<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 3.1.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-birrane-tvr-use-cases-00" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.15.1 -->
  <front>
    <title abbrev="tvr-use-cases">TVR (Time-Variant Routing) Use Cases</title>
    <seriesInfo name="Internet-Draft" value="draft-birrane-tvr-use-cases-00"/>
    <author fullname="Ed Birrane">
      <organization>JHU/APL</organization>
      <address>
        <email>Edward.Birrane@jhuapl.edu</email>
      </address>
    </author>
    <date year="2022" month="October" day="24"/>
    <area>Routing</area>
    <keyword>Time-variant</keyword>
    <keyword>Routing</keyword>
    <keyword>Mobility</keyword>
    <keyword>Green computing</keyword>
    <keyword>Resource management</keyword>
    <abstract>
      <t>Time-Variant Routing (TVR) refers to the calculation of a path or subpath through a network where the time of message transmission (or receipt) is part of the overall route computation. This means that, all things being equal, a TVR computation might produce different results depending on the time that the computation is performed without other detectable changes to the network topology or other cost functions associated with the route.</t>
      <t>This document introduces use cases where TVR computations could improve message exchange in a network.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-birrane-tvr-use-cases/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Time Variant Routing Working Group mailing list (<eref target="mailto:tvr@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tvr/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tvr/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/NasaDtn/tvr-bof-use-cases"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Existing Routing Protocols expect to maintain contemporaneous, end-to-end connected paths across a network. Changes to that connectivity, such as the loss of an adjacent peer, are considered to be exceptional circumstances that must be corrected prior to the resumption of data transmission. Corrections may include attempting to re-establish lost adjacencies and recalculating or rediscovering a functional topology.</t>
      <t>However, there are a growing number of use cases where changes to the routing topology are an expected part of network operations. In these cases the pre-planned loss and restoration of an adjacency, or formation of an alternate adjacency, should be seen as a non-disruptive event.</t>
      <t>The expected loss (and planned resumption) of links can occur for a variety of reasons. In networks with mobile nodes, such as unmanned aerial vehicles and some orbiting spacecraft constellations, links are lost and re-established as a function of the mobility of the platforms. In networks without reliable access to power, such as networks harvesting energy from wind and solar, link activity might be restricted to certain times of day. Similarly, in networks prioritizing green computing and energy efficiency over data rate, network traffic might be planned around energy costs or expected user data volumes.</t>
      <t>This document defines three use cases where a route computation might beneficially consider time information. Each of these use cases includes the following information.</t>
      <ol spacing="normal" type="1"><li>An overview of the use case describing how route computations might select different paths (or subpaths) as a function of time.</li>
        <li>A set of assumptions made by the use case as to the nature of the network and data exchange.</li>
        <li>Specific discussion on the routing impacts of the use case.</li>
        <li>An exemplar of a network conformant to the use case.</li>
      </ol>
      <t>The document may not represent the full set of cases where time-variant routes could beneficially impact network performance - new use cases are expected to be generated over time.  Similarly, the concrete examples within each use case are meant to provide an existence proof of the use case, not to present any exhaustive enumeration of potential examples. It is likely that there exist multiple example networks that could be claimed as instances of any given use case.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="Resource-Preservation">
      <name>Resource Preservation</name>
      <t>Some nodes in a network might operate in resource-constrained environments or otherwise with limited internal resources. Constraints such as available power, thermal ranges, and on-board storage can all impact the instantaneous functionality of a node. In particular, resource management on such a node can require that certain functionality be powered on (or off) to extend the ability of the node to participate in the network.</t>
      <t>When power on a node is running low, non-critical functions on the node might be turned off in favor of extending node life. Alternatively, certain functions on a node may be turned off to allow the node to use available power to respond to an event, such as data collection. When a node is in danger of violating a thermal constraint, normal processing might be paused in favor of a transition to a thermal safe mode until a regular operating condition is reestablished. When local storage resources run low, a node might choose to expend power resources to fuse, delete, or transmit data off the node to free space for future data collection.</t>
      <t>In addition to power, thermal, and storage, other resource constraints may exist on a node such that the preservation of resources are necessary to preserve the existence (and proper function) of the node in the network. Nodes operating in these conditions might benefit from TVR computations as the connectivity of the node changes over time as part of node preservation.</t>
      <section anchor="assumptions">
        <name>Assumptions</name>
        <t>To manage on-board functionality as a function of available resources, a node must understand certain elements of how resources are used and replenished. It is assumed that patterns of the environment, device construction, and operational configuration exist with enough regularity and stability to allow meaningful planning. The following assumptions are made with this use case.</t>
        <ol spacing="normal" type="1"><li>Known resource expenditures. It is assumed that there exists some determinable relationship between the resources available on a node and the resources needed to participate in a network. A node would need to understand when it has met some condition for participating in, or dropping out of, a network. This is somewhat similar to predicting the amount of battery life left on a laptop as a function of likely future usage.</li>
          <li>Predictable resource accumulation. It is assumed that the accumulation of resources on a node are predictable such that a node might expect (and be able to communicate) when it is likely to next rejoin a network.  This is similar to predicting the time at which a battery on a laptop will be fully charged.</li>
          <li>Consistent cost functions. It is assumed that resource management on a node is deterministic such that the management of a node as a function of resource expenditure and accumulation is consistent enough for link planning.</li>
        </ol>
      </section>
      <section anchor="routing-impacts">
        <name>Routing Impacts</name>
        <t>Resource management in these scenarios might involve turning off elements of the node as part of on-board resource management. These activities can affect data routing in a variety of ways.</t>
        <ol spacing="normal" type="1"><li>Power Savings. On-board radios may be turned off to allow other node processing. This may happen on power-constrained devices to extend the battery life of the node or to allow a node to perform some other power-intensive task.</li>
          <li>Thermal Savings. On-board radios may be turned off if there are thermal considerations on the node, such as an increase in a node's operating temperature.</li>
          <li>Storage Savings. On-board radios may be turned on with the purpose of transmitting data off the node to free local storage space to collect new data.</li>
        </ol>
        <t>Whenever a communications device on a node changes its powered state there is the possibility (if the node is within range of other nodes in a network) that the topology of the network is changed, which impacts route calculations through the network. Additionally, whenever a node joins a network there may be a delay between the joining of the node to the network and any discovery that may take place relating to the status of the node's functional neighborhood. During these times, forwarding to and from the node might be delayed pending some synchronization.</t>
      </section>
      <section anchor="exemplar">
        <name>Exemplar</name>
        <t>One example of a network where nodes must perform resource preservation is an energy-harvesting, wireless sensor network. In such a network, nodes may be powered solely by the environment (such as through solar panels). On-board power may fluctuate as a function of the sensors on each node, the processing performed on each node, and position and orientation of the node relative to its energy source.</t>
        <t>Consider a contrived three node network where each node accumulates power through solar panels.  Power available for Radio Frequency (RF) transmission is shown below in <xref target="Resource-Example-Plots"/>. In this figure, each of the three nodes (Node 1, Node 2, and Node 3) have a different plot of available power over time.  This example assumes that a node will not power its radio until available power is over some threshold, which is shown by the horizontal line on each plot.</t>
        <figure anchor="Resource-Example-Plots">
          <name>Node Power Over Time</name>
          <artwork type="ascii" align="center"><![CDATA[
           Node 1                   Node 2                   Node 3
P |                      P |   -------            P |          --
o |  ----       --       o |  /       \           o |         /  \
w |~/~~~~\~~~~~/~~\~~    w |~/~~~~~~~~~\~~~~~~    w |~~~~~~~~/~~~~\~~~~
e |/      \   /    \     e |/           \         e |       /      \
r |        ---      -    r |             -----    r |-------        ---
  +---++----++----++-      +---++----++----++-      +---++----++----++-
      t1    t2    t3           t1    t2    t3           t1    t2    t3
           Time                     Time                     Time
]]></artwork>
        </figure>
        <t>The connectivity of this three node network changes over time in ways that may be predictable and are likely able to be communicated to other nodes in this small sensor network. Examples of connectivity are shown in <xref target="Resource-Example-Schedule"/>.  This figure shows a sample of network connectivity at three times: t1, t2, and t3.</t>
        <ul spacing="normal">
          <li>At time t1 Node 1 and Node 2 have their radios powered and are expected to communicate.</li>
          <li>At time t2 it is expected that Node 1  has its radio off, but that Node 2 and Node 3 can communicate.</li>
          <li>Finally, at time t3 it is expected that Node 1 may be turning its radio off and that Node 2 and Node 3 are not powering their radios and there is no expectation of connectivity.</li>
        </ul>
        <figure anchor="Resource-Example-Schedule">
          <name>Topology over Time</name>
          <artwork type="ascii" align="center"><![CDATA[
     +----------+        +----------+        +----------+
t1   |  Node 1  |--------|  Node 2  |        |  Node 3  |
     +----------+        +----------+        +----------+

     +----------+        +----------+        +----------+
t2   |  Node 1  |        |  Node 2  |--------|  Node 3  |
     +----------+        +----------+        +----------+

     +----------+        +----------+        +----------+
t3   |  Node 1  |        |  Node 2  |        |  Node 3  |
     +----------+        +----------+        +----------+
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="Operating-Efficiency">
      <name>Operating Efficiency</name>
      <t>Some nodes in a network might alter their networking behavior to optimize metrics associated with the cost of a node's operation. While the resource preservation use case described in <xref target="Resource-Preservation"/> addresses node survival, this use case discusses non-survival efficiencies such as the financial cost to operate the node and the environmental impact (cost) of using that node.</t>
      <t>When a node operates using some pre-existing infrastructure there is (typically) some cost associated with the use of that infrastructure. Sample costs include items such as the following.</t>
      <ol spacing="normal" type="1"><li>Nodes that use existing wireless communications such as a cellular infrastructure must pay to communicate to and through that infrastructure.</li>
        <li>Nodes supplied with electricity from an energy provider pay for the power they use.</li>
        <li>Nodes that cluster computation and activities might increase the temperature of the node and incur additional costs associated with cooling the node (or collection of nodes).</li>
        <li>Beyond financial costs, assessing the environmental impact of operating a node may also be modeled as a cost associated with node operation, to include achieving carbon credits or other incentives for green computing.</li>
      </ol>
      <t>When the cost of using a node's resources changes over time, a node can benefit from predicting when data transmissions might optimize costs, environmental impacts, or other metrics associated with operation.</t>
      <section anchor="assumptions-1">
        <name>Assumptions</name>
        <t>The ability to predict the impact of a node's resource utilization over time presumes that the node exists within a defined environment (or infrastructure). Some necessary characteristics of these environments are listed as follows.</t>
        <ol spacing="normal" type="1"><li>Cost Measureability. The impacts of operating a node within its environment can be measured in a deterministic way. For example, that the cost-per-bit of data over a cellular network or the cost-per-kilowatt of energy used are known.</li>
          <li>Cost Predictability. Changes to the impacts of resource utilization are known in advance. For example, if the cost of energy is less expensive in the evening than during the day, there exists some way of communicating this change to a node.</li>
          <li>Cost Persistent. Changes to the cost of operating in the environment persist for a sufficient amount of time such that behavior can be adjusted in response to changing costs. If costs change rapidly or near continuously it is likely not possible to meaningfully react to their change.</li>
          <li>Cost Magnitude. The magnitude of cost changes are such that a node sees a minimum threshold cost reduction as a result of optimization.</li>
        </ol>
      </section>
      <section anchor="routing-impacts-1">
        <name>Routing Impacts</name>
        <t>Optimizing resource utilization can affect route computation in ways similar to those experienced with resource preservation. The significant difference being that when optimizing costs the overall network topology is not changing. Even without a changing topology, cost optimization can impact route calculation in a variety of ways, some of which are described as follows.</t>
        <ol spacing="normal" type="1"><li>Link Filtering. Data might be accumulated on a node waiting for a cost-effective time for data transmission. Individual link costs might be annotated with cost information such that adjacencies with a too-high cost might not be used for forwarding. This effectively filters which adjacencies are used (possibly as a function of the type of data being routed).</li>
          <li>Burst Planning. In cases where there is a cost savings associated with fewer longer transmissions (versus many smaller transmissions), nodes might refuse to forward data until a sufficient data volume exists to justify a transmission.</li>
          <li>Environmental Measurement. Nodes that measure the quality of individual links can compute the overall cost of using a link as a function of the signal strength of the link. If link quality is insufficient due to environmental conditions (such as clouds on an optical link or long distance RF transmission in a storm) the cost required to communicate over the link may be too much, even if access to infrastructure is otherwise in a less expensive time of day.</li>
        </ol>
        <t>In each of these cases, some consideration of the efficiency of transmission is prioritized over achieving a particular data rate.  Waiting until data rate costs are lower takes advantage of platforms using time-of-use rate plans - both for pay-as-you-go data and associated energy costs. Accumulating data volumes and choosing more opportune times to transmit can also result in less energy consumption by radios and, thus, less operating cost for platforms.</t>
      </section>
      <section anchor="exemplar-1">
        <name>Exemplar</name>
        <t>One example of a network where nodes might seek to optimize operating cost is a set of nodes operating over cellular connections that charge both On-Peak and Off-Peak data rates. In this case, individual nodes may be allocated a fixed set of "On-Peak" minutes such that exceeding that amount of time results in expensive overage charges. Generally, the concept of On-Peak and Off-Peak minutes exists to deter the use of a given network at times when the cellular network is likely to encounter heavy call volumes (such as during the workday).</t>
        <t>Just as pricing information can act as a deterrent (or incentive) for a human cellular user, this pricing information can be codified in ways that also allow machine-to-machine (M2M) connections to prioritize Off-Peak communications for certain types of data exchange. Many M2M traffic exchanges involve schedulable activities, such as nightly bulk file transfers, pushing software updates, synchronizing datastores, and sending non-critical events and logs. These activities are usually already scheduled to minimize impact on businesses and customers, but can also be scheduled to minimize overall cost.</t>
        <t>Consider a contrived three node network, similar to the one pictured in <xref target="Resource-Example-Plots"/>, except that in this case the resource that varies over time is the cost of the data exchange. This case is illustrated below in <xref target="Efficiency-Example-Plots"/>. In this figure, a series of three plots are given, one for each of nodes Node 1, Node 2, and Node 3.  Each of these nodes exists in a different cellular service area which has different On-Peak and Off-Peak data rate times. This is shown in each figure by times when the cost is low (Off-Peak) and when the cost is high (On-Peak).</t>
        <figure anchor="Efficiency-Example-Plots">
          <name>Data Cost Over Time</name>
          <artwork type="ascii" align="center"><![CDATA[
 Node 1                     Node 2                   Node 3

C |       +---------     C |--+                    C |-------------+
o |       |              o |  |                    o |             |
s |       |              s |  |                    s |             |
t |-------+              t |  +----------------    t |             +-------
  |                        |                         |
  +---++----++----++--     +----++----++----++--     +----++----++-----++--
      t1    t2    t3            t1    t2    t3            t1    t2     t3
           Time                      Time                      Time
]]></artwork>
        </figure>
        <t>Given the presumption that peak times are known in advance, the cost of data exchange from Node 1 through Node 2 to Node 3 can be calculated. Examples of these data exchanges are shown in <xref target="Efficiency-Example-Schedule"/>. From this figure, both times t1 and t3 result in a smaller cost of data exchange than choosing to communicate data at time t2.</t>
        <figure anchor="Efficiency-Example-Schedule">
          <name>Data Exchange Cost over Time</name>
          <artwork type="ascii" align="center"><![CDATA[
     +-----------+          +-----------+          +-----------+
t1   |  Node N1  |---LOW----|  Node N2  |---HIGH---|  Node N3  |
     +-----------+          +-----------+          +-----------+

     +-----------+          +-----------+          +-----------+
t2   |  Node N1  |---HIGH---|  Node N2  |---HIGH---|  Node N3  |
     +-----------+          +-----------+          +-----------+

     +-----------+          +-----------+          +-----------+
t3   |  Node N1  |---HIGH---|  Node N2  |----LOW---|  Node N3  |
     +-----------+          +-----------+          +-----------+
]]></artwork>
        </figure>
        <t>While not possible in every circumstance, a highly optimized plan could be to communicate from Node 1 to Node 2 at time t1 and then queue data at Node 2 until time t3 for delivery to Node 3. This case is shown in <xref target="Efficiency-Example-Store"/>.</t>
        <figure anchor="Efficiency-Example-Store">
          <name>Data Cost using Storage</name>
          <artwork type="ascii" align="center"><![CDATA[
     +-----------+          +-----------+
t1   |  Node N1  |---LOW----|  Node N2  |
     +-----------+          +-----------+
                            +-----------+          +-----------+
t3                          |  Node N2  |----LOW---|  Node N3  |
                            +-----------+          +-----------+
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="mobile-devices">
      <name>Mobile Devices</name>
      <t>When a node is placed on a mobile platform, the mobility of the platform (and thus the mobility of the node) may cause changes to the topology of the network over time. To the extent that the relative mobility between and amongst nodes in the network can be understood in advance, the associated loss and establishment of adjacencies can also be planned for.</t>
      <t>Mobility can cause the loss of an adjacent link in several ways, such as the following.</t>
      <ol spacing="normal" type="1"><li>Node mobility can cause the distance between two nodes to become large enough that distance-related attenuation causes the mobile node to lose connectivity with one or more other nodes in the network.</li>
        <li>Node mobility can also be used to maintain a required distance from other mobile nodes in the network. While moving, external characteristics may cause the loss of links through occultation or other hazards of traversing a shared environment.</li>
        <li>Nodes that can change the orientation of their communication terminals will also establish and lose connectivity with other nodes as a function of that motion.</li>
      </ol>
      <t>The impacts of node mobility are separate concerns from either resource preservation or cost efficiency.  Unlike with resource preservation, there is no expectation that mobile nodes are resource constrained. Unlike cost efficiency, there is no expectation that concepts such as peak-hours or other computation-based metrics need to be optimized. This use case is solely concerned with understanding the routing implications of motion-related changes to a network topology.</t>
      <section anchor="assumptions-2">
        <name>Assumptions</name>
        <t>Predicting the impact of node mobility on route computation requires some information relating to the nature of the mobility and the nature of the environment being moved through. Some information presumed to exist for planning is listed as follows.</t>
        <ol spacing="normal" type="1"><li>Path Predictability. The path of a mobile node through its environment is known (or can be predicted) as a function of (at least) time. it is presumed that mobile nodes using time-variant algorithms would not exhibit purely random motion.</li>
          <li>Environmental Knowledge. When otherwise well-connected mobile nodes pass through certain elements of their environment (such as a storm, a tunnel, or the horizon) they may lose connectivity. The duration of this connectivity loss is assumed to be calculable as a function of node mobility and the environment itself.</li>
        </ol>
      </section>
      <section anchor="routing-impacts-2">
        <name>Routing Impacts</name>
        <t>Changing a network topology has a straightforward impact on the computation of paths (or subpaths) through that topology. In particular, the following features can be implemented in a network with mobile nodes such that different paths might be computed over time.</t>
        <ol spacing="normal" type="1"><li>Adjacent Link Expiration. A node might be able to predict that an adjacency will expire as a function of that node's mobility, the other node's mobility, or some characteristic of the environment. Determining that an adjacency has expired allows a route computation to plan for that loss, rather than default to an error recovery mechanism.</li>
          <li>Adjacent Link Resumption. Just as the loss of an adjacency can be predicted, it may be possible to predict when an adjacency will resume.</li>
          <li>Data Rate Adjustments. The achievable data rate over a given link is not constant over time, and may vary significantly as a function of both relative mobility between a transmitter and receiver as well as the environment being transmitted through. Knowledge of both mobility and environmental state may allow for prediction of data rates which may impact path computation.</li>
          <li>Adjacent Link Filtering. Separate from the instantaneous presence or absence of an adjacency, a route computation might choose to not use an adjacency if that adjacency is likely to expire in the near future or if it is likely to experience a significant drop in predicted data rate.</li>
        </ol>
      </section>
      <section anchor="exemplar-2">
        <name>Exemplar</name>
        <t>There are a significant number of mobile node use cases, to include vehicle-to-vehicle communications, swarms of unmanned aerial and underwater vehicles, ships in shipping lanes, airplanes following flight plans, and trains and subways. A (relatively) new type of mobile network that has emerged over the past several years is the Low Earth Orbit (LEO) networked constellation (LEO-NC). There are a number of such constellations being built by both private industry and governments.</t>
        <t>Many LEO-NCs have a similar operational concept of hundreds-to-thousands of inexpensive spacecraft that can communicate both with their orbital neighbors as well as down to any ground station that they happen to be passing over. The relationship between an individual spacecraft and an individual ground station becomes somewhat complex as each spacecraft may only be over a single ground station for a few minutes at a time.</t>
        <t>A LEO-NC represents a good example of planned mobility based on the predictability of spacecraft in orbit. Unlike other mobile vehicles that might experience traffic congestion or significant changes to speed, spacecraft operate in a less impactful environment. This determinism makes them an excellent candidate for time-variant route computations.</t>
        <t>Consider three spacecraft (N1, N2, and N3) following each other sequentially in the same orbit (this is sometimes called a string of pearls configuration). Spacecraft N2 always maintains connectivity to its two neighbor spacecraft, N1 (which is behind in the orbit) and N3 (which is ahead in the orbit). This configuration is illustrated in <xref target="Mobility-SOP"/>. While these spacecraft are all mobile, their relative mobility ensures that they are always in contact with each other (absent any true error condition).</t>
        <figure anchor="Mobility-SOP">
          <name>Three Sequential Spacecraft</name>
          <artwork type="ascii" align="center"><![CDATA[
      .--.                     .--.                     .--.
####-| N1 |-####  <--->  ####-| N2 |-####  <--->  ####-| N3 |-####
      \__/                     \__/                     \__/
]]></artwork>
        </figure>
        <t>Flying over a ground station imposes a non-relative motion between the ground and the spacecraft - namely that any given ground station will only be in view of the spacecraft for a short period of time. The times at which each spacecraft can see the ground station is shown in the plots in <xref target="Mobility-Example"/>. In this figure, ground contact is shown when the plot is high, and a lack of ground contact is shown when the graph is low. From this, we see that spacecraft N3 can see ground at time t1, N2 sees ground at time t2, and spacecraft N1 sees ground at time t3.</t>
        <figure anchor="Mobility-Example">
          <name>Spacecraft Ground Contacts Over Time</name>
          <artwork type="ascii" align="center"><![CDATA[
       Spacecraft N1            Spacecraft N2             Spacecraft N3
G |                      G |                       G |
r |              +--+    r |         +--+          r |   +--+
o |              |  |    o |         |  |          o |   |  |
u |              |  |    u |         |  |          u |   |  |
n |--------------+  +-   n |---------+  +-------   n |---+  +-------------
d |                      d |                       d |
  +---++----++----++--     +----++----++----++--     +----++----++----++--
      t1    t2    t3            t1    t2    t3            t1    t2    t3
           Time                      Time                      Time
]]></artwork>
        </figure>
        <t>Since the ground station in this example is stationary, each spacecraft will pass over it, resulting in a change to the network topology. This topology change is shown in <xref target="Mobility-Example-Topology"/>. At time t1, any message residing on N3 and destined for the ground could be forwarded directly to the ground station. At time t2, that same message would need to, instead, be forwarded to N2 and then forwarded to ground. By time t3, the same message would need to be forwarded from N2 to N1 and then down to ground.</t>
        <figure anchor="Mobility-Example-Topology">
          <name>Constellation Topology Over Time</name>
          <artwork type="ascii" align="center"><![CDATA[
    +------+          +------+
t1  |  N2  |----------|  N3  |
    +------+          +---+--+
                          |
                         /|\
                        \___/
                         / \
                       Ground
                       Station
------------------------------------------------------------------
    +------+          +------+          +------+
t2  |  N1  |----------|  N2  |----------|  N3  |
    +------+          +---+--+          +------+
                          |
                         /|\
                        \___/
                         / \
                       Ground
                       Station
------------------------------------------------------------------
                      +------+          +------+          +------+
t3                    |  N1  |----------|  N2  |----------|  N3  |
                      +---+--+          +------+          +------+
                          |
                         /|\
                        \___/
                         / \
                       Ground
                       Station
------------------------------------------------------------------
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TBD</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>Normative References</name>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner">
            <organization/>
          </author>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba">
            <organization/>
          </author>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
    </references>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TBD</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
