<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<?xml-stylesheet type='text/xsl' href='rfc2629.xslt' ?>
<rfc
      xmlns:xi="http://www.w3.org/2001/XInclude"
      category="info"
      docName="draft-yan-detnet-oam-requirements-enhancement-00"
      ipr="trust200902"
      obsoletes=""
      updates=""
      submissionType="IETF"
      xml:lang="en"
      tocInclude="true"
      tocDepth="4"
      symRefs="true"
      sortRefs="true"
      version="3">

 <!-- ***** FRONT MATTER ***** -->

 <front>

   <title abbrev="OAM Requirements for Enhanced DetNet">OAM Requirements for Enhanced DetNet OAM</title>
    <seriesInfo name="Internet-Draft" value="draft-yan-detnet-oam-requirements-enhancement-00"/>
	

	
	<author fullname="Jinjie Yan" initials="J" surname="Yan">
      <organization>ZTE Corporation</organization>
      <address>
        <postal>
          <street/>
         <city></city>
          <region/>
          <code/>
          <country>China</country>
        </postal>
        <phone></phone>
        <email>yan.jinjie@zte.com.cn</email>
     </address>
    </author>
	
	
	 <author fullname="Zhengxin Han" initials="Z" surname="Han">
      <organization>China Unicom</organization>

      <address>
        <postal>
          <street></street>
          
          <city></city>
          
          <region></region>
  
          <code></code>

          <country>China</country>
        </postal>

        <phone></phone>

        <email>hanzx21@chinaunicom.cn</email>
      </address>
    </author>
	
		<author fullname="Xiangyang Zhu" initials="X" surname="ZHU">
      <organization>ZTE Corporation</organization>
      <address>
        <postal>
          <street/>
         <city></city>
          <region/>
          <code/>
          <country>China</country>
        </postal>
        <phone></phone>
        <email>zhu.xiangyang@zte.com.cn</email>
     </address>
    </author>
	

   <area>Routing</area>
    <workgroup>DetNet</workgroup>
   <keyword></keyword>
   
   <abstract>
   
    <t>
	This document describes the specific requirements of the Operations, Administration, and Maintenance (OAM) for Enhanced DetNet, and analyzes the gaps with the existing OAM methods. It describes related OAM solutions considerations as well.
	</t>
	
	  
    </abstract>
  </front>
  <middle>
    <section numbered="true" toc="default"> <name>Introduction</name>
	
	<t>
	The framework of OAM for DetNet has been specified in <xref target="RFC9551"/>. According to <xref target="RFC8655"/>, DetNet functionality is divided into forwarding sub-layer and service sub-layer. <xref target="RFC9551"/> lists general functional requirements for DetNet OAM as well as functional requirements in each of the DetNet sub-layers of a DetNet domain. The IP and MPLS DetNet data plane have been defined respectively in <xref target="I-D.ietf-detnet-ip-oam"/> and <xref target="RFC9546"/>.
	</t>
	<t>
	<xref target="I-D.ietf-detnet-scaling-requirements"/> has described the enhanced requirements for DetNet enhanced data plane including the deterministic latency guarantees. <xref target="I-D.ietf-detnet-dataplane-taxonomy"/> has discussed the classification criteria of many variations and extensions of queuing mechanisms such as ECQF[IEEE 802.1Qdv], Multi-CQF<xref target="I-D.dang-queuing-with-multiple-cyclic-buffers"/>, TCQF<xref target="I-D.eckert-detnet-tcqf"/>, CSQF<xref target="I-D.chen-detnet-sr-based-bounded-latency"/>, TQF<xref target="I-D.peng-detnet-packet-timeslot-mechanism"/>, C-SCORE<xref target="I-D.joung-detnet-stateless-fair-queuing"/>, EDF<xref target="I-D.peng-detnet-deadline-based-forwarding"/>, gLBF<xref target="I-D.eckert-detnet-glbf"/> and so on. These queuing mechanisms demand high precision to achieve deterministic latency. For example, with the increasing of link speed from 100Mbps to 1Gbps, 10Gbps, 100Gbps, or even higher in larger networks, either more bytes can be transmitted within the same cycle interval or the smaller cycle interval is required to transmit the same amount of bytes in a cycle as that in low-speed networks.
	</t>
	<t>
	For DetNet OAM, it is required to provide DetNet services with high precision in a large-scale network, and OAM performance requirements must be strictly guaranteed. It needs to monitor and validate that promised service levels, such as latency and packet loss rate, are being delivered. Existing OAM methods, which include proactive and reactive techniques, running both active and passive modes, are no longer sufficient to meet the monitoring and measurement requirements.
	</t>
	<t>
	Based on the consideration above, this document describes the specific requirements of the OAM for Enhanced DetNet, and analyzes the gaps with the existing OAM methods. It describes related OAM solutions considerations as well.
	</t>

    
    <section numbered="true" toc="default"><name>Requirements Language</name>
	  
       <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
       "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
       document are to be interpreted as described in <xref target="RFC2119" format="default"/>.</t>
	   
      </section>
    </section>
	
    <section anchor="Terminology" numbered="true" toc="default"> <name>Terminology</name>
	<t>The terminology is defined as <xref target="RFC8655" pageno="false" format="default"/>.</t>

    </section>
	
	
   <section numbered="true" toc="default"> <name>Requirements and Gap Analysis</name>
	<t>
	This section presents the enhanced requirements for Enhanced DetNet OAM and analyzes the technical gaps when applying OAM technologies as per <xref target="RFC9551"/> in large-scale networks.
	</t>
	<section numbered="true" toc="default"> <name>Support Microsecond-level Measurement Precision</name>
		<t>
		As per <xref target="I-D.ietf-detnet-scaling-requirements"/>, a deterministic network can use higher-speed links, especially for its backbone. With the increasing data rate, the network scheduling cycle can be reduced if the same amount of data is required to be sent each cycle for each application. Or, more data can be sent if the network cycle time remains the same. For the former, it requires more precise time control (e.g. cycle in the order of a few microseconds or sub-microseconds) for the input stream gate and the timed output buffer. As per  <xref target="RFC9551"/>, service protection (provided by the DetNet Service sub-layer) is designed to mitigate simple network failures more rapidly than the expected response time of the DetNet Controller Plane. In other words, the time accuracy of the DetNet OAM mechanism must meet or exceed the accuracy requirements of service-level agreements (SLAs). For instance, if service delay measurements require microsecond-level precision, the OAM mechanism should support sub-microsecond precision to assess whether service delay and jitter performance meet SLA demand.
		</t>
		<t>
		The accuracy of time measurements may depend on the time synchronization protocol utilized in the network and the specific location where timestamps are captured during the forwarding process. Enhanced DetNet aims at large-scale networks, according to <xref target="I-D.ietf-detnet-scaling-requirements"/>, requiring the tolerance of time asynchrony, hence the efficient one-way delay measurement becomes critical.  Additionally, based on time asynchrony assumption, synchronization technologies leveraging network effects, especially in metropolitan area networks with spine-leaf topologies, provide solutions with synchronization accuracy down to the microsecond granularity.
		</t>
	</section>
	<section numbered="true" toc="default"> <name>Support Per-packet Performance Monitoring</name>
		<t>
		According to <xref target="I-D.ietf-detnet-scaling-requirements"/>, large-scale networks are growing in complexity to address the constant need for more bandwidth, lower latency and jitter, customized traffic prioritization, and SLA-grade network resilience. A more complex network infrastructure requires a deeper visibility of the Enhanced DetNet. The OAM of Enhanced DetNet requires examining network behavior at the granularity of packets. Leveraging legacy network monitoring technologies is insufficient since they do not offer real-time and granular visibility.
		</t>
		<t>
		DetNet requires high reliability to fulfill the demands of service flows. However, in large-scale networks with a significant number of service flows, detecting SLA violations on a per-packet basis can bring challenges. The feasibility of implementing per-packet monitoring with the OAM mechanism depends on device capabilities, including counter resources, CPU resources, and port speeds. For instance, if the processing time for forwarding packets at line speed is 10 nanoseconds per packet in in-situ OAM mode, the network processor chip must parse the OAM data fields for each packet within this time frame. Any delay beyond 10 nanoseconds per packet would impact the device's line-speed forwarding capability. In large-scale networks where the number of services exceeds thousands, mainstream equipment currently operates at capacities typically in the range of a few thousand, making it challenging to implement per-packet OAM effectively.
		</t>
	</section>
	<section numbered="true" toc="default"> <name>Support High-speed Detection and Response </name>
		<t>
		In DetNet, due to the limited network scale, the impact of detection and response time on OAM performance is not obvious. However, long-distance transmission will increase transmission latency in large-scale networks. Meanwhile, the excessive number of devices will lead to more network link failures. In order to achieve real-time perception and monitoring of the network operating state, high-speed monitoring and response is necessary. To ensure that the service will not be interrupted for a long time or violate the service level agreement, it is necessary to have a high detection and response speed.
		</t>
		<t>
		The traditional information collection cycle is at the minute level, which is unable to effectively locate millisecond-level latency variation and low-probability packet loss problems. Network fault location can only be passively located, the positioning cycle is quite long.
		</t>
		<t>
		Traditional detection methods relying on switching and notification are unsuitable for Enhanced DetNet, as follows:
		</t>
		<ol>
			<li>
			Active OAM protocols, such as Bidirectional Forwarding Detection (BFD)<xref target="RFC5880"/>, typically operate at millisecond-level at most. 
			</li>
			<li>
			Currently, in-band detection methods include the Alternate-Marking Method <xref target="RFC8321"/> which operates with a detection duration of up to ten-second level, and IOAM Direct Export (DEX) <xref target="RFC9326"/>, achieving near real-time monitoring but requires packet encapsulated with a sequence number field. Out-of-band reporting methods such as extensions of <xref target="RFC6374"/> generally offer millisecond-level delay. 
			</li>
			<li>
			Telemetry can provide monitoring at minute or hour levels at most.  A drawback of telemetry is the uniform upload and processing of packets. Moreover, fixed round-trip time overhead across node-to-controller paths, node CPU performance, uplink bandwidth, and controller processing capability are all bottlenecks of Telemetry.
			</li>
		</ol>
		
		
	</section>
 
   </section>   
	
	
	
   <section numbered="true" toc="default"> <name>Consideration for Enhanced DetNet OAM Solutions</name>
		<t>
		OAM methods can be classified into three types according to <xref target="RFC7799"/>:
		</t>
		<ol>
		<li>
		Active OAM mode (e.g., TWAMP<xref target="RFC5357"/>). <xref target="RFC9546"/> defines DetNet OAM with the MPLS Data Plane. And <xref target="I-D.ietf-detnet-ip-oam"/> discusses DetNet OAM with the IP Data Plane. These two drafts focusing on the active OAM mode indicate that the fate sharing among test and service packets can be theoretically achieved, while it is difficult to implement in practice. Although path sharing is comparatively simple, it is a challenging task for network operators to implement fate sharing between test packets and data traffic without introducing any congestion. 
		</li>
		<li>
		Passive OAM mode. In a strict sense, passive methods cannot modify packet encapsulation, making it difficult to calculate packet loss when packets do not carry sequence numbers. 
		</li>
		<li>	
		<t>
		Hybrid OAM mode. At present, the two most popular in-band OAM technologies are the Alternate-Marking (coloring) Method <xref target="RFC8321"/> and In-situ Network Telemetry (INT) <xref target="RFC9197"/>, which are both hybrid OAM methods and are regarded as solutions that can naturally achieve fate-sharing among test and service packets on the forwarding plane. Based on forwarding plane detection technologies utilizing coloring and INT, there are two main OAM solutions:	
		</t>
				<ul>
					<li>The head-end or tail-end node performs local OAM data computations, which include packet loss rates, delay, etc. Optionally, out-of-band OAM technologies (such as <xref target="RFC6374"/>, STWAP <xref target="RFC8762"/>, and their extensions) can be used for information exchange between head-end and tail-end nodes.
					</li>
					<li>
					Telemetry methods (like iFIT <xref target="I-D.song-opsawg-ifit-framework"/>). The head-end and tail-end nodes transmit their local data to a controller or cloud platform via southbound interfaces. Here, third-party nodes perform OAM-related computations and notify the nodes to generate responses also via southbound interfaces.
					</li>
				</ul>
			
		</li>
		</ol>
		<t>
		Based on the above analysis, there are two main solutions for Enhanced DetNet OAM to meet the high-reliability requirements.
		</t>
		<section numbered="true" toc="default"> <name>Based on Traditional OAM Protection Mechanism</name>
		<t>
		Traditional protection switching networks employ the following three types of protection methods, each with different response speeds:
		</t>
		<ol>
		<li>
		End-to-end 1+1 protection: There is a working link serving as the primary path and a protection link as the backup path, both established in advance. At the head-end node, service traffic is duplicated and transmitted over both the working and protection links. If the working link fails to transmit service flows, the tail-end node switches to receiving traffic from the protection link, known as single-end switching. This method switches relatively quickly with low bandwidth utilization due to both links being allocated for one service.
		</li>
		<li>
		End-to-end 1:1 protection: Service traffic is transmitted only on the working link, leaving the protection link idle or used for low-priority services. If the transmission fails on the working link, the tail-end node notifies the head-end node to switch protected service flows from the working link to the protection link. This switching requires actions at both ends, resulting in slower switching but achieving higher bandwidth utilization.
		</li>
		<li>
		Fast Reroute (FRR): Enhanced DetNet requires explicit paths, making rerouting based on distributed protocols unsuitable.
		</li>
		</ol>
		<t>
		This solution is aimed at Enhanced DetNet where the protection provided by OAM is best-effort, solely deploying protection switching mechanisms. In such networks, traditional forwarding sub-layer OAM protection mechanisms can be utilized:
		</t>
		<ol>
		<li>The INT mechanism based on the sequence number and data collection in Direct Export mode offers near real-time detection with limited packet disordering while the response time depends on the protection method. This approach achieves optimal detection speed but requires encapsulating/decapsulating in-situ OAM message headers as per requirements and supporting Direct Export Type.
		</li>
		<li>
		The in-situ flow detection mechanism with traffic coloring offers detection granularity in the range from 1 second to 300 seconds (approximately averaging 10 seconds), aligning performance monitoring duration within at least the second range. The Continuity Check and Connectivity Verification (CC-CV) performance is typically at the millisecond level.
		</li>
		<li>Various active OAM mechanisms based on fate sharing compromise the requirements in chapters 3.1 and 3.2. The CC-CV method relies on protocols like BFD.
		</li>
		</ol>
		<t>Observability technologies introduce additional latency and are unsuitable for real-time OAM detection of online services. 
		</t>
		</section>
		
		<section numbered="true" toc="default"> <name>Supporting PREF Protection Function in DetNet</name>
		<t>
		This approach aims to guarantee forwarding sub-layer performance through service sub-layer functionality, utilizing packet-level "multi-send and selective-receive" technology to mitigate the switching delay. According to <xref target="IEEE802.1CB"/>and <xref target="RFC8655"/>, ensuring high reliability for time-sensitive services is challenging without deploying PREF. When the network supports PREF configuration, it naturally meets reliability requirements including packet loss rate and latency violation constraints, eliminating the need to enhance detection speed. Another factor ensuring high reliability is the ability to support protection at each node and link level, rather than solely at the path level. The PREF mechanism requires each packet encapsulated with a unique flow-id encapsulating and the sequence number to facilitate selective receiving.
		</t>
		<t>
		While the network supports PREF to guarantee a packet loss rate as low as 0.0001%, it remains essential to proactively monitor the performance of each individual path to promptly detect path defects. This proactive approach helps prevent SLA violations such as link degradation to ensure stable transmission of service traffic during PREF protection.
		</t>
		</section>
	</section >
	

   
   

   
   <section  numbered="true" toc="default"> <name>Security Considerations</name>
   <t>TBA</t>
   </section>
   <section numbered="true" toc="default"> <name>IANA Considerations</name>
   <t>TBA</t>   
   </section>
   <section numbered="true" toc="default"> <name>Acknowledgements</name>
   <t>TBA</t>
   </section> 
   
  </middle>
  
  <!--  *****BACK MATTER ***** -->

 <back>
 
    <references>
      <name>References</name>
	  <references>
        <name>Normative References</name>
		<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.9551.xml"/>
		<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8655.xml"/>
		<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5880.xml"/>
		<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8321.xml"/>
		<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.6374.xml"/>
		<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.7799.xml"/>
		<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5357.xml"/>
		<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8762.xml"/>
		<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.9546.xml"/>
		<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.9197.xml"/>
		<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.9326.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8938.xml"/>

 	

		<reference anchor="I-D.xiong-detnet-large-scale-enhancements" target="https://datatracker.ietf.org/doc/html/draft-xiong-detnet-large-scale-enhancements-04">
		  <front>
			<title>Enhanced DetNet Data Plane Framework for Scaling Deterministic Networks</title>
			<author fullname="Quan Xiong" initials="Q." surname="Xiong">
			  <organization>ZTE Corporation</organization>
			</author>
			<author fullname="Zongpeng Du" initials="Z." surname="Du">
			  <organization>China Mobile</organization>
			</author>
			<author fullname="Junfeng Zhao" initials="J." surname="Zhao">
			  <organization>CAICT</organization>
			</author>
			<author fullname="Dong Yang" initials="D." surname="Yang">
			  <organization>Beijing Jiaotong University</organization>
			</author>
			<date day="26" month="February" year="2024"/>
		  </front>
		</reference>
		
		<reference anchor="I-D.ietf-detnet-scaling-requirements" target="https://datatracker.ietf.org/doc/html/draft-ietf-detnet-scaling-requirements-06">
		  <front>
			<title>Requirements for Scaling Deterministic Networks</title>
			<author fullname="Peng Liu" initials="P." surname="Liu">
			  <organization>China Mobile</organization>
			</author>
			<author fullname="Yizhou Li" initials="Y." surname="Li">
			  <organization>Huawei</organization>
			</author>
			<author fullname="Toerless Eckert" initials="T. T." surname="Eckert">
			  <organization>Futurewei Technologies USA</organization>
			</author>
			<author fullname="Quan Xiong" initials="Q." surname="Xiong">
			  <organization>ZTE Corporation</organization>
			</author>
			<author fullname="Jeong-dong Ryoo" initials="J." surname="Ryoo">
			  <organization>ETRI</organization>
			</author>
			<author fullname="zhushiyin" initials="" surname="zhushiyin">
			  <organization>New H3C Technologies</organization>
			</author>
			<author fullname="Xuesong Geng" initials="X." surname="Geng">
			  <organization>Huawei</organization>
			</author>
			<date day="22" month="May" year="2024"/>
		  </front>
		</reference>
		
		  <reference anchor="I-D.xiong-detnet-enhanced-detnet-gap-analysis" target="https://datatracker.ietf.org/doc/html/draft-xiong-detnet-enhanced-detnet-gap-analysis-03">
			<front>
			  <title>Gap Analysis for Enhanced DetNet</title>
			  <author fullname="Quan Xiong" initials="Q." surname="Xiong">
				<organization>ZTE Corporation</organization>
			  </author>
			  <author fullname="Aihua Liu" initials="A." surname="Liu">
				<organization>ZTE Corporation</organization>
			  </author>
			  <date day="25" month="February" year="2024"/>
			  </front>
		  </reference>
		  <reference anchor="I-D.song-opsawg-ifit-framework" target="https://datatracker.ietf.org/doc/html/draft-song-opsawg-ifit-framework-21">
			<front>
			  <title>Framework for In-situ Flow Information Telemetry</title>
			  <author fullname="Haoyu Song" initials="H." surname="Song">
				<organization>Futurewei</organization>
			  </author>
			  <author fullname="Fengwei Qin" initials="F." surname="Qin">
				<organization>China Mobile</organization>
			  </author>
			  <author fullname="Huanan Chen" initials="H." surname="Chen">
				<organization>China Telecom</organization>
			  </author>
			  <author fullname="Jaewhan Jin" initials="J." surname="Jin">
				<organization>LG U+</organization>
			  </author>
			  <author fullname="Jongyoon Shin" initials="J." surname="Shin">
				<organization>SK Telecom</organization>
			  </author>
			  <date day="23" month="October" year="2023"/>
			</front>
		  </reference>
		  
		  <reference anchor="I-D.ietf-detnet-ip-oam" target="https://datatracker.ietf.org/doc/html/draft-ietf-detnet-ip-oam-13">
			<front>
			  <title>Operations, Administration, and Maintenance (OAM) for Deterministic Networks (DetNet) with IP Data Plane</title>
			  <author fullname="Greg Mirsky" initials="G." surname="Mirsky">
				<organization>Ericsson</organization>
			  </author>
			  <author fullname="Mach Chen" initials="M." surname="Chen">
				<organization>Huawei</organization>
			  </author>
			  <author fullname="David L. Black" initials="D. L." surname="Black">
				<organization>Dell EMC</organization>
			  </author>
			  <date day="14" month="February" year="2024"/>
			</front>
		  </reference>
		  
		  <reference anchor="IEEE802.1CB" target="https://ieeexplore.ieee.org/document/8091139">
			<front>
		  <title>IEEE Standard for Local and metropolitan area networks--Frame Replication and Elimination for Reliability</title>
		  <author>
			<organization/>
		  </author>
		  <date year="2017"/>
			</front>
		  </reference>
		  

		  
		  
		  <reference anchor="I-D.eckert-detnet-tcqf" target="https://datatracker.ietf.org/doc/html/draft-eckert-detnet-tcqf-05">
			<front>
			  <title>Deterministic Networking (DetNet) Data Plane - Tagged Cyclic Queuing and Forwarding (TCQF) for bounded latency with low jitter in large scale DetNets</title>
			  <author fullname="Toerless Eckert" initials="T. T." surname="Eckert">
				<organization>Futurewei Technologies USA</organization>
			  </author>
			  <author fullname="Yizhou Li" initials="Y." surname="Li">
				<organization>Huawei Technologies</organization>
			  </author>
			  <author fullname="Stewart Bryant" initials="S." surname="Bryant">
				<organization>University of Surrey ICS</organization>
			  </author>
			  <author fullname="Andrew G. Malis" initials="A. G." surname="Malis">
				<organization>Malis Consulting</organization>
			  </author>
			  <author fullname="Jeong-dong Ryoo" initials="J." surname="Ryoo">
				<organization>ETRI</organization>
			  </author>
			  <author fullname="Peng Liu" initials="P." surname="Liu">
				<organization>China Mobile</organization>
			  </author>
			  <author fullname="Guangpeng Li" initials="G." surname="Li">
				<organization>Huawei Technologies</organization>
			  </author>
			  <author fullname="Shoushou Ren" initials="S." surname="Ren">
				<organization>Huawei Technologies</organization>
			  </author>
			  <author fullname="Fan Yang" initials="F." surname="Yang">
				<organization>Huawei Technologies</organization>
			  </author>
			  <date day="5" month="January" year="2024"/>
			  <abstract>
				<t>This memo specifies a forwarding method for bounded latency and bounded jitter for Deterministic Networks and is a variant of the IEEE TSN Cyclic Queuing and Forwarding (CQF) method. Tagged CQF (TCQF) supports more than 2 cycles and indicates the cycle number via an existing or new packet header field called the tag to replace the cycle mapping in CQF which is based purely on synchronized reception clock. This memo standardizes TCQF as a mechanism independent of the tagging method used. It also specifies tagging via the (1) the existing MPLS packet Traffic Class (TC) field for MPLS packets, (2) the IP/IPv6 DSCP field for IP/IPv6 packets, and (3) a new TCQF Option header for IPv6 packets. Target benefits of TCQF include low end-to-end jitter, ease of high- speed hardware implementation, optional ability to support large number of flow in large networks via DiffServ style aggregation by applying TCQF to the DetNet aggregate instead of each DetNet flow individually, and support of wide-area DetNet networks with arbitrary link latencies and latency variations as well as low accuracy clock synchronization.</t>
			  </abstract>
			</front>
		  </reference>
		  
		    <reference anchor="I-D.ietf-detnet-dataplane-taxonomy" target="https://datatracker.ietf.org/doc/html/draft-ietf-detnet-dataplane-taxonomy-00">
				<front>
				  <title>Dataplane Enhancement Taxonomy</title>
				  <author fullname="Jinoo Joung" initials="J." surname="Joung">
					<organization>Sangmyung University</organization>
				  </author>
				  <author fullname="Xuesong Geng" initials="X." surname="Geng">
					<organization>Huawei</organization>
				  </author>
				  <author fullname="Shaofu Peng" initials="S." surname="Peng">
					<organization>ZTE Corporation</organization>
				  </author>
				  <author fullname="Toerless Eckert" initials="T. T." surname="Eckert">
					<organization>Futurewei Technologies</organization>
				  </author>
				  <date day="24" month="May" year="2024"/>
				  <abstract>
					<t>This draft is to facilitate the understanding of the data plane enhancement solutions, which are suggested currently or can be suggested in the future, for deterministic networking. This draft provides criteria for classifying data plane solutions. Examples of each category are listed, along with reasons where necessary. Strengths and limitations of the categories are described. Suitability of the solutions for various services of deterministic networking are also briefly mentioned.</t>
				  </abstract>
				</front>
			  </reference>
		  <reference anchor="I-D.dang-queuing-with-multiple-cyclic-buffers" target="https://datatracker.ietf.org/doc/html/draft-dang-queuing-with-multiple-cyclic-buffers-00">
			  <front>
				<title>A Queuing Mechanism with Multiple Cyclic Buffers</title>
				<author fullname="Bingyang Liu" initials="B." surname="Liu">
				  <organization>Huawei</organization>
				</author>
				<author fullname="Joanna Dang" initials="J." surname="Dang">
				  <organization>Huawei</organization>
				</author>
				<date day="22" month="February" year="2021"/>
				<abstract>
				  <t>This document presents a queuing mechanism with multiple cyclic buffers.</t>
				</abstract>
			  </front>
			</reference>
			<reference anchor="I-D.chen-detnet-sr-based-bounded-latency" target="https://datatracker.ietf.org/doc/html/draft-chen-detnet-sr-based-bounded-latency-03">
			  <front>
				<title>Segment Routing (SR) Based Bounded Latency</title>
				<author fullname="Mach Chen" initials="M." surname="Chen">
				  <organization>Huawei</organization>
				</author>
				<author fullname="Xuesong Geng" initials="X." surname="Geng">
				  <organization>Huawei</organization>
				</author>
				<author fullname="Zhenqiang Li" initials="Z." surname="Li">
				  <organization>China Mobile</organization>
				</author>
				<author fullname="Jinoo Joung" initials="J." surname="Joung">
				  <organization>Sangmyung University</organization>
				</author>
				<author fullname="Jeong-dong Ryoo" initials="J." surname="Ryoo">
				  <organization>ETRI</organization>
				</author>
				<date day="7" month="July" year="2023"/>
				<abstract>
				  <t>One of the goals of DetNet is to provide bounded end-to-end latency for critical flows. This document defines how to leverage Segment Routing (SR) to implement bounded latency. Specifically, the SR Identifier (SID) is used to specify transmission time (cycles) of a packet. When forwarding devices along the path follow the instructions carried in the packet, the bounded latency is achieved. This is called Cycle Specified Queuing and Forwarding (CSQF) in this document. Since SR is a source routing technology, no per-flow state is maintained at intermediate and egress nodes, SR-based CSQF naturally supports flow aggregation that is deemed to be a key capability to allow DetNet to scale to large networks.</t>
				</abstract>
			  </front>
			</reference>
			<reference anchor="I-D.peng-detnet-packet-timeslot-mechanism" target="https://datatracker.ietf.org/doc/html/draft-peng-detnet-packet-timeslot-mechanism-07">
			  <front>
				<title>Timeslot Queueing and Forwarding Mechanism</title>
				<author fullname="Shaofu Peng" initials="S." surname="Peng">
				  <organization>ZTE</organization>
				</author>
				<author fullname="Peng Liu" initials="P." surname="Liu">
				  <organization>China Mobile</organization>
				</author>
				<author fullname="Kashinath Basu" initials="K." surname="Basu">
				  <organization>Oxford Brookes University</organization>
				</author>
				<author fullname="Aihua Liu" initials="A." surname="Liu">
				  <organization>ZTE</organization>
				</author>
				<author fullname="Dong Yang" initials="D." surname="Yang">
				  <organization>Beijing Jiaotong University</organization>
				</author>
				<author fullname="Guoyu Peng" initials="G." surname="Peng">
				  <organization>Beijing University of Posts and Telecommunications</organization>
				</author>
				<date day="20" month="June" year="2024"/>
				<abstract>
				  <t>IP/MPLS networks use packet switching (with the feature store-and- forward) and are based on statistical multiplexing. Statistical multiplexing is essentially a variant of time division multiplexing, which refers to the asynchronous and dynamic allocation of link timeslot resources. In this case, the service flow does not occupy a fixed timeslot, and the length of the timeslot is not fixed, but depends on the size of the packet. Statistical multiplexing has certain challenges and complexity in meeting deterministic QoS, and its delay performance is dependent on the used queueing mechanism. This document further describes a generic time division multiplexing scheme in IP/MPLS networks, which we call timeslot queueing and forwarding (TQF) mechanism. TQF is an enhancement based on TSN TAS, which defines a cyclic period consisting of multiple timeslots, and a flow is assigned to be transmited within one or more dedicated timeslots.</t>
				</abstract>
			  </front>
			</reference>
			
			<reference anchor="I-D.peng-detnet-deadline-based-forwarding" target="https://datatracker.ietf.org/doc/html/draft-peng-detnet-deadline-based-forwarding-10">
			  <front>
				<title>Deadline Based Deterministic Forwarding</title>
				<author fullname="Shaofu Peng" initials="S." surname="Peng">
				  <organization>ZTE Corporation</organization>
				</author>
				<author fullname="Zongpeng Du" initials="Z." surname="Du">
				  <organization>China Mobile</organization>
				</author>
				<author fullname="Kashinath Basu" initials="K." surname="Basu">
				  <organization>Oxford Brookes University</organization>
				</author>
				<author fullname="zuopin cheng" initials="" surname="cheng">
				  <organization>New H3C Technologies</organization>
				</author>
				<author fullname="Dong Yang" initials="D." surname="Yang">
				  <organization>Beijing Jiaotong University</organization>
				</author>
				<author fullname="Chang Liu" initials="C." surname="Liu">
				  <organization>China Unicom</organization>
				</author>
				<date day="20" month="June" year="2024"/>
				<abstract>
				  <t>This document describes a deterministic forwarding mechanism to IP/ MPLS network, as well as corresponding resource reservation, admission check, policing, etc, to provide guaranteed latency. Especially, latency compensation with core stateless is discussed to replace reshaping to be suitable for Diff-Serv architecture [RFC2475].</t>
				</abstract>
			  </front>
			</reference>
			
			<reference anchor="I-D.joung-detnet-stateless-fair-queuing" target="https://datatracker.ietf.org/doc/html/draft-joung-detnet-stateless-fair-queuing-02">
			  <front>
				<title>Latency Guarantee with Stateless Fair Queuing</title>
				<author fullname="Jinoo Joung" initials="J." surname="Joung">
				  <organization>Sangmyung University</organization>
				</author>
				<author fullname="Jeong-dong Ryoo" initials="J." surname="Ryoo">
				  <organization>ETRI</organization>
				</author>
				<author fullname="Taesik Cheung" initials="T." surname="Cheung">
				  <organization>ETRI</organization>
				</author>
				<author fullname="Yizhou Li" initials="Y." surname="Li">
				  <organization>Huawei</organization>
				</author>
				<author fullname="Peng Liu" initials="P." surname="Liu">
				  <organization>China Mobile</organization>
				</author>
				<date day="29" month="February" year="2024"/>
				<abstract>
				  <t>This document specifies the framework and the operational procedure for deterministic networking with work conserving packet schedulers that guarantee end-to-end latency bounds to flows. Schedulers in core nodes of the network do not need to maintain flow states. Instead, the entrance node of a flow marks an ideal service completion time, called Finish Time (FT), of a packet in the packet header. The subsequent core nodes update FT by adding a delay factor, which is a function of the flow and upstream nodes. The packets in the queue are served in the ascending order of the FT. This technique is called Fair Queuing (FQ). The result is that flows are isolated from each other almost perfectly. The latency bound of a flow depends only on the flow's intrinsic parameters, except the link capacities and the maximum packet lengths among other flows sharing each output link with the flow.</t>
				</abstract>
			  </front>
			</reference>
			
			  <reference anchor="I-D.eckert-detnet-glbf" target="https://datatracker.ietf.org/doc/html/draft-eckert-detnet-glbf-02">
				<front>
				  <title>Deterministic Networking (DetNet) Data Plane - guaranteed Latency Based Forwarding (gLBF) for bounded latency with low jitter and asynchronous forwarding in Deterministic Networks</title>
				  <author fullname="Toerless Eckert" initials="T. T." surname="Eckert">
					<organization>Futurewei Technologies USA</organization>
				  </author>
				  <author fullname="Alexander Clemm" initials="A." surname="Clemm">
					<organization>Futurewei Technologies USA</organization>
				  </author>
				  <author fullname="Stewart Bryant" initials="S." surname="Bryant">
					<organization>Independent</organization>
				  </author>
				  <author fullname="Stefan Hommes" initials="S." surname="Hommes">
					<organization>ZF Friedrichshafen AG</organization>
				  </author>
				  <date day="5" month="January" year="2024"/>
				  <abstract>
					<t>This memo proposes a mechanism called "guaranteed Latency Based Forwarding" (gLBF) as part of DetNet for hop-by-hop packet forwarding with per-hop deterministically bounded latency and minimal jitter. gLBF is intended to be useful across a wide range of networks and applications with need for high-precision deterministic networking services, including in-car networks or networks used for industrial automation across on factory floors, all the way to ++100Gbps country-wide networks. Contrary to other mechanisms, gLBF does not require network wide clock synchronization, nor does it need to maintain per-flow state at network nodes, avoiding drawbacks of other known methods while leveraging their advantages. Specifically, gLBF uses the queuing model and calculus of Urgency Based Scheduling (UBS, [UBS]), which is used by TSN Asynchronous Traffic Shaping [TSN-ATS]. gLBF is intended to be a plug-in replacement for TSN-ATN or as a parallel mechanism beside TSN-ATS because it allows to keeping the same controller-plane design which is selecting paths for TSN-ATS, sizing TSN-ATS queues, calculating latencies and admitting flows to calculated paths for calculated latencies. In addition to reducing the jitter compared to TSN-ATS by additional buffering (dampening) in the network, gLBF also eliminates the need for per-flow, per-hop state maintenance required by TSN-ATS. This avoids the need to signal per-flow state to every hop from the controller-plane and associated scaling problems. It also reduces implementation cost for high-speed networking hardware due to the avoidance of additional high-speed speed read/write memory access to retrieve, process and update per-flow state variables for a large number of flows.</t>
				  </abstract>
				</front>
			  </reference>

		  
		  
		  
		  
	  </references>
    </references>
 
 </back>
</rfc>
