draft-ietf-detnet-use-cases-12.txt | draft-ietf-detnet-use-cases-13.txt | |||
---|---|---|---|---|
Internet Engineering Task Force E. Grossman, Ed. | Internet Engineering Task Force E. Grossman, Ed. | |||
Internet-Draft DOLBY | Internet-Draft DOLBY | |||
Intended status: Informational C. Gunther | Intended status: Informational C. Gunther | |||
Expires: October 5, 2017 HARMAN | Expires: March 22, 2018 HARMAN | |||
P. Thubert | P. Thubert | |||
P. Wetterwald | P. Wetterwald | |||
CISCO | CISCO | |||
J. Raymond | J. Raymond | |||
HYDRO-QUEBEC | HYDRO-QUEBEC | |||
J. Korhonen | J. Korhonen | |||
BROADCOM | BROADCOM | |||
Y. Kaneko | Y. Kaneko | |||
Toshiba | Toshiba | |||
S. Das | S. Das | |||
skipping to change at page 1, line 34 ¶ | skipping to change at page 1, line 34 ¶ | |||
J. Schmitt | J. Schmitt | |||
Siemens | Siemens | |||
X. Vilajosana | X. Vilajosana | |||
Worldsensing | Worldsensing | |||
T. Mahmoodi | T. Mahmoodi | |||
King's College London | King's College London | |||
S. Spirou | S. Spirou | |||
Intracom Telecom | Intracom Telecom | |||
P. Vizarreta | P. Vizarreta | |||
Technical University of Munich, TUM | Technical University of Munich, TUM | |||
April 3, 2017 | D. Huang | |||
ZTE Corporation, Inc. | ||||
X. Geng | ||||
HUAWEI | ||||
D. Dujovne | ||||
UDP | ||||
M. Seewald | ||||
CISCO | ||||
September 18, 2017 | ||||
Deterministic Networking Use Cases | Deterministic Networking Use Cases | |||
draft-ietf-detnet-use-cases-12 | draft-ietf-detnet-use-cases-13 | |||
Abstract | Abstract | |||
This draft documents requirements in several diverse industries to | This draft documents requirements in several diverse industries to | |||
establish multi-hop paths for characterized flows with deterministic | establish multi-hop paths for characterized flows with deterministic | |||
properties. In this context deterministic implies that streams can | properties. In this context deterministic implies that streams can | |||
be established which provide guaranteed bandwidth and latency which | be established which provide guaranteed bandwidth and latency which | |||
can be established from either a Layer 2 or Layer 3 (IP) interface, | can be established from either a Layer 2 or Layer 3 (IP) interface, | |||
and which can co-exist on an IP network with best-effort traffic. | and which can co-exist on an IP network with best-effort traffic. | |||
Additional requirements include optional redundant paths, very high | Additional requirements include optional redundant paths, very high | |||
reliability paths, time synchronization, and clock distribution. | reliability paths, time synchronization, and clock distribution. | |||
Industries considered include professional audio, electrical | ||||
Industries considered include wireless for industrial applications, | utilities, building automation systems, wireless for industrial, | |||
professional audio, electrical utilities, building automation | cellular radio, industrial machine-to-machine, mining, private | |||
systems, radio/mobile access networks, automotive, and gaming. | blockchain, and network slicing. | |||
For each case, this document will identify the application, identify | For each case, this document will identify the application, identify | |||
representative solutions used today, and what new uses an IETF DetNet | representative solutions used today, and the improvements IETF DetNet | |||
solution may enable. | solutions may enable. | |||
Status of This Memo | Status of This Memo | |||
This Internet-Draft is submitted in full conformance with the | This Internet-Draft is submitted in full conformance with the | |||
provisions of BCP 78 and BCP 79. | provisions of BCP 78 and BCP 79. | |||
Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
Drafts is at http://datatracker.ietf.org/drafts/current/. | Drafts is at https://datatracker.ietf.org/drafts/current/. | |||
Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
This Internet-Draft will expire on October 5, 2017. | This Internet-Draft will expire on March 22, 2018. | |||
Copyright Notice | Copyright Notice | |||
Copyright (c) 2017 IETF Trust and the persons identified as the | Copyright (c) 2017 IETF Trust and the persons identified as the | |||
document authors. All rights reserved. | document authors. All rights reserved. | |||
This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
(http://trustee.ietf.org/license-info) in effect on the date of | (https://trustee.ietf.org/license-info) in effect on the date of | |||
publication of this document. Please review these documents | publication of this document. Please review these documents | |||
carefully, as they describe your rights and restrictions with respect | carefully, as they describe your rights and restrictions with respect | |||
to this document. Code Components extracted from this document must | to this document. Code Components extracted from this document must | |||
include Simplified BSD License text as described in Section 4.e of | include Simplified BSD License text as described in Section 4.e of | |||
the Trust Legal Provisions and are provided without warranty as | the Trust Legal Provisions and are provided without warranty as | |||
described in the Simplified BSD License. | described in the Simplified BSD License. | |||
Table of Contents | Table of Contents | |||
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 5 | 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 6 | |||
2. Pro Audio and Video . . . . . . . . . . . . . . . . . . . . . 6 | 2. Pro Audio and Video . . . . . . . . . . . . . . . . . . . . . 7 | |||
2.1. Use Case Description . . . . . . . . . . . . . . . . . . 6 | 2.1. Use Case Description . . . . . . . . . . . . . . . . . . 7 | |||
2.1.1. Uninterrupted Stream Playback . . . . . . . . . . . . 7 | 2.1.1. Uninterrupted Stream Playback . . . . . . . . . . . . 8 | |||
2.1.2. Synchronized Stream Playback . . . . . . . . . . . . 7 | 2.1.2. Synchronized Stream Playback . . . . . . . . . . . . 8 | |||
2.1.3. Sound Reinforcement . . . . . . . . . . . . . . . . . 8 | 2.1.3. Sound Reinforcement . . . . . . . . . . . . . . . . . 9 | |||
2.1.4. Deterministic Time to Establish Streaming . . . . . . 8 | 2.1.4. Deterministic Time to Establish Streaming . . . . . . 9 | |||
2.1.5. Secure Transmission . . . . . . . . . . . . . . . . . 8 | 2.1.5. Secure Transmission . . . . . . . . . . . . . . . . . 9 | |||
2.1.5.1. Safety . . . . . . . . . . . . . . . . . . . . . 8 | 2.1.5.1. Safety . . . . . . . . . . . . . . . . . . . . . 9 | |||
2.2. Pro Audio Today . . . . . . . . . . . . . . . . . . . . . 9 | 2.2. Pro Audio Today . . . . . . . . . . . . . . . . . . . . . 9 | |||
2.3. Pro Audio Future . . . . . . . . . . . . . . . . . . . . 9 | 2.3. Pro Audio Future . . . . . . . . . . . . . . . . . . . . 10 | |||
2.3.1. Layer 3 Interconnecting Layer 2 Islands . . . . . . . 9 | 2.3.1. Layer 3 Interconnecting Layer 2 Islands . . . . . . . 10 | |||
2.3.2. High Reliability Stream Paths . . . . . . . . . . . . 9 | 2.3.2. High Reliability Stream Paths . . . . . . . . . . . . 10 | |||
2.3.3. Integration of Reserved Streams into IT Networks . . 9 | 2.3.3. Integration of Reserved Streams into IT Networks . . 10 | |||
2.3.4. Use of Unused Reservations by Best-Effort Traffic . . 10 | 2.3.4. Use of Unused Reservations by Best-Effort Traffic . . 11 | |||
2.3.5. Traffic Segregation . . . . . . . . . . . . . . . . . 10 | 2.3.5. Traffic Segregation . . . . . . . . . . . . . . . . . 11 | |||
2.3.5.1. Packet Forwarding Rules, VLANs and Subnets . . . 10 | 2.3.5.1. Packet Forwarding Rules, VLANs and Subnets . . . 11 | |||
2.3.5.2. Multicast Addressing (IPv4 and IPv6) . . . . . . 11 | 2.3.5.2. Multicast Addressing (IPv4 and IPv6) . . . . . . 12 | |||
2.3.6. Latency Optimization by a Central Controller . . . . 11 | 2.3.6. Latency Optimization by a Central Controller . . . . 12 | |||
2.3.7. Reduced Device Cost Due To Reduced Buffer Memory . . 11 | 2.3.7. Reduced Device Cost Due To Reduced Buffer Memory . . 12 | |||
2.4. Pro Audio Asks . . . . . . . . . . . . . . . . . . . . . 12 | 2.4. Pro Audio Asks . . . . . . . . . . . . . . . . . . . . . 13 | |||
3. Electrical Utilities . . . . . . . . . . . . . . . . . . . . 12 | 3. Electrical Utilities . . . . . . . . . . . . . . . . . . . . 13 | |||
3.1. Use Case Description . . . . . . . . . . . . . . . . . . 12 | 3.1. Use Case Description . . . . . . . . . . . . . . . . . . 13 | |||
3.1.1. Transmission Use Cases . . . . . . . . . . . . . . . 12 | 3.1.1. Transmission Use Cases . . . . . . . . . . . . . . . 13 | |||
3.1.1.1. Protection . . . . . . . . . . . . . . . . . . . 12 | 3.1.1.1. Protection . . . . . . . . . . . . . . . . . . . 13 | |||
3.1.1.2. Intra-Substation Process Bus Communications . . . 18 | 3.1.1.2. Intra-Substation Process Bus Communications . . . 19 | |||
3.1.1.3. Wide Area Monitoring and Control Systems . . . . 19 | 3.1.1.3. Wide Area Monitoring and Control Systems . . . . 20 | |||
3.1.1.4. IEC 61850 WAN engineering guidelines requirement | 3.1.1.4. IEC 61850 WAN engineering guidelines requirement | |||
classification . . . . . . . . . . . . . . . . . 20 | classification . . . . . . . . . . . . . . . . . 21 | |||
3.1.2. Generation Use Case . . . . . . . . . . . . . . . . . 21 | 3.1.2. Generation Use Case . . . . . . . . . . . . . . . . . 22 | |||
3.1.2.1. Control of the Generated Power . . . . . . . . . 21 | 3.1.2.1. Control of the Generated Power . . . . . . . . . 22 | |||
3.1.2.2. Control of the Generation Infrastructure . . . . 22 | 3.1.2.2. Control of the Generation Infrastructure . . . . 23 | |||
3.1.3. Distribution use case . . . . . . . . . . . . . . . . 27 | 3.1.3. Distribution use case . . . . . . . . . . . . . . . . 28 | |||
3.1.3.1. Fault Location Isolation and Service Restoration | 3.1.3.1. Fault Location Isolation and Service Restoration | |||
(FLISR) . . . . . . . . . . . . . . . . . . . . . 27 | (FLISR) . . . . . . . . . . . . . . . . . . . . . 28 | |||
3.2. Electrical Utilities Today . . . . . . . . . . . . . . . 28 | 3.2. Electrical Utilities Today . . . . . . . . . . . . . . . 29 | |||
3.2.1. Security Current Practices and Limitations . . . . . 28 | 3.2.1. Security Current Practices and Limitations . . . . . 29 | |||
3.3. Electrical Utilities Future . . . . . . . . . . . . . . . 30 | 3.3. Electrical Utilities Future . . . . . . . . . . . . . . . 31 | |||
3.3.1. Migration to Packet-Switched Network . . . . . . . . 31 | 3.3.1. Migration to Packet-Switched Network . . . . . . . . 32 | |||
3.3.2. Telecommunications Trends . . . . . . . . . . . . . . 31 | 3.3.2. Telecommunications Trends . . . . . . . . . . . . . . 32 | |||
3.3.2.1. General Telecommunications Requirements . . . . . 31 | 3.3.2.1. General Telecommunications Requirements . . . . . 32 | |||
3.3.2.2. Specific Network topologies of Smart Grid | 3.3.2.2. Specific Network topologies of Smart Grid | |||
Applications . . . . . . . . . . . . . . . . . . 32 | Applications . . . . . . . . . . . . . . . . . . 33 | |||
3.3.2.3. Precision Time Protocol . . . . . . . . . . . . . 33 | 3.3.2.3. Precision Time Protocol . . . . . . . . . . . . . 34 | |||
3.3.3. Security Trends in Utility Networks . . . . . . . . . 34 | 3.3.3. Security Trends in Utility Networks . . . . . . . . . 35 | |||
3.4. Electrical Utilities Asks . . . . . . . . . . . . . . . . 36 | 3.4. Electrical Utilities Asks . . . . . . . . . . . . . . . . 37 | |||
4. Building Automation Systems . . . . . . . . . . . . . . . . . 36 | 4. Building Automation Systems . . . . . . . . . . . . . . . . . 37 | |||
4.1. Use Case Description . . . . . . . . . . . . . . . . . . 36 | 4.1. Use Case Description . . . . . . . . . . . . . . . . . . 37 | |||
4.2. Building Automation Systems Today . . . . . . . . . . . . 37 | 4.2. Building Automation Systems Today . . . . . . . . . . . . 38 | |||
4.2.1. BAS Architecture . . . . . . . . . . . . . . . . . . 37 | 4.2.1. BAS Architecture . . . . . . . . . . . . . . . . . . 38 | |||
4.2.2. BAS Deployment Model . . . . . . . . . . . . . . . . 38 | 4.2.2. BAS Deployment Model . . . . . . . . . . . . . . . . 39 | |||
4.2.3. Use Cases for Field Networks . . . . . . . . . . . . 40 | 4.2.3. Use Cases for Field Networks . . . . . . . . . . . . 41 | |||
4.2.3.1. Environmental Monitoring . . . . . . . . . . . . 40 | 4.2.3.1. Environmental Monitoring . . . . . . . . . . . . 41 | |||
4.2.3.2. Fire Detection . . . . . . . . . . . . . . . . . 40 | 4.2.3.2. Fire Detection . . . . . . . . . . . . . . . . . 41 | |||
4.2.3.3. Feedback Control . . . . . . . . . . . . . . . . 41 | 4.2.3.3. Feedback Control . . . . . . . . . . . . . . . . 42 | |||
4.2.4. Security Considerations . . . . . . . . . . . . . . . 41 | 4.2.4. Security Considerations . . . . . . . . . . . . . . . 42 | |||
4.3. BAS Future . . . . . . . . . . . . . . . . . . . . . . . 41 | 4.3. BAS Future . . . . . . . . . . . . . . . . . . . . . . . 42 | |||
4.4. BAS Asks . . . . . . . . . . . . . . . . . . . . . . . . 42 | 4.4. BAS Asks . . . . . . . . . . . . . . . . . . . . . . . . 43 | |||
5. Wireless for Industrial . . . . . . . . . . . . . . . . . . . 42 | 5. Wireless for Industrial . . . . . . . . . . . . . . . . . . . 43 | |||
5.1. Use Case Description . . . . . . . . . . . . . . . . . . 42 | 5.1. Use Case Description . . . . . . . . . . . . . . . . . . 43 | |||
5.1.1. Network Convergence using 6TiSCH . . . . . . . . . . 43 | 5.1.1. Network Convergence using 6TiSCH . . . . . . . . . . 44 | |||
5.1.2. Common Protocol Development for 6TiSCH . . . . . . . 43 | 5.1.2. Common Protocol Development for 6TiSCH . . . . . . . 44 | |||
5.2. Wireless Industrial Today . . . . . . . . . . . . . . . . 44 | 5.2. Wireless Industrial Today . . . . . . . . . . . . . . . . 45 | |||
5.3. Wireless Industrial Future . . . . . . . . . . . . . . . 44 | 5.3. Wireless Industrial Future . . . . . . . . . . . . . . . 45 | |||
5.3.1. Unified Wireless Network and Management . . . . . . . 44 | 5.3.1. Unified Wireless Network and Management . . . . . . . 45 | |||
5.3.1.1. PCE and 6TiSCH ARQ Retries . . . . . . . . . . . 46 | 5.3.1.1. PCE and 6TiSCH ARQ Retries . . . . . . . . . . . 47 | |||
5.3.2. Schedule Management by a PCE . . . . . . . . . . . . 47 | 5.3.2. Schedule Management by a PCE . . . . . . . . . . . . 48 | |||
5.3.2.1. PCE Commands and 6TiSCH CoAP Requests . . . . . . 47 | 5.3.2.1. PCE Commands and 6TiSCH CoAP Requests . . . . . . 48 | |||
5.3.2.2. 6TiSCH IP Interface . . . . . . . . . . . . . . . 48 | 5.3.2.2. 6TiSCH IP Interface . . . . . . . . . . . . . . . 49 | |||
5.3.3. 6TiSCH Security Considerations . . . . . . . . . . . 49 | 5.3.3. 6TiSCH Security Considerations . . . . . . . . . . . 50 | |||
5.4. Wireless Industrial Asks . . . . . . . . . . . . . . . . 49 | 5.4. Wireless Industrial Asks . . . . . . . . . . . . . . . . 50 | |||
6. Cellular Radio . . . . . . . . . . . . . . . . . . . . . . . 49 | 6. Cellular Radio . . . . . . . . . . . . . . . . . . . . . . . 50 | |||
6.1. Use Case Description . . . . . . . . . . . . . . . . . . 49 | 6.1. Use Case Description . . . . . . . . . . . . . . . . . . 50 | |||
6.1.1. Network Architecture . . . . . . . . . . . . . . . . 49 | 6.1.1. Network Architecture . . . . . . . . . . . . . . . . 50 | |||
6.1.2. Delay Constraints . . . . . . . . . . . . . . . . . . 50 | 6.1.2. Delay Constraints . . . . . . . . . . . . . . . . . . 51 | |||
6.1.3. Time Synchronization Constraints . . . . . . . . . . 51 | 6.1.3. Time Synchronization Constraints . . . . . . . . . . 53 | |||
6.1.4. Transport Loss Constraints . . . . . . . . . . . . . 53 | 6.1.4. Transport Loss Constraints . . . . . . . . . . . . . 55 | |||
6.1.5. Security Considerations . . . . . . . . . . . . . . . 53 | 6.1.5. Security Considerations . . . . . . . . . . . . . . . 55 | |||
6.2. Cellular Radio Networks Today . . . . . . . . . . . . . . 54 | 6.2. Cellular Radio Networks Today . . . . . . . . . . . . . . 56 | |||
6.2.1. Fronthaul . . . . . . . . . . . . . . . . . . . . . . 54 | 6.2.1. Fronthaul . . . . . . . . . . . . . . . . . . . . . . 56 | |||
6.2.2. Midhaul and Backhaul . . . . . . . . . . . . . . . . 54 | 6.2.2. Midhaul and Backhaul . . . . . . . . . . . . . . . . 56 | |||
6.3. Cellular Radio Networks Future . . . . . . . . . . . . . 55 | 6.3. Cellular Radio Networks Future . . . . . . . . . . . . . 57 | |||
6.4. Cellular Radio Networks Asks . . . . . . . . . . . . . . 57 | 6.4. Cellular Radio Networks Asks . . . . . . . . . . . . . . 59 | |||
7. Industrial M2M . . . . . . . . . . . . . . . . . . . . . . . 57 | 7. Industrial M2M . . . . . . . . . . . . . . . . . . . . . . . 59 | |||
7.1. Use Case Description . . . . . . . . . . . . . . . . . . 57 | 7.1. Use Case Description . . . . . . . . . . . . . . . . . . 59 | |||
7.2. Industrial M2M Communication Today . . . . . . . . . . . 58 | 7.2. Industrial M2M Communication Today . . . . . . . . . . . 60 | |||
7.2.1. Transport Parameters . . . . . . . . . . . . . . . . 59 | 7.2.1. Transport Parameters . . . . . . . . . . . . . . . . 61 | |||
7.2.2. Stream Creation and Destruction . . . . . . . . . . . 60 | 7.2.2. Stream Creation and Destruction . . . . . . . . . . . 62 | |||
7.3. Industrial M2M Future . . . . . . . . . . . . . . . . . . 60 | 7.3. Industrial M2M Future . . . . . . . . . . . . . . . . . . 62 | |||
7.4. Industrial M2M Asks . . . . . . . . . . . . . . . . . . . 60 | 7.4. Industrial M2M Asks . . . . . . . . . . . . . . . . . . . 62 | |||
8. Use Case Common Themes . . . . . . . . . . . . . . . . . . . 60 | ||||
8.1. Unified, standards-based network . . . . . . . . . . . . 61 | ||||
8.1.1. Extensions to Ethernet . . . . . . . . . . . . . . . 61 | ||||
8.1.2. Centrally Administered . . . . . . . . . . . . . . . 61 | ||||
8.1.3. Standardized Data Flow Information Models . . . . . . 61 | ||||
8.1.4. L2 and L3 Integration . . . . . . . . . . . . . . . . 61 | ||||
8.1.5. Guaranteed End-to-End Delivery . . . . . . . . . . . 61 | ||||
8.1.6. Replacement for Multiple Proprietary Deterministic | ||||
Networks . . . . . . . . . . . . . . . . . . . . . . 61 | ||||
8.1.7. Mix of Deterministic and Best-Effort Traffic . . . . 62 | ||||
8.1.8. Unused Reserved BW to be Available to Best Effort | ||||
Traffic . . . . . . . . . . . . . . . . . . . . . . . 62 | ||||
8.1.9. Lower Cost, Multi-Vendor Solutions . . . . . . . . . 62 | 8. Mining Industry . . . . . . . . . . . . . . . . . . . . . . . 63 | |||
8.2. Scalable Size . . . . . . . . . . . . . . . . . . . . . . 62 | 8.1. Use Case Description . . . . . . . . . . . . . . . . . . 63 | |||
8.3. Scalable Timing Parameters and Accuracy . . . . . . . . . 62 | 8.2. Mining Industry Today . . . . . . . . . . . . . . . . . . 63 | |||
8.3.1. Bounded Latency . . . . . . . . . . . . . . . . . . . 62 | 8.3. Mining Industry Future . . . . . . . . . . . . . . . . . 64 | |||
8.3.2. Low Latency . . . . . . . . . . . . . . . . . . . . . 63 | 8.4. Mining Industry Asks . . . . . . . . . . . . . . . . . . 65 | |||
8.3.3. Symmetrical Path Delays . . . . . . . . . . . . . . . 63 | 9. Private Blockchain . . . . . . . . . . . . . . . . . . . . . 65 | |||
8.4. High Reliability and Availability . . . . . . . . . . . . 63 | 9.1. Use Case Description . . . . . . . . . . . . . . . . . . 65 | |||
8.5. Security . . . . . . . . . . . . . . . . . . . . . . . . 63 | 9.1.1. Blockchain Operation . . . . . . . . . . . . . . . . 65 | |||
8.6. Deterministic Flows . . . . . . . . . . . . . . . . . . . 64 | 9.1.2. Blockchain Network Architecture . . . . . . . . . . . 66 | |||
9. Use Cases Explicitly Out of Scope for DetNet . . . . . . . . 64 | 9.1.3. Security Considerations . . . . . . . . . . . . . . . 66 | |||
9.1. DetNet Scope Limitations . . . . . . . . . . . . . . . . 64 | 9.2. Private Blockchain Today . . . . . . . . . . . . . . . . 66 | |||
9.2. Internet-based Applications . . . . . . . . . . . . . . . 65 | 9.3. Private Blockchain Future . . . . . . . . . . . . . . . . 67 | |||
9.2.1. Use Case Description . . . . . . . . . . . . . . . . 65 | 9.4. Private Blockchain Asks . . . . . . . . . . . . . . . . . 67 | |||
9.2.1.1. Media Content Delivery . . . . . . . . . . . . . 65 | 10. Network Slicing . . . . . . . . . . . . . . . . . . . . . . . 67 | |||
9.2.1.2. Online Gaming . . . . . . . . . . . . . . . . . . 65 | 10.1. Use Case Description . . . . . . . . . . . . . . . . . . 67 | |||
9.2.1.3. Virtual Reality . . . . . . . . . . . . . . . . . 65 | 10.2. Network Slicing Use Cases . . . . . . . . . . . . . . . 68 | |||
9.2.2. Internet-Based Applications Today . . . . . . . . . . 65 | 10.2.1. Enhanced Mobile Broadband (eMBB) . . . . . . . . . . 68 | |||
9.2.3. Internet-Based Applications Future . . . . . . . . . 65 | 10.2.2. Ultra-Reliable and Low Latency Communications | |||
9.2.4. Internet-Based Applications Asks . . . . . . . . . . 66 | (URLLC) . . . . . . . . . . . . . . . . . . . . . . 68 | |||
9.3. Pro Audio and Video - Digital Rights Management (DRM) . . 66 | 10.2.3. massive Machine Type Communications (mMTC) . . . . . 68 | |||
9.4. Pro Audio and Video - Link Aggregation . . . . . . . . . 66 | 10.3. Using DetNet in Network Slicing . . . . . . . . . . . . 68 | |||
10. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 67 | 10.4. Network Slicing Today and Future . . . . . . . . . . . . 69 | |||
10.1. Pro Audio . . . . . . . . . . . . . . . . . . . . . . . 67 | 10.5. Network Slicing Asks . . . . . . . . . . . . . . . . . . 69 | |||
10.2. Utility Telecom . . . . . . . . . . . . . . . . . . . . 67 | 11. Use Case Common Themes . . . . . . . . . . . . . . . . . . . 69 | |||
10.3. Building Automation Systems . . . . . . . . . . . . . . 67 | 11.1. Unified, standards-based network . . . . . . . . . . . . 69 | |||
10.4. Wireless for Industrial . . . . . . . . . . . . . . . . 67 | 11.1.1. Extensions to Ethernet . . . . . . . . . . . . . . . 69 | |||
10.5. Cellular Radio . . . . . . . . . . . . . . . . . . . . . 68 | 11.1.2. Centrally Administered . . . . . . . . . . . . . . . 69 | |||
10.6. Industrial M2M . . . . . . . . . . . . . . . . . . . . . 68 | 11.1.3. Standardized Data Flow Information Models . . . . . 70 | |||
10.7. Internet Applications and CoMP . . . . . . . . . . . . . 68 | 11.1.4. L2 and L3 Integration . . . . . . . . . . . . . . . 70 | |||
10.8. Electrical Utilities . . . . . . . . . . . . . . . . . . 68 | 11.1.5. Guaranteed End-to-End Delivery . . . . . . . . . . . 70 | |||
11. Informative References . . . . . . . . . . . . . . . . . . . 68 | 11.1.6. Replacement for Multiple Proprietary Deterministic | |||
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 78 | Networks . . . . . . . . . . . . . . . . . . . . . . 70 | |||
11.1.7. Mix of Deterministic and Best-Effort Traffic . . . . 70 | ||||
11.1.8. Unused Reserved BW to be Available to Best Effort | ||||
Traffic . . . . . . . . . . . . . . . . . . . . . . 70 | ||||
11.1.9. Lower Cost, Multi-Vendor Solutions . . . . . . . . . 71 | ||||
11.2. Scalable Size . . . . . . . . . . . . . . . . . . . . . 71 | ||||
11.3. Scalable Timing Parameters and Accuracy . . . . . . . . 71 | ||||
11.3.1. Bounded Latency . . . . . . . . . . . . . . . . . . 71 | ||||
11.3.2. Low Latency . . . . . . . . . . . . . . . . . . . . 71 | ||||
11.3.3. Symmetrical Path Delays . . . . . . . . . . . . . . 72 | ||||
11.4. High Reliability and Availability . . . . . . . . . . . 72 | ||||
11.5. Security . . . . . . . . . . . . . . . . . . . . . . . . 72 | ||||
11.6. Deterministic Flows . . . . . . . . . . . . . . . . . . 72 | ||||
12. Use Cases Explicitly Out of Scope for DetNet . . . . . . . . 72 | ||||
12.1. DetNet Scope Limitations . . . . . . . . . . . . . . . . 73 | ||||
12.2. Internet-based Applications . . . . . . . . . . . . . . 73 | ||||
12.2.1. Use Case Description . . . . . . . . . . . . . . . . 73 | ||||
12.2.1.1. Media Content Delivery . . . . . . . . . . . . . 74 | ||||
12.2.1.2. Online Gaming . . . . . . . . . . . . . . . . . 74 | ||||
12.2.1.3. Virtual Reality . . . . . . . . . . . . . . . . 74 | ||||
12.2.2. Internet-Based Applications Today . . . . . . . . . 74 | ||||
12.2.3. Internet-Based Applications Future . . . . . . . . . 74 | ||||
12.2.4. Internet-Based Applications Asks . . . . . . . . . . 74 | ||||
12.3. Pro Audio and Video - Digital Rights Management (DRM) . 75 | ||||
12.4. Pro Audio and Video - Link Aggregation . . . . . . . . . 75 | ||||
13. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 76 | ||||
13.1. Pro Audio . . . . . . . . . . . . . . . . . . . . . . . 76 | ||||
13.2. Utility Telecom . . . . . . . . . . . . . . . . . . . . 76 | ||||
13.3. Building Automation Systems . . . . . . . . . . . . . . 76 | ||||
13.4. Wireless for Industrial . . . . . . . . . . . . . . . . 76 | ||||
13.5. Cellular Radio . . . . . . . . . . . . . . . . . . . . . 77 | ||||
13.6. Industrial M2M . . . . . . . . . . . . . . . . . . . . . 77 | ||||
13.7. Internet Applications and CoMP . . . . . . . . . . . . . 77 | ||||
13.8. Electrical Utilities . . . . . . . . . . . . . . . . . . 77 | ||||
13.9. Network Slicing . . . . . . . . . . . . . . . . . . . . 77 | ||||
13.10. Mining . . . . . . . . . . . . . . . . . . . . . . . . . 77 | ||||
13.11. Private Blockchain . . . . . . . . . . . . . . . . . . . 77 | ||||
14. Informative References . . . . . . . . . . . . . . . . . . . 77 | ||||
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 87 | ||||
1. Introduction | 1. Introduction | |||
This draft presents use cases from diverse industries which have in | This draft presents use cases from diverse industries which have in | |||
common a need for deterministic streams, but which also differ | common a need for deterministic streams, but which also differ | |||
notably in their network topologies and specific desired behavior. | notably in their network topologies and specific desired behavior. | |||
Together, they provide broad industry context for DetNet and a | Together, they provide broad industry context for DetNet and a | |||
yardstick against which proposed DetNet designs can be measured (to | yardstick against which proposed DetNet designs can be measured (to | |||
what extent does a proposed design satisfy these various use cases?) | what extent does a proposed design satisfy these various use cases?) | |||
skipping to change at page 18, line 29 ¶ | skipping to change at page 19, line 29 ¶ | |||
| Redundancy | Yes | | | Redundancy | Yes | | |||
| Packet loss | 1% | | | Packet loss | 1% | | |||
+----------------------------------+--------------------------------+ | +----------------------------------+--------------------------------+ | |||
Table 5: Inter-Substation Protection requirements | Table 5: Inter-Substation Protection requirements | |||
3.1.1.2. Intra-Substation Process Bus Communications | 3.1.1.2. Intra-Substation Process Bus Communications | |||
This use case describes the data flow from the CT/VT to the IEDs in | This use case describes the data flow from the CT/VT to the IEDs in | |||
the substation via the MU. The CT/VT in the substation send the | the substation via the MU. The CT/VT in the substation send the | |||
sampled value (analog voltage or current) to the MU over hard wire. | analog voltage or current values to the MU over hard wire. The MU | |||
The MU sends the time-synchronized 61850-9-2 sampled values to the | converts the analog values into digital format (typically time- | |||
IEDs in the substation in GOOSE message format. The GPS Master Clock | synchronized Sampled Values as specified by IEC 61850-9-2) and sends | |||
can send 1PPS or IRIG-B format to the MU through a serial port or | them to the IEDs in the substation. The GPS Master Clock can send | |||
IEEE 1588 protocol via a network. Process bus communication using | 1PPS or IRIG-B format to the MU through a serial port or IEEE 1588 | |||
61850 simplifies connectivity within the substation and removes the | protocol via a network. Process bus communication using 61850 | |||
simplifies connectivity within the substation and removes the | ||||
requirement for multiple serial connections and removes the slow | requirement for multiple serial connections and removes the slow | |||
serial bus architectures that are typically used. This also ensures | serial bus architectures that are typically used. This also ensures | |||
increased flexibility and increased speed with the use of multicast | increased flexibility and increased speed with the use of multicast | |||
messaging between multiple devices. | messaging between multiple devices. | |||
+----------------------------------+--------------------------------+ | +----------------------------------+--------------------------------+ | |||
| Intra-Substation protection | Attribute | | | Intra-Substation protection | Attribute | | |||
| Requirement | | | | Requirement | | | |||
+----------------------------------+--------------------------------+ | +----------------------------------+--------------------------------+ | |||
| One way maximum delay | 5 ms | | | One way maximum delay | 5 ms | | |||
skipping to change at page 30, line 45 ¶ | skipping to change at page 31, line 45 ¶ | |||
be based on open-standards-based IP architecture. An end-to-end IP | be based on open-standards-based IP architecture. An end-to-end IP | |||
architecture takes advantage of nearly three decades of IP technology | architecture takes advantage of nearly three decades of IP technology | |||
development, facilitating interoperability and device management | development, facilitating interoperability and device management | |||
across disparate networks and devices, as it has been already | across disparate networks and devices, as it has been already | |||
demonstrated in many mission-critical and highly secure networks. | demonstrated in many mission-critical and highly secure networks. | |||
IPv6 is seen as a future telecommunications technology for the Smart | IPv6 is seen as a future telecommunications technology for the Smart | |||
Grid; the IEC (International Electrotechnical Commission) and | Grid; the IEC (International Electrotechnical Commission) and | |||
different National Committees have mandated a specific adhoc group | different National Committees have mandated a specific adhoc group | |||
(AHG8) to define the migration strategy to IPv6 for all the IEC TC57 | (AHG8) to define the migration strategy to IPv6 for all the IEC TC57 | |||
power automation standards. | power automation standards. The AHG8 has recently finalised the work | |||
on the migration strategy and the following Technical Report has been | ||||
issued: IEC TR 62357-200:2015: Guidelines for migration from Internet | ||||
Protocol version 4 (IPv4) to Internet Protocol version 6 (IPv6). | ||||
We expect cloud-based SCADA systems to control and monitor the | We expect cloud-based SCADA systems to control and monitor the | |||
critical and non-critical subsystems of generation systems, for | critical and non-critical subsystems of generation systems, for | |||
example wind farms. | example wind farms. | |||
3.3.1. Migration to Packet-Switched Network | 3.3.1. Migration to Packet-Switched Network | |||
Throughout the world, utilities are increasingly planning for a | Throughout the world, utilities are increasingly planning for a | |||
future based on smart grid applications requiring advanced | future based on smart grid applications requiring advanced | |||
telecommunications systems. Many of these applications utilize | telecommunications systems. Many of these applications utilize | |||
skipping to change at page 34, line 14 ¶ | skipping to change at page 35, line 14 ¶ | |||
PTP was designed assuming a multicast communication model, however | PTP was designed assuming a multicast communication model, however | |||
PTP also supports a unicast communication model as long as the | PTP also supports a unicast communication model as long as the | |||
behavior of the protocol is preserved. | behavior of the protocol is preserved. | |||
Like all message-based time transfer protocols, PTP time accuracy | Like all message-based time transfer protocols, PTP time accuracy | |||
is degraded by delay asymmetry in the paths taken by event | is degraded by delay asymmetry in the paths taken by event | |||
messages. Asymmetry is not detectable by PTP, however, if such | messages. Asymmetry is not detectable by PTP, however, if such | |||
delays are known a priori, PTP can correct for asymmetry. | delays are known a priori, PTP can correct for asymmetry. | |||
IEC 61850 will recommend the use of the IEEE PTP 1588 Utility Profile | IEC 61850 defines the use of IEC/IEEE 61850-9-3:2016. The title is: | |||
(as defined in [IEC62439-3:2012] Annex B) which offers the support of | Precision time protocol profile for power utility automation. It is | |||
redundant attachment of clocks to Parallel Redundancy Protcol (PRP) | based on Annex B/IEC 62439 which offers the support of redundant | |||
and High-availability Seamless Redundancy (HSR) networks. | attachment of clocks to Parallel Redundancy Protocol (PRP) and High- | |||
availability Seamless Redundancy (HSR) networks. | ||||
3.3.3. Security Trends in Utility Networks | 3.3.3. Security Trends in Utility Networks | |||
Although advanced telecommunications networks can assist in | Although advanced telecommunications networks can assist in | |||
transforming the energy industry by playing a critical role in | transforming the energy industry by playing a critical role in | |||
maintaining high levels of reliability, performance, and | maintaining high levels of reliability, performance, and | |||
manageability, they also introduce the need for an integrated | manageability, they also introduce the need for an integrated | |||
security infrastructure. Many of the technologies being deployed to | security infrastructure. Many of the technologies being deployed to | |||
support smart grid projects such as smart meters and sensors can | support smart grid projects such as smart meters and sensors can | |||
increase the vulnerability of the grid to attack. Top security | increase the vulnerability of the grid to attack. Top security | |||
skipping to change at page 49, line 41 ¶ | skipping to change at page 50, line 41 ¶ | |||
This use case describes the application of deterministic networking | This use case describes the application of deterministic networking | |||
in the context of cellular telecom transport networks. Important | in the context of cellular telecom transport networks. Important | |||
elements include time synchronization, clock distribution, and ways | elements include time synchronization, clock distribution, and ways | |||
of establishing time-sensitive streams for both Layer-2 and Layer-3 | of establishing time-sensitive streams for both Layer-2 and Layer-3 | |||
user plane traffic. | user plane traffic. | |||
6.1.1. Network Architecture | 6.1.1. Network Architecture | |||
Figure 10 illustrates a typical 3GPP-defined cellular network | Figure 10 illustrates a typical 3GPP-defined cellular network | |||
architecture, which includes "Fronthaul" and "Midhaul" network | architecture, which includes "Fronthaul", "Midhaul" and "Backhaul" | |||
segments. The "Fronthaul" is the network connecting base stations | network segments. The "Fronthaul" is the network connecting base | |||
(baseband processing units) to the remote radio heads (antennas). | stations (baseband processing units) to the remote radio heads | |||
The "Midhaul" is the network inter-connecting base stations (or small | (antennas). The "Midhaul" is the network inter-connecting base | |||
cell sites). | stations (or small cell sites). The "Backhaul" is the network or | |||
links connecting the radio base station sites to the network | ||||
controller/gateway sites (i.e. the core of the 3GPP cellular | ||||
network). | ||||
In Figure 10 "eNB" ("E-UTRAN Node B") is the hardware that is | In Figure 10 "eNB" ("E-UTRAN Node B") is the hardware that is | |||
connected to the mobile phone network which communicates directly | connected to the mobile phone network which communicates directly | |||
with mobile handsets ([TS36300]). | with mobile handsets ([TS36300]). | |||
Y (remote radio heads (antennas)) | Y (remote radio heads (antennas)) | |||
\ | \ | |||
Y__ \.--. .--. +------+ | Y__ \.--. .--. +------+ | |||
\_( `. +---+ _(Back`. | 3GPP | | \_( `. +---+ _(Back`. | 3GPP | | |||
Y------( Front )----|eNB|----( Haul )----| core | | Y------( Front )----|eNB|----( Haul )----| core | | |||
skipping to change at page 50, line 50 ¶ | skipping to change at page 51, line 50 ¶ | |||
For packet-based transport the allocated transport time (e.g. CPRI | For packet-based transport the allocated transport time (e.g. CPRI | |||
would allow for 100us delay [CPRI]) is consumed by all nodes and | would allow for 100us delay [CPRI]) is consumed by all nodes and | |||
buffering between the remote radio head and the baseband processing | buffering between the remote radio head and the baseband processing | |||
unit, plus the distance-incurred delay. | unit, plus the distance-incurred delay. | |||
The baseband processing time and the available "delay budget" for the | The baseband processing time and the available "delay budget" for the | |||
fronthaul is likely to change in the forthcoming "5G" due to reduced | fronthaul is likely to change in the forthcoming "5G" due to reduced | |||
radio round trip times and other architectural and service | radio round trip times and other architectural and service | |||
requirements [NGMN]. | requirements [NGMN]. | |||
The transport time budget, as noted above, places limitations on the | ||||
distance that remote radio heads can be located from base stations | ||||
(i.e. the link length). In the above analysis, the entire transport | ||||
time budget is assumed to be available for link propagation delay. | ||||
However the transport time budget can be broken down into three | ||||
components: scheduling /queueing delay, transmission delay, and link | ||||
propagation delay. Using today's Fronthaul networking technology, | ||||
the queuing, scheduling and transmission components might become the | ||||
dominant factors in the total transport time rather than the link | ||||
propagation delay. This is especially true in cases where the | ||||
Fronthaul link is relatively short and it is shared among multiple | ||||
Fronthaul flows, for example in indoor and small cell networks, | ||||
massive MIMO antenna networks, and split Fronthaul architectures. | ||||
DetNet technology can improve this application by controlling and | ||||
reducing the time required for the queuing, scheduling and | ||||
transmission operations by properly assigning the network resources, | ||||
thus leaving more of the transport time budget available for link | ||||
propagation, and thus enabling longer link lengths. However, link | ||||
length is usually a given parameter and is not a controllable network | ||||
parameter, since RRH and BBU sights are usually located in | ||||
predetermined locations. However, the number of antennas in an RRH | ||||
sight might increase for example by adding more antennas, increasing | ||||
the MIMO capability of the network or support of massive MIMO. This | ||||
means increasing the number of the fronthaul flows sharing the same | ||||
fronthaul link. DetNet can now control the bandwidth assignment of | ||||
the fronthaul link and the scheduling pf fronthaul packets over this | ||||
link and provide adequate buffer provisioning for each flow to reduce | ||||
the packet loss rate. | ||||
Another way in which DetNet technology can aid Fronthaul networks is | ||||
by providing effective isolation from best-effort (and other classes | ||||
of) traffic, which can arise as a result of network slicing in 5G | ||||
networks where Fronthaul traffic generated in different network | ||||
slices might have differing performance requirements. DetNet | ||||
technology can also dynamically control the bandwidth assignment, | ||||
scheduling and packet forwarding decisions and the buffer | ||||
provisioning of the Fronthaul flows to guarantee the end-to-end delay | ||||
of the Fronthaul packets and minimize the packet loss rate. | ||||
[METIS] documents the fundamental challenges as well as overall | [METIS] documents the fundamental challenges as well as overall | |||
technical goals of the future 5G mobile and wireless system as the | technical goals of the future 5G mobile and wireless system as the | |||
starting point. These future systems should support much higher data | starting point. These future systems should support much higher data | |||
volumes and rates and significantly lower end-to-end latency for 100x | volumes and rates and significantly lower end-to-end latency for 100x | |||
more connected devices (at similar cost and energy consumption levels | more connected devices (at similar cost and energy consumption levels | |||
as today's system). | as today's system). | |||
For Midhaul connections, delay constraints are driven by Inter-Site | For Midhaul connections, delay constraints are driven by Inter-Site | |||
radio functions like Coordinated Multipoint Processing (CoMP, see | radio functions like Coordinated Multipoint Processing (CoMP, see | |||
[CoMP]). CoMP reception and transmission is a framework in which | [CoMP]). CoMP reception and transmission is a framework in which | |||
skipping to change at page 53, line 12 ¶ | skipping to change at page 55, line 7 ¶ | |||
every measure to reduce jitter and delay on the path makes it easier | every measure to reduce jitter and delay on the path makes it easier | |||
to meet the end-to-end requirements. | to meet the end-to-end requirements. | |||
In order to meet the timing requirements both senders and receivers | In order to meet the timing requirements both senders and receivers | |||
must remain time synchronized, demanding very accurate clock | must remain time synchronized, demanding very accurate clock | |||
distribution, for example support for IEEE 1588 transparent clocks or | distribution, for example support for IEEE 1588 transparent clocks or | |||
boundary clocks in every intermediate node. | boundary clocks in every intermediate node. | |||
In cellular networks from the LTE radio era onward, phase | In cellular networks from the LTE radio era onward, phase | |||
synchronization is needed in addition to frequency synchronization | synchronization is needed in addition to frequency synchronization | |||
([TS36300], [TS23401]). | ([TS36300], [TS23401]). Time constraints are also important due to | |||
their impact on packet loss. If a packet is delivered too late, then | ||||
the packet may be dropped by the host. | ||||
6.1.4. Transport Loss Constraints | 6.1.4. Transport Loss Constraints | |||
Fronthaul and Midhaul networks assume almost error-free transport. | Fronthaul and Midhaul networks assume almost error-free transport. | |||
Errors can result in a reset of the radio interfaces, which can cause | Errors can result in a reset of the radio interfaces, which can cause | |||
reduced throughput or broken radio connectivity for mobile customers. | reduced throughput or broken radio connectivity for mobile customers. | |||
For packetized Fronthaul and Midhaul connections packet loss may be | For packetized Fronthaul and Midhaul connections packet loss may be | |||
caused by BER, congestion, or network failure scenarios. Current | caused by BER, congestion, or network failure scenarios. Different | |||
tools for elminating packet loss for Fronthaul and Midhaul networks | fronthaul functional splits are being considered by 3GPP, requiring | |||
have serious challenges, for example retransmitting lost packets and/ | strict frame loss ratio (FLR) guarantees. As one example (referring | |||
or using forward error correction (FEC) to circumvent bit errors is | to the legacy CPRI split which is option 8 in 3GPP) lower layers | |||
splits may imply an FLR of less than 10E-7 for data traffic and less | ||||
than 10E-6 for control and management traffic. Current tools for | ||||
eliminating packet loss for Fronthaul and Midhaul networks have | ||||
serious challenges, for example retransmitting lost packets and/or | ||||
using forward error correction (FEC) to circumvent bit errors is | ||||
practically impossible due to the additional delay incurred. Using | practically impossible due to the additional delay incurred. Using | |||
redundant streams for better guarantees for delivery is also | redundant streams for better guarantees for delivery is also | |||
practically impossible in many cases due to high bandwidth | practically impossible in many cases due to high bandwidth | |||
requirements of Fronthaul and Midhaul networks. Protection switching | requirements of Fronthaul and Midhaul networks. Protection switching | |||
is also a candidate but current technologies for the path switch are | is also a candidate but current technologies for the path switch are | |||
too slow to avoid reset of mobile interfaces. | too slow to avoid reset of mobile interfaces. | |||
Fronthaul links are assumed to be symmetric, and all Fronthaul | Fronthaul links are assumed to be symmetric, and all Fronthaul | |||
streams (i.e. those carrying radio data) have equal priority and | streams (i.e. those carrying radio data) have equal priority and | |||
cannot delay or pre-empt each other. This implies that the network | cannot delay or pre-empt each other. This implies that the network | |||
skipping to change at page 55, line 21 ¶ | skipping to change at page 57, line 21 ¶ | |||
Future Cellular Radio Networks will be based on a mix of different | Future Cellular Radio Networks will be based on a mix of different | |||
xHaul networks (xHaul = front-, mid- and backhaul), and future | xHaul networks (xHaul = front-, mid- and backhaul), and future | |||
transport networks should be able to support all of them | transport networks should be able to support all of them | |||
simultaneously. It is already envisioned today that: | simultaneously. It is already envisioned today that: | |||
o Not all "cellular radio network" traffic will be IP, for example | o Not all "cellular radio network" traffic will be IP, for example | |||
some will remain at Layer 2 (e.g. Ethernet based). DetNet | some will remain at Layer 2 (e.g. Ethernet based). DetNet | |||
solutions must address all traffic types (Layer 2, Layer 3) with | solutions must address all traffic types (Layer 2, Layer 3) with | |||
the same tools and allow their transport simultaneously. | the same tools and allow their transport simultaneously. | |||
o All form of xHaul networks will need some form of DetNet | o All forms of xHaul networks will need some form of DetNet | |||
solutions. For example with the advent of 5G some Backhaul | solutions. For example with the advent of 5G some Backhaul | |||
traffic will also have DetNet requirements (e.g. traffic belonging | traffic will also have DetNet requirements, for example traffic | |||
to time-critical 5G applications). | belonging to time-critical 5G applications. | |||
o Different splits of the functionality run on the base stations and | ||||
the on-site units could co-exist on the same Fronthaul and | ||||
Backhaul network. | ||||
We would like to see the following in future Cellular Radio networks: | We would like to see the following in future Cellular Radio networks: | |||
o Unified standards-based transport protocols and standard | o Unified standards-based transport protocols and standard | |||
networking equipment that can make use of underlying deterministic | networking equipment that can make use of underlying deterministic | |||
link-layer services | link-layer services | |||
o Unified and standards-based network management systems and | o Unified and standards-based network management systems and | |||
protocols in all parts of the network (including Fronthaul) | protocols in all parts of the network (including Fronthaul) | |||
skipping to change at page 57, line 15 ¶ | skipping to change at page 59, line 15 ¶ | |||
6.4. Cellular Radio Networks Asks | 6.4. Cellular Radio Networks Asks | |||
A standard for data plane transport specification which is: | A standard for data plane transport specification which is: | |||
o Unified among all xHauls (meaning that different flows with | o Unified among all xHauls (meaning that different flows with | |||
diverse DetNet requirements can coexist in the same network and | diverse DetNet requirements can coexist in the same network and | |||
traverse the same nodes without interfering with each other) | traverse the same nodes without interfering with each other) | |||
o Deployed in a highly deterministic network environment | o Deployed in a highly deterministic network environment | |||
o Capable of supporting multiple functional splits simultaneously, | ||||
including existing Backhaul and CPRI Fronthaul and potentially new | ||||
modes as defined for example in 3GPP; these goals can be supported | ||||
by the existing DetNet Use Case Common Themes, notably "Mix of | ||||
Deterministic and Best-Effort Traffic", "Bounded Latency", "Low | ||||
Latency", "Symmetrical Path Delays", and "Deterministic Flows". | ||||
o Capable of supporting Network Slicing and Multi-tenancy; these | ||||
goals can be supported by the same DetNet themes noted above. | ||||
o Capable of transporting both in-band and out-band control traffic | ||||
(OAM info, ...). | ||||
o Deployable over multiple data link technologies (e.g., IEEE 802.3, | ||||
mmWave, etc.). | ||||
A standard for data flow information models that are: | A standard for data flow information models that are: | |||
o Aware of the time sensitivity and constraints of the target | o Aware of the time sensitivity and constraints of the target | |||
networking environment | networking environment | |||
o Aware of underlying deterministic networking services (e.g., on | o Aware of underlying deterministic networking services (e.g., on | |||
the Ethernet layer) | the Ethernet layer) | |||
7. Industrial M2M | 7. Industrial M2M | |||
skipping to change at page 60, line 48 ¶ | skipping to change at page 63, line 5 ¶ | |||
o High availability (presumably through redundancy) (99.999 %) | o High availability (presumably through redundancy) (99.999 %) | |||
o Low message delivery time (100us - 50ms) | o Low message delivery time (100us - 50ms) | |||
o Low packet loss (burstless, 0.1-1 %) | o Low packet loss (burstless, 0.1-1 %) | |||
o Security (e.g. prevent critical flows from being leaked between | o Security (e.g. prevent critical flows from being leaked between | |||
physically separated networks) | physically separated networks) | |||
8. Use Case Common Themes | 8. Mining Industry | |||
8.1. Use Case Description | ||||
The mining industry is highly dependent on networks to monitor and | ||||
control their systems both in open-pit and underground extraction, | ||||
transport and refining processes. In order to reduce risks and | ||||
increase operational efficiency in mining operations, a number of | ||||
processes have migrated the operators from the extraction site to | ||||
remote control and monitoring. | ||||
In the case of open pit mining, autonomous trucks are used to | ||||
transport the raw materials from the open pit to the refining factory | ||||
where the final product (e.g. Copper) is obtained. Although the | ||||
operation is autonomous, the tracks are remotely monitored from a | ||||
central facility. | ||||
In pit mines, the monitoring of the tailings or mine dumps is | ||||
critical in order to avoid any environmental pollution. In the past, | ||||
monitoring has been conducted through manual inspection of pre- | ||||
installed dataloggers. Cabling is not usually exploited in such | ||||
scenarios due to the cost and complex deployment requirements. | ||||
Currently, wireless technologies are being employed to monitor these | ||||
cases permanently. Slopes are also monitored in order to anticipate | ||||
possible mine collapse. Due to the unstable terrain, cable | ||||
maintenance is costly and complex and hence wireless technologies are | ||||
employed. | ||||
In the underground monitoring case, autonomous vehicles with | ||||
extraction tools travel autonomously through the tunnels, but their | ||||
operational tasks (such as excavation, stone breaking and transport) | ||||
are controlled remotely from a central facility. This generates | ||||
video and feedback upstream traffic plus downstream actuator control | ||||
traffic. | ||||
8.2. Mining Industry Today | ||||
Currently the mining industry uses a packet switched architecture | ||||
supported by high speed ethernet. However in order to achieve the | ||||
delay and packet loss requirements the network bandwidth is | ||||
overestimated, thus providing very low efficiency in terms of | ||||
resource usage. | ||||
QoS is implemented at the Routers to separate video, management, | ||||
monitoring and process control traffic for each stream. | ||||
Since mobility is involved in this process, the connection between | ||||
the backbone and the mobile devices (e.g. trucks, trains and | ||||
excavators) is solved using a wireless link. These links are based | ||||
on 802.11 for open-pit mining and leaky feeder for underground | ||||
mining. | ||||
Lately in pit mines the use of LPWAN technologies has been extended: | ||||
Tailings, slopes and mine dumps are monitored by battery-powered | ||||
dataloggers that make use of robust long range radio technologies. | ||||
Reliability is usually ensured through retransmissions at L2. | ||||
Gateways or concentrators act as bridges forwarding the data to the | ||||
backbone ethernet network. Deterministic requirements are biased | ||||
towards reliability rather than latency as events are slowly | ||||
triggered or can be anticipated in advance. | ||||
At the mineral processing stage, conveyor belts and refining | ||||
processes are controlled by a SCADA system, which provides the in- | ||||
factory delay-constrained networking requirements. | ||||
Voice communications are currently served by a redundant trunking | ||||
infrastructure, independent from current data networks. | ||||
8.3. Mining Industry Future | ||||
Mining operations and management are currently converging towards a | ||||
combination of autonomous operation and teleoperation of transport | ||||
and extraction machines. This means that video, audio, monitoring | ||||
and process control traffic will increase dramatically. Ideally, all | ||||
activities on the mine will rely on network infrastructure. | ||||
Wireless for open-pit mining is already a reality with LPWAN | ||||
technologies and it is expected to evolve to more advanced LPWAN | ||||
technologies such as those based on LTE to increase last hop | ||||
reliability or novel LPWAN flavours with deterministic access. | ||||
One area in which DetNet can improve this use case is in the wired | ||||
networks that make up the "backbone network" of the system, which | ||||
connect together many wireless access points (APs). The mobile | ||||
machines (which are connected to the network via wireless) transition | ||||
from one AP to the next as they move about. A deterministic, | ||||
reliable, low latency backbone can enable these transitions to be | ||||
more reliable. | ||||
Connections which extend all the way from the base stations to the | ||||
machinery via a mix of wired and wireless hops would also be | ||||
beneficial, for example to improve remote control responsiveness of | ||||
digging machines. However to guarantee deterministic performance of | ||||
a DetNet, the end-to-end underlying network must be deterministic. | ||||
Thus for this use case if a deterministic wireless transport is | ||||
integrated with a wire-based DetNet network, it could create the | ||||
desired wired plus wireless end-to-end deterministic network. | ||||
8.4. Mining Industry Asks | ||||
o Improved bandwidth efficiency | ||||
o Very low delay to enable machine teleoperation | ||||
o Dedicated bandwidth usage for high resolution video streams | ||||
o Predictable delay to enable realtime monitoring | ||||
o Potential to construct a unified DetNet network over a combination | ||||
of wired and deterministic wireless links | ||||
9. Private Blockchain | ||||
9.1. Use Case Description | ||||
Blockchain was created with bitcoin, as a 'public' blockchain on the | ||||
open Internet, however blockchain has also spread far beyond its | ||||
original host into various industries such as smart manufacturing, | ||||
logistics, security, legal rights and others. In these industries | ||||
blockchain runs in designated and carefully managed network in which | ||||
deterministic networking requirements could be addressed by Detnet. | ||||
Such implementations are referred to as 'private' blockchain. | ||||
The sole distinction between public and private blockchain is related | ||||
to who is allowed to participate in the network, execute the | ||||
consensus protocol and maintain the shared ledger. | ||||
Today's networks treat the traffic from blockchain on a best-effort | ||||
basis, but blockchain operation could be made much more efficient if | ||||
deterministic networking service were available to minimize latency | ||||
and packet loss in the network. | ||||
9.1.1. Blockchain Operation | ||||
A 'block' runs as a container of a batch of primary items such as | ||||
transactions, property records etc. The blocks are chained in such a | ||||
way that the hash of the previous block works as the pointer header | ||||
of the new block, where confirmation of each block requires a | ||||
consensus mechanism. When an item arrives at a blockchain node, the | ||||
latter broadcasts this item to the rest of nodes which receive and | ||||
verify it and put it in the ongoing block. Block confirmation | ||||
process begins as the amount of items reaches the predefined block | ||||
capacity, and the node broadcasts its proved block to the rest of | ||||
nodes to be verified and chained. | ||||
9.1.2. Blockchain Network Architecture | ||||
Blockchain node communication and coordination is achieved mainly | ||||
through frequent point to multi-point communication, however | ||||
persistent point-to-point connections are used to transport both the | ||||
items and the blocks to the other nodes. | ||||
When a node initiates, it first requests the other nodes' address | ||||
from a specific entity such as DNS, then it creates persistent | ||||
connections each of with other nodes. If node A confirms an item, it | ||||
sends the item to the other nodes via the persistent connections. | ||||
As a new block in a node completes and gets proved among the nodes, | ||||
it starts propagating this block towards its neighbor nodes. Assume | ||||
node A receives a block, it sends invite message after verification | ||||
to its neighbor B, B checks if the designated block is available, it | ||||
responds get message to A if it is unavailable, and A send the | ||||
complete block to B. B repeats the process as A to start the next | ||||
round of block propagation. | ||||
The challenge of blockchain network operation is not overall data | ||||
rates, since the volume from both block and item stays between | ||||
hundreds of bytes to a couple of mega bytes per second, but is in | ||||
transporting the blocks with minimum latency to maximize efficiency | ||||
of the blockchain consensus process. | ||||
9.1.3. Security Considerations | ||||
Security is crucial to blockchain applications, and todayt blockchain | ||||
addresses its security issues mainly at the application level, where | ||||
cryptography as well as hash-based consensus play a leading role | ||||
preventing both double-spending and malicious service attack. | ||||
However, there is concern that in the proposed use case of a private | ||||
blockchain network which is dependent on deterministic properties, | ||||
the network could be vulnerable to delays and other specific attacks | ||||
against determinism which could interrupt service. | ||||
9.2. Private Blockchain Today | ||||
Today private blockchain runs in L2 or L3 VPN, in general without | ||||
guaranteed determinism. The industry players are starting to realize | ||||
that improving determinism in their blockchain networks could improve | ||||
the performance of their service, but as of today these goals are not | ||||
being met. | ||||
9.3. Private Blockchain Future | ||||
Blockchain system performance can be greatly improved through | ||||
deterministic networking service primarily because it would | ||||
accelerate the consensus process. It would be valuable to be able to | ||||
design a private blockchain network with the following properties: | ||||
o Transport of point to multi-point traffic in a coordinated network | ||||
architecture rather than at the application layer (which typically | ||||
uses point-to-point connections) | ||||
o Guaranteed transport latency | ||||
o Reduced packet loss (to the point where packet retransmission- | ||||
incurred delay would be negligible.) | ||||
9.4. Private Blockchain Asks | ||||
o Layer 2 and Layer 3 multicast of blockchain traffic | ||||
o Item and block delivery with bounded, low latency and negligible | ||||
packet loss | ||||
o Coexistence in a single network of blockchain and IT traffic. | ||||
o Ability to scale the network by distributing the centralized | ||||
control of the network across multiple control entities. | ||||
10. Network Slicing | ||||
10.1. Use Case Description | ||||
Network slicing divides one physical network infrastructure into | ||||
multiple logical networks. Each slice, corresponding to a logical | ||||
network, uses resources and network functions independently from each | ||||
other. Network slicing provides flexibility of resource allocation | ||||
and service quality customization. | ||||
Future services will demand network performance with a wide variety | ||||
of characteristics such as high data rate, low latency, low loss | ||||
rate, security and many other parameters. Ideally every service | ||||
would have its own physical network satisfying its particular | ||||
performance requirements, however that would be prohibitively | ||||
expensive. Network slicing can provide a customized slice for a | ||||
single service, and multiple slices can share the same physical | ||||
network. This method can optimize the performance for the service at | ||||
lower cost, and the flexibility of setting up and release the slices | ||||
also allows the user to allocate the network resources dynamically. | ||||
Unlike other DetNet use cases, Network slicing is not a specific | ||||
application with specific deterministic requirements; it is proposed | ||||
as a new requirement for the future network, which is still in | ||||
discussion, and DetNet is a candidate solution for it. | ||||
10.2. Network Slicing Use Cases | ||||
Network Slicing is a core feature of 5G defined in 3GPP, which is | ||||
currently under development. A Network Slice in mobile network is a | ||||
complete logical network including Radio Access Network (RAN) and | ||||
Core Network (CN). It provides telecommunication services and | ||||
network capabilities, which may vary (or not) from slice to slice. | ||||
A 5G bearer network is a typical use case of network slicing, | ||||
including 3 service scenarios: enhanced Mobile Broadband (eMBB), | ||||
Ultra-Reliable and Low Latency Communications (URLLC), and massive | ||||
Machine Type Communications (mMTC). Each of these are described | ||||
below. | ||||
10.2.1. Enhanced Mobile Broadband (eMBB) | ||||
eMBB focuses on services characterized by high data rates, such as | ||||
high definition (HD) videos, virtual reality (VR), augmented reality | ||||
(AR), and fixed mobile convergence (FMC). | ||||
10.2.2. Ultra-Reliable and Low Latency Communications (URLLC) | ||||
URLLC focuses on latency-sensitive services, such as self-driving | ||||
vehicles, remote surgery, or drone control. | ||||
10.2.3. massive Machine Type Communications (mMTC) | ||||
mMTC focuses on services that have high requirements for connection | ||||
density, such as those typical for smart city and smart agriculture | ||||
use cases. | ||||
10.3. Using DetNet in Network Slicing | ||||
One of the requirements discussed for network slicing is the "hard" | ||||
separation of various users' deterministic performance. That is, it | ||||
should be impossible for activity, lack of activity, or changes in | ||||
activity of one or more users to have any appreciable effect on the | ||||
deterministic performance parameters of any other users. Typical | ||||
techniques used today, which share a physical network among users, do | ||||
not offer this kind of insulation. DetNet can supply point-to-point | ||||
or point-to-multipoint paths that offer bandwidth and latency | ||||
guarantees to a user that cannot be affected by other users' data | ||||
traffic. | ||||
Thus DetNet is a powerful tool when latency and reliability are | ||||
required in Network Slicing. However, DetNet cannot cover every | ||||
Network Slicing use case, and there are some other problems to be | ||||
solved. Firstly, DetNet is a point-to-point or point-to-multipoint | ||||
technology while Network Slicing needs multi-point to multi-point | ||||
guarantee. Second, the number of flows that can be carried by DetNet | ||||
is limited by DetNet scalability. Flow aggregation and queuing | ||||
management modification may help to fix the problem. More work and | ||||
discussions are needed in these topics. | ||||
10.4. Network Slicing Today and Future | ||||
Network slicing can satisfy the requirements of a lot of future | ||||
deployment scenario, but it is still a collection of ideas and | ||||
analysis, without a specific technical solution. A lot of | ||||
technologies, such as Flex-E, Segment Routing, and DetNet have | ||||
potential to be used in Network Slicing. For more details please see | ||||
IETF99 Network Slicing BOF session agenda and materials. | ||||
10.5. Network Slicing Asks | ||||
o Isolation from other flows through Queuing Management | ||||
o Service Quality Customization and Guarantee | ||||
o Security | ||||
11. Use Case Common Themes | ||||
This section summarizes the expected properties of a DetNet network, | This section summarizes the expected properties of a DetNet network, | |||
based on the use cases as described in this draft. | based on the use cases as described in this draft. | |||
8.1. Unified, standards-based network | 11.1. Unified, standards-based network | |||
8.1.1. Extensions to Ethernet | 11.1.1. Extensions to Ethernet | |||
A DetNet network is not "a new kind of network" - it based on | A DetNet network is not "a new kind of network" - it based on | |||
extensions to existing Ethernet standards, including elements of IEEE | extensions to existing Ethernet standards, including elements of IEEE | |||
802.1 AVB/TSN and related standards. Presumably it will be possible | 802.1 AVB/TSN and related standards. Presumably it will be possible | |||
to run DetNet over other underlying transports besides Ethernet, but | to run DetNet over other underlying transports besides Ethernet, but | |||
Ethernet is explicitly supported. | Ethernet is explicitly supported. | |||
8.1.2. Centrally Administered | 11.1.2. Centrally Administered | |||
In general a DetNet network is not expected to be "plug and play" - | In general a DetNet network is not expected to be "plug and play" - | |||
it is expected that there is some centralized network configuration | it is expected that there is some centralized network configuration | |||
and control system. Such a system may be in a single central | and control system. Such a system may be in a single central | |||
location, or it maybe distributed across multiple control entities | location, or it maybe distributed across multiple control entities | |||
that function together as a unified control system for the network. | that function together as a unified control system for the network. | |||
However, the ability to "hot swap" components (e.g. due to | However, the ability to "hot swap" components (e.g. due to | |||
malfunction) is similar enough to "plug and play" that this kind of | malfunction) is similar enough to "plug and play" that this kind of | |||
behavior may be expected in DetNet networks, depending on the | behavior may be expected in DetNet networks, depending on the | |||
implementation. | implementation. | |||
8.1.3. Standardized Data Flow Information Models | 11.1.3. Standardized Data Flow Information Models | |||
Data Flow Information Models to be used with DetNet networks are to | Data Flow Information Models to be used with DetNet networks are to | |||
be specified by DetNet. | be specified by DetNet. | |||
8.1.4. L2 and L3 Integration | 11.1.4. L2 and L3 Integration | |||
A DetNet network is intended to integrate between Layer 2 (bridged) | A DetNet network is intended to integrate between Layer 2 (bridged) | |||
network(s) (e.g. AVB/TSN LAN) and Layer 3 (routed) network(s) (e.g. | network(s) (e.g. AVB/TSN LAN) and Layer 3 (routed) network(s) (e.g. | |||
using IP-based protocols). One example of this is "making AVB/TSN- | using IP-based protocols). One example of this is "making AVB/TSN- | |||
type deterministic performance available from Layer 3 applications, | type deterministic performance available from Layer 3 applications, | |||
e.g. using RTP". Another example is "connecting two AVB/TSN LANs | e.g. using RTP". Another example is "connecting two AVB/TSN LANs | |||
("islands") together through a standard router". | ("islands") together through a standard router". | |||
8.1.5. Guaranteed End-to-End Delivery | 11.1.5. Guaranteed End-to-End Delivery | |||
Packets sent over DetNet are guaranteed not to be dropped by the | Packets sent over DetNet are guaranteed not to be dropped by the | |||
network due to congestion. (Packets may however be dropped for | network due to congestion. (Packets may however be dropped for | |||
intended reasons, e.g. per security measures). | intended reasons, e.g. per security measures). | |||
8.1.6. Replacement for Multiple Proprietary Deterministic Networks | 11.1.6. Replacement for Multiple Proprietary Deterministic Networks | |||
There are many proprietary non-interoperable deterministic Ethernet- | There are many proprietary non-interoperable deterministic Ethernet- | |||
based networks currently available; DetNet is intended to provide an | based networks currently available; DetNet is intended to provide an | |||
open-standards-based alternative to such networks. | open-standards-based alternative to such networks. | |||
8.1.7. Mix of Deterministic and Best-Effort Traffic | 11.1.7. Mix of Deterministic and Best-Effort Traffic | |||
DetNet is intended to support coexistance of time-sensitive | DetNet is intended to support coexistance of time-sensitive | |||
operational (OT) traffic and information (IT) traffic on the same | operational (OT) traffic and information (IT) traffic on the same | |||
("unified") network. | ("unified") network. | |||
8.1.8. Unused Reserved BW to be Available to Best Effort Traffic | 11.1.8. Unused Reserved BW to be Available to Best Effort Traffic | |||
If bandwidth reservations are made for a stream but the associated | If bandwidth reservations are made for a stream but the associated | |||
bandwidth is not used at any point in time, that bandwidth is made | bandwidth is not used at any point in time, that bandwidth is made | |||
available on the network for best-effort traffic. If the owner of | available on the network for best-effort traffic. If the owner of | |||
the reserved stream then starts transmitting again, the bandwidth is | the reserved stream then starts transmitting again, the bandwidth is | |||
no longer available for best-effort traffic, on a moment-to-moment | no longer available for best-effort traffic, on a moment-to-moment | |||
basis. Note that such "temporarily available" bandwidth is not | basis. Note that such "temporarily available" bandwidth is not | |||
available for time-sensitive traffic, which must have its own | available for time-sensitive traffic, which must have its own | |||
reservation. | reservation. | |||
8.1.9. Lower Cost, Multi-Vendor Solutions | 11.1.9. Lower Cost, Multi-Vendor Solutions | |||
The DetNet network specifications are intended to enable an ecosystem | The DetNet network specifications are intended to enable an ecosystem | |||
in which multiple vendors can create interoperable products, thus | in which multiple vendors can create interoperable products, thus | |||
promoting device diversity and potentially higher numbers of each | promoting device diversity and potentially higher numbers of each | |||
device manufactured, promoting cost reduction and cost competition | device manufactured, promoting cost reduction and cost competition | |||
among vendors. The intent is that DetNet networks should be able to | among vendors. The intent is that DetNet networks should be able to | |||
be created at lower cost and with greater diversity of available | be created at lower cost and with greater diversity of available | |||
devices than existing proprietary networks. | devices than existing proprietary networks. | |||
8.2. Scalable Size | 11.2. Scalable Size | |||
DetNet networks range in size from very small, e.g. inside a single | DetNet networks range in size from very small, e.g. inside a single | |||
industrial machine, to very large, for example a Utility Grid network | industrial machine, to very large, for example a Utility Grid network | |||
spanning a whole country, and involving many "hops" over various | spanning a whole country, and involving many "hops" over various | |||
kinds of links for example radio repeaters, microwave linkes, fiber | kinds of links for example radio repeaters, microwave linkes, fiber | |||
optic links, etc.. However recall that the scope of DetNet is | optic links, etc.. However recall that the scope of DetNet is | |||
confined to networks that are centrally administered, and explicitly | confined to networks that are centrally administered, and explicitly | |||
excludes unbounded decentralized networks such as the Internet. | excludes unbounded decentralized networks such as the Internet. | |||
8.3. Scalable Timing Parameters and Accuracy | 11.3. Scalable Timing Parameters and Accuracy | |||
8.3.1. Bounded Latency | 11.3.1. Bounded Latency | |||
The DetNet Data Flow Information Model is expected to provide means | The DetNet Data Flow Information Model is expected to provide means | |||
to configure the network that include parameters for querying network | to configure the network that include parameters for querying network | |||
path latency, requesting bounded latency for a given stream, | path latency, requesting bounded latency for a given stream, | |||
requesting worst case maximum and/or minimum latency for a given path | requesting worst case maximum and/or minimum latency for a given path | |||
or stream, and so on. It is an expected case that the network may | or stream, and so on. It is an expected case that the network may | |||
not be able to provide a given requested service level, and if so the | not be able to provide a given requested service level, and if so the | |||
network control system should reply that the requested services is | network control system should reply that the requested services is | |||
not available (as opposed to accepting the parameter but then not | not available (as opposed to accepting the parameter but then not | |||
delivering the desired behavior). | delivering the desired behavior). | |||
8.3.2. Low Latency | 11.3.2. Low Latency | |||
Applications may require "extremely low latency" however depending on | Applications may require "extremely low latency" however depending on | |||
the application these may mean very different latency values; for | the application these may mean very different latency values; for | |||
example "low latency" across a Utility grid network is on a different | example "low latency" across a Utility grid network is on a different | |||
time scale than "low latency" in a motor control loop in a small | time scale than "low latency" in a motor control loop in a small | |||
machine. The intent is that the mechanisms for specifying desired | machine. The intent is that the mechanisms for specifying desired | |||
latency include wide ranges, and that architecturally there is | latency include wide ranges, and that architecturally there is | |||
nothing to prevent arbirtrarily low latencies from being implemented | nothing to prevent arbirtrarily low latencies from being implemented | |||
in a given network. | in a given network. | |||
8.3.3. Symmetrical Path Delays | 11.3.3. Symmetrical Path Delays | |||
Some applications would like to specify that the transit delay time | Some applications would like to specify that the transit delay time | |||
values be equal for both the transmit and return paths. | values be equal for both the transmit and return paths. | |||
8.4. High Reliability and Availability | 11.4. High Reliability and Availability | |||
Reliablity is of critical importance to many DetNet applications, in | Reliablity is of critical importance to many DetNet applications, in | |||
which consequences of failure can be extraordinarily high in terms of | which consequences of failure can be extraordinarily high in terms of | |||
cost and even human life. DetNet based systems are expected to be | cost and even human life. DetNet based systems are expected to be | |||
implemented with essentially arbitrarily high availability (for | implemented with essentially arbitrarily high availability (for | |||
example 99.9999% up time, or even 12 nines). The intent is that the | example 99.9999% up time, or even 12 nines). The intent is that the | |||
DetNet designs should not make any assumptions about the level of | DetNet designs should not make any assumptions about the level of | |||
reliability and availability that may be required of a given system, | reliability and availability that may be required of a given system, | |||
and should define parameters for communicating these kinds of metrics | and should define parameters for communicating these kinds of metrics | |||
within the network. | within the network. | |||
A strategy used by DetNet for providing such extraordinarily high | A strategy used by DetNet for providing such extraordinarily high | |||
levels of reliability is to provide redundant paths that can be | levels of reliability is to provide redundant paths that can be | |||
seamlessly switched between, while maintaining the required | seamlessly switched between, while maintaining the required | |||
performance of that system. | performance of that system. | |||
8.5. Security | 11.5. Security | |||
Security is of critical importance to many DetNet applications. A | Security is of critical importance to many DetNet applications. A | |||
DetNet network must be able to be made secure against devices | DetNet network must be able to be made secure against devices | |||
failures, attackers, misbehaving devices, and so on. In a DetNet | failures, attackers, misbehaving devices, and so on. In a DetNet | |||
network the data traffic is expected to be be time-sensitive, thus in | network the data traffic is expected to be be time-sensitive, thus in | |||
addition to arriving with the data content as intended, the data must | addition to arriving with the data content as intended, the data must | |||
also arrive at the expected time. This may present "new" security | also arrive at the expected time. This may present "new" security | |||
challenges to implementers, and must be addressed accordingly. There | challenges to implementers, and must be addressed accordingly. There | |||
are other security implications, including (but not limited to) the | are other security implications, including (but not limited to) the | |||
change in attack surface presented by packet replication and | change in attack surface presented by packet replication and | |||
elimination. | elimination. | |||
8.6. Deterministic Flows | 11.6. Deterministic Flows | |||
Reserved bandwidth data flows must be isolated from each other and | Reserved bandwidth data flows must be isolated from each other and | |||
from best-effort traffic, so that even if the network is saturated | from best-effort traffic, so that even if the network is saturated | |||
with best-effort (and/or reserved bandwidth) traffic, the configured | with best-effort (and/or reserved bandwidth) traffic, the configured | |||
flows are not adversely affected. | flows are not adversely affected. | |||
9. Use Cases Explicitly Out of Scope for DetNet | 12. Use Cases Explicitly Out of Scope for DetNet | |||
This section contains use case text that has been determined to be | This section contains use case text that has been determined to be | |||
outside of the scope of the present DetNet work. | outside of the scope of the present DetNet work. | |||
9.1. DetNet Scope Limitations | 12.1. DetNet Scope Limitations | |||
The scope of DetNet is deliberately limited to specific use cases | The scope of DetNet is deliberately limited to specific use cases | |||
that are consistent with the WG charter, subject to the | that are consistent with the WG charter, subject to the | |||
interpretation of the WG. At the time the DetNet Use Cases were | interpretation of the WG. At the time the DetNet Use Cases were | |||
solicited and provided by the authors the scope of DetNet was not | solicited and provided by the authors the scope of DetNet was not | |||
clearly defined, and as that clarity has emerged, certain of the use | clearly defined, and as that clarity has emerged, certain of the use | |||
cases have been determined to be outside the scope of the present | cases have been determined to be outside the scope of the present | |||
DetNet work. Such text has been moved into this section to clarify | DetNet work. Such text has been moved into this section to clarify | |||
that these use cases will not be supported by the DetNet work. | that these use cases will not be supported by the DetNet work. | |||
skipping to change at page 65, line 5 ¶ | skipping to change at page 73, line 42 ¶ | |||
Precision Time Protocol ([IEEE1588]). A use case may state the | Precision Time Protocol ([IEEE1588]). A use case may state the | |||
accuracy and reliability that it expects from the DetNet network | accuracy and reliability that it expects from the DetNet network | |||
as part of a whole system, however it is understood that such | as part of a whole system, however it is understood that such | |||
timing properties are not guaranteed by DetNet itself. It is | timing properties are not guaranteed by DetNet itself. It is | |||
currently an open question as to whether DetNet protocols will | currently an open question as to whether DetNet protocols will | |||
include a way for an application to communicate such timing | include a way for an application to communicate such timing | |||
expectations to the network, and if so whether they would be | expectations to the network, and if so whether they would be | |||
expected to materially affect the performance they would receive | expected to materially affect the performance they would receive | |||
from the network as a result. | from the network as a result. | |||
9.2. Internet-based Applications | 12.2. Internet-based Applications | |||
9.2.1. Use Case Description | 12.2.1. Use Case Description | |||
There are many applications that communicate across the open Internet | There are many applications that communicate across the open Internet | |||
that could benefit from guaranteed delivery and bounded latency. The | that could benefit from guaranteed delivery and bounded latency. The | |||
following are some representative examples. | following are some representative examples. | |||
9.2.1.1. Media Content Delivery | 12.2.1.1. Media Content Delivery | |||
Media content delivery continues to be an important use of the | Media content delivery continues to be an important use of the | |||
Internet, yet users often experience poor quality audio and video due | Internet, yet users often experience poor quality audio and video due | |||
to the delay and jitter inherent in today's Internet. | to the delay and jitter inherent in today's Internet. | |||
9.2.1.2. Online Gaming | 12.2.1.2. Online Gaming | |||
Online gaming is a significant part of the gaming market, however | Online gaming is a significant part of the gaming market, however | |||
latency can degrade the end user experience. For example "First | latency can degrade the end user experience. For example "First | |||
Person Shooter" (FPS) games are highly delay-sensitive. | Person Shooter" (FPS) games are highly delay-sensitive. | |||
9.2.1.3. Virtual Reality | 12.2.1.3. Virtual Reality | |||
Virtual reality (VR) has many commercial applications including real | Virtual reality (VR) has many commercial applications including real | |||
estate presentations, remote medical procedures, and so on. Low | estate presentations, remote medical procedures, and so on. Low | |||
latency is critical to interacting with the virtual world because | latency is critical to interacting with the virtual world because | |||
perceptual delays can cause motion sickness. | perceptual delays can cause motion sickness. | |||
9.2.2. Internet-Based Applications Today | 12.2.2. Internet-Based Applications Today | |||
Internet service today is by definition "best effort", with no | Internet service today is by definition "best effort", with no | |||
guarantees on delivery or bandwidth. | guarantees on delivery or bandwidth. | |||
9.2.3. Internet-Based Applications Future | 12.2.3. Internet-Based Applications Future | |||
We imagine an Internet from which we will be able to play a video | We imagine an Internet from which we will be able to play a video | |||
without glitches and play games without lag. | without glitches and play games without lag. | |||
For online gaming, the maximum round-trip delay can be 100ms and | For online gaming, the maximum round-trip delay can be 100ms and | |||
stricter for FPS gaming which can be 10-50ms. Transport delay is the | stricter for FPS gaming which can be 10-50ms. Transport delay is the | |||
dominate part with a 5-20ms budget. | dominate part with a 5-20ms budget. | |||
For VR, 1-10ms maximum delay is needed and total network budget is | For VR, 1-10ms maximum delay is needed and total network budget is | |||
1-5ms if doing remote VR. | 1-5ms if doing remote VR. | |||
Flow identification can be used for gaming and VR, i.e. it can | Flow identification can be used for gaming and VR, i.e. it can | |||
recognize a critical flow and provide appropriate latency bounds. | recognize a critical flow and provide appropriate latency bounds. | |||
9.2.4. Internet-Based Applications Asks | 12.2.4. Internet-Based Applications Asks | |||
o Unified control and management protocols to handle time-critical | o Unified control and management protocols to handle time-critical | |||
data flow | data flow | |||
o Application-aware flow filtering mechanism to recognize the timing | o Application-aware flow filtering mechanism to recognize the timing | |||
critical flow without doing 5-tuple matching | critical flow without doing 5-tuple matching | |||
o Unified control plane to provide low latency service on Layer-3 | o Unified control plane to provide low latency service on Layer-3 | |||
without changing the data plane | without changing the data plane | |||
o OAM system and protocols which can help to provide E2E-delay | o OAM system and protocols which can help to provide E2E-delay | |||
sensitive service provisioning | sensitive service provisioning | |||
9.3. Pro Audio and Video - Digital Rights Management (DRM) | 12.3. Pro Audio and Video - Digital Rights Management (DRM) | |||
This section was moved here because this is considered a Link layer | This section was moved here because this is considered a Link layer | |||
topic, not direct responsibility of DetNet. | topic, not direct responsibility of DetNet. | |||
Digital Rights Management (DRM) is very important to the audio and | Digital Rights Management (DRM) is very important to the audio and | |||
video industries. Any time protected content is introduced into a | video industries. Any time protected content is introduced into a | |||
network there are DRM concerns that must be maintained (see | network there are DRM concerns that must be maintained (see | |||
[CONTENT_PROTECTION]). Many aspects of DRM are outside the scope of | [CONTENT_PROTECTION]). Many aspects of DRM are outside the scope of | |||
network technology, however there are cases when a secure link | network technology, however there are cases when a secure link | |||
supporting authentication and encryption is required by content | supporting authentication and encryption is required by content | |||
skipping to change at page 66, line 41 ¶ | skipping to change at page 75, line 33 ¶ | |||
own secure environment (for example see [DCI]). | own secure environment (for example see [DCI]). | |||
As an example, two techniques are Digital Transmission Content | As an example, two techniques are Digital Transmission Content | |||
Protection (DTCP) and High-Bandwidth Digital Content Protection | Protection (DTCP) and High-Bandwidth Digital Content Protection | |||
(HDCP). HDCP content is not approved for retransmission within any | (HDCP). HDCP content is not approved for retransmission within any | |||
other type of DRM, while DTCP may be retransmitted under HDCP. | other type of DRM, while DTCP may be retransmitted under HDCP. | |||
Therefore if the source of a stream is outside of the network and it | Therefore if the source of a stream is outside of the network and it | |||
uses HDCP protection it is only allowed to be placed on the network | uses HDCP protection it is only allowed to be placed on the network | |||
with that same HDCP protection. | with that same HDCP protection. | |||
9.4. Pro Audio and Video - Link Aggregation | 12.4. Pro Audio and Video - Link Aggregation | |||
Note: The term "Link Aggregation" is used here as defined by the text | Note: The term "Link Aggregation" is used here as defined by the text | |||
in the following paragraph, i.e. not following a more common Network | in the following paragraph, i.e. not following a more common Network | |||
Industry definition. Current WG consensus is that this item won't be | Industry definition. Current WG consensus is that this item won't be | |||
directly supported by the DetNet architecture, for example because it | directly supported by the DetNet architecture, for example because it | |||
implies guarantee of in-order delivery of packets which conflicts | implies guarantee of in-order delivery of packets which conflicts | |||
with the core goal of achieving the lowest possible latency. | with the core goal of achieving the lowest possible latency. | |||
For transmitting streams that require more bandwidth than a single | For transmitting streams that require more bandwidth than a single | |||
link in the target network can support, link aggregation is a | link in the target network can support, link aggregation is a | |||
technique for combining (aggregating) the bandwidth available on | technique for combining (aggregating) the bandwidth available on | |||
multiple physical links to create a single logical link of the | multiple physical links to create a single logical link of the | |||
required bandwidth. However, if aggregation is to be used, the | required bandwidth. However, if aggregation is to be used, the | |||
network controller (or equivalent) must be able to determine the | network controller (or equivalent) must be able to determine the | |||
maximum latency of any path through the aggregate link. | maximum latency of any path through the aggregate link. | |||
10. Acknowledgments | 13. Acknowledgments | |||
10.1. Pro Audio | 13.1. Pro Audio | |||
This section was derived from draft-gunther-detnet-proaudio-req-01. | This section was derived from draft-gunther-detnet-proaudio-req-01. | |||
The editors would like to acknowledge the help of the following | The editors would like to acknowledge the help of the following | |||
individuals and the companies they represent: | individuals and the companies they represent: | |||
Jeff Koftinoff, Meyer Sound | Jeff Koftinoff, Meyer Sound | |||
Jouni Korhonen, Associate Technical Director, Broadcom | Jouni Korhonen, Associate Technical Director, Broadcom | |||
Pascal Thubert, CTAO, Cisco | Pascal Thubert, CTAO, Cisco | |||
Kieran Tyrrell, Sienda New Media Technologies GmbH | Kieran Tyrrell, Sienda New Media Technologies GmbH | |||
10.2. Utility Telecom | 13.2. Utility Telecom | |||
This section was derived from draft-wetterwald-detnet-utilities-reqs- | This section was derived from draft-wetterwald-detnet-utilities-reqs- | |||
02. | 02. | |||
Faramarz Maghsoodlou, Ph. D. IoT Connected Industries and Energy | Faramarz Maghsoodlou, Ph. D. IoT Connected Industries and Energy | |||
Practice Cisco | Practice Cisco | |||
Pascal Thubert, CTAO Cisco | Pascal Thubert, CTAO Cisco | |||
10.3. Building Automation Systems | 13.3. Building Automation Systems | |||
This section was derived from draft-bas-usecase-detnet-00. | This section was derived from draft-bas-usecase-detnet-00. | |||
10.4. Wireless for Industrial | 13.4. Wireless for Industrial | |||
This section was derived from draft-thubert-6tisch-4detnet-01. | This section was derived from draft-thubert-6tisch-4detnet-01. | |||
This specification derives from the 6TiSCH architecture, which is the | This specification derives from the 6TiSCH architecture, which is the | |||
result of multiple interactions, in particular during the 6TiSCH | result of multiple interactions, in particular during the 6TiSCH | |||
(bi)Weekly Interim call, relayed through the 6TiSCH mailing list at | (bi)Weekly Interim call, relayed through the 6TiSCH mailing list at | |||
the IETF. | the IETF. | |||
The authors wish to thank: Kris Pister, Thomas Watteyne, Xavier | The authors wish to thank: Kris Pister, Thomas Watteyne, Xavier | |||
Vilajosana, Qin Wang, Tom Phinney, Robert Assimiti, Michael | Vilajosana, Qin Wang, Tom Phinney, Robert Assimiti, Michael | |||
Richardson, Zhuo Chen, Malisa Vucinic, Alfredo Grieco, Martin Turon, | Richardson, Zhuo Chen, Malisa Vucinic, Alfredo Grieco, Martin Turon, | |||
Dominique Barthel, Elvis Vogli, Guillaume Gaillard, Herman Storey, | Dominique Barthel, Elvis Vogli, Guillaume Gaillard, Herman Storey, | |||
Maria Rita Palattella, Nicola Accettura, Patrick Wetterwald, Pouria | Maria Rita Palattella, Nicola Accettura, Patrick Wetterwald, Pouria | |||
Zand, Raghuram Sudhaakar, and Shitanshu Shah for their participation | Zand, Raghuram Sudhaakar, and Shitanshu Shah for their participation | |||
and various contributions. | and various contributions. | |||
10.5. Cellular Radio | 13.5. Cellular Radio | |||
This section was derived from draft-korhonen-detnet-telreq-00. | This section was derived from draft-korhonen-detnet-telreq-00. | |||
10.6. Industrial M2M | 13.6. Industrial M2M | |||
The authors would like to thank Feng Chen and Marcel Kiessling for | The authors would like to thank Feng Chen and Marcel Kiessling for | |||
their comments and suggestions. | their comments and suggestions. | |||
10.7. Internet Applications and CoMP | 13.7. Internet Applications and CoMP | |||
This section was derived from draft-zha-detnet-use-case-00. | This section was derived from draft-zha-detnet-use-case-00. | |||
This document has benefited from reviews, suggestions, comments and | This document has benefited from reviews, suggestions, comments and | |||
proposed text provided by the following members, listed in | proposed text provided by the following members, listed in | |||
alphabetical order: Jing Huang, Junru Lin, Lehong Niu and Oilver | alphabetical order: Jing Huang, Junru Lin, Lehong Niu and Oilver | |||
Huang. | Huang. | |||
10.8. Electrical Utilities | 13.8. Electrical Utilities | |||
The wind power generation use case has been extracted from the study | The wind power generation use case has been extracted from the study | |||
of Wind Farms conducted within the 5GPPP Virtuwind Project. The | of Wind Farms conducted within the 5GPPP Virtuwind Project. The | |||
project is funded by the European Union's Horizon 2020 research and | project is funded by the European Union's Horizon 2020 research and | |||
innovation programme under grant agreement No 671648 (VirtuWind). | innovation programme under grant agreement No 671648 (VirtuWind). | |||
11. Informative References | 13.9. Network Slicing | |||
This section was written by Xuesong Geng, who would like to | ||||
acknowledge Norm Finn and Mach Chen for their useful comments. | ||||
13.10. Mining | ||||
This section was written by Diego Dujovne in conjunction with Xavier | ||||
Vilasojana. | ||||
13.11. Private Blockchain | ||||
This section was written by Daniel Huang. | ||||
14. Informative References | ||||
[ACE] IETF, "Authentication and Authorization for Constrained | [ACE] IETF, "Authentication and Authorization for Constrained | |||
Environments", <https://datatracker.ietf.org/doc/charter- | Environments", | |||
ietf-ace/>. | <https://datatracker.ietf.org/doc/charter-ietf-ace/>. | |||
[Ahm14] Ahmed, M. and R. Kim, "Communication network architectures | [Ahm14] Ahmed, M. and R. Kim, "Communication network architectures | |||
for smart-wind power farms.", Energies, p. 3900-3921. , | for smart-wind power farms.", Energies, p. 3900-3921. , | |||
June 2014. | June 2014. | |||
[bacnetip] | [bacnetip] | |||
ASHRAE, "Annex J to ANSI/ASHRAE 135-1995 - BACnet/IP", | ASHRAE, "Annex J to ANSI/ASHRAE 135-1995 - BACnet/IP", | |||
January 1999. | January 1999. | |||
[CCAMP] IETF, "Common Control and Measurement Plane", | [CCAMP] IETF, "Common Control and Measurement Plane", | |||
skipping to change at page 70, line 22 ¶ | skipping to change at page 79, line 32 ¶ | |||
Statement", draft-finn-detnet-problem-statement-05 (work | Statement", draft-finn-detnet-problem-statement-05 (work | |||
in progress), March 2016. | in progress), March 2016. | |||
[I-D.ietf-6tisch-6top-interface] | [I-D.ietf-6tisch-6top-interface] | |||
Wang, Q. and X. Vilajosana, "6TiSCH Operation Sublayer | Wang, Q. and X. Vilajosana, "6TiSCH Operation Sublayer | |||
(6top) Interface", draft-ietf-6tisch-6top-interface-04 | (6top) Interface", draft-ietf-6tisch-6top-interface-04 | |||
(work in progress), July 2015. | (work in progress), July 2015. | |||
[I-D.ietf-6tisch-architecture] | [I-D.ietf-6tisch-architecture] | |||
Thubert, P., "An Architecture for IPv6 over the TSCH mode | Thubert, P., "An Architecture for IPv6 over the TSCH mode | |||
of IEEE 802.15.4", draft-ietf-6tisch-architecture-11 (work | of IEEE 802.15.4", draft-ietf-6tisch-architecture-12 (work | |||
in progress), January 2017. | in progress), August 2017. | |||
[I-D.ietf-6tisch-coap] | [I-D.ietf-6tisch-coap] | |||
Sudhaakar, R. and P. Zand, "6TiSCH Resource Management and | Sudhaakar, R. and P. Zand, "6TiSCH Resource Management and | |||
Interaction using CoAP", draft-ietf-6tisch-coap-03 (work | Interaction using CoAP", draft-ietf-6tisch-coap-03 (work | |||
in progress), March 2015. | in progress), March 2015. | |||
[I-D.ietf-6tisch-terminology] | [I-D.ietf-6tisch-terminology] | |||
Palattella, M., Thubert, P., Watteyne, T., and Q. Wang, | Palattella, M., Thubert, P., Watteyne, T., and Q. Wang, | |||
"Terminology in IPv6 over the TSCH mode of IEEE | "Terminology in IPv6 over the TSCH mode of IEEE | |||
802.15.4e", draft-ietf-6tisch-terminology-08 (work in | 802.15.4e", draft-ietf-6tisch-terminology-09 (work in | |||
progress), December 2016. | progress), June 2017. | |||
[I-D.ietf-ipv6-multilink-subnets] | [I-D.ietf-ipv6-multilink-subnets] | |||
Thaler, D. and C. Huitema, "Multi-link Subnet Support in | Thaler, D. and C. Huitema, "Multi-link Subnet Support in | |||
IPv6", draft-ietf-ipv6-multilink-subnets-00 (work in | IPv6", draft-ietf-ipv6-multilink-subnets-00 (work in | |||
progress), July 2002. | progress), July 2002. | |||
[I-D.ietf-mpls-residence-time] | [I-D.ietf-mpls-residence-time] | |||
Mirsky, G., Ruffini, S., Gray, E., Drake, J., Bryant, S., | Mirsky, G., Ruffini, S., Gray, E., Drake, J., Bryant, S., | |||
and S. Vainshtein, "Residence Time Measurement in MPLS | and S. Vainshtein, "Residence Time Measurement in MPLS | |||
network", draft-ietf-mpls-residence-time-15 (work in | network", draft-ietf-mpls-residence-time-15 (work in | |||
skipping to change at page 74, line 31 ¶ | skipping to change at page 83, line 42 ¶ | |||
[net5G] Ericsson, "5G Radio Access, Challenges for 2020 and | [net5G] Ericsson, "5G Radio Access, Challenges for 2020 and | |||
Beyond", Ericsson white paper wp-5g, June 2013, | Beyond", Ericsson white paper wp-5g, June 2013, | |||
<http://www.ericsson.com/res/docs/whitepapers/wp-5g.pdf>. | <http://www.ericsson.com/res/docs/whitepapers/wp-5g.pdf>. | |||
[NGMN] NGMN Alliance, "5G White Paper", NGMN 5G White Paper v1.0, | [NGMN] NGMN Alliance, "5G White Paper", NGMN 5G White Paper v1.0, | |||
February 2015, <https://www.ngmn.org/uploads/media/ | February 2015, <https://www.ngmn.org/uploads/media/ | |||
NGMN_5G_White_Paper_V1_0.pdf>. | NGMN_5G_White_Paper_V1_0.pdf>. | |||
[NGMN-fronth] | [NGMN-fronth] | |||
NGMN Alliance, "Fronthaul Requirements for C-RAN", March | NGMN Alliance, "Fronthaul Requirements for C-RAN", March | |||
2015, <https://www.ngmn.org/uploads/media/NGMN_RANEV_D1_C- | 2015, <https://www.ngmn.org/uploads/media/ | |||
RAN_Fronthaul_Requirements_v1.0.pdf>. | NGMN_RANEV_D1_C-RAN_Fronthaul_Requirements_v1.0.pdf>. | |||
[OPCXML] OPC Foundation, "OPC XML-Data Access Specification", Dec | [OPCXML] OPC Foundation, "OPC XML-Data Access Specification", Dec | |||
2004. | 2004. | |||
[PCE] IETF, "Path Computation Element", | [PCE] IETF, "Path Computation Element", | |||
<https://datatracker.ietf.org/doc/charter-ietf-pce/>. | <https://datatracker.ietf.org/doc/charter-ietf-pce/>. | |||
[profibus] | [profibus] | |||
IEC, "IEC 61158 Type 3 - Profibus DP", January 2001. | IEC, "IEC 61158 Type 3 - Profibus DP", January 2001. | |||
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | |||
Requirement Levels", BCP 14, RFC 2119, | Requirement Levels", BCP 14, RFC 2119, | |||
DOI 10.17487/RFC2119, March 1997, | DOI 10.17487/RFC2119, March 1997, | |||
<http://www.rfc-editor.org/info/rfc2119>. | <https://www.rfc-editor.org/info/rfc2119>. | |||
[RFC2460] Deering, S. and R. Hinden, "Internet Protocol, Version 6 | [RFC2460] Deering, S. and R. Hinden, "Internet Protocol, Version 6 | |||
(IPv6) Specification", RFC 2460, DOI 10.17487/RFC2460, | (IPv6) Specification", RFC 2460, DOI 10.17487/RFC2460, | |||
December 1998, <http://www.rfc-editor.org/info/rfc2460>. | December 1998, <https://www.rfc-editor.org/info/rfc2460>. | |||
[RFC2474] Nichols, K., Blake, S., Baker, F., and D. Black, | [RFC2474] Nichols, K., Blake, S., Baker, F., and D. Black, | |||
"Definition of the Differentiated Services Field (DS | "Definition of the Differentiated Services Field (DS | |||
Field) in the IPv4 and IPv6 Headers", RFC 2474, | Field) in the IPv4 and IPv6 Headers", RFC 2474, | |||
DOI 10.17487/RFC2474, December 1998, | DOI 10.17487/RFC2474, December 1998, | |||
<http://www.rfc-editor.org/info/rfc2474>. | <https://www.rfc-editor.org/info/rfc2474>. | |||
[RFC3031] Rosen, E., Viswanathan, A., and R. Callon, "Multiprotocol | [RFC3031] Rosen, E., Viswanathan, A., and R. Callon, "Multiprotocol | |||
Label Switching Architecture", RFC 3031, | Label Switching Architecture", RFC 3031, | |||
DOI 10.17487/RFC3031, January 2001, | DOI 10.17487/RFC3031, January 2001, | |||
<http://www.rfc-editor.org/info/rfc3031>. | <https://www.rfc-editor.org/info/rfc3031>. | |||
[RFC3209] Awduche, D., Berger, L., Gan, D., Li, T., Srinivasan, V., | [RFC3209] Awduche, D., Berger, L., Gan, D., Li, T., Srinivasan, V., | |||
and G. Swallow, "RSVP-TE: Extensions to RSVP for LSP | and G. Swallow, "RSVP-TE: Extensions to RSVP for LSP | |||
Tunnels", RFC 3209, DOI 10.17487/RFC3209, December 2001, | Tunnels", RFC 3209, DOI 10.17487/RFC3209, December 2001, | |||
<http://www.rfc-editor.org/info/rfc3209>. | <https://www.rfc-editor.org/info/rfc3209>. | |||
[RFC3393] Demichelis, C. and P. Chimento, "IP Packet Delay Variation | [RFC3393] Demichelis, C. and P. Chimento, "IP Packet Delay Variation | |||
Metric for IP Performance Metrics (IPPM)", RFC 3393, | Metric for IP Performance Metrics (IPPM)", RFC 3393, | |||
DOI 10.17487/RFC3393, November 2002, | DOI 10.17487/RFC3393, November 2002, | |||
<http://www.rfc-editor.org/info/rfc3393>. | <https://www.rfc-editor.org/info/rfc3393>. | |||
[RFC3411] Harrington, D., Presuhn, R., and B. Wijnen, "An | [RFC3411] Harrington, D., Presuhn, R., and B. Wijnen, "An | |||
Architecture for Describing Simple Network Management | Architecture for Describing Simple Network Management | |||
Protocol (SNMP) Management Frameworks", STD 62, RFC 3411, | Protocol (SNMP) Management Frameworks", STD 62, RFC 3411, | |||
DOI 10.17487/RFC3411, December 2002, | DOI 10.17487/RFC3411, December 2002, | |||
<http://www.rfc-editor.org/info/rfc3411>. | <https://www.rfc-editor.org/info/rfc3411>. | |||
[RFC3444] Pras, A. and J. Schoenwaelder, "On the Difference between | [RFC3444] Pras, A. and J. Schoenwaelder, "On the Difference between | |||
Information Models and Data Models", RFC 3444, | Information Models and Data Models", RFC 3444, | |||
DOI 10.17487/RFC3444, January 2003, | DOI 10.17487/RFC3444, January 2003, | |||
<http://www.rfc-editor.org/info/rfc3444>. | <https://www.rfc-editor.org/info/rfc3444>. | |||
[RFC3972] Aura, T., "Cryptographically Generated Addresses (CGA)", | [RFC3972] Aura, T., "Cryptographically Generated Addresses (CGA)", | |||
RFC 3972, DOI 10.17487/RFC3972, March 2005, | RFC 3972, DOI 10.17487/RFC3972, March 2005, | |||
<http://www.rfc-editor.org/info/rfc3972>. | <https://www.rfc-editor.org/info/rfc3972>. | |||
[RFC3985] Bryant, S., Ed. and P. Pate, Ed., "Pseudo Wire Emulation | [RFC3985] Bryant, S., Ed. and P. Pate, Ed., "Pseudo Wire Emulation | |||
Edge-to-Edge (PWE3) Architecture", RFC 3985, | Edge-to-Edge (PWE3) Architecture", RFC 3985, | |||
DOI 10.17487/RFC3985, March 2005, | DOI 10.17487/RFC3985, March 2005, | |||
<http://www.rfc-editor.org/info/rfc3985>. | <https://www.rfc-editor.org/info/rfc3985>. | |||
[RFC4291] Hinden, R. and S. Deering, "IP Version 6 Addressing | [RFC4291] Hinden, R. and S. Deering, "IP Version 6 Addressing | |||
Architecture", RFC 4291, DOI 10.17487/RFC4291, February | Architecture", RFC 4291, DOI 10.17487/RFC4291, February | |||
2006, <http://www.rfc-editor.org/info/rfc4291>. | 2006, <https://www.rfc-editor.org/info/rfc4291>. | |||
[RFC4553] Vainshtein, A., Ed. and YJ. Stein, Ed., "Structure- | [RFC4553] Vainshtein, A., Ed. and YJ. Stein, Ed., "Structure- | |||
Agnostic Time Division Multiplexing (TDM) over Packet | Agnostic Time Division Multiplexing (TDM) over Packet | |||
(SAToP)", RFC 4553, DOI 10.17487/RFC4553, June 2006, | (SAToP)", RFC 4553, DOI 10.17487/RFC4553, June 2006, | |||
<http://www.rfc-editor.org/info/rfc4553>. | <https://www.rfc-editor.org/info/rfc4553>. | |||
[RFC4903] Thaler, D., "Multi-Link Subnet Issues", RFC 4903, | [RFC4903] Thaler, D., "Multi-Link Subnet Issues", RFC 4903, | |||
DOI 10.17487/RFC4903, June 2007, | DOI 10.17487/RFC4903, June 2007, | |||
<http://www.rfc-editor.org/info/rfc4903>. | <https://www.rfc-editor.org/info/rfc4903>. | |||
[RFC4919] Kushalnagar, N., Montenegro, G., and C. Schumacher, "IPv6 | [RFC4919] Kushalnagar, N., Montenegro, G., and C. Schumacher, "IPv6 | |||
over Low-Power Wireless Personal Area Networks (6LoWPANs): | over Low-Power Wireless Personal Area Networks (6LoWPANs): | |||
Overview, Assumptions, Problem Statement, and Goals", | Overview, Assumptions, Problem Statement, and Goals", | |||
RFC 4919, DOI 10.17487/RFC4919, August 2007, | RFC 4919, DOI 10.17487/RFC4919, August 2007, | |||
<http://www.rfc-editor.org/info/rfc4919>. | <https://www.rfc-editor.org/info/rfc4919>. | |||
[RFC5086] Vainshtein, A., Ed., Sasson, I., Metz, E., Frost, T., and | [RFC5086] Vainshtein, A., Ed., Sasson, I., Metz, E., Frost, T., and | |||
P. Pate, "Structure-Aware Time Division Multiplexed (TDM) | P. Pate, "Structure-Aware Time Division Multiplexed (TDM) | |||
Circuit Emulation Service over Packet Switched Network | Circuit Emulation Service over Packet Switched Network | |||
(CESoPSN)", RFC 5086, DOI 10.17487/RFC5086, December 2007, | (CESoPSN)", RFC 5086, DOI 10.17487/RFC5086, December 2007, | |||
<http://www.rfc-editor.org/info/rfc5086>. | <https://www.rfc-editor.org/info/rfc5086>. | |||
[RFC5087] Stein, Y(J)., Shashoua, R., Insler, R., and M. Anavi, | [RFC5087] Stein, Y(J)., Shashoua, R., Insler, R., and M. Anavi, | |||
"Time Division Multiplexing over IP (TDMoIP)", RFC 5087, | "Time Division Multiplexing over IP (TDMoIP)", RFC 5087, | |||
DOI 10.17487/RFC5087, December 2007, | DOI 10.17487/RFC5087, December 2007, | |||
<http://www.rfc-editor.org/info/rfc5087>. | <https://www.rfc-editor.org/info/rfc5087>. | |||
[RFC6282] Hui, J., Ed. and P. Thubert, "Compression Format for IPv6 | [RFC6282] Hui, J., Ed. and P. Thubert, "Compression Format for IPv6 | |||
Datagrams over IEEE 802.15.4-Based Networks", RFC 6282, | Datagrams over IEEE 802.15.4-Based Networks", RFC 6282, | |||
DOI 10.17487/RFC6282, September 2011, | DOI 10.17487/RFC6282, September 2011, | |||
<http://www.rfc-editor.org/info/rfc6282>. | <https://www.rfc-editor.org/info/rfc6282>. | |||
[RFC6550] Winter, T., Ed., Thubert, P., Ed., Brandt, A., Hui, J., | [RFC6550] Winter, T., Ed., Thubert, P., Ed., Brandt, A., Hui, J., | |||
Kelsey, R., Levis, P., Pister, K., Struik, R., Vasseur, | Kelsey, R., Levis, P., Pister, K., Struik, R., Vasseur, | |||
JP., and R. Alexander, "RPL: IPv6 Routing Protocol for | JP., and R. Alexander, "RPL: IPv6 Routing Protocol for | |||
Low-Power and Lossy Networks", RFC 6550, | Low-Power and Lossy Networks", RFC 6550, | |||
DOI 10.17487/RFC6550, March 2012, | DOI 10.17487/RFC6550, March 2012, | |||
<http://www.rfc-editor.org/info/rfc6550>. | <https://www.rfc-editor.org/info/rfc6550>. | |||
[RFC6551] Vasseur, JP., Ed., Kim, M., Ed., Pister, K., Dejean, N., | [RFC6551] Vasseur, JP., Ed., Kim, M., Ed., Pister, K., Dejean, N., | |||
and D. Barthel, "Routing Metrics Used for Path Calculation | and D. Barthel, "Routing Metrics Used for Path Calculation | |||
in Low-Power and Lossy Networks", RFC 6551, | in Low-Power and Lossy Networks", RFC 6551, | |||
DOI 10.17487/RFC6551, March 2012, | DOI 10.17487/RFC6551, March 2012, | |||
<http://www.rfc-editor.org/info/rfc6551>. | <https://www.rfc-editor.org/info/rfc6551>. | |||
[RFC6775] Shelby, Z., Ed., Chakrabarti, S., Nordmark, E., and C. | [RFC6775] Shelby, Z., Ed., Chakrabarti, S., Nordmark, E., and C. | |||
Bormann, "Neighbor Discovery Optimization for IPv6 over | Bormann, "Neighbor Discovery Optimization for IPv6 over | |||
Low-Power Wireless Personal Area Networks (6LoWPANs)", | Low-Power Wireless Personal Area Networks (6LoWPANs)", | |||
RFC 6775, DOI 10.17487/RFC6775, November 2012, | RFC 6775, DOI 10.17487/RFC6775, November 2012, | |||
<http://www.rfc-editor.org/info/rfc6775>. | <https://www.rfc-editor.org/info/rfc6775>. | |||
[RFC7554] Watteyne, T., Ed., Palattella, M., and L. Grieco, "Using | [RFC7554] Watteyne, T., Ed., Palattella, M., and L. Grieco, "Using | |||
IEEE 802.15.4e Time-Slotted Channel Hopping (TSCH) in the | IEEE 802.15.4e Time-Slotted Channel Hopping (TSCH) in the | |||
Internet of Things (IoT): Problem Statement", RFC 7554, | Internet of Things (IoT): Problem Statement", RFC 7554, | |||
DOI 10.17487/RFC7554, May 2015, | DOI 10.17487/RFC7554, May 2015, | |||
<http://www.rfc-editor.org/info/rfc7554>. | <https://www.rfc-editor.org/info/rfc7554>. | |||
[Spe09] Sperotto, A., Sadre, R., Vliet, F., and A. Pras, "A First | [Spe09] Sperotto, A., Sadre, R., Vliet, F., and A. Pras, "A First | |||
Look into SCADA Network Traffic", IP Operations and | Look into SCADA Network Traffic", IP Operations and | |||
Management, p. 518-521. , June 2009. | Management, p. 518-521. , June 2009. | |||
[SRP_LATENCY] | [SRP_LATENCY] | |||
Gunther, C., "Specifying SRP Latency", 2014, | Gunther, C., "Specifying SRP Latency", 2014, | |||
<http://www.ieee802.org/1/files/public/docs2014/ | <http://www.ieee802.org/1/files/public/docs2014/ | |||
cc-cgunther-acceptable-latency-0314-v01.pdf>. | cc-cgunther-acceptable-latency-0314-v01.pdf>. | |||
skipping to change at page 81, line 27 ¶ | skipping to change at page 91, line 4 ¶ | |||
Email: toktam.mahmoodi@kcl.ac.uk | Email: toktam.mahmoodi@kcl.ac.uk | |||
Spiros Spirou | Spiros Spirou | |||
Intracom Telecom | Intracom Telecom | |||
19.7 km Markopoulou Ave. | 19.7 km Markopoulou Ave. | |||
Peania, Attiki 19002 | Peania, Attiki 19002 | |||
Greece | Greece | |||
Email: spis@intracom-telecom.com | Email: spis@intracom-telecom.com | |||
Petra Vizarreta | Petra Vizarreta | |||
Technical University of Munich, TUM | Technical University of Munich, TUM | |||
Maxvorstadt, ArcisstraBe 21 | Maxvorstadt, ArcisstraBe 21 | |||
Munich, Germany 80333 | Munich, Germany 80333 | |||
Germany | Germany | |||
Email: petra.vizarreta@lkn.ei.tum.de | Email: petra.vizarreta@lkn.ei.tum.de | |||
Daniel Huang | ||||
ZTE Corporation, Inc. | ||||
No. 50 Software Avenue | ||||
Nanjing, Jiangsu 210012 | ||||
P.R. China | ||||
Email: huang.guangping@zte.com.cn | ||||
Xuesong Geng | ||||
Huawei Technologies | ||||
Email: gengxuesong@huawei.com | ||||
Diego Dujovne | ||||
Universidad Diego Portales | ||||
Email: diego.dujovne@mail.udp.cl | ||||
Maik Seewald | ||||
Cisco Systems | ||||
Email: maseewal@cisco.com | ||||
End of changes. 92 change blocks. | ||||
237 lines changed or deleted | 674 lines changed or added | |||
This html diff was produced by rfcdiff 1.45. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ |