Deterministic Networking Flow Information Model
draft-zha-detnet-flow-info-model-02

Document Type Active Internet-Draft (individual)
Last updated 2017-03-13
Stream (None)
Intended RFC status (None)
Formats plain text pdf html bibtex
Stream Stream state (No stream defined)
Consensus Boilerplate Unknown
RFC Editor Note (None)
IESG IESG state I-D Exists
Telechat date
Responsible AD (None)
Send notices to (None)
Network Working Group                                           Y. Zha 
Internet Draft                                                Y. Jiang 
Intended status: Informational                     Huawei Technologies 
Expires: September 2017                                        L. Geng 
                                                          China Mobile 
                                                                      
                                                        March 13, 2017 
 
                                    
            Deterministic Networking Flow Information Model 
                  draft-zha-detnet-flow-info-model-02 

Abstract 

   Deterministic Networking (DetNet) provides end-to-end absolute 
   delay and loss guarantee to serve real-time applications. DetNet 
   is focused on a general approach that use techniques such as 1) 
   data plane resources reservation for DetNet flows; 2) providing  
   fixed path for DetNet flows; 3)sequentializng, replicating, and 
   eliminating duplicate packets transmission [draft-ietf-detnet-
   architecture-00] to guarantee the worst case delay of DetNet flow 
   while allow sharing among best effort traffic. Data flow 
   information model is important to the DetNet work that it defines 
   information be used by flow establishment and control protocols. 
   This document describes and DetNet flow information model that 
   represents the flow identifier, traffic description information so 
   that can make resource reservation and provide differentiate 
   service.  

Status of this Memo 

   This Internet-Draft is submitted in full conformance with the 
   provisions of BCP 78 and BCP 79.  

   Internet-Drafts are working documents of the Internet Engineering 
   Task Force (IETF), its areas, and its working groups.  Note that 
   other groups may also distribute working documents as Internet-
   Drafts. 

   Internet-Drafts are draft documents valid for a maximum of six 
   months and may be updated, replaced, or obsoleted by other 
   documents at any time.  It is inappropriate to use Internet-Drafts 
   as reference material or to cite them other than as "work in 
   progress." 

   The list of current Internet-Drafts can be accessed at 
   http://www.ietf.org/ietf/1id-abstracts.txt 
 
 
 
Zha, et al.           Expires September 13 2017               [Page 1] 


Internet-Draft         DetNet Flow Info Model               March 2017 
    

   The list of Internet-Draft Shadow Directories can be accessed at 
   http://www.ietf.org/shadow.html 

   This Internet-Draft will expire on September 13, 2017. 

Copyright Notice 

   Copyright (c) 2014 IETF Trust and the persons identified as the 
   document authors. All rights reserved. 

   This document is subject to BCP 78 and the IETF Trust's Legal 
   Provisions Relating to IETF Documents 
   (http://trustee.ietf.org/license-info) in effect on the date of 
   publication of this document. Please review these documents 
   carefully, as they describe your rights and restrictions with 
   respect to this document. Code Components extracted from this 
   document must include Simplified BSD License text as described in 
   Section 4.e of the Trust Legal Provisions and are provided without 
   warranty as described in the Simplified BSD License. 

Table of Contents 

   1. Introduction ................................................2 
   2. Conventions used in this document ............................3 
   3. DetNet Flow Information Model ................................4 
      3.1. Flow Identifier .........................................4 
         3.1.1. Layer 2 Flow Identification ........................5 
         3.1.2. Layer 3 Flow Identification ........................6 
      3.2. Transport Layer Information .............................6 
      3.3. Flow Traffic Description ................................7 
         3.3.1. Traffic Type .......................................9 
         3.3.2. Traffic Shaping ....................................9 
      3.4. Flow Statistics ........................................10 
   4. Use of Flow Information Model ...............................11 
      4.1. Mapping of Flow Information ............................11 
      4.2. Data Plane Configuration ...............................12 
   5. Security Considerations .....................................13 
   6. IANA Considerations .........................................13 
   7. Acknowledgments .............................................14 
   8. References ..................................................14 
      8.1. Normative References ...................................14 
      8.2. Informative References .................................14 
    
1. Introduction 

   Deterministic service with both assured delay and data loss is 
   promising to service providers. Due to lack of deterministic 
Show full document text