<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.23 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-zdm-tvr-applicability-02" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.27.0 -->
  <front>
    <title abbrev="Applicability Statement">Applicability of TVR YANG Data Models</title>
    <seriesInfo name="Internet-Draft" value="draft-zdm-tvr-applicability-02"/>
    <author fullname="Li Zhang">
      <organization>Huawei</organization>
      <address>
        <email>zhangli344@huawei.com</email>
      </address>
    </author>
    <author fullname="Jie Dong">
      <organization>Huawei</organization>
      <address>
        <email>jie.dong@huawei.com</email>
      </address>
    </author>
    <author fullname="Mohamed Boucadair">
      <organization>Orange</organization>
      <address>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <date year="2025" month="February" day="28"/>
    <area>Routing</area>
    <workgroup>Time-Variant Routing</workgroup>
    <keyword>schedule</keyword>
    <keyword>YANG module</keyword>
    <keyword>applicability</keyword>
    <abstract>
      <?line 56?>

<t>Time-Variant Routing (TVR) is a routing system that can support the predicted topology changes caused by internal or
external reasons. Typical use cases include resource preservation networks, operating efficiency networks and dynamic
reachability networks.
This document provides examples of how to implement the TVR scheduling capabilities for key use cases. It describes
which part of the TVR data model is used and why, and it outlines operational and security considerations when deploying
TVR-based technologies.</t>
    </abstract>
  </front>
  <middle>
    <?line 65?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Time-Variant Routing (TVR) Working Group addresses a growing need in modern network environments where
predictable variations in topology - such as the restoration, activation, or loss of network elements, are
part of normal operations. This approach is essential in dynamic networks with mobile nodes, where links may
be frequently disrupted and re-established due to mobility or in networks with highly predictable traffic
patterns, where links may be powered down to conserve or reduce energy.</t>
      <t>This document provides examples of implementing TVR scheduling capabilities in identified use cases. It
demonstrates the applicability of the TVR data model, methods for disseminating the TVR schedule, and the
necessary IETF ancillary technologies for network environments, such as time synchronization and policy,
that support TVR capabilities.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="use-case-examples">
      <name>Use Case Examples</name>
      <section anchor="tidal-network-use-case">
        <name>Tidal Network Use Case</name>
        <t>A tidal network is a typical scenario of an Energy Efficient case (<xref section="3" sectionFormat="of" target="I-D.ietf-tvr-use-cases"/>).
The tidal network means that the volume of traffic in the network changes periodically, like the ocean tide.
These changes are mainly affected by human activities. Therefore, this tidal effect is obvious in
human-populated areas, such as campuses and airports.</t>
        <t>In the context of a tidal network, if the network maintains all the devices up to guarantee a maximum
throughput all the time, often, power will be wasted on network resources that are not being used. Energy-saving methods may include the deactivation
of some or all components of network nodes. These activities have the potential to alter network topology and
impact data routing/forwarding in a variety of ways. Interfaces on network nodes can be selectively disabled
or enabled based on traffic patterns, thereby reducing the energy consumption of nodes during periods of low
network traffic.</t>
      </section>
      <section anchor="dynamic-reachability-use-case">
        <name>Dynamic Reachability Use Case</name>
        <t>Dynamic Reachability referred to the scenarios where a node is placed on a mobile platform, the mobility of the
platform may cause changes to the topology of the network over time<xref section="4" sectionFormat="of" target="I-D.ietf-tvr-use-cases"/>. As the
relative mobility between and among nodes in the network and the impacts of the environment on the signal
propagation can be predicted, the associated loss and establishment of adjacencies can also be planned for.</t>
        <t>The typical detailed use cases of Dynamic Reachability include but not limited to satellite network, predictable moving
vessels and vehicles.</t>
      </section>
    </section>
    <section anchor="applicability-of-tvr-yang-model">
      <name>Applicability of TVR Yang Model</name>
      <section anchor="network-model">
        <name>Network Model</name>
        <t>According to the description of <xref section="3.1" sectionFormat="of" target="I-D.ietf-tvr-requirements"/>, the scheduling generation locality
and execution locality may be centralized or distributed.</t>
        <t>When the schedule is generated and executed in a centralized manner and within the same device, the changes are sent to routing applications
in wall-clock time via a management interface, which does not need to be delivered by the YANG model. This can be
implemented using the existing management plane technology. Therefore, this scenario is outside of the scope of this document.</t>
        <t>When the schedule is generated and executed in a distributed manner, which means that each node generates its specific
schedules. In this scenario, there is also no need for delivering the schedule by the YANG model. Therefore, this scenario
is also outside of the scope of this document.</t>
        <t>When a schedule is generated in a centralized manner and executed in a distributed manner, the YANG module
needs to be used to deliver the schedule to the managed device. Depending on the location of the routing
application, the network model can be divided into two types: distributed and centralized.</t>
        <section anchor="centralized-model">
          <name>Centralized Model</name>
          <t>In the centralized model, the network managing device generates and maintains schedules, the routing application
is deployed in the network controller, and the network devices execute the schedules and routing results.
The following figure shows the components of the centralized model.</t>
          <figure anchor="ref-to-fig1">
            <name>Components of Centralized Model</name>
            <artwork><![CDATA[
 +-----------------------------------------------------------------+
 |                        Managing Device                          |
 +-----------------------------------------------------------------+
            |                                           |
        Data Model                                  Data Model
            |                                           |
 +---------\|/----------+                     +--------\|/--------+
 |  Network Controller  |---Routing Results-->|  Network Devices  |
 +----------------------+                     +-------------------+
]]></artwork>
          </figure>
        </section>
        <section anchor="distributed-model">
          <name>Distributed Model</name>
          <t>In the distributed model, the managing device generates and maintains schedules, the routing application
is deployed in the network devices which also executes schedules and route calculation.</t>
          <figure anchor="ref-to-fig2">
            <name>Components of Distributed Model</name>
            <artwork><![CDATA[
 +-------------------------------------------------+
 |                  Managing Device                |
 +-------------------------------------------------+
                          |
                      Data Model
                          |
 +-----------------------\|/-----------------------+
 |         Managed Device (Network Devices)        |
 +-------------------------------------------------+
]]></artwork>
          </figure>
        </section>
      </section>
      <section anchor="interaction-between-devices">
        <name>Interaction Between Devices</name>
        <section anchor="interactions-in-centralized-model">
          <name>Interactions in Centralized Model</name>
          <t>A centralized model involves the interaction between the managing device and network controller, the managing
device and network devices, and the controller and network devices.</t>
          <t>The managing device needs to deliver node-specific schedules to network devices by TVR Schedule Node YANG
module <xref section="5.2" sectionFormat="of" target="I-D.ietf-tvr-schedule-yang"/>, and the network devices need to report their own status
data to the management device.</t>
          <t>The managing device needs to deliver schedules of the network topology to the network controller by the TVR Network
Topology YANG module<xref section="5.3" sectionFormat="of" target="I-D.ietf-tvr-schedule-yang"/>, so that the routing application in the controller
can consider the impact of topology changes on routes when calculating routes.</t>
          <t>The network controller should deliver the route calculation result to the network devices. The format of the routing
results depend on the protocols deployed (The typical protocols include BGP, PCEP, etc.). The routing result for a period
in the future could be sent to the network devices in wall-clock time or be packed and sent at some special points.</t>
        </section>
        <section anchor="interactions-in-distributed-model">
          <name>Interactions in Distributed Model</name>
          <t>The distributed model only involves the interaction between managing devices and network devices.</t>
          <t>The managing device must deliver node-specific schedules to network devices by TVR Schedule Node YANG Module and
deliver network topology schedules to all the network devices by TVR Network Topology Yang module for route
calculation. The network devices must report their status data to the managing device.
Editor’s note: In future versions of this document, we will provide a more detailed procedure for both the distributed
and centralized approach.</t>
        </section>
      </section>
      <section anchor="encoding-of-the-yang-model">
        <name>Encoding of the YANG Model</name>
        <t>The TVR data model <xref target="I-D.ietf-tvr-schedule-yang"/> can manage network resources and topologies with scheduled
attributes. There are modules defined in the TVR data model, these are:</t>
        <ul spacing="normal">
          <li>
            <t>The “ietf-tvr-schedule” module contains the schedule YANG definitions. This module uses groupings from <xref target="I-D.ietf-netmod-schedule-yang"/> data model;</t>
          </li>
          <li>
            <t>The “ietf-tvr-topology” module defines a network topology with a time-variant availability schedule;</t>
          </li>
          <li>
            <t>The “ietf-tvr-node” module is to be used to manage the scheduled attributes of a single node.</t>
          </li>
        </ul>
        <t>To create a schedule, the following TVR data model objects and subsequent branches are used:</t>
        <ul spacing="normal">
          <li>
            <t>‘node-schedule’</t>
          </li>
          <li>
            <t>‘interface-schedule’</t>
          </li>
          <li>
            <t>‘attribute-schedule’</t>
          </li>
        </ul>
        <t>A TVR scenario example is provided below, where a wireless link is shut down for 12 hours, from 19:00 to 7am the next day.
The schedule is identified using a unique identifier that is conveyed in ‘schedule-id’, and the recurring schedule can be applied for multiple days using Coordinated
Universal Time (UTC).
A more detailed example of the json code is provided in this documents Appendix.</t>
        <artwork><![CDATA[
{
   "ietf-tvr-node:node-schedule":[
      {
         "node-id":1234567890,
         "node-power-schedule":{
            "power-default":true,
         },
         "interface-schedule":[
            {
               "name":"Wlan0",
               "default-available":false,
               "attribute-schedule":{
                  "schedules":[
                     {
                        "schedule-id":111111,
                        "recurrence-first":{
                           "utc-start-time":"2025-12-01T19:00:00Z",
                           "duration":43200
                        },
                        "utc-until":"2026-12-01T00:00:00Z",
                        "frequency":"ietf-schedule:daily",
                        "interval":1,
                        "attr-value":{
                           "available":true
                        }
                     }
                  ]
               }
            }
         ]
      }
   ]
}
]]></artwork>
        <t>The methods for disseminating and propagating the generated schedule are discussed in the following subsections.</t>
      </section>
      <section anchor="management-protocols-for-tvr">
        <name>Management Protocols for TVR</name>
        <t>The TVR data model is designed to be accessed via YANG-based management protocols such as NETCONF <xref target="RFC6241"/> and RESTCONF
<xref target="RFC8040"/>. This section discusses the applicability of these protocols for configuring time-variant network resources
using the TVR YANG data models.</t>
        <t>NETCONF provides a robust mechanism for managing complex network configurations, particularly when transactional integrity
and operational consistency are required. Its ability to execute atomic transactions ensures that schedules involving
multiple resources are applied fully, preventing partial updates that could lead to configuration inconsistencies. This
feature is important for time-sensitive scheduling in TVR environments. Additionally, NETCONF supports the validation of
configurations prior to commitment, allowing operators to verify the correctness of schedules before they are applied.
It also includes rollback capabilities, such as restoring a previous configuration during scheduling errors.</t>
        <t>In contrast, RESTCONF offers a simpler, stateless method for interacting with network devices, making it suitable for use
cases requiring lightweight, rapid configuration. RESTCONF utilizes a RESTful interface over HTTP, providing a streamlined
approach to network configuration and management. Therefore, RESTCONF may be advantageous in scenarios where quick adjustments
to schedules are needed or where integration with web-based or cloud-native systems is a priority.</t>
        <t>Depending on the type of node in the TVR network, NETCONF would be the preferred protocol for large-scale, critical scheduling
operations requiring validation and rollback mechanisms. For smaller-scale or isolated scheduling tasks, RESTCONF provides an
efficient and straightforward option without the need for the transactional features offered by NETCONF. The choice of protocol
to use with the TVR YANG model should be driven by the specific requirements of the network environment and the complexity of
the scheduling tasks involved.</t>
        <t>The security aspects of both NETCONF and RESTCONF, including their strengths and weaknesses, are discussed further in
<xref target="security-considerations"/> of this document.</t>
      </section>
    </section>
    <section anchor="time-synchronization">
      <name>Time Synchronization</name>
      <t>According to <xref section="3.1.3" sectionFormat="of" target="I-D.ietf-tvr-requirements"/>, no matter whether the schedules are executed in a centralized
or distributed mode, a mechanism is required to keep the time synchronization between different devices.</t>
      <t>Different time-variant scenarios may require different granularities of time synchronization. For example, the
period of traffic and topology changes in tidal networks is usually a day or week. Therefore, a second-level time
synchronization is enough. However, for the dynamic reachability scenarios, a fine-granularity time synchronization may be necessary, as the nodes may moving very fast in some cases(the moving speed of a low earth orbit satellite is more than 7900 m/s)</t>
      <t>Existing clock synchronization protocols can be classified into hardware-based protocols and software-based protocols.
Hardware-based protocols often rely on dedicated hardware to ensure clock synchronization, such as Global Positioning
System (GPS) and Precision Time Protocol (PTP). Software-based protocols, on the other hand, synchronize
clocks through software packages running on systems, such as Network Time Protocol (NTP) <xref target="RFC5905"/> and Simple Network
Time Protocol (SNTP) <xref target="RFC4330"/>.</t>
      <t>The security aspects of time synchronization mechanisms are discussed further in <xref target="security-considerations"/> of this document.</t>
      <section anchor="hardware-based-time-synchronization-mechanisms">
        <name>Hardware-based Time Synchronization Mechanisms</name>
        <t>Hardware-based protocols typically have higher precision and stability, but also have higher cost due to the dedicated hardware. GPS and PTP are the typical hardware-based time synchronization mechanisms.</t>
        <t>GPS provides a precise time synchronization service based on the signals transmitted by the GPS satellites. GPS can realize the micro-second level time synchronization among the devices installed with GPS reviver hardware.</t>
        <t>PTP is a network protocol that complies with the IEEE 1588 standard and is used to implement high-precision time synchronization between network nodes. PTP implements time synchronization by transmitting synchronization messages between master and slave devices. Based on the hardware timestamp, the precision of time synchronization is much higher than that of NTP, and can reach the sub-microsecond level or even tens of nanoseconds.  When deploying PTP in TVR networks, the managing devices should be the master and the network devices and controller should be the slaves which get time from the master.</t>
        <t>Both GPS and PTP can realize micro-second level time synchronization. Depending on the features of TVR network, the GPS would be the preferred mechanisms for
large-scale, high dynamic and open-air networks, especially networks with unreliable links as it does not require network links to exchange time information.
For the small-scale networks with stable links but have high-precision time synchronization requirements, the PTP is much preferred.</t>
      </section>
      <section anchor="software-based-time-synchronization-protocols">
        <name>Software-based Time Synchronization Protocols</name>
        <t>Software-based protocols are simple and applicable to common hardware devices, but have lower precision (For
example, the NTP can realize the synchronization at tens of milliseconds level).</t>
        <section anchor="ntp">
          <name>NTP</name>
          <t>NTP is fundamental for ensuring that TVR mechanisms, which depend on highly accurate timing, function as intended across
an entire network. Misalignment in time could lead to serious routing issues, including inefficiency in path forwarding,
instability in routing tables, and traffic outages.</t>
          <t>NTP will be used to ensure:</t>
          <ul spacing="normal">
            <li>
              <t>Coordination of Planned Network Events;</t>
            </li>
            <li>
              <t>Verification of TVR Data Model Time Stamps</t>
            </li>
            <li>
              <t>Accurate Scheduling of Paths;</t>
            </li>
            <li>
              <t>Fault Tolerance.</t>
            </li>
          </ul>
          <t>NTP uses a hierarchical structure of time sources. Each level of this hierarchy is termed a stratum. Generally, an NTP
server synchronized to an authoritative clock runs at stratum 1. Such NTP server functions as the primary time server
to provide clock synchronization for other devices on the network. Stratum 2 servers obtain time from stratum 1 servers,
stratum 3 servers obtain time from stratum 2 servers, and so on.</t>
          <t>In TVR use cases, the managing device functions as a level-1 NTP server and synchronized to an authoritative clock
source. The network controller and network devices behave as clients to obtain accurate time from the managing device.
<xref target="ref-to-fig3"/> shows an NTP deployment scenario for obtaining clock from a GPS clock source.</t>
          <figure anchor="ref-to-fig3">
            <name>Deployment Case of NTP in Tidal Networks</name>
            <artwork><![CDATA[
                           +--------------------+
                           |  GPS Clock Source  |
                           +--------------------+
                                     |
               +--------------------\|/------------------+
Stratum 1      |             Managing Device             |
               +-----------------------------------------+
                     |                             |
                     |                             |
                     |                             |
          +---------\|/----------+       +--------\|/--------+
Stratum 2 |  Network Controller  |       |  Network Devices  |
          +----------------------+       +-------------------+

]]></artwork>
          </figure>
          <t>NTP is preferred in large-scale networks with reliable links and long-term changes, which dose not require a high-precision time synchronization.</t>
        </section>
        <section anchor="sntp">
          <name>SNTP</name>
          <t>SNTP is a subset of the NTP used to synchronize computer clocks in the Internet. It simplifies the complex NTP
synchronization function and has lower clock precision, but the synchronization precision still can be guarded under
seconds. SNTP is also preferred in large-scale networks with reliable links, long-term changes, and loose synchronization precision. In addition, it is more suitable for networks with limited resources than NTP.</t>
        </section>
      </section>
    </section>
    <section anchor="schedule-database">
      <name>Schedule Database</name>
      <t>The schedule database is used to store and maintain schedules, the database may be deployed on a managing device
and managed devices based on requirements.</t>
      <t>The schedule source of the schedule database may be diversified, for example, configuration from an administrator
or YANG model from the management interface. The schedule entries of different databases may be different, but the
content of the same schedule entry in the schedule databases of different devices in the same domain must be
consistent. There are at least two ways to make the content of the same schedule entry in different schedule databases
consistent:</t>
      <ul spacing="normal">
        <li>
          <t>All the schedule entries are generated at a specific device;</t>
        </li>
        <li>
          <t>Schedule entries are generated at different devices, but there is a synchronization mechanism to synchronize the
schedule databases among devices.</t>
        </li>
      </ul>
      <t>Option 1 is simplest and easy to implement. In a time-variant domain, the managing device may receive scheduling
requests and generate all schedule entries. Then the schedule entries are delivered to the necessary network devices
in the domain through the TVR YANG model.</t>
      <t>Option 2 relies on advertisement mechanisms (such as routing techniques) to advertise the scheduling data generated
by itself to other devices. This could be achieved using extensions to existing routing schemes and techniques.</t>
      <t>These options will be discussed with the TVR Working Group, and agreed approaches will be documented in future versions
of this Internet Draft.</t>
      <section anchor="data-structure">
        <name>Data Structure</name>
        <t><xref target="I-D.ietf-tvr-schedule-yang"/> defines a TVR Node and TVR Topology YANG modules. The Node YANG module
includes node power schedule and interface schedule. The Topology YANG module includes nodes schedule and links schedule.</t>
        <t>Based on the preceding four schedule types, the schedule database should contain four types of schedule entries in
different formats:</t>
        <ul spacing="normal">
          <li>
            <t>Node power schedule entry;</t>
          </li>
          <li>
            <t>Interface schedule entry;</t>
          </li>
          <li>
            <t>Node schedule entry;</t>
          </li>
          <li>
            <t>Links schedule entry;</t>
          </li>
        </ul>
        <t>The detailed format and fields of different types of schedule entries could reference to the definitions of the corresponding
YANG modules.</t>
        <t>Editor’s note: Code examples will be provided here in future versions of this document.</t>
      </section>
      <section anchor="schedule-operations">
        <name>Schedule Operations</name>
        <t>This section provides general requirements for using the TVR schedule.</t>
        <t>The schedule database should support the add, update, and delete operations.</t>
        <t>When adding or updating a schedule entry, the execution node needs to check whether resource conflicts exist between the
current schedule and existing schedules. If a conflict exists, the operation should be failed.</t>
        <t>Schedules are updated and deleted based on schedule IDs. Therefore, schedule IDs must be unique in a time-variant domain.
This can be handled, e.g., by a dedicated allocation agent within the time-variant domain.</t>
        <t>Editor’s note: Future versions of this document will expand on the schedule operations requirements and best practices.</t>
      </section>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>Several operational considerations exist when using TVR techniques and data models in a network. This section provides
some high-level observations and more detailed sub-sections for specific consideration related to schedule dissemination,
execution, and recovery in case of failure to apply a schedule or partial change.</t>
      <ul spacing="normal">
        <li>
          <t>Coordinated Network Events: TVR often coordinates routing changes anticipating events like predictable low-traffic
periods or link downtimes (e.g., scheduled maintenance or traffic demand).</t>
        </li>
        <li>
          <t>Accurate Scheduling of Paths: TVR schedule capable routers and network nodes will dynamically adjust forwarding paths
based on planned changes in link availability or network conditions.</t>
        </li>
        <li>
          <t>Time-Stamped Data Models: TVR will require the use time-stamped data models (e.g., schedules for link changes or
availability windows) to make interface management decisions. This ensures that all TVR nodes interpret the timing of
events consistently and implement time-based policies correctly.</t>
        </li>
      </ul>
      <t>Therefore, network time accuracy and time-stamped data models are critical to ensure that coordinated network events
and scheduled path decisions across the network are based on a consistent time reference. Without accurate time sync,
nodes could apply different schedules, causing routing inconsistencies, path flapping, or packet loss.</t>
      <section anchor="schedule-execution-consideration">
        <name>Schedule Execution Consideration</name>
        <t>Schedules execution means that a component (e.g., device) undertakes an action (e.g., allocates and deallocates resources)
at specified time points. In a tidal network, the schedule execution indicates powering on/off specific network components
(such as interfaces or entire network devices) directly or by commands.</t>
        <t>The schedule executor should understand the consequences of the schedule execution. The power on/off network components
usually affects the network topology, the addition and deletion of the topology need to be considered separately.</t>
        <t>A link coming up or a node joining a topology should not have any functional change until the change is proven to be fully
operational. The routing paths may be pre-computed but should not be installed before all the topology changes are
confirmed to be operational. The benefits of this pre-computation appear to be very small. The network may choose to
not do any pre-installation or pre-computation in reaction to topological additions at a small cost of some operational
efficiency.</t>
        <t>Topological deletions are an entirely different matter. If a link or node is to be removed from the topology, then the
network should act before the anticipated change to route traffic around the expected topological change. Specifically,
at some point before the planned topology change, the routing paths should be pre-computed and installed before the
topology change takes place. The required time to perform such planned action will vary depending on the exact network
and configuration. When using an IGP or other distributed routing protocols, the affected links may be set to a high
metric to direct traffic to alternate paths. This type of change does require some time to propagate through the
network, so the metric change should be initiated far enough in advance that the network converges before the actual
topological change.</t>
        <t>Editor's Note: multi-manager scenarios need to be considered.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The integration of time-variant mechanisms in network operations presents distinct security challenges that require thorough
analysis to safeguard the network’s integrity, availability, and confidentiality. Networks that rely on time-sensitive data
for routing and forwarding decisions are particularly susceptible to attacks that exploit timing dependencies.</t>
      <t>The "Security Considerations" section of <xref target="I-D.ietf-tvr-requirements"/> outlines various threat vectors and categories specific
to time-variant environments.</t>
      <section anchor="dos-attack">
        <name>Denial-of-Service (DoS) Attack</name>
        <t>In a time variant network, malicious actors could attack the network by disrupting or manipulating the time synchronization
process. For example, an attacker could intentionally delay or corrupt time signals exchanged within the network, leading
to routing errors and widespread denial-of-service (DoS) attacks.</t>
        <t>This kind of attack could be mitigated by the redundancy time synchronization mechanisms, for example, multiple NTP sources
or multiple time synchronization protocols could be deployed in a TVR network. The network devices could guarantee the
correctness of the time by checking whether the time signals from different sources or protocols.</t>
        <t>In addition, the identification authentication is also an important way to protect the time signals being tampered by
attackers. Some security extensions for time synchronization protocols (such as NTS (Network Time Security)) are
recommended to be applied.</t>
      </section>
      <section anchor="traffic-analysis">
        <name>Traffic Analysis and Path Prediction</name>
        <t>In a time variant network, if time information is not adequately protected, attackers could conduct traffic analysis to
infer routing decisions, network load, or usage patterns. The schedule ability could enable attackers to launch highly
targeted attacks, such as selectively overloading certain links or intercepting sensitive communications.</t>
        <t>This kind of attack could be mitigated by the encryption of schedules and the authentication of managing devices. For
the networks using NETCONF to deliver schedules, NETCONF over TLS<xref target="RFC7589"/> is recommended to achieve the bidirectional
authentication and encryption of YANG model data. RESTCONF supports TLS originally, so it can be deployed without
additional configurations or modifications.</t>
        <t>In addition, in time variant networks with centralized model<xref target="centralized-model"/>, the encryption of routing path
information is also necessary to avoid the fake routing information. Considering the most typical protocols used to
deliver the routing path information between controller and network devices are BGP and PCEP, and both are based on TCP.
Therefore, the TLS is recommended to be applied for the conservation.</t>
      </section>
      <section anchor="activity-identification">
        <name>Activity Identification and Privacy</name>
        <t>In certain scenarios, precise time information exchanged within the network could be correlated with specific user or
device behavior, inadvertently revealing private information.</t>
        <t>This risk could also be mitigated by the solutions mentioned in <xref target="activity-identification"/>.</t>
      </section>
      <section anchor="spoofing-and-manipulation-of-time-information">
        <name>Spoofing and Manipulation of Time Information</name>
        <t>In a time variant network, if an attacker were to inject false or manipulated time data into the network, it could cause
routers and devices to make incorrect decisions, potentially leading to traffic misrouting, network partitions, or
inefficient use of resources.</t>
        <t>This risk could also be mitigated by the solutions mentioned in <xref target="dos-attack"/>.</t>
      </section>
      <section anchor="replay-attacks-on-time-sensitive-data">
        <name>Replay Attacks on Time-Sensitive Data</name>
        <t>Time variant network data and schedule updates may be susceptible to replay attacks, which could cause network devices
to act on outdated information, leading to inconsistent routing decisions, misaligned schedules, or security gaps. In
particular, attackers could exploit replay attacks to force devices into outdated configurations or interfere with the
synchronization of schedules across the network.</t>
        <t>This kind of attack could be mitigated by encrypting time signals, schedules and routing path data, and adding a unique
number to the encrypted section of a packet. This has been implemented in existing protocols, for example, the NTS
supports unique identifier extension field (EF) containing a random number, the TLS supports Message Authentication Code
generated from sequence number.</t>
      </section>
      <section anchor="compromised-time-sources">
        <name>Compromised Time Sources</name>
        <t>The reliance on external time sources for synchronization purposes presents a potential attack surface for time-variant
networks. If a trusted time source, such as a GPS signal or an NTP server, is compromised, the attacker could feed
erroneous time information to the entire network, disrupting its operation.</t>
        <t>This kind of attack could be mitigated by implement multiple, redundant time sources or time synchronization protocols and regularly verify
the integrity of these sources. In addition, alerting mechanisms should be in place to detect significant deviations in
time data that could indicate an attack.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="I-D.ietf-tvr-schedule-yang">
          <front>
            <title>YANG Data Model for Scheduled Attributes</title>
            <author fullname="Yingzhen Qu" initials="Y." surname="Qu">
              <organization>Futurewei Technologies</organization>
            </author>
            <author fullname="Acee Lindem" initials="A." surname="Lindem">
              <organization>LabN Consulting, L.L.C.</organization>
            </author>
            <author fullname="Eric Kinzie" initials="E." surname="Kinzie">
              <organization>LabN Consulting, L.L.C.</organization>
            </author>
            <author fullname="Don Fedyk" initials="D." surname="Fedyk">
              <organization>LabN Consulting, L.L.C.</organization>
            </author>
            <author fullname="Marc Blanchet" initials="M." surname="Blanchet">
              <organization>Viagenie</organization>
            </author>
            <date day="20" month="October" year="2024"/>
            <abstract>
              <t>   The YANG model in this document includes three modules, and can be
   used to manage network resources and topologies with scheduled
   attributes, such as predictable link loss and link connectivity as a
   function of time.  The intent is to have this information be utilized
   by Time-Variant Routing systems.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tvr-schedule-yang-03"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.ietf-tvr-use-cases">
          <front>
            <title>TVR (Time-Variant Routing) Use Cases</title>
            <author fullname="Edward J. Birrane" initials="E. J." surname="Birrane">
              <organization>JHU/APL</organization>
            </author>
            <author fullname="Nicolas Kuhn" initials="N." surname="Kuhn">
              <organization>Thales Alenia Space</organization>
            </author>
            <author fullname="Yingzhen Qu" initials="Y." surname="Qu">
              <organization>Futurewei Technologies</organization>
            </author>
            <author fullname="Rick Taylor" initials="R." surname="Taylor">
              <organization>Ori Industries</organization>
            </author>
            <author fullname="Li Zhang" initials="L." surname="Zhang">
              <organization>Huawei</organization>
            </author>
            <date day="29" month="February" year="2024"/>
            <abstract>
              <t>   This document introduces use cases where Time-Variant Routing (TVR)
   computations (i.e. routing computations taking into considerations
   time-based or scheduled changes to a network) could improve routing
   protocol convergence and/or network performance.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tvr-use-cases-09"/>
        </reference>
        <reference anchor="I-D.ietf-tvr-requirements">
          <front>
            <title>TVR (Time-Variant Routing) Requirements</title>
            <author fullname="Daniel King" initials="D." surname="King">
              <organization>Lancaster University</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Brian Sipos" initials="B." surname="Sipos">
              <organization>JHU/APL</organization>
            </author>
            <author fullname="Li Zhang" initials="L." surname="Zhang">
              <organization>Huawei</organization>
            </author>
            <date day="13" month="September" year="2024"/>
            <abstract>
              <t>   Time-Variant Routing (TVR) refers to calculating a path or subpath
   through a network where the time of message transmission (or receipt)
   is part of the overall route computation.  This means that, all
   things being equal, a TVR computation might produce different results
   depending on the time that the computation is performed without other
   detectable changes to the network topology or other cost functions
   associated with the route

   This document introduces requirements where TVR computations could
   improve message exchange in a network.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tvr-requirements-04"/>
        </reference>
        <reference anchor="I-D.ietf-netmod-schedule-yang">
          <front>
            <title>A Common YANG Data Model for Scheduling</title>
            <author fullname="Qiufang Ma" initials="Q." surname="Ma">
              <organization>Huawei</organization>
            </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Daniel King" initials="D." surname="King">
              <organization>Lancaster University</organization>
            </author>
            <date day="7" month="February" year="2025"/>
            <abstract>
              <t>   This document defines a common schedule YANG module which is designed
   to be applicable for scheduling purposes such as event, policy,
   services, or resources based on date and time.  For the sake of
   better modularity, the module includes a set of recurrence related
   groupings with varying levels of representation (i.e., from basic to
   advanced) to accommodate a variety of requirements.  It also defines
   groupings for validating requested schedules and reporting scheduling
   status.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-netmod-schedule-yang-04"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC5905">
          <front>
            <title>Network Time Protocol Version 4: Protocol and Algorithms Specification</title>
            <author fullname="D. Mills" initials="D." surname="Mills"/>
            <author fullname="J. Martin" initials="J." role="editor" surname="Martin"/>
            <author fullname="J. Burbank" initials="J." surname="Burbank"/>
            <author fullname="W. Kasch" initials="W." surname="Kasch"/>
            <date month="June" year="2010"/>
            <abstract>
              <t>The Network Time Protocol (NTP) is widely used to synchronize computer clocks in the Internet. This document describes NTP version 4 (NTPv4), which is backwards compatible with NTP version 3 (NTPv3), described in RFC 1305, as well as previous versions of the protocol. NTPv4 includes a modified protocol header to accommodate the Internet Protocol version 6 address family. NTPv4 includes fundamental improvements in the mitigation and discipline algorithms that extend the potential accuracy to the tens of microseconds with modern workstations and fast LANs. It includes a dynamic server discovery scheme, so that in many cases, specific server configuration is not required. It corrects certain errors in the NTPv3 design and implementation and includes an optional extension mechanism. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5905"/>
          <seriesInfo name="DOI" value="10.17487/RFC5905"/>
        </reference>
        <reference anchor="RFC4330">
          <front>
            <title>Simple Network Time Protocol (SNTP) Version 4 for IPv4, IPv6 and OSI</title>
            <author fullname="D. Mills" initials="D." surname="Mills"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This memorandum describes the Simple Network Time Protocol Version 4 (SNTPv4), which is a subset of the Network Time Protocol (NTP) used to synchronize computer clocks in the Internet. SNTPv4 can be used when the ultimate performance of a full NTP implementation based on RFC 1305 is neither needed nor justified. When operating with current and previous NTP and SNTP versions, SNTPv4 requires no changes to the specifications or known implementations, but rather clarifies certain design features that allow operation in a simple, stateless remote-procedure call (RPC) mode with accuracy and reliability expectations similar to the UDP/TIME protocol described in RFC 868.</t>
              <t>This memorandum obsoletes RFC 1769, which describes SNTP Version 3 (SNTPv3), and RFC 2030, which describes SNTPv4. Its purpose is to correct certain inconsistencies in the previous documents and to clarify header formats and protocol operations for NTPv3 (IPv4) and SNTPv4 (IPv4, IPv6, and OSI), which are also used for SNTP. A further purpose is to provide guidance for home and business client implementations for routers and other consumer devices to protect the server population from abuse. A working knowledge of the NTPv3 specification, RFC 1305, is not required for an implementation of SNTP. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4330"/>
          <seriesInfo name="DOI" value="10.17487/RFC4330"/>
        </reference>
        <reference anchor="RFC7589">
          <front>
            <title>Using the NETCONF Protocol over Transport Layer Security (TLS) with Mutual X.509 Authentication</title>
            <author fullname="M. Badra" initials="M." surname="Badra"/>
            <author fullname="A. Luchuk" initials="A." surname="Luchuk"/>
            <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
            <date month="June" year="2015"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) provides mechanisms to install, manipulate, and delete the configuration of network devices. This document describes how to use the Transport Layer Security (TLS) protocol with mutual X.509 authentication to secure the exchange of NETCONF messages. This revision of RFC 5539 documents the new message framing used by NETCONF 1.1 and it obsoletes RFC 5539.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7589"/>
          <seriesInfo name="DOI" value="10.17487/RFC7589"/>
        </reference>
      </references>
    </references>
    <?line 571?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
    <section numbered="false" anchor="appendix-a-code-examples">
      <name>Appendix A: Code Examples</name>
      <section numbered="false" anchor="code-examples-for-tidal-network">
        <name>Code Examples for Tidal Network</name>
        <t>Tidal networks usually need to manage the availability of some node or interfaces. <xref target="ex-inf1"/> shows the example of a
scheduling node that is powered on from 12 AM, December 1, 2025 to 12 AM, December 1, 2026 in UTC and its interface
named "interface1" is scheduled to be enabled at 7:00 AM and disabled at 1:00 AM, every day, from December 1, 2025 to
December 1, 2026 in UTC.</t>
        <t>The JSON encoding is used only for illustration purposes.</t>
        <figure anchor="ex-inf1">
          <name>An Example of Interface Activation Scheduling</name>
          <artwork align="center"><![CDATA[
{
   "ietf-tvr-node:node-schedule":[
      {
         "node-id":12345678,
         "node-power-schedule":{
            "power-default":false,
            "schedules":[
               {
                  "schedule-id":111111,
                  "period-start":"2025-12-01T00:00:00Z",
                  "period-end":"2026-12-01T00:00:00Z",
                  "attr-value":{
                     "power-state":true
                  }
               }
            ]
         },
         "interface-schedule":[
            {
               "name":"interace1",
               "default-available":false,
               "default-bandwidth":1000000000,
               "attribute-schedule":{
                  "schedules":[
                     {
                        "schedule-id":222222,
                        "recurrence-first":{
                           "utc-start-time":"2025-12-01T07:00:00Z",
                           "duration":64800
                        },
                        "utc-until":"2026-12-01T00:00:00Z",
                        "frequency":"ietf-schedule:daily",
                        "interval":1,
                        "attr-value":{
                           "available":true
                        }
                     }
                  ]
               }
            }
         ]
      }
   ]
}
]]></artwork>
        </figure>
      </section>
      <section numbered="false" anchor="code-examples-for-dynamic-reachability-network">
        <name>Code Examples for Dynamic Reachability Network</name>
        <t>In a dynamic reachability network, the managing device usually needs to deliver the time-variant network topology to the network devices for them could react to
the predictable topology changes in time. <xref target="ex-inf2"/> shows the example of a topology with two nodes and one link. Due to the moving of these two nodes, the link between these two nodes will be interrupted from 10:00 AM to 10:05 and 10:10 AM to 10:20 AM, April 1, 2025 in UTC.</t>
        <t>The JSON encoding is used only for illustration purposes.</t>
        <figure anchor="ex-inf2">
          <name>An Example of Topology with Link Scheduling</name>
          <artwork align="center"><![CDATA[
{
    "ietf-tvr-topology:topology-schedule": {
        "nodes": [
            {
                "node-id": 10000000,
                "available": {
                    "default-node-available": true,
                    "schedules": []
                }
            },
            {
                "node-id": 10000001,
                "available": {
                    "default-node-available": true,
                    "schedules": []
                }
            }
        ],
        "links": [
            {
                "source-node": 10000000,
                "source-link-id": 32,
                "available": {
                    "schedules": [
                        {
                            "schedule-id": 111111,
                            "period-description": "schedule down1",
                            "period-start": "2025-4-01T10:00:00Z",
                            "period-end": "2025-4-01T10:05:00Z",
                            "attr-vaule": {
                                "link-available": false
                            }
                        },
                        {
                            "schedule-id": 222222,
                            "period-description": "schedule down2",
                            "period-start": "2025-4-01T10:10:00Z",
                            "period-end": "2025-4-01T10:20:00Z",
                            "attr-vaule": {
                                "link-available": false
                            }
                        }
                    ]
                }
            }
        ]
    }
}
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact fullname="Daniel King">
        <organization>Lancaster University</organization>
        <address>
          <postal>
            <country>United Kingdom</country>
          </postal>
          <email>d.king@lancaster.ac.uk</email>
        </address>
      </contact>
      <contact fullname="Charalampos (Haris) Rotsos">
        <organization>Lancaster University</organization>
        <address>
          <email>c.rotsos@lancaster.ac.uk</email>
        </address>
      </contact>
      <contact fullname="Peng Liu">
        <organization>China Mobile</organization>
        <address>
          <email>liupengyjy@chinamobile.com</email>
        </address>
      </contact>
      <contact fullname="Tony Li">
        <organization>Juniper Networks</organization>
        <address>
          <email>tony.li@tony.li</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
