<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.8 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc comments="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-detnet-glbf-00" category="std" consensus="true" submissionType="IETF" tocDepth="5" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="detnet-glbf">Deterministic Networking (DetNet) Data Plane - guaranteed Latency Based Forwarding (gLBF) for bounded latency with low jitter and asynchronous forwarding in Deterministic Networks</title>

    <author initials="T." surname="Eckert" fullname="Toerless Eckert" role="editor">
      <organization>Futurewei Technologies USA</organization>
      <address>
        <postal>
          <street>2220 Central Expressway</street>
          <city>Santa Clara</city>
          <code>CA 95050</code>
          <country>USA</country>
        </postal>
        <email>tte@cs.fau.de</email>
      </address>
    </author>
    <author initials="A." surname="Clemm" fullname="Alexander Clemm">
      <organization>Sympotech</organization>
      <address>
        <postal>
          <code>CA</code>
          <country>USA</country>
        </postal>
        <email>ludwig@clemm.org</email>
      </address>
    </author>
    <author initials="S." surname="Bryant" fullname="Stewart Bryant">
      <organization>Independent</organization>
      <address>
        <postal>
          <country>UK</country>
        </postal>
        <email>sb@stewartbryant.com</email>
      </address>
    </author>
    <author initials="S." surname="Hommes" fullname="Stefan Hommes">
      <organization>ZF Friedrichshafen AG</organization>
      <address>
        <postal>
          <country>DE</country>
        </postal>
        <email>stefan.hommes@zf.com</email>
      </address>
    </author>

    <date year="2026" month="January" day="14"/>

    
    <workgroup>DETNET</workgroup>
    

    <abstract>


<?line 212?>

<t>This memo proposes a mechanism called "guaranteed Latency Based Forwarding" (gLBF) as part of DetNet for hop-by-hop packet forwarding with per-hop deterministically bounded latency and minimal jitter.</t>

<t>gLBF is intended to be useful across a wide range of networks and applications with need for high-precision deterministic networking services, including in-car networks or networks used for industrial automation across on factory floors, all the way to ++100Gbps country-wide networks.</t>

<t>Contrary to other mechanisms, gLBF does not require network wide clock synchronization, nor does it need to maintain per-flow state at network nodes, avoiding drawbacks of other known methods while leveraging their advantages.</t>

<t>Specifically, gLBF uses the queuing model and calculus of Urgency Based Scheduling (UBS, <xref target="UBS"/>),
which is used by TSN Asynchronous Traffic Shaping <xref target="TSN-ATS"/>. gLBF is intended to be a plug-in replacement for
TSN-ATN or as a parallel mechanism beside TSN-ATS because it allows to keeping the same controller-plane
design which is selecting paths for TSN-ATS, sizing TSN-ATS queues, calculating latencies and admitting
flows to calculated paths for calculated latencies.</t>

<t>In addition to reducing the jitter compared to TSN-ATS by additional buffering (dampening) in the network,
gLBF also eliminates the need for per-flow, per-hop state maintenance required by TSN-ATS.  This avoids the need to signal per-flow state to every hop from the controller-plane and associated scaling problems.  It also reduces implementation cost for high-speed networking hardware due to the avoidance of additional high-speed speed read/write memory access to retrieve,
process and update per-flow state variables for a large number of flows.</t>



    </abstract>



  </front>

  <middle>


<?line 230?>

<section anchor="overview-informative"><name>Overview (informative)</name>

<section anchor="terminology"><name>Terminology</name>

<dl>
  <dt>CaaS</dt>
  <dd>
    <t>Control as a Service. Cloud (compute) and network services to enable control (loops) with network connected devices, for example cars.</t>
  </dd>
  <dt>CQF</dt>
  <dd>
    <t>Cyclic Queuing and Forwarding.  A queuing mechanism defined by annex T of IEEE802.1Q.</t>
  </dd>
  <dt>DT</dt>
  <dd>
    <t>Dead Time. A term from CQF indicating the time during each cycle in which no frames can be sent because the the receiving node could not receive it into the desired cycle buffer.</t>
  </dd>
  <dt>node</dt>
  <dd>
    <t>Term used to indicate a system that with respect to gLBF does not act as a host, aka: sender/receiver. This memo avoids the term router to avoid implying that this is an IP/IPv6 router, as opposed to an LSR (label switch router). Likewise, a node can also be an 802.1 bridge implementing gLBF.</t>
  </dd>
  <dt>TCQF</dt>
  <dd>
    <t>Tagged Cyclic Queuing and Forwarding. The mechanism specified in this memo.</t>
  </dd>
</dl>

</section>
<section anchor="summary"><name>Summary</name>

<t>This memo proposes a mechanism called "guaranteed Latency Based Forwarding" (gLBF) for
hop-by-hop packet forwarding with per-hop deterministically bounded latency and minimal jitter.</t>

<t>gLBF is intended to be useful across a wide range of networks and applications with need for high-precision deterministic networking services, including in-car networks or networks used for industrial automation across on factory floors, all the way to ++100Gbps country-wide networks.</t>

<t>At its foundation, gLBF addresses the problems of burst accumulation and jitter accumulation across multiple hops.</t>

<t>Burst accumulation is  the phenomenon in which bursts of packets from senders in admission-controlled network will increase across intermediate nodes. This can only be managed with exponential complexity in admission control processing and significantly worst-case increase in end-to-end latency and/or lowered maximum utilization. What is needed for dynamic, large-scale or easy to manage admission control solutions are forwarding mechanisms without this problem, so that admission control for bandwidth and jitter/buffer-requirements can be linear: decomposed into solely per-hop calculations independent of changes in prior-hop traffic characteristics. Without forwarding plane solutions to overcome burst accumulation, this is not possible</t>

<t>Existing solutions addressing burst-accumulation do this by maintaining inter-packet gaps on a per-flow basis, such as in TSN Asynchronous Traffic Shaping (TSN-ATS). gLBF instead ensures inter-packet gaps are always maintained without the need for per-flow state. The basic idea involves assigning a specific queuing delay budget for any given node and class of traffic. This budget is pre-known from admission control calculus.  As the packet is transmitted, the actual queuing delay that was experienced by the packet at the node is subtracted from that budget and carried in a new header field of the packet.  Upon receiving the packet, the subsequent node subjects the packet to a delay stage.  Here the packet needs to wait for the time specified by that parameter before the node proceeds with regular processing of the packet.  This way, any queuing delay variations are absorbed and deterministic delay without the possibility of burst accumulation can be achieved.</t>

<t>By addressing burst-accumulation, gLBF also overcomes the problem of jitter-accumulation. This is the second core problem of mechanisms such as TSN-ATS: Depending on the amount of competing admitted traffic on a hop at any point in time packets of a flow may experience zero to maximum delay across the hop. This is the per-hop jitter. This jitter is additive across multiple hope, resulting in the inability for applications requiring (near) synchronous packet delivery to solely rely on such mechanisms. It likewise limits the ability of high utilization of networks with large number of bounded latency flows.</t>

<t>The basic principle on which gLBF operates was already proposed by researchers in the early 1990th
and called "Dampers". These dampers where not pursued or adopted due to the lack of network equipment capabilities
back then.  Only with recent and upcoming improvements in advanced forwarding planes will it be possible to
build these technologies at scale and cost.</t>

<t>Contrary to other proposals, gLBF does not require network wide clock synchronization.  Likewise, it does not need to maintain per-flow state at network nodes, as delay budget and the queuing delay variations that are to be absorbed are carried as part of the packets themselves, making them "self-contained".  This eliminate the for the per-flow, per-hop state maintenance required by TSN-ATS, which involves
scaling problems of signaling this per-flow state to every hop from the controller-plane as well as the
high-speed networking hardware implementation cost of high-speed speed read/write memory access to retrieve,
process and update these per-flow state variables for large number of flows.</t>

<t>Opposed to other damper proposals, gLBF also supports the queuing model and calculus of Urgency Based Scheduling (UBS, <xref target="UBS"/>),
which is used by TSN-ATS. gLBF is intended to be a plug-in replacement for
TSN-ATN or as a parallel mechanism beside TSN-ATS because it allows to keeping the same controller-plane
design which is selecting paths for TSN-ATS, sizing TSN-ATS queues, calculating latencies and admitting
flows to calculated paths for calculated latencies.</t>

<t>While gLBF as presented here is intended for use with IETF forwarding protocols and to provide
DetNet QoS for bounded latency and lower bounded jitter, it would equally applicable to other forwarding
planes, such as IEEE 802.1 Ethernet switching - assuming appropriate packet headers are defined
to carry the hop-by-hop and end-to-end metadata required by the mechanism.</t>

</section>
<section anchor="application-scenarios-and-use-cases"><name>Application scenarios and use cases</name>

<t>gLBF addresses the same use cases that are targeted by deterministic networking and high-precision networking services in general.  Common requirements of those services involve the need to provide service levels within very tightly defined service level bounds, in particular very specific latencies without the possibility of congestion-induced loss.  The ability to provide services with corresponding service level guarantees enables many applications that would simply not be feasible without such guarantees.  The following describes some use cases and application scenarios.</t>

<t>The development towards autonomous driving vehicles leads to new requirements and a high demand of computational resources that are often not available within a car. A solution is to reduce the in-car processing to a minimum, and to offload more computational expensive tasks to the cloud environment. Due to the safety implications and use cases, a delay in the transport of message from the cloud to the car and vice versa is often not acceptable. This includes application scenarios such as trajectory planning for driverless vehicles, but also emergency notifications to surrounding cars that require a fast delivery of messages to prevent a delayed action in case of an accident. While the usage of TSN for in-vehicle networks is already investigated and more mature, the usage of a real-time communication with guaranteed latencies for vehicles with to the cloud is still an open challenge.</t>

<t>Another use case that is important for the automotive industry is to further optimise the manufacturing process by taking into account more data sources. Since most of the SCADA systems and PLCs cannot connect to large data lakes and perform more advanced computational jobs, a real-time communication to the shop floor from a cloud instance does have several benefits. First of all does it integrate more data into the decision making process, since the control algorithms to automate manufacturing sites located in a cloud environment can take into account more variables than single plant control systems. Another aspect is also to reduce the resources on a particular factory floor or plant by transferring complex, recurring and more resource computational jobs to a cloud provider where a lack of computational power is not the limiting factor. However, in such cases it is important that associated control can still occur in real-time and according to very precise timing constraints.  Such a development is already foreseen by trends such as Industry 4.0 and Control-as-a-Service (CaaS).</t>

</section>
<section anchor="background"><name>Background</name>

<t>The following background introduces and explains gLBF step by step.
It uses IEEE 802.1 "Time Sensitive Networking" (TSN) mechanisms for reference, because
at the time of this memo, TSN bounded latency mechanisms are the most commonly understood and
deployed mechanisms to provide bounded latency and jitter services.</t>

<t>All mechanisms compared here are as well as those used by TSN based on the overall service design
that traffic flows have a well-defined rate and burstyness, which are tracked by the controller-plane and
called here the "envelope" of the flow.</t>

<t>The traffic model used for gLBF is taken from UBS gives the flow a rate r [bps/sec] and
a burst size b [bits] and the traffic envelope condition is that the total number of
bits w(t) over a period t [sec] of for the flow must be equal to or smaller than (r * t + b).
In one typical case, a flow wants to send a packet of size b one every interval of p [sec].
This translates into a rate r = b / p for the flow because after the flow has sent the first packet
of b bits, it will take p seconds until (r * t) has a size of b again: (r * t) = ((b / p) * p).</t>

<t>The controller-plane uses this per-flow information to calculate for each flow a path with sufficient free bandwidth
and per-hop buffers so that the bounded end-to-end latency of packets can be guaranteed. It then
allocates bandwidth and buffer resources to the flow so that further flows will not impact it.</t>

<t>Within this framework, bounded latency mechanisms can in general be divided into "on-time" and "in-time"
mechanisms.</t>

<section anchor="in-time-mechanisms"><name>In-time mechanisms</name>

<t>"In-time" bounded latency mechanisms forward packets in an (almost) work conserving manner.</t>

<t>When there is no competing traffic in the network, packets of traffic flows that comply
to their admitted envelope are forwarded without any mechanism introduced queuing latency.
When the maximum amount of admitted traffic is present, then packets of admitted flows
will experience the maximum guaranteed, so-called bounded latency. In result, in-time mechanism
introduce the maximum amount of jitter because the amount of competing traffic can
quickly change and then the latency of packets will change greatly.</t>

<t>IEEE TSN Asynchronous Traffic Shaping is the prime example of
an in-time mechanism. IETF <xref target="RFC2212"/>, "Integrated Services" is an older mechanism
based on the same principles.  In-time mechanisms have the benefit of not requiring
clock-synchronization between nodes to support their queuing.</t>

</section>
<section anchor="on-time-mechanisms"><name>On-time mechanisms</name>

<t>On-time bounded latency mechanisms do deliver packets (near) synchronously with zero or a small
maximum jitter - significantly smaller than that of in-time mechanisms.</t>

<t>EEE TSN Cyclic Queuing and Forwarding (CQF) is an example of an on-time
mechanism as is the Tagged Cyclic Queuing and Forwarding (TCQF) mechanism proposed to DetNet.<br />
Unlike the before mentioned in-time mechanisms, these mechanisms require clock synchronization
between router.</t>

</section>
<section anchor="control-loops-vs-in-time-and-on-time"><name>Control loops vs. in-time and on-time</name>

<t>One set of applications that require or prefer on-time (low jitter) delivery of packets are
control loops in vehicles or industrial environments and hence low-speed and short-range networks.</t>

<t>Emerging or future use-cases such as remote PLC or remote driving extend these requirements also
into metropolitan scale networks. In these environments, on-time forwarding is also called
synchronous forwarding for synchronous control loops.</t>

<t>Typically, in synchronous control loops, central units such as Programmable Logic Controllers
(PLC) do control a set of sensors and actors, polling or periodically receiving status information
from sensors and sending action instructions to actors. When packet forwarding is
on-time (synchronous), this central unit does exactly know the time at which sensors
sent a packet and the time at which packets are received by actors and they can react on it.</t>

<t>These solutions do not require sensors and actors to have accurate, synchronised clocks. Instead,
the central unit can control the time at which sensor and actors perform their operations
within the accuracy of the (zero/low) jitter of the network packet transmission.</t>

<t>When bounded latency forwarding is (only) in-time, edge nodes in the network and/or sensors
and actors need to convert the packets arriving with high jitter into an on-time arrival model
to continue supporting this application required model.</t>

<t>This conversion is typically called a playout-buffer mechanism and involves the need to synchronizing time
between senders and receivers, and hence most commonly the need for the network to support clock
synchronization to support these edge devices and/or sender receivers.</t>

<t>In result, existing bounded latency mechanisms to support synchronous, on-time delivery of packets
do require clock synchronization across the network. In the existing mechanisms like CQF for
the forwarding mechanism itself, in the on-time mechanisms to synchronize edge-devices and hosts.</t>

</section>
<section anchor="challenges-with-network-wide-clock-synchronization"><name>Challenges with network wide clock synchronization</name>

<t>While clock synchronization is a well understood technology, it is also a significant operational
if not device equipment cost factor [TBD: Add details if desired].</t>

<t>Therefore, clock synchronization with e.g.: IEEE 1588 PTP is
only deployed where no simpler solutions exist that provide the same benefits but without
clock synchronization. Today this for example means that in mobile networks, only the so-called
fronthaul deploys clock synchronization, but not the backhaul.</t>

<t>In result, it could be a challenge
to introduce new applications such as the above mentioned remote PLC, driving applications if
they wanted to rely on a bounded latency network service. But even for existing markets such
as in-car or industrial networks, removal or reduction of the need for clock synchronization could
be a significant evolution to reduce cost and increase simplicity of solutions.</t>

</section>
</section>
</section>
<section anchor="glbf-introduction-informative"><name>gLBF introduction (informative)</name>

<section anchor="dampers"><name>Dampers</name>

<t>The principle of the mechanism presented here is the so-called "Damper" mechanism, first mentioned
in the early 1990th, but never standardized back then, primarily because the required forwarding
was considered to be too advanced to be supportable in equipment at the time. These limitations
are not starting to be resolved, and hence it seems like a good time to re-introduce this mechanism.</t>

<t>The principle of damper based forwarding is easily explained: When a packet is sent by a node A,
this node will have measured the latency L, how long the packet was processed by the node. The main factor
of L is  the queuing latency of the packet in A because of competing traffic sent to the
same outgoing interface. Based on the admission control and queuing algorithms used in the node, there
can be a known upper bound M(ax) for this processing latency though, and when the packet then arrives at the
next-hop receiving node B, this node will simply further delay the packet by (B-L), and in result
the packet will have synchronously been forwarded from A to B with a constant latency of M(ax).</t>

<figure title="Forwarding without Damper" anchor="FIG1"><artwork><![CDATA[
+------------------------+      +------------------------+ 
| Node A                 |      | Node B                 |
|   +-+         +-+      |      |   +-+         +-+      |
|-x-|F|---------|Q|------|------|-x-|F|---------|Q|------|
|   +-+         +-+      | Link |   +-+         +-+      |
+------------------- ----+      +------------------------+
  |<--------- Hop A/B latency --->|
]]></artwork></figure>

<t><xref target="FIG1"/> shows a single hop from node A to node B without Dampers.</t>

<t>A receives a packet. The F)orwarding module determines some outgoing
interface towards node B where it is enqueued into Q because
competing packets may already be in line to be sent from Q to B.
This is because packets may be arriving simultaneously from multiple
different input interfaces on A (not shown in picture), and/or the
speed of the receiving interface on A is higher than the speed of the
link to B.</t>

<t>Forwarding F can be L2 switching and/or L3 routing, the choice does not
impact the considerations described here.</t>

<t>When the packet is finally sent from Q over link to B, B repeats the same steps
towards the next (not shown) node.</t>

<t>(x) is the reception time of
the packet in A and B, and the per-hop latency of the packet
is xB - xA, predominantly determined by the time the packet has
to wait in Q plus any other relevant processing latency, fixed or
variable from F plus the propagation latency of the packet across
link, which is predominantly determined by the serialization latency
of the packet plus the propagation latency of the link, which is
the speed of light in the material used, for example fiber, where
the speed of light is 31 percent slower than across vacuum.</t>

<t>All the factors impacting the hop A/B latency other than Q in A are
naturally bounded: A well defined maximum can be calculated or
overestimated. The transmission of the packet from A to B is composed
from the serialization latency of the packet which can be calculated
from the packet length of the packet and per-packet-bit speed of the
packet. The propagation latency through the link can be calculated from
speed of light and material (speed of light is 31% slower through fiber than
vacuum for example). And so on.</t>

<t>To have a guaranteed bounded latency through Q, an admission control
system is required that tracks, accounts and limits the total amount
of traffic through Q. Admission control mechanisms rely on knowing the
maximum amount of bursts that each traffic flow can cause and adding
up those bursts to determine the maximum amount of simultaneous packet data
in Q that therefore impacts the maximum latency of each individual packet
through Q.</t>

<t>With such an admission control system, one can therefore calculate
a maximum hop A/B propagation latency MAX for a packet, but 
packets will naturally have variable hop A/B latency lower than MAX,
based on differences in packet size and differences in competing
traffic. In result, their relative arrival times xB in B will be different
from their relative arrival times xA in A. This leads to so-called
"burst-aggregation" and hence the problem that the admission control
system can not easily calculate the maximum burst and latency
through Q in B as it can do for Q in A.</t>

<t>If however packets could be made to be forwarded such that
their Hop A/B latency would all be the same (synchronous, on-time), then the
admission control system could apply the same calculus to
B as it was able to apply to A. This is what damper mechanisms attempt to achieve.</t>

<figure title="Forwarding with Damper" anchor="FIG2"><artwork><![CDATA[
+------------------------+      +------------------------+ 
| Node A                 |      | Node B                 |
|   +-+   +-+   +-+      |      |   +-+   +-+   +-+      |
|-x-|D|-y-|F|---|Q|------|------|-x-|D|-y-|F|---|Q|------|
|   +-+   +-+   +-+      | Link |   +-+   +-+   +-+      |
+------------------------+      +------------------------+
        |<- A/B in-time latency ->|
        |<--A/B on-time latency ------->|
]]></artwork></figure>

<t><xref target="FIG2"/> shows the most simple to explain, but not implement, Damper
mechanism to achieve exactly this. Node A measures the time at
xA, sends this value in a packet header to B. B measures the
time directly at reception of the packet in xB. It then delays
the packet for a time (MAX-(xB-yA)). In result, the latency
(yB-yA) will exactly be MAX, up to the accuracy of the damper.</t>

<t>The first challenge with simple approach is the need to synchronize
the clocks between A and B, so that (xB-yA) can correctly be calculated.</t>

<figure title="Forwarding with Damper and measuring" anchor="FIG3"><artwork><![CDATA[
+------------------------+      +------------------------+ 
| Node A                 |      | Node B                 |
|   +-+   +-+   +-+      |      |   +-+   +-+   +-+      |
|-x-|D|-y-|F|---|Q|----z-|------|-x-|D|-y-|F|---|Q|----z-|
|   +-+   +-+   +-+      | Link |   +-+   +-+   +-+      |
+------------------------+      +------------------------+
        |<- A/B in-time latency ->|
        |<--A/B on-time latency ------->|
]]></artwork></figure>

<t><xref target="FIG3"/> shows how this can be resolved by also measuring the time
at z. A calculates d = (MAX1-(zA-yA)) and sends d in a header of the
packet to B. B then delays the packet in D by d relative to the also
locally measured time xB. Because the calculation of d in A and the
delay by d in D does not depend on clock synchronization between A
and B anymore, this approach eliminate the need for clock synchronization.</t>

<t>But in result of this change, the measurement of latency incurred by
transmitting the packet over link is also not included in this
approach.</t>

<t>MAX1 in this approach is the bounded latency for all processing of
a packet except for this link propagation latency P, equivalent to
the speed of light across the transmission medium times the length of the medium,
and MAX = MAX1 + P.</t>

<t>The serialization latencies latency across the sending interface
on A and the receiving interface on B can be included in MAX1 though.
It is only necessary for the measured timestamps zA and xB to
be the logically for the same point in time assuming the link had a minimum
length, e.g.: for a  back to back connection. For example, the reference
time is the time when the first bit of the packet can be observed
on the shortest wire between A an B. A can most likely measure zA only
some fixed offset o of time before r, hence needs to correct zA += o
before calculating d. Likewise, B could for example only measure xB
exactly after the whole packet arrived. this would be l * r later than
the reference time, where r is the serialization rate of the receiving
interface on B and l is the length of the packet. B would hence need
to adjust d -= l * r to subtract this time from the time the packet
needs to be delayed in D.</t>

<figure title="gLBF refined model" anchor="FIG4"><artwork><![CDATA[
+------------------------+      +------------------------+ 
| Node A                 |      | Node B                 |
| +-+    +-+   +-+   +-+ |      | +-+    +-+   +-+   +-+ |
|-|F|--x-|D|-y-|Q|-z-|M|-|------|-|F|--x-|D|-y-|Q|-z-|M|-|
| +-+    +-+   +-+   +-+ |      | +-+    +-+   +-+   +-+ |
+------------------------+      +------------------------+
       |<- Dampened Q ->|              |<- Dampened Q ->|
             |<- A/B in-time latency ->|
             |<--A/B on-time latency ------->|
]]></artwork></figure>

<t><xref target="FIG4"/> shows a further refined model for simpler implementation.
Larger routers/switches are typically modular, and forwarding
happens on a different modular component (such as a linecard)
than the queuing for the outgoing interface. Expecting clock
synchronization even within such a large device is undesirable.</t>

<t>In result, <xref target="FIG4"/> shows damper operation as occurring solely before
enqueuing packets into Q and after dequeuing them. The Damper
module measures the x timestamp, extracts d from the packet header,
adjusts it according to the above described considerations and then
delays the packet by that value and enqueues the packet afterwards. 
After the packet is dequeued, the Marking module measures the time
z, adjusts it according to the previously described considerations
calculates the value of d and overwrites the packet header before
sending the packet.</t>

</section>
<section anchor="dampers-and-controller-plane"><name>Dampers and controller-plane</name>

<figure title="Path selection and gLBF example" anchor="FIG5"><artwork><![CDATA[
         Controller-plane:
        Path Control  and
         Admission Control
      ..     .      .      ..
     .       .       .       . 
   +---+   +---+   +---+   +---+  Src---| A |---| B |---| C |---| D |
   +---+   +---+   +---+   +---+
     |       |       |       |
   +---+   +---+   +---+   +---+
   | E |---| F |---| G |---| H |--- Dst
   +---+   +---+   +---+   +---+
]]></artwork></figure>

<t>While the damper mechanism described so far can be realized with different
queuing mechanisms and hence different calculus for every interface
for which bounded latency can be supported, the role of the controller
plane involves other components beside admission control, and those
need to be possible to tightly be coupled with admission control for
efficient use of resources.</t>

<t><xref target="FIG5"/> shows the most common problem. The controller-plane needs to
provide for a new traffic flow from Src to Dst a path through the
network and reserve the resources. The most simple form for just bandwidth
reservation is called Constrained Shortest Path First (CSPF). With the
need to also provide end-to-end latency guarantees in support of bounded
latency, not only does the path calculation becomes more complex, but
many per-hop bounded latency queuing mechanisms support also to select
more than one per-hop latency on the hop, and the controller-plane
needs to determine for each hop of a possible hop, which one is best.</t>

<t>In result, the controller-plane needs to know exactly what parameters
the bounded latency queuing mechanism on each hop/interface can have
to perform these operations, and standardization of these parameters
ultimately results in standardizing the bounded latency queuing mechanism -
and not only the damper part.</t>

</section>
</section>
<section anchor="glbf-spec"><name>gLBF specification (normative)</name>

<section anchor="damper-with-ubs-queuingcalculus"><name>Damper with UBS queuing/calculus</name>

<t>guaranteed Latency Based Forwarding (gLBF) is using the queuing model
of Urgency Based Scheduling (UBS), which is also used in TSN
Asynchronus Traffic Shaping (TSN-ATS).  This allows gLBF to
re-use or co-develop one and the same controller-plane and its
optimization algorithms for bandwidth and latency control for
TSN-ATS or a DetNet L3 equivalent thereof and gLBF. Hence, gLBF
should provide the most easily operationalised on-time solution
for networks that want to evolve from an in-time model via TSN-ATS,
or that even would want to operate both options in parallel.</t>

<t>Effectively, gLBF replaces the per-flow interleaves regulators of UBS
with per-flow stateless damper operations. Where UBS only provides
for in-time latency guarantees, gLBF provides in result in-time
latency service, but with fundamentally the same calculus as UBS.</t>

<figure title="Path selection and gLBF example" anchor="FIG6"><artwork><![CDATA[
   +-----------------------------------------------+
   | UBS strict priority Queuing block             |
   |                                               |
   |               +--------------+   +----------+ |
   | +-------+   /-| Prio 1 queue |---|          | |
   | | Packet|  /  +--------------+   | Strict   | |
-->| | Prio  |->         ...         -| Priority | |--->
   | | enque |  \  +--------------+   | Schedule | |
   | +-------+   \-| Prio 8 queue |---|          | |
   |               +--------------+   +----------+ |
   +-----------------------------------------------+
]]></artwork></figure>

<t>Strict Priority Scheduling removes packets always from the
highest priority queue (1 is highest) that has a pending packet
and forward it. UBS defines two options for the traffic model
traffic flows. The more flexible one defines that each flow
specifies a rate r and a maximum burst size b (in bits).</t>

<t>In result, the bounded latency of a packet in priority 1 is (roughly)
the latency required to serialize the sum of the bursts 
of all the flows admitted into priority 1. The bounded latency of a packet
in priority 2 is that priority latency plus the latency required
to serialize the sum of the bursts of all the flows admitted into
priority 2. And so on.</t>

</section>
<section anchor="glbf-processing"><name>gLBF processing</name>

<t>The following text extends/refines the damper processing as necessary
for gLBF.</t>

<figure title="refined gLBF processing diagram" anchor="FIG7"><artwork><![CDATA[
   +------------------------+       +------------------------+ 
   | Node A                 |       | Node B                 |
   | +-+    +-+   +-+   +-+ |       | +-+    +-+   +-+   +-+ |
 --|-|F|--x-|D|-y-|Q|-z-|M|-|-------|-|F|--x-|D|-y-|Q|-z-|M|-|--->
IIF| +-+    +-+   +-+   +-+ |OIF IIF| +-+    +-+   +-+   +-+ |OIF
   +------------------------+       +------------------------+
          |<- Dampened Q ->|               |<- Dampened Q ->|
                |<- A/B in-time latency -->|
                |<--A/B on-time latency -------->|
]]></artwork></figure>

<t>The Delay module retrieves the delay from a packet header fields,
requirements for that packet header field are defined in <xref target="DM"/>.</t>

<t>Because serialization speeds on the Incoming InterFace (IIF) will be different
for different IIF, and because D will likely need to compensate the measured
time x based on the packet length and serialization speed, an internal
packet header should maintain this information. Note that this is solely
an implementation consideration and should not impact the configuration model
of gLBF.</t>

<t>The Queuing module is logically as described in UBS, except that
the priority of a packet in gLBF is not selected based on per-flow state,
but instead an appropriate packet header field of the packet is looked
up in the Packet Prio Enque stage of Q and the packet accordingly
enqueued based on that fields value. Possible options for indicating
such a priority in a packet header field are defined below in <xref target="DM"/>.</t>

<t>Like Q, M also needs to look up the packet priority to know MAX1 for
the packet and hence calculate d that it rewrites in the packet header.</t>

<t>The overall configuration data model to be defined for gLBF is hence
the configuration data model for UBS, which is a set of priority queues
and their maximum size, and in addition for gLBF for each of these
queues a controller-plane calculated MAX maximum latency value to be used
by M.</t>

<t>Given how the node knows the serialization speed of OIF, MAX1 for each of
the queues could automatically be derived from the maximum length in bytes
for each of the UBS priority queues, but this may not provide enough
flexibility for fine-tuning (TBD), especially when packet downgrade as
describe below is used.</t>

<t>TBD: paint a small yang-like data model, even though its trivial, like in the TCQF draft.
This should primarily include additional diagnostic data model elements,
such as maximum occupancy of any of the priority queus and number of overruns.</t>

</section>
<section anchor="error-handling"><name>Error handling</name>

<t>A well specified standard for a damper mechanism such as described in
this document needs to take care of error cases as well. The prime error
condition is, when the sending node A of a gLBF packet recognizes that
the packet was enqueued for longer than MAX1 and hence the to-be-calculated
delay to be put into the packet would have to be &lt; 0.</t>

<t>In this case, error signaling, such as ICMPv6/ICMP needs to be triggered
(throttled !), and the packet be discarded - to avoid failure of admission
control / congestion further down the path for other packets as well.</t>

<t>The data model (below) describes an optional data model that allows
instead of discarding of the packet to signal an ECN like mechanism together
with lower-priority forwarding of such packet to inform the receiver directly
about the problem and allow the application to deal with such conditions
better than through other error signaling.</t>

</section>
<section anchor="DM"><name>Data Model for gLBF packet metadata</name>

<t>gLBF is specifically designated to support per-hop, per-flow stateless
operations because it does not require any per-flow, but only per-packet
metadata for its processing. While it is possible to</t>

<section anchor="damper-24-bit-value-unit-1-usec"><name>damper:  24 bit value, unit 1 usec.</name>

<t>This is a value potentially different for every packet in a flow
and it is rewritten by every gLBF forwarder along the path.</t>

<t>gLBF requires a packet header indicating the delay that the damper
on the next hop needs to apply to the packet. Dampening only needs
to be accurate to the extent that synchronous delivery needs to be
accurate. A unit of 1 usec is considered today to be sufficient for
all purposes. The maximum size of delay is the maximum per-hop
queuing latency. 65 msec is considered to be much more than ever
desirable. Therefore, a 16 bit header field is sufficient.</t>

<t>Note that link propagation latency does not impact delay. Hence
the size of delay does not create any constraint on the length of links.</t>

</section>
<section anchor="end-to-end-priority-3-bits"><name>end-to-end-priority: 3 bits</name>

<t>This is a field that needs to be the same for all packets of
a flow so that they will be forwarded with the same latency
processing and hence do not incur different latencies and therefore
possible reordering. This field is written when the packet
enters the gLBF path and only read.</t>

<t>8 Priorities and hence 8 different latencies per hop are considered
sufficient on a per-hop basis. If prio is an end-to-end packet header 
field such as by using 8 different DSCP in IPv6/IP, this results in
8 different latency traffic classes.</t>

</section>
<section anchor="hop-by-hop-priority-3-bits-per-hop"><name>hop-by-hop-priority: 3 bits (per hop)</name>

<t>This is a better, more advanced alternative to the end-to-end-priority.
This data is optional. If it is present for a particular hop, then
it supersedes the end-to-end-priority.</t>

<t>Because this data is per-hop, it should not be encoded in an
end-to-end part of the packet header, but into a hop-by-hop part of the
header:</t>

<t>Because DetNet traffic needs the resources of each flow to be controlled,
re-routing of DetNet flows without the controller-plane is highly
undesirable and could easily result in congestion. A per-hop,
per-flow stateless forwarding mechanism such as SR-MPLS or SRv6 is
therefore highly desirable to provide a per-hop steering field. The priority
could easily be part of such a per-hop steering field by allocating
dynamically, or on-demand up to 8 different SID (Segment IDentifiers),
such as up to 8 MPLS labels, or using 3 bits of the parameter field
of IPv6 SIDs.</t>

<t>When such per-hop priority is indicated, the controller-plane can
support much more than 8 end-to-end latencies, simply by using different
per-hop latencies. For example one flow may use priority 1-1-1-1-1
across four hops, the new slower flow may use 1-2-1-2 across 4 hops,
the next one may use 2-2-2-2, and so on.</t>

</section>
<section anchor="phop-prio-3-bits"><name>phop-prio: 3 bits</name>

<t>This field is re-written on every hop when hop-by-hop-priorities are used.</t>

<t>This is an optional field which may be beneficial in and end-to-end
header if hop-by-hop priorities are used for forwarding in gLBF
and the hop-by-hop-priority of the packet on the prior hop is not
available from the hop-by-hop packet header anymore. This is typically
the case in MPLS based forwarding, such as SR-MPLS because this information
would have been removed. Note that this header field is only required
in support of optional simplified high-speed forwarding implementation
options.</t>

</section>
<section anchor="error-handling-data-items"><name>Error handling data items</name>

<t>Di: one bit</t>

<t>Downgrade intent. This bit is set when the packet enters the gLBF
domain and never changed.</t>

<t>Ds: one bit</t>

<t>Downgrade status. This bit is set to 0 when the packet enters the
gLBF domain and potentially changed to 1 by one gLBF forwarder
as described in the following.</t>

<t>When the Di bit is not set, and a gLBF forwarder recognizes that the
packet can not be forwarded within its guaranteed latency, the packet
is discarded and forwarding plane specific error signaling is triggered
(such as IGMP/ICMPv6). Discarding is done to avoid causing latency
errors further down the path because of this packet.</t>

<t>When this bit is set, the packet will not be discarded, but instead
the Ds bit is set to indicate that the packet must not be forwarded
with gLBF guaranteed latency anymore, but only with best or even
lower-than-best effort.</t>

<t>Di and DS may be encoded into the two ECN bits for IP/IPv6 dataplanes.
The required behavior should be backward compatible with existing
ECN implementations should the packet unexpected pass a router that
processes the packet not as gLBF.</t>

</section>
<section anchor="accuracy-and-sizing-of-the-damper-field-considerations"><name>Accuracy and sizing of the damper field considerations</name>

<t>This memo recommends that the damper field in packet headers has
a size of 24 bits or larger and represents the dampening time with
a resolution of 1 nsec. The following text explains the reasoning
for this recommendation.</t>

<t>The accuracy needed for the damper value in the packet header as well
as the internal calculations performed for gLBF depends on a variety of
factors. The most important factor is the accuracy of the provided
bounded latency as desired/required by the applications.</t>

<t>Even though Ethernet is defined as an asynchronous medium, the
clock accuracy is required to be +- 100 ppm (part per million). For a
1500 byte packet across a 100 Mbps Ethernet the propagation
latency difference between fastest and slowest clock is 24 nsec.
If gLBF is to be supported also on such slower speed networks with
multiple hops, then these errors may add up (?), and it is likely
not possible to provide end-to-end propagation latency accuracy
much better than 1 usec without requiring more transmission
accuracy through mechanisms such as PTP - which gLBF attempts
to avoid/minimize. For higher speed links, errors in short term
propagation latency variation becomes irrelevant though.</t>

<t>In WAN network deployments, propagation latency is in the order of
msec such as ca. 1 msec for 250 Km of fiber. Serialization latency
on a 1gbps Ethernet is ca. 1 usec for a 128 byte packet. It is
likely that an accuracy of propagation latency in the order of
1 usec is sufficient when the round-trip-time is potentially
1000 times faster.</t>

<t>In result of these two simple data points, we consider that the
accuracy of end-to-end propagation latency of interest is 1 usec.
To avoid introducing additive errors, the resolution
of the damper value needs to be higher. This memo therefore
considers to use 1 nsec resolution to represent damper values.
This too is the value used in PTP.</t>

<t>The maximum value and hence the size of the damper field in
packets depends on the maximum latency introduced in
buffering on the sending node plus smaller factors such
as serialization latency. This maximum is primarily depending
on the slowest links to be supported. A 128 byte packet
on a 100 Mbps link has ca. 10 usec propagation latency.
With just 16 bit damper value with nsec accuracy this would
allow only 6 packet buffers. This may be too low. Hence
the damper field should at minimum be at least 24 bits.</t>

</section>
</section>
<section anchor="ingress-and-egress-processing"><name>Ingress and Egress processing</name>

<section anchor="network-ingress-edge-policing"><name>Network ingress edge policing</name>

<t>When packets enter a gLBF domain from a prior hop,
such as a node from a different domain or a sending host, and that
prior hop is sending gLBF packet markings, then the timing
of the packet arrival as well as the markings in packet header(s) for
gLBF MUST only be observed when that prior hop is trusted by the gLBF domain</t>

<t>If the prior hop can not be trusted for correct marking and/or timing of
the packets, the first-hop gLBF node in the gLBF domain MUST implement
a per-flow policer for the flow to avoid that packets from such a prior hop will cause
problems with gLBF guarantees in the gLBF domain.</t>

<t>A policer is to be placed logically after the damper module of gLBF and 
before the queuing module.</t>

<t>Instead of a policer, the ingress edge node of the gLBF domain MAY instead
use a per-flow shaper or interleaved regulator. When a prior hop sends
for example packets of a flow with too high a rate, a shaper would
attempt to avoid discard packets from such a flow until also the burst size
of the flow is exceeded, by further delaying them. A policer would immediately
discard any packets that does not meet their flows envelope.</t>

</section>
<section anchor="glbf-sender-types"><name>gLBF sender types</name>

<section anchor="simple-glbf-senders"><name>Simple gLBF senders</name>

<t>Senders are expected to send their traffic flows such that their
relative timing complies to the admitted traffic envelope. Senders
that for example only send one flow, such as simple sensors or
actors, typically will be able to do this.</t>

<t>When senders can actually do this (send packets for gLBF with the
right timing), then these packets do not need to have gLBF packet header elements.
Instead, this ingress network node can calculate the damper time locally from
the following consideration to avoid any need for gLBF processing
in the sender.</t>

<t>The maximum gLBF damper time in this case is the serialization time of the largest packet
for gLBF received from the sender. Thus, when the sender sends smaller
packets than the maximum admitted packet size, then the first hop network
node needs to dampen packets based on that difference in serialization time.</t>

</section>
<section anchor="normal-glbf-senders"><name>Normal gLBF senders</name>

<t>When senders can not fully comply to send packets with their
admitted envelope, then they need to implement gLBF and indicate in the packet header the
gLBF damper value. For example, when the sender can not ensure that
at the target sending time of a gLBF packet the outgoing interface is
free, then that other still serializing packet will impact the timing
of the following packet(s) for gLBF. Another reason is when the sender has to send
packets from multiple flows and those can not or are are not generated in a coordinated
fashion to avoid delay, then they could compete on the outgoing interface
of the sender, introducing delay.</t>

<t>Normal gLBF senders simply need to implement the queue and marking stage
of gLBF, but not the dampening stage, because that only applies to receivers/forwarders.</t>

</section>
<section anchor="non-glbf-senders"><name>Non gLBF senders</name>

<t>When senders can not be simple gLBF senders but can also not
implement the gLBF queuing and marking stage, then the following
first hop node of the gLBF domain needs to treat them like untrusted
prior hop but always use a shaper or interleaved regulator so as not
to discard their packets.</t>

</section>
</section>
<section anchor="receivers-and-glbf"><name>receivers and gLBF</name>

<section anchor="normal-glbf-receivers"><name>Normal gLBF receivers</name>

<t>Normal gLBF receivers can process packet gLBF markings and need to 
therefore implement the gLBF dampening block.</t>

</section>
<section anchor="glbf-incapable-receivers"><name>gLBF incapable receivers</name>

<t>When receivers can not implement the gLBF dampening stage, then
the worst-case burst that may arrive at the receiver is to be
counted as added jitter to the end-to-end service.</t>

<t>It is impossible to let the network eliminate such bursts without
additional coordination and gating of packets across all senders
and their network ingress nodes by gating of those packets. This is
not a gLBF specific issue, but simply a limitation of the (near)
synchronous service model offered by gLBF and equally exists
in any delay and latency model with this type of service:</t>

<t>Consider a set of N senders conspire to generate a burst at the
same receiver. They do know from the admission control model the
latency each of them has to that receiver and can thus time the generation
of packets such that the last-hop router would have to send all those
N packets (one from each sender) in parallel on the interface. Which
is obviously not possible.</t>

<t>With gLBF capable receivers, this possible burst is taken into account
by including the latency introduced by such a worst-case burst into the
end-to-end latency through the controller-plane, and indicating the actual
latency that the packet needs to be dampened in the gLBF header field to the receiver.
But when the receiver does not support such dampening, then that
maximum last-hop burst-size simply turns into possible jitter.</t>

</section>
</section>
<section anchor="further-considerations"><name>Further considerations</name>

<t>A host may be a different type of gLBF sender than it is gLBF receiver.
In a common case in cloud applications, a container or VM in a data center
may the a sender/receiver, and such an application may be considered
to be trusted by the gLBF domain if it is an application of the network
operator itself (such as part of a higher level service of the network operator),
but not when it is a customer application.</t>

<t>gLBF marking needs to happen after contention of packets from all applications,
so it is something that can considered to happen inside the operating system.
This operating system of such a host may not (yet) implement gLBF, so
it may not be possible to correctly generate the gLBF marking as a sender.
Instead, the application may generate the appropriate packet markings for
steering and gLBF, but may need to leave the damper marking incorrect.</t>

<t>On the other hand, dampening received gLBF packets on a receiver can happen at the
application level, so that the operating system does not need to do it. Such
dampening is exactly the same functionality that in applications is normally
called "playout buffering", except that it will be a much smaller amount of
delay time because playout buffering needs to take the whole path delay into
account, whereas gLBF dampening is only for the prior hop.</t>

</section>
<section anchor="summary-1"><name>Summary</name>

<t>There is a non-trivial set of options for ingress/egress processing
that could be beneficial to simplify and secure dealing with different
type of sender and receivers.</t>

<t>Later versions of this memo can attempt
to define specific profiles of edge behavior to limit the recommended
set of implememtation options for sender/receivers and gLBF edge nodes.</t>

</section>
</section>
</section>
<section anchor="controller-plane-considerations-informative"><name>Controller-plane considerations (informative)</name>

<section anchor="glbf-versus-ubs-tsn-ats"><name>gLBF versus UBS / TSN-ATS</name>

<t>By relying on <xref target="UBS"/> for both the traffic model as well as the
bounded latency calculus, gLBF should be easy to operationalize
by relying on controller-plane implementations for TSN-ATS: UBS/TSN-ATS
and gLBF provide the same bounded latency and use the same model
to manage bandwidth for different flows: By calculating which
flow needs to go on which hop into which priority queues.</t>

<t>The main change to a UBS/TSN-ATS controller-plane when using gLBF
is that when a flow is to be admitted into the network, removed,
or rerouted. In UBS, each of these operations imply that the
controller-plane needs to signal to each node along the path
the traffic flow parameters so the forwarding plane can establish
the per-hop,per-flow state for the flow. Depending on network
configuration this will also imply configuration of the next-hop
for the flow for the routing.</t>

<t>For gLBF hop-by-hop operations, the first hop needs to receive
the per-path or per-hop priority information that is then imposed
into an appropriate packet header for the flows packets.</t>

</section>
<section anchor="first-hop-policing"><name>first-hop policing</name>

<t>In gLBF, the controller-plane has to perform this action only against
the ingress node to the gLBF domain. The traffic parameters such as
rate and burst size are only relevant to establish a policer so
that the flow can not violate the admitted traffic parameters for
the flow. This "policing" on the first hop is actually a function
independent of gLBF, UBS or any other method used across the path.</t>

</section>
<section anchor="path-steering"><name>path steering</name>

<t>gLBF operated independently of the path steering mechanism, but
the controller-plane will very likely want to ensure that gLBF
(or for that matter any DetNet) traffic does not unexpectedly gets
rerouted by in-networking routing mechanisms because normally
it will or can not reserve resources for such re-routed flows
on such arbitrary failure paths without significant additional
effort and/or waste of resources.</t>

</section>
</section>
<section anchor="iana-considerations"><name>IANA considerations</name>

<t>None yet.</t>

</section>
<section anchor="changelog"><name>Changelog</name>

<t>[RFC-editor: please remove]</t>

<t>00 Initial version.</t>

<t>01 Added use cases from  Stefan</t>

<t>02 refresh only, waiting for progress in WG discussion</t>

<t>03 refresh, affiliation change of co-author</t>

<t>04 refresh, still waiting for more discuss in detnet</t>

<t>05 refresh, still waiting for more discuss in detnet</t>

<t>06 added Solution Scope, Taxonomy and Status for DetNet adoption considerations</t>

<t>07 Fixed author address (hommes)</t>

</section>


  </middle>

  <back>


    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC2210">
  <front>
    <title>The Use of RSVP with IETF Integrated Services</title>
    <author fullname="J. Wroclawski" initials="J." surname="Wroclawski"/>
    <date month="September" year="1997"/>
    <abstract>
      <t>This note describes the use of the RSVP resource reservation protocol with the Controlled-Load and Guaranteed QoS control services. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2210"/>
  <seriesInfo name="DOI" value="10.17487/RFC2210"/>
</reference>

<reference anchor="RFC2212">
  <front>
    <title>Specification of Guaranteed Quality of Service</title>
    <author fullname="S. Shenker" initials="S." surname="Shenker"/>
    <author fullname="C. Partridge" initials="C." surname="Partridge"/>
    <author fullname="R. Guerin" initials="R." surname="Guerin"/>
    <date month="September" year="1997"/>
    <abstract>
      <t>This memo describes the network element behavior required to deliver a guaranteed service (guaranteed delay and bandwidth) in the Internet. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2212"/>
  <seriesInfo name="DOI" value="10.17487/RFC2212"/>
</reference>

<reference anchor="RFC2474">
  <front>
    <title>Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers</title>
    <author fullname="K. Nichols" initials="K." surname="Nichols"/>
    <author fullname="S. Blake" initials="S." surname="Blake"/>
    <author fullname="F. Baker" initials="F." surname="Baker"/>
    <author fullname="D. Black" initials="D." surname="Black"/>
    <date month="December" year="1998"/>
    <abstract>
      <t>This document defines the IP header field, called the DS (for differentiated services) field. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2474"/>
  <seriesInfo name="DOI" value="10.17487/RFC2474"/>
</reference>

<reference anchor="RFC3270">
  <front>
    <title>Multi-Protocol Label Switching (MPLS) Support of Differentiated Services</title>
    <author fullname="F. Le Faucheur" initials="F." role="editor" surname="Le Faucheur"/>
    <author fullname="L. Wu" initials="L." surname="Wu"/>
    <author fullname="B. Davie" initials="B." surname="Davie"/>
    <author fullname="S. Davari" initials="S." surname="Davari"/>
    <author fullname="P. Vaananen" initials="P." surname="Vaananen"/>
    <author fullname="R. Krishnan" initials="R." surname="Krishnan"/>
    <author fullname="P. Cheval" initials="P." surname="Cheval"/>
    <author fullname="J. Heinanen" initials="J." surname="Heinanen"/>
    <date month="May" year="2002"/>
    <abstract>
      <t>This document defines a flexible solution for support of Differentiated Services (Diff-Serv) over Multi-Protocol Label Switching (MPLS) networks. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3270"/>
  <seriesInfo name="DOI" value="10.17487/RFC3270"/>
</reference>

<reference anchor="RFC8655">
  <front>
    <title>Deterministic Networking Architecture</title>
    <author fullname="N. Finn" initials="N." surname="Finn"/>
    <author fullname="P. Thubert" initials="P." surname="Thubert"/>
    <author fullname="B. Varga" initials="B." surname="Varga"/>
    <author fullname="J. Farkas" initials="J." surname="Farkas"/>
    <date month="October" year="2019"/>
    <abstract>
      <t>This document provides the overall architecture for Deterministic Networking (DetNet), which provides a capability to carry specified unicast or multicast data flows for real-time applications with extremely low data loss rates and bounded latency within a network domain. Techniques used include 1) reserving data-plane resources for individual (or aggregated) DetNet flows in some or all of the intermediate nodes along the path of the flow, 2) providing explicit routes for DetNet flows that do not immediately change with the network topology, and 3) distributing data from DetNet flow packets over time and/or space to ensure delivery of each packet's data in spite of the loss of a path. DetNet operates at the IP layer and delivers service over lower-layer technologies such as MPLS and Time- Sensitive Networking (TSN) as defined by IEEE 802.1.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8655"/>
  <seriesInfo name="DOI" value="10.17487/RFC8655"/>
</reference>

<reference anchor="RFC8200">
  <front>
    <title>Internet Protocol, Version 6 (IPv6) Specification</title>
    <author fullname="S. Deering" initials="S." surname="Deering"/>
    <author fullname="R. Hinden" initials="R." surname="Hinden"/>
    <date month="July" year="2017"/>
    <abstract>
      <t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="86"/>
  <seriesInfo name="RFC" value="8200"/>
  <seriesInfo name="DOI" value="10.17487/RFC8200"/>
</reference>

<reference anchor="RFC8964">
  <front>
    <title>Deterministic Networking (DetNet) Data Plane: MPLS</title>
    <author fullname="B. Varga" initials="B." role="editor" surname="Varga"/>
    <author fullname="J. Farkas" initials="J." surname="Farkas"/>
    <author fullname="L. Berger" initials="L." surname="Berger"/>
    <author fullname="A. Malis" initials="A." surname="Malis"/>
    <author fullname="S. Bryant" initials="S." surname="Bryant"/>
    <author fullname="J. Korhonen" initials="J." surname="Korhonen"/>
    <date month="January" year="2021"/>
    <abstract>
      <t>This document specifies the Deterministic Networking (DetNet) data plane when operating over an MPLS Packet Switched Network. It leverages existing pseudowire (PW) encapsulations and MPLS Traffic Engineering (MPLS-TE) encapsulations and mechanisms. This document builds on the DetNet architecture and data plane framework.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8964"/>
  <seriesInfo name="DOI" value="10.17487/RFC8964"/>
</reference>




    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC3209">
  <front>
    <title>RSVP-TE: Extensions to RSVP for LSP Tunnels</title>
    <author fullname="D. Awduche" initials="D." surname="Awduche"/>
    <author fullname="L. Berger" initials="L." surname="Berger"/>
    <author fullname="D. Gan" initials="D." surname="Gan"/>
    <author fullname="T. Li" initials="T." surname="Li"/>
    <author fullname="V. Srinivasan" initials="V." surname="Srinivasan"/>
    <author fullname="G. Swallow" initials="G." surname="Swallow"/>
    <date month="December" year="2001"/>
    <abstract>
      <t>This document describes the use of RSVP (Resource Reservation Protocol), including all the necessary extensions, to establish label-switched paths (LSPs) in MPLS (Multi-Protocol Label Switching). Since the flow along an LSP is completely identified by the label applied at the ingress node of the path, these paths may be treated as tunnels. A key application of LSP tunnels is traffic engineering with MPLS as specified in RFC 2702. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3209"/>
  <seriesInfo name="DOI" value="10.17487/RFC3209"/>
</reference>

<reference anchor="RFC4875">
  <front>
    <title>Extensions to Resource Reservation Protocol - Traffic Engineering (RSVP-TE) for Point-to-Multipoint TE Label Switched Paths (LSPs)</title>
    <author fullname="R. Aggarwal" initials="R." role="editor" surname="Aggarwal"/>
    <author fullname="D. Papadimitriou" initials="D." role="editor" surname="Papadimitriou"/>
    <author fullname="S. Yasukawa" initials="S." role="editor" surname="Yasukawa"/>
    <date month="May" year="2007"/>
    <abstract>
      <t>This document describes extensions to Resource Reservation Protocol - Traffic Engineering (RSVP-TE) for the set up of Traffic Engineered (TE) point-to-multipoint (P2MP) Label Switched Paths (LSPs) in Multi- Protocol Label Switching (MPLS) and Generalized MPLS (GMPLS) networks. The solution relies on RSVP-TE without requiring a multicast routing protocol in the Service Provider core. Protocol elements and procedures for this solution are described.</t>
      <t>There can be various applications for P2MP TE LSPs such as IP multicast. Specification of how such applications will use a P2MP TE LSP is outside the scope of this document. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4875"/>
  <seriesInfo name="DOI" value="10.17487/RFC4875"/>
</reference>

<reference anchor="RFC8296">
  <front>
    <title>Encapsulation for Bit Index Explicit Replication (BIER) in MPLS and Non-MPLS Networks</title>
    <author fullname="IJ. Wijnands" initials="IJ." role="editor" surname="Wijnands"/>
    <author fullname="E. Rosen" initials="E." role="editor" surname="Rosen"/>
    <author fullname="A. Dolganow" initials="A." surname="Dolganow"/>
    <author fullname="J. Tantsura" initials="J." surname="Tantsura"/>
    <author fullname="S. Aldrin" initials="S." surname="Aldrin"/>
    <author fullname="I. Meilik" initials="I." surname="Meilik"/>
    <date month="January" year="2018"/>
    <abstract>
      <t>Bit Index Explicit Replication (BIER) is an architecture that provides optimal multicast forwarding through a "multicast domain", without requiring intermediate routers to maintain any per-flow state or to engage in an explicit tree-building protocol. When a multicast data packet enters the domain, the ingress router determines the set of egress routers to which the packet needs to be sent. The ingress router then encapsulates the packet in a BIER header. The BIER header contains a bit string in which each bit represents exactly one egress router in the domain; to forward the packet to a given set of egress routers, the bits corresponding to those routers are set in the BIER header. The details of the encapsulation depend on the type of network used to realize the multicast domain. This document specifies a BIER encapsulation that can be used in an MPLS network or, with slight differences, in a non-MPLS network.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8296"/>
  <seriesInfo name="DOI" value="10.17487/RFC8296"/>
</reference>

<reference anchor="RFC8402">
  <front>
    <title>Segment Routing Architecture</title>
    <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
    <author fullname="S. Previdi" initials="S." role="editor" surname="Previdi"/>
    <author fullname="L. Ginsberg" initials="L." surname="Ginsberg"/>
    <author fullname="B. Decraene" initials="B." surname="Decraene"/>
    <author fullname="S. Litkowski" initials="S." surname="Litkowski"/>
    <author fullname="R. Shakir" initials="R." surname="Shakir"/>
    <date month="July" year="2018"/>
    <abstract>
      <t>Segment Routing (SR) leverages the source routing paradigm. A node steers a packet through an ordered list of instructions, called "segments". A segment can represent any instruction, topological or service based. A segment can have a semantic local to an SR node or global within an SR domain. SR provides a mechanism that allows a flow to be restricted to a specific topological path, while maintaining per-flow state only at the ingress node(s) to the SR domain.</t>
      <t>SR can be directly applied to the MPLS architecture with no change to the forwarding plane. A segment is encoded as an MPLS label. An ordered list of segments is encoded as a stack of labels. The segment to process is on the top of the stack. Upon completion of a segment, the related label is popped from the stack.</t>
      <t>SR can be applied to the IPv6 architecture, with a new type of routing header. A segment is encoded as an IPv6 address. An ordered list of segments is encoded as an ordered list of IPv6 addresses in the routing header. The active segment is indicated by the Destination Address (DA) of the packet. The next active segment is indicated by a pointer in the new routing header.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8402"/>
  <seriesInfo name="DOI" value="10.17487/RFC8402"/>
</reference>

<reference anchor="RFC8754">
  <front>
    <title>IPv6 Segment Routing Header (SRH)</title>
    <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
    <author fullname="D. Dukes" initials="D." role="editor" surname="Dukes"/>
    <author fullname="S. Previdi" initials="S." surname="Previdi"/>
    <author fullname="J. Leddy" initials="J." surname="Leddy"/>
    <author fullname="S. Matsushima" initials="S." surname="Matsushima"/>
    <author fullname="D. Voyer" initials="D." surname="Voyer"/>
    <date month="March" year="2020"/>
    <abstract>
      <t>Segment Routing can be applied to the IPv6 data plane using a new type of Routing Extension Header called the Segment Routing Header (SRH). This document describes the SRH and how it is used by nodes that are Segment Routing (SR) capable.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8754"/>
  <seriesInfo name="DOI" value="10.17487/RFC8754"/>
</reference>

<reference anchor="RFC8938">
  <front>
    <title>Deterministic Networking (DetNet) Data Plane Framework</title>
    <author fullname="B. Varga" initials="B." role="editor" surname="Varga"/>
    <author fullname="J. Farkas" initials="J." surname="Farkas"/>
    <author fullname="L. Berger" initials="L." surname="Berger"/>
    <author fullname="A. Malis" initials="A." surname="Malis"/>
    <author fullname="S. Bryant" initials="S." surname="Bryant"/>
    <date month="November" year="2020"/>
    <abstract>
      <t>This document provides an overall framework for the Deterministic Networking (DetNet) data plane. It covers concepts and considerations that are generally common to any DetNet data plane specification. It describes related Controller Plane considerations as well.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8938"/>
  <seriesInfo name="DOI" value="10.17487/RFC8938"/>
</reference>

<reference anchor="RFC8986">
  <front>
    <title>Segment Routing over IPv6 (SRv6) Network Programming</title>
    <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
    <author fullname="P. Camarillo" initials="P." role="editor" surname="Camarillo"/>
    <author fullname="J. Leddy" initials="J." surname="Leddy"/>
    <author fullname="D. Voyer" initials="D." surname="Voyer"/>
    <author fullname="S. Matsushima" initials="S." surname="Matsushima"/>
    <author fullname="Z. Li" initials="Z." surname="Li"/>
    <date month="February" year="2021"/>
    <abstract>
      <t>The Segment Routing over IPv6 (SRv6) Network Programming framework enables a network operator or an application to specify a packet processing program by encoding a sequence of instructions in the IPv6 packet header.</t>
      <t>Each instruction is implemented on one or several nodes in the network and identified by an SRv6 Segment Identifier in the packet.</t>
      <t>This document defines the SRv6 Network Programming concept and specifies the base set of SRv6 behaviors that enables the creation of interoperable overlays with underlay optimization.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8986"/>
  <seriesInfo name="DOI" value="10.17487/RFC8986"/>
</reference>

<reference anchor="RFC9016">
  <front>
    <title>Flow and Service Information Model for Deterministic Networking (DetNet)</title>
    <author fullname="B. Varga" initials="B." surname="Varga"/>
    <author fullname="J. Farkas" initials="J." surname="Farkas"/>
    <author fullname="R. Cummings" initials="R." surname="Cummings"/>
    <author fullname="Y. Jiang" initials="Y." surname="Jiang"/>
    <author fullname="D. Fedyk" initials="D." surname="Fedyk"/>
    <date month="March" year="2021"/>
    <abstract>
      <t>This document describes the flow and service information model for Deterministic Networking (DetNet). These models are defined for IP and MPLS DetNet data planes.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9016"/>
  <seriesInfo name="DOI" value="10.17487/RFC9016"/>
</reference>

<reference anchor="RFC9262">
  <front>
    <title>Tree Engineering for Bit Index Explicit Replication (BIER-TE)</title>
    <author fullname="T. Eckert" initials="T." role="editor" surname="Eckert"/>
    <author fullname="M. Menth" initials="M." surname="Menth"/>
    <author fullname="G. Cauchie" initials="G." surname="Cauchie"/>
    <date month="October" year="2022"/>
    <abstract>
      <t>This memo describes per-packet stateless strict and loose path steered replication and forwarding for "Bit Index Explicit Replication" (BIER) packets (RFC 8279); it is called "Tree Engineering for Bit Index Explicit Replication" (BIER-TE) and is intended to be used as the path steering mechanism for Traffic Engineering with BIER.</t>
      <t>BIER-TE introduces a new semantic for "bit positions" (BPs). These BPs indicate adjacencies of the network topology, as opposed to (non-TE) BIER in which BPs indicate "Bit-Forwarding Egress Routers" (BFERs). A BIER-TE "packets BitString" therefore indicates the edges of the (loop-free) tree across which the packets are forwarded by BIER-TE. BIER-TE can leverage BIER forwarding engines with little changes. Co-existence of BIER and BIER-TE forwarding in the same domain is possible -- for example, by using separate BIER "subdomains" (SDs). Except for the optional routed adjacencies, BIER-TE does not require a BIER routing underlay and can therefore operate without depending on a routing protocol such as the "Interior Gateway Protocol" (IGP).</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9262"/>
  <seriesInfo name="DOI" value="10.17487/RFC9262"/>
</reference>

<reference anchor="RFC9320">
  <front>
    <title>Deterministic Networking (DetNet) Bounded Latency</title>
    <author fullname="N. Finn" initials="N." surname="Finn"/>
    <author fullname="J.-Y. Le Boudec" initials="J.-Y." surname="Le Boudec"/>
    <author fullname="E. Mohammadpour" initials="E." surname="Mohammadpour"/>
    <author fullname="J. Zhang" initials="J." surname="Zhang"/>
    <author fullname="B. Varga" initials="B." surname="Varga"/>
    <date month="November" year="2022"/>
    <abstract>
      <t>This document presents a timing model for sources, destinations, and Deterministic Networking (DetNet) transit nodes. Using the model, it provides a methodology to compute end-to-end latency and backlog bounds for various queuing methods. The methodology can be used by the management and control planes and by resource reservation algorithms to provide bounded latency and zero congestion loss for the DetNet service.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9320"/>
  <seriesInfo name="DOI" value="10.17487/RFC9320"/>
</reference>


<reference anchor="I-D.ietf-detnet-dataplane-taxonomy">
   <front>
      <title>Dataplane Enhancement Taxonomy</title>
      <author fullname="Jinoo Joung" initials="J." surname="Joung">
         <organization>Sangmyung University</organization>
      </author>
      <author fullname="Xuesong Geng" initials="X." surname="Geng">
         <organization>Huawei</organization>
      </author>
      <author fullname="Shaofu Peng" initials="S." surname="Peng">
         <organization>ZTE Corporation</organization>
      </author>
      <author fullname="Toerless Eckert" initials="T. T." surname="Eckert">
         <organization>Futurewei Technologies</organization>
      </author>
      <date day="8" month="January" year="2026"/>
      <abstract>
	 <t>   This draft is to facilitate the understanding of the data plane
   enhancement solutions, which are suggested currently or can be
   suggested in the future, for deterministic networking.  This draft
   provides criteria for classifying data plane solutions.  Examples of
   each category are listed, along with reasons where necessary.
   Strengths and limitations of the categories are described.
   Suitability of the solutions for various services of deterministic
   networking are also mentioned.  Reference topologies for evaluation
   of the solutions are given as well.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-detnet-dataplane-taxonomy-05"/>
   
</reference>


<reference anchor="I-D.eckert-detnet-flow-interleaving">
   <front>
      <title>Deterministic Networking (DetNet) Data Plane - Flow interleaving for scaling detnet data planes with minimal end-to-end latency and large number of flows.</title>
      <author fullname="Toerless Eckert" initials="T. T." surname="Eckert">
         <organization>Futurewei Technologies USA</organization>
      </author>
      <date day="7" month="July" year="2025"/>
      <abstract>
	 <t>   This memo explain requirements, benefits and feasibility of a new
   DetNet service function tentatively called &quot;flow interleaving&quot;.  It
   proposes to introduce this service function into the DetNet
   architecture.

   Flow interleaving can be understood as a DetNet equivalent of the
   IEEE TSN timed gates.  Its primary role is intended to be at the
   ingress edge of DetNet domains supporting higher utilization and
   lower bounded latency for flow aggregation (interleaving of flows
   into a single flow), as well as higher utilization and lower bounded
   latency for interleaving occurring in transit hops of the DetNet
   domain in conjunction with in-time per-hop bounded latency forwarding
   mechanisms.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-eckert-detnet-flow-interleaving-03"/>
   
</reference>


<reference anchor="SCQF">
   <front>
      <title>Segment Routing (SR) Based Bounded Latency</title>
      <author fullname="Mach Chen" initials="M." surname="Chen">
         <organization>Huawei</organization>
      </author>
      <author fullname="Xuesong Geng" initials="X." surname="Geng">
         <organization>Huawei</organization>
      </author>
      <author fullname="Zhenqiang Li" initials="Z." surname="Li">
         <organization>China Mobile</organization>
      </author>
      <author fullname="Jinoo Joung" initials="J." surname="Joung">
         <organization>Sangmyung University</organization>
      </author>
      <author fullname="Jeong-dong Ryoo" initials="J." surname="Ryoo">
         <organization>ETRI</organization>
      </author>
      <date day="7" month="July" year="2023"/>
      <abstract>
	 <t>   One of the goals of DetNet is to provide bounded end-to-end latency
   for critical flows.  This document defines how to leverage Segment
   Routing (SR) to implement bounded latency.  Specifically, the SR
   Identifier (SID) is used to specify transmission time (cycles) of a
   packet.  When forwarding devices along the path follow the
   instructions carried in the packet, the bounded latency is achieved.
   This is called Cycle Specified Queuing and Forwarding (CSQF) in this
   document.

   Since SR is a source routing technology, no per-flow state is
   maintained at intermediate and egress nodes, SR-based CSQF naturally
   supports flow aggregation that is deemed to be a key capability to
   allow DetNet to scale to large networks.


	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-chen-detnet-sr-based-bounded-latency-03"/>
   
</reference>


<reference anchor="LSDN">
   <front>
      <title>Large-Scale Deterministic IP Network</title>
      <author fullname="Li Qiang" initials="L." surname="Qiang">
         <organization>Huawei</organization>
      </author>
      <author fullname="Xuesong Geng" initials="X." surname="Geng">
         <organization>Huawei</organization>
      </author>
      <author fullname="Bingyang Liu" initials="B." surname="Liu">
         <organization>Huawei</organization>
      </author>
      <author fullname="Toerless Eckert" initials="T. T." surname="Eckert">
         <organization>Huawei</organization>
      </author>
      <author fullname="Liang Geng" initials="L." surname="Geng">
         <organization>China Mobile</organization>
      </author>
      <author fullname="Guangpeng Li" initials="G." surname="Li">
         </author>
      <date day="2" month="September" year="2019"/>
      <abstract>
	 <t>   This document presents the overall framework and key method for
   Large-scale Deterministic Network (LDN).  LDN can provide bounded
   latency and delay variation (jitter) without requiring precise time
   synchronization among nodes, or per-flow state in transit nodes.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-qiang-detnet-large-scale-detnet-05"/>
   
</reference>


<reference anchor="TCQF">
   <front>
      <title>Deterministic Networking (DetNet) Data Plane - Tagged Cyclic Queuing and Forwarding (TCQF) for bounded latency with low jitter in large scale DetNets</title>
      <author fullname="Toerless Eckert" initials="T. T." surname="Eckert">
         <organization>Futurewei Technologies USA</organization>
      </author>
      <author fullname="Yizhou Li" initials="Y." surname="Li">
         <organization>Huawei Technologies</organization>
      </author>
      <author fullname="Stewart Bryant" initials="S." surname="Bryant">
         <organization>University of Surrey ICS</organization>
      </author>
      <author fullname="Andrew G. Malis" initials="A. G." surname="Malis">
         <organization>Malis Consulting</organization>
      </author>
      <author fullname="Jeong-dong Ryoo" initials="J." surname="Ryoo">
         <organization>ETRI</organization>
      </author>
      <author fullname="Peng Liu" initials="P." surname="Liu">
         <organization>China Mobile</organization>
      </author>
      <author fullname="Guangpeng Li" initials="G." surname="Li">
         <organization>Huawei Technologies</organization>
      </author>
      <author fullname="Shoushou Ren" initials="S." surname="Ren">
         <organization>Huawei Technologies</organization>
      </author>
      <date day="15" month="December" year="2025"/>
      <abstract>
	 <t>   This memo specifies a forwarding method for bounded latency and
   bounded jitter for Deterministic Networks and is a variant of the
   IEEE TSN Cyclic Queuing and Forwarding (CQF) method.  Tagged CQF
   (TCQF) supports more than 2 cycles and indicates the cycle number via
   an existing or new packet header field called the tag to replace the
   cycle mapping in CQF which is based purely on synchronized reception
   clock.

   This memo standardizes TCQF as a mechanism independent of the tagging
   method used.  It also specifies tagging via the (1) the existing MPLS
   packet Traffic Class (TC) field for MPLS packets, (2) the IP/IPv6
   DSCP field for IP/IPv6 packets, and (3) a new TCQF Option header for
   IPv6 packets.

   Target benefits of TCQF include low end-to-end jitter, ease of high-
   speed hardware implementation, optional ability to support large
   number of flow in large networks via DiffServ style aggregation by
   applying TCQF to the DetNet aggregate instead of each DetNet flow
   individually, and support of wide-area DetNet networks with arbitrary
   link latencies and latency variations as well as low accuracy clock
   synchronization.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-eckert-detnet-tcqf-12"/>
   
</reference>


<reference anchor="I-D.dang-queuing-with-multiple-cyclic-buffers">
   <front>
      <title>A Queuing Mechanism with Multiple Cyclic Buffers</title>
      <author fullname="Bingyang Liu" initials="B." surname="Liu">
         <organization>Huawei</organization>
      </author>
      <author fullname="Joanna Dang" initials="J." surname="Dang">
         <organization>Huawei</organization>
      </author>
      <date day="22" month="February" year="2021"/>
      <abstract>
	 <t>   This document presents a queuing mechanism with multiple cyclic
   buffers.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-dang-queuing-with-multiple-cyclic-buffers-00"/>
   
</reference>


<reference anchor="BIER-TE">
   <front>
      <title>Tree Engineering for Bit Index Explicit Replication (BIER-TE)</title>
      <author fullname="Toerless Eckert" initials="T. T." surname="Eckert">
         <organization>Futurewei Technologies Inc.</organization>
      </author>
      <author fullname="Michael Menth" initials="M." surname="Menth">
         <organization>University of Tuebingen</organization>
      </author>
      <author fullname="Gregory Cauchie" initials="G." surname="Cauchie">
         <organization>KOEVOO</organization>
      </author>
      <date day="25" month="April" year="2022"/>
      <abstract>
	 <t>This memo describes per-packet stateless strict and loose path steered replication and forwarding for &quot;Bit Index Explicit Replication&quot; (BIER) packets (RFC 8279); it is called &quot;Tree Engineering for Bit Index Explicit Replication&quot; (BIER-TE) and is intended to be used as the path steering mechanism for Traffic Engineering with BIER.

 BIER-TE introduces a new semantic for &quot;bit positions&quot; (BPs). These BPs indicate adjacencies of the network topology, as opposed to (non-TE) BIER in which BPs indicate &quot;Bit-Forwarding Egress Routers&quot; (BFERs). A BIER-TE &quot;packets BitString&quot; therefore indicates the edges of the (loop-free) tree across which the packets are forwarded by BIER-TE. BIER-TE can leverage BIER forwarding engines with little changes. Co-existence of BIER and BIER-TE forwarding in the same domain is possible -- for example, by using separate BIER &quot;subdomains&quot; (SDs). Except for the optional routed adjacencies, BIER-TE does not require a BIER routing underlay and can therefore operate without depending on a routing protocol such as the &quot;Interior Gateway Protocol&quot; (IGP).
	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-bier-te-arch-13"/>
   
</reference>


<reference anchor="DNBL">
   <front>
      <title>Deterministic Networking (DetNet) Bounded Latency</title>
      <author fullname="Norman Finn" initials="N." surname="Finn">
         <organization>Huawei Technologies Co. Ltd</organization>
      </author>
      <author fullname="Jean-Yves Le Boudec" initials="J." surname="Le Boudec">
         <organization>EPFL</organization>
      </author>
      <author fullname="Ehsan Mohammadpour" initials="E." surname="Mohammadpour">
         <organization>EPFL</organization>
      </author>
      <author fullname="Jiayi Zhang" initials="J." surname="Zhang">
         <organization>Huawei Technologies Co. Ltd</organization>
      </author>
      <author fullname="Balazs Varga" initials="B." surname="Varga">
         <organization>Ericsson</organization>
      </author>
      <date day="8" month="April" year="2022"/>
      <abstract>
	 <t>This document presents a timing model for sources, destinations, and Deterministic Networking (DetNet) transit nodes.  Using the model, it provides a methodology to compute end-to-end latency and backlog bounds for various queuing methods.  The methodology can be used by the management and control planes and by resource reservation algorithms to provide bounded latency and zero congestion loss for the DetNet service.
	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-detnet-bounded-latency-10"/>
   
</reference>


<reference anchor="I-D.stein-srtsn">
   <front>
      <title>Segment Routed Time Sensitive Networking</title>
      <author fullname="Yaakov (J) Stein" initials="Y. J." surname="Stein">
         <organization>RAD</organization>
      </author>
      <date day="29" month="August" year="2021"/>
      <abstract>
	 <t>   Routers perform two distinct user-plane functionalities, namely
   forwarding (where the packet should be sent) and scheduling (when the
   packet should be sent).  One forwarding paradigm is segment routing,
   in which forwarding instructions are encoded in the packet in a stack
   data structure, rather than programmed into the routers.  Time
   Sensitive Networking and Deterministic Networking provide several
   mechanisms for scheduling under the assumption that routers are time
   synchronized.  The most effective mechanisms for delay minimization
   involve per-flow resource allocation.

   SRTSN is a unified approach to forwarding and scheduling that uses a
   single stack data structure.  Each stack entry consists of a
   forwarding portion (e.g., IP addresses or suffixes) and a scheduling
   portion (deadline by which the packet must exit the router).  SRTSN
   thus fully implements network programming for time sensitive flows,
   by prescribing to each router both to-where and by-when each packet
   should be sent.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-stein-srtsn-01"/>
   
</reference>


<reference anchor="I-D.eckert-detnet-bounded-latency-problems">
   <front>
      <title>Problems with existing DetNet bounded latency queuing mechanisms</title>
      <author fullname="Toerless Eckert" initials="T. T." surname="Eckert">
         <organization>Futurewei Technologies USA</organization>
      </author>
      <author fullname="Stewart Bryant" initials="S." surname="Bryant">
         <organization>Stewart Bryant Ltd</organization>
      </author>
      <date day="12" month="July" year="2021"/>
      <abstract>
	 <t>   The purpose of this memo is to explain the challenges and limitations
   of existing (standardized) bounded latency queuing mechanisms for
   desirable (large scale) MPLS and/or IP based networks to allow them
   to support DetNet services.  These challenges relate to low-cost,
   high-speed hardware implementations, desirable network design
   approaches, system complexity, reliability, scalability, cost of
   signaling, performance and jitter experience for the DetNet
   applications.  Many of these problems are rooted in the use of per-
   hop, per-flow (DetNet) forwarding and queuing state, but highly
   accurate network wide time synchronization can be another challenge
   for some networks.

   This memo does not intend to propose a specific queuing solution, but
   in the same way in which it describes the challenges of mechanisms,
   it reviews how those problem are addressed by currently proposed new
   queuing mechanisms.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-eckert-detnet-bounded-latency-problems-00"/>
   
</reference>


<reference anchor="UBS" >
  <front>
    <title>Urgency-Based Scheduler for Time-Sensitive Switched Ethernet Networks</title>
    <author initials="J." surname="Specht" fullname="Johannes Specht">
      <organization></organization>
    </author>
    <author initials="S." surname="Samii" fullname="Soheil Samii">
      <organization></organization>
    </author>
    <date year="2016"/>
  </front>
  <seriesInfo name="IEEE" value="28th Euromicro Conference on Real-Time Systems (ECRTS)"/>
</reference>
<reference anchor="LBF" >
  <front>
    <title>High-Precision Latency Forwarding over Packet-Programmable Networks</title>
    <author initials="T." surname="Eckert" fullname="Toerless Eckert">
      <organization></organization>
    </author>
    <author initials="A." surname="Clemm" fullname="Alexander Clemm">
      <organization></organization>
    </author>
    <date year="2020" month="April"/>
  </front>
  <seriesInfo name="IEEE" value="2020 IEEE/IFIP Network Operations and Management Symposium (NOMS 2020)"/>
  <seriesInfo name="doi" value="10.1109/NOMS47738.2020.9110431"/>
</reference>
<reference anchor="gLBF" target="https://dl.ifip.org/db/conf/cnsm/cnsm2021/1570754857.pdf">
  <front>
    <title>gLBF: Per-Flow Stateless Packet Forwarding with Guaranteed Latency and Near-Synchronous Jitter,</title>
    <author initials="T." surname="Eckert" fullname="Toerless Eckert">
      <organization></organization>
    </author>
    <author initials="A." surname="Clemm" fullname="Alexander Clemm">
      <organization></organization>
    </author>
    <author initials="S." surname="Bryant" fullname="Stewart Bryant">
      <organization></organization>
    </author>
    <date year="2021" month="October"/>
  </front>
  <seriesInfo name="IEEE" value="2021 17th International Conference on Network and Service Management (CNSM), Izmir, Turkey"/>
  <seriesInfo name="doi" value="10.23919/CNSM52442.2021.9615538"/>
</reference>
<reference anchor="gLBF-Springer2023" >
  <front>
    <title>High Precision Latency Forwarding for Wide Area Networks Through Intelligent In-Packet Header Processing (gLBF)</title>
    <author initials="T." surname="Eckert" fullname="Toerless Eckert">
      <organization></organization>
    </author>
    <author initials="A." surname="Clemm" fullname="Alexander Clemm">
      <organization></organization>
    </author>
    <author initials="S." surname="Bryant" fullname="Stewart Bryant">
      <organization></organization>
    </author>
    <date year="2023" month="February"/>
  </front>
  <seriesInfo name="Springer" value="Journal of Network and Systems Management, 31, Article number: 34 (2023)"/>
  <seriesInfo name="doi" value="https://doi.org/10.1007/s10922-022-09718-9"/>
</reference>
<reference anchor="IEEE802.1Q" target="https://doi.org/10.1109/ieeestd.2018.8403927">
  <front>
    <title>IEEE Standard for Local and Metropolitan Area Network — Bridges and Bridged Networks (IEEE Std 802.1Q)</title>
    <author >
      <organization>IEEE 802.1 Working Group</organization>
    </author>
    <date year="2018"/>
  </front>
  <seriesInfo name="doi" value="10.1109/ieeestd.2018.8403927"/>
</reference>
<reference anchor="IEEE802.1Qbv" >
  <front>
    <title>IEEE Standard for Local and metropolitan area networks -- Bridges and Bridged Networks - Amendment 25: Enhancements for Scheduled Traffic (TAS)</title>
    <author >
      <organization>IEEE Time-Sensitive Networking (TSN) Task Group.</organization>
    </author>
    <date year="2015"/>
  </front>
</reference>
<reference anchor="CQF" >
  <front>
    <title>IEEE Std 802.1Qch-2017: IEEE Standard for Local and Metropolitan Area Networks - Bridges and Bridged Networks - Amendment 29: Cyclic Queuing and Forwarding (CQF)</title>
    <author >
      <organization>IEEE Time-Sensitive Networking (TSN) Task Group.</organization>
    </author>
    <date year="2017"/>
  </front>
</reference>
<reference anchor="TSN-ATS" target="https://1.ieee802.org/tsn/802-1qcr/">
  <front>
    <title>P802.1Qcr - Bridges and Bridged Networks Amendment: Asynchronous Traffic Shaping</title>
    <author initials="J." surname="Specht" fullname="Johannes Specht">
      <organization></organization>
    </author>
    <date year="2020" month="July" day="09"/>
  </front>
  <seriesInfo name="IEEE" value=""/>
</reference>
<reference anchor="IPV6-PARMS" target="https://www.iana.org/assignments/ipv6-parameters/ipv6-parameters.xhtml">
  <front>
    <title>Internet Protocol Version 6 (IPv6) Parameters</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
  <seriesInfo name="IANA" value=""/>
</reference>
<reference anchor="LDN" target="https://dl.ifip.org/db/conf/networking/networking2021/1570696888.pdf">
  <front>
    <title>Towards Large-Scale Deterministic IP Networks</title>
    <author initials="B." surname="Liu" fullname="Binyang Liu">
      <organization></organization>
    </author>
    <author initials="S." surname="Ren" fullname="Shoushou Ren">
      <organization></organization>
    </author>
    <author initials="C." surname="Wang" fullname="Chuang Wang">
      <organization></organization>
    </author>
    <author initials="V." surname="Angilella" fullname="Vincent Angilella">
      <organization></organization>
    </author>
    <author initials="P." surname="Medagliani" fullname="Paolo Medagliani">
      <organization></organization>
    </author>
    <author initials="S." surname="Martin" fullname="Sebastien Martin">
      <organization></organization>
    </author>
    <author initials="J." surname="Leguay" fullname="Jeremie Leguay">
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
  <seriesInfo name="IEEE" value="2021 IFIP Networking Conference (IFIP Networking)"/>
  <seriesInfo name="doi" value="10.23919/IFIPNetworking52078.2021.9472798"/>
</reference>
<reference anchor="multipleCQF" target="https://www.ieee802.org/1/files/public/docs2021/new-finn-multiple-CQF-0921-v02.pdf">
  <front>
    <title>Multiple Cyclic Queuing and Forwarding</title>
    <author initials="N." surname="Finn" fullname="Norm Finn">
      <organization></organization>
    </author>
    <date year="2021" month="October"/>
  </front>
</reference>


    </references>


<?line 1074?>

<section anchor="high-speed-implementation-considerations"><name>High speed implementation considerations</name>

<section anchor="high-speed-example-pseudocode-instead-of-reference-pseudocode"><name>High speed example pseudocode instead of reference pseudocode</name>

<t>This memo does not describe a normative reference code that aligns with
the normative functional description above <xref target="glbf-spec"/>. The primary reason
is that a naive 1:1 implementation of the functional description would
lead to inferior performance. Nevertheless, the feasibility of high speed
implementations is an important factor in the ability to deploy 
mechanisms like gLBF. Therefore, this appendix describes considerations
for such high speed implementations including pseudocode for on
possible option.</t>

<t><xref target="gLBF"/> describes two approaches for possible optimized hardware implementation
approaches for gLBF. One using "Push In First Out" (PIFO) queues, the
other one times FIFO queues. The following is a representation and
explanation of that second approach because it is hopefully more feasible
for nearer term hardware implementations given the fact that scalable
FIFO high-speed hardware implementations are still a matter for research.</t>

<t>However, the timed FIFO style algorithm presented here is also subject
to possible scalability challenges for hardware because it requires for
each outgoing interface  O(IIF * priorities^2) number of FIFO queues,
where IIF is the number of (incoming) interfaces on the node, and priorities is the
number of priority levels desired (TSN allows up to 8). If however
the priority of flows (packets) used is not per-hop but the same for every
hop (per-path), then the number is just (IIF * priorities).</t>

</section>
<section anchor="ubs-high-speed-implementations"><name>UBS high speed implementations</name>

<t>The algorithm for the pseudocode shown in this appendix further down in this section
is based on the analysis of gLBF behavior done in and for <xref target="gLBF"/>. 
This analysis re-applies the same type of analysis and algorithm that
was done in <xref target="UBS"/> and can be used to implement TSN-ATS in high
speed switching hardware. Therefore, this appendix will start by explaining
the UBS mechanisms.</t>

<t>UBS (see <xref target="UBS"/>, Figure 4), logically consists of two separate stages.
The first stage is a per priority, per incoming interface (IIF) interleaved
regulator. An interleaved regulator is a FIFO where dequeuing of the
queue head packet (qhead) is based on the per-flow state of qhead.</t>

<t>A target departure time for that qhead is calculated from the flow state of
the packet maintained on the router across packets and once that departure time
is reached, the packet is passed to one of the egress strict priority
queues. This is called interleaved regulator, because the FIFO will have
packets from multiple flows (all from the same incoming interface and
outgoing priority), hence 'interleave', and regulator because of the delaying
of the packet up to the target departure time.</t>

<t>The innovation of interleaved regulators as opposed to the prior per-flow shapers
as used in <xref target="RFC2210"/> is the recognition and mathematical proof that the arrival and
target departure times of all packets received from the same IIF (prior hop node)
and the same egress priority will be in order and that they can 
be enqueued into a single FIFO where the per-flow processing only needs to
happen for the qhead. Without (anything but negligible) added latency
vs. per-flow shapers.</t>

<t>With this understanding, the interleaved regulator and following strict
priority stage can easily be combined into a single queuing stage with
appropriate scheduling. In this "flattened" approach, each logical egress
strict priority queue consists of the per-IIF interleaved regulator (FIFO queue)
for that priority.</t>

<t>Scheduling of packets on egress does now need to perform the per-queue
processing of the per-flow state of the qhead, and then take the target
departure time of that packet into account, selecting the interleaved regulator
with the highest priority and earliest target departure time qhead.</t>

</section>
<section anchor="glbf-compared-to-ubs"><name>gLBF compared to UBS</name>

<t>In gLBF, the very same line of thoughts as in UBS can be applied and are the basis
for the described algorithm and shown pseudocode.</t>

<t>In glBF, the order of packets in their arrival and target departure times
depends on the egress priority, the IIF, but also on the priority the packet had
on the prior hop (pprio). All packets with the same (IIF,prio,prio) will arrive
in the same order in which they need to depart, and in which it is therefore
possible to use a FIFO to enqueue the packets and only do timed dequeuing
of the qhead.</t>

<t>Both prio and pprio are of interest, because when gLBF uses an encapsulation
allowing per-hop priority indications, its priority on each hop can be different.
In UBS, priority can equally be different across hops for the same packet,
but the prior hop priority is not necessary to put packets into separate
interleaved regulators because UBS targets in-time delay, where the
interleaved regulator does (only) need to compensate for burst accumulation,
but in gLBF the delay to be introduced depends on the damper value which
depends on the prior hop priority and in result, the order in which in
gLBF packets should depart (absent any burst accumulation) depends also
on the prior hop priority.</t>

<t>Because gLBF does not deal with per-flow state on the router as UBS
does in its interleaved regulators, the FIFOs for gLBF are called timed
FIFOs in this memo and not interleaved regulators</t>

</section>
<section anchor="comparison-to-normative-behavior"><name>Comparison to normative behavior</name>

<t>Whereas the normative description described D, Q and M blocks,
where the D block performs the dampening, and the Q block performs
the priority queuing block, in the high speed hardware optimization,
these are replaced by a single DQ block where the packets are
enqueued into a single stage per-(IIF,pprio,prio) FIFO (similar to UBS) and then
the dampening happens (similar to UBS) on dequeuing from that stage
by the damper time but scheduling/prioritizing packets based on their prio.</t>

<figure title="High Speed single stage gLBF" anchor="FIG-hs-diagram"><artwork><![CDATA[
   +------------------------+       +------------------------+ 
   | Node A                 |       | Node B                 |
   | +-+    +-------+   +-+ |       | +-+    +-------+   +-+ |
 --|-|F|--x-| DQ y  |-z-|M|-|-------|-|F|--x-| DQ y  |-z-|M|-|--->
IIF| +-+    +-------+   +-+ |OIF IIF| +-+    +-------+   +-+ |OIF
   +------------------------+       +------------------------+
          |<- Dampened Q ->|               |<- Dampened Q ->|
                 |<- A/B in-time latency ->|
                 |<--A/B on-time latency -------->|
]]></artwork></figure>

<t>In the normative definition, the damper value to be put into the packet
depended on the time y, where the packet left the damper stage D and
entered the priority queue stage Q. Simplified, the damper value is
(MAX1 - (z - y)).</t>

<t>In the high-speed implementation, the packets are not passed from
a damper state queue to a priority queue. Instead they stay in the
same queue. This is on one hand one of the core reasons why this
approach can support high speed - it does not require two-stage
enqueuing/dequeing/ But it eliminates also the ability to take a time stamp
at time y.</t>

<t>To therefore be able to replicate the normative gLBF behavior with a
single stage, it is necessary in the marking stage M (where the new
damper value is calculated), to somehow know y.</t>

<t>Luckily, y is exactly the target departure time of the packet for
the D and therefore also the DQ stage, so already needs to be
calculated on entry to DQ by calculation: y = (x + damper - &lt;details&gt;),
as explained below.</t>

<t>The pseudocode consists of glbf_enqueue() describing the enqueuing
into the DQ stage, and glbf_dequeue() describing the dequeuing
from the DQ stage. glbf_dequeue() (synchronously) calls 
glbf_send() which represents the marking stage M.</t>

</section>
<section anchor="pseudocode"><name>Pseudocode</name>

<section anchor="glbfenqueue"><name>glbf_enqueue()</name>

<figure title="Reference pseudocode for glbf_enqueue()" anchor="FIG-glbf-enqueue"><artwork><![CDATA[
void glbf_enqueue(pak,oif) {
  tdamp = pak.header.tdamp // damper value from packet
  prio  = pak.header.prio  // this hops packet prio
  pprio = pak.header.pprio // previous hops packet prior
  iif   = pak.context.iif  // incoming interface of packet

  ta = adj_rcv_time(now(),                  \[1]
                    pak.context.iif.speed,
                    pak.context.length)

  td = now() + ta // (dampened earliest) departure time
  pak.context.max1 = max1\[oif,prio]
  enqueue(pak, td, q(oif,iif,prio,pprio))
}
]]></artwork></figure>

<t>pak.header are parsed fields from the received gLBF packet. tdamp is
the damper value.  pak.context is a node local header of the packet.
iif is the interface on which the packet was received.</t>

<t>prio and pprio are current prior hop priority from the packet header.
If for example SRH (<xref target="RFC8754"/>) is used
in conjunction with gLBF, and <xref target="RFC8986"/> formatting of SIDs
is used, then the priority for each hop could be expressed as
a 4-bit SID ARG field (see <xref target="RFC8986"/>, section 3.1) to indicate
16 different priorities per hop.</t>

<t>Parsing the prior hop priority is not a normative requirement of gLBF,
but a specific requirement of the high speed algorithm
presented here to allow the use of single stage timed FIFOs instead of PIFOs.
This type of parsing is not required for SRH, but would be a benefit
of a packet header which like SRH keeps the prior hops information,
opposed to the SR-MPLS approach where past hop SD/Labels are discarded.</t>

<t>now() takes a timestamp from a local (unsynchronised) clock at the
time of execution.</t>

<t>[1] pak.context.ta (time of arrival) is the calculated time at which the first bit of the packet
was entering the incoming interface of the node. adj_rcv_time() is defined
in the next subsection. td is the target
departure time calculated from the current time and the damper
value from the packet. It simply convert the relative damper value to
an absolute timestamp.</t>

<t>max1[oif,prio] is the only gLBF specific interface level state
maintained (read-only) across packets. It is the maximum time calculated
by admission control in the controller-plane for each priority. It
is transferred into a context header field here even though it will
only be used further down in dequeuing because of the assumption that
access to state information is not desirable at the time critical stage
of dequeuing/serialization, whereas such state lookup is very common
for many forwarding plane features before enqueuing.</t>

<t>Finally, the packet is enqueued into a per-oif,iif,prio,pprio timed
FIFO queue.</t>

</section>
<section anchor="adjrcvtime"><name>adj_rcv_time()</name>

<t>To calculate the reference time against which the damper value in the
packet is to be used, this specification assumes the time when the
first bit of the packet is seen on the media connecting to the
incoming interface.</t>

<figure title="Example pseudocode for adv_rcv_time()" anchor="FIG-adj-rcv-time"><artwork><![CDATA[
time_t adj_rcv_time(now, speed, length) {
  time_t now
  int speed, length
      
  return now - length * 8 / speed - FUDGE
}
]]></artwork></figure>

<t>In most simple node equipment, the primary variable latency introduced 
between that (first bit) measurement point and the time when the time
parameter t for adj_rcv_time() can be taken is the deserialization time of the
packet. This can easily be calculated from the packet length as assumed to be 
known from pak.context.length and the bitrate of the incoming interface known
from pak.context.iif.speed plus fixed measured or calculated other
latency FUDGE through internal processing. The example pseudocode, those
are assumed to be static.</t>

<t>If other internal factors in prior forwarding within the node do create
significant enough variation, then those may need compensation through
additional mechanisms. In this case, instead of as shown in
glbf_enqueue(), the reference time for calculation should be taken
directly upon receipt of the packet, before entering the forwarding stage F,
and then used as the now parameter for adj_rcv_time(). This is explicitly
not shown in the code so as to highlight the most simple implementation
option that should be sufficient for most node types.</t>

</section>
<section anchor="glbfdequeue"><name>glbf_dequeue()</name>

<figure title="Pseudocode for glbf_dequeue()" anchor="FIG-glbf-dequeue-"><artwork><![CDATA[
void glbf_dequeue(oif) {
  next_packet: while(1) {
    tnow = now()
    ftd = tnow + 1  // time of first packet to send
    fq = NULL      // queue of first packet to send
    foreach prio in maxpriority...minpriority {
      foreach iif in iifs {
        foreach pprio in priorities}
          // find qhead with earliest departure time
          if (q = q(oif,iif,prio,pprio).qhead) {
            td = q.qhead.td   // target (departure) time
            if td < ftd
              ftd = td
              fq = q
            }
          }
        }
      }
      if fq { // found packet
        pak = dequeue(q,oif)
        glbf_send(oif,tnow,pak)
        break next_packet
      }
    }
  }
}
]]></artwork></figure>

<t>glbf_dequeue() finds the gLBF packet to send as the enqueued packet with the highest
priority and the earliest departure time td (as calculated in glbf_enqueue()),
where td must also not in the future, because otherwise the packet still needs to
be dampened.</t>

<t>The outer loops across this hops prio will find the packet
with exactly those properties, dequeues and sends it. For this,
the  strict priority is expressed through the term maxpriority...minpriority,
which first searches from maximum to minimum priority..</t>

<t>The two inner loops simply look for the packet with the earliest
target departure time across all the (IIF,pprio) timed FIFO queues
for the same prio and OIF.</t>

<t>In ASIC / FPGA implementations, finding this packet is not a sequential
operation as shown in the pseudocode, but can be a single clock-cycle
parallel compare operation across the td values of all queues qheads - at the expense of
chip space, similar to how TCAMs work.</t>

</section>
<section anchor="glbfsend"><name>glbf_send()</name>

<figure title="Reference pseudocode for glbf dequeue" anchor="FIG-glbf-dequeue"><artwork><![CDATA[
void glbf_send(oif,tnow,pak) {
  qtime = tnow - pak.context.td          // \[1]
  td = pak.context.max1 - qtime - FUDGE2 // \[2]
  pak.header.tdamp = td
  serialize(oif,pak)
}
]]></artwork></figure>

<t>Sending packet pak represents the marking block M in the specification.
This needs to calculate the new damping value t and update it in the
packet header before sending the packet.</t>

<t>td needs to be the maximum time max1 that the packet could have
stayed in priority queuing minus the time qtime that it actually did stay in
the queue and minus any additional time FUDGE2 that the packet will still
needs to be processed by the router before its first bit will show up
on the sending interface. This is calculated as shown in 
in [1] and [2] of <xref target="FIG-glbf-dequeue"/>.</t>

<t>The primary factor impacting FUDGE2 is whether or not this calculation and
updating of the packet header td field can be done directly before serialization
starts, or whether it potentially would need to be done while there is
still another packet in the process of being serialized on the interface.
Taking the added latency of a currently serializing packet into account
can for example be implemented by remembering the timestamp of when
that packet started to be serialized and its length - and then taking
that into account to calculate FUDGE2.</t>

</section>
</section>
<section anchor="performance-considerations"><name>Performance considerations</name>

<t>IEEE 802.1 PTP clock synchronization does need to capture the accurate
arrival time of PTP packets. It is also measuring the residency time
of PTP packets between receiving and sending the packet with an
accuracy of nsec and add this to a PTP packet header field  (correctionField).
Given how this needs to be a hardware supported functionality, it is
unclear whether there is a relevant difference supporting this for
few PTP signaling packets as compared to a much larger number of
gLBF data packets - or whether it is a good indication of the feasibility
packet processing steps gLBF requires.</t>

</section>
</section>
<section anchor="history-and-comparison-with-other-bounded-latency-methods"><name>History and comparison with other bounded latency methods</name>

<t>Preceding this work, the best solution to solve the requirements outlined in
this document, where <xref target="TCQF"/> and <xref target="SCQF"/>, which are proven to
be feasible for high speed forwarding planes, because of vendor high-speed
forwarding plane implementation using low-cost FPGA for cyclic queuing. On the other hand,
it was concluded from implementation analysis, that <xref target="UBS"/> was infeasible for the
same type of high-speed, low-cost hardware due to the need for high-speed
flow-state operations, especially read/write cycles to update the state for every packet
at packet processing speeds.</t>

<t>While TCQF and <xref target="SCQF"/> are very good solution proven to work
at high-speed, low cost, available for deployment and ready for standardization, 
the need for network wide and hop-by-hop clock synchronization (albeit at lower
accuracy than required for other mechanisms feasible at high-speed, low-cost) as well
as the need to find network wide good compromise clock cycle times makes planning and
managing them in dynamic, large-scale and/or low-cost network solutions still more complex
to operationalize than what the authors wished for.</t>

<t>In parallel to short term operationalizable solutions <xref target="TCQF"/> and <xref target="SCQF"/>, <xref target="LBF"/> was researched,
which is exploring a wide range of options to signal and control latency through advanced
per-hop processing and in-packet latency related new header elements. Unfortunately, with
the flexibility of <xref target="LBF"/> it was impossible to find a calculus for simple admission control. 
Ultimately, <xref target="gLBF"/> was designed out of the desire to have a mechanism 
derived from <xref target="LBF"/> that also provides guaranteed bounded latency, has the flexibility
benefits of <xref target="UBS"/> with respect to fine-grained and per-hop independent latency
management but does hopefully still fits the limits of what can be implemented in
high-speed, low-cost forwarding/queuing hardware.</t>

<t>This high-speed hardware forwarding feasibility of gLBF has yet to be proven.
Here are some comsiderations, why the authors think that this should be well
feasible:</t>

<t>The total number of FIFO that a platform needs to support is comparable to
the number of queues already supportable in the same type of devices today,
except that service provider core nodes may not all implement that many,
because absent of DetNet services, there is no requirement for them.</t>

<t>The need to implement timed FIFOs (if the proposed high-speed implementation
approach is used) is equal or less complex to shapers, which by now have
also started to appear on high-speed (100Gbps and faster) core routers,
primarily due to high-speed virtual leased line type of services.</t>

<t>The re-marking of packet header fields derived from the calculated
latency of the packet experienced in the node is arguably something where
iOAM type functionality likely provides also prior evidence of feasibility in
high speed hardware forwarding planes. Similarily, processing of PPT timing
protocol packets also have similar requirements.</t>

<t>Even when implementation challenges at high-speed, low-cost make gLBF a
longer term option in those networks, implementation at low-speed (1/10 Gbps)
such as in manufacturing or cars may be an interesting option to explore given
how it has the no-jitter benefits of <xref target="CQF"/> without the need for cycle
management or clock-synchronization: Best of both worlds <xref target="CQF"/> and TSN-ATS ??</t>

</section>
<section anchor="solution-scope-taxonomy-and-status-for-detnet-adoption-considerations"><name>Solution Scope, Taxonomy and Status for DetNet adoption considerations</name>

<section anchor="solution-scope"><name>Solution scope</name>

<t>gLBF is proposed as a solution not standalone, but in conjunction with <xref target="I-D.eckert-detnet-flow-interleaving"/>
as a per-flow mechanism to be used on the ingress gLBF router to allow more flexible per-flow management
of admission of flow bursts into cycles than presented in this document. The reason for splitting up
the proposal into two documents is because <xref target="I-D.eckert-detnet-flow-interleaving"/> can be combined
with all "mostly-synchronous" per-hop mechanisms, for example beyond gLBF also (of course) CQF and
<xref target="TCQF"/>.</t>

</section>
<section anchor="taxonomy"><name>Taxonomy</name>

<t>Using the section number/titles of the taxonomy document
<xref target="I-D.ietf-detnet-dataplane-taxonomy"/> the TCQF technology
can be classified as follows. In summary, gLBF is very much like TCQF except
that it removes cycles and replaces them with Dampers, hence even further
reducing the end-to-end jitter, reducing clock accuracy requirements (only
phase synchronization, not clock synchronization required) and removed
the complexity of end-to-end cycle management. In comparison to older Damper
based proposals, gLBF re-uses ATS calculus, which allows to re-use ATS
admission control and delaycalculations and to use simple FIFO with timed
scheduler based implementation (like ATS).</t>

<t><list style="symbols">
  <t>4.1 Per Hop Dominant Factor for Latency Bound  <vspace blankLines='1'/>
The per-hop dominant latency bound is Category 3. The per-hop latency for each
class is determined by the configured burst size cycle size.</t>
  <t>5.1 Periodicity  <vspace blankLines='1'/>
gLBF is not periodic. Its fundamental mode of operation is not based on cycles to manage
bursts but instead by using per-hop per-packet synchronous delivery to allow maintaining
the burst sizes across all hops end-to-end.</t>
  <t>5.2.  Traffic Granularity  <vspace blankLines='1'/>
Factually, gLBF is class-level granularity. However, the description in <xref target="I-D.ietf-detnet-dataplane-taxonomy"/>,
revision 04 claiming that all packets within a class are treated the same is questionable for gLBF
(and in general all Damper solutions). In Damper solutions like gLBF, packets latency is calculate
per-packet (within the same class) based on prior experienced per-hop latency - to compensate it.</t>
  <t>5.3.  Time Bounds  <vspace blankLines='1'/>
gLBF is per-hop bounded. It is Right Bounded by the configured burst size for the hop and class the packet
is in. It is Left bounded by the signalled remaining latency to achieve synchronous forwarding. If
observation of bound was not taken on e.g.: the wire but instead in a specific forwarding step in the
router(after reception, before enqueuing), then the per-hop bound would be extremely tight bounded,
limited only by implementation accuracy.</t>
  <t>5.4 Service Order  <vspace blankLines='1'/>
gLBF service order is solely arrival based.</t>
  <t><list style="numbers">
      <t>Suitable Categories for DetNet</t>
    </list>
TCQF is "6.5.  Class level non-periodic bounded category" according to the categorization.</t>
</list></t>

</section>
<section anchor="status"><name>Status</name>

<t>gLBF has primarily an open source simulation level validation implementation as described in <xref target="gLBF"/>.
Additional implementations where done in Linux kernel by University (TBD reference) and a second
university in conjunction with a Prolog based Admission Control Server implementation (TBD reference).</t>

</section>
</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

