Deterministic Networking Application in Ring Topologies
draft-jiang-detnet-ring-00
Network Working Group Y. Jiang
Internet-Draft N. Finn
Intended status: Informational Huawei
J. Ryoo
ETRI
B. Varga
Ericsson
L. Geng
China Mobile
Expires: July 2018 January 24, 2018
Deterministic Networking Application in Ring Topologies
draft-jiang-detnet-ring-00
Abstract
Deterministic Networking (DetNet) provides a capability to carry
data flows for real-time applications with extremely low data loss
rates and bounded latency. This document describes how DetNet can
be used in ring topologies to support Point-to-Point (P2P) and
Point-to-Multipoint (P2MP) real-time services.
Status of this Memo
This Internet-Draft is submitted to IETF in full conformance with
the provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six
months and may be updated, replaced, or obsoleted by other
documents at any time. It is inappropriate to use Internet-Drafts
as reference material or to cite them other than as "work in
progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html
This Internet-Draft will expire on July 24, 2018.
Jiang and et al Expires July 24, 2018 [Page 1]
Internet-Draft DetNet Ring January 2018
Copyright Notice
Copyright (c) 2018 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with
respect to this document. Code Components extracted from this
document must include Simplified BSD License text as described in
Section 4.e of the Trust Legal Provisions and are provided without
warranty as described in the Simplified BSD License.
Table of Contents
1. Introduction ............................................... 3
1.1. Conventions used in this document ....................... 4
1.2. Terminology ............................................. 4
2. P2P DetNet Ring ............................................ 4
2.1. DetNet applications on a single ring for P2P traffic .... 4
2.2. Implementation implications of a DetNet ring for P2P
traffic ...................................................... 5
3. P2MP DetNet Ring ........................................... 5
3.1. DetNet applications on a single ring for P2MP traffic ... 5
3.2. Section LSPs as underlay (Service layer replication) .... 6
3.3. P2MP LSP tunnels as underlay (LSP layer replication) .... 7
4. DetNet Ring Interconnections ............................... 8
4.1. Single node interconnection ............................. 8
4.1.1. DetNet relay node as interconnection node ............ 9
4.1.2. Elimination first approach ........................... 9
4.2. Dual node interconnection .............................. 10
4.2.1. Dual node interconnection for P2P traffic ........... 10
4.2.2. Elimination first approach in dual node interconnection
for P2P traffic ............................................. 11
4.2.3. Dual node interconnection for P2MP traffic using
section LSP ................................................. 11
4.2.4. Elimination first approach in dual node interconnection
for P2MP traffic using section LSP .......................... 12
4.2.5. Dual node interconnection for P2MP traffic using P2MP
LSP 13
5. Resource reservation ...................................... 13
6. Security Considerations ................................... 13
7. IANA Considerations ....................................... 13
Jiang and et al Expires July 24, 2018 [Page 2]
Show full document text