summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc9024.txt
diff options
context:
space:
mode:
Diffstat (limited to 'doc/rfc/rfc9024.txt')
-rw-r--r--doc/rfc/rfc9024.txt657
1 files changed, 657 insertions, 0 deletions
diff --git a/doc/rfc/rfc9024.txt b/doc/rfc/rfc9024.txt
new file mode 100644
index 0000000..5bef2f6
--- /dev/null
+++ b/doc/rfc/rfc9024.txt
@@ -0,0 +1,657 @@
+
+
+
+
+Internet Engineering Task Force (IETF) B. Varga, Ed.
+Request for Comments: 9024 J. Farkas
+Category: Standards Track Ericsson
+ISSN: 2070-1721 A. Malis
+ Malis Consulting
+ S. Bryant
+ Futurewei Technologies
+ D. Fedyk
+ LabN Consulting, L.L.C.
+ June 2021
+
+
+Deterministic Networking (DetNet) Data Plane: IEEE 802.1 Time-Sensitive
+ Networking over MPLS
+
+Abstract
+
+ This document specifies the Deterministic Networking data plane when
+ Time-Sensitive Networking (TSN) networks are interconnected over a
+ DetNet MPLS network.
+
+Status of This Memo
+
+ This is an Internet Standards Track document.
+
+ This document is a product of the Internet Engineering Task Force
+ (IETF). It represents the consensus of the IETF community. It has
+ received public review and has been approved for publication by the
+ Internet Engineering Steering Group (IESG). Further information on
+ Internet Standards is available in Section 2 of RFC 7841.
+
+ Information about the current status of this document, any errata,
+ and how to provide feedback on it may be obtained at
+ https://www.rfc-editor.org/info/rfc9024.
+
+Copyright Notice
+
+ Copyright (c) 2021 IETF Trust and the persons identified as the
+ document authors. All rights reserved.
+
+ This document is subject to BCP 78 and the IETF Trust's Legal
+ Provisions Relating to IETF Documents
+ (https://trustee.ietf.org/license-info) in effect on the date of
+ publication of this document. Please review these documents
+ carefully, as they describe your rights and restrictions with respect
+ to this document. Code Components extracted from this document must
+ include Simplified BSD License text as described in Section 4.e of
+ the Trust Legal Provisions and are provided without warranty as
+ described in the Simplified BSD License.
+
+Table of Contents
+
+ 1. Introduction
+ 2. Terminology
+ 2.1. Terms Used in This Document
+ 2.2. Abbreviations
+ 2.3. Requirements Language
+ 3. IEEE 802.1 TSN over DetNet MPLS Data Plane Scenario
+ 4. DetNet MPLS Data Plane
+ 4.1. Overview
+ 4.2. TSN over DetNet MPLS Encapsulation
+ 5. TSN over MPLS Data Plane Procedures
+ 5.1. Edge Node TSN Procedures
+ 5.2. Edge Node DetNet Service Proxy Procedures
+ 5.3. Edge Node DetNet Service and Forwarding Sub-Layer
+ Procedures
+ 6. Controller Plane (Management and Control) Considerations
+ 7. Security Considerations
+ 8. IANA Considerations
+ 9. References
+ 9.1. Normative References
+ 9.2. Informative References
+ Acknowledgements
+ Authors' Addresses
+
+1. Introduction
+
+ The Time-Sensitive Networking Task Group (TSN TG) within the IEEE
+ 802.1 Working Group deals with deterministic services through IEEE
+ 802 networks. Deterministic Networking (DetNet) defined by the IETF
+ is a service that can be offered by an L3 network to DetNet flows.
+ General background and concepts of DetNet can be found in [RFC8655].
+
+ This document specifies the use of a DetNet MPLS network to
+ interconnect TSN nodes/network segments. The DetNet MPLS data plane
+ is defined in [RFC8964].
+
+2. Terminology
+
+2.1. Terms Used in This Document
+
+ This document uses the terminology and concepts established in the
+ DetNet architecture [RFC8655] [RFC8938] [RFC8964]. TSN-specific
+ terms are defined in the TSN TG of the IEEE 802.1 Working Group. The
+ reader is assumed to be familiar with these documents and their
+ terminology.
+
+2.2. Abbreviations
+
+ The following abbreviations are used in this document:
+
+ AC Attachment Circuit
+
+ CE Customer Edge equipment
+
+ d-CW DetNet Control Word
+
+ DetNet Deterministic Networking
+
+ DF DetNet Flow
+
+ FRER Frame Replication and Elimination for Redundancy (TSN
+ function)
+
+ L2 Layer 2
+
+ L2VPN Layer 2 Virtual Private Network
+
+ L3 Layer 3
+
+ LSP Label Switched Path
+
+ LSR Label Switching Router
+
+ MPLS Multiprotocol Label Switching
+
+ MPLS-TE Multiprotocol Label Switching - Traffic Engineering
+
+ NSP Native Service Processing
+
+ OAM Operations, Administration, and Maintenance
+
+ PE Provider Edge
+
+ PREOF Packet Replication, Elimination and Ordering Functions
+
+ PW Pseudowire
+
+ S-PE Switching Provider Edge
+
+ T-PE Terminating Provider Edge
+
+ TSN Time-Sensitive Network
+
+2.3. Requirements Language
+
+ The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
+ "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
+ "OPTIONAL" in this document are to be interpreted as described in
+ BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all
+ capitals, as shown here.
+
+3. IEEE 802.1 TSN over DetNet MPLS Data Plane Scenario
+
+ Figure 1 shows IEEE 802.1 TSN end stations operating over a TSN-aware
+ DetNet service running over an MPLS network. DetNet edge nodes sit
+ at the boundary of a DetNet domain. They are responsible for mapping
+ non-DetNet-aware L2 traffic to DetNet services. They also support
+ the imposition and disposition of the required DetNet encapsulation.
+ These are functionally similar to PW T-PE nodes, which use MPLS-TE
+ LSPs. In this example, TSN Streams are simple applications over
+ DetNet flows. The specifics of this operation are discussed later in
+ this document.
+
+ TSN Edge Transit Edge TSN
+ End System Node Node Node End System
+ (T-PE) (LSR) (T-PE)
+
+ +----------+ +----------+
+ | TSN | <-------- End-to-End TSN Service ---------> | TSN |
+ | Applic. | | Applic. |
+ +----------+ +.........+ +.........+ +----------+
+ | | | \S-Proxy: :S-Proxy/ | | |
+ | TSN | | +.+---+<-- DetNet flow -->+---+ | | | TSN |
+ | | |TSN| |Svc| |Svc| |TSN| | |
+ +----------+ +---+ +---+ +----------+ +---+ +---+ +----------+
+ | L2 | | L2| |Fwd| |Forwarding| |Fwd| |L2 | | L2 |
+ +------.---+ +-.-+ +-.-+ +---.----.-+ +--.+ +-.-+ +---.------+
+ : Link : / ,-----. \ : Link : / ,-----. \
+ +........+ +-[ Sub- ]-+ +........+ +-[ TSN ]-+
+ [Network] [Network]
+ `-----' `-----'
+
+ |<------ DetNet MPLS ------>|
+ |<---------------------- TSN --------------------->|
+
+ Figure 1: A TSN over DetNet MPLS-Enabled Network
+
+ In this example, edge nodes provide a service proxy function that
+ "associates" the DetNet flows and native flows (i.e., TSN Streams) at
+ the edge of the DetNet domain. TSN Streams are treated as App-flows
+ for DetNet. The whole DetNet domain behaves as a TSN relay node for
+ the TSN Streams. The service proxy behaves as a port of that TSN
+ relay node.
+
+ Figure 2 illustrates how DetNet can provide services for IEEE 802.1
+ TSN end systems, CE1 and CE2, over a DetNet-enabled MPLS network.
+ Edge nodes E1 and E2 insert and remove the required DetNet data plane
+ encapsulation. The 'X' in the edge nodes and relay node, R1,
+ represent a potential DetNet compound flow packet replication and
+ elimination point. This conceptually parallels L2VPN services and
+ could leverage existing related solutions as discussed below.
+
+ TSN |<------- End-to-End DetNet Service ------>| TSN
+ Service | Transit Transit | Service
+ TSN (AC) | |<-Tnl->| |<-Tnl->| | (AC) TSN
+ End | V V 1 V V 2 V V | End
+ System | +--------+ +--------+ +--------+ | System
+ +---+ | | E1 |=======| R1 |=======| E2 | | +---+
+ | |--|----|._X_....|..DF1..|.._ _...|..DF3..|...._X_.|---|---| |
+ |CE1| | | \ | | X | | / | | |CE2|
+ | | | \_.|..DF2..|._/ \_..|..DF4..|._/ | | |
+ +---+ | |=======| |=======| | +---+
+ ^ +--------+ +--------+ +--------+ ^
+ | Edge Node Relay Node Edge Node |
+ | (T-PE) (S-PE) (T-PE) |
+ | |
+ |<- TSN -> <------- TSN over DetNet MPLS -------> <- TSN ->|
+ | |
+ |<-------- Time-Sensitive Networking (TSN) Service ------->|
+
+ X = Service protection
+ DFx = DetNet member flow x over a TE LSP
+ AC = Attachment Circuit
+ Tnl = Tunnel
+
+ Figure 2: IEEE 802.1TSN over DetNet
+
+4. DetNet MPLS Data Plane
+
+4.1. Overview
+
+ The basic approach defined in [RFC8964] supports the DetNet service
+ sub-layer based on existing PW encapsulations and mechanisms and
+ supports the DetNet forwarding sub-layer based on existing MPLS
+ Traffic Engineering encapsulations and mechanisms.
+
+ A node operating on a DetNet flow in the DetNet service sub-layer,
+ i.e., a node processing a DetNet packet that has the S-Label as top
+ of stack, uses the local context associated with that S-Label. For
+ example, a received F-Label can be used to determine what local
+ DetNet operation(s) is applied to that packet. An S-Label may be
+ unique when taken from the platform label space [RFC3031], which
+ would enable correct DetNet flow identification regardless of which
+ input interface or LSP the packet arrives on. The service sub-layer
+ functions (i.e., PREOF) use a DetNet control word (d-CW).
+
+ The DetNet MPLS data plane builds on MPLS Traffic Engineering
+ encapsulations and mechanisms to provide a forwarding sub-layer that
+ is responsible for providing resource allocation and explicit routes.
+ The forwarding sub-layer is supported by one or more forwarding
+ labels (F-Labels).
+
+ DetNet edge/relay nodes are DetNet service sub-layer aware,
+ understand the particular needs of DetNet flows, and provide both
+ DetNet service and forwarding sub-layer functions. They add, remove,
+ and process d-CWs, S-Labels, and F-Labels as needed. MPLS DetNet
+ nodes and transit nodes include DetNet forwarding sub-layer functions
+ -- notably, support for explicit routes and resource allocation to
+ eliminate (or reduce) congestion loss and jitter. Unlike other
+ DetNet node types, transit nodes provide no service sub-layer
+ processing.
+
+4.2. TSN over DetNet MPLS Encapsulation
+
+ The basic encapsulation approach is to treat a TSN Stream as an App-
+ flow from the DetNet MPLS perspective. The corresponding example is
+ shown in Figure 3. Note that three example flows are shown in the
+ figure.
+
+ /-> +------+ +------+ +------+ TSN ^ ^
+ MPLS | | X | | X | | X |<- Appli : :
+ App-Flow <-+ +------+ +------+ +------+ cation : :(1)
+ | |TSN-L2| |TSN-L2| |TSN-L2| : v
+ \-> +---+======+--+======+--+======+-----+ :
+ | d-CW | | d-CW | | d-CW | :
+ DetNet-MPLS +------+ +------+ +------+ :(2)
+ |Labels| |Labels| |Labels| v
+ +---+======+--+======+--+======+-----+
+ Link/Sub-Network | L2 | | TSN | | UDP |
+ +------+ +------+ +------+
+ | IP |
+ +------+
+ | L2 |
+ +------+
+ (1) TSN Stream
+ (2) DetNet MPLS Flow
+
+ Figure 3: Examples of TSN over MPLS Encapsulation Formats
+
+ In the figure, "Application" indicates the application payload
+ carried by the TSN network. "MPLS App-Flow" indicates that the TSN
+ Stream is the payload from the perspective of the DetNet MPLS data
+ plane defined in [RFC8964]. A single DetNet MPLS flow can aggregate
+ multiple TSN Streams.
+
+ | Note: Network fragmentation for DetNet is not supported and
+ | MUST be avoided. The reason for this is that network
+ | fragmentation is not consistent with the packet delivery times
+ | needed for DetNet. Therefore, when IP is used as the sub-
+ | network, IPv6 fragmentation MUST NOT be used, and IPv4 packets
+ | MUST be sent with the DF bit set. This means that the network
+ | operator MUST ensure that all the DetNet encapsulation overhead
+ | plus the maximum TSN App-flow frame size does not exceed the
+ | DetNet network's MTU.
+
+5. TSN over MPLS Data Plane Procedures
+
+ The description of edge node procedures and functions for TSN over
+ DetNet MPLS scenarios follows the concepts from [RFC3985] and covers
+ the edge node components shown in Figure 1. In this section, the
+ following procedures of DetNet edge nodes are described:
+
+ * TSN related (Section 5.1)
+
+ * DetNet Service Proxy (Section 5.2)
+
+ * DetNet service and forwarding sub-layer (Section 5.3)
+
+ The subsections describe procedures for forwarding packets by DetNet
+ edge nodes, where such packets are received from either directly
+ connected CEs (TSN nodes) or some other DetNet edge nodes.
+
+5.1. Edge Node TSN Procedures
+
+ The TSN TG of the IEEE 802.1 Working Group has defined (and is
+ defining) a number of amendments to [IEEE8021Q] that provide zero
+ congestion loss and bounded latency in bridged networks.
+ [IEEE8021CB] defines packet replication and elimination functions for
+ a TSN network.
+
+ The implementation of a TSN entity (i.e., TSN packet processing
+ functions) must be compliant with the relevant IEEE 802.1 standards.
+
+ TSN-specific functions are executed on the data received by the
+ DetNet edge node from the connected CE before being forwarded to
+ connected CE(s) or presented to the DetNet service proxy function for
+ transmission across the DetNet domain. TSN-specific functions are
+ also executed on the data received from a DetNet PW by a PE before
+ the data is output on the AC(s).
+
+ The TSN packet processing function(s) of edge nodes (T-PE) belongs to
+ the NSP [RFC3985] block. This is similar to other functionalities
+ being defined by standards bodies other than the IETF (for example,
+ in the case of Ethernet, stripping, overwriting, or adding VLAN tags,
+ etc.). Depending on the TSN role of the edge node in the end-to-end
+ TSN service, selected TSN functions are supported.
+
+ When a PE receives a packet from a CE on a given AC with DetNet
+ service, it first checks via Stream identification (see Clause 6 of
+ [IEEE8021CB] and [IEEEP8021CBdb]) whether the packet belongs to a
+ configured TSN Stream (i.e., App-flow from the DetNet perspective).
+ If no Stream ID is matched and no other (VPN) service is configured
+ for the AC, then the packet MUST be dropped. If there is a matching
+ TSN Stream, then the Stream-ID-specific TSN functions are executed
+ (e.g., ingress policing, header field manipulation in the case of
+ active Stream identification, FRER, etc.). Source Media Access
+ Control (MAC) lookup may also be used for local MAC address learning.
+
+ If the PE decides to forward the packet, the packet MUST be forwarded
+ according to the TSN-Stream-specific configuration to connected CE(s)
+ (in case of local bridging) and/or to the DetNet service proxy (in
+ case of forwarding to remote CE(s)). If there are no TSN-Stream-
+ specific forwarding configurations, the PE MUST flood the packet to
+ other locally attached CE(s) and to the DetNet service proxy. If the
+ administrative policy on the PE does not allow flooding, the PE MUST
+ drop the packet.
+
+ When a TSN entity of the PE receives a packet from the DetNet service
+ proxy, it first checks via Stream identification (see Clause 6 of
+ [IEEE8021CB] and [IEEEP8021CBdb]) whether the packet belongs to a
+ configured TSN Stream. If no Stream ID is matched, then the packet
+ is dropped. If there is a matching TSN Stream, then the Stream-ID-
+ specific TSN functions are executed (e.g., header field manipulation
+ in case of active Stream identification, FRER, etc.). Source MAC
+ lookup may also be used for local MAC address learning.
+
+ If the PE decides to forward the packet, the packet is forwarded
+ according to the TSN-Stream-specific configuration to connected
+ CE(s). If there are no TSN-Stream-specific forwarding
+ configurations, the PE floods the packet to locally attached CE(s).
+ If the administrative policy on the PE does not allow flooding, the
+ PE drops the packet.
+
+ Implementations of this document SHALL use management and control
+ information to ensure TSN-specific functions of the edge node
+ according to the expectations of the connected TSN network.
+
+5.2. Edge Node DetNet Service Proxy Procedures
+
+ The service proxy function maps between App-flows and DetNet flows.
+ The DetNet edge node TSN entity MUST support the TSN Stream
+ identification functions (as defined in Clause 6 of [IEEE8021CB] and
+ [IEEEP8021CBdb]) and the related managed objects (as defined in
+ Clause 9 of [IEEE8021CB] and [IEEEP8021CBdb]) to recognize the
+ packets related to App-flow. The service proxy presents TSN Streams
+ as an App-flow to a DetNet flow.
+
+ When a DetNet service proxy receives a packet from the TSN entity, it
+ MUST check whether such an App-flow is present in its mapping table.
+ If present, it associates the internal DetNet flow ID to the packet
+ and MUST forward it to the DetNet service and forwarding sub-layers.
+ If no match is found, it MUST drop the packet.
+
+ When a DetNet service proxy receives a packet from the DetNet service
+ and forwarding sub-layers, it MUST be forwarded to the edge node TSN
+ entity.
+
+ Implementations of this document SHALL use management and control
+ information to map a TSN Stream to a DetNet flow. N:1 mapping
+ (aggregating multiple TSN Streams in a single DetNet flow) SHALL be
+ supported. The management or control function that provisions flow
+ mapping SHALL ensure that adequate resources are allocated and
+ configured to fulfill the service requirements of the mapped flows.
+
+ Due to the (intentional) similarities of the DetNet PREOF and TSN
+ FRER functions, service protection function interworking is possible
+ between the TSN and the DetNet domains. Such service protection
+ interworking scenarios might require copying of sequence number
+ fields from TSN (L2) to PW (MPLS) encapsulation. However, such
+ interworking is out of scope in this document and is left for further
+ study.
+
+5.3. Edge Node DetNet Service and Forwarding Sub-Layer Procedures
+
+ In the design presented in [RFC8964], an MPLS service label (the
+ S-Label), similar to a PW label [RFC3985], is used to identify both
+ the DetNet flow identity and the MPLS payload type. The DetNet
+ sequence number is carried in the d-CW, which carries the Data/OAM
+ discriminator as well. In [RFC8964], two sequence number sizes are
+ supported: a 16-bit sequence number and a 28-bit sequence number.
+
+ PREOF functions and the provided service recovery are available only
+ within the DetNet domain as the DetNet flow ID and the DetNet
+ sequence number are not valid outside the DetNet network. MPLS
+ (DetNet) edge nodes terminate all related information elements
+ encoded in the MPLS labels.
+
+ When a PE receives a packet from the service proxy function, it MUST
+ handle the packet as defined in [RFC8964].
+
+ When a PE receives an MPLS packet from a remote PE, then, after
+ processing the MPLS label stack, if the top MPLS label ends up being
+ a DetNet S-Label that was advertised by this node, then the PE MUST
+ forward the packet according to the configured DetNet service and
+ forwarding sub-layer rules to other PE nodes or via the DetNet
+ service proxy function towards locally connected CE(s).
+
+ For further details on DetNet service and forwarding sub-layers, see
+ [RFC8964].
+
+6. Controller Plane (Management and Control) Considerations
+
+ Information related to TSN Stream(s) to DetNet flow mapping is
+ required only for the service proxy function of MPLS (DetNet) edge
+ nodes. From the data plane perspective, there is no practical
+ difference based on the origin of flow-mapping-related information
+ (management plane or control plane).
+
+ The following summarizes the set of information that is needed to
+ configure TSN over DetNet MPLS:
+
+ * TSN-related configuration information according to the TSN role of
+ the DetNet MPLS node, as per [IEEE8021Q], [IEEE8021CB], and
+ [IEEEP8021CBdb].
+
+ * DetNet MPLS-related configuration information according to the
+ DetNet role of the DetNet MPLS node, as per [RFC8964].
+
+ * App-flow identification information to map received TSN Stream(s)
+ to the DetNet flow. Parameters of TSN Stream identification are
+ defined in [IEEE8021CB] and [IEEEP8021CBdb].
+
+ This information MUST be provisioned per DetNet flow.
+
+ Mappings between DetNet and TSN management and control planes are out
+ of scope of the document. Some of the challenges are highlighted
+ below.
+
+ MPLS DetNet edge nodes are a member of both the DetNet domain and the
+ connected TSN network. From the TSN network perspective, the MPLS
+ (DetNet) edge node has a "TSN relay node" role, so TSN-specific
+ management and control plane functionalities must be implemented.
+ There are many similarities in the management plane techniques used
+ in DetNet and TSN, but that is not the case for the control plane
+ protocols. For example, RSVP-TE and MSRP behave differently.
+ Therefore, management and control plane design is an important aspect
+ of scenarios where mapping between DetNet and TSN is required.
+
+ Note that as the DetNet network is just a portion of the end-to-end
+ TSN path (i.e., single hop from the Ethernet perspective), some
+ parameters (e.g., delay) may differ significantly. Since there is no
+ interworking function, the bandwidth of the DetNet network is assumed
+ to be set large enough to handle all TSN flows it will support. At
+ the egress of the DetNet domain, the MPLS headers are stripped, and
+ the TSN flow continues on as a normal TSN flow.
+
+ In order to use a DetNet network to interconnect TSN segments, TSN-
+ specific information must be converted to DetNet-domain-specific
+ information. TSN Stream ID(s) and stream-related parameters/
+ requirements must be converted to a DetNet flow ID and flow-related
+ parameters/requirements.
+
+ In some cases, it may be challenging to determine some information
+ related to the egress-node. For example, it may be not trivial to
+ locate the egress point/interface of a TSN Stream with a multicast
+ destination MAC address. Such scenarios may require interaction
+ between control and management plane functions and between DetNet and
+ TSN domains.
+
+ Mapping between DetNet flow identifiers and TSN Stream identifiers,
+ if not provided explicitly, can be done by the service proxy function
+ of an MPLS (DetNet) edge node locally based on information provided
+ for the configuration of the TSN Stream identification functions
+ (e.g., Mask-and-Match Stream identification).
+
+ Triggering the setup/modification of a DetNet flow in the DetNet
+ network is an example where management and/or control plane
+ interactions are required between the DetNet and the TSN network.
+
+ Configuration of TSN-specific functions (e.g., FRER) inside the TSN
+ network is a TSN-domain-specific decision and may not be visible in
+ the DetNet domain. Service protection interworking scenarios are
+ left for further study.
+
+7. Security Considerations
+
+ Security considerations for DetNet are described in detail in
+ [DETNET-SEC]. General security considerations are described in
+ [RFC8655].
+
+ Considerations specific to the DetNet MPLS data plane are summarized
+ and described in [RFC8964], including any application flow types.
+ This document focuses on a scenario where TSN Streams are the
+ application flows for DetNet, which is already covered by those
+ DetNet MPLS data plane security considerations.
+
+8. IANA Considerations
+
+ This document has no IANA actions.
+
+9. References
+
+9.1. Normative References
+
+ [IEEE8021CB]
+ IEEE, "Standard for Local and metropolitan area networks
+ -- Frame Replication and Elimination for Reliability",
+ IEEE 802.1CB-2017, DOI 10.1109/IEEESTD.2017.8091139,
+ October 2017,
+ <https://ieeexplore.ieee.org/document/8091139>.
+
+ [IEEEP8021CBdb]
+ IEEE, "Draft Standard for Local and metropolitan area
+ networks - Frame Replication and Elimination for
+ Reliability - Amendment: Extended Stream Identification
+ Functions", IEEE P802.1CBdb D1.3, April 2021,
+ <https://1.ieee802.org/tsn/802-1cbdb>.
+
+ [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
+ Requirement Levels", BCP 14, RFC 2119,
+ DOI 10.17487/RFC2119, March 1997,
+ <https://www.rfc-editor.org/info/rfc2119>.
+
+ [RFC3031] Rosen, E., Viswanathan, A., and R. Callon, "Multiprotocol
+ Label Switching Architecture", RFC 3031,
+ DOI 10.17487/RFC3031, January 2001,
+ <https://www.rfc-editor.org/info/rfc3031>.
+
+ [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
+ 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
+ May 2017, <https://www.rfc-editor.org/info/rfc8174>.
+
+ [RFC8655] Finn, N., Thubert, P., Varga, B., and J. Farkas,
+ "Deterministic Networking Architecture", RFC 8655,
+ DOI 10.17487/RFC8655, October 2019,
+ <https://www.rfc-editor.org/info/rfc8655>.
+
+ [RFC8938] Varga, B., Ed., Farkas, J., Berger, L., Malis, A., and S.
+ Bryant, "Deterministic Networking (DetNet) Data Plane
+ Framework", RFC 8938, DOI 10.17487/RFC8938, November 2020,
+ <https://www.rfc-editor.org/info/rfc8938>.
+
+ [RFC8964] Varga, B., Ed., Farkas, J., Berger, L., Malis, A., Bryant,
+ S., and J. Korhonen, "Deterministic Networking (DetNet)
+ Data Plane: MPLS", RFC 8964, DOI 10.17487/RFC8964, January
+ 2021, <https://www.rfc-editor.org/info/rfc8964>.
+
+9.2. Informative References
+
+ [DETNET-SEC]
+ Grossman, E., Ed., Mizrahi, T., and A. Hacker,
+ "Deterministic Networking (DetNet) Security
+ Considerations", Work in Progress, Internet-Draft, draft-
+ ietf-detnet-security-16, 2 March 2021,
+ <https://tools.ietf.org/html/draft-ietf-detnet-security-
+ 16>.
+
+ [IEEE8021Q]
+ IEEE, "Standard for Local and Metropolitan Area Networks--
+ Bridges and Bridged Networks", IEEE Std. 802.1Q-2018,
+ DOI 10.1109/IEEESTD.2018.8403927, July 2018,
+ <https://ieeexplore.ieee.org/document/8403927>.
+
+ [RFC3985] Bryant, S., Ed. and P. Pate, Ed., "Pseudo Wire Emulation
+ Edge-to-Edge (PWE3) Architecture", RFC 3985,
+ DOI 10.17487/RFC3985, March 2005,
+ <https://www.rfc-editor.org/info/rfc3985>.
+
+Acknowledgements
+
+ The authors wish to thank Norman Finn, Lou Berger, Craig Gunther,
+ Christophe Mangin, and Jouni Korhonen for their various contributions
+ to this work.
+
+Authors' Addresses
+
+ Balázs Varga (editor)
+ Ericsson
+ Budapest
+ Magyar Tudosok krt. 11.
+ 1117
+ Hungary
+
+ Email: balazs.a.varga@ericsson.com
+
+
+ János Farkas
+ Ericsson
+ Budapest
+ Magyar Tudosok krt. 11.
+ 1117
+ Hungary
+
+ Email: janos.farkas@ericsson.com
+
+
+ Andrew G. Malis
+ Malis Consulting
+
+ Email: agmalis@gmail.com
+
+
+ Stewart Bryant
+ Futurewei Technologies
+
+ Email: sb@stewartbryant.com
+
+
+ Don Fedyk
+ LabN Consulting, L.L.C.
+
+ Email: dfedyk@labn.net