Internet-Draft | Deterministic Networking | July 2023 |
Liu, et al. | Expires 8 January 2024 | [Page] |
Aiming at scaling deterministic networks, this document describes the technical and operational requirements when the network has large variation in latency among hops, great number of flows and/or multiple domains without the same time source. Different deterministic levels of applications co-exist and are transported in such a network. This document also describes the corresponding Deterministic Networking (DetNet) data plane enhancement requirements.¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 8 January 2024.¶
Copyright (c) 2023 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License.¶
Packet networks are evolving from bandwidth-guaranteed Quality of Service (QoS) to latency-guaranteed QoS that guarantees bounded latency and definite latency. Bounded latency and definite latency can be further understood as in-time delivery, in which a packet arrives without exceeding a predetermined time, and on-time delivery, in which a packet arrives at a predetermined time, respectively. In addition, network survivability, which typically guarantees traffic recovery within 50 ms in the event of a network failure, is evolving to a level that guarantees lossless recovery. In order to realize the evolution of QoS and network survivability of these networks, Time-Sensitive Networking (TSN) technology and Deterministic Networking (DetNet) technology are considered to be essential.¶
TSN is a set of standards developed by the IEEE 802.1 TSN Task Group (TG) [IEEE802.1TSN] and specifies mechanisms and protocols necessary to realize highly available IEEE 802.1 networks with bounded latency to carry time-sensitive, real-time application traffic.¶
DetNet, of which architecture is defined in RFC 8655 [RFC8655], provides a capability to carry specified unicast or multicast data flows for real-time applications with extremely low data loss rates and bounded latency under a single administrative control or within a closed group of administrative control. The overall framework for DetNet data plane is provided in [RFC8938], and various documents on different data plane technologies and their interworking technologies to extend the service range of data that TSN intends to deliver to the IP (Internet Protocol) and MPLS (Multi-Protocol Label Switching) networks have been standardized.¶
When deterministic networks become large and/or multiple domains should be stitched, DetNet solutions need to take into consideration one or more of the following points:¶
* There is relaxed clock synchronization or no clock synchronization in different domains. (Section 3.1)¶
* The end to end path is a combination of low and high latency hops. (Section 3.2)¶
* There are various transmission rates supported at different ports and on different network nodes.(Section 3.3)¶
* There are a large number of flows which may be difficult to identifiy per-flow state and cause the high utilization.(Section 3.4)¶
* The topology change and failures of link might be more common.(Section 3.5)¶
* The flow fluctuation caused by large number of flows may happen frequently.(Section 3.6)¶
* The Number of Hops might be large with Complex Topology.(Section 3.7)¶
* The mechanisms used to ensure bounded latency (e.g. queuing mechanism) may be multiple or have different configuration/parameters in multi-domains.(Section 3.8)¶
Such domains are normally within a single administrative control network or multiple cooperating administrative networks within a closed group of administrative control [RFC8655]. However they may belong to different AS domains and be controlled by multiple peering or cascaded controllers, and at the same time they may not have the same time clock source. Maintaining per flow status becomes impractical in the large scale network. Aggregation and disaggregation of flows take place at the boundaries of DetNet domains as well as within a DetNet domain with various rules. The flow identification and packet treatment should take care of one or combined changes introduced by scaling deterministic networks.¶
Based on the consideration above, this document describes requirements for scaling deterministic networks which demands the enhancement based on the existing bounded latency mechanisms and the corresponding data plane to ensure the DetNet service for a single administrative network or multiple (cooperating) administrative networks that defined in the DetNet charter. The deterministic network for open internet is not within current scope.¶
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119][RFC8174] when, and only when, they appear in all capitals, as shown here.¶
While [RFC2119] and [RFC8174] describe interpretations of these key words in terms of protocol specifications and implementations, they are used in this document to describe technical and operational requirements to realize scaling deterministic networks.¶
Due to the attributes described in Introduction Section, the corresponding technical requirements should be considered.¶
A deterministic network may span over multiple networks with one or more cooperating administrative domains. There are many types of network nodes in the multiple domains which may introduce disparate local time variation, which require the tolerance of time asynchrony.¶
One of DetNet's objectives is to stitch TSN islands together. All devices inside a TSN domain are time-synchronized, and most of TSN technologies rely on precise time synchronization[IEEE802.1Qbv][IEEE802.1Qch][IEEE802.1Qav]. However, different TSN islands may have different clocks which are not synchronized as shown in Figure 2, where the time difference of two TSN domains is D. DetNet needs to connect these two TSN domains together and provide end-to-end deterministic latency service. The mechanism adopted by a deterministic network MUST be prepared to cross multiple domains (For instance, coping with non-synced TSN domains). This can be done, for example, by putting extra buffer space at the ingress of a new domain, increasing the dead time as a guard band, or using some timing compensation mechanism. This document does not intend to list all the potential ways.¶
Within a single time synchronization domain, different clock accuracy is expected, for example the crystal oscillator in Ethernet is specified at 100 ppm [Fast-Ethernet-MII-clock], Synchronous Ethernet (SyncE) can achieve 50 ppb [G.8262], and more precise time synchronization [G.8273] is expected in 5G mobile backhaul. The clocks experience different jitter and wander. It may cause different level of asymmetry of the path. The deterministic networks SHOULD be able to recover or absorb such time variance within a domain.¶
It is usually hard to achieve the full time synchronization(Section 3.1.1 and Section 3.1.2 ) when the scale of networks become large and considering the size of the network topology. Some networks like mobile backhaul use frequency synchronization, such as SyncE, instead of the strict time synchronization. It is desired that the same deterministic performance in term of the bounded latency and jitter SHOULD be achieved when full time synchronization is not available, that is to say, when only partial synchronization (SyncE is one of the examples) is in use.¶
There can be a large number of traffic flows in a deterministic network and some of them are acyclic. Asynchronization based methods can meet the requirements of those traffic flows. Moreover, The mechanisms not requiring the time and/or frequency synchronization eliminate the hardware cost and difficulty at the network nodes.[IEEE802.1Qcr] conceptually uses per-flow based asynchronous shaper to achieve bounded latency. The effectiveness of the per-flow based asynchronous shaper can be proven through mathematical analysis. It can naturally tolerate the time variance, but it exhibits the concerns of per-flow state buffer management as shown in [I-D.eckert-detnet-bounded-latency-problems]. When it is in use, the requirement in Section 4.3 SHOULD be carefully met.¶
In some deterministic networks, a single hop distance is enough to generate large latency. The speed of optical transmission in fiber is 200 km/ ms. Thus, the propagation delay of a single hop can be in the order of a few milliseconds. It is much greater than that of a LAN, and introduces impacts on queuing mechanisms, such as cyclic or time aware scheduling method. So the queuing mechanism for LAN networks needs to be extended, such as considering the propagation latency when setting the period in both time synchronization or frequency synchronization based methods, or setting the extra buffer in the asynchronization based methods, to meet the requirements of deterministic forwarding between the network nodes.¶
Here, we use an example to describe the influence of Large single-hop propagation delay on cycle based methods, but not to specify any solution. For a cyclic based method, suppose a deterministic network wants to keep using the simple cycle mapping relationship, however the link distance between two nodes is longer. Moreover, a downstream node may have many upstream nodes each with different link propagation delays (e.g., 9 us, 10 us, 11 us, 15 us and 20 us). In order to absorb the longest link propagation delay, the length of cycle must be set to more than 20 us. In [IEEE802.1Qch], propagation delay is part of the dead time imposed in a cycle, which impacts the bandwidth utilization. However, since packet's arrival time varies within the receiving cycle, larger cycle length means larger delay variance.¶
Note that Figure 2 is just to show an example of latency caused by large single-hop propagation. CQF is not limited to 2 queues, instead using more than 2 queues can be an option to solve large link latency related concerns. [Multiple-CQF]describes this problem in more detail and also proposes a mechanism to address it.¶
A deterministic network can use higher speed links, especially for its backbone. At the time of publication, deterministic mechanisms used in a local network is usually deployed in link speed of 10 Mbps or 1 Gbps, or possibly 10 Gbps. The data rates of 10G, 100G, 400G and even higher are commonly used in wide area networks. With the increasing of the data rate, the network scheduling cycle can be reduced if the same amount of the data is required to be sent each cycle for each application. Or, more data can be sent if the network cycle time remains the same. For the former, it requires the more precise time control (e.g. cycle in the order of a few microseconds or sub- microseconds) for the input stream gate and the timed output buffer. For the latter, more buffer space is required which imposes more complex buffer or queue management and larger memory consumption.¶
Another aspect to consider is the aggregation of the flows. In the deterministic network, the number of flows can be hundreds or tens of thousands. They can be aggregated into a small number of deterministic path or tunnels. It is practical to have a few flow- based or aggregated-flow based status in the local network. But in higher speed and larger scale networks, it is hardly feasible. If [IEEE802.1Qcr] is in use, it requires more buffers comparing to the other full/partial time synchronized mechanisms. Therefore, it requires optimizations to support higher link speeds.¶
The deterministic network may have the large number of traffic flows. According to [RFC2475], per-flow state identification in the network becomes infeasible as flow count scales up. So, it is almost impossible to identify individual IP flows at the DetNet data plane for a massive number of flows, neither for the per-node state machine configuration. DetNet allows the leverage of the flow aggregation, while individual flows may join and exit the aggregated flow rapidly in the scaling network with large number of flows, which causes the dynamic in identification of the aggregated DetNet flow. The wildcards and value ranges used in the identification may have to change in order to ensure the aggregated flows have compatible deterministic characteristics.¶
For scaling network, proper provision at the control plane to accommodate such higher aggregation is required. Provisioning on the aggregated flows normally improve the scalability at the cost of coarse granularity of the incoming traffic filtering and protection. It is desirable that adding a flow to the network does not affect the latency of the existing flows, or requires the complex re-calculation, it should require as less work as possible. For instance, only the filtering and policing configuration on the ingress node but not the intermediate nodes. The [IEEE802.1Qbv] uses traffic class to divide the flows and the number of it is usually 8, so that the forwarding mechanisms itself isn't complex with a large number of flows or higher aggregation. However, when adding new flows, the Gate Control List may be changed, and the re-calculation is complex. There might be the method to simplify the calculation or configuration, which need more work to enhance it.¶
Meanwhile, the traffic that requires deterministic networking can significantly fill up the capacity of a link or the portion of the link which is dedicated to such traffic, for example, more than 75% and/or up to near 100% utilization. The over-provisioning of link capacity does not work in such cases. In order to guarantee deterministic latency and jitter in this environment, it is required to provide scalable queuing solutions to improve the bandwidth utilization. For instance, when the bandwithd utilization is high, the guard band in each cycle in [IEEE802.1Qch] is a type of over-provisioning and can be improved with more scalable queuing add-ons.¶
Deterministic networks may involve more network devices, and the increase or decrease of network devices in deterministic networks is more frequent than that in LANs. A simple use case to understand is ultra-low-latency (public) 5G transport networks, which would require DetNet extend to every 5G base station. For some network operators, their networks may need to connect to ~100 K base stations (serving multiple mobile networks operators), and this number will only increase with 5G.¶
One the one hand, the numerous devices may lead to more network link failures. Path switching or re-convergence of routing will cause high latency of packet loss and retransmission, which is usually in seconds before the network becomes stable again. As the added delay magnitudes involved are too large to use jitter compensation techniques,It is necessary to support certain mechanisms to adapt to failures of links or nodes and topology changes.¶
One the other hand, the change of the number of devices may affect the implementation and adjustment of deterministic network mechanism, such as the topology discovery, queuing mechanism and packet replication and elimination. For instance, The full disjoint paths when implementing the Packet Replication, Elimination, and Ordering Functions (PREOF) gives a better chance of survival when one of the nodes or links in the path fails. At the same time, it brings the challenges of finding paths with similar distance and/or number of hops so that there is enough buffer space to absorb the latency difference caused by different paths when the scale is large. So, a method is expected to support flexible planning of multiple paths and provide a solid foundation for the implementation of PREOF.¶
More kinds of traffic flows described in Section 3.4 will cause more dynamic joining or leaving of the flows, which will further cause more flow fluctuation as well as more unpredictability of the DetNet flows. Such as:¶
* Various and massive traffic flows of different applications in scaling network easily cause more bursty traffic.¶
* There will be more aggregation nodes which receives the flows from more upstream nodes adding the nondeterministic delay of the packet treatment.¶
* The bursts of flows can be accumulated as the flows traverse, join, and separate over hops. Once one of the nodes makes the minor error of packet treatment, it will have the cumulative effect for the downstream nodes.¶
* Loops formed in a network topology increase the maximum bursts of flows exponentially [ANDREWS][BOUILLARD][THOMAS].¶
* The node and link failures are more common in a large network (Section 3.5) which requires dynamic traffic steering to an alternate path, it will also easily cause the flow fluctuation.¶
It is required to support bursty traffic and some methods to decrease the micro-burst. So the pre-planned , ingress traffic conditioning, scalable queuing, and enhanced capacity of buffer are required to accommodate the flow fluctuation, and the time required for network reconfiguration to reflect such changes is required to be controlled, e.g., less than a specified amount of time.¶
Scaling networks often results in situations where an end-to-end flow involves a large number of hops, e.g., 15 or more. The network topology can also be complex, including star, ring, mesh, and their combinations, and can possibly be hierarchical. It is required to support networks with such various types of topologies and large hop Counts.¶
Normally, bounded latency is a constant of application regardless of the number of hops. So keeping the bounded latency with the variaty of hops is required in scaling detnet, especially for the lower end-to-end latency bound. The queuing mechanisms should be enhanced, for instance, adjust the cycle time in [IEEE802.1Qch] to meet the end to end latency while considering the feasibility with the dead time.¶
There will be large number of flows that described in Section 3.4, the flows may have different levels of demand for DetNet service[RFC8578] provides various use cases and their requirements in the areas of industry, electricity, buildings, etc. Some of them clearly specify the requirements for latency and jitter, while some others do not for the jitter. Different types of users have different demands, just as a network provider provides different network services for personal business or enterprise business.¶
One kind has critical SLA requirement, such as remote control or cloud Programmable Logic Controller (PLC) of manufacturing and differential protection of electricity. If these services exceed the boundaries of latency and jitter, it will bring property losses and security risks, so they cannot tolerate with any non-deterministic situation and can pay more on the network service. Another kind has relatively loose levels of SLA requirement, such as cloud gaming, cloud VR and online meeting for "consumer" networks. The users of these applications hope to have a better network experience, but they can tolerate it to a certain extent. For instance, exceeding the upper boundary of latency within a small probability is acceptable. Those different applications expect different kind of solutions, which are related to the cost more or less.¶
The different SLA demands need different DetNet technologies as well as the multi-domain demand in scaling network, which results in the requirements for the diverse queuing mechanisms. For strict deterministic services, strict queuing technologies need to be used, and all network devices may need to be upgraded. For non-strict deterministic services, it may only be necessary to upgrade some network devices(maybe edge nodes) or share corresponding network resources.¶
Those different queuing technologies may be used in:¶
* the same network which requires the some of the equipment in the same network providing multiple queuing technologies. The operator can select the service type/level accordingly.¶
* the multiple domain network which support different queuing technologies while needs the coordination with each other.¶
* different network implementations intended for different application domains individually, where there is no additional requirements for the coordination.¶
It is required to provide diversified deterministic service for various applications in a deterministic network and to support the corresponding diversified mechanisms(possibly at multiple DetNet QoS levels). For instance, different queuing mechanisms can provide different levels of latency, jitter and other guarantees, and there may be situations where a network device provides multiple queuing mechanisms at the same time. For example, a network aggregation device may use the mechanisms specified in [IEEE802.1Qbv] and [IEEE802.1Qcr], and other mechanisms to forward traffic to different paths at the same time. By providing a variety of queuing mechanisms to meet diversified deterministic service requirements, compared with small scale environment, this demand is particularly prominent in large-scale networks. For instance, there may be more than eight queues or sub-queues to support more complicated queuing mechanisms comparing with the eight traffic classes in TSN enabled networks.¶
Accordingly, the configuration for multiple queuing mechanisms can be complicated in deterministic networks and MUST support the unified or simplified scheduling and management of multiple queuing mechanisms. For example, in the distributed scenario with no controller, the related information of the queuing mechanisms could be advertised among the domain, including the types and related algorithms, queue forwarding capability with different levels of latency and jitter guarantees, etc. In the centralized scenario, the queuing mechanisms and other information could be reported to the controller to build a deterministic network resource topology pool for path calculation. In addition, for refined management of forward resources and providing resource assurance for deterministic forwarding when establishing/deleting sessions, it is required to establish unified mechanisms on quantification and measurement of resources associated with interfaces and queues.¶
In deterministic networks, end-to-end service may across multiple network domains, which may adopt a variety of different queuing mechanisms within each domain, or may have different link speed [Section 3.3] for the same queuing mechanism.¶
Both of the two cases may may generate additional end-to-end latency, jitter and packet loss, because the different queuing mechanisms and link speed provide different scheduling granularities or phases between the domains. For the different queuing mechanisms switchover, such as from time synchronous mechanism[IEEE802.1Qbv] to asynchronous mechanism[IEEE802.1Qcr] , a collaboration mechanism crossing multi-domains MUST be considered. For the different link speed switchover, such as from 1Gbps to 10Gbps (or reverse), the quantification of deterministic forwarding resources (such as time slots) of the queuing mechanism MUST match the link speed.¶
It requires flexible queue stitching function for the inter-domain devices, such as increasing the buffer of inter-domain devices to provide enough adjustment space for the flow to cross different queuing mechanisms, the jitter compression to reduce the coupling between two domains’ queuing mechanisms, or the additional traffic shaping solutions to make the traffic smooth, so that for the same scale of service flows, they can be forwarded successfully based on different queuing mechanisms and/or the links with different speeds in multiple domains.¶
According to [RFC8938], the DetNet data plane can provide or carry two metadata in MPLS and IP data planes: Flow-ID and sequence number. The Flow-ID could be used for identification of the DetNet flow or aggregate flow, and the sequence number could be used for PREOF for each DetNet flow. The Flow-ID is used by both the service and forwarding sub-layers, but the sequence number is only used by the service layer. Metadata can also be used for OAM indications and instrumentation of DetNet data plane operation.¶
Generally speaking, more data plane metadata and related processing SHOULD be supported in the deterministic networks. By introducing IPv6 Extension Headers [RFC8200] and Segment Routing over IPv6 [RFC8986], native IPv6 data plane should be supported with the IPv6-sepcific enhancement. This section lists the data plane enhancement requirements based on but not limited to the technical requirements in Section 3, describing how to use IP and/or MPLS, and related OAM, to support a data plane method of flow identification and packet treatment over Layer 3.¶
Current IPv6 aggregated flow identification is generally based on 5 or 6 tuples, IP prefixes, or wildcards as indicated in [RFC8938]. However, in deterministic networks the number of individual flows can be huge, and they may randomly join and leave the aggregated flow at each hop as described in Section 5. Such behaviours lead to the difficulty in identifying aggregated flows by relying on the prefixes or wildcards.¶
In addition, the deterministic services may demand different deterministic QoS requirements according to different levels of application requirements. The flow identification with service-level aggregation should be supported. Flow identification is also used to quickly push a packet to a suitable queue. In scaling network, there are large amount of flows requiring deterministic latency service and normal forwarding service. Explicit flow identification makes it easier to quickly distinguish the DetNet flows without requiring the longest match rule on multiple tuples in IP data plane. Therefore, explicit aggregated flow identification SHOULD be supported.¶
According to Section 3.1, the deterministic network should support synchronized or asynchronized queuing mechanisms. Different queuing mechanisms require different information to be defined as the DetNet- specific metadata to help the functions of ensuring deterministic latency, including regulation, queue management, etc. For instance, the data plane needs to support the identification of cycle for cyclic queuing and forwarding or the latency related information for time based queuing in order to enable the applicability of the respective queuing and/or scheduling mechanisms in the large scale network.¶
When different queuing mechanisms are deployed at a network node, metadata used for each queuing mechanism should be provided at the same time. When multiple metadata carried in one packet, metadata should be self-described and extensible to tolerate variable number of metadata. Meanwhile, extra data will cause extra processing, referring to fixed or variable length lookups, total number of read/write access to the packet header, etc. So the data plane processing efficiency also needs to be considered when ensuring deterministic latency, but the specific method or solution is out of scope of this document.¶
This document does not specify what metadata and what format to be carried in data plane. The solution document should be specific enough on why and how the information carried as data plane meta data works in conjunction with the queuing or other functions and how it helps the deterministic network deployment.¶
This document specifies the technical requirements for scaling deterministic networks and the corresponding data plane enhancement requirements. Some of the proposed queuing mechanisms and trials are cited, and the authors of the document think those proposals give reasonably sound insights to enhance the current queuing mechanisms to meet the requirements of scaling deterministic networks.¶
When DetNet flows span multiple domains and require multi domain collaboration, security guarantee needs to be strengthened. More considerations will be described later.¶
This section will be described later.¶
The authors would like to thank Daivd Black, Lou Berger, Bala’zs Varga, Fan Yang, Tianran Zhou,Yaakov Stein for helpful suggestions. The authors also would like to thank Liang Geng, Peter Willis, Shunsuke Homma and Li Qiang for their previous works.¶
The following people have substantially contributed to this document:¶
Zongpeng Du China Mobile EMail: duzongpeng@chinamobile.com Lei Zhou New H3C Technologies Email: zhou.leih@h3c.com¶
Some trials have been carried out to verify the concept of large-scale deterministic networks.¶
In order to verify the deterministic technology of large-scale networks, a trial of Deterministic IP on China Environment for Network Innovations (CENI), which is a network built for new network technology trial, was deployed. A network with a distance of 3,000 km over 13 hops was tested, and the jitter was controlled within 100us.¶
In order to verify the remote control on Deterministic IP, which required that the latency should be controlled within 4 ms and jitter should be controlled within 20 us. A trial cooperated with Baosteel spanned 600 km was deployed. Baosteel is a Chinese steel company and put forward this demand. Both of the first and second trials are based on a frequency synchronization solution. The mechanism details could be found in . [I-D.dang-queuing-with-multiple-cyclic-buffers][I-D.qiang-detnet-large-scale-detnet].¶
In order to realize multi flows synchronization on an inter- provincial network in an exhibition, Emergen proposed the requirement that two flows of video and virtual reality (VR) were sent from province A, and arrived at province B together, so people can see the synchronization of video collected by camera and the VR model. This requirement was proposed to facilitate the virtual industry product deployment. Due to time and other problems, it was realized by the edge network device for a relatively lower levels of service level agreement (SLA).¶
Teaming up with a smart factory operator, network operators, equipment companies, and universities, ETRI demonstrated an ultra-low latency, high-reliability 5G wired and wireless network-based remote industrial Internet of Things (IIoT) service by connecting a control center and a smart factory through three different operators' networks at a distance of 280 km. In this trail, it was demonstrated that real-time remote smart manufacturing service is possible by making round-trip delay below 3 ms within a smart factory and below 10 ms between remote 5G industrial devices. In the future, the team plans to examine feasibility of large-scale deterministic networking by connecting smart factories in Gyeongsan, South Korea and Oulu, Finland.¶
These trials show that both operators and enterprise users begin to put forward requirements for the certainty of large-scale networks, but the implementation technologies are not exactly the same.¶