<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-zdm-tvr-applicability-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.2 -->
  <front>
    <title abbrev="Applicability Statement">Applicability of TVR YANG Data Models for Scheduling of Network Resources</title>
    <seriesInfo name="Internet-Draft" value="draft-zdm-tvr-applicability-00"/>
    <author fullname="Li Zhang">
      <organization>Huawei</organization>
      <address>
        <email>zhangli344@huawei.com</email>
      </address>
    </author>
    <author fullname="Jie Dong">
      <organization>Huawei</organization>
      <address>
        <email>jie.dong@huawei.com</email>
      </address>
    </author>
    <author fullname="Mohamed Boucadair">
      <organization>Orange</organization>
      <address>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <date year="2024" month="October" day="21"/>
    <area>Routing</area>
    <workgroup>Time-Variant Routing</workgroup>
    <keyword>schedule</keyword>
    <keyword>YANG module</keyword>
    <keyword>applicability</keyword>
    <abstract>
      <?line 57?>

<t>Time-Variant Routing (TVR) is a routing system that can support the predicted topology changes caused by internal or
external reasons. Typical use cases include mobility networks with moving nodes, resource constraints such as power,
and tidal traffic demand networks.
This document provides examples of how to implement the TVR scheduling capabilities for key use cases. It describes
which part of the TVR data model is used and why, and it outlines operational and security considerations when deploying
TVR-based technologies.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Time-Variant Routing Working Group mailing list (tvr@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tvr/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/zhangli-abcd/TVR-Applicability-2"/>.</t>
    </note>
  </front>
  <middle>
    <?line 66?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Time-Variant Routing (TVR) Working Group addresses a growing need in modern network environments where
predictable variations in topology - such as the restoration, activation, or loss of network elements, are
part of normal operations. This approach is essential in dynamic networks with mobile nodes, where links may
be frequently disrupted and re-established due to mobility or in networks with highly predictable traffic
patterns, where links may be powered down to conserve or reduce energy.</t>
      <t>This document provides examples of implementing TVR scheduling capabilities in identified use cases. It
demonstrates the applicability of the TVR data model, methods for disseminating the TVR schedule, and the
necessary IETF ancillary technologies for network environments, such as time synchronization and policy,
that support TVR capabilities.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="use-case-examples">
      <name>Use Case Examples</name>
      <section anchor="tidal-network-use-case">
        <name>Tidal Network Use Case</name>
        <t>A tidal network is a typical scenario of an Energy Efficient case (<xref section="3" sectionFormat="of" target="I-D.ietf-tvr-use-cases"/>).
The tidal network means that the volume of traffic in the network changes periodically, like the ocean tide.
These changes are mainly affected by human activities. Therefore, this tidal effect is obvious in
human-populated areas, such as campuses and airports.</t>
        <t>In the context of a tidal network, if the network maintains all the devices up to guarantee a maximum
throughput all the time, often, power will be wasted on network resources that are not being used. Energy-saving methods may include the deactivation
of some or all components of network nodes. These activities have the potential to alter network topology and
impact data routing/forwarding in a variety of ways. Interfaces on network nodes can be selectively disabled
or enabled based on traffic patterns, thereby reducing the energy consumption of nodes during periods of low
network traffic. The following sections will describe how to use the TVR YANG model<xref target="I-D.ietf-tvr-schedule-yang"/> in Tidal Network.</t>
      </section>
    </section>
    <section anchor="applicability-of-tvr-yang-model-in-tidal-network">
      <name>Applicability of TVR Yang Model in Tidal Network</name>
      <section anchor="network-model">
        <name>Network Model</name>
        <t>According to the description of <xref section="3.1" sectionFormat="of" target="I-D.ietf-tvr-requirements"/>, the scheduling generation locality
and execution locality may be centralized or distributed.</t>
        <t>When the schedule is generated and executed in a centralized manner, the changes are sent to routing applications
in wall-clock time via a management interface, which does not need to be delivered by the YANG model. This can be
implemented using the existing management plane technology. Therefore, this scenario is outside of the scope of this document.</t>
        <t>When the schedule is generated and executed in a distributed manner, there is also no need for delivering the
schedule by the YANG model. Therefore, this scenario is also outside of the scope of this document.</t>
        <t>When a schedule is generated in a centralized manner and executed in a distributed manner, the YANG module
needs to be used to deliver the schedule to the managed device. Depending on the location of the routing
application, the network model can be divided into two types: distributed and centralized.</t>
        <section anchor="centralized-model">
          <name>Centralized Model</name>
          <t>In the centralized model, the network managing device generates and maintains schedules, the routing application
is deployed in the network controller, and the network devices execute the schedules and routing results.
The following figure shows the components of the centralized model.</t>
          <figure anchor="ref-to-fig1">
            <name>Components of Centralized Model</name>
            <artwork><![CDATA[
 +-----------------------------------------------------------------+
 |                        Managing Device                          |
 +-----------------------------------------------------------------+
            |                                           |
        Data Model                                  Data Model
            |                                           |
 +---------\|/----------+                     +--------\|/--------+
 |  Network Controller  |---Routing Results-->|  Network Devices  |
 +----------------------+                     +-------------------+
]]></artwork>
          </figure>
        </section>
        <section anchor="distributed-model">
          <name>Distributed Model</name>
          <t>In the distributed model, the managing device generates and maintains schedules, the routing application
is deployed in the network devices which also executes schedules and route calculation.</t>
          <figure anchor="ref-to-fig2">
            <name>Components of Distributed Model</name>
            <artwork><![CDATA[
 +-------------------------------------------------+
 |                  Managing Device                |
 +-------------------------------------------------+
                          |
                      Data Model
                          |
 +-----------------------\|/-----------------------+
 |         Managed Device (Network Devices)        |
 +-------------------------------------------------+
]]></artwork>
          </figure>
        </section>
      </section>
      <section anchor="interaction-between-devices">
        <name>Interaction Between Devices</name>
        <section anchor="centralized-model-1">
          <name>Centralized Model</name>
          <t>A centralized model involves the interaction between the managing device and network controller, the managing
device and network devices, and the controller and network devices.</t>
          <t>The managing device needs to deliver node-specific schedules to network devices by TVR Schedule Node YANG
module <xref section="5.2" sectionFormat="of" target="I-D.ietf-tvr-schedule-yang"/>, and the network devices need to report their own status
data to the management device.</t>
          <t>The managing device needs to deliver schedules of the network topology to the network controller by the TVR Network
Topology YANG module<xref section="5.3" sectionFormat="of" target="I-D.ietf-tvr-schedule-yang"/>, so that the routing application in the controller
can consider the impact of topology changes on routes when calculating routes.</t>
          <t>The network controller should deliver the route calculation result to the network devices. The format of the routing
results depends on the protocols deployed(The typical protocols include BGP , PCEP, etc.). The routing result for a period of time in the future could be sent to
the network devices in wall-clock time or be packed and sent at some special points.</t>
        </section>
        <section anchor="distributed-model-1">
          <name>Distributed Model</name>
          <t>The distributed model only involves the interaction between managing devices and network devices.</t>
          <t>The managing device must deliver node-specific schedules to network devices by TVR Schedule Node YANG Module and
deliver network topology schedules to all the network devices by TVR Network Topology Yang module for route
calculation. The network devices must report their status data to the managing device.
Editors note: In future versions of this document, we will provide a more detailed procedure for both the distributed
and centralized approach.</t>
        </section>
      </section>
      <section anchor="encoding-of-the-yang-model">
        <name>Encoding of the YANG Model</name>
        <t>The TVR data model <xref target="I-D.ietf-tvr-schedule-yang"/> can manage network resources and topologies with scheduled
attributes. There are modules defined in the TVR data model, these are:</t>
        <ul spacing="normal">
          <li>
            <t>The “ietf-tvr-schedule” module contains the schedule YANG definitions. This module uses groupings from <xref target="I-D.ietf-netmod-schedule-yang"/> data model;</t>
          </li>
          <li>
            <t>The “ietf-tvr-topology” module defines a network topology with a time-variant availability schedule;</t>
          </li>
          <li>
            <t>The “ietf-tvr-node” module is to be used to manage the scheduled attributes of a single node.</t>
          </li>
        </ul>
        <t>To create a schedule, the following TVR data model objects and subsequent branches are used:</t>
        <ul spacing="normal">
          <li>
            <t>‘node-schedule’</t>
          </li>
          <li>
            <t>‘interface-schedule’</t>
          </li>
          <li>
            <t>‘attribute-schedule’</t>
          </li>
        </ul>
        <t>A TVR scenario example is provided below, where a wireless link is shut down for 12 hours, from 19:00 to 7am the next day.
The schedule is identified using a unique identifier that is conveyed in ‘schedule-id’, and the recurring schedule can be applied for multiple days using Coordinated
Universal Time (UTC).
A more detailed example of the json code is provided in this documents Appendix.</t>
        <artwork><![CDATA[
{
   "ietf-tvr-node:node-schedule":[
      {
         "node-id":1234567890,
         "node-power-schedule":{
            "power-default":true,
         },
         "interface-schedule":[
            {
               "name":"Wlan0",
               "default-available":false,
               "attribute-schedule":{
                  "schedules":[
                     {
                        "schedule-id":111111,
                        "recurrence-first":{
                           "utc-start-time":"2025-12-01T19:00:00Z",
                           "duration":43200
                        },
                        "utc-until":"2026-12-01T00:00:00Z",
                        "frequency":"ietf-schedule:daily",
                        "interval":1,
                        "attr-value":{
                           "available":true
                        }
                     }
                  ]
               }
            }
         ]
      }
   ]
}
]]></artwork>
        <t>The methods for disseminating and propagating the generated schedule are discussed in the following subsections.</t>
      </section>
      <section anchor="management-protocols-for-tvr">
        <name>Management Protocols for TVR</name>
        <t>The TVR data model is designed to be accessed via YANG-based management protocols such as NETCONF <xref target="RFC6241"/> and RESTCONF
<xref target="RFC8040"/>. This section discusses the applicability of these protocols for configuring time-variant network resources
using the TVR YANG data models.</t>
        <t>NETCONF provides a robust mechanism for managing complex network configurations, particularly when transactional integrity
and operational consistency are required. Its ability to execute atomic transactions ensures that schedules involving
multiple resources are applied fully, preventing partial updates that could lead to configuration inconsistencies. This
feature is important for time-sensitive scheduling in TVR environments. Additionally, NETCONF supports the validation of
configurations prior to commitment, allowing operators to verify the correctness of schedules before they are applied.
It also includes rollback capabilities, such as restoring a previous configuration during scheduling errors.</t>
        <t>In contrast, RESTCONF offers a simpler, stateless method for interacting with network devices, making it suitable for use
cases requiring lightweight, rapid configuration. RESTCONF utilizes a RESTful interface over HTTP, providing a streamlined
approach to network configuration and management. Therefore, RESTCONF may be advantageous in scenarios where quick adjustments
to schedules are needed or where integration with web-based or cloud-native systems is a priority.</t>
        <t>Depending on the type of node in the TVR network, NETCONF would be the preferred protocol for large-scale, critical scheduling
operations requiring validation and rollback mechanisms. For smaller-scale or isolated scheduling tasks, RESTCONF provides an
efficient and straightforward option without the need for the transactional features offered by NETCONF. The choice of protocol
to use with the TVR YANG model should be driven by the specific requirements of the network environment and the complexity of
the scheduling tasks involved.</t>
        <t>The security aspects of both NETCONF and RESTCONF, including their strengths and weaknesses, are discussed further in
<xref target="security-considerations"/> of this document.</t>
      </section>
    </section>
    <section anchor="time-synchronization">
      <name>Time Synchronization</name>
      <t>According to <xref section="3.1.3" sectionFormat="of" target="I-D.ietf-tvr-requirements"/>, no matter whether the schedules are executed in a centralized
or distributed mode, a mechanism is required to keep the time synchronization between different devices.</t>
      <t>Different time-variant scenarios may require different granularities of time synchronization. For example, the
period of traffic and topology changes in tidal networks is usually a day or week. Therefore, a second-level time
synchronization is enough.</t>
      <t>Existing clock synchronization protocols can be classified into hardware-based protocols and software-based protocols.
Hardware-based protocols often rely on dedicated hardware to ensure clock synchronization, such as Global Positioning
System (GPS) and Precision Time Protocol (PTP). Software-based protocols, on the other hand, synchronize
clocks through software packages running on systems, such as Network Time Protocol (NTP) <xref target="RFC5905"/> and Simple Network
Time Protocol (SNTP) <xref target="RFC4330"/>.</t>
      <t>Hardware-based protocols typically have higher precision and stability, but also have higher cost due to the dedicated
Hardware. Software-based protocols are simple and applicable to common hardware devices, but have lower precision (For
example, the NTP can realize the synchronization at tens of milliseconds level).
The software-based protocols are appropriate for most of the TVR use cases.</t>
      <section anchor="ntp">
        <name>NTP</name>
        <t>NTP is fundamental for ensuring that TVR mechanisms, which depend on highly accurate timing, function as intended across
an entire network. Misalignment in time could lead to serious routing issues, including inefficiency in path forwarding,
instability in routing tables, and traffic outages.</t>
        <t>NTP will be used to ensure:</t>
        <ul spacing="normal">
          <li>
            <t>Coordination of Planned Network Events;</t>
          </li>
          <li>
            <t>Verification of TVR Data Model Time Stamps</t>
          </li>
          <li>
            <t>Accurate Scheduling of Paths;</t>
          </li>
          <li>
            <t>Fault Tolerance.</t>
          </li>
        </ul>
        <t>NTP uses a hierarchical structure of time sources. Each level of this hierarchy is termed a stratum. Generally, an NTP
server synchronized to an authoritative clock runs at stratum 1. Such NTP server functions as the primary time server
to provide clock synchronization for other devices on the network. Stratum 2 servers obtain time from stratum 1 servers,
stratum 3 servers obtain time from stratum 2 servers, and so on.</t>
        <t>In TVR use cases, the managing device functions as a level-1 NTP server and synchronized to an authoritative clock
source. The network controller and network devices behave as clients to obtain accurate time from the managing device.
<xref target="ref-to-fig3"/> shows an NTP deployment scenario for obtaining clock from a GPS clock source.</t>
        <figure anchor="ref-to-fig3">
          <name>Deployment Case of NTP in Tidal Networks</name>
          <artwork><![CDATA[
                           +--------------------+
                           |  GPS Clock Source  |
                           +--------------------+
                                     |
               +--------------------\|/------------------+
Stratum 1      |             Managing Device             |
               +-----------------------------------------+
                     |                             |
                     |                             |
                     |                             |
          +---------\|/----------+       +--------\|/--------+
Stratum 2 |  Network Controller  |       |  Network Devices  |
          +----------------------+       +-------------------+

]]></artwork>
        </figure>
      </section>
      <section anchor="sntp">
        <name>SNTP</name>
        <t>SNTP is a subset of the NTP used to synchronize computer clocks in the Internet. It simplifies the complex NTP
synchronization function and is suitable for networks with limited resources and loose precision requirements.
Compared with NTP, SNTP has lower clock precision, but the synchronization precision still can be guarded under
seconds. Therefore, SNTP also meets the time synchronization requirements of tidal networks and can be used as
an alternative clock synchronization protocol.</t>
      </section>
    </section>
    <section anchor="schedule-database">
      <name>Schedule Database</name>
      <t>The schedule database is used to store and maintain schedules, the database may be deployed on a managing device
and managed devices based on requirements.</t>
      <t>The schedule source of the schedule database may be diversified, for example, configuration from an administrator
or YANG model from the management interface. The schedule entries of different databases may be different, but the
content of the same schedule entry in the schedule databases of different devices in the same domain must be
consistent. There are at least two ways to make the content of the same schedule entry in different schedule databases
consistent:</t>
      <ul spacing="normal">
        <li>
          <t>All the schedule entries are generated at a specific device;</t>
        </li>
        <li>
          <t>Schedule entries are generated at different devices, but there is a synchronization mechanism to synchronize the
schedule databases among devices.</t>
        </li>
      </ul>
      <t>Option 1 is simplest and easy to implement. In a time-variant domain, the managing device may receive scheduling
requests and generate all schedule entries. Then the schedule entries are delivered to the necessary network devices
in the domain through the TVR YANG model.</t>
      <t>Option 2 relies on advertisement mechanisms (such as routing techniques) to advertise the scheduling data generated
by itself to other devices. This could be achieved using extensions to existing routing schemes and techniques.</t>
      <t>These options will be discussed with the TVR Working Group, and agreed approaches will be documented in future versions
of this Internet Draft.</t>
      <section anchor="data-structure">
        <name>Data Structure</name>
        <t><xref target="I-D.ietf-tvr-schedule-yang"/> defines a TVR Node and TVR Topology YANG modules. The Node YANG module
includes node power schedule and interface schedule. The Topology YANG module includes nodes schedule and links schedule.</t>
        <t>Based on the preceding four schedule types, the schedule database should contain four types of schedule entries in
different formats:</t>
        <ul spacing="normal">
          <li>
            <t>Node power schedule entry;</t>
          </li>
          <li>
            <t>Interface schedule entry;</t>
          </li>
          <li>
            <t>Node schedule entry;</t>
          </li>
          <li>
            <t>Links schedule entry;</t>
          </li>
        </ul>
        <t>The detailed format and fields of different types of schedule entries could reference to the definitions of the corresponding
YANG modules.</t>
        <t>Editors note: Code examples will be provided here in future versions of this document.</t>
      </section>
      <section anchor="schedule-operations">
        <name>Schedule Operations</name>
        <t>This section provides general requirements for using the TVR schedule.</t>
        <t>The schedule database should support the add, update, and delete operations.</t>
        <t>When adding or updating a schedule entry, the execution node needs to check whether resource conflicts exist between the
current schedule and existing schedules. If a conflict exists, the operation should be failed.</t>
        <t>Schedules are updated and deleted based on schedule IDs. Therefore, schedule IDs must be unique in a time-variant domain.
This can be handled, e.g., by a dedicated allocation agent within the time-variant domain.</t>
        <t>Editors note: Future versions of this document will expand on the schedule operations requirements and best practices.</t>
      </section>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>Several operational considerations exist when using TVR techniques and data models in a network. This section provides
some high-level observations and more detailed sub-sections for specific consideration related to schedule dissemination,
execution, and recovery in case of failure to apply a schedule or partial change.</t>
      <ul spacing="normal">
        <li>
          <t>Coordinated Network Events: TVR often coordinates routing changes anticipating events like predictable low-traffic
periods or link downtimes (e.g., scheduled maintenance or traffic demand).</t>
        </li>
        <li>
          <t>Accurate Scheduling of Paths: TVR schedule capable routers and network nodes will dynamically adjust forwarding paths
based on planned changes in link availability or network conditions.</t>
        </li>
        <li>
          <t>Time-Stamped Data Models: TVR will require the use time-stamped data models (e.g., schedules for link changes or
availability windows) to make interface management decisions. This ensures that all TVR nodes interpret the timing of
events consistently and implement time-based policies correctly.</t>
        </li>
      </ul>
      <t>Therefore, network time accuracy and time-stamped data models are critical to ensure that coordinated network events
and scheduled path decisions across the network are based on a consistent time reference. Without accurate time sync,
nodes could apply different schedules, causing routing inconsistencies, path flapping, or packet loss.</t>
      <section anchor="schedule-execution-consideration">
        <name>Schedule Execution Consideration</name>
        <t>Schedules execution means that a component (e.g., device) undertakes an action (e.g., allocates and deallocates resources)
at specified time points. In a tidal network, the schedule execution indicates powering on/off specific network components
(such as interfaces or entire network devices) directly or by commands.</t>
        <t>The schedule executor should understand the consequences of the schedule execution. The power on/off of network components
usually affects the network topology, the addition and deletion of the topology need to be considered separately.</t>
        <t>A link coming up or a node joining a topology should not have any functional change until the change is proven to be fully
operational. The routing paths may be pre-computed but should not be installed before all of the topology changes are
confirmed to be operational. The benefits of this pre-computation appear to be very small. The network may choose to
not do any pre-installation or pre-computation in reaction to topological additions at a small cost of some operational
efficiency.</t>
        <t>Topological deletions are an entirely different matter. If a link or node is to be removed from the topology, then the
network should act before the anticipated change to route traffic around the expected topological change. Specifically,
at some point before the planned topology change, the routing paths should be pre-computed and installed before the
topology change takes place. The required time to perform such planned action will vary depending on the exact network
and configuration. When using an IGP or other distributed routing protocols, the affected links may be set to a high
metric to direct traffic to alternate paths. This type of change does require some time to propagate through the
network, so the metric change should be initiated far enough in advance that the network converges before the actual
topological change.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The integration of time-variant mechanisms in network operations presents distinct security challenges that require thorough
analysis to safeguard the network’s integrity, availability, and confidentiality. Networks that rely on time-sensitive data
for routing and forwarding decisions are particularly susceptible to attacks that exploit timing dependencies.</t>
      <t>The "Security Considerations" section of <xref target="I-D.ietf-tvr-requirements"/> outlines various threat vectors and categories specific
to time-variant environments. In this document, a tidal demand use case has been presented, highlighting the need for robust
security measures in the processes of generating, disseminating, and applying schedules to control tidal interfaces.
It is essential to assess security risks and implement mitigation strategies to ensure the security of both the network and
individual nodes throughout the scheduling process.</t>
      <t>Future iterations of this document will provide detailed security techniques and best practices to address these challenges.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="I-D.ietf-tvr-schedule-yang">
          <front>
            <title>YANG Data Model for Scheduled Attributes</title>
            <author fullname="Yingzhen Qu" initials="Y." surname="Qu">
              <organization>Futurewei Technologies</organization>
            </author>
            <author fullname="Acee Lindem" initials="A." surname="Lindem">
              <organization>LabN Consulting, L.L.C.</organization>
            </author>
            <author fullname="Eric Kinzie" initials="E." surname="Kinzie">
              <organization>LabN Consulting, L.L.C.</organization>
            </author>
            <author fullname="Don Fedyk" initials="D." surname="Fedyk">
              <organization>LabN Consulting, L.L.C.</organization>
            </author>
            <author fullname="Marc Blanchet" initials="M." surname="Blanchet">
              <organization>Viagenie</organization>
            </author>
            <date day="20" month="October" year="2024"/>
            <abstract>
              <t>   The YANG model in this document includes three modules, and can be
   used to manage network resources and topologies with scheduled
   attributes, such as predictable link loss and link connectivity as a
   function of time.  The intent is to have this information be utilized
   by Time-Variant Routing systems.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tvr-schedule-yang-03"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.ietf-tvr-use-cases">
          <front>
            <title>TVR (Time-Variant Routing) Use Cases</title>
            <author fullname="Edward J. Birrane" initials="E. J." surname="Birrane">
              <organization>JHU/APL</organization>
            </author>
            <author fullname="Nicolas Kuhn" initials="N." surname="Kuhn">
              <organization>Thales Alenia Space</organization>
            </author>
            <author fullname="Yingzhen Qu" initials="Y." surname="Qu">
              <organization>Futurewei Technologies</organization>
            </author>
            <author fullname="Rick Taylor" initials="R." surname="Taylor">
              <organization>Ori Industries</organization>
            </author>
            <author fullname="Li Zhang" initials="L." surname="Zhang">
              <organization>Huawei</organization>
            </author>
            <date day="29" month="February" year="2024"/>
            <abstract>
              <t>   This document introduces use cases where Time-Variant Routing (TVR)
   computations (i.e. routing computations taking into considerations
   time-based or scheduled changes to a network) could improve routing
   protocol convergence and/or network performance.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tvr-use-cases-09"/>
        </reference>
        <reference anchor="I-D.ietf-tvr-requirements">
          <front>
            <title>TVR (Time-Variant Routing) Requirements</title>
            <author fullname="Daniel King" initials="D." surname="King">
              <organization>Lancaster University</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Brian Sipos" initials="B." surname="Sipos">
              <organization>JHU/APL</organization>
            </author>
            <author fullname="Li Zhang" initials="L." surname="Zhang">
              <organization>Huawei</organization>
            </author>
            <date day="13" month="September" year="2024"/>
            <abstract>
              <t>   Time-Variant Routing (TVR) refers to calculating a path or subpath
   through a network where the time of message transmission (or receipt)
   is part of the overall route computation.  This means that, all
   things being equal, a TVR computation might produce different results
   depending on the time that the computation is performed without other
   detectable changes to the network topology or other cost functions
   associated with the route

   This document introduces requirements where TVR computations could
   improve message exchange in a network.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tvr-requirements-04"/>
        </reference>
        <reference anchor="I-D.ietf-netmod-schedule-yang">
          <front>
            <title>A Common YANG Data Model for Scheduling</title>
            <author fullname="Qiufang Ma" initials="Q." surname="Ma">
              <organization>Huawei</organization>
            </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Daniel King" initials="D." surname="King">
              <organization>Lancaster University</organization>
            </author>
            <date day="10" month="October" year="2024"/>
            <abstract>
              <t>   This document defines a common schedule YANG module which is designed
   to be applicable for scheduling purposes such as event, policy,
   services, or resources based on date and time.  For the sake of
   better modularity, the module includes a set of recurrence related
   groupings with varying granularity levels (i.e., from basic to
   advanced).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-netmod-schedule-yang-03"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC5905">
          <front>
            <title>Network Time Protocol Version 4: Protocol and Algorithms Specification</title>
            <author fullname="D. Mills" initials="D." surname="Mills"/>
            <author fullname="J. Martin" initials="J." role="editor" surname="Martin"/>
            <author fullname="J. Burbank" initials="J." surname="Burbank"/>
            <author fullname="W. Kasch" initials="W." surname="Kasch"/>
            <date month="June" year="2010"/>
            <abstract>
              <t>The Network Time Protocol (NTP) is widely used to synchronize computer clocks in the Internet. This document describes NTP version 4 (NTPv4), which is backwards compatible with NTP version 3 (NTPv3), described in RFC 1305, as well as previous versions of the protocol. NTPv4 includes a modified protocol header to accommodate the Internet Protocol version 6 address family. NTPv4 includes fundamental improvements in the mitigation and discipline algorithms that extend the potential accuracy to the tens of microseconds with modern workstations and fast LANs. It includes a dynamic server discovery scheme, so that in many cases, specific server configuration is not required. It corrects certain errors in the NTPv3 design and implementation and includes an optional extension mechanism. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5905"/>
          <seriesInfo name="DOI" value="10.17487/RFC5905"/>
        </reference>
        <reference anchor="RFC4330">
          <front>
            <title>Simple Network Time Protocol (SNTP) Version 4 for IPv4, IPv6 and OSI</title>
            <author fullname="D. Mills" initials="D." surname="Mills"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This memorandum describes the Simple Network Time Protocol Version 4 (SNTPv4), which is a subset of the Network Time Protocol (NTP) used to synchronize computer clocks in the Internet. SNTPv4 can be used when the ultimate performance of a full NTP implementation based on RFC 1305 is neither needed nor justified. When operating with current and previous NTP and SNTP versions, SNTPv4 requires no changes to the specifications or known implementations, but rather clarifies certain design features that allow operation in a simple, stateless remote-procedure call (RPC) mode with accuracy and reliability expectations similar to the UDP/TIME protocol described in RFC 868.</t>
              <t>This memorandum obsoletes RFC 1769, which describes SNTP Version 3 (SNTPv3), and RFC 2030, which describes SNTPv4. Its purpose is to correct certain inconsistencies in the previous documents and to clarify header formats and protocol operations for NTPv3 (IPv4) and SNTPv4 (IPv4, IPv6, and OSI), which are also used for SNTP. A further purpose is to provide guidance for home and business client implementations for routers and other consumer devices to protect the server population from abuse. A working knowledge of the NTPv3 specification, RFC 1305, is not required for an implementation of SNTP. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4330"/>
          <seriesInfo name="DOI" value="10.17487/RFC4330"/>
        </reference>
      </references>
    </references>
    <?line 485?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
    <section numbered="false" anchor="appendix-a-code-examples">
      <name>Appendix A: Code Examples</name>
      <section numbered="false" anchor="code-examples-for-tidal-network">
        <name>Code Examples for Tidal Network</name>
        <t>Tidal networks usually need to manage the availability of some node or interfaces. <xref target="ex-inf"/> shows the example of a
scheduling node that is powered on from 12 AM, December 1, 2025 to 12 AM, December 1, 2026 in UTC and its interface
named "interface1" is scheduled to be enabled at 7:00 AM and disabled at 1:00 AM, every day, from December 1, 2025 to
December 1, 2026 in UTC.</t>
        <t>The JSON encoding is used only for illustration purposes.</t>
        <figure anchor="ex-inf">
          <name>An Example of Interface Activation Scheduling</name>
          <artwork align="center"><![CDATA[
{
   "ietf-tvr-node:node-schedule":[
      {
         "node-id":12345678,
         "node-power-schedule":{
            "power-default":false,
            "schedules":[
               {
                  "schedule-id":111111,
                  "period-start":"2025-12-01T00:00:00Z",
                  "period-end":"2026-12-01T00:00:00Z",
                  "attr-value":{
                     "power-state":true
                  }
               }
            ]
         },
         "interface-schedule":[
            {
               "name":"interace1",
               "default-available":false,
               "default-bandwidth":1000000000,
               "attribute-schedule":{
                  "schedules":[
                     {
                        "schedule-id":222222,
                        "recurrence-first":{
                           "utc-start-time":"2025-12-01T07:00:00Z",
                           "duration":64800
                        },
                        "utc-until":"2026-12-01T00:00:00Z",
                        "frequency":"ietf-schedule:daily",
                        "interval":1,
                        "attr-value":{
                           "available":true
                        }
                     }
                  ]
               }
            }
         ]
      }
   ]
}
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact fullname="Daniel King">
        <organization>Lancaster University</organization>
        <address>
          <postal>
            <country>United Kingdom</country>
          </postal>
          <email>d.king@lancaster.ac.uk</email>
        </address>
      </contact>
      <contact fullname="Charalampos (Haris) Rotsos">
        <organization>Lancaster University</organization>
        <address>
          <email>c.rotsos@lancaster.ac.uk</email>
        </address>
      </contact>
      <contact fullname="Peng Liu">
        <organization>China Mobile</organization>
        <address>
          <email>liupengyjy@chinamobile.com</email>
        </address>
      </contact>
      <contact fullname="Tony Li">
        <organization>Juniper Networks</organization>
        <address>
          <email>tony.li@tony.li</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
