draft-ietf-detnet-tsn-vpn-over-mpls-00.txt   draft-ietf-detnet-tsn-vpn-over-mpls-01.txt 
DetNet B. Varga, Ed. DetNet B. Varga, Ed.
Internet-Draft J. Farkas Internet-Draft J. Farkas
Intended status: Standards Track Ericsson Intended status: Standards Track Ericsson
Expires: November 6, 2019 A. Malis Expires: April 29, 2020 A. Malis
Independent
S. Bryant S. Bryant
Huawei Technologies Futurewei Technologies
J. Korhonen D. Fedyk
May 5, 2019 LabN Consulting, L.L.C.
October 27, 2019
DetNet Data Plane: IEEE 802.1 Time Sensitive Networking over MPLS DetNet Data Plane: IEEE 802.1 Time Sensitive Networking over MPLS
draft-ietf-detnet-tsn-vpn-over-mpls-00 draft-ietf-detnet-tsn-vpn-over-mpls-01
Abstract Abstract
This document specifies the Deterministic Networking data plane when This document specifies the Deterministic Networking data plane when
TSN networks interconnected over an MPLS Packet Switched Networks. TSN networks are interconnected over a DetNet MPLS Network.
Status of This Memo Status of This Memo
This Internet-Draft is submitted in full conformance with the This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79. provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet- working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/. Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
This Internet-Draft will expire on November 6, 2019. This Internet-Draft will expire on April 29, 2020.
Copyright Notice Copyright Notice
Copyright (c) 2019 IETF Trust and the persons identified as the Copyright (c) 2019 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info) in effect on the date of (https://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License. described in the Simplified BSD License.
Table of Contents Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 2 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3
2.1. Terms Used in This Document . . . . . . . . . . . . . . . 2 2.1. Terms Used in This Document . . . . . . . . . . . . . . . 3
2.2. Abbreviations . . . . . . . . . . . . . . . . . . . . . . 3 2.2. Abbreviations . . . . . . . . . . . . . . . . . . . . . . 3
3. Requirements Language . . . . . . . . . . . . . . . . . . . . 4 2.3. Requirements Language . . . . . . . . . . . . . . . . . . 4
4. IEEE 802.1 TSN Over DetNet MPLS Data Plane Scenario . . . . . 4 3. IEEE 802.1 TSN Over DetNet MPLS Data Plane Scenario . . . . . 4
5. DetNet MPLS Data Plane Considerations . . . . . . . . . . . . 6 4. DetNet MPLS Data Plane . . . . . . . . . . . . . . . . . . . 6
5.1. End-System Specific Considerations . . . . . . . . . . . 7 4.1. Overview . . . . . . . . . . . . . . . . . . . . . . . . 6
6. MPLS-Based DetNet Data Plane Solution . . . . . . . . . . . . 8 4.2. TSN over DetNet MPLS Encapsulation . . . . . . . . . . . 7
6.1. DetNet Over MPLS Encapsulation Components . . . . . . . . 8 5. TSN over MPLS Data Plane Procedures . . . . . . . . . . . . . 8
6.2. TSN over MPLS Data Plane Encapsulation . . . . . . . . . 9 5.1. Edge Node TSN Procedures . . . . . . . . . . . . . . . . 8
6.2.1. Edge Node Processing . . . . . . . . . . . . . . . . 9 5.2. Edge Node DetNet Service Proxy Procedures . . . . . . . . 9
6.2.2. Layer 2 Addressing and QoS Considerations . . . . . . 10 5.3. Edge Node DetNet Service and Forwarding Sub-Layer
7. Controller Plane (Management and Control) Procedures . . . . . . . . . . . . . . . . . . . . . . . 9
Considerations . . . . . . . . . . . . . . . . . . . . . . . 11 6. Controller Plane (Management and Control) Considerations . . 10
8. Security Considerations . . . . . . . . . . . . . . . . . . . 11 7. Security Considerations . . . . . . . . . . . . . . . . . . . 11
9. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 11 8. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 11
10. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 11 9. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 11
11. References . . . . . . . . . . . . . . . . . . . . . . . . . 11 10. References . . . . . . . . . . . . . . . . . . . . . . . . . 11
11.1. Normative References . . . . . . . . . . . . . . . . . . 11 10.1. Normative References . . . . . . . . . . . . . . . . . . 11
11.2. Informative References . . . . . . . . . . . . . . . . . 13 10.2. Informative References . . . . . . . . . . . . . . . . . 12
Appendix A. Example of TSN over DetNet Data Plane Operation . . 17 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 13
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 17
1. Introduction 1. Introduction
[Editor's note: Introduction to be made specific to TSN over DetNet The Time-Sensitive Networking Task Group (TSN TG) within IEEE 802.1
scenario. Do we intend to cover both TSN over DetNet IP and TSN over Working Group deals with deterministic services through IEEE 802
DetNet MPLS? Or this document is limited to MPLS scenarios?]. networks. Deterministic Networking (DetNet) defined by IETF is a
service that can be offered by a L3 network to DetNet flows. General
background and concepts of DetNet can be found in
[I-D.ietf-detnet-architecture].
2. Terminology This document specifies the use of a DetNet MPLS network to
interconnect TSN nodes/network segments. DetNet MPLS data plane is
defined in [I-D.ietf-detnet-mpls].
[Editor's note: text to be review what is really needed here.]. 2. Terminology
2.1. Terms Used in This Document 2.1. Terms Used in This Document
This document uses the terminology established in the DetNet This document uses the terminology and concepts established in the
architecture [I-D.ietf-detnet-architecture], and the reader is DetNet architecture [I-D.ietf-detnet-architecture] and
assumed to be familiar with that document and its terminology. [I-D.ietf-detnet-data-plane-framework], and [I-D.ietf-detnet-mpls].
The reader is assumed to be familiar with these documents and their
The following terminology is introduced in this document: terminology.
F-Label A Detnet "forwarding" label that identifies the LSP
used to forward a DetNet flow across an MPLS PSN, e.g.,
a hop-by-hop label used between label switching routers
(LSR).
S-Label A DetNet "service" label that is used between DetNet
nodes that implement also the DetNet service sub-layer
functions. An S-Label is also used to identify a
DetNet flow at DetNet service sub-layer.
d-CW A DetNet Control Word (d-CW) is used for sequencing and
identifying duplicate packets of a DetNet flow at the
DetNet service sub-layer.
2.2. Abbreviations 2.2. Abbreviations
[Editor's note: text to be cleaned up].
The following abbreviations are used in this document: The following abbreviations are used in this document:
AC Attachment Circuit. AC Attachment Circuit.
CE Customer Edge equipment. CE Customer Edge equipment.
CoS Class of Service. CoS Class of Service.
CW Control Word. CW Control Word.
DetNet Deterministic Networking. DetNet Deterministic Networking.
DF DetNet Flow. DF DetNet Flow.
DN-IWF DetNet Inter-Working Function. FRER Frame Replication and Elimination for Redundancy (TSN
function).
L2 Layer 2. L2 Layer 2.
L2VPN Layer 2 Virtual Private Network. L2VPN Layer 2 Virtual Private Network.
L3 Layer 3. L3 Layer 3.
LSR Label Switching Router. LSR Label Switching Router.
MPLS Multiprotocol Label Switching. MPLS Multiprotocol Label Switching.
skipping to change at page 4, line 33 skipping to change at page 4, line 27
PW PseudoWire. PW PseudoWire.
QoS Quality of Service. QoS Quality of Service.
S-PE Switching Provider Edge. S-PE Switching Provider Edge.
T-PE Terminating Provider Edge. T-PE Terminating Provider Edge.
TSN Time-Sensitive Network. TSN Time-Sensitive Network.
3. Requirements Language 2.3. Requirements Language
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in BCP "OPTIONAL" in this document are to be interpreted as described in BCP
14 [RFC2119] [RFC8174] when, and only when, they appear in all 14 [RFC2119] [RFC8174] when, and only when, they appear in all
capitals, as shown here. capitals, as shown here.
4. IEEE 802.1 TSN Over DetNet MPLS Data Plane Scenario 3. IEEE 802.1 TSN Over DetNet MPLS Data Plane Scenario
[Author's note: review required on his part.] Figure 1 shows IEEE 802.1 TSN end stations operating over a TSN aware
TSN Edge Transit Edge TSN DetNet service running over an MPLS network. DetNet Edge Nodes sit
End System Node Node Node End System at the boundary of a DetNet domain. They are responsible for mapping
non-DetNet aware L2 traffic to DetNet services. They also support
the imposition and disposition of the required DetNet encapsulation.
These are functionally similar to pseudowire (PW) Terminating
Provider Edge (T-PE) nodes which use MPLS-TE LSPs. In this example
TSN Streams are simple applicaions over DetNet flows. The specific
of this operation are discussed later in this document.
TSN Edge Transit Edge TSN
End System Node Node Node End System
(T-PE) (LSR) (T-PE) (T-PE) (LSR) (T-PE)
+----------+ +----------+
| TSN | <---------End to End TSN Service----------> | TSN |
| Applic. | | Applic. |
+----------+ +.........+ +.........+ +----------+ +----------+ +.........+ +.........+ +----------+
| Appl. |<-:Svc Proxy:--End to End Svc.--:Svc Proxy:->| Appl. | | | | \S-Proxy: :S-Proxy/ | | |
+----------+ +---------+ +---------+ +----------+ | TSN | | +.+---+<-- DetNet flow -->+---+ | | | TSN |
| TSN | |TSN| |Svc|<-- DetNet flow -->|Svc| |TSN| | TSN | | | |TSN| |Svc| |Svc| |TSN| | |
+----------+ +---+ +---+ +----------+ +---+ +---+ +----------+ +----------+ +---+ +---+ +----------+ +---+ +---+ +----------+
|Forwarding| |Fwd| |Fwd| |Forwarding| |Fwd| |Fwd| |Forwarding| | L2 | | L2| |Fwd| |Forwarding| |Fwd| |L2 | | L2 |
+------.---+ +--.+ +-.-+ +---.----.-+ +--.+ +-.-+ +----.-----+ +------.---+ +-.-+ +-.-+ +---.----.-+ +--.+ +-.-+ +---.------+
: Link : / ,-----. \ : Link : / ,-----. \ : Link : / ,-----. \ : Link : / ,-----. \
+.........+ +-[ Sub ]-+ +........+ +-[ Sub ]-+ +........+ +-[ Sub ]-+ +........+ +-[ TSN ]-+
[Network] [Network] [Network] [Network]
`-----' `-----' `-----' `-----'
|<- TSN ->| |<------ DetNet MPLS ------>| |<-- TSN --->| |<------ DetNet MPLS ------>|
|<---------------------- TSN --------------------->|
Figure 1: A TSN over DetNet MPLS Enabled Network Figure 1: A TSN over DetNet MPLS Enabled Network
Figure 1 shows IEEE 802.1 TSN end stations operating over a TSN aware In this example, edge nodes provide a service proxy function that
DetNet service running over an MPLS network. DetNet Edge Nodes sit "associates" the DetNet flows and native flows (i.e., TSN Streams) at
at the boundary of a DetNet domain. They are responsible for mapping the edge of the DetNet domain. TSN streams are treated as App-flows
non-DetNet aware L2 traffic to DetNet services. They also support for DetNet. The whole DetNet domain behaves as a TSN relay node for
the imposition and disposition of the required DetNet encapsulation. the TSN streams. The service proxy behaves as a port of that TSN
These are functionally similar to pseudowire (PW) Terminating relay node.
Provider Edge (T-PE) nodes which use MPLS-TE LSPs. In this example
they understand and support IEEE 802.1 TSN and are able to map TSN
flows into DetNet flows. The specific of this operation are
discussed later in this document.
Native TSN flow and DetNet MPLS flow differ not only by the
additional MPLS specific encapsulation, but DetNet MPLS flows have on
each DetNet node an associated DetNet specific data structure, what
defines flow related characteristics and required forwarding
functions. In this example, edge Nodes provide a service proxy
function that "associates" the DetNet flows and native flows at the
edge of the DetNet domain. This ensures that the DN Flow is properly
served at the Edge node (and inside the domain).
Figure 2 illustrates how DetNet can provide services for IEEE Figure 2 illustrates how DetNet can provide services for IEEE 802.1
802.1TSN end systems, CE1 and CE2, over a DetNet enabled MPLS TSN end systems, CE1 and CE2, over a DetNet enabled MPLS network.
network. Edge nodes, E1 and E2, insert and remove required DetNet Edge nodes, E1 and E2, insert and remove required DetNet data plane
data plane encapsulation. The 'X' in the edge nodes and relay node, encapsulation. The 'X' in the edge nodes and relay node, R1,
R1, represent a potential DetNet compound flow packet replication and represent a potential DetNet compound flow packet replication and
elimination point. This conceptually parallels L2VPN services, and elimination point. This conceptually parallels L2VPN services, and
could leverage existing related solutions as discussed below. could leverage existing related solutions as discussed below.
TSN |<------- End to End DetNet Service ------>| TSN TSN |<------- End to End DetNet Service ------>| TSN
Service | Transit Transit | Service Service | Transit Transit | Service
TSN (AC) | |<-Tnl->| |<-Tnl->| | (AC) TSN TSN (AC) | |<-Tnl->| |<-Tnl->| | (AC) TSN
End | V V 1 V V 2 V V | End End | V V 1 V V 2 V V | End
System | +--------+ +--------+ +--------+ | System System | +--------+ +--------+ +--------+ | System
+---+ | | E1 |=======| R1 |=======| E2 | | +---+ +---+ | | E1 |=======| R1 |=======| E2 | | +---+
| |--|----|._X_....|..DF1..|.._ _...|..DF3..|...._X_.|---|---| | | |--|----|._X_....|..DF1..|.._ _...|..DF3..|...._X_.|---|---| |
|CE1| | | \ | | X | | / | | |CE2| |CE1| | | \ | | X | | / | | |CE2|
| | | \_.|..DF2..|._/ \_..|..DF4..|._/ | | | | | | \_.|..DF2..|._/ \_..|..DF4..|._/ | | |
+---+ | |=======| |=======| | +---+ +---+ | |=======| |=======| | +---+
^ +--------+ +--------+ +--------+ ^ ^ +--------+ +--------+ +--------+ ^
| Edge Node Relay Node Edge Node | | Edge Node Relay Node Edge Node |
| (T-PE) (S-PE) (T-PE) | | (T-PE) (S-PE) (T-PE) |
| | | |
|<- TSN -> <------- TSN Over DetNet MPLS -------> <- TSN ->| |<- TSN -> <------- TSN Over DetNet MPLS -------> <- TSN ->|
| | | |
|<--- Emulated Time Sensitive Networking (TSN) Service --->| |<-------- Time Sensitive Networking (TSN) Service ------->|
X = Service protection X = Service protection
DFx = DetNet member flow x over a TE LSP DFx = DetNet member flow x over a TE LSP
Figure 2: IEEE 802.1TSN Over DetNet Figure 2: IEEE 802.1TSN Over DetNet
5. DetNet MPLS Data Plane Considerations 4. DetNet MPLS Data Plane
[Editor's note: Needs clean up, what is relevant for TSN over DetNet
scenarios.].
This section provides informative considerations related to providing
DetNet service to flows which are identified based on their header
information. At a high level, the following are provided on a per
flow basis:
Eliminating contention loss and jitter reduction:
Use of allocated resources (queuing, policing, shaping) to ensure
that the congestion-related loss and latency/jitter requirements
of a DetNet flow are met.
Explicit routes: 4.1. Overview
Use of a specific path for a flow. This limits misordering and The basic approach defined in [I-D.ietf-detnet-mpls] supports the
bounds latency. DetNet service sub-layer based on existing pseudowire (PW)
encapsulations and mechanisms, and supports the DetNet forwarding
sub-layer based on existing MPLS Traffic Engineering encapsulations
and mechanisms.
Service protection: A node operating on a DetNet flow in the Detnet service sub-layer,
i.e. a node processing a DetNet packet which has the S-Label as top
of stack uses the local context associated with that S-Label, for
example a received F-Label, to determine what local DetNet
operation(s) are applied to that packet. An S-Label may be unique
when taken from the platform label space [RFC3031], which would
enable correct DetNet flow identification regardless of which input
interface or LSP the packet arrives on. The service sub-layer
functions (i.e., PREOF) use a DetNet control word (d-CW).
Which in the case of this document primarily relates to The DetNet MPLS data plane builds on MPLS Traffic Engineering
replication and elimination. Changing the explicit path after a encapsulations and mechanisms to provide a forwarding sub-layer that
failure is detected in order to restore delivery of the required is responsible for providing resource allocation and explicit routes.
DetNet service characteristics is also possible. Path changes,
even in the case of failure recovery, can lead to the out of order
delivery of data.
Load sharing: The forwarding sub-layer is supported by one or more forwarding
labels (F-Labels).
Generally, distributing packets of the same DetNet flow over DetNet edge/relay nodes are DetNet service sub-layer aware,
multiple paths is not recommended. Such load sharing, e.g., via understand the particular needs of DetNet flows and provide both
ECMP or UCMP, impacts ordering and possibly jitter. DetNet service and forwarding sub-layer functions. They add, remove
and process d-CWs, S-Labels and F-labels as needed. MPLS enabled
DetNet nodes can enhance the reliability of delivery by enabling the
replication of packets where multiple copies, possibly over multiple
paths, are forwarded through the DetNet domain. They can also
eliminate surplus previously replicated copies of DetNet packets.
MPLS (DetNet) nodes also include DetNet forwarding sub-layer
functions, support for notably explicit routes, and resources
allocation to eliminate (or reduce) congestion loss and jitter.
Troubleshooting: DetNet transit nodes reside wholly within a DetNet domain, and also
provide DetNet forwarding sub-layer functions in accordance with the
performance required by a DetNet flow carried over an LSP. Unlike
other DetNet node types, transit nodes provide no service sub-layer
processing.
For example, to support identification of misbehaving flows. 4.2. TSN over DetNet MPLS Encapsulation
Recognize flow(s) for analytics: The basic encapsulation approach is to treat a TSN Stream as an app-
flow from the DetNet MPLS perspective. The corresponding example
shown in Figure 3.
For example, increase counters. /-> +------+ +------+ +------+ TSN ^ ^
| | X | | X | | X |<- Appli : :
App-Flow <-+ +------+ +------+ +------+ cation : :(1)
for MPLS | |TSN-L2| |TSN-L2| |TSN-L2| : v
\-> +---+======+--+======+--+======+-----+ :
| d-CW | | d-CW | | d-CW | :
DetNet-MPLS +------+ +------+ +------+ :(2)
|Labels| |Labels| |Labels| v
+---+======+--+======+--+======+-----+
Link/Sub-Network | L2 | | TSN | | UDP |
+------+ +------+ +------+
| IP |
+------+
| L2 |
+------+
(1) TSN Stream
(2) DetNet MPLS Flow
Correlate events with flows: Figure 3: Example TSN over MPLS Encapsulation Formats
For example, unexpected loss. In the figure, "Application" indicates the application payload
carried by the TSN network. "MPLS App-Flow" indicates that the TSN
Stream is the payload from the perspective of the DetNet MPLS data
plane defined in [I-D.ietf-detnet-mpls]. A single DetNet MPLS flow
can aggregate multiple TSN Streams.
The DetNet data plane also allows for the aggregation of DetNet 5. TSN over MPLS Data Plane Procedures
flows, e.g., via MPLS hierarchical LSPs, to improved scaling. When
DetNet flows are aggregated, transit nodes provide service to the
aggregate and not on a per-DetNet flow basis. In this case, nodes
performing aggregation will ensure that per-flow service requirements
are achieved.
5.1. End-System Specific Considerations Description of Edge Nodes procedures and functions for TSN over
DetNet MPLS scenario follows the concept of [RFC3985] and covers the
Edge Nodes components shown on Figure 1. In this section the
following procedures of DetNet Edge Nodes are described:
Data-flows requiring DetNet service are generated and terminated on o TSN related (Section 5.1)
end-systems. Encapsulation depends on application and its
preferences. In a DetNet MPLS domain the DN functions use the d-CWs,
S-Labels and F-Labels to provide DetNet services. However, an
application may exchange further flow related parameters (e.g., time-
stamp), which are not provided by DN functions.
Specifics related to non-MPLS DetNet end station behavior are out o DetNet Service Proxy (Section 5.2)
side the scope of this document. For example, details on support for
DetNet IP data flows can be found in [I-D.ietf-detnet-dp-sol-ip].
This document is also useful for end stations that map IP flows to
DetNet flows.
As a general rule, DetNet MPLS domains are capable of forwarding any o DetNet service and forwarding sub-layer (Section 5.3)
DetNet MPLS flows and the DetNet domain does not mandate the end-
system or edge system encapsulation format. Unless there is a proxy
of some form present, end-systems peer with similar end-systems using
the same application encapsulation format. For example, as shown in
Figure 3, IP applications peer with IP applications and Ethernet
L2VPN applications peer with Ethernet L2VPN applications.
+-----+ 5.1. Edge Node TSN Procedures
| X | +-----+
+-----+ | X |
| Eth | ________ +-----+
+-----+ _____ / \ | Eth |
\ / \__/ \___ +-----+
\ / \ /
0======== tunnel-1 ========0_
| \
\ |
0========= tunnel-2 =========0
/ \ __/ \
+-----+ \__ DetNet MPLS domain / \
| X | \ __ / +-----+
+-----+ \_______/ \_____/ | X |
| IP | +-----+
+-----+ | IP |
+-----+
Figure 3: End-Systems and The DetNet MPLS Domain The Time-Sensitive Networking (TSN) Task Group of the IEEE 802.1
Working Group have defined (and are defining) a number of amendments
to IEEE 802.1Q [IEEE8021Q] that provide zero congestion loss and
bounded latency in bridged networks. IEEE 802.1CB [IEEE8021CB]
defines packet replication and elimination functions for a TSN
network.
6. MPLS-Based DetNet Data Plane Solution TSN specific functions are executed on the data received by the PE
from the CE before presentation to the DetNet PW for transmission
across the DetNet domain, or on the data received from a DetNet PW by
a PE before it is output on the Attachment Circuit (AC).
[Editor's note: Needs clean up. Text should focus on Edge node TSN specific function(s) of Edge Nodes (T-PE) are belonging to the
related topics.]. native service processing (NSP) [RFC3985] block. This is similar to
other functionalities being defined by standard bodies other than the
IETF (for example in case of Ethernet: stripping, overwriting or
adding VLAN tags, etc.). Depending on the TSN role of the Edge Node
in the end-to-end TSN service selected TSN functions must be
supported.
6.1. DetNet Over MPLS Encapsulation Components Implementations of this document SHALL use management and control
information to ensure TSN specific functions of the Edge Node
according to the expectations of the connected TSN network.
To carry DetNet over MPLS the following is required: 5.2. Edge Node DetNet Service Proxy Procedures
1. A method of identifying the MPLS payload type. The Service Proxy function maps between App-flows and DetNet flows.
The DetNet Edge Node TSN function MUST support the TSN Stream
identification functions and the related managed objects as defined
in IEEE 802.1CB [IEEE8021CB] and IEEE P802.1CBdb [IEEEP8021CBdb] to
recognize the App-flow related packets. The Service Proxy presents
TSN Streams as an App-flow to a DetNet Flow.
2. A method of identifying the DetNet flow group to the processing Implementations of this document SHALL use management and control
element. information to map a TSN Stream to a DetNet flow. N:1 mapping
(aggregating multiple TSN Streams in a single DetNet flow) SHALL be
supported. The management or control function that provisions flow
mapping SHALL ensure that adequate resources are allocated and
configured to provide proper service requirements of the mapped
flows.
3. A method of distinguishing DetNet OAM packets from DetNet data Due to the (intentional) similarities of the DetNet PREOF and TSN
packets. FRER functions service protection function interworking is possible
between the TSN and the DetNet domains. Such service protection
interworking scenarios MAY require to copy sequence number fields
from TSN (L2) to PW (MPLS) encapsulation. However, such interworking
is out-of-scope in this document and left for further study.
4. A method of carrying the DetNet sequence number. A MPLS DetNet flow is configured to carry any number of TSN flows.
The DetNet flow specific bandwidth profile SHOULD match the required
bandwidth of the App-flow aggregate.
5. A suitable LSP to deliver the packet to the egress PE. 5.3. Edge Node DetNet Service and Forwarding Sub-Layer Procedures
6. A method of carrying queuing and forwarding indication. In the design of [I-D.ietf-detnet-mpls] an MPLS service label (the
S-Label), similar to a pseudowire (PW) label [RFC3985], is used to
identify both the DetNet flow identity and the payload MPLS payload
type. The DetNet sequence number is carried in the DetNet Control
word (d-CW) which carries the Data/OAM discriminator as well. In
[I-D.ietf-detnet-mpls] two sequence number sizes are supported: a 16
bit sequence number and a 28 bit sequence number.
In this design an MPLS service label (the S-Label), similar to a PREOF functions and the provided service recovery is available only
pseudowire (PW) label [RFC3985], is used to identify both the DetNet within the DetNet domain as the DetNet flow-ID and the DetNet
flow identity and the payload MPLS payload type satisfying (1) and sequence number are not valid outside the DetNet network. MPLS
(2) in the list above. OAM traffic discrimination happens through (DetNet) Edge node terminates all related information elements
the use of the Associated Channel method described in [RFC4385]. The encoded in the MPLS labels.
DetNet sequence number is carried in the DetNet Control word which
carries the Data/OAM discriminator. To simplify implementation and
to maximize interoperability two sequence number sizes are supported:
a 16 bit sequence number and a 28 bit sequence number. The 16 bit
sequence number is needed to support some types of legacy clients.
The 28 bit sequence number is used in situations where it is
necessary ensure that in high speed networks the sequence number
space does not wrap whilst packets are in flight.
The LSP used to forward the DetNet packet may be of any type (MPLS- The LSP used to forward the DetNet packet may be of any type (MPLS-
LDP, MPLS-TE, MPLS-TP [RFC5921], or MPLS-SR LDP, MPLS-TE, MPLS-TP [RFC5921], or MPLS-SR
[I-D.ietf-spring-segment-routing-mpls]). The LSP (F-Label) label [I-D.ietf-spring-segment-routing-mpls]). The LSP (F-Label) label
and/or the S-Label may be used to indicate the queue processing as and/or the S-Label may be used to indicate the queue processing as
well as the forwarding parameters. Note that the possible use of well as the forwarding parameters.
Penultimate Hop Popping (PHP) means that the only label in a received
label stack may be the S-Label.
6.2. TSN over MPLS Data Plane Encapsulation
6.2.1. Edge Node Processing
An edge node is resposable for matching ingress packets to the
service they require and encapsulating them accordingly.An edge node
may participate in the packet replication and duplication
elimination.
The DetNet-aware forwarder selects the egress DetNet member flow
segment based on the flow identification. The mapping of ingress
DetNet member flow segment to egress DetNet member flow segment may
be statically or dynamically configured. Additionally the DetNet-
aware forwarder does duplicate frame elimination based on the flow
identification and the sequence number combination. The packet
replication is also done within the DetNet-aware forwarder. During
elimination and the replication process the sequence number of the
DetNet member flow MUST be preserved and copied to the egress DetNet
member flow.
The internal design of a relay node is out of scope of this document.
However the reader's attention is drawn to the need to make any PREOF
state available to the packet processor(s) dealing with packets to
which the PREOF functions must be applied, and to maintain that state
is such as way that it is available to the packet processor operation
on the next packet in the DetNet flow (which may be a duplicate, a
late packet, or the next packet in sequence.
[Editor's note: I think the rest of this section belongs in a new
"802.1 TSN (island Interconnect) over DetNet MPLS" section.]
This may be done in the DetNet layer, or where the native service
processing (NSP) [RFC3985] is IEEE 802.1CB [IEEE8021CB] capable, the
packet replication and duplicate elimination MAY entirely be done in
the NSP, bypassing the DetNet flow encapsulation and logic entirely.
This enables operating over unmodified implementations and
deployments. The NSP approach works only between edge nodes and
cannot make use of relay nodes.
The NSP approach is useful end to end tunnel and for for "island For further details see [I-D.ietf-detnet-mpls].
interconnect" scenarios. However, when there is a need to do PREOF
in a middle of the network, such plain edge to edge operation is not
sufficient.
The extended forwarder MAY copy the sequencing information from the 6. Controller Plane (Management and Control) Considerations
native DetNet packet into the DetNet sequence number field and vice
versa. If there is no existing sequencing information available in
the native packet or the forwarder chose not to copy it from the
native packet, then the extended forwarder MUST maintain a sequence
number counter for each DetNet flow (indexed by the DetNet flow
identification).
6.2.2. Layer 2 Addressing and QoS Considerations TSN Stream(s) to DetNet flow mapping related information are required
only for the service proxy function of MPLS (DetNet) Edge nodes.
From the Data Plane perspective there is no practical difference
based on the origin of flow mapping related information (management
plane or control plane).
[Editor's NOTE: review and simplify this section if possible.] MPLS DetNet Edge nodes are member of both the DetNet domain and the
connected TSN network. From the TSN network perspective the MPLS
(DetNet) Edge node has a "TSN relay node" role, so TSN specific
management and control plane functionalities must be implemented.
There are many similarities in the management plane techniques used
in DetNet and TSN, but that is not the case for the control plane
protocols. For example, RSVP-TE and MSRP behaves differently.
Therefore management and control plane design is an important aspect
of scenarios, where mapping between DetNet and TSN is required.
The Time-Sensitive Networking (TSN) Task Group of the IEEE 802.1 Note that, as the DetNet network is just a portion of the end to end
Working Group have defined (and are defining) a number of amendments TSN path (i.e., single hop from Ethernet perspective), some
to IEEE 802.1Q [IEEE8021Q] that provide zero congestion loss and parameters (e.g., delay) may differ significantly. Since there is no
bounded latency in bridged networks. IEEE 802.1CB [IEEE8021CB] interworking function the bandwidth of DetNet network is assumed to
defines packet replication and elimination functions that should be set large enough to handle all TSN Flows it will support. At the
prove both compatible with and useful to, DetNet networks. egress of the Detnet Domain the MPLS headers are stripped and the TSN
flow continues on as a normal TSN flow.
As is the case for DetNet, a Layer 2 network node such as a bridge In order to use a DetNet network to interconnect TSN segments, TSN
may need to identify the specific DetNet flow to which a packet specific information must be converted to DetNet domain specific
belongs in order to provide the TSN/DetNet QoS for that packet. It ones. TSN Stream ID(s) and stream(s) related parameters/requirements
also will likely need a CoS marking, such as the priority field of an must be converted to a DetNet flow-ID and flow related parameters/
IEEE Std 802.1Q VLAN tag, to give the packet proper service. requirements.
Although the flow identification methods described in IEEE 802.1CB In some case it may be challenging to determine some egress node
[IEEE8021CB] are flexible, and in fact, include IP 5-tuple related information. For example, it may be not trivial to locate
identification methods, the baseline TSN standards assume that every the egress point/interface of a TSN Streams with a multicast
Ethernet frame belonging to a TSN stream (i.e. DetNet flow) carries destination MAC address. Such scenarios may require interaction
a multicast destination MAC address that is unique to that flow between control and management plane functions and between DetNet and
within the bridged network over which it is carried. Furthermore, TSN domains.
IEEE 802.1CB [IEEE8021CB] describes three methods by which a packet
sequence number can be encoded in an Ethernet frame.
Ensuring that the proper Ethernet VLAN tag priority and destination Mapping between DetNet flow identifiers and TSN Stream identifiers,
MAC address are used on a DetNet/TSN packet may require further if not provided explicitly, can be done by the service proxy function
clarification of the customary L2/L3 transformations carried out by of an MPLS (DetNet) Edge node locally based on information provided
routers and edge label switches. Edge nodes may also have to move for configuration of the TSN Stream identification functions (e.g.,
sequence number fields among Layer 2, PW, and IP encapsulations. Mask-and-Match Stream identification).
7. Controller Plane (Management and Control) Considerations Triggering the setup/modification of a DetNet flow in the DetNet
network is an example where management and/or control plane
interactions are required between the DetNet and the TSN network.
[Editor's note: requires considerations related to TSN over DetNet.]. Configuration of TSN specific functions (e.g., FRER) inside the TSN
network is a TSN domain specific decision and may not be visible in
the DetNet domain. Service protection interworking scenarios are
left for further study.
8. Security Considerations 7. Security Considerations
The security considerations of DetNet in general are discussed in Security considerations for DetNet are described in detail in
[I-D.ietf-detnet-architecture] and [I-D.sdt-detnet-security]. Other [I-D.ietf-detnet-security]. General security considerations are
security considerations will be added in a future version of this described in [I-D.ietf-detnet-architecture]. DetNet MPLS data plane
draft. specific considerations are summarized in [I-D.ietf-detnet-mpls].
The primary considerations for the data plane is to maintain
integrity of data and delivery of the associated DetNet service
traversing the DetNet network. Application flows can be protected
through whatever means is provided by the underlying technology. For
example, encryption may be used, such as that provided by IPSec
[RFC4301] for IP flows and/or by an underlying sub-net using MACSec
[IEEE802.1AE-2018] for IP over Ethernet (Layer-2) flows.
9. IANA Considerations 8. IANA Considerations
This document makes no IANA requests. This document makes no IANA requests.
10. Acknowledgements 9. Acknowledgements
Thanks for Norman Finn and Lou Berger for their comments and The authors wish to thank Norman Finn, Lou Berger, Craig Gunther,
contributions. Christophe Mangin and Jouni Korhonen for their various contributions
to this work.
11. References 10. References
11.1. Normative References 10.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997, DOI 10.17487/RFC2119, March 1997,
<https://www.rfc-editor.org/info/rfc2119>. <https://www.rfc-editor.org/info/rfc2119>.
[RFC2211] Wroclawski, J., "Specification of the Controlled-Load
Network Element Service", RFC 2211, DOI 10.17487/RFC2211,
September 1997, <https://www.rfc-editor.org/info/rfc2211>.
[RFC2212] Shenker, S., Partridge, C., and R. Guerin, "Specification
of Guaranteed Quality of Service", RFC 2212,
DOI 10.17487/RFC2212, September 1997,
<https://www.rfc-editor.org/info/rfc2212>.
[RFC3031] Rosen, E., Viswanathan, A., and R. Callon, "Multiprotocol [RFC3031] Rosen, E., Viswanathan, A., and R. Callon, "Multiprotocol
Label Switching Architecture", RFC 3031, Label Switching Architecture", RFC 3031,
DOI 10.17487/RFC3031, January 2001, DOI 10.17487/RFC3031, January 2001,
<https://www.rfc-editor.org/info/rfc3031>. <https://www.rfc-editor.org/info/rfc3031>.
[RFC3032] Rosen, E., Tappan, D., Fedorkow, G., Rekhter, Y.,
Farinacci, D., Li, T., and A. Conta, "MPLS Label Stack
Encoding", RFC 3032, DOI 10.17487/RFC3032, January 2001,
<https://www.rfc-editor.org/info/rfc3032>.
[RFC3209] Awduche, D., Berger, L., Gan, D., Li, T., Srinivasan, V.,
and G. Swallow, "RSVP-TE: Extensions to RSVP for LSP
Tunnels", RFC 3209, DOI 10.17487/RFC3209, December 2001,
<https://www.rfc-editor.org/info/rfc3209>.
[RFC3270] Le Faucheur, F., Wu, L., Davie, B., Davari, S., Vaananen,
P., Krishnan, R., Cheval, P., and J. Heinanen, "Multi-
Protocol Label Switching (MPLS) Support of Differentiated
Services", RFC 3270, DOI 10.17487/RFC3270, May 2002,
<https://www.rfc-editor.org/info/rfc3270>.
[RFC3443] Agarwal, P. and B. Akyol, "Time To Live (TTL) Processing
in Multi-Protocol Label Switching (MPLS) Networks",
RFC 3443, DOI 10.17487/RFC3443, January 2003,
<https://www.rfc-editor.org/info/rfc3443>.
[RFC3473] Berger, L., Ed., "Generalized Multi-Protocol Label
Switching (GMPLS) Signaling Resource ReserVation Protocol-
Traffic Engineering (RSVP-TE) Extensions", RFC 3473,
DOI 10.17487/RFC3473, January 2003,
<https://www.rfc-editor.org/info/rfc3473>.
[RFC4206] Kompella, K. and Y. Rekhter, "Label Switched Paths (LSP)
Hierarchy with Generalized Multi-Protocol Label Switching
(GMPLS) Traffic Engineering (TE)", RFC 4206,
DOI 10.17487/RFC4206, October 2005,
<https://www.rfc-editor.org/info/rfc4206>.
[RFC4385] Bryant, S., Swallow, G., Martini, L., and D. McPherson,
"Pseudowire Emulation Edge-to-Edge (PWE3) Control Word for
Use over an MPLS PSN", RFC 4385, DOI 10.17487/RFC4385,
February 2006, <https://www.rfc-editor.org/info/rfc4385>.
[RFC5085] Nadeau, T., Ed. and C. Pignataro, Ed., "Pseudowire Virtual
Circuit Connectivity Verification (VCCV): A Control
Channel for Pseudowires", RFC 5085, DOI 10.17487/RFC5085,
December 2007, <https://www.rfc-editor.org/info/rfc5085>.
[RFC5129] Davie, B., Briscoe, B., and J. Tay, "Explicit Congestion
Marking in MPLS", RFC 5129, DOI 10.17487/RFC5129, January
2008, <https://www.rfc-editor.org/info/rfc5129>.
[RFC5462] Andersson, L. and R. Asati, "Multiprotocol Label Switching
(MPLS) Label Stack Entry: "EXP" Field Renamed to "Traffic
Class" Field", RFC 5462, DOI 10.17487/RFC5462, February
2009, <https://www.rfc-editor.org/info/rfc5462>.
[RFC7510] Xu, X., Sheth, N., Yong, L., Callon, R., and D. Black,
"Encapsulating MPLS in UDP", RFC 7510,
DOI 10.17487/RFC7510, April 2015,
<https://www.rfc-editor.org/info/rfc7510>.
[RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
May 2017, <https://www.rfc-editor.org/info/rfc8174>. May 2017, <https://www.rfc-editor.org/info/rfc8174>.
11.2. Informative References 10.2. Informative References
[G.8275.1]
International Telecommunication Union, "Precision time
protocol telecom profile for phase/time synchronization
with full timing support from the network", ITU-T
G.8275.1/Y.1369.1 G.8275.1, June 2016,
<https://www.itu.int/rec/T-REC-G.8275.1/en>.
[G.8275.2]
International Telecommunication Union, "Precision time
protocol telecom profile for phase/time synchronization
with partial timing support from the network", ITU-T
G.8275.2/Y.1369.2 G.8275.2, June 2016,
<https://www.itu.int/rec/T-REC-G.8275.2/en>.
[I-D.ietf-detnet-architecture] [I-D.ietf-detnet-architecture]
Finn, N., Thubert, P., Varga, B., and J. Farkas, Finn, N., Thubert, P., Varga, B., and J. Farkas,
"Deterministic Networking Architecture", draft-ietf- "Deterministic Networking Architecture", draft-ietf-
detnet-architecture-12 (work in progress), March 2019. detnet-architecture-13 (work in progress), May 2019.
[I-D.ietf-detnet-dp-sol-ip] [I-D.ietf-detnet-data-plane-framework]
Korhonen, J., Varga, B., "DetNet IP Data Plane Varga, B., Farkas, J., Berger, L., Fedyk, D., Malis, A.,
Encapsulation", 2018. Bryant, S., and J. Korhonen, "DetNet Data Plane
Framework", draft-ietf-detnet-data-plane-framework-02
(work in progress), September 2019.
[I-D.ietf-detnet-flow-information-model] [I-D.ietf-detnet-mpls]
Farkas, J., Varga, B., Cummings, R., and Y. Jiang, "DetNet Varga, B., Farkas, J., Berger, L., Fedyk, D., Malis, A.,
Flow Information Model", draft-ietf-detnet-flow- Bryant, S., and J. Korhonen, "DetNet Data Plane: MPLS",
information-model-03 (work in progress), March 2019. draft-ietf-detnet-mpls-01 (work in progress), July 2019.
[I-D.ietf-pce-pcep-extension-for-pce-controller] [I-D.ietf-detnet-security]
Zhao, Q., Li, Z., Negi, M., and C. Zhou, "PCEP Procedures Mizrahi, T., Grossman, E., Hacker, A., Das, S., Dowdell,
and Protocol Extensions for Using PCE as a Central J., Austad, H., Stanton, K., and N. Finn, "Deterministic
Controller (PCECC) of LSPs", draft-ietf-pce-pcep- Networking (DetNet) Security Considerations", draft-ietf-
extension-for-pce-controller-01 (work in progress), detnet-security-05 (work in progress), August 2019.
February 2019.
[I-D.ietf-spring-segment-routing-mpls] [I-D.ietf-spring-segment-routing-mpls]
Bashandy, A., Filsfils, C., Previdi, S., Decraene, B., Bashandy, A., Filsfils, C., Previdi, S., Decraene, B.,
Litkowski, S., and R. Shakir, "Segment Routing with MPLS Litkowski, S., and R. Shakir, "Segment Routing with MPLS
data plane", draft-ietf-spring-segment-routing-mpls-22 data plane", draft-ietf-spring-segment-routing-mpls-22
(work in progress), May 2019. (work in progress), May 2019.
[I-D.sdt-detnet-security] [IEEE802.1AE-2018]
Mizrahi, T., Grossman, E., Hacker, A., Das, S., IEEE Standards Association, "IEEE Std 802.1AE-2018 MAC
"Deterministic Networking (DetNet) Security Security (MACsec)", 2018,
Considerations, draft-sdt-detnet-security, work in <https://ieeexplore.ieee.org/document/8585421>.
progress", 2017.
[IEEE1588]
IEEE, "IEEE 1588 Standard for a Precision Clock
Synchronization Protocol for Networked Measurement and
Control Systems Version 2", 2008.
[IEEE8021CB] [IEEE8021CB]
Finn, N., "Draft Standard for Local and metropolitan area Finn, N., "Draft Standard for Local and metropolitan area
networks - Seamless Redundancy", IEEE P802.1CB networks - Seamless Redundancy", IEEE P802.1CB
/D2.1 P802.1CB, December 2015, /D2.1 P802.1CB, December 2015,
<http://www.ieee802.org/1/files/private/cb-drafts/ <http://www.ieee802.org/1/files/private/cb-drafts/d2/802-
d2/802-1CB-d2-1.pdf>. 1CB-d2-1.pdf>.
[IEEE8021Q] [IEEE8021Q]
IEEE 802.1, "Standard for Local and metropolitan area IEEE 802.1, "Standard for Local and metropolitan area
networks--Bridges and Bridged Networks (IEEE Std 802.1Q- networks--Bridges and Bridged Networks (IEEE Std 802.1Q-
2014)", 2014, <http://standards.ieee.org/about/get/>. 2014)", 2014, <http://standards.ieee.org/about/get/>.
[RFC2205] Braden, R., Ed., Zhang, L., Berson, S., Herzog, S., and S. [IEEEP8021CBdb]
Jamin, "Resource ReSerVation Protocol (RSVP) -- Version 1 Mangin, C., "Extended Stream identification functions",
Functional Specification", RFC 2205, DOI 10.17487/RFC2205, IEEE P802.1CBdb /D0.2 P802.1CBdb, August 2019,
September 1997, <https://www.rfc-editor.org/info/rfc2205>. <http://www.ieee802.org/1/files/private/cb-drafts/d2/802-
1CB-d2-1.pdf>.
[RFC2474] Nichols, K., Blake, S., Baker, F., and D. Black,
"Definition of the Differentiated Services Field (DS
Field) in the IPv4 and IPv6 Headers", RFC 2474,
DOI 10.17487/RFC2474, December 1998,
<https://www.rfc-editor.org/info/rfc2474>.
[RFC3272] Awduche, D., Chiu, A., Elwalid, A., Widjaja, I., and X.
Xiao, "Overview and Principles of Internet Traffic
Engineering", RFC 3272, DOI 10.17487/RFC3272, May 2002,
<https://www.rfc-editor.org/info/rfc3272>.
[RFC3985] Bryant, S., Ed. and P. Pate, Ed., "Pseudo Wire Emulation [RFC3985] Bryant, S., Ed. and P. Pate, Ed., "Pseudo Wire Emulation
Edge-to-Edge (PWE3) Architecture", RFC 3985, Edge-to-Edge (PWE3) Architecture", RFC 3985,
DOI 10.17487/RFC3985, March 2005, DOI 10.17487/RFC3985, March 2005,
<https://www.rfc-editor.org/info/rfc3985>. <https://www.rfc-editor.org/info/rfc3985>.
[RFC4448] Martini, L., Ed., Rosen, E., El-Aawar, N., and G. Heron, [RFC4301] Kent, S. and K. Seo, "Security Architecture for the
"Encapsulation Methods for Transport of Ethernet over MPLS Internet Protocol", RFC 4301, DOI 10.17487/RFC4301,
Networks", RFC 4448, DOI 10.17487/RFC4448, April 2006, December 2005, <https://www.rfc-editor.org/info/rfc4301>.
<https://www.rfc-editor.org/info/rfc4448>.
[RFC4872] Lang, J., Ed., Rekhter, Y., Ed., and D. Papadimitriou,
Ed., "RSVP-TE Extensions in Support of End-to-End
Generalized Multi-Protocol Label Switching (GMPLS)
Recovery", RFC 4872, DOI 10.17487/RFC4872, May 2007,
<https://www.rfc-editor.org/info/rfc4872>.
[RFC4873] Berger, L., Bryskin, I., Papadimitriou, D., and A. Farrel,
"GMPLS Segment Recovery", RFC 4873, DOI 10.17487/RFC4873,
May 2007, <https://www.rfc-editor.org/info/rfc4873>.
[RFC4875] Aggarwal, R., Ed., Papadimitriou, D., Ed., and S.
Yasukawa, Ed., "Extensions to Resource Reservation
Protocol - Traffic Engineering (RSVP-TE) for Point-to-
Multipoint TE Label Switched Paths (LSPs)", RFC 4875,
DOI 10.17487/RFC4875, May 2007,
<https://www.rfc-editor.org/info/rfc4875>.
[RFC5440] Vasseur, JP., Ed. and JL. Le Roux, Ed., "Path Computation
Element (PCE) Communication Protocol (PCEP)", RFC 5440,
DOI 10.17487/RFC5440, March 2009,
<https://www.rfc-editor.org/info/rfc5440>.
[RFC5586] Bocci, M., Ed., Vigoureux, M., Ed., and S. Bryant, Ed.,
"MPLS Generic Associated Channel", RFC 5586,
DOI 10.17487/RFC5586, June 2009,
<https://www.rfc-editor.org/info/rfc5586>.
[RFC5654] Niven-Jenkins, B., Ed., Brungard, D., Ed., Betts, M., Ed.,
Sprecher, N., and S. Ueno, "Requirements of an MPLS
Transport Profile", RFC 5654, DOI 10.17487/RFC5654,
September 2009, <https://www.rfc-editor.org/info/rfc5654>.
[RFC5921] Bocci, M., Ed., Bryant, S., Ed., Frost, D., Ed., Levrau, [RFC5921] Bocci, M., Ed., Bryant, S., Ed., Frost, D., Ed., Levrau,
L., and L. Berger, "A Framework for MPLS in Transport L., and L. Berger, "A Framework for MPLS in Transport
Networks", RFC 5921, DOI 10.17487/RFC5921, July 2010, Networks", RFC 5921, DOI 10.17487/RFC5921, July 2010,
<https://www.rfc-editor.org/info/rfc5921>. <https://www.rfc-editor.org/info/rfc5921>.
[RFC6003] Papadimitriou, D., "Ethernet Traffic Parameters",
RFC 6003, DOI 10.17487/RFC6003, October 2010,
<https://www.rfc-editor.org/info/rfc6003>.
[RFC6006] Zhao, Q., Ed., King, D., Ed., Verhaeghe, F., Takeda, T.,
Ali, Z., and J. Meuric, "Extensions to the Path
Computation Element Communication Protocol (PCEP) for
Point-to-Multipoint Traffic Engineering Label Switched
Paths", RFC 6006, DOI 10.17487/RFC6006, September 2010,
<https://www.rfc-editor.org/info/rfc6006>.
[RFC6073] Martini, L., Metz, C., Nadeau, T., Bocci, M., and M.
Aissaoui, "Segmented Pseudowire", RFC 6073,
DOI 10.17487/RFC6073, January 2011,
<https://www.rfc-editor.org/info/rfc6073>.
[RFC6387] Takacs, A., Berger, L., Caviglia, D., Fedyk, D., and J.
Meuric, "GMPLS Asymmetric Bandwidth Bidirectional Label
Switched Paths (LSPs)", RFC 6387, DOI 10.17487/RFC6387,
September 2011, <https://www.rfc-editor.org/info/rfc6387>.
[RFC6790] Kompella, K., Drake, J., Amante, S., Henderickx, W., and
L. Yong, "The Use of Entropy Labels in MPLS Forwarding",
RFC 6790, DOI 10.17487/RFC6790, November 2012,
<https://www.rfc-editor.org/info/rfc6790>.
[RFC7551] Zhang, F., Ed., Jing, R., and R. Gandhi, Ed., "RSVP-TE
Extensions for Associated Bidirectional Label Switched
Paths (LSPs)", RFC 7551, DOI 10.17487/RFC7551, May 2015,
<https://www.rfc-editor.org/info/rfc7551>.
[RFC7950] Bjorklund, M., Ed., "The YANG 1.1 Data Modeling Language",
RFC 7950, DOI 10.17487/RFC7950, August 2016,
<https://www.rfc-editor.org/info/rfc7950>.
[RFC8040] Bierman, A., Bjorklund, M., and K. Watsen, "RESTCONF
Protocol", RFC 8040, DOI 10.17487/RFC8040, January 2017,
<https://www.rfc-editor.org/info/rfc8040>.
[RFC8169] Mirsky, G., Ruffini, S., Gray, E., Drake, J., Bryant, S.,
and A. Vainshtein, "Residence Time Measurement in MPLS
Networks", RFC 8169, DOI 10.17487/RFC8169, May 2017,
<https://www.rfc-editor.org/info/rfc8169>.
Appendix A. Example of TSN over DetNet Data Plane Operation
[Editor's note: Add a simplified example of DetNet data plane and how
labels etc work in the case of TSN over DetNet MPLS and utilizing
e.g., PREOF.]
Authors' Addresses Authors' Addresses
Balazs Varga (editor) Balazs Varga (editor)
Ericsson Ericsson
Magyar Tudosok krt. 11. Magyar Tudosok krt. 11.
Budapest 1117 Budapest 1117
Hungary Hungary
Email: balazs.a.varga@ericsson.com Email: balazs.a.varga@ericsson.com
Janos Farkas Janos Farkas
Ericsson Ericsson
Magyar Tudosok krt. 11. Magyar Tudosok krt. 11.
Budapest 1117 Budapest 1117
Hungary Hungary
Email: janos.farkas@ericsson.com Email: janos.farkas@ericsson.com
Andrew G. Malis Andrew G. Malis
Huawei Technologies Independent
Email: agmalis@gmail.com Email: agmalis@gmail.com
Stewart Bryant Stewart Bryant
Huawei Technologies Futurewei Technologies
Email: stewart.bryant@gmail.com Email: stewart.bryant@gmail.com
Jouni Korhonen Don Fedyk
LabN Consulting, L.L.C.
Email: jouni.nospam@gmail.com Email: dfedyk@labn.net
 End of changes. 89 change blocks. 
502 lines changed or deleted 313 lines changed or added

This html diff was produced by rfcdiff 1.47. The latest version is available from http://tools.ietf.org/tools/rfcdiff/