<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.3.24 -->
<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-xu-savax-control-01" category="info" obsoletes="" updates="" submissionType="IETF" xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.11.1 -->
  <front>
    <title abbrev="SAVA-X-Control">Control Plane of Inter-Domain Source Address Validation Architecture</title>
    <seriesInfo name="Internet-Draft" value="draft-xu-savax-control-01"/>
    <author initials="K." surname="Xu" fullname="Ke Xu">
      <organization abbrev="Tsinghua University">Computer Science, Tsinghua University</organization>
      <address>
        <postal>
          <street>Qinghuayuan street, Haidian District</street>
          <city>Beijing</city>
          <code>100084</code>
          <country>China</country>
        </postal>
        <email>xuke@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="J." surname="Wu" fullname="Jianping Wu">
      <organization abbrev="Tsinghua University">Computer Science, Tsinghua University</organization>
      <address>
        <postal>
          <street>Qinghuayuan street, Haidian District</street>
          <city>Beijing</city>
          <code>100084</code>
          <country>China</country>
        </postal>
        <email>jianping@cernet.edu.cn</email>
      </address>
    </author>
    <author initials="X." surname="Wang" fullname="Xiaoliang Wang">
      <organization abbrev="Tsinghua University">Computer Science, Tsinghua University</organization>
      <address>
        <postal>
          <street>Qinghuayuan street, Haidian District</street>
          <city>Beijing</city>
          <code>100084</code>
          <country>China</country>
        </postal>
        <email>wangxiaoliang0623@foxmail.com</email>
      </address>
    </author>
    <author initials="Y." surname="Guo" fullname="Yangfei Guo">
      <organization abbrev="Tsinghua University">Institute for Network Sciences and Cyberspace, Tsinghua University</organization>
      <address>
        <postal>
          <street>Qinghuayuan street, Haidian District</street>
          <city>Beijing</city>
          <code>100084</code>
          <country>China</country>
        </postal>
        <email>guoyangf19@mails.tsinghua.edu.cn</email>
      </address>
    </author>
    <date year="2021" month="November" day="18"/>
    <area>Operations and Management Area</area>
    <workgroup>Network Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>Because the Internet forwards packets according to the IP destination
address, packet forwarding typically takes place without inspection
of the source address and malicious attacks have been launched using
spoofed source addresses. The inter-domain source address validation
architecture is an effort to enhance the Internet by using
state machine to generate consistent tags. When communicating between
two end hosts at different ADs of IPv6 network, tags will be added to
the packets to identify the authenticity of the IPv6 source address.</t>
      <t>This memo focus on the control plane of the SAVA-X mechanism.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" toc="default">
      <name>Introduction</name>
      <t>The Inter-Domain Source Address Validation (SAVA-X) mechanism
establishes a trust alliance among Address Domains (AD), maintains a
one-to-one state machine among ADs, generates a consistent tag, and
deploys the tag to the ADs' border router (AER). The AER of the
source AD adds a tag to identify the identity of the AD to the
packet originating from one AD and sinking in another AD. The AER of
the destination AD verifies the source address by validating the
correctness of the tag to determine whether it is a packet with a
forged source address.</t>
      <t>In the process of packet forwarding, if the source address and the
destination address of this packet both are addresses in the trust
alliance, however the tag is not added or incorrectly added, AER of
the destination AD determines that the source address is forged and
directly discards this packet. The destination AD forwards the
packet directly for packets whose source address is an address
outside the trust alliance.</t>
      <t>This document mainly studies the relevant specifications of the
control plane of the inter-domain source address validation
architecture mechanism between ADs, which will protect IPv6 networks
from being forged source address. You could see <xref target="RFC8200" format="default"/> for more 
details about IPv6. It stipulates the design
of the consortium blockchain, the nodes' joining and exiting, the
maintenance of trust alliance information based on the consortium
blockchain, and the maintenance of the state machine. Its promotion
and application can realize the standardization of the control plane
in the SAVA-X to facilitate the related equipment developed by
different manufacturers and organizations to cooperate to accomplish
the inter-domain source address validation jointly.</t>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119, BCP 14
<xref target="RFC2119" format="default"/> and indicate requirement levels for compliant CoAP
implementations.</t>
    </section>
    <section anchor="terminology-and-abbreviation" numbered="true" toc="default">
      <name>Terminology and Abbreviation</name>
      <table align="center">
        <thead>
          <tr>
            <th align="left">Abbreviation</th>
            <th align="left">Description</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">AD</td>
            <td align="left">Address Domain, the unit of a trust alliance, which is an address set consisting of all IPv6 addresses corresponding to an IPv6 address prefix.</td>
          </tr>
          <tr>
            <td align="left">TA</td>
            <td align="left">Trust Alliance, the IPv6 network that uses the SAVA-X mechanism.</td>
          </tr>
          <tr>
            <td align="left">STA</td>
            <td align="left">sub-Trust Alliance, parts of TA.</td>
          </tr>
          <tr>
            <td align="left">STA-admin</td>
            <td align="left">STA Administrator, the administrator of STA.</td>
          </tr>
          <tr>
            <td align="left">ACS</td>
            <td align="left">AD Control Server, the server that matains state machine with other ACS and distribute information to AER.</td>
          </tr>
          <tr>
            <td align="left">AER</td>
            <td align="left">AD border router, which is placed at the boundary of an AD of STA.</td>
          </tr>
          <tr>
            <td align="left">ADID</td>
            <td align="left">The identity of an AD.</td>
          </tr>
          <tr>
            <td align="left">ADID_Rec</td>
            <td align="left">The record of a number of an AD.</td>
          </tr>
          <tr>
            <td align="left">ARI_Rec</td>
            <td align="left">The record with relavent information of an AD or STA.</td>
          </tr>
          <tr>
            <td align="left">API_Rec</td>
            <td align="left">The record of prefix of an AD or STA.</td>
          </tr>
          <tr>
            <td align="left">CSR</td>
            <td align="left">Certificate Signing Request, which is used for an AD or STA to join or exit the consortium blockchain.</td>
          </tr>
          <tr>
            <td align="left">SM</td>
            <td align="left">State Machine, which is maintained by a pair of ACS to generate tags.</td>
          </tr>
          <tr>
            <td align="left">Tag</td>
            <td align="left">The authentic identification of source address of a packet.</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="the-design-of-the-consortium-blockchain" numbered="true" toc="default">
      <name>The design of the Consortium Blockchain</name>
      <t>As discussed in the introduction, consortium blockchain will be used
in SAVA-X mechanism.</t>
      <section anchor="trust-alliance" numbered="true" toc="default">
        <name>Trust Alliance</name>
        <t>Trust Alliance (TA) is a hierarchical structure. Address domains
(AD) are assigned into different sub-trust alliances (STA) according
to geographic location, economic relationship, political
relationship, social relationship, and military relationship. AD is
the minimum unit for trust. The one-to-one maintenance state machine
between ADs located in the same layer of sub-trust alliance
generates consistent tags and deploys the tags to their AERs. The
ADs in each sub-trust alliance elect a master AD node. The master AD
node represents the sub-trust alliance and maintains the
alliance-level state machine with other master AD nodes to generate
alliance-level tags. When communicating across sub-trust alliances,
it is necessary to achieve the feature of tag replacement.</t>
        <t>The AD in the SAVA-X must be located in a specific sub-trust
alliance. According to its position in the SAVA-X, AD can be
divided into three roles: primary address domain, boundary address
domain, and ordinary address domain which is neither primary nor
boundary address domain.</t>
        <ul spacing="normal">
          <li>The primary address domain is the representative node of the
aforementioned sub-trust alliance and is used to establish
connection with the primary address domain of other sub-trust
alliances. In this way, the relationship between trust alliances
finally forms a tree-like relationship, and there will be
no direct relationship between address domains under the same
branch.</li>
          <li>The boundary address domain is the address domain located at
the boundary of the sub-trust alliance. It sends the packet to other sub-trust alliances or outside the trust alliance.</li>
          <li>The ordinary address domain is neither the primary address
domain nor the address domain of the boundary address domain.</li>
        </ul>
        <t>Due to the uncontrollable packet forwarding path, in SAVA-X, a
virtual address domain needs to be set up as a non-boundary AD to
communicate with the sub-trust alliance outside or receive packets
sent from outside the sub-trust alliance to maintain the state
machine. The virtual AD is recorded as AD_V (Virtual Address Domain).
When a packet from an AD in a sub-trust alliance needs to be sent
outside the sub-trust alliance, but there are multiple paths to the
destination AD in the sub-trust alliance, the sub-trust alliance
may have multiple boundary ADs to reach the destination AD. The
sub-trust alliance doesnot know which boundary AD will be selected
during the packet forwarding. Therefore, the primary function of
AD_V is to prevent this by specifying the specific tag that should
be added to the packet sent to the external address domain of the
sub-trust alliance.</t>
        <t>What's more, the tag needs to be verified by the boundary address
domain of the sub-trust alliance. Therefore, the boundary AD also
needs to receive the tags maintained by the AD and AD_V in the trust
alliance. As a tag for communicating data between the non-primary
address domain and the external address domain of the sub-trust
alliance.</t>
      </section>
      <section anchor="consortium-blockchain" numbered="true" toc="default">
        <name>Consortium Blockchain</name>
        <t>To simplify the control plane's design and avoid the single point
failure to subvert the SAVA-X, we design the SAVA-X with a
decentralized infrastructure which will store the information of the
trust alliance.</t>
        <t>The consortium blockchain is composed of the trust alliance
management committee chain and several sub-chains. Among them, the
management committee chain is composed of several nodes to manage
the administrator nodes of each sub-chain. The consortium blockchain
records information of the sub-trust alliance administrator node,
named as STA-admin (Sub Trust Alliance administrator), and member
list of each sub-chain which are packaged and submitted by the
STA-admin. Each sub-trust alliance has one STA-admin that is assumed
by a specific elected AD in the sub-trust alliance. The AD in the
same sub-trust alliance forms a private chain to maintain the
information of the members of the sub-trust alliance jointly. The
STA-admin in each sub-trust alliance is responsible for managing the
joining and exiting of the sub-trust alliance node. The STA-admin of
each sub-trust alliance maintains the relationship of the members in
each sub-trust alliance through the trust alliance management
committee chain.</t>
      </section>
      <section anchor="joining-and-exiting" numbered="true" toc="default">
        <name>Joining and Exiting</name>
        <section anchor="node-joining" numbered="true" toc="default">
          <name>Node Joining</name>
          <t>This is the admission of joining of the sub-trustalliance member AD.
The prerequisite for the AD to join the sub-trust alliance is to
have a certificate issued by the STA-admin firstly. AD's Address
Control Server (ACS), which will maintain state machine with other
ACS and distribute alliance information and other information to
AER, submits a Certificate Signing Request file to the STA-admin of
the sub-trust alliance that it wants to join to request the
certificate. The CSR file includes ADID, ACS address information,
IPv6 address prefix information, and its public key information. If
the file is valid, STA-admin verifies the file, generates a node
certificate, packages the AD's information into a block, and
updates the list of members of the sub-consortium. STA-admin
submits the latest block to the consortium blockchain, and the
consortium blockchain updates the list of alliance members of the
entire trust alliance.</t>
          <t>When a sub-trust alliance want to join the trust alliance, STA-admin
submits a CSR file to the consortium blockchain, including the
member information list in the sub-chain and the information of the
STA-admin. It requires offline negotiation and cooperation to apply
for joining the consortium blockchain. The consortium blockchain
management committee verifies the validity of the request, issues
administrator certificates, and updates block information. The
STA-admins in the current trust alliance jointly maintain a
management committee chain, manage the administrator certificates of
each sub-trust alliance, and use the certificates for encrypted
communication. STA-admin submits the list of members of the
sub-trust alliance to the consortium blockchain and joins the
entire trust alliance.</t>
          <t>After a node joins the consortium blockchain, there is an Effecting
Time and an Expiration Time in the CSR file. STA-admin will assign
the sub-trust alliance member with an ADID number if it does not
contain the ADID information in the submitted information. The
consortium blockchain will give the permitted sub-trust alliance a
sub-trust alliance number if the information submitted by the
sub-trust alliance does not have the sub-trust alliance number. If
there is a conflict between the submitted information and the
returned information, the returned ADID or sub-trust alliance
number will be selected.</t>
        </section>
        <section anchor="node-exiting" numbered="true" toc="default">
          <name>Node Exiting</name>
          <t>The member node needs to submit the CSR file again to delete its
relevant information. Its STA-admin decides whether to allow it
exit or not. After passing the validation, nodes of the
sub-blockchain delete the relevant member information. It also
needs to submit a CSR file for the exit of the sub-trust alliance
node, which the alliance management committee decides whether to
allow it. After validating the receiving exit request, other
sub-trust alliance administrator nodes need to delete their
maintenance-related sub alliance node information.</t>
        </section>
      </section>
    </section>
    <section anchor="alliance-information-and-state-machine-maintenance-based-on-the-consortium-blockchain" numbered="true" toc="default">
      <name>Alliance Information and State Machine Maintenance based on the Consortium Blockchain</name>
      <t>On the AER of the destination AD, to validate the tag, it is first
necessary to find out the sub-trust alliance number from the source
address of the arriving packet and find out its corresponding
source Address Domain Identity (ADID) number. Then find the
currently valid tag according to the ADID number. The generation of
the tag requires the maintenance of the state machine between the
ACSes. In SAVA-X, member ADs need to inform each other of their
sub-trust alliance number, ADID number, AD role, ACS address, and
IPv6 address prefix. The members interact with each other with the
state machine information according to the hierarchical division
structure after obtaining the basic information of the other
members. And use the tags generated by the state machine during the
packet forwarding after the specified time to add and validate the
tags.</t>
      <t>The relevant information needs to be stored in the sub-chains,
where the node is located after joining the consortium blockchain.
The information stored on the consortium blockchain needs the
content specified in the following three message formats, namely
ADID_Rec, ARI_Rec, and API_Rec. We give the packet format required
by SAVA-X in the control plane as follows.</t>
      <section anchor="address-domain-identity-record" numbered="true" toc="default">
        <name>Address Domain Identity Record</name>
        <t>Address Domain Identity Record (ADID_Rec) is used to identify an address
domain uniquely in the trust alliacne.</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
  0                   1                   2                   3
  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
 +-+-+-+-+-+-+-+-+
 |   ADID Type   |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 ~              Address Domain Identity (ADID)                   ~
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        <dl newline="false" spacing="normal">
          <dt>ADID Type:</dt>
          <dd>
  8-bit Type of ADID, 1 for 16-bits AS number, 2 for 32-bits AS
number and other unassigned.</dd>
          <dt>ADID:</dt>
          <dd>
  The 16-bit or 32-bit ADID number. Its value can be the AS
number or the number assigned by the consortium blockchain,
and the specific length is determined by the ADID Type field.
When each bit of ADID is 1, it represents that the AER requests
the information of all members from ACS.</dd>
        </dl>
      </section>
      <section anchor="ad-registration-information-record" numbered="true" toc="default">
        <name>AD Registration Information Record</name>
        <t>AD Registration Information Record (ARI_Rec) is the registration
information record of AD, which is used to record the necessary
information required to register a specific member AD. The ACS and
AD establish connections.</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
  0                   1                   2                   3
  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |     Action    |     AD Type   |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 ~                            ADID_Rec                           ~
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                          ACS Address                          |
 |                                                               |
 |                                                               |
 |                                                               |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                         Effecting Time                        |
 |                                                               |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        <dl newline="false" spacing="normal">
          <dt>Action:</dt>
          <dd>
  8-bit instruction to add (ADD=1) or delete (DEL=2) this record.
Others are unassigned.</dd>
          <dt>AD Type:</dt>
          <dd>
  8-bit unsigned number indicating the role of AD. 0 for ordinary
AD, 1 for primary AD and 2 for boundary AD. Others are
unassigned.</dd>
          <dt>ADID_Rec:</dt>
          <dd>
  Reference the ADID_Rec packet.</dd>
          <dt>ACS Address:</dt>
          <dd>
  128-bit the IPv6 address of ACS.</dd>
          <dt>Effecting Time:</dt>
          <dd>
  64-bit time specifies when this record is applied. It is
recommended to use the 64 bits struct timeval format for the
effecting time of the execution of this record. If all bits of
this field are 0 or earlier than the current time, it means
that it takes effect immediately.</dd>
        </dl>
        <t>The role of address domain is essential, and each address domain 
needs to be assigned a corresponding role according to its position
in the sub-trust alliance. A sub-trust alliance needs to set one
(and only one) primary address domain. It serves as the
representative of the sub-trust alliance. The tag generated by its
ACS and the ACSes of other sub-trust alliances' primary address
domain maintains the state machine to generate the tag of the
sub-trust alliance, and it issues the tag to the boundary address
domain of the sub-trust alliance. A specific recommendation of a
consensus algorithm could generate the primary address domain or be
directly specified by the operator of the address domain with
offline negotiation. The boundary address domain means that packet
forwards outside the address domain is no longer in the current
sub-trust alliance. The primary address domain can be a boundary
address domain or not. The tag replacement may occur in the
boundary address domain. The ordinary address domain is neither a
primary address domain nor a boundary address domain.</t>
      </section>
      <section anchor="ad-prefix-information-record" numbered="true" toc="default">
        <name>AD Prefix Information Record</name>
        <t>AD Prefix Information Record (API_Rec) is the prefix information
corresponds to the prefix of a specific AD. An AD may have more
than one prefix, so registration information and prefix information
records must be separated.</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
  0                   1                   2                   3
  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |     Action    |   Alliance    |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 ~                            ADID_Rec                           ~
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 | Prefix Length |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                         IPv6 Address                          |
 |                                                               |
 |                                                               |
 |                                                               |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                         Effecting Time                        |
 |                                                               |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        <dl newline="false" spacing="normal">
          <dt>Action:</dt>
          <dd>
  8-bit instruction to add (ADD=1) or delete (DEL=2) this record.
Others are unassigned.</dd>
          <dt>Alliance:</dt>
          <dd>
  8-bit the sub-trust alliance number.</dd>
          <dt>ADID_Rec:</dt>
          <dd>
  Reference the ADID_Rec packet.</dd>
          <dt>Prefix Length:</dt>
          <dd>
  8-bit the length of the IPv6 prefix.</dd>
          <dt>IPv6 Address:</dt>
          <dd>
  128-bit indicates a certain address prefix operated by the
corresponding member AD using together with Prefix Length.</dd>
          <dt>Effecting Time:</dt>
          <dd>
  64-bit time specifies when this record is applied. It is
recommended to use the 64 bits struct timeval format for the
effecting time of the execution of this record. If all bits of
this field are 0 or earlier than the current time, it means
that it takes effect immediately.</dd>
        </dl>
        <t>ARI_Rec and API_Rec are required to store the AD information in the
consortium blockchain and send it to all AERs of their AD with the
communication protocol between ACS and AER.</t>
      </section>
    </section>
    <section anchor="time-synchronization" numbered="true" toc="default">
      <name>Time Synchronization</name>
      <t>Due to the time error between the border routers of the member ADs, 
to ensure the correct operation of the tag validation, it is
necessary to make each device including ACS and AER in the trust
alliance calibrate to the same clock reference. The NTP protocol 
could achieve this goal. You could see <xref target="RFC5905" format="default"/> for more details.</t>
      <t>Although the NTP protocol can guarantee the time synchronization
between AERs, there may inevitably still have a slight time
difference between AERs and ACSes. Therefore, each AER sets a 
shared time slice. With this time slice, both the expired tag and 
the new tag are considered valid. That is, more than one tag is
valid for a while. The destination AD needs to validate all valid
tags belonging to a specific source AD. The tag is correct if one
of the tags is validated.</t>
      <t>Assuming that the maximum time difference between AER and ACS is
<tt>te</tt>, we set a shared time slice with a length of <tt>2te</tt> between two
adjacent tags. In this shared time slice, the two tags before and
after are valid. The validity period of the tag with the shared
time slice is shown below, see <xref target="figure1" format="default"/>.</t>
      <figure anchor="figure1">
        <name>Validity period of tag with the shared time slice</name>
        <artwork name="" type="" align="left" alt=""><![CDATA[
 +----------------------+
 |      Tag_(n-1)       |
 +----------------------+
                     +----------------------+
                     |         Tag_n        |
                     +----------------------+
                     |  |
                     |  |
                     |  |
 --------------------|--|------------------------------> Time Line
                     2te
]]></artwork>
      </figure>
      <t>In addition to the time difference, we should also take into
account the packet transmission delay in the network. Set the
minimum delay to <tt>td_min</tt> and the maximum delay to <tt>td_max</tt>. The
expiration of <tt>Tag_n</tt> should be extended <tt>td_max</tt> later, and the
beginning of <tt>Tag_(n+1)</tt> validity period should be delayed <tt>td_min</tt>
later. The shared time slice and tag validity period corrected
according to transmission delay are shown as follows, see <xref target="figure2" format="default"/>.</t>
      <figure anchor="figure2">
        <name>Validity period of tag with the shared time slice after modified</name>
        <artwork name="" type="" align="left" alt=""><![CDATA[
 +----------------------+
 |      Tag_(n-1)       |
 +----------------------+
                      +----------------------+
                      |        Tag_n         |
                      +----------------------+
                      | |
                      | |
 ---------------------|-|------------------------------> Time Line
                      2te-td_min+td_max
]]></artwork>
      </figure>
      <t>The expiration of the <tt>Tag_n</tt> is extended to <tt>te+td_max</tt>, and the
beginning of the <tt>Tag_(n+1)</tt> is extended to <tt>te-td_min</tt>.  The
parameters such as <tt>te</tt>, <tt>td_min</tt>, <tt>td_max</tt>, the period of the
shared time slice, and tag validity period are determined by the
destination based on the actual network environment. Therefore, the
lifecyle of a tag is as: <tt>lifecycle = Transition Interval + 2te --td_min + td_max</tt>.</t>
    </section>
    <section anchor="security-consideration" numbered="true" toc="default">
      <name>Security Consideration</name>
      <t>This present memo doesnot find any security problem.</t>
    </section>
    <section anchor="iana-consideration" numbered="true" toc="default">
      <name>IANA Consideration</name>
      <t>This document makes no requests of IANA.</t>
    </section>
    <section anchor="acknowledgements" numbered="true" toc="default">
      <name>Acknowledgements</name>
      <t>Much of the content of this document is the expansion of the IETF <xref target="RFC5210" format="default"/>
in inter-domain level. Thanks to the effort of pioneers.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>Normative References</name>
      <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml"/>
      <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5210.xml"/>
      <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5905.xml"/>
      <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8200.xml"/>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
