 13. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 19
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 22 14. Informative References . . . . . . . . . . . . . . . . . . . 20
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 23
1. Introduction 1. Introduction
Based on time, resource reservation, and policy enforcement by Based on time, resource reservation, and policy enforcement by
distributed shapers, Deterministic Networking provides the capability distributed shapers, Deterministic Networking provides the capability
to carry specified unicast or multicast data streams for real-time to carry specified unicast or multicast data streams for real-time
applications with extremely low data loss rates and bounded latency, applications with extremely low data loss rates and bounded latency,
so as to support time-sensitive and mission-critical applications on so as to support time-sensitive and mission-critical applications on
a converged enterprise infrastructure. a converged enterprise infrastructure.
skipping to change at page 4, line 9 skipping to change at page 4, line 9
o frame preemption and guard time mechanisms to ensure a worst-case o frame preemption and guard time mechanisms to ensure a worst-case
delay, and delay, and
o new traffic shapers within and at the edge to protect the network. o new traffic shapers within and at the edge to protect the network.
Wireless operates on a shared medium, and transmissions cannot be Wireless operates on a shared medium, and transmissions cannot be
fully deterministic due to uncontrolled interferences, including fully deterministic due to uncontrolled interferences, including
self-induced multipath fading. RAW (Reliable and Available Wireless) self-induced multipath fading. RAW (Reliable and Available Wireless)
is an effort to provide Deterministic Networking Mechanisms on across is an effort to provide Deterministic Networking Mechanisms on across
a path that include a wireless physical layer. Making Wireless a multi-hop path that include a wireless physical layer. Making
Reliable and Available is even more challenging than it is with Wireless Reliable and Available is even more challenging than it is
wires, due to the numerous causes of loss in transmission that add up with wires, due to the numerous causes of loss in transmission that
to the congestion losses and the delays caused by overbooked shared add up to the congestion losses and the delays caused by overbooked
resources. shared resources.
The wireless and wired media are fundamentally different at the The wireless and wired media are fundamentally different at the
physical level, and while the generic Problem Statement [RFC8557] for physical level, and while the generic Problem Statement [RFC8557] for
DetNet applies to the wired as well as the wireless medium, the DetNet applies to the wired as well as the wireless medium, the
methods to achieve RAW necessarily differ from those used to support methods to achieve RAW necessarily differ from those used to support
Time-Sensitive Networking over wires. Time-Sensitive Networking over wires.
So far, Open Standards for Deterministic Networking have prevalently So far, Open Standards for Deterministic Networking have prevalently
been focused on wired media, with Audio/Video Bridging (AVB) and Time been focused on wired media, with Audio/Video Bridging (AVB) and Time
Sensitive Networking (TSN) at the IEEE and DetNet [RFC8655] at the Sensitive Networking (TSN) at the IEEE and DetNet [RFC8655] at the
skipping to change at page 4, line 45 skipping to change at page 4, line 45
This is now changing [I-D.thubert-raw-technologies]: This is now changing [I-D.thubert-raw-technologies]:
o IMT-2020 has recognized Ultra-Reliable Low-Latency Communication o IMT-2020 has recognized Ultra-Reliable Low-Latency Communication
(URLLC) as a key functionality for the upcoming 5G. (URLLC) as a key functionality for the upcoming 5G.
o IEEE 802.11 has identified a set of real-applications o IEEE 802.11 has identified a set of real-applications
[ieee80211-rt-tig] which may use the IEEE802.11 standards. They [ieee80211-rt-tig] which may use the IEEE802.11 standards. They
typically emphasize strict end-to-end delay requirements. typically emphasize strict end-to-end delay requirements.
o The IETF has produced an IPv6 stack for IEEE Std. 802.15.4 o The IETF has produced an IPv6 stack for IEEE Std. 802.15.4
TimeSlotted Channel Hopping (TSCH) and an architecture TimeSlotted Channel Hopping (TSCH) and an architecture [RFC9030]
[I-D.ietf-6tisch-architecture] that enables Reliable and Available that enables Reliable and Available Wireless (RAW) on a shared
Wireless (RAW) on a shared MAC. MAC.
This draft extends the "Deterministic Networking Use Cases" document This draft extends the "Deterministic Networking Use Cases" document
[RFC8578] and describes a number of additional use cases which [RFC8578] and describes a number of additional use cases which
require "reliable/predictable and available" flows over wireless require "reliable/predictable and available" flows over wireless
links and possibly complex multi-hop paths called Tracks. This is links and possibly complex multi-hop paths called Tracks. This is
covered mainly by the "Wireless for Industrial Applications" use covered mainly by the "Wireless for Industrial Applications" use
case, as the "Cellular Radio" is mostly dedicated to the (wired) case, as the "Cellular Radio" is mostly dedicated to the (wired)
transport part of a Radio Access Network (RAN). Whereas the transport part of a Radio Access Network (RAN). Whereas the
"Wireless for Industrial Applications" use case certainly covers an "Wireless for Industrial Applications" use case certainly covers an
area of interest for RAW, it is limited to 6TiSCH, and thus its scope area of interest for RAW, it is limited to 6TiSCH, and thus its scope
skipping to change at page 7, line 36 skipping to change at page 7, line 36
Different safety levels need to be supported, from extremely safety Different safety levels need to be supported, from extremely safety
critical ones requiring low latency, such as a WAKE warning - a critical ones requiring low latency, such as a WAKE warning - a
warning that two aircraft come dangerously close to each other - and warning that two aircraft come dangerously close to each other - and
high resiliency, to less safety critical ones requiring low-medium high resiliency, to less safety critical ones requiring low-medium
latency for services such as WXGRAPH - graphical weather data. latency for services such as WXGRAPH - graphical weather data.
Overhead needs to be kept at a minimum since aeronautical data links Overhead needs to be kept at a minimum since aeronautical data links
provide comparatively small data rates in the order of kbit/s. provide comparatively small data rates in the order of kbit/s.
Policy needs to be supported when selecting data links. The focus of Policy needs to be supported when selecting data links. The focus of
RAW here should be on the selectors, responsible for the routing path RAW here should be on the selectors, responsible for the track a
a packet takes to reach its end destination. This would minimize the packet takes to reach its end destination. This would minimize the
amount of routing information that has to travel inside the network amount of routing information that has to travel inside the network
because of precomputed routing tables with the selector being because of precomputed routing tables with the selector being
responsible for choosing the most appropriate option according to responsible for choosing the most appropriate option according to
policy and safety. policy and safety.
3. Amusement Parks 3. Amusement Parks
3.1. Use Case Description 3.1. Use Case Description
The digitalization of Amusement Parks is expected to decrease The digitalization of Amusement Parks is expected to decrease
skipping to change at page 9, line 24 skipping to change at page 9, line 24
rely on more sophisticated wearable devices such as digital glasses rely on more sophisticated wearable devices such as digital glasses
or Virtual Reality (VR) headsets for an immersive experience. or Virtual Reality (VR) headsets for an immersive experience.
3.4. Requirements for RAW 3.4. Requirements for RAW
The network infrastructure has to support heterogeneous traffic, with The network infrastructure has to support heterogeneous traffic, with
very different critical requirements. Thus, flow isolation has to be very different critical requirements. Thus, flow isolation has to be
provided. provided.
We have to schedule appropriately the transmissions, even in presence We have to schedule appropriately the transmissions, even in presence
of mobile devices. While the [I-D.ietf-6tisch-architecture] already of mobile devices. While the [RFC9030] already proposes an
proposes an architecture for synchronized, IEEE Std. 802.15.4 Time- architecture for synchronized, IEEE Std. 802.15.4 Time-Slotted
Slotted Channel Hopping (TSCH) networks, we still need multi- Channel Hopping (TSCH) networks, we still need multi-technology
technology solutions, able to guarantee end-to-end requirements solutions, able to guarantee end-to-end requirements across
across heterogeneous technologies, with strict SLA requirements. heterogeneous technologies, with strict SLA requirements.
Nowadays, long-range wireless transmissions are used mostly for best- Nowadays, long-range wireless transmissions are used mostly for best-
effort traffic. On the contrary, [IEEE802.1TSN] is used for critical effort traffic. On the contrary, [IEEE802.1TSN] is used for critical
flows using Ethernet devices. However, we need an IP enabled flows using Ethernet devices. However, we need an IP enabled
technology to interconnect large areas, independent of the PHY and technology to interconnect large areas, independent of the PHY and
MAC layers. MAC layers.
We expect to deploy several different technologies (long vs. short We expect to deploy several different technologies (long vs. short
range) which have to cohabit in the same area. Thus, we need to range) which have to cohabit in the same area. Thus, we need to
provide layer-3 mechanisms able to exploit multiple co-interfering provide layer-3 mechanisms able to exploit multiple co-interfering
skipping to change at page 10, line 29 skipping to change at page 10, line 29
final product in cans and shipping them. final product in cans and shipping them.
In all those cases, a packet must flow reliably between the sensor In all those cases, a packet must flow reliably between the sensor
and the PLC, be processed by the PLC, and sent to the actuator within and the PLC, be processed by the PLC, and sent to the actuator within
the control loop period. In some particular use cases that inherit the control loop period. In some particular use cases that inherit
from analog operations, jitter might also alter the operation of the from analog operations, jitter might also alter the operation of the
control loop. A rare packet loss is usually admissible, but control loop. A rare packet loss is usually admissible, but
typically 4 losses in a row will cause an emergency halt of the typically 4 losses in a row will cause an emergency halt of the
production and incur a high cost for the manufacturer. production and incur a high cost for the manufacturer.
Additional use cases related to Industrial applications and their RAW
requirements can be found at [I-D.sofia-raw-industrialreq].
4.2.2. Unmeasured Data 4.2.2. Unmeasured Data
A secondary use case deals with monitoring and diagnostics. This so- A secondary use case deals with monitoring and diagnostics. This so-
called unmeasured data is essential to improve the performances of a called unmeasured data is essential to improve the performances of a
production line, e.g., by optimizing real-time processing or production line, e.g., by optimizing real-time processing or
maintenance windows using Machine Learning predictions. For the lack maintenance windows using Machine Learning predictions. For the lack
of wireless technologies, some specific industries such as Oil and of wireless technologies, some specific industries such as Oil and
Gas have been using serial cables, literally by the millions, to Gas have been using serial cables, literally by the millions, to
perform their process optimization over the previous decades. But perform their process optimization over the previous decades. But
few industries would afford the associated cost and the Holy Grail of few industries would afford the associated cost and the Holy Grail of
skipping to change at page 11, line 36 skipping to change at page 11, line 39
[RFC7554] is a promising technology for that purpose, mostly if the [RFC7554] is a promising technology for that purpose, mostly if the
scheduled operations enable to use the same network by asynchronous scheduled operations enable to use the same network by asynchronous
and deterministic flows in parallel. and deterministic flows in parallel.
4.4. Requirements for RAW 4.4. Requirements for RAW
As stated by the "Deterministic Networking Problem Statement" As stated by the "Deterministic Networking Problem Statement"
[RFC8557], a Deterministic Network is backwards compatible with [RFC8557], a Deterministic Network is backwards compatible with
(capable of transporting) statistically multiplexed traffic while (capable of transporting) statistically multiplexed traffic while
preserving the properties of the accepted deterministic flows. While preserving the properties of the accepted deterministic flows. While
the [I-D.ietf-6tisch-architecture] serves that requirement, the work the [RFC9030] serves that requirement, the work at 6TiSCH was focused
at 6TiSCH was focused on best-effort IPv6 packet flows. RAW should on best-effort IPv6 packet flows. RAW should be able to lock so-
be able to lock so-called hard cells for use by a centralized called hard cells for use by a centralized scheduler, and program so-
scheduler, and program so-called end-to-end Tracks over those cells. called end-to-end Tracks over those cells.
Over the course of the recent years, major Industrial Protocols, Over the course of the recent years, major Industrial Protocols,
e.g., [ODVA] with EtherNet/IP [EIP] and [Profinet], have been e.g., [ODVA] with EtherNet/IP [EIP] and [Profinet], have been
migrating towards Ethernet and IP. In order to unleash the full migrating towards Ethernet and IP. In order to unleash the full
power of the IP hourglass model, it should be possible to deploy any power of the IP hourglass model, it should be possible to deploy any
application over any network that has the physical capacity to application over any network that has the physical capacity to
transport the industrial flow, regardless of the MAC/PHY technology, transport the industrial flow, regardless of the MAC/PHY technology,
wired or wireless, and across technologies. RAW mechanisms should be wired or wireless, and across technologies. RAW mechanisms should be
able to setup a Track over a wireless access segment such as TSCH and able to setup a Track over a wireless access segment such as TSCH and
a backbone segment such as Ethernet or WI-Fi, to report a sensor data a backbone segment such as Ethernet or WI-Fi, to report a sensor data
skipping to change at page 13, line 18 skipping to change at page 13, line 23
5.4. Requirements for RAW 5.4. Requirements for RAW
The network infrastructure needs to support heterogeneous types of The network infrastructure needs to support heterogeneous types of
traffic (including QoS). traffic (including QoS).
Content delivery with bounded (lowest possible) latency. Content delivery with bounded (lowest possible) latency.
The deployed network topology should allow for multipath. This will The deployed network topology should allow for multipath. This will
enable for multiple streams to have different (and multiple) paths enable for multiple streams to have different (and multiple) paths
through the network to support redundancy. (tracks) through the network to support redundancy.
6. Wireless Gaming 6. Wireless Gaming
6.1. Use Case Description 6.1. Use Case Description
The gaming industry includes [IEEE80211RTA] real-time mobile gaming, The gaming industry includes [IEEE80211RTA] real-time mobile gaming,
wireless console gaming and cloud gaming. For RAW, wireless console wireless console gaming and cloud gaming. For RAW, wireless console
gaming is the most relevant one. We next summarize the three: gaming is the most relevant one. We next summarize the three:
o Real-time Mobile Gaming: Different from traditional games, real o Real-time Mobile Gaming: Different from traditional games, real
skipping to change at page 15, line 7 skipping to change at page 15, line 10
duplicate and joint. duplicate and joint.
o Admission Control. Congestion is a major cause of high/variable o Admission Control. Congestion is a major cause of high/variable
latency and it is well known that if the traffic load exceeds the latency and it is well known that if the traffic load exceeds the
capability of the link, QoS will be degraded. QoS degradation capability of the link, QoS will be degraded. QoS degradation
maybe acceptable for many applications today, however emerging maybe acceptable for many applications today, however emerging
time-sensitive applications are highly susceptible to increased time-sensitive applications are highly susceptible to increased
latency and jitter. In order to better control QoS, it is latency and jitter. In order to better control QoS, it is
important to control access to the network resources. important to control access to the network resources.
7. UAV platooning and control 7. UAV and V2V platooning and control
7.1. Use Case Description 7.1. Use Case Description
Unmanned Aerial Vehicles (UAVs) are becoming very popular for many Unmanned Aerial Vehicles (UAVs) are becoming very popular for many
different applications, including military and civil use cases. The different applications, including military and civil use cases. The
term drone is commonly used to refer to a UAV. term drone is commonly used to refer to a UAV.
UAVs can be used to perform aerial surveillance activities, traffic UAVs can be used to perform aerial surveillance activities, traffic
monitoring (e.g., Spanish traffic control has recently introduced a monitoring (e.g., Spanish traffic control has recently introduced a
fleet of drones for quicker reactions upon traffic congestion related fleet of drones for quicker reactions upon traffic congestion related
events), support of emergency situations, and even transportation of events), support of emergency situations, and even transportation of
small goods. small goods.
UAVs typically have various forms of wireless connectivity: Similarly to UAVs/drones, other time of vehicles (such as cars) can
also travel in platoons. Most of the considerations made for UAVs in
this section apply to V2V scenarios.
UAVs/vehicles typically have various forms of wireless connectivity:
o cellular: for communication with the control center, for remote o cellular: for communication with the control center, for remote
maneuvering as well as monitoring of the drone; maneuvering as well as monitoring of the drone;
o IEEE 802.11: for inter-drone communications (e.g., platooning) and o IEEE 802.11: for inter-drone communications (e.g., platooning) and
providing connectivity to other devices (e.g., acting as Access providing connectivity to other devices (e.g., acting as Access
Point). Point).
7.2. Specifics 7.2. Specifics
skipping to change at page 19, line 5 skipping to change at page 19, line 8
to continuity of operations, rapid restoral is a needed to continuity of operations, rapid restoral is a needed
characteristic. characteristic.
o End-to-end security, both authenticity and confidentiality, is o End-to-end security, both authenticity and confidentiality, is
required of traffic. All data needs to be authenticated; some required of traffic. All data needs to be authenticated; some
(such as medical) needs to be confidential. (such as medical) needs to be confidential.
o The radio-WAN has characteristics similar to cellphone -- the o The radio-WAN has characteristics similar to cellphone -- the
vehicle will travel from one radio footprint to another. vehicle will travel from one radio footprint to another.
10. IANA Considerations 10. Summary
This document enumarates several use cases and applications that need
RAW technologies, focusing on the requirements from reliability,
availability and latency. Whereas some use cases are latency-
critical, there are also a number of applications that are non-
latency critical, but that do pose strict reliability and
availability requirements. Future revisions of this document will
include specific text devoted to highlight this non-latency critical
requirements.
11. IANA Considerations
This document has no IANA actions. This document has no IANA actions.
11. Security Considerations 12. Security Considerations
This document covers a number of representative applications and This document covers a number of representative applications and
network scenarios that are expected to make use of RAW technologies. network scenarios that are expected to make use of RAW technologies.
Each of the potential RAW use cases will have security considerations Each of the potential RAW use cases will have security considerations
from both the use-specific perspective and the RAW technology from both the use-specific perspective and the RAW technology
perspective. [I-D.ietf-detnet-security] provides a comprehensive perspective. [RFC9055] provides a comprehensive discussion of
discussion of security considerations in the context of Deterministic security considerations in the context of Deterministic Networking,
Networking, which are generally applicable also to RAW. which are generally applicable also to RAW.
12. Acknowledgments 13. Acknowledgments
Nils Maeurer, Thomas Graeupl and Corinna Schmitt have contributed Nils Maeurer, Thomas Graeupl and Corinna Schmitt have contributed
significantly to this document, providing input for the Aeronautical significantly to this document, providing input for the Aeronautical
communications section. Rex Buddenberg has also contributed to the communications section. Rex Buddenberg has also contributed to the
document, providing input to the Emergency: instrumented emergency document, providing input to the Emergency: instrumented emergency
vehicle section. vehicle section.
The authors would like to thank Toerless Eckert, Xavi Vilajosana The authors would like to thank Toerless Eckert, Xavi Vilajosana
Guillen and Rute Sofia for their valuable comments on previous Guillen and Rute Sofia for their valuable comments on previous
versions of this document. versions of this document.
The work of Carlos J. Bernardos in this draft has been partially The work of Carlos J. Bernardos in this draft has been partially
supported by the H2020 5Growth (Grant 856709) and 5G-DIVE projects supported by the H2020 5Growth (Grant 856709) and 5G-DIVE projects
(Grant 859881). (Grant 859881).
13. Informative References 14. Informative References
[ACI19] Airports Council International (ACI), "Annual World [ACI19] Airports Council International (ACI), "Annual World
Aitport Traffic Report 2019", November 2019, Aitport Traffic Report 2019", November 2019,
<https://store.aci.aero/product/annual-world-airport- <https://store.aci.aero/product/annual-world-airport-
traffic-report-2019/>. traffic-report-2019/>.
[disney-VIP] [disney-VIP]
Wired, "Disney's $1 Billion Bet on a Magical Wristband", Wired, "Disney's $1 Billion Bet on a Magical Wristband",
March 2015, March 2015,
<https://www.wired.com/2015/03/disney-magicband/>. <https://www.wired.com/2015/03/disney-magicband/>.
skipping to change at page 20, line 18 skipping to change at page 20, line 30
automation applications while enabling Internet and automation applications while enabling Internet and
enterprise connectivity data anytime, anywhere.", enterprise connectivity data anytime, anywhere.",
<http://www.odva.org/Portals/0/Library/ <http://www.odva.org/Portals/0/Library/
Publications_Numbered/ Publications_Numbered/
PUB00138R3_CIP_Adv_Tech_Series_EtherNetIP.pdf>. PUB00138R3_CIP_Adv_Tech_Series_EtherNetIP.pdf>.
[FAA20] U.S. Department of Transportation Federal Aviation [FAA20] U.S. Department of Transportation Federal Aviation
Administration (FAA), "Next Generation Air Transportation Administration (FAA), "Next Generation Air Transportation
System", 2019, <https://www.faa.gov/nextgen/ >. System", 2019, <https://www.faa.gov/nextgen/ >.
[I-D.ietf-6tisch-architecture]
Thubert, P., "An Architecture for IPv6 over the TSCH mode
of IEEE 802.15.4", draft-ietf-6tisch-architecture-30 (work
in progress), November 2020.
[I-D.ietf-detnet-security]
Grossman, E., Mizrahi, T., and A. Hacker, "Deterministic
Networking (DetNet) Security Considerations", draft-ietf-
detnet-security-13 (work in progress), December 2020.
[I-D.ietf-raw-ldacs] [I-D.ietf-raw-ldacs]
Maeurer, N., Graeupl, T., and C. Schmitt, "L-band Digital Maeurer, N., Graeupl, T., and C. Schmitt, "L-band Digital
Aeronautical Communications System (LDACS)", draft-ietf- Aeronautical Communications System (LDACS)", draft-ietf-
raw-ldacs-06 (work in progress), January 2021. raw-ldacs-07 (work in progress), February 2021.
[I-D.sofia-raw-industrialreq]
Sofia, R. C., Kovatsch, M., and P. M. Mendes,
"Requirements for Reliable Wireless Industrial Services",
draft-sofia-raw-industrialreq-00 (work in progress), March
2021.
[I-D.thubert-raw-technologies] [I-D.thubert-raw-technologies]
Thubert, P., Cavalcanti, D., Vilajosana, X., Schmitt, C., Thubert, P., Cavalcanti, D., Vilajosana, X., Schmitt, C.,
and J. Farkas, "Reliable and Available Wireless and J. Farkas, "Reliable and Available Wireless
Technologies", draft-thubert-raw-technologies-05 (work in Technologies", draft-thubert-raw-technologies-05 (work in
progress), May 2020. progress), May 2020.
[IAC20] Iacus, S., Natale, F., Santamaria, C., Spyratos, S., and [IAC20] Iacus, S., Natale, F., Santamaria, C., Spyratos, S., and
V. Michele, "Estimating and projecting air passenger V. Michele, "Estimating and projecting air passenger
traffic during the COVID-19 coronavirus outbreak and its traffic during the COVID-19 coronavirus outbreak and its
skipping to change at page 22, line 24 skipping to change at page 22, line 29
[RFC8578] Grossman, E., Ed., "Deterministic Networking Use Cases", [RFC8578] Grossman, E., Ed., "Deterministic Networking Use Cases",
RFC 8578, DOI 10.17487/RFC8578, May 2019, RFC 8578, DOI 10.17487/RFC8578, May 2019,
<https://www.rfc-editor.org/info/rfc8578>. <https://www.rfc-editor.org/info/rfc8578>.
[RFC8655] Finn, N., Thubert, P., Varga, B., and J. Farkas, [RFC8655] Finn, N., Thubert, P., Varga, B., and J. Farkas,
"Deterministic Networking Architecture", RFC 8655, "Deterministic Networking Architecture", RFC 8655,
DOI 10.17487/RFC8655, October 2019, DOI 10.17487/RFC8655, October 2019,
<https://www.rfc-editor.org/info/rfc8655>. <https://www.rfc-editor.org/info/rfc8655>.
[RFC9030] Thubert, P., Ed., "An Architecture for IPv6 over the Time-
Slotted Channel Hopping Mode of IEEE 802.15.4 (6TiSCH)",
RFC 9030, DOI 10.17487/RFC9030, May 2021,
<https://www.rfc-editor.org/info/rfc9030>.
[RFC9055] Grossman, E., Ed., Mizrahi, T., and A. Hacker,
"Deterministic Networking (DetNet) Security
Considerations", RFC 9055, DOI 10.17487/RFC9055, June
2021, <https://www.rfc-editor.org/info/rfc9055>.
[robots] Kober, J., Glisson, M., and M. Mistry, "Playing catch and [robots] Kober, J., Glisson, M., and M. Mistry, "Playing catch and
juggling with a humanoid robot.", 2012, juggling with a humanoid robot.", 2012,
<https://doi.org/10.1109/HUMANOIDS.2012.6651623>. <https://doi.org/10.1109/HUMANOIDS.2012.6651623>.
[square-peg] [square-peg]
Martinez, B., Cano, C., and X. Vilajosana, "A Square Peg Martinez, B., Cano, C., and X. Vilajosana, "A Square Peg
in a Round Hole: The Complex Path for Wireless in the in a Round Hole: The Complex Path for Wireless in the
Manufacturing Industry", 2019, Manufacturing Industry", 2019,
<https://ieeexplore.ieee.org/document/8703476>. <https://ieeexplore.ieee.org/document/8703476>.
 End of changes. 25 change blocks. 
52 lines changed or deleted 77 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/