Skip to main content

PREOF IOAM Method for Deterministic Network Service Sub-layer
draft-qian-detnet-preof-ioam-01

Document Type Active Internet-Draft (individual)
Authors Xiaocong Qian , Quan Xiong , Fenlin Zhou
Last updated 2024-03-19
RFC stream (None)
Intended RFC status (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state I-D Exists
Telechat date (None)
Responsible AD (None)
Send notices to (None)
draft-qian-detnet-preof-ioam-01
DETNET                                                           X. Qian
Internet-Draft                                                  Q. Xiong
Intended status: Standards Track                                 F. Zhou
Expires: 25 March 2024                                   ZTE Corporation
                                                       22 September 2023

     PREOF IOAM Method for Deterministic Network Service Sub-layer
                    draft-qian-detnet-preof-ioam-01

Abstract

   This document proposes an active IOAM method to PREOF monitor and
   troubleshoot for Deterministic Networking (DetNet) in its service
   sub-layer.  The method uses a special PREOF-TRACE message to collect
   multiple types of information from the target flow's PREOF entities
   and to record them in the packet, and uses a PREOF-RESPONCE message
   to feed them back to the head node.  It assists the DetNet to monitor
   and maintain the PREOF for the traffic flow.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at https://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on 25 March 2024.

Copyright Notice

   Copyright (c) 2023 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

Qian, et al.              Expires 25 March 2024                 [Page 1]
Internet-Draft   PREOF IOAM for DetNet Service Sub-layer  September 2023

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents (https://trustee.ietf.org/
   license-info) in effect on the date of publication of this document.
   Please review these documents carefully, as they describe your rights
   and restrictions with respect to this document.  Code Components
   extracted from this document must include Revised BSD License text as
   described in Section 4.e of the Trust Legal Provisions and are
   provided without warranty as described in the Revised BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
   2.  Requirements Language . . . . . . . . . . . . . . . . . . . .   3
   3.  Terminology . . . . . . . . . . . . . . . . . . . . . . . . .   4
   4.  Overview  . . . . . . . . . . . . . . . . . . . . . . . . . .   4
   5.  PREOF-TRACE . . . . . . . . . . . . . . . . . . . . . . . . .   6
     5.1.  Encapsulation . . . . . . . . . . . . . . . . . . . . . .   6
       5.1.1.  OAM Header  . . . . . . . . . . . . . . . . . . . . .   6
         5.1.1.1.  OAM Distinguishing Nibble . . . . . . . . . . . .   7
         5.1.1.2.  PREOF-TRACE Flag  . . . . . . . . . . . . . . . .   7
         5.1.1.3.  Serial Number . . . . . . . . . . . . . . . . . .   7
         5.1.1.4.  Node ID . . . . . . . . . . . . . . . . . . . . .   7
         5.1.1.5.  TRACE Type  . . . . . . . . . . . . . . . . . . .   7
       5.1.2.  Data Field  . . . . . . . . . . . . . . . . . . . . .   9
   6.  PREOF-RESPONCE  . . . . . . . . . . . . . . . . . . . . . . .   9
     6.1.  Encapsulation . . . . . . . . . . . . . . . . . . . . . .   9
   7.  PREOF IOAM TRACE Procedures . . . . . . . . . . . . . . . . .  10
     7.1.  OAM Head Node . . . . . . . . . . . . . . . . . . . . . .  10
     7.2.  Intermediate Node . . . . . . . . . . . . . . . . . . . .  10
     7.3.  OAM Tail Node . . . . . . . . . . . . . . . . . . . . . .  12
   8.  Security Considerations . . . . . . . . . . . . . . . . . . .  12
   9.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .  12
   10. References  . . . . . . . . . . . . . . . . . . . . . . . . .  12
     10.1.  Normative References . . . . . . . . . . . . . . . . . .  12
     10.2.  Informative References . . . . . . . . . . . . . . . . .  12
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  13

1.  Introduction

   Deterministic Networking (DetNet) provides the ability to carry
   traffic flows with extremely low packet loss rates, assured latency,
   limited jitter, and limited out-of-order delivery.  The DetNet-
   related data plane is decomposed into a forwarding sub-layer and a
   service sub-layer, which is described in [RFC8655] [RFC8938].  The
   forwarding sub-layer leverages traffic engineering mechanisms and
   provides congestion protection.  The service sub-layer provides
   DetNet service protection and reordering.

Qian, et al.              Expires 25 March 2024                 [Page 2]
Internet-Draft   PREOF IOAM for DetNet Service Sub-layer  September 2023

   The DetNet service sub-layer includes the Packet Replication Function
   (PRF), Packet Elimination Function (PEF), and Packet Ordering
   Function (POF) entities.  These functions can be enabled in a DetNet
   edge node, relay node, or end system.  The collective name for
   PRF/PEF/POF is PREOF as per [RFC8655].

   OAM is expected to support monitoring and troubleshooting PREOF
   within the domain [RFC9551].  An on-demand OAM method for particular
   PREOF node is described in [I-D.varga-detnet-service-sub-layer-oam].
   That method is referred to as "DetNet PING", which is an in-band OAM
   approach, i.e., the OAM packets follow precisely the same path as the
   data packets of the corresponding DetNet flow(s).  The OAM packets
   provide DetNet service sub-layer specific information such as: 1)
   Identity of a DetNet service sub-layer node. 2) Discover Ingress/
   Egress flow-specific configuration of a DetNet service sub-layer
   node. 3) Detect the status of the flow-specific service sub-layer
   function.

   This document proposes another method for detecting and
   troubleshooting PREOF entities for the targeted DetNet traffic flow
   (which is briefly called traget flow in following content) in DetNet
   service sub-layer.  This method designs PREOF-TRACE and PREOF-
   RESPONCE messages.  The PREOF-TRACE message sent by the OAM head node
   is transplanted from the target flow.  So its behavior in forwarding
   sublayer is equal to that of the traffic flow.  Relay nodes those
   have DetNet service sub-layer in the forwarding path recognize PREOF-
   TRACE message, and append records into PREOF-TRACE message only when
   they run PRF/PEF/POF entities for that flow.  The recorded content
   includes the identity, attributes, status of the functional entity
   and other information about interface, time, queue, etc.  When the
   PEF node eliminates redundant replicas, or when the PREOF-TRACE
   message reaches its destination, a PREOF-RESPONCE message containing
   all information collected along the way of the PREOF-TRACE message
   will be generated and sent back to the OAM head node.  The PREOF-
   RESPONCE message is also generated by PEF nodes and carrys the
   current replica count value.

2.  Requirements Language

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
   "OPTIONAL" in this document are to be interpreted as described in BCP
   14 [RFC2119] [RFC8174] when, and only when, they appear in all
   capitals, as shown here.

Qian, et al.              Expires 25 March 2024                 [Page 3]
Internet-Draft   PREOF IOAM for DetNet Service Sub-layer  September 2023

3.  Terminology

   *  IOAM: In situ Operations, Administration and Maintenance.

   *  PRF: Packet Replication Function.  It divides a DetNet flow into
      multiple DetNet member flows by replicating packets and sending
      them out with different egress interfaces.

   *  PEF: Packet Elimination Function.  It eliminates duplicated
      packets of a DetNet flow based on the sequencing information and a
      history of received packets.  The output of the PEF is always a
      single packet.RIB: Routing Information Base.

   *  POF: Packet Ordering Function.  It uses the sequencing information
      to reorder a DetNet flow's packets that are received out of order.

   *  PREOF: A collective name for Packet Replication, Elimination, and
      Ordering Functions.

   *  PREOF-TRACE: A message used to collect information on all PREOF
      entities along its way to the destination.

   *  PREOF-RESPONCE: A message used to postback collected information
      about PREOF entities to the head node.

   *  PREOF IOAM TRACE: an active IOAM method for DetNet PREOF that
      appends collected information in the PREOF-TRACE packet and
      postbacks in the PREOF-RESPONCE packet.

4.  Overview

   The proposed PREOF IOAM TRACE is a method of active OAM for DetNet.

Qian, et al.              Expires 25 March 2024                 [Page 4]
Internet-Draft   PREOF IOAM for DetNet Service Sub-layer  September 2023

   For the target flow, the PREOF IOAM TRACE uses the message
   transmission method by sending a "PREOF-TRACE" message and accepting
   its "PREOF-RESPONCE" message to monitor and troubleshoot PREOF
   ability.  At the beginning, a "PREOF-TRACE" message is sent from the
   head node.  The outer part of PREOF-TRACE carries the same IP header
   (for IP data plane) or MPLS label (for MPLS data plane) as the
   service message.  The inner part of PREOF-TRACE carries a header
   containing fields such as "PREOF-TRACE Flag", dedicated "Serial
   Number", "TRACE Type" as well as "Data Field" used to record running
   information of all encountered PREOF functional entities along the
   way.  PREOF-TRACE follows exactly the same forwarding way and the
   same replication, elimination and ordering behaviors as the DetNet
   flow.  Accordingly, information about location, attributes, status
   and other items concerned by networks' operator for PREOF entity in
   the forwarding path will be recorded into the data field as a list,
   in accordance with the specification carried by TRACE type.

   When the PEF node eliminates redundant "PREOF-TRACE" copies, or when
   the tail node receives the "PREOF-TRACE" message, a "PREOF-RESPONCE"
   message will be returned, which carries the flow identification, node
   identification, sequence number of the message and all records in
   data field of the "PREOF-TRACE" message.

   Figure 1 shows an instance of PREOF IOAM TRACE.  There are two PRF
   entities (R1, R2), two PEF entites(E1, E2) and one POF entity(O1)
   applied for the target flow in the DetNet OAM domain.  P1, P2 to P6
   are forwarding paths between two PREOF entities..

   For this instance, Every PREOF-TRACE packet from the head node is
   replicated by R1 into two packets: pkt1(along P1) and pkt2(along P2).
   The pkt2 is replicated by R2 into two packets: pkt2(along P2,P3) and
   pkt3(along P2,P4).  For E1 that receives pkt1 and pkt3, it is
   supposed that pkt1 is accept and forwarded ahead while pkt3 is
   discarded.  For E2 that receives pkt1(along P1,P5) and pkt2(along
   P2,P3), it is supposed that pkt2 is accept and forwarded ahead while
   pkt1 is discarded.  At O1, PREOF-TRACE packets are reorderd by their
   serial numbers.

   At the moment when E1 decides to discard pkt3, E1 generates a PREOF-
   RESPONCE packet containing historic records(about R1,R2) carried in
   pkt3 and current record of E1, then sends it back to the head node.

   When the tail node receives pkt2, it generates a PREOF-RESPONCE
   packet containing all historic records(about R1,R2,E2,O1) carried in
   pkt2 and sents it back to the head node.

Qian, et al.              Expires 25 March 2024                 [Page 5]
Internet-Draft   PREOF IOAM for DetNet Service Sub-layer  September 2023

                     +------------E1-------------+
                     |    P1       |      P5     |
                     |             |             |
           +----+    |             |             |          +----+
           |Head|----R1       +----+P4           E2----O1---+Tail|
           +----+    |        |                  |  P6      +----+
                     |        |                  |
                     | P2     |       P3         |
                     +-------R2---------- -------+
              <---------------DetNet OAM domain--------------->

                 Figure 1: an instance of PREOF IOAM TRACE

5.  PREOF-TRACE

   The PREOF-TRACE message collects items including the location,
   attributes, status, configuration and other information of the
   entities that provide PRF, PEF, or POF for the target flow when it
   passes through the OAM domain.  Besides, some information in the
   forwarding sub-layer can also be collected.

5.1.  Encapsulation

   Since PRF, PEF, and POF entities are deployed for the target flow,
   the OAM packets should be associated with the target flow.  So for
   PREOF-TRACE's encapsulation, it is necessary to carry a flow
   identifier which is consistent with the targeted DetNet traffic flow.
   That means, PREOF-TRACE should carry the same S-label in the DetNet
   encapsulation as described in [RFC8938] for MPLS data plane.  While
   for IP data plane, PREOF-TRACE should carry the six tuples in the
   DetNet encapsulation (in cases where port information cannot be
   obtained, triples or binaries can also be used, as described in
   [RFC8938] [RFC8939]).  Furthermore, in order to ensure that PREOF-
   TRACE packets and associated DetNet traffic packets are treated
   equally by all DetNet network nodes and follow the same path in the
   forwarding sub-layer, the outer encapsulation of PREOF-TRACE packets
   should be the same as that of DetNet traffic packets.

   The PREOF-TRACE packet should encapsulates an OAM header and data
   field.

5.1.1.  OAM Header

   OAM header within the PREOF-TRACE packet carries fields for packet
   identification, trace type description and necessary auxiliary
   information such as the serial number.

Qian, et al.              Expires 25 March 2024                 [Page 6]
Internet-Draft   PREOF IOAM for DetNet Service Sub-layer  September 2023

5.1.1.1.  OAM Distinguishing Nibble

   The OAM Distinguishing nibble is used to distinguish an OAM packet
   from a DetNet traffic packet in MPLS data plane.  These four bits are
   0001 for PREOF-TRACE packet, which is consistent to the section 4.1
   of [RFC9546].

5.1.1.2.  PREOF-TRACE Flag

   The PREOF-TRACE flag uses one bit to identify the OAM packet as a
   PREOF-TRACE packet.

5.1.1.3.  Serial Number

   The Serial Number field carrys a dedicated serial number referenced
   for PREOF.  It's a number represented by a set of consecutive bits,
   and the sequence code in the next PREOF-TRACE packet is added by 1 to
   that in the previous message.

5.1.1.4.  Node ID

   The Node ID field takes an unique value to identify the DetNet node
   that originates the packet.

5.1.1.5.  TRACE Type

   The TRACE type field specifies which data types are used the data
   field.  The structure of this field is bit-map, and each bit within
   the map has a particular regulation, just as follows:

   ID-bit: When set, indicates the PREOF entity to record its identity.

   FT-bit: When set, indicates the PREOF entity to record its function
   type (RPF, PEF or POF).

   RT-bit: When set, indicates the PREOF entity to record its location
   (eg. the identity of the router).

   Time-bit: When set, indicates the PREOF entity to record a timestamp
   on the moment of PEF/PEF/POF process ending.

   RN-bit: When set, indicates the PRF entity to record the number of
   replication.

   SN-bit: When set, indicates the PEF entity to record the current
   value of the counter for the packet with the same serial number.

Qian, et al.              Expires 25 March 2024                 [Page 7]
Internet-Draft   PREOF IOAM for DetNet Service Sub-layer  September 2023

   QL-bit: When set, indicates the PRF entity to record the current
   length of the reordering queue.

   TRACE Type may also define some bits to collect information from the
   forwarding sub-layer, so as to help the DetNet flow to detect
   characteristics or performances of its member flows, for example, to
   detect delay differences among different member flows between PRF and
   PEF nodes.

   IIFI-bit: When set, indicates the PREOF entity to record the ingress
   interface information.

   EIFI-bit: When set, indicates the PREOF entity to record the egress
   interface information.

   IIFT-bit: When set, indicates the PREOF entity to record the time
   when the packet reaches the ingress interface.

   EIFT-bit: When set, indicates the PREOF entity to record the time
   when the packet leaves the egress interface.

   EIFS-bit: When set, indicates the PREOF entity to record the timeslot
   or cycle id on the egress interface.

   EIFQ-bit: When set, indicates the PREOF entity to record the queue
   information on the egress interface.

   More bits can be regulated in the TRACE type in the future.

   Figure 2 shows an instance of TRACE Type bit-map structure.

      bit0  1   2   3   4   5   6   7   8   9  10  11  12
      +---+---+---+---+---+---+---+---+---+---+---+---+---+........+
      |   |   |   |   |   |   |   |   |   |   |   |   |   |        |
      +---+---+---+---+---+---+---+---+---+---+---+---+---+........+
        ^   ^   ^   ^   ^   ^   ^   ^   ^   ^   ^   ^   ^  ^      ^
        |   |   |   |   |   |   |   |   |   |   |   |   |   \    /
       ID   |   |   |  RN|  |   |   | EIFI  |   |  EIFS |  reserved
           FT   |   |      SN   |   |       |   |      EIFQ  bits
               RT   |          QL   |     IIFT  |
                   Time            IIFI        EIFT

           Figure 2: an instance of TRACE Type bit-map structure

Qian, et al.              Expires 25 March 2024                 [Page 8]
Internet-Draft   PREOF IOAM for DetNet Service Sub-layer  September 2023

5.1.2.  Data Field

   Data field is the most important field for this OAM packet.  It
   consists of a series of record lists.  Each record list is written by
   the PREOF entity through which the PREOF-TRACE flows.  The recorded
   items are: identification of the node; Identification, attributes,
   and status information of PRF/PEF/POF entities; Interface parameters,
   time parameters, queue parameters and other useful information for
   OAM.  Suggestions for information collection are as follows:

   1.  If PRF entity is provided for the flow at the relay node, PRF
   entity should record the node ID, entity ID, entity attributes (PRF),
   and necessary information indicated by the trace type field into the
   data field of the PREOF-TRACE packet.

   2.  If PEF entity is provided for the flow at the relay node, PEF
   entity should record the node ID, entity ID, entity attributes (PEF),
   and necessary information indicated by the trace type field into the
   data field of the PREOF-TRACE packet.

   3.  If POF entity is provided for the flow at the relay node, POF
   entity should record the node ID, entity ID, entity attributes (POF),
   and necessary information indicated by the trace type field into the
   data field of the PREOF-TRACE packet.

6.  PREOF-RESPONCE

   The PREOF-RESPONCE message transmits all information of PREOF
   entities along the way collectted by the PREOF-TRACE message to the
   OAM head node.

   The PREOF-RESPONCE packet should be generated for two circumstances
   below:

   1.  When the OAM tail node (it should be a relay node or an end
   system which owns DetNet service-sublayer) receives a PREOF-RESPONCE
   packet.

   2.  When a PEF node receives an redundant replica of PEROF-TRACE
   packet.

6.1.  Encapsulation

   The PREOF-RESPONCE packet encapsualtion should carry several features
   listed below:

   1.  The flow identification of the the PREOF-TRACE packet.

Qian, et al.              Expires 25 March 2024                 [Page 9]
Internet-Draft   PREOF IOAM for DetNet Service Sub-layer  September 2023

   2.  The serial number of the PREOF-TRACE packet.

   3.  The node ID of the PREOF-TRACE packet.

   4.  The trace type field of the PREOF-TRACE packet.

   5.  Whole information recorded in the data field of the PREOF-TRACE
   packet.  Direct copy is suitable while appropriate compression is
   also considerable, which is out of this document.

   6.  A bit of PREOF-RESPONCE flag is added in the packet.

   7.  When a PEF node generates the PREOF-RESPONCE packet, it should
   set SN-bit of the trace type field and record the counter value for
   the replica.

7.  PREOF IOAM TRACE Procedures

   The head node of PREOF IOAM TRACE is an end system or an relay node
   within the DetNet domain, and an IOAM encapsulating node in the OAM
   domain.  The tail node of PREOF IOAM TRACE is an end system or an
   relay node within the DetNet domain, and an IOAM decapsulating node
   in the OAM domain.  Once It is confirmed that the tail node has no
   less than one reachable route to the head node, DetNet can perform
   PREOF IOAM TRACE with following procedures:

7.1.  OAM Head Node

   1.  The head node generates PREOF-TRACE packets for trageted DetNet
   service flow and sends PREOF-TRACE packets to the tail node within
   the OAM domain.  A serial number is allocated in each packet.

   2.  For every PREOF-TRACE packet, the head node waits for its PREOF-
   RESPONCE packet carrying the same serial number.

   3.  The head node receives PREOF-RESPONCE packets and extracts out
   information about all PREOF entities.

   There is a state machine for the head node to wait and receive PREOF-
   RESPONCE packets which are normally more than one when PEF entity
   exists.

7.2.  Intermediate Node

   The procedures for intermediate node depend on following cases:

   Case 1: the intermediate node is a DetNet transit node which only
   works on forwarding sub-layer.

Qian, et al.              Expires 25 March 2024                [Page 10]
Internet-Draft   PREOF IOAM for DetNet Service Sub-layer  September 2023

   For case 1, the intermediate node directly forwards the packet to the
   next hop without processing its inner OAM part.

   Case 2: the intermediate node is a DetNet relay node which works on
   service sub-layer, but it is not a PREOF entity for the trageted
   DetNet service flow.

   For case 2, the intermediate node directly forwards the packet to the
   next hop without processing its inner OAM part.

   Case 3: the intermediate node is a DetNet relay node which runs PRF
   for the trageted DetNet service flow.

   For case 3, the intermediate node performs the following steps:

   1.  It copys the PREOF-Trace packet, including the OAM serial number,
   and adds a PRF record into the data field of each copied message
   according to the trace type field.

   2.  It sends replicas through multiple egress interfaces to multiple
   next hops, complying with the rules pre-defined in the PRF entity.

   Case 4: the intermediate node is a DetNet relay node which runs PEF
   for the trageted DetNet service flow..

   For case 4, the intermediate node performs the following steps:

   1.  It counts the number of received replicas locally based on the
   serial number of PREOF-TRACE packet.

   2.  If the count value is 1, it adds a PEF record in the data area of
   the PREOF-TRACE message according to the trace type field, and
   continues forwarding the PREOF-TRACE packet.

   3.  If the count value is equal to or bigger than 2, it generates a
   PREOF-RESPONCE packet containing all historical trace records, one
   current PEF record, as well as the count value in step 1.

   4.  It sends the PREOF-RESPONCE packet to the OAM head node, while
   the PREOF-TRACE replica is discarded.

   Case 5: the intermediate node is a DetNet relay node which runs POF
   for the trageted DetNet service flow.

   For case 5, the intermediate node performs the following steps:

   1.  It adds a POF record to the data field of the PREOF-TRACE packet
   according to the trace type field.

Qian, et al.              Expires 25 March 2024                [Page 11]
Internet-Draft   PREOF IOAM for DetNet Service Sub-layer  September 2023

   2.  PREOF-TRACE packets out of order are reordered in the queue by
   their serial numbers.

   3.  PREOF-TRACE packets are sent to the next hop in order.

7.3.  OAM Tail Node

   When the tail node receives PREOF-TRACE, it generates a PREOF-
   RESPONCE packet whose content is described in section 5, and sends it
   back to the OAM head node.

8.  Security Considerations

   TBA.

9.  IANA Considerations

   TBA.

10.  References

10.1.  Normative References

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119,
              DOI 10.17487/RFC2119, March 1997,
              <https://www.rfc-editor.org/info/rfc2119>.

   [RFC8174]  Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
              2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
              May 2017, <https://www.rfc-editor.org/info/rfc8174>.

   [RFC8655]  Finn, N., Thubert, P., Varga, B., and J. Farkas,
              "Deterministic Networking Architecture", RFC 8655,
              DOI 10.17487/RFC8655, October 2019,
              <https://www.rfc-editor.org/info/rfc8655>.

10.2.  Informative References

   [I-D.varga-detnet-service-sub-layer-oam]
              Varga, B., Farkas, J., and G. Mirsky, "Deterministic
              Networking (DetNet): OAM Functions for The Service Sub-
              Layer", Work in Progress, Internet-Draft, draft-varga-
              detnet-service-sub-layer-oam-03, 25 July 2022,
              <https://datatracker.ietf.org/doc/html/draft-varga-detnet-
              service-sub-layer-oam-03>.

Qian, et al.              Expires 25 March 2024                [Page 12]
Internet-Draft   PREOF IOAM for DetNet Service Sub-layer  September 2023

   [RFC8938]  Varga, B., Ed., Farkas, J., Berger, L., Malis, A., and S.
              Bryant, "Deterministic Networking (DetNet) Data Plane
              Framework", RFC 8938, DOI 10.17487/RFC8938, November 2020,
              <https://www.rfc-editor.org/info/rfc8938>.

   [RFC8939]  Varga, B., Ed., Farkas, J., Berger, L., Fedyk, D., and S.
              Bryant, "Deterministic Networking (DetNet) Data Plane:
              IP", RFC 8939, DOI 10.17487/RFC8939, November 2020,
              <https://www.rfc-editor.org/info/rfc8939>.

   [RFC9546]  Mirsky, G., Chen, M., and B. Varga, "Operations,
              Administration, and Maintenance (OAM) for Deterministic
              Networking (DetNet) with the MPLS Data Plane", RFC 9546,
              DOI 10.17487/RFC9546, February 2024,
              <https://www.rfc-editor.org/info/rfc9546>.

   [RFC9551]  Mirsky, G., Theoleyre, F., Papadopoulos, G., Bernardos,
              CJ., Varga, B., and J. Farkas, "Framework of Operations,
              Administration, and Maintenance (OAM) for Deterministic
              Networking (DetNet)", RFC 9551, DOI 10.17487/RFC9551,
              March 2024, <https://www.rfc-editor.org/info/rfc9551>.

Authors' Addresses

   Xiaocong Qian
   ZTE Corporation
   No.50 Software Avenue
   Nanjing
   Jiangsu, 210012
   China
   Email: qian.xiaocong@zte.com.cn

   Quan Xiong
   ZTE Corporation
   No.6 Huashi Park Rd
   Wuhan
   Hubei, 430223
   China
   Email: xiong.quan@zte.com.cn

   Fenlin Zhou
   ZTE Corporation
   No.50 Software Avenue
   Nanjing
   Jiangsu, 210012
   China

Qian, et al.              Expires 25 March 2024                [Page 13]
Internet-Draft   PREOF IOAM for DetNet Service Sub-layer  September 2023

   Email: zhou.fenlin@zte.com.cn

Qian, et al.              Expires 25 March 2024                [Page 14]