<?xml version='1.0' encoding='utf-8'?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" version="3" category="std" consensus="true" docName="draft-ietf-detnet-ip-07" indexInclude="true" ipr="trust200902" number="8939" prepTime="2020-11-30T13:56:59" scripts="Common,Latin" sortRefs="true" submissionType="IETF" symRefs="true" tocDepth="3" tocInclude="true" xml:lang="en">
  <link href="https://datatracker.ietf.org/doc/draft-ietf-detnet-ip-07" rel="prev"/>
  <link href="https://dx.doi.org/10.17487/rfc8939" rel="alternate"/>
  <link href="urn:issn:2070-1721" rel="alternate"/>
  <front>
    <title abbrev="DetNet Data Plane: IP">Deterministic Networking (DetNet) Data Plane: IP</title>
    <seriesInfo name="RFC" value="8939" stream="IETF"/>
    <author role="editor" fullname="Balázs Varga" initials="B." surname="Varga">
      <organization showOnFrontPage="true">Ericsson</organization>
      <address>
        <postal>
          <street>Magyar Tudosok krt. 11.</street>
          <city>Budapest</city>
          <country>Hungary</country>
          <code>1117</code>
        </postal>
        <email>balazs.a.varga@ericsson.com</email>
      </address>
    </author>
    <author fullname="János Farkas" initials="J." surname="Farkas">
      <organization showOnFrontPage="true">Ericsson</organization>
      <address>
        <postal>
          <street>Magyar Tudosok krt. 11.</street>
          <city>Budapest</city>
          <country>Hungary</country>
          <code>1117</code>
        </postal>
        <email>janos.farkas@ericsson.com</email>
      </address>
    </author>
    <author fullname="Lou Berger" initials="L." surname="Berger">
      <organization showOnFrontPage="true">LabN Consulting, L.L.C.</organization>
      <address>
        <email>lberger@labn.net</email>
      </address>
    </author>
    <author fullname="Don Fedyk" initials="D." surname="Fedyk">
      <organization showOnFrontPage="true">LabN Consulting, L.L.C.</organization>
      <address>
        <email>dfedyk@labn.net</email>
      </address>
    </author>
    <author fullname="Stewart Bryant" initials="S." surname="Bryant">
      <organization showOnFrontPage="true">Futurewei Technologies</organization>
      <address>
        <email>sb@stewartbryant.com</email>
      </address>
    </author>
    <date month="11" year="2020"/>
    <workgroup>DetNet</workgroup>
    <keyword>Application</keyword>
    <keyword>Endpoint</keyword>
    <keyword>Service Sub-layer</keyword>
    <keyword>Forwarding Sub-layer</keyword>
    <abstract pn="section-abstract">
      <t indent="0" pn="section-abstract-1">
        This document specifies the Deterministic Networking (DetNet)
        data plane operation for IP hosts and routers that provide DetNet
        service to IP-encapsulated data. No DetNet-specific encapsulation is
        defined to support IP flows; instead, the existing IP-layer and
        higher-layer protocol header information is used to support flow
        identification and DetNet service delivery.  This document builds on
        the DetNet architecture (RFC 8655) and data plane framework
        (RFC 8938).
      </t>
    </abstract>
    <boilerplate>
      <section anchor="status-of-memo" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.1">
        <name slugifiedName="name-status-of-this-memo">Status of This Memo</name>
        <t indent="0" pn="section-boilerplate.1-1">
            This is an Internet Standards Track document.
        </t>
        <t indent="0" pn="section-boilerplate.1-2">
            This document is a product of the Internet Engineering Task Force
            (IETF).  It represents the consensus of the IETF community.  It has
            received public review and has been approved for publication by
            the Internet Engineering Steering Group (IESG).  Further
            information on Internet Standards is available in Section 2 of 
            RFC 7841.
        </t>
        <t indent="0" pn="section-boilerplate.1-3">
            Information about the current status of this document, any
            errata, and how to provide feedback on it may be obtained at
            <eref target="https://www.rfc-editor.org/info/rfc8939" brackets="none"/>.
        </t>
      </section>
      <section anchor="copyright" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.2">
        <name slugifiedName="name-copyright-notice">Copyright Notice</name>
        <t indent="0" pn="section-boilerplate.2-1">
            Copyright (c) 2020 IETF Trust and the persons identified as the
            document authors. All rights reserved.
        </t>
        <t indent="0" pn="section-boilerplate.2-2">
            This document is subject to BCP 78 and the IETF Trust's Legal
            Provisions Relating to IETF Documents
            (<eref target="https://trustee.ietf.org/license-info" brackets="none"/>) in effect on the date of
            publication of this document. Please review these documents
            carefully, as they describe your rights and restrictions with
            respect to this document. Code Components extracted from this
            document must include Simplified BSD License text as described in
            Section 4.e of the Trust Legal Provisions and are provided without
            warranty as described in the Simplified BSD License.
        </t>
      </section>
    </boilerplate>
    <toc>
      <section anchor="toc" numbered="false" removeInRFC="false" toc="exclude" pn="section-toc.1">
        <name slugifiedName="name-table-of-contents">Table of Contents</name>
        <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1">
          <li pn="section-toc.1-1.1">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.1"><xref derivedContent="1" format="counter" sectionFormat="of" target="section-1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-introduction">Introduction</xref></t>
          </li>
          <li pn="section-toc.1-1.2">
            <t indent="0" pn="section-toc.1-1.2.1"><xref derivedContent="2" format="counter" sectionFormat="of" target="section-2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-terminology">Terminology</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.2.2">
              <li pn="section-toc.1-1.2.2.1">
                <t indent="0" keepWithNext="true" pn="section-toc.1-1.2.2.1.1"><xref derivedContent="2.1" format="counter" sectionFormat="of" target="section-2.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-terms-used-in-this-document">Terms Used in This Document</xref></t>
              </li>
              <li pn="section-toc.1-1.2.2.2">
                <t indent="0" keepWithNext="true" pn="section-toc.1-1.2.2.2.1"><xref derivedContent="2.2" format="counter" sectionFormat="of" target="section-2.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-abbreviations">Abbreviations</xref></t>
              </li>
              <li pn="section-toc.1-1.2.2.3">
                <t indent="0" pn="section-toc.1-1.2.2.3.1"><xref derivedContent="2.3" format="counter" sectionFormat="of" target="section-2.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-requirements-language">Requirements Language</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.3">
            <t indent="0" pn="section-toc.1-1.3.1"><xref derivedContent="3" format="counter" sectionFormat="of" target="section-3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-overview-of-the-detnet-ip-d">Overview of the DetNet IP Data Plane</xref></t>
          </li>
          <li pn="section-toc.1-1.4">
            <t indent="0" pn="section-toc.1-1.4.1"><xref derivedContent="4" format="counter" sectionFormat="of" target="section-4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-detnet-ip-data-plane-consid">DetNet IP Data Plane Considerations</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.4.2">
              <li pn="section-toc.1-1.4.2.1">
                <t indent="0" pn="section-toc.1-1.4.2.1.1"><xref derivedContent="4.1" format="counter" sectionFormat="of" target="section-4.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-end-system-specific-conside">End-System-Specific Considerations</xref></t>
              </li>
              <li pn="section-toc.1-1.4.2.2">
                <t indent="0" pn="section-toc.1-1.4.2.2.1"><xref derivedContent="4.2" format="counter" sectionFormat="of" target="section-4.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-detnet-domain-specific-cons">DetNet Domain-Specific Considerations</xref></t>
              </li>
              <li pn="section-toc.1-1.4.2.3">
                <t indent="0" pn="section-toc.1-1.4.2.3.1"><xref derivedContent="4.3" format="counter" sectionFormat="of" target="section-4.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-forwarding-sub-layer-consid">Forwarding Sub-Layer Considerations</xref></t>
                <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.4.2.3.2">
                  <li pn="section-toc.1-1.4.2.3.2.1">
                    <t indent="0" pn="section-toc.1-1.4.2.3.2.1.1"><xref derivedContent="4.3.1" format="counter" sectionFormat="of" target="section-4.3.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-class-of-service">Class of Service</xref></t>
                  </li>
                  <li pn="section-toc.1-1.4.2.3.2.2">
                    <t indent="0" pn="section-toc.1-1.4.2.3.2.2.1"><xref derivedContent="4.3.2" format="counter" sectionFormat="of" target="section-4.3.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-quality-of-service">Quality of Service</xref></t>
                  </li>
                  <li pn="section-toc.1-1.4.2.3.2.3">
                    <t indent="0" pn="section-toc.1-1.4.2.3.2.3.1"><xref derivedContent="4.3.3" format="counter" sectionFormat="of" target="section-4.3.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-path-selection">Path Selection</xref></t>
                  </li>
                </ul>
              </li>
              <li pn="section-toc.1-1.4.2.4">
                <t indent="0" pn="section-toc.1-1.4.2.4.1"><xref derivedContent="4.4" format="counter" sectionFormat="of" target="section-4.4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-detnet-flow-aggregation">DetNet Flow Aggregation</xref></t>
              </li>
              <li pn="section-toc.1-1.4.2.5">
                <t indent="0" pn="section-toc.1-1.4.2.5.1"><xref derivedContent="4.5" format="counter" sectionFormat="of" target="section-4.5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-bidirectional-traffic">Bidirectional Traffic</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.5">
            <t indent="0" pn="section-toc.1-1.5.1"><xref derivedContent="5" format="counter" sectionFormat="of" target="section-5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-detnet-ip-data-plane-proced">DetNet IP Data Plane Procedures</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.5.2">
              <li pn="section-toc.1-1.5.2.1">
                <t indent="0" pn="section-toc.1-1.5.2.1.1"><xref derivedContent="5.1" format="counter" sectionFormat="of" target="section-5.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-detnet-ip-flow-identificati">DetNet IP Flow Identification Procedures</xref></t>
                <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.5.2.1.2">
                  <li pn="section-toc.1-1.5.2.1.2.1">
                    <t indent="0" pn="section-toc.1-1.5.2.1.2.1.1"><xref derivedContent="5.1.1" format="counter" sectionFormat="of" target="section-5.1.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-ip-header-information">IP Header Information</xref></t>
                  </li>
                  <li pn="section-toc.1-1.5.2.1.2.2">
                    <t indent="0" pn="section-toc.1-1.5.2.1.2.2.1"><xref derivedContent="5.1.2" format="counter" sectionFormat="of" target="section-5.1.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-other-protocol-header-infor">Other Protocol Header Information</xref></t>
                  </li>
                </ul>
              </li>
              <li pn="section-toc.1-1.5.2.2">
                <t indent="0" pn="section-toc.1-1.5.2.2.1"><xref derivedContent="5.2" format="counter" sectionFormat="of" target="section-5.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-forwarding-procedures">Forwarding Procedures</xref></t>
              </li>
              <li pn="section-toc.1-1.5.2.3">
                <t indent="0" pn="section-toc.1-1.5.2.3.1"><xref derivedContent="5.3" format="counter" sectionFormat="of" target="section-5.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-detnet-ip-traffic-treatment">DetNet IP Traffic Treatment Procedures</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.6">
            <t indent="0" pn="section-toc.1-1.6.1"><xref derivedContent="6" format="counter" sectionFormat="of" target="section-6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-management-and-control-info">Management and Control Information Summary</xref></t>
          </li>
          <li pn="section-toc.1-1.7">
            <t indent="0" pn="section-toc.1-1.7.1"><xref derivedContent="7" format="counter" sectionFormat="of" target="section-7"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-security-considerations">Security Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.8">
            <t indent="0" pn="section-toc.1-1.8.1"><xref derivedContent="8" format="counter" sectionFormat="of" target="section-8"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-iana-considerations">IANA Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.9">
            <t indent="0" pn="section-toc.1-1.9.1"><xref derivedContent="9" format="counter" sectionFormat="of" target="section-9"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-references">References</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.9.2">
              <li pn="section-toc.1-1.9.2.1">
                <t indent="0" pn="section-toc.1-1.9.2.1.1"><xref derivedContent="9.1" format="counter" sectionFormat="of" target="section-9.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-normative-references">Normative References</xref></t>
              </li>
              <li pn="section-toc.1-1.9.2.2">
                <t indent="0" pn="section-toc.1-1.9.2.2.1"><xref derivedContent="9.2" format="counter" sectionFormat="of" target="section-9.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-informative-references">Informative References</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.10">
            <t indent="0" pn="section-toc.1-1.10.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.a"/><xref derivedContent="" format="title" sectionFormat="of" target="name-acknowledgements">Acknowledgements</xref></t>
          </li>
          <li pn="section-toc.1-1.11">
            <t indent="0" pn="section-toc.1-1.11.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.b"/><xref derivedContent="" format="title" sectionFormat="of" target="name-contributors">Contributors</xref></t>
          </li>
          <li pn="section-toc.1-1.12">
            <t indent="0" pn="section-toc.1-1.12.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.c"/><xref derivedContent="" format="title" sectionFormat="of" target="name-authors-addresses">Authors' Addresses</xref></t>
          </li>
        </ul>
      </section>
    </toc>
  </front>
  <middle>
    <section anchor="sec_intro" numbered="true" toc="include" removeInRFC="false" pn="section-1">
      <name slugifiedName="name-introduction">Introduction</name>
      <t indent="0" pn="section-1-1">
        Deterministic Networking (DetNet) is a service that can be offered by
        a network to DetNet flows.
        DetNet provides these flows with extremely low packet loss rates and
        assured maximum end-to-end
        delivery latency.  General background and concepts of DetNet can
        be found in the DetNet architecture <xref target="RFC8655" format="default" sectionFormat="of" derivedContent="RFC8655"/>.
      </t>
      <t indent="0" pn="section-1-2">
        This document specifies the DetNet data plane operation for IP hosts
        and routers that provide DetNet service to IP-encapsulated data.  No
        DetNet-specific encapsulation is defined to support IP flows; instead,
        the existing IP-layer and higher-layer protocol header information is used to
        support flow identification and DetNet service delivery. Common data plane
        procedures and control information for all DetNet data planes
        can be found in <xref target="RFC8938" format="default" sectionFormat="of" derivedContent="RFC8938"/>.
      </t>
      <t indent="0" pn="section-1-3">
        The DetNet architecture models the DetNet-related data plane functions
        as two sub-layers: a service sub-layer and a forwarding sub-layer.
        The service sub-layer is used to provide DetNet service protection
        (e.g., by the Packet Replication Function (PRF) and Packet Elimination
        Function (PEF)) and reordering. The forwarding sub-layer is used to
        provide congestion protection (low loss, assured latency, and limited
        out-of-order delivery).  The service sub-layer generally requires
        additional header fields to provide its service; for example, see
        <xref target="DetNet-MPLS" format="default" sectionFormat="of" derivedContent="DetNet-MPLS"/>.  Since no
        DetNet-specific fields are added to support DetNet IP flows, only the
        forwarding sub-layer functions are supported using the DetNet IP
        defined by this document.  Service protection can be provided on a
        per-sub-network basis using technologies such as MPLS <xref target="DetNet-MPLS" format="default" sectionFormat="of" derivedContent="DetNet-MPLS"/> and Ethernet,
        as specified by the IEEE 802.1 TSN (Time-Sensitive Networking) task
        group (referred to in this document simply as "IEEE 802.1 TSN").
        See <xref target="IEEE802.1TSNTG" format="default" sectionFormat="of" derivedContent="IEEE802.1TSNTG"/>.
      </t>
      <t indent="0" pn="section-1-4">
        This document provides an overview of the DetNet IP data plane in
        <xref target="sec_dt_dp" format="default" sectionFormat="of" derivedContent="Section 3"/> and considerations that
        apply to providing
        DetNet services via the DetNet IP data plane in <xref target="dn-gen-encap-solution" format="default" sectionFormat="of" derivedContent="Section 4"/>. <xref target="ip-procs" format="default" sectionFormat="of" derivedContent="Section 5"/>
        provides the procedures for hosts and routers that support IP-based
        DetNet services. <xref target="ip-flow-id-info" format="default" sectionFormat="of" derivedContent="Section 6"/> summarizes the set of
                information that is needed to identify an individual DetNet flow.
      </t>
    </section>
    <section numbered="true" toc="include" removeInRFC="false" pn="section-2">
      <name slugifiedName="name-terminology">Terminology</name>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-2.1">
        <name slugifiedName="name-terms-used-in-this-document">Terms Used in This Document</name>
        <t indent="0" pn="section-2.1-1">
          This document uses the terminology and concepts established in
          the DetNet architecture <xref target="RFC8655" format="default" sectionFormat="of" derivedContent="RFC8655"/>,
          and it is assumed that the reader is
          familiar with that document and its terminology.
        </t>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-2.2">
        <name slugifiedName="name-abbreviations">Abbreviations</name>
        <t indent="0" pn="section-2.2-1">
          The following abbreviations are used in this document:

        </t>
        <dl newline="false" spacing="normal" indent="14" pn="section-2.2-2">
          <dt pn="section-2.2-2.1">CoS</dt>
          <dd pn="section-2.2-2.2">Class of Service</dd>
          <dt pn="section-2.2-2.3">DetNet</dt>
          <dd pn="section-2.2-2.4">Deterministic Networking</dd>
          <dt pn="section-2.2-2.5">DN</dt>
          <dd pn="section-2.2-2.6">DetNet</dd>
          <dt pn="section-2.2-2.7">Diffserv</dt>
          <dd pn="section-2.2-2.8">Differentiated Services</dd>
          <dt pn="section-2.2-2.9">DSCP</dt>
          <dd pn="section-2.2-2.10">Differentiated Services Code Point</dd>
          <dt pn="section-2.2-2.11">L2</dt>
          <dd pn="section-2.2-2.12">Layer 2</dd>
          <dt pn="section-2.2-2.13">L3</dt>
          <dd pn="section-2.2-2.14">Layer 3</dd>
          <dt pn="section-2.2-2.15">LSP</dt>
          <dd pn="section-2.2-2.16">Label Switched Path</dd>
          <dt pn="section-2.2-2.17">MPLS</dt>
          <dd pn="section-2.2-2.18">Multiprotocol Label Switching</dd>
          <dt pn="section-2.2-2.19">PEF</dt>
          <dd pn="section-2.2-2.20">Packet Elimination Function</dd>
          <dt pn="section-2.2-2.21">PREOF</dt>
          <dd pn="section-2.2-2.22">Packet Replication, Elimination, and Ordering Functions</dd>
          <dt pn="section-2.2-2.23">PRF</dt>
          <dd pn="section-2.2-2.24">Packet Replication Function</dd>
          <dt pn="section-2.2-2.25">QoS</dt>
          <dd pn="section-2.2-2.26">Quality of Service</dd>
          <dt pn="section-2.2-2.27">TSN</dt>
          <dd pn="section-2.2-2.28">Time-Sensitive Networking. TSN is a task group of the IEEE
            802.1 Working Group.</dd>
        </dl>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-2.3">
        <name slugifiedName="name-requirements-language">Requirements Language</name>
        <t indent="0" pn="section-2.3-1">
    The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
    "<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
    described in BCP 14 <xref target="RFC2119" format="default" sectionFormat="of" derivedContent="RFC2119"/> <xref target="RFC8174" format="default" sectionFormat="of" derivedContent="RFC8174"/> 
    when, and only when, they appear in all capitals, as shown here.
        </t>
      </section>
    </section>
    <section anchor="sec_dt_dp" numbered="true" toc="include" removeInRFC="false" pn="section-3">
      <name slugifiedName="name-overview-of-the-detnet-ip-d">Overview of the DetNet IP Data Plane</name>
      <t indent="0" pn="section-3-1">
        This document describes how IP is used by DetNet nodes, i.e., hosts and
        routers, to identify DetNet flows and provide a DetNet service using an IP
        data plane. From a data plane perspective, an end-to-end IP model is
        followed.  As mentioned above, existing IP-layer and higher-layer
        protocol header information is used to support flow identification and
        DetNet
        service delivery. Common data plane procedures and control information
        for all DetNet data planes can be found in <xref target="RFC8938" format="default" sectionFormat="of" derivedContent="RFC8938"/>.  
      </t>
      <t indent="0" pn="section-3-2">
        The DetNet IP data plane primarily uses 6-tuple-based flow identification, where
        "6-tuple" refers to information carried in IP-layer and higher-layer protocol
        headers.  The 6-tuple referred to in this document is the same as
        that defined in <xref target="RFC3290" format="default" sectionFormat="of" derivedContent="RFC3290"/>. Specifically, the 6-tuple is
        destination address, source address, IP protocol, source port,
        destination port, and
        DSCP.  General background on the use of IP headers and 5-tuples
        to identify flows and support Quality of Service (QoS) can be found in
        <xref target="RFC3670" format="default" sectionFormat="of" derivedContent="RFC3670"/>.  <xref target="RFC7657" format="default" sectionFormat="of" derivedContent="RFC7657"/> also provides
        useful background on the delivery of Diffserv and tuple-based flow
        identification. Note that a 6-tuple is composed of a 5-tuple
        plus the addition of a DSCP component.
      </t>
      <t indent="0" pn="section-3-3">
            For some of the protocols, 5-tuples and 6-tuples cannot be used, because 
                the port information is not available (e.g., ICMP, IPsec, and
                Encapsulating Security Payload (ESP)). This is
                also the case for flow aggregates. In such cases, using
                fewer fields is appropriate, such as a 3-tuple (2 IP
                addresses, IP protocol) or even a 
                2-tuple (all IP traffic between two IP addresses).
      </t>
      <t indent="0" pn="section-3-4">
        The DetNet IP data plane also allows for optional matching on
        the IPv6 Flow Label field,
        as defined in <xref target="RFC8200" format="default" sectionFormat="of" derivedContent="RFC8200"/>.
      </t>
      <t indent="0" pn="section-3-5">
            Non-DetNet and DetNet IP packets have the same protocol
            header format on the wire. 
            Generally, the fields used in flow identification are forwarded 
            unmodified. However, standard modification of the
            DSCP field <xref target="RFC2474" format="default" sectionFormat="of" derivedContent="RFC2474"/> is not precluded.
      </t>
      <t indent="0" pn="section-3-6">
        DetNet flow aggregation may be enabled via the use of
        wildcards, masks, lists, prefixes, and ranges. IP tunnels may also be
        used to support flow aggregation. In these cases, it is
        expected that DetNet-aware intermediate nodes will provide
        DetNet service on the aggregate through resource
        allocation and congestion control mechanisms.
      </t>
      <t indent="0" pn="section-3-7">
        The specific procedures that are required to be implemented by a
        DetNet node supporting this document can be found in <xref target="ip-procs" format="default" sectionFormat="of" derivedContent="Section 5"/>.  The DetNet Controller Plane, as defined in
        <xref target="RFC8655" format="default" sectionFormat="of" derivedContent="RFC8655"/>, is responsible for providing each node
        with the information needed to identify and handle each DetNet flow.
      </t>
      <figure anchor="fig_ip_detnet_simple" align="left" suppress-title="false" pn="figure-1">
        <name slugifiedName="name-a-simple-detnet-enabled-ip-">A Simple DetNet-Enabled IP Network</name>
        <artwork name="" type="" align="left" alt="" pn="section-3-8.1">
 DetNet IP       Relay                        Relay       DetNet IP
 End System      Node                         Node        End System

+----------+                                             +----------+
|   Appl.  |&lt;------------ End-to-End Service -----------&gt;|   Appl.  |
+----------+  ............                 ...........   +----------+
| Service  |&lt;-: Service  :-- DetNet flow --: Service  :-&gt;| Service  |
+----------+  +----------+                 +----------+  +----------+
|Forwarding|  |Forwarding|                 |Forwarding|  |Forwarding|
+--------.-+  +-.------.-+                 +-.---.----+  +-------.--+
         : Link :       \      ,-----.      /     \   ,-----.   /
         +......+        +----[  Sub- ]----+       +-[  Sub- ]-+
                              [Network]              [Network]
                               `-----'                `-----'

         |&lt;--------------------- DetNet IP ---------------------&gt;|
                         </artwork>
      </figure>
      <t indent="0" pn="section-3-9">
        <xref target="fig_ip_detnet_simple" format="default" sectionFormat="of" derivedContent="Figure 1"/> illustrates a
        DetNet-enabled IP
        network.  The DetNet-enabled end systems originate IP-encapsulated
        traffic that is identified within the DetNet domain as DetNet
        flows based on IP header information. 
                Relay nodes understand the
        forwarding requirements of the DetNet flow and ensure that node,
        interface, and sub-network resources are allocated to ensure DetNet
        service requirements. The dotted line around the Service component of
        the Relay Nodes indicates that the transit routers are
        DetNet service aware but do not perform any DetNet service sub-layer
        function, e.g., PREOF.
      </t>
      <aside pn="section-3-10">
        <t indent="0" pn="section-3-10.1">
        Note: The sub-network can represent a TSN, MPLS network, or other
        network technology that can carry DetNet IP traffic.
        </t>
      </aside>
      <figure anchor="fig_non_detnet_ip" align="left" suppress-title="false" pn="figure-2">
        <name slugifiedName="name-non-detnet-aware-ip-end-sys">Non-DetNet-Aware IP End Systems with DetNet IP Domain</name>
        <artwork name="" type="" align="left" alt="" pn="section-3-11.1">
 IP              Edge                        Edge         IP
 End System      Node                        Node         End System

+----------+   +.........+                 +.........+   +----------+
|   Appl.  |&lt;--:Svc Proxy:-- E2E Service---:Svc Proxy:--&gt;|   Appl.  |
+----------+   +.........+                 +.........+   +----------+
|    IP    |&lt;--:IP : :Svc:---- IP flow ----:Svc: :IP :--&gt;|    IP    |
+----------+   +---+ +---+                 +---+ +---+   +----------+
|Forwarding|   |Fwd| |Fwd|                 |Fwd| |Fwd|   |Forwarding|
+--------.-+   +-.-+ +-.-+                 +-.-+ +-.-+   +---.------+
         :  Link :      \      ,-----.      /     /  ,-----.  \
         +.......+       +----[  Sub- ]----+     +--[  Sub- ]--+
                              [network]             [network]
                               `-----'               `-----'

      |&lt;--- IP ---&gt;| |&lt;------ DetNet IP ------&gt;| |&lt;--- IP ---&gt;|
                         </artwork>
      </figure>
      <t indent="0" pn="section-3-12">
        <xref target="fig_non_detnet_ip" format="default" sectionFormat="of" derivedContent="Figure 2"/> illustrates a variant of <xref target="fig_ip_detnet_simple" format="default" sectionFormat="of" derivedContent="Figure 1"/> where the end systems are not DetNet
        aware.  In this case, edge nodes sit at the boundary of the DetNet
        domain and provide DetNet service proxies for the end applications by
        initiating and terminating DetNet service for the application's IP
        flows.  The existing header information or an approach such as described
        in <xref target="aggregation" format="default" sectionFormat="of" derivedContent="Section 4.4"/> can be used to support DetNet flow
        identification.
      </t>
      <t indent="0" pn="section-3-13">
        Note that Figures <xref target="fig_ip_detnet_simple" format="counter" sectionFormat="of" derivedContent="1"/> and <xref target="fig_non_detnet_ip" format="counter" sectionFormat="of" derivedContent="2"/> can be collapsed,
        so IP DetNet
        end systems can communicate over a DetNet IP network with IP end systems.
      </t>
      <t indent="0" pn="section-3-14">
        As non-DetNet and DetNet IP packets have the same protocol header
        format on the wire, from
        a data plane perspective, the only difference is that there is
        flow-associated DetNet information on each DetNet node that
        defines the flow-related characteristics and required forwarding
        behavior.  As shown above, edge nodes provide a Service Proxy
        function that "associates" one or more IP flows with the
        appropriate DetNet flow-specific information and ensures that
        the flow receives the proper traffic treatment within the domain.
      </t>
      <aside pn="section-3-15">
        <t indent="0" pn="section-3-15.1">
        Note: The operation of IEEE 802.1 TSN end systems over DetNet-enabled
        IP networks is not described in this document. TSN
        over MPLS is described in <xref target="I-D.ietf-detnet-tsn-vpn-over-mpls" format="default" sectionFormat="of" derivedContent="DetNet-TSN-over-MPLS"/>.
</t>
      </aside>
    </section>
    <section anchor="dn-gen-encap-solution" numbered="true" toc="include" removeInRFC="false" pn="section-4">
      <name slugifiedName="name-detnet-ip-data-plane-consid">DetNet IP Data Plane Considerations</name>
      <t indent="0" pn="section-4-1">
        This section provides considerations related to
        providing DetNet service to flows that are identified
        based on their header information.
      </t>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-4.1">
        <name slugifiedName="name-end-system-specific-conside">End-System-Specific Considerations</name>
        <t indent="0" pn="section-4.1-1">
          Data flows requiring DetNet service are generated and terminated on
          end systems.  This document deals only with IP end systems. 
          The protocols used by an IP end system are specific to an application,
          and end systems peer with other end systems.  
          DetNet's use of 6-tuple IP flow
          identification means that DetNet must be aware of not only the
          format of the IP header, but also of the next protocol value carried
          within an IP packet (see <xref target="nxt-proto-field" format="default" sectionFormat="of" derivedContent="Section 5.1.1.3"/>).
        </t>
        <t indent="0" pn="section-4.1-2">
          For DetNet-unaware IP end systems, service-level proxy functions are
          needed inside the DetNet domain.
        </t>
        <t indent="0" pn="section-4.1-3">
          When IP end systems are DetNet aware, no application-level or
          service-level proxy functions are needed inside the DetNet domain.
          End systems need to ensure that DetNet service requirements are met
          when processing packets associated to a DetNet flow.  When
          sending packets, this means that packets are
          appropriately shaped on transmission and receive appropriate traffic
          treatment on the connected sub-network; see Sections <xref target="QoS" format="counter" sectionFormat="of" derivedContent="4.3.2"/> and <xref target="dn_dom_spec_cons" format="counter" sectionFormat="of" derivedContent="4.2"/> for more details.  When receiving packets,
          this means that there are appropriate local node resources,
          e.g., buffers, to receive and process the packets of that DetNet flow.
        </t>
        <t indent="0" pn="section-4.1-4">
          An important additional consideration for DetNet-aware end
          systems is avoiding IP fragmentation.  Full 6-tuple flow
          identification is not possible on IP fragments, as fragments
          don't include the transport headers or their port
          information. As such, it is important that applications and/or
          end systems use an IP packet size that will avoid
          fragmentation within the network when sending DetNet flows.
          The maximum size can be learned via Path MTU Discovery <xref target="RFC1191" format="default" sectionFormat="of" derivedContent="RFC1191"/> <xref target="RFC8201" format="default" sectionFormat="of" derivedContent="RFC8201"/> or via the Controller Plane.  Note that Path MTU
          Discovery relies on
          ICMP, which may not follow the same path as an individual
          DetNet flow.
        </t>
        <t indent="0" pn="section-4.1-5">
          In order to maximize reuse of existing mechanisms,
          DetNet-aware applications and end systems <bcp14>SHOULD NOT</bcp14> mix
          DetNet and non-DetNet traffic within a single 5-tuple.
        </t>
      </section>
      <section anchor="dn_dom_spec_cons" numbered="true" toc="include" removeInRFC="false" pn="section-4.2">
        <name slugifiedName="name-detnet-domain-specific-cons">DetNet Domain-Specific Considerations</name>
        <t indent="0" pn="section-4.2-1">
          As a general rule, DetNet IP domains need to be able to forward any
          DetNet flow identified by the IP 6-tuple. Doing otherwise would limit 
          the number of 6-tuple flow ID combinations that could be
          used by the end systems. From a practical standpoint, this
          means that all nodes along the end-to-end path of DetNet flows need
          to agree on what fields are used for flow identification.
          Possible consequences of not having such an agreement include
          some flows interfering with other flows, and
          the traffic treatment expected for a service not being
          provided. 
        </t>
        <t indent="0" pn="section-4.2-2">
          From a connection-type perspective, two scenarios are identified:
        </t>
        <ol spacing="normal" type="1" indent="adaptive" start="1" pn="section-4.2-3">
          <li pn="section-4.2-3.1" derivedCounter="1.">
              DN attached: the end system is directly connected to an edge
              node or the end system is behind a sub-network.  (See ES1 and
              ES2 in <xref target="fig_es_con_types" format="default" sectionFormat="of" derivedContent="Figure 3"/>.)
            </li>
          <li pn="section-4.2-3.2" derivedCounter="2.">
              DN integrated: the end system is part of the DetNet domain. (See ES3
              in <xref target="fig_es_con_types" format="default" sectionFormat="of" derivedContent="Figure 3"/>.)
            </li>
        </ol>
        <t indent="0" pn="section-4.2-4">
          L3 (IP) end systems may use any of these connection types.  A DetNet
          domain allows communication between any end systems using the
          same encapsulation format, independent of their connection type and
          DetNet capability. DN-attached end systems have no knowledge about
          the DetNet domain and its encapsulation format.  See <xref target="fig_es_con_types" format="default" sectionFormat="of" derivedContent="Figure 3"/> for L3 end system connection examples.
        </t>
        <figure anchor="fig_es_con_types" align="left" suppress-title="false" pn="figure-3">
          <name slugifiedName="name-connection-types-of-l3-end-">Connection Types of L3 End Systems</name>
          <artwork align="center" name="" type="" alt="" pn="section-4.2-5.1">
                                   ____+----+
           +----+        _____    /    | ES3|
           | ES1|____   /     \__/     +----+___
           +----+    \ /                        \
                      +                          |
              ____     \                        _/
+----+     __/    \     +__  DetNet IP domain  /
| ES2|____/  L2/L3 |___/   \         __     __/
+----+    \_______/         \_______/  \___/
        </artwork>
        </figure>
        <t indent="0" pn="section-4.2-6">
            Within a DetNet domain, the DetNet-enabled IP routers are
            interconnected by links and sub-networks to support end-to-end
            delivery of DetNet flows.  From a DetNet architecture perspective,
            these routers are DetNet relays, as they must be DetNet service
            aware.  Such routers identify DetNet flows based on the IP 6-tuple
            and ensure that the traffic treatment required by the DetNet service is
            provided on both the node and any attached sub-network.
        </t>
        <t indent="0" pn="section-4.2-7">
            This solution provides DetNet functions end to end, but it does so
            on a per-link and per-sub-network basis.  Congestion protection, latency
            control,
            and resource allocation (queuing, policing,
            shaping) are supported using the underlying
            link/sub-network-specific mechanisms.  However, service protection
            (PRF and PEF) is not
            provided end to end at the DetNet layer.  
Instead, service protection can be
            provided on a per-link (underlying
  L2 link) and per-sub-network basis.
        </t>
        <t indent="0" pn="section-4.2-8">
              The DetNet service flow is mapped to the
              link/sub-network-specific resources using an underlying
              system-specific
              means. This implies that each DetNet-aware node on the path looks
              into the forwarded DetNet service flow packet and utilizes,
              for example, a 6-tuple to find out the required mapping within
              a node.
        </t>
        <t indent="0" pn="section-4.2-9">
          As noted earlier, service protection must be implemented within 
          each link/sub-network independently, using the domain-specific 
          mechanisms. This is due to the lack of unified end-to-end 
          sequencing information that could be used by the intermediate 
          nodes.
          Therefore, service protection (if enabled) cannot be provided
          end to end, only within sub-networks. This is shown for a scenario
          with three sub-networks in <xref target="fig_pref_in_subnets" format="default" sectionFormat="of" derivedContent="Figure 4"/>,
          where each sub-network can provide service protection between
              its borders. "R" and "E" denote replication and elimination
                          points within the sub-network.
        </t>
        <figure anchor="fig_pref_in_subnets" align="left" suppress-title="false" pn="figure-4">
          <name slugifiedName="name-replication-and-elimination">Replication and Elimination in Sub-networks for DetNet IP
          Networks</name>
          <artwork align="center" name="" type="" alt="" pn="section-4.2-10.1">
     &lt;-------------------- DetNet IP ------------------------&gt;
                                 ______
                       ____     /      \__
            ____      /     \__/          \___   ______
+----+   __/    +====+                       +==+      \     +----+
|src |__/ Sub-N1 )   |                       |  \ Sub-N3\____| dst|
+----+  \_______/    \      Sub-network 2    |   \______/    +----+
                      \_                    _/
                        \         __     __/
                         \_______/  \___/


          +---+        +---------E--------+      +-----+
+----+    |   |        |         |        |      |     |      +----+
|src |----R   E--------R     +---+        E------R     E------+ dst|
+----+    |   |        |     |            |      |     |      +----+
          +---+        +-----R------------+      +-----+
            </artwork>
        </figure>
        <t indent="0" pn="section-4.2-11">
              If end-to-end service protection is desired,  it can be
              implemented -- for example, by the DetNet end systems using
              Layer 4
              (L4) transport protocols or application protocols. However, these
              protocols are out of the scope of this document.
        </t>
        <t indent="0" pn="section-4.2-12">
          Note that not mixing DetNet and non-DetNet traffic within
          a single 5-tuple, as described above, enables simpler
          5-tuple filters to be used (or reused) at the edges of a DetNet
          network to prevent non-congestion-responsive DetNet
          traffic from escaping the DetNet
          domain.
        </t>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-4.3">
        <name slugifiedName="name-forwarding-sub-layer-consid">Forwarding Sub-Layer Considerations</name>
        <section numbered="true" toc="include" removeInRFC="false" pn="section-4.3.1">
          <name slugifiedName="name-class-of-service">Class of Service</name>
          <t indent="0" pn="section-4.3.1-1">
            Class of Service (CoS) for DetNet flows carried in IPv4 and IPv6
            is provided using the standard
          DSCP field <xref target="RFC2474" format="default" sectionFormat="of" derivedContent="RFC2474"/> and related mechanisms.
          </t>
          <t indent="0" pn="section-4.3.1-2">
          One additional consideration for DetNet nodes that support CoS
          services is that they must ensure that the CoS service classes do
          not impact the congestion protection and latency control mechanisms
          used to provide DetNet QoS.  This requirement is similar to the
          requirement for MPLS Label Switching Routers (LSRs) that CoS LSPs
          cannot impact the resources allocated to TE
          LSPs <xref target="RFC3473" format="default" sectionFormat="of" derivedContent="RFC3473"/>.
          </t>
        </section>
        <section anchor="QoS" numbered="true" toc="include" removeInRFC="false" pn="section-4.3.2">
          <name slugifiedName="name-quality-of-service">Quality of Service</name>
          <t indent="0" pn="section-4.3.2-1">
          Quality of Service (QoS) for DetNet service flows carried in IP must be provided locally by
          the DetNet-aware hosts and routers supporting DetNet flows.  Such
          support leverages the underlying network layer such as
          802.1 TSN.  The node-internal traffic control mechanisms used to
          deliver QoS for
          IP-encapsulated DetNet flows are outside the scope of this
          document. From an encapsulation perspective, the combination of the 6-tuple
          (the typical 5-tuple enhanced with the DSCP) and optionally
          the flow label uniquely identifies a DetNet IP flow.
          </t>
          <t indent="0" pn="section-4.3.2-2">
          Packets that are identified as part of a DetNet IP flow
          but that have not been the subject of a completed reservation
          can disrupt the QoS offered to properly reserved DetNet flows
          by using resources allocated to the reserved flows.
          Therefore, the network nodes of a DetNet network <bcp14>MUST</bcp14> ensure
          that no DetNet-allocated resource, e.g., queue or shaper, is
          used by such flows.
          There are multiple methods that may be
          used by an implementation to defend service delivery to
          reserved DetNet flows, including but not limited to:
          </t>
          <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-4.3.2-3">
            <li pn="section-4.3.2-3.1">
              Treating packets associated with an incomplete reservation
              as non-DetNet traffic.
            </li>
            <li pn="section-4.3.2-3.2">
              Discarding packets associated with an incomplete
              reservation.
            </li>
            <li pn="section-4.3.2-3.3">
              Re-marking packets associated with an incomplete
              reservation.  Re-marking can be accomplished by changing
              the value of the DSCP field to a value that
              results in the packet no longer matching any other
              reserved DetNet IP flow.
            </li>
          </ul>
        </section>
        <section anchor="path" numbered="true" toc="include" removeInRFC="false" pn="section-4.3.3">
          <name slugifiedName="name-path-selection">Path Selection</name>
          <t indent="0" pn="section-4.3.3-1">
          While path selection algorithms and mechanisms are out of the
          scope of the DetNet data plane definition, it is important to
          highlight the implications of DetNet IP flow identification on
          path selection and next hops.  As mentioned above, the DetNet
          IP data plane identifies flows using 6-tuple header
          information as well as the optional (flow label) header
          field. DetNet generally allows for both flow-specific traffic
          treatment and flow-specific next hops.
          </t>
          <t indent="0" pn="section-4.3.3-2">
          In non-DetNet IP forwarding, it is generally assumed that the
          same series of next hops, i.e., the same path, will be used
          for a particular 5-tuple or, in some cases (e.g., <xref target="RFC5120" format="default" sectionFormat="of" derivedContent="RFC5120"/>), for a particular 6-tuple.
          Using different
          next hops for different 5-tuples does not take any special
          consideration for DetNet-aware applications.
          </t>
          <t indent="0" pn="section-4.3.3-3">
          Care should be taken when using different next hops for the
          same 5-tuple.  As discussed in <xref target="RFC7657" format="default" sectionFormat="of" derivedContent="RFC7657"/>,
          unexpected behavior can occur when a single 5-tuple
          application flow experiences reordering due to being split
          across multiple next hops.  Understanding of the application
          and transport protocol impact of using different next hops for
          the same 5-tuple is required.  Again, this only indirectly impacts path
          selection for DetNet flows and this document.
          </t>
        </section>
      </section>
      <section anchor="aggregation" numbered="true" toc="include" removeInRFC="false" pn="section-4.4">
        <name slugifiedName="name-detnet-flow-aggregation">DetNet Flow Aggregation</name>
        <t indent="0" pn="section-4.4-1">
         As described in <xref target="RFC8938" format="default" sectionFormat="of" derivedContent="RFC8938"/>, the ability to
         aggregate individual flows and their associated resource
         control into a larger aggregate is an important technique for
         improving scaling by reducing the state per hop.  DetNet IP
         data plane aggregation can take place within a single node,
         when that node maintains state about both the aggregated and
         individual flows.  It can also take place between nodes, when
         one node maintains state about only flow aggregates while the
         other node maintains state on all or a portion of the component
         flows.  In either case, the management or control function that
         provisions the aggregate flows must ensure that adequate
         resources are allocated and configured to provide the combined
         service requirements of the individual flows.  As DetNet is
         concerned about latency and jitter, more than just bandwidth
         needs to be considered.
        </t>
        <t indent="0" pn="section-4.4-2">
          From a single node perspective, the aggregation of IP flows
          impacts DetNet IP data plane flow identification and resource
          allocation.  As discussed above, IP flow identification uses
          the IP 6-tuple for flow identification.  DetNet IP flows can
          be aggregated using any of the 6-tuple fields and optionally also by 
          the flow label.  The use of prefixes, wildcards,
          lists, and value ranges allows a DetNet node to identify
          aggregate DetNet flows.  From a resource allocation
          perspective, DetNet nodes ought to provide service to an 
          aggregate rather than on a component flow basis.
        </t>
        <t indent="0" pn="section-4.4-3">
          It is the responsibility of the DetNet Controller Plane to
          properly provision the use of these aggregation mechanisms.
          This includes ensuring that aggregated flows have compatible
          (e.g., the same or very similar) QoS and/or CoS characteristics;
          see <xref target="QoS" format="default" sectionFormat="of" derivedContent="Section 4.3.2"/>.  It also includes
          ensuring that per-component-flow service requirements are satisfied
          by the aggregate; see <xref target="ip-svc" format="default" sectionFormat="of" derivedContent="Section 5.3"/>.
        </t>
        <t indent="0" pn="section-4.4-4">
         The DetNet Controller Plane <bcp14>MUST</bcp14> ensure that
         non-congestion-responsive DetNet traffic is not forwarded
         outside a DetNet domain.
        </t>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-4.5">
        <name slugifiedName="name-bidirectional-traffic">Bidirectional Traffic</name>
        <t indent="0" pn="section-4.5-1">
          While the DetNet IP data plane must support bidirectional
          DetNet flows, there are no special bidirectional features within
          the data plane.  The special case of co-routed bidirectional
          DetNet flows is
          solely represented at the management and control plane levels,
          without specific support or knowledge within the DetNet data
          plane.  Fate sharing and associated or co-routed
          bidirectional flows can be managed at the control level.
        </t>
        <t indent="0" pn="section-4.5-2">
          Control and management mechanisms need to support
          bidirectional flows, but the specification of such mechanisms
          is out of the scope of this document. An example control plane
          solution for MPLS can be found in <xref target="RFC7551" format="default" sectionFormat="of" derivedContent="RFC7551"/>.
        </t>
      </section>
    </section>
    <section anchor="ip-procs" numbered="true" toc="include" removeInRFC="false" pn="section-5">
      <name slugifiedName="name-detnet-ip-data-plane-proced">DetNet IP Data Plane Procedures</name>
      <t indent="0" pn="section-5-1">
        This section provides DetNet IP data plane procedures. These
        procedures have been divided into the following areas: flow
        identification, forwarding, and traffic treatment.  Flow
        identification includes those procedures related to matching
        IP-layer
        and higher-layer protocol header information to DetNet flow
        (state) information and service requirements. Flow
        identification is also sometimes called "traffic classification";
        for example, see <xref target="RFC5777" format="default" sectionFormat="of" derivedContent="RFC5777"/>.  Forwarding
        includes
        those procedures related to next-hop selection and
        delivery. Traffic treatment includes those procedures related to
        providing an identified flow with the required DetNet service.
      </t>
      <t indent="0" pn="section-5-2">
        DetNet IP data plane establishment and operational procedures
        also have requirements on the control and management systems
        for DetNet flows, and these are referred to in this section.
        Specifically, this section identifies a
        number of information elements that require support via the
        management and control interfaces supported by a DetNet node.
        The specific mechanism used for such support is out of the scope
        of this document.  A summary of the requirements for management- and
        control-related information is included.  Conformance
        language is not used in the summary, since it applies to future
        mechanisms such as those that may be provided in YANG models
        <xref target="I-D.ietf-detnet-yang" format="default" sectionFormat="of" derivedContent="DetNet-YANG"/>.
      </t>
      <section anchor="ip-flow-id" numbered="true" toc="include" removeInRFC="false" pn="section-5.1">
        <name slugifiedName="name-detnet-ip-flow-identificati">DetNet IP Flow Identification Procedures</name>
        <t indent="0" pn="section-5.1-1">
          IP-layer and higher-layer protocol header information is used to identify
          DetNet flows. All DetNet implementations that support this document
          <bcp14>MUST</bcp14> identify individual DetNet flows based on the
          set of information identified in this section. Note that additional
          requirements for flow identification, e.g., to support
          other higher-layer protocols, may be defined in the future.
        </t>
        <t indent="0" pn="section-5.1-2">
          The configuration and control information used to identify an
          individual DetNet flow <bcp14>MUST</bcp14> be ordered by an implementation.
          Implementations <bcp14>MUST</bcp14> support a fixed order when identifying
          flows and <bcp14>MUST</bcp14> identify a DetNet flow by the first set of
          matching flow information.
        </t>
        <t indent="0" pn="section-5.1-3">
          Implementations of this document <bcp14>MUST</bcp14> support DetNet flow
          identification when the implementation is acting as a
          DetNet end system, a relay node, or an edge node.
        </t>
        <section anchor="ip-hdr" numbered="true" toc="include" removeInRFC="false" pn="section-5.1.1">
          <name slugifiedName="name-ip-header-information">IP Header Information</name>
          <t indent="0" pn="section-5.1.1-1">
            Implementations of this document <bcp14>MUST</bcp14> support DetNet flow
            identification based on IP header information.  The IPv4
            header is defined in <xref target="RFC0791" format="default" sectionFormat="of" derivedContent="RFC0791"/>, and the IPv6
            is defined in <xref target="RFC8200" format="default" sectionFormat="of" derivedContent="RFC8200"/>.
          </t>
          <section numbered="true" toc="exclude" removeInRFC="false" pn="section-5.1.1.1">
            <name slugifiedName="name-source-address-field">Source Address Field</name>
            <t indent="0" pn="section-5.1.1.1-1">
              Implementations of this document <bcp14>MUST</bcp14> support DetNet flow
              identification based on the Source Address field of an IP
              packet. Implementations <bcp14>SHOULD</bcp14> support longest prefix
              matching for this field (see <xref target="RFC1812" format="default" sectionFormat="of" derivedContent="RFC1812"/> and
              <xref target="RFC7608" format="default" sectionFormat="of" derivedContent="RFC7608"/>). Note that a prefix length of
              zero (0) effectively means that the field is ignored.
            </t>
          </section>
          <section numbered="true" toc="exclude" removeInRFC="false" pn="section-5.1.1.2">
            <name slugifiedName="name-destination-address-field">Destination Address Field</name>
            <t indent="0" pn="section-5.1.1.2-1">
              Implementations of this document <bcp14>MUST</bcp14> support DetNet flow
              identification based on the Destination Address field of an IP
              packet. Implementations <bcp14>SHOULD</bcp14> support longest prefix
              matching for this field (see <xref target="RFC1812" format="default" sectionFormat="of" derivedContent="RFC1812"/> and
              <xref target="RFC7608" format="default" sectionFormat="of" derivedContent="RFC7608"/>). Note that a prefix length of
              zero (0) effectively means that the field is ignored.
            </t>
            <aside pn="section-5.1.1.2-2">
              <t indent="0" pn="section-5.1.1.2-2.1">
              Note: Any IP address value is allowed, including an IP
              multicast destination address.
              </t>
            </aside>
          </section>
          <section anchor="nxt-proto-field" numbered="true" toc="exclude" removeInRFC="false" pn="section-5.1.1.3">
            <name slugifiedName="name-ipv4-protocol-and-ipv6-next">IPv4 Protocol and IPv6 Next Header Fields</name>
            <t indent="0" pn="section-5.1.1.3-1">
              Implementations of this document <bcp14>MUST</bcp14> support DetNet flow
              identification based on the IPv4 Protocol field when
              processing IPv4 packets and the IPv6 Next Header field
              when processing IPv6 packets. This includes 
              the next protocol
              values defined in <xref target="nxt-proto" format="default" sectionFormat="of" derivedContent="Section 5.1.2"/> and any other
              value, including zero.
              Implementations <bcp14>SHOULD</bcp14> allow for these fields to be
              ignored for a specific DetNet flow.
            </t>
          </section>
          <section numbered="true" toc="exclude" removeInRFC="false" pn="section-5.1.1.4">
            <name slugifiedName="name-ipv4-type-of-service-and-ip">IPv4 Type of Service and IPv6 Traffic Class Fields</name>
            <t indent="0" pn="section-5.1.1.4-1">
              These fields are used to support differentiated services
              <xref target="RFC2474" format="default" sectionFormat="of" derivedContent="RFC2474"/> <xref target="RFC2475" format="default" sectionFormat="of" derivedContent="RFC2475"/>.
              Implementations of this document <bcp14>MUST</bcp14> support DetNet flow
              identification based on the DSCP field in the IPv4 Type of
              Service field when processing IPv4 packets and the DSCP
              field in the IPv6 Traffic Class field when processing IPv6
              packets.  Implementations <bcp14>MUST</bcp14> support list-based matching
              of DSCP values, where the list is composed of possible
              field values that are to be considered when identifying a
              specific DetNet flow.  Implementations <bcp14>SHOULD</bcp14> allow for
              this field to be ignored for a specific DetNet flow.
            </t>
          </section>
          <section numbered="true" toc="exclude" removeInRFC="false" pn="section-5.1.1.5">
            <name slugifiedName="name-ipv6-flow-label-field">IPv6 Flow Label Field</name>
            <t indent="0" pn="section-5.1.1.5-1">
              Implementations of this document <bcp14>SHOULD</bcp14> support identification of
              DetNet flows based on the IPv6 Flow Label field. Implementations
              that support matching based on this field <bcp14>MUST</bcp14> allow for it
              to be ignored for a specific DetNet flow.  When this field
              is used to identify a specific DetNet flow, implementations <bcp14>MAY</bcp14>
              exclude the IPv6 Next Header field and next header information as
              part of DetNet flow identification.
            </t>
          </section>
        </section>
        <section anchor="nxt-proto" numbered="true" toc="include" removeInRFC="false" pn="section-5.1.2">
          <name slugifiedName="name-other-protocol-header-infor">Other Protocol Header Information</name>
          <t indent="0" pn="section-5.1.2-1">
            Implementations of this document <bcp14>MUST</bcp14> support DetNet flow
            identification based on header information identified in this
            section. Support for TCP, UDP, ICMP, and IPsec flows is defined.
            Future documents are expected to define support for other
            protocols.
          </t>
          <section numbered="true" toc="exclude" removeInRFC="false" pn="section-5.1.2.1">
            <name slugifiedName="name-tcp-and-udp">TCP and UDP</name>
            <t indent="0" pn="section-5.1.2.1-1">
              DetNet flow identification for TCP <xref target="RFC0793" format="default" sectionFormat="of" derivedContent="RFC0793"/> and UDP <xref target="RFC0768" format="default" sectionFormat="of" derivedContent="RFC0768"/> is
              achieved based on the Source and Destination
              Port fields carried in each protocol's header.  These
              fields share a common format and common DetNet
              flow identification procedures.
            </t>
            <t indent="0" pn="section-5.1.2.1-2">
              The rules defined in this section only apply when the
              IPv4 Protocol or IPv6 Next Header field contains the
              IANA-defined value for UDP or TCP.
            </t>
            <section numbered="true" toc="exclude" removeInRFC="false" pn="section-5.1.2.1.1">
              <name slugifiedName="name-source-port-field">Source Port Field</name>
              <t indent="0" pn="section-5.1.2.1.1-1">
                Implementations of this document <bcp14>MUST</bcp14> support DetNet flow
                identification based on the Source Port field of a TCP or
                UDP packet. Implementations <bcp14>MUST</bcp14> support flow
                identification based on a particular value carried in the
                field, i.e., an exact value.  Implementations <bcp14>SHOULD</bcp14> support
                range-based port matching. Implementation <bcp14>MUST</bcp14> also allow
                for the field to be ignored for a specific DetNet flow.
              </t>
            </section>
            <section numbered="true" toc="exclude" removeInRFC="false" pn="section-5.1.2.1.2">
              <name slugifiedName="name-destination-port-field">Destination Port Field</name>
              <t indent="0" pn="section-5.1.2.1.2-1">
                Implementations of this document <bcp14>MUST</bcp14> support DetNet flow
                identification based on the Destination Port field of a TCP or
                UDP packet. Implementations <bcp14>MUST</bcp14> support flow
                identification based on a particular value carried in the
                field, i.e., an exact value.  Implementations <bcp14>SHOULD</bcp14> support
                range-based port matching. Implementation <bcp14>MUST</bcp14> also allow
                for the field to be ignored for a specific DetNet flow.
              </t>
            </section>
          </section>
          <section numbered="true" toc="exclude" removeInRFC="false" pn="section-5.1.2.2">
            <name slugifiedName="name-icmp">ICMP</name>
            <t indent="0" pn="section-5.1.2.2-1">
              DetNet flow identification for ICMP  <xref target="RFC0792" format="default" sectionFormat="of" derivedContent="RFC0792"/> is achieved based on the 
              protocol number in the IP header. Note that ICMP type is not included in the 
              flow definition. 
            </t>
          </section>
          <section numbered="true" toc="exclude" removeInRFC="false" pn="section-5.1.2.3">
            <name slugifiedName="name-ipsec-ah-and-esp">IPsec AH and ESP</name>
            <t indent="0" pn="section-5.1.2.3-1">
              IPsec Authentication Header (AH) <xref target="RFC4302" format="default" sectionFormat="of" derivedContent="RFC4302"/>
              and Encapsulating Security Payload (ESP) <xref target="RFC4303" format="default" sectionFormat="of" derivedContent="RFC4303"/> share a common format for the Security
              Parameters Index (SPI) field.  Implementations <bcp14>MUST</bcp14>
              support flow identification based on a particular value
              carried in the field, i.e., an exact value.  Implementations
              <bcp14>SHOULD</bcp14>
              also allow for the field to be ignored for a specific
              DetNet flow.
            </t>
            <t indent="0" pn="section-5.1.2.3-2">
              The rules defined in this section only apply when the
              IPv4 Protocol or IPv6 Next Header field contains the
              IANA-defined value for AH or ESP.
            </t>
          </section>
        </section>
      </section>
      <section anchor="ip-fwd" numbered="true" toc="include" removeInRFC="false" pn="section-5.2">
        <name slugifiedName="name-forwarding-procedures">Forwarding Procedures</name>
        <t indent="0" pn="section-5.2-1">
          General requirements for IP nodes are defined in <xref target="RFC1122" format="default" sectionFormat="of" derivedContent="RFC1122"/>, <xref target="RFC1812" format="default" sectionFormat="of" derivedContent="RFC1812"/>, and <xref target="RFC8504" format="default" sectionFormat="of" derivedContent="RFC8504"/>
          and are not modified by this document. The
          typical next-hop selection process is impacted by DetNet.
          Specifically, implementations of this document <bcp14>SHALL</bcp14> use
          management and control information to select the one or more
          outgoing interfaces and next hops to be used for a packet
          associated with a DetNet flow. Specific management and control
          information will be defined in future documents, e.g., <xref target="I-D.ietf-detnet-yang" format="default" sectionFormat="of" derivedContent="DetNet-YANG"/>. 
        </t>
        <t indent="0" pn="section-5.2-2">
          The use of multiple paths or links, e.g., ECMP, to support a
          single DetNet flow is <bcp14>NOT RECOMMENDED</bcp14>. ECMP <bcp14>MAY</bcp14> be used for
          non-DetNet flows within a DetNet domain.
        </t>
        <t indent="0" pn="section-5.2-3">
          The above implies that management and control functions will
          be defined to support this requirement, e.g., see <xref target="I-D.ietf-detnet-yang" format="default" sectionFormat="of" derivedContent="DetNet-YANG"/>.
        </t>
      </section>
      <section anchor="ip-svc" numbered="true" toc="include" removeInRFC="false" pn="section-5.3">
        <name slugifiedName="name-detnet-ip-traffic-treatment">DetNet IP Traffic Treatment Procedures</name>
        <t indent="0" pn="section-5.3-1">
          Implementations of this document must ensure that a DetNet flow
          receives the traffic treatment that is provisioned for it via
          configuration or the Controller Plane, e.g., via <xref target="I-D.ietf-detnet-yang" format="default" sectionFormat="of" derivedContent="DetNet-YANG"/>.
          General information on DetNet service can be found in <xref target="I-D.ietf-detnet-flow-information-model" format="default" sectionFormat="of" derivedContent="DetNet-Flow-Info"/>.  Typical
          mechanisms used to provide different treatment to different flows
          include the allocation of system resources (such as queues and
          buffers) and provisioning of related parameters (such as shaping and
          policing). Support can also be provided via an underlying network
          technology such as MPLS <xref target="I-D.ietf-detnet-ip-over-mpls" format="default" sectionFormat="of" derivedContent="DetNet-IP-over-MPLS"/> or
          IEEE 802.1 TSN <xref target="I-D.ietf-detnet-ip-over-tsn" format="default" sectionFormat="of" derivedContent="DetNet-IP-over-TSN"/>.  
                  Other mechanisms than the ones used in the TSN case are outside the 
                  scope of this document. 
        </t>
      </section>
    </section>
    <section anchor="ip-flow-id-info" numbered="true" toc="include" removeInRFC="false" pn="section-6">
      <name slugifiedName="name-management-and-control-info">Management and Control Information Summary</name>
      <t indent="0" pn="section-6-1">
            The following summarizes the set of information that is needed to
            identify individual and aggregated DetNet flows:
      </t>
      <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-6-2">
        <li pn="section-6-2.1">IPv4 and IPv6 Source Address field.</li>
        <li pn="section-6-2.2">IPv4 and IPv6 source address prefix length, where a zero
              (0) value effectively means that the Source Address field is
              ignored.</li>
        <li pn="section-6-2.3">IPv4 and IPv6 Destination Address field.</li>
        <li pn="section-6-2.4">IPv4 and IPv6 destination address prefix length, where a
              zero (0) value effectively means that the Destination Address field is
              ignored.</li>
        <li pn="section-6-2.5">IPv4 Protocol field. A limited set of values is allowed,
              and the ability to ignore this field is desirable.</li>
        <li pn="section-6-2.6">IPv6 Next Header field. A limited set of values is allowed,
              and the ability to ignore this field is desirable.</li>
        <li pn="section-6-2.7">
          <t indent="0" pn="section-6-2.7.1">For the IPv4 Type of Service and IPv6 Traffic Class fields:
          </t>
          <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-6-2.7.2">
            <li pn="section-6-2.7.2.1">Whether or not the DSCP field is used in flow identification.
                                Use of the DSCP field for flow identification is optional.</li>
            <li pn="section-6-2.7.2.2">If the DSCP field is used to identify a flow, then the flow
                                identification information (for that flow) includes a list of
                                DSCPs used by that flow.</li>
          </ul>
        </li>
        <li pn="section-6-2.8">IPv6 Flow Label field. This field can be optionally used
              for matching.  When used, this field can be used instead of matching against 
                          the Next Header field.</li>
        <li pn="section-6-2.9">TCP and UDP Source Port. Support for both exact and wildcard matching is
              required. Port ranges can optionally be used.</li>
        <li pn="section-6-2.10">TCP and UDP Destination Port. Support for both exact and wildcard matching is
              required. Port ranges can optionally be used.</li>
        <li pn="section-6-2.11">IPsec Header SPI field. Exact matching is
              required. Support for wildcard matching is
              recommended.</li>
        <li pn="section-6-2.12">For end systems, an optional maximum IP packet size
              that should be used for that outgoing DetNet IP flow.</li>
      </ul>
      <t indent="0" pn="section-6-3">
            This information <bcp14>MUST</bcp14> be provisioned per DetNet flow via
            configuration, e.g., via the Controller Plane or the management plane.
      </t>
      <t indent="0" pn="section-6-4">
            An implementation <bcp14>MUST</bcp14> support ordering of the
            set of information used to identify an
            individual DetNet flow.  This can, for example, be
            used to provide a DetNet service for a specific UDP flow, with
            unique Source and Destination Port field values, while
            providing a different service for the aggregate of all other
            flows with that same UDP Destination Port value.
      </t>
      <t indent="0" pn="section-6-5">
            It is the responsibility of the DetNet Controller Plane to
            properly provision both flow identification information and
            the flow-specific resources needed to provide the traffic
            treatment needed to meet each flow's service requirements.
            This applies for aggregated and individual flows.
      </t>
    </section>
    <section numbered="true" toc="include" removeInRFC="false" pn="section-7">
      <name slugifiedName="name-security-considerations">Security Considerations</name>
      <t indent="0" pn="section-7-1">
       Detailed security considerations for DetNet are cataloged in
       <xref target="DetNet-Security" format="default" sectionFormat="of" derivedContent="DetNet-Security"/>, and more general security considerations
       are described in <xref target="RFC8655" format="default" sectionFormat="of" derivedContent="RFC8655"/>. This section
       exclusively considers security considerations that are specific to the DetNet
       IP data plane.
      </t>
      <t indent="0" pn="section-7-2">
       Security aspects that are unique to DetNet are those whose aim is to
       provide the specific QoS aspects of DetNet, which are
       primarily to deliver data flows with extremely low packet loss rates
       and bounded end-to-end delivery latency.
       Achieving such loss rates and bounded latency may not be possible
       in the face of a highly capable adversary, such as the one
       envisioned by the Internet Threat Model of BCP 72 <xref target="RFC3552" format="default" sectionFormat="of" derivedContent="RFC3552"/> that can
       arbitrarily drop or delay any or all traffic.  In order to
       present meaningful security considerations, we consider a
       somewhat weaker attacker who does not control the physical links
       of the DetNet domain but may have the ability to control a
       network node within the boundary of the DetNet domain.
      </t>
      <t indent="0" pn="section-7-3">
        The primary consideration for the DetNet data plane is to maintain
        integrity of data and delivery of the associated DetNet service traversing
        the DetNet network.
        Since no DetNet-specific fields are available in the DetNet IP
        data plane,
        the integrity and confidentiality of application flows can be protected through whatever means are
        provided by the underlying technology. For example, encryption may be
        used, such as that provided by IPsec <xref target="RFC4301" format="default" sectionFormat="of" derivedContent="RFC4301"/> for IP
        flows and/or by an underlying sub-network using
        MACsec
        <xref target="IEEE802.1AE-2018" format="default" sectionFormat="of" derivedContent="IEEE802.1AE-2018"/> for IP over
        Ethernet (Layer 2) flows.
      </t>
      <t indent="0" pn="section-7-4">
        From a data plane perspective, this document does not add or modify any
        header information.
      </t>
      <t indent="0" pn="section-7-5">
        At the management and control level, DetNet flows are identified on a
        per-flow basis, which may provide Controller Plane
        attackers with additional information about the data flows (when
        compared to Controller Planes that do not include per-flow identification).
        This is an inherent property of DetNet that has security
        implications that should be considered when determining if DetNet is
        a suitable technology for any given use case.
      </t>
      <t indent="0" pn="section-7-6">
        To provide uninterrupted availability of the DetNet service,
        provisions can be made against DoS attacks and delay attacks. To
        protect against DoS attacks, excess traffic due to malicious or
        malfunctioning devices can be prevented or mitigated -- for example,
        through the use of existing mechanisms such as policing and shaping
        applied at the input of a DetNet domain or within an edge IEEE 802.1
        TSN domain. To prevent DetNet packets from being delayed by an entity
        external to a DetNet domain, DetNet technology definitions can allow
        for the mitigation of man-in-the-middle attacks -- for example,
        through the use of authentication and authorization of devices within the
        DetNet domain.
      </t>
    </section>
    <section anchor="iana" numbered="true" toc="include" removeInRFC="false" pn="section-8">
      <name slugifiedName="name-iana-considerations">IANA Considerations</name>
      <t indent="0" pn="section-8-1">
        This document has no IANA actions.
      </t>
    </section>
  </middle>
  <back>
    <displayreference target="I-D.ietf-detnet-flow-information-model" to="DetNet-Flow-Info"/>
    <displayreference target="I-D.ietf-detnet-yang" to="DetNet-YANG"/>
    <displayreference target="I-D.ietf-detnet-ip-over-tsn" to="DetNet-IP-over-TSN"/>
    <displayreference target="I-D.ietf-detnet-ip-over-mpls" to="DetNet-IP-over-MPLS"/>
    <displayreference target="I-D.ietf-detnet-tsn-vpn-over-mpls" to="DetNet-TSN-over-MPLS"/>
    <references pn="section-9">
      <name slugifiedName="name-references">References</name>
      <references pn="section-9.1">
        <name slugifiedName="name-normative-references">Normative References</name>
        <reference anchor="RFC0768" target="https://www.rfc-editor.org/info/rfc768" quoteTitle="true" derivedAnchor="RFC0768">
          <front>
            <title>User Datagram Protocol</title>
            <author initials="J." surname="Postel" fullname="J. Postel">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="1980" month="August"/>
          </front>
          <seriesInfo name="STD" value="6"/>
          <seriesInfo name="RFC" value="768"/>
          <seriesInfo name="DOI" value="10.17487/RFC0768"/>
        </reference>
        <reference anchor="RFC0791" target="https://www.rfc-editor.org/info/rfc791" quoteTitle="true" derivedAnchor="RFC0791">
          <front>
            <title>Internet Protocol</title>
            <author initials="J." surname="Postel" fullname="J. Postel">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="1981" month="September"/>
          </front>
          <seriesInfo name="STD" value="5"/>
          <seriesInfo name="RFC" value="791"/>
          <seriesInfo name="DOI" value="10.17487/RFC0791"/>
        </reference>
        <reference anchor="RFC0792" target="https://www.rfc-editor.org/info/rfc792" quoteTitle="true" derivedAnchor="RFC0792">
          <front>
            <title>Internet Control Message Protocol</title>
            <author initials="J." surname="Postel" fullname="J. Postel">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="1981" month="September"/>
          </front>
          <seriesInfo name="STD" value="5"/>
          <seriesInfo name="RFC" value="792"/>
          <seriesInfo name="DOI" value="10.17487/RFC0792"/>
        </reference>
        <reference anchor="RFC0793" target="https://www.rfc-editor.org/info/rfc793" quoteTitle="true" derivedAnchor="RFC0793">
          <front>
            <title>Transmission Control Protocol</title>
            <author initials="J." surname="Postel" fullname="J. Postel">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="1981" month="September"/>
          </front>
          <seriesInfo name="STD" value="7"/>
          <seriesInfo name="RFC" value="793"/>
          <seriesInfo name="DOI" value="10.17487/RFC0793"/>
        </reference>
        <reference anchor="RFC1812" target="https://www.rfc-editor.org/info/rfc1812" quoteTitle="true" derivedAnchor="RFC1812">
          <front>
            <title>Requirements for IP Version 4 Routers</title>
            <author initials="F." surname="Baker" fullname="F. Baker" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="1995" month="June"/>
            <abstract>
              <t indent="0">This memo defines and discusses requirements for devices that perform the network layer forwarding function of the Internet protocol suite. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1812"/>
          <seriesInfo name="DOI" value="10.17487/RFC1812"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" quoteTitle="true" derivedAnchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author initials="S." surname="Bradner" fullname="S. Bradner">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="1997" month="March"/>
            <abstract>
              <t indent="0">In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC2474" target="https://www.rfc-editor.org/info/rfc2474" quoteTitle="true" derivedAnchor="RFC2474">
          <front>
            <title>Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers</title>
            <author initials="K." surname="Nichols" fullname="K. Nichols">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Blake" fullname="S. Blake">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="F." surname="Baker" fullname="F. Baker">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="D." surname="Black" fullname="D. Black">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="1998" month="December"/>
            <abstract>
              <t indent="0">This document defines the IP header field, called the DS (for differentiated services) field.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2474"/>
          <seriesInfo name="DOI" value="10.17487/RFC2474"/>
        </reference>
        <reference anchor="RFC4301" target="https://www.rfc-editor.org/info/rfc4301" quoteTitle="true" derivedAnchor="RFC4301">
          <front>
            <title>Security Architecture for the Internet Protocol</title>
            <author initials="S." surname="Kent" fullname="S. Kent">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="K." surname="Seo" fullname="K. Seo">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2005" month="December"/>
            <abstract>
              <t indent="0">This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer.  This document obsoletes RFC 2401 (November 1998).  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4301"/>
          <seriesInfo name="DOI" value="10.17487/RFC4301"/>
        </reference>
        <reference anchor="RFC4302" target="https://www.rfc-editor.org/info/rfc4302" quoteTitle="true" derivedAnchor="RFC4302">
          <front>
            <title>IP Authentication Header</title>
            <author initials="S." surname="Kent" fullname="S. Kent">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2005" month="December"/>
            <abstract>
              <t indent="0">This document describes an updated version of the IP Authentication Header (AH), which is designed to provide authentication services in IPv4 and IPv6.  This document obsoletes RFC 2402 (November 1998).  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4302"/>
          <seriesInfo name="DOI" value="10.17487/RFC4302"/>
        </reference>
        <reference anchor="RFC4303" target="https://www.rfc-editor.org/info/rfc4303" quoteTitle="true" derivedAnchor="RFC4303">
          <front>
            <title>IP Encapsulating Security Payload (ESP)</title>
            <author initials="S." surname="Kent" fullname="S. Kent">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2005" month="December"/>
            <abstract>
              <t indent="0">This document describes an updated version of the Encapsulating Security Payload (ESP) protocol, which is designed to provide a mix of security services in IPv4 and IPv6.  ESP is used to provide confidentiality, data origin authentication, connectionless integrity, an anti-replay service (a form of partial sequence integrity), and limited traffic flow confidentiality.  This document obsoletes RFC 2406 (November 1998).  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4303"/>
          <seriesInfo name="DOI" value="10.17487/RFC4303"/>
        </reference>
        <reference anchor="RFC7608" target="https://www.rfc-editor.org/info/rfc7608" quoteTitle="true" derivedAnchor="RFC7608">
          <front>
            <title>IPv6 Prefix Length Recommendation for Forwarding</title>
            <author initials="M." surname="Boucadair" fullname="M. Boucadair">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A." surname="Petrescu" fullname="A. Petrescu">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="F." surname="Baker" fullname="F. Baker">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2015" month="July"/>
            <abstract>
              <t indent="0">IPv6 prefix length, as in IPv4, is a parameter conveyed and used in IPv6 routing and forwarding processes in accordance with the Classless Inter-domain Routing (CIDR) architecture.  The length of an IPv6 prefix may be any number from zero to 128, although subnets using stateless address autoconfiguration (SLAAC) for address allocation conventionally use a /64 prefix.  Hardware and software implementations of routing and forwarding should therefore impose no rules on prefix length, but implement longest-match-first on prefixes of any valid length.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="198"/>
          <seriesInfo name="RFC" value="7608"/>
          <seriesInfo name="DOI" value="10.17487/RFC7608"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" quoteTitle="true" derivedAnchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author initials="B." surname="Leiba" fullname="B. Leiba">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2017" month="May"/>
            <abstract>
              <t indent="0">RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8200" target="https://www.rfc-editor.org/info/rfc8200" quoteTitle="true" derivedAnchor="RFC8200">
          <front>
            <title>Internet Protocol, Version 6 (IPv6) Specification</title>
            <author initials="S." surname="Deering" fullname="S. Deering">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="R." surname="Hinden" fullname="R. Hinden">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2017" month="July"/>
            <abstract>
              <t indent="0">This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="86"/>
          <seriesInfo name="RFC" value="8200"/>
          <seriesInfo name="DOI" value="10.17487/RFC8200"/>
        </reference>
        <reference anchor="RFC8655" target="https://www.rfc-editor.org/info/rfc8655" quoteTitle="true" derivedAnchor="RFC8655">
          <front>
            <title>Deterministic Networking Architecture</title>
            <author initials="N." surname="Finn" fullname="N. Finn">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="P." surname="Thubert" fullname="P. Thubert">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="B." surname="Varga" fullname="B. Varga">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Farkas" fullname="J. Farkas">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2019" month="October"/>
            <abstract>
              <t indent="0">This document provides the overall architecture for Deterministic Networking (DetNet), which provides a capability to carry specified unicast or multicast data flows for real-time applications with extremely low data loss rates and bounded latency within a network domain.  Techniques used include 1) reserving data-plane resources for individual (or aggregated) DetNet flows in some or all of the intermediate nodes along the path of the flow, 2) providing explicit routes for DetNet flows that do not immediately change with the network topology, and 3) distributing data from DetNet flow packets over time and/or space to ensure delivery of each packet's data in spite of the loss of a path.  DetNet operates at the IP layer and delivers service over lower-layer technologies such as MPLS and Time- Sensitive Networking (TSN) as defined by IEEE 802.1.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8655"/>
          <seriesInfo name="DOI" value="10.17487/RFC8655"/>
        </reference>
        <reference anchor="RFC8938" quoteTitle="true" target="https://www.rfc-editor.org/rfc/rfc8938" derivedAnchor="RFC8938">
          <front>
            <title>Deterministic Networking (DetNet) Data Plane Framework</title>
            <author initials="B" surname="Varga" fullname="Balazs Varga" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J" surname="Farkas" fullname="Janos Farkas">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="L" surname="Berger" fullname="Lou Berger">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A" surname="Malis" fullname="Andrew Malis">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S" surname="Bryant" fullname="Stewart Bryant">
              <organization showOnFrontPage="true"/>
            </author>
            <date month="November" year="2020"/>
          </front>
          <seriesInfo name="RFC" value="8938"/>
          <seriesInfo name="DOI" value="10.17487/RFC8938"/>
        </reference>
      </references>
      <references pn="section-9.2">
        <name slugifiedName="name-informative-references">Informative References</name>
        <reference anchor="I-D.ietf-detnet-flow-information-model" quoteTitle="true" target="https://tools.ietf.org/html/draft-ietf-detnet-flow-information-model-11" derivedAnchor="DetNet-Flow-Info">
          <front>
            <title>DetNet Flow Information Model</title>
            <author initials="B" surname="Varga" fullname="Balazs Varga">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J" surname="Farkas" fullname="Janos Farkas">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="R" surname="Cummings" fullname="Rodney Cummings">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="Y" surname="Jiang" fullname="Yuanlong Jiang">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="D" surname="Fedyk" fullname="Don Fedyk">
              <organization showOnFrontPage="true"/>
            </author>
            <date month="October" day="21" year="2020"/>
            <abstract>
              <t indent="0">This document describes flow and service information model for Deterministic Networking (DetNet).  These models are defined for IP and MPLS DetNet data planes</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-detnet-flow-information-model-11"/>
          <format type="TXT" target="http://www.ietf.org/internet-drafts/draft-ietf-detnet-flow-information-model-11.txt"/>
          <refcontent>Work in Progress</refcontent>
        </reference>
        <reference anchor="I-D.ietf-detnet-ip-over-mpls" quoteTitle="true" target="https://tools.ietf.org/html/draft-ietf-detnet-ip-over-mpls-09" derivedAnchor="DetNet-IP-over-MPLS">
          <front>
            <title>DetNet Data Plane: IP over MPLS</title>
            <author initials="B" surname="Varga" fullname="Balazs Varga" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="L" surname="Berger" fullname="Lou Berger">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="D" surname="Fedyk" fullname="Don Fedyk">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S" surname="Bryant" fullname="Stewart Bryant">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J" surname="Korhonen" fullname="Jouni Korhonen">
              <organization showOnFrontPage="true"/>
            </author>
            <date month="October" day="11" year="2020"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-detnet-ip-over-mpls-09"/>
          <refcontent>Work in Progress</refcontent>
        </reference>
        <reference anchor="I-D.ietf-detnet-ip-over-tsn" quoteTitle="true" target="https://tools.ietf.org/html/draft-ietf-detnet-ip-over-tsn-04" derivedAnchor="DetNet-IP-over-TSN">
          <front>
            <title>DetNet Data Plane: IP over IEEE 802.1 Time Sensitive Networking (TSN)</title>
            <author initials="B" surname="Varga" fullname="Balazs Varga" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J" surname="Farkas" fullname="Janos Farkas">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A" surname="Malis" fullname="Andrew Malis">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S" surname="Bryant" fullname="Stewart Bryant">
              <organization showOnFrontPage="true"/>
            </author>
            <date month="November" day="2" year="2020"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-detnet-ip-over-tsn-04"/>
          <refcontent>Work in Progress</refcontent>
        </reference>
        <reference anchor="DetNet-MPLS" quoteTitle="true" target="https://tools.ietf.org/html/draft-ietf-detnet-mpls-13" derivedAnchor="DetNet-MPLS">
          <front>
            <title>DetNet Data Plane: MPLS</title>
            <author initials="B" surname="Varga" fullname="Balazs Varga" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J" surname="Farkas" fullname="Janos Farkas">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="L" surname="Berger" fullname="Lou Berger">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A" surname="Malis" fullname="Andrew Malis">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S" surname="Bryant" fullname="Stewart Bryant">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J" surname="Korhonen" fullname="Jouni Korhonen">
              <organization showOnFrontPage="true"/>
            </author>
            <date day="11" month="October" year="2020"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-detnet-mpls-13"/>
          <refcontent>Work in Progress</refcontent>
        </reference>
        <reference anchor="DetNet-Security" quoteTitle="true" target="https://tools.ietf.org/html/draft-ietf-detnet-security-12" derivedAnchor="DetNet-Security">
          <front>
            <title>Deterministic Networking (DetNet) Security Considerations</title>
            <author initials="E" surname="Grossman" fullname="Ethan Grossman" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="T" surname="Mizrahi" fullname="Tal Mizrahi">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A" surname="Hacker" fullname="Andrew Hacker">
              <organization showOnFrontPage="true"/>
            </author>
            <date month="October" day="2" year="2020"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-detnet-security-12"/>
          <refcontent>Work in Progress</refcontent>
        </reference>
        <reference anchor="I-D.ietf-detnet-tsn-vpn-over-mpls" quoteTitle="true" target="https://tools.ietf.org/html/draft-ietf-detnet-tsn-vpn-over-mpls-04" derivedAnchor="DetNet-TSN-over-MPLS">
          <front>
            <title>DetNet Data Plane: IEEE 802.1 Time Sensitive Networking over MPLS</title>
            <author initials="B" surname="Varga" fullname="Balazs Varga" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J" surname="Farkas" fullname="Janos Farkas">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A" surname="Malis" fullname="Andrew Malis">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S" surname="Bryant" fullname="Stewart Bryant">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="D" surname="Fedyk" fullname="Don Fedyk">
              <organization showOnFrontPage="true"/>
            </author>
            <date month="November" day="2" year="2020"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-detnet-tsn-vpn-over-mpls-04"/>
          <refcontent>Work in Progress</refcontent>
        </reference>
        <reference anchor="I-D.ietf-detnet-yang" quoteTitle="true" target="https://tools.ietf.org/html/draft-ietf-detnet-yang-09" derivedAnchor="DetNet-YANG">
          <front>
            <title>Deterministic Networking (DetNet) Configuration YANG Model</title>
            <author initials="X" surname="Geng" fullname="Xuesong Geng">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="M" surname="Chen" fullname="Mach Chen">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="Y" surname="Ryoo" fullname="Yeoncheol Ryoo">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="D" surname="Fedyk" fullname="Don Fedyk">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="R" surname="Rahman" fullname="Reshad Rahman">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="Z" surname="Li" fullname="Zhenqiang Li">
              <organization showOnFrontPage="true"/>
            </author>
            <date month="November" day="16" year="2020"/>
            <abstract>
              <t indent="0">This document contains the specification for Deterministic Networking flow configuration YANG Model.  The model allows for provisioning of end-to-end DetNet service along the path without dependency on any signaling protocol.  The YANG module defined in this document conforms to the Network Management Datastore Architecture (NMDA).</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-detnet-yang-09"/>
          <format type="TXT" target="http://www.ietf.org/internet-drafts/draft-ietf-detnet-yang-09.txt"/>
          <refcontent>Work in Progress</refcontent>
        </reference>
        <reference anchor="IEEE802.1AE-2018" target="https://ieeexplore.ieee.org/document/8585421" quoteTitle="true" derivedAnchor="IEEE802.1AE-2018">
          <front>
            <title>IEEE Standard for Local and metropolitan area networks-Media Access Control (MAC) Security</title>
            <author>
              <organization showOnFrontPage="true">IEEE</organization>
            </author>
            <date year="2018" month="December"/>
          </front>
          <seriesInfo name="IEEE" value="802.1AE-2018"/>
          <seriesInfo name="DOI" value="10.1109/IEEESTD.2018.8585421"/>
        </reference>
        <reference anchor="IEEE802.1TSNTG" target="https://1.ieee802.org/tsn/" quoteTitle="true" derivedAnchor="IEEE802.1TSNTG">
          <front>
            <title>Time-Sensitive Networking (TSN) Task Group</title>
            <author>
              <organization showOnFrontPage="true">IEEE</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="RFC1122" target="https://www.rfc-editor.org/info/rfc1122" quoteTitle="true" derivedAnchor="RFC1122">
          <front>
            <title>Requirements for Internet Hosts - Communication Layers</title>
            <author initials="R." surname="Braden" fullname="R. Braden" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="1989" month="October"/>
            <abstract>
              <t indent="0">This RFC is an official specification for the Internet community.  It incorporates by reference, amends, corrects, and supplements the primary protocol standards documents relating to hosts.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="3"/>
          <seriesInfo name="RFC" value="1122"/>
          <seriesInfo name="DOI" value="10.17487/RFC1122"/>
        </reference>
        <reference anchor="RFC1191" target="https://www.rfc-editor.org/info/rfc1191" quoteTitle="true" derivedAnchor="RFC1191">
          <front>
            <title>Path MTU discovery</title>
            <author initials="J.C." surname="Mogul" fullname="J.C. Mogul">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S.E." surname="Deering" fullname="S.E. Deering">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="1990" month="November"/>
            <abstract>
              <t indent="0">This memo describes a technique for dynamically discovering the maximum transmission unit (MTU) of an arbitrary internet path.  It specifies a small change to the way routers generate one type of ICMP message.  For a path that passes through a router that has not been so changed, this technique might not discover the correct Path MTU, but it will always choose a Path MTU as accurate as, and in many cases more accurate than, the Path MTU that would be chosen by current practice.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1191"/>
          <seriesInfo name="DOI" value="10.17487/RFC1191"/>
        </reference>
        <reference anchor="RFC2475" target="https://www.rfc-editor.org/info/rfc2475" quoteTitle="true" derivedAnchor="RFC2475">
          <front>
            <title>An Architecture for Differentiated Services</title>
            <author initials="S." surname="Blake" fullname="S. Blake">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="D." surname="Black" fullname="D. Black">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="M." surname="Carlson" fullname="M. Carlson">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="E." surname="Davies" fullname="E. Davies">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="Z." surname="Wang" fullname="Z. Wang">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="W." surname="Weiss" fullname="W. Weiss">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="1998" month="December"/>
            <abstract>
              <t indent="0">This document defines an architecture for implementing scalable service differentiation in the Internet.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2475"/>
          <seriesInfo name="DOI" value="10.17487/RFC2475"/>
        </reference>
        <reference anchor="RFC3290" target="https://www.rfc-editor.org/info/rfc3290" quoteTitle="true" derivedAnchor="RFC3290">
          <front>
            <title>An Informal Management Model for Diffserv Routers</title>
            <author initials="Y." surname="Bernet" fullname="Y. Bernet">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Blake" fullname="S. Blake">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="D." surname="Grossman" fullname="D. Grossman">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A." surname="Smith" fullname="A. Smith">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2002" month="May"/>
            <abstract>
              <t indent="0">This document proposes an informal management model of Differentiated Services (Diffserv) routers for use in their management and configuration.  This model defines functional datapath elements (e.g., classifiers, meters, actions, marking, absolute dropping, counting, multiplexing), algorithmic droppers, queues and schedulers.  It describes possible configuration parameters for these elements and how they might be interconnected to realize the range of traffic conditioning and per-hop behavior (PHB) functionalities described in the Diffserv Architecture.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3290"/>
          <seriesInfo name="DOI" value="10.17487/RFC3290"/>
        </reference>
        <reference anchor="RFC3473" target="https://www.rfc-editor.org/info/rfc3473" quoteTitle="true" derivedAnchor="RFC3473">
          <front>
            <title>Generalized Multi-Protocol Label Switching (GMPLS) Signaling Resource ReserVation Protocol-Traffic Engineering (RSVP-TE) Extensions</title>
            <author initials="L." surname="Berger" fullname="L. Berger" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2003" month="January"/>
            <abstract>
              <t indent="0">This document describes extensions to Multi-Protocol Label Switching (MPLS) Resource ReserVation Protocol - Traffic Engineering (RSVP-TE) signaling required to support Generalized MPLS.  Generalized MPLS extends the MPLS control plane to encompass time-division (e.g., Synchronous Optical Network and Synchronous Digital Hierarchy, SONET/SDH), wavelength (optical lambdas) and spatial switching (e.g., incoming port or fiber to outgoing port or fiber).  This document presents a RSVP-TE specific description of the extensions.  A generic functional description can be found in separate documents.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3473"/>
          <seriesInfo name="DOI" value="10.17487/RFC3473"/>
        </reference>
        <reference anchor="RFC3552" target="https://www.rfc-editor.org/info/rfc3552" quoteTitle="true" derivedAnchor="RFC3552">
          <front>
            <title>Guidelines for Writing RFC Text on Security Considerations</title>
            <author initials="E." surname="Rescorla" fullname="E. Rescorla">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="B." surname="Korver" fullname="B. Korver">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2003" month="July"/>
            <abstract>
              <t indent="0">All RFCs are required to have a Security Considerations section. Historically, such sections have been relatively weak.  This document provides guidelines to RFC authors on how to write a good Security Considerations section.   This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="72"/>
          <seriesInfo name="RFC" value="3552"/>
          <seriesInfo name="DOI" value="10.17487/RFC3552"/>
        </reference>
        <reference anchor="RFC3670" target="https://www.rfc-editor.org/info/rfc3670" quoteTitle="true" derivedAnchor="RFC3670">
          <front>
            <title>Information Model for Describing Network Device QoS Datapath Mechanisms</title>
            <author initials="B." surname="Moore" fullname="B. Moore">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="D." surname="Durham" fullname="D. Durham">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Strassner" fullname="J. Strassner">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A." surname="Westerinen" fullname="A. Westerinen">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="W." surname="Weiss" fullname="W. Weiss">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2004" month="January"/>
            <abstract>
              <t indent="0">The purpose of this document is to define an information model to describe the quality of service (QoS) mechanisms inherent in different network devices, including hosts.  Broadly speaking, these mechanisms describe the properties common to selecting and conditioning traffic through the forwarding path (datapath) of a network device.  This selection and conditioning of traffic in the datapath spans both major QoS architectures: Differentiated Services and Integrated Services.  This document should be used with the QoS Policy Information Model (QPIM) to model how policies can be defined to manage and configure the QoS mechanisms (i.e., the classification, marking, metering, dropping, queuing, and scheduling functionality) of devices.  Together, these two documents describe how to write QoS policy rules to configure and manage the QoS mechanisms present in the datapaths of devices.  This document, as well as QPIM, are information models.  That is, they represent information independent of a binding to a specific type of repository</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3670"/>
          <seriesInfo name="DOI" value="10.17487/RFC3670"/>
        </reference>
        <reference anchor="RFC5120" target="https://www.rfc-editor.org/info/rfc5120" quoteTitle="true" derivedAnchor="RFC5120">
          <front>
            <title>M-ISIS: Multi Topology (MT) Routing in Intermediate System to Intermediate Systems (IS-ISs)</title>
            <author initials="T." surname="Przygienda" fullname="T. Przygienda">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="N." surname="Shen" fullname="N. Shen">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="N." surname="Sheth" fullname="N. Sheth">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2008" month="February"/>
            <abstract>
              <t indent="0">This document describes an optional mechanism within Intermediate System to Intermediate Systems (IS-ISs) used today by many ISPs for IGP routing within their clouds.  This document describes how to run, within a single IS-IS domain, a set of independent IP topologies that we call Multi-Topologies (MTs). This MT extension can be used for a variety of purposes, such as an in-band management network "on top" of the original IGP topology, maintaining separate IGP routing domains for isolated multicast or IPv6 islands within the backbone, or forcing a subset of an address space to follow a different topology.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5120"/>
          <seriesInfo name="DOI" value="10.17487/RFC5120"/>
        </reference>
        <reference anchor="RFC5777" target="https://www.rfc-editor.org/info/rfc5777" quoteTitle="true" derivedAnchor="RFC5777">
          <front>
            <title>Traffic Classification and Quality of Service (QoS) Attributes for Diameter</title>
            <author initials="J." surname="Korhonen" fullname="J. Korhonen">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="H." surname="Tschofenig" fullname="H. Tschofenig">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="M." surname="Arumaithurai" fullname="M. Arumaithurai">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="M." surname="Jones" fullname="M. Jones" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A." surname="Lior" fullname="A. Lior">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2010" month="February"/>
            <abstract>
              <t indent="0">This document defines a number of Diameter attribute-value pairs (AVPs) for traffic classification with actions for filtering and Quality of Service (QoS) treatment.  These AVPs can be used in existing and future Diameter applications where permitted by the Augmented Backus-Naur Form (ABNF) specification of the respective Diameter command extension policy.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5777"/>
          <seriesInfo name="DOI" value="10.17487/RFC5777"/>
        </reference>
        <reference anchor="RFC7551" target="https://www.rfc-editor.org/info/rfc7551" quoteTitle="true" derivedAnchor="RFC7551">
          <front>
            <title>RSVP-TE Extensions for Associated Bidirectional Label Switched Paths (LSPs)</title>
            <author initials="F." surname="Zhang" fullname="F. Zhang" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="R." surname="Jing" fullname="R. Jing">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="R." surname="Gandhi" fullname="R. Gandhi" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2015" month="May"/>
            <abstract>
              <t indent="0">This document describes Resource Reservation Protocol (RSVP) extensions to bind two point-to-point unidirectional Label Switched Paths (LSPs) into an associated bidirectional LSP.  The association is achieved by defining new Association Types for use in ASSOCIATION and in Extended ASSOCIATION Objects. One of these types enables independent provisioning of the associated bidirectional LSPs on both sides, while the other enables single-sided provisioning.  The REVERSE_LSP Object is also defined to enable a single endpoint to trigger creation of the reverse LSP and to specify parameters of the reverse LSP in the single-sided provisioning case.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7551"/>
          <seriesInfo name="DOI" value="10.17487/RFC7551"/>
        </reference>
        <reference anchor="RFC7657" target="https://www.rfc-editor.org/info/rfc7657" quoteTitle="true" derivedAnchor="RFC7657">
          <front>
            <title>Differentiated Services (Diffserv) and Real-Time Communication</title>
            <author initials="D." surname="Black" fullname="D. Black" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="P." surname="Jones" fullname="P. Jones">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2015" month="November"/>
            <abstract>
              <t indent="0">This memo describes the interaction between Differentiated Services (Diffserv) network quality-of-service (QoS) functionality and real- time network communication, including communication based on the Real-time Transport Protocol (RTP).  Diffserv is based on network nodes applying different forwarding treatments to packets whose IP headers are marked with different Diffserv Codepoints (DSCPs). WebRTC applications, as well as some conferencing applications, have begun using the Session Description Protocol (SDP) bundle negotiation mechanism to send multiple traffic streams with different QoS requirements using the same network 5-tuple.  The results of using multiple DSCPs to obtain different QoS treatments within a single network 5-tuple have transport protocol interactions, particularly with congestion control functionality (e.g., reordering).  In addition, DSCP markings may be changed or removed between the traffic source and destination.  This memo covers the implications of these Diffserv aspects for real-time network communication, including WebRTC.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7657"/>
          <seriesInfo name="DOI" value="10.17487/RFC7657"/>
        </reference>
        <reference anchor="RFC8201" target="https://www.rfc-editor.org/info/rfc8201" quoteTitle="true" derivedAnchor="RFC8201">
          <front>
            <title>Path MTU Discovery for IP version 6</title>
            <author initials="J." surname="McCann" fullname="J. McCann">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Deering" fullname="S. Deering">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Mogul" fullname="J. Mogul">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="R." surname="Hinden" fullname="R. Hinden" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2017" month="July"/>
            <abstract>
              <t indent="0">This document describes Path MTU Discovery (PMTUD) for IP version 6. It is largely derived from RFC 1191, which describes Path MTU Discovery for IP version 4.  It obsoletes RFC 1981.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="87"/>
          <seriesInfo name="RFC" value="8201"/>
          <seriesInfo name="DOI" value="10.17487/RFC8201"/>
        </reference>
        <reference anchor="RFC8504" target="https://www.rfc-editor.org/info/rfc8504" quoteTitle="true" derivedAnchor="RFC8504">
          <front>
            <title>IPv6 Node Requirements</title>
            <author initials="T." surname="Chown" fullname="T. Chown">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Loughney" fullname="J. Loughney">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="T." surname="Winters" fullname="T. Winters">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2019" month="January"/>
            <abstract>
              <t indent="0">This document defines requirements for IPv6 nodes.  It is expected that IPv6 will be deployed in a wide range of devices and situations. Specifying the requirements for IPv6 nodes allows IPv6 to function well and interoperate in a large number of situations and deployments.</t>
              <t indent="0">This document obsoletes RFC 6434, and in turn RFC 4294.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="220"/>
          <seriesInfo name="RFC" value="8504"/>
          <seriesInfo name="DOI" value="10.17487/RFC8504"/>
        </reference>
      </references>
    </references>
    <section anchor="acks" numbered="false" toc="include" removeInRFC="false" pn="section-appendix.a">
      <name slugifiedName="name-acknowledgements">Acknowledgements</name>
      <t indent="0" pn="section-appendix.a-1">
        The authors wish to thank <contact fullname="Pat Thaler"/>, <contact fullname="Norman Finn"/>, <contact fullname="Loa Andersson"/>, <contact fullname="David Black"/>,
        <contact fullname="Rodney Cummings"/>, <contact fullname="Ethan         Grossman"/>, <contact fullname="Tal Mizrahi"/>, <contact fullname="David Mozes"/>, <contact fullname="Craig Gunther"/>,
        <contact fullname="George Swallow"/>, <contact fullname="Yuanlong         Jiang"/>, and <contact fullname="Carlos J. Bernardos"/> for their
        various contributions to this work. <contact fullname="David Black"/> served as
        technical advisor to the DetNet working group during the
        development of this document and provided many valuable
        comments. IESG comments were provided by <contact fullname="Murray Kucherawy"/>, 
        <contact fullname="Roman Danyliw"/>, <contact fullname="Alvaro         Retana"/>, <contact fullname="Benjamin Kaduk"/>, <contact fullname="Rob Wilton"/>, and
        <contact fullname="Érik Vyncke"/>.
      </t>
    </section>
    <section anchor="contrib" numbered="false" toc="include" removeInRFC="false" pn="section-appendix.b">
      <name slugifiedName="name-contributors">Contributors</name>
      <t indent="0" pn="section-appendix.b-1">
The editor of this document wishes to thank and acknowledge the following
people who contributed substantially to the content of this document and
should be considered coauthors:
      </t>
      <contact fullname="Jouni Korhonen">
        <address>
          <postal>
            <street/>
            <city/>
            <region/>
            <code/>
            <country/>
          </postal>
          <email>jouni.nospam@gmail.com</email>
        </address>
      </contact>
      <contact fullname="Andrew G. Malis">
        <organization showOnFrontPage="true">Malis Consulting</organization>
        <address>
          <postal>
            <street/>
            <city/>
            <region/>
            <code/>
            <country/>
          </postal>
          <email>agmalis@gmail.com</email>
        </address>
      </contact>
    </section>
    <section anchor="authors-addresses" numbered="false" removeInRFC="false" toc="include" pn="section-appendix.c">
      <name slugifiedName="name-authors-addresses">Authors' Addresses</name>
      <author role="editor" fullname="Balázs Varga" initials="B." surname="Varga">
        <organization showOnFrontPage="true">Ericsson</organization>
        <address>
          <postal>
            <street>Magyar Tudosok krt. 11.</street>
            <city>Budapest</city>
            <country>Hungary</country>
            <code>1117</code>
          </postal>
          <email>balazs.a.varga@ericsson.com</email>
        </address>
      </author>
      <author fullname="János Farkas" initials="J." surname="Farkas">
        <organization showOnFrontPage="true">Ericsson</organization>
        <address>
          <postal>
            <street>Magyar Tudosok krt. 11.</street>
            <city>Budapest</city>
            <country>Hungary</country>
            <code>1117</code>
          </postal>
          <email>janos.farkas@ericsson.com</email>
        </address>
      </author>
      <author fullname="Lou Berger" initials="L." surname="Berger">
        <organization showOnFrontPage="true">LabN Consulting, L.L.C.</organization>
        <address>
          <email>lberger@labn.net</email>
        </address>
      </author>
      <author fullname="Don Fedyk" initials="D." surname="Fedyk">
        <organization showOnFrontPage="true">LabN Consulting, L.L.C.</organization>
        <address>
          <email>dfedyk@labn.net</email>
        </address>
      </author>
      <author fullname="Stewart Bryant" initials="S." surname="Bryant">
        <organization showOnFrontPage="true">Futurewei Technologies</organization>
        <address>
          <email>sb@stewartbryant.com</email>
        </address>
      </author>
    </section>
  </back>
</rfc>
