<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-zdm-tvr-applicability-03" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.29.0 -->
  <front>
    <title abbrev="Applicability Statement">Applicability of TVR YANG Data Models</title>
    <seriesInfo name="Internet-Draft" value="draft-zdm-tvr-applicability-03"/>
    <author fullname="Li Zhang">
      <organization>Huawei</organization>
      <address>
        <email>zhangli344@huawei.com</email>
      </address>
    </author>
    <author fullname="Jie Dong">
      <organization>Huawei</organization>
      <address>
        <email>jie.dong@huawei.com</email>
      </address>
    </author>
    <author fullname="Mohamed Boucadair">
      <organization>Orange</organization>
      <address>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <date year="2025" month="July" day="07"/>
    <area>Routing</area>
    <workgroup>Time-Variant Routing</workgroup>
    <keyword>schedule</keyword>
    <keyword>YANG module</keyword>
    <keyword>applicability</keyword>
    <abstract>
      <?line 56?>

<t>Time-Variant Routing (TVR) is a routing system that can support the predicted topology changes caused by internal or
external reasons. Typical use cases include resource preservation networks, operating efficiency networks and dynamic
reachability networks.
This document provides examples of how to implement the TVR scheduling capabilities for key use cases. It describes
which part of the TVR data model is used and why, and it outlines operational and security considerations when deploying
TVR-based technologies.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Time-Variant Routing Working Group mailing list (tvr@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tvr/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/zhangli-abcd/TVR-Applicability-2"/>.</t>
    </note>
  </front>
  <middle>
    <?line 65?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Time-Variant Routing (TVR) Working Group addresses a growing need in modern network environments where
predictable variations in topology - such as the restoration, activation, or loss of network elements, are
part of normal operations. This approach is essential in dynamic networks with mobile nodes, where links may
be frequently disrupted and re-established due to mobility or in networks with highly predictable traffic
patterns, where links may be powered down to conserve or reduce energy.</t>
      <t>This document provides examples of implementing TVR scheduling capabilities in identified use cases. It
demonstrates the applicability of the TVR data model, methods for disseminating the TVR schedules, and the
necessary IETF ancillary technologies for network environments, such as time synchronization and policy,
that support TVR capabilities.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<!--
# Use Case Examples

## Tidal Network Use Case

A tidal network is a typical scenario of an Energy Efficient case ({{Section 3 of I-D.ietf-tvr-use-cases}}).
The tidal network means that the volume of traffic in the network changes periodically, like the ocean tide.
These changes are mainly affected by human activities. Therefore, this tidal effect is obvious in
human-populated areas, such as campuses and airports.

In the context of a tidal network, if the network maintains all the devices up to guarantee a maximum
throughput all the time, often, power will be wasted on network resources that are not being used. Energy-saving methods may include the deactivation
of some or all components of network nodes. These activities have the potential to alter network topology and
impact data routing/forwarding in a variety of ways. Interfaces on network nodes can be selectively disabled
or enabled based on traffic patterns, thereby reducing the energy consumption of nodes during periods of low
network traffic.

## Dynamic Reachability Use Case

Dynamic Reachability referred to the scenarios where a node is placed on a mobile platform, the mobility of the
platform may cause changes to the topology of the network over time{{Section 4 of I-D.ietf-tvr-use-cases}}. As the
relative mobility between and among nodes in the network and the impacts of the environment on the signal
propagation can be predicted, the associated loss and establishment of adjacencies can also be planned for.

The typical detailed use cases of Dynamic Reachability include but not limited to satellite network, predictable moving
vessels and vehicles.

-->

</section>
    <section anchor="applicability-of-tvr-yang-model">
      <name>Applicability of TVR Yang Model</name>
      <t>The TVR data model <xref target="I-D.ietf-tvr-schedule-yang"/> defines the TVR node YANG module and TVR topology YANG module. This
clause discusses the applicability of these two modules separately.</t>
      <section anchor="applicability-node-yang">
        <name>Applicability of TVR Node YANG Module</name>
        <t>As specified in <xref section="5.2" sectionFormat="of" target="I-D.ietf-tvr-schedule-yang"/>, module ietf-tvr-node.yang is a device model and designed to manage a
single node with scheduled attributes. It is not necessary in all TVR use cases.</t>
        <t>The applicability of TVR node YANG module depends on whether changes in the attributes of network devices are caused by
the environment or centrally controlled.</t>
        <ul spacing="normal">
          <li>
            <t>When the changes are caused by the environment changes (such as movement, sunlight changes, and weather changes) or
the devices themselves decisions, the network device does not need to get the managed information through the YANG module. For example,
when two nodes's distance is too fat to establish connection, then the link is down. Another case is that when the weather is
not good and leading to the link degradation, then the nodes decide to disconnect the link.</t>
          </li>
          <li>
            <t>When the changes are caused by the centralized control (such as a controller, or an orchestrator), the devices themselves
does not know when to adjust the attributes. In this case, the scheduled attributes changes should be delivered to the
network devices through TVR node YANG module.</t>
          </li>
        </ul>
      </section>
      <section anchor="applicability-topology-yang">
        <name>Applicability of TVR Topology YANG Module</name>
        <t>As specified in <xref section="5.3" sectionFormat="of" target="I-D.ietf-tvr-schedule-yang"/>, module ietf-tvr-topology.yang describes a network topology
with a time-variant availability schedule. This YANG module is also not applicable for all TVR use cases.</t>
        <t>According to the description of <xref section="3.1" sectionFormat="of" target="I-D.ietf-tvr-requirements"/>, the scheduling generation locality
and execution locality may be centralized or distributed.</t>
        <ul spacing="normal">
          <li>
            <t>When the schedules are generated and executed in distributed manner, which means that each node generates and executes its specific
schedules. In this scenario, the topology YANG module is not necessary, the devices can collect topology schedules by other means.
This scenario is outside of the scope of this document.</t>
          </li>
          <li>
            <t>When the schedules are generated and executed in centralized manner and within the same device, the topology YANG module is also not applicable.
Therefore, this scenario is also outside of the scope of this document.</t>
          </li>
          <li>
            <t>When the schedules are generated and executed in centralized manner but on different devices. For example, the schedule is
generated by the managing device, and executed by the network controller. In this scenario the scheduled topology changes
need to be sent to the execution device through the topology YANG module. This scenario is called "Centralized Scenario".</t>
          </li>
          <li>
            <t>When the schedules are generated in a centralized manner and executed in a distributed manner, the YANG module
needs to be used to deliver the scheduled topology changes to the managed device. This scenario is called "Distributed Scenario".</t>
          </li>
        </ul>
        <section anchor="centralized-scenario">
          <name>Interactions in Centralized Scenario</name>
          <t>In the centralized scenario, the network managing device generates and maintains schedules, the routing application
is deployed in the network controller, and the network devices execute the schedules and routing results.
The following figure shows the components of the centralized scenario.</t>
          <figure anchor="ref-to-fig1">
            <name>Components of Centralized Scenario</name>
            <artwork><![CDATA[
 +-----------------------------------------------------------------+
 |                        Managing Device                          |
 +-----------------------------------------------------------------+
            |                                           |
Topology YANG Module                        Node YANG Module(optional)
            |                                           |
 +---------\|/----------+                     +--------\|/--------+
 |  Network Controller  |---Routing Results-->|  Network Devices  |
 +----------------------+                     +-------------------+
]]></artwork>
          </figure>
          <t>A centralized scenario involves the interaction between the managing device and network controller, the managing
device and network devices, and the controller and network devices.</t>
          <t>The managing device may need to deliver node-specific schedules to network devices by TVR Schedule Node YANG
module <xref section="5.2" sectionFormat="of" target="I-D.ietf-tvr-schedule-yang"/>. This is optional and only necessary when the node attribute changes
are instructed by the controller. In the meanwhile, the network devices need to report their own status data to the managing device.</t>
          <t>The managing device needs to deliver the schedules of network topology to the network controller by the TVR Network
Topology YANG module <xref section="5.3" sectionFormat="of" target="I-D.ietf-tvr-schedule-yang"/>, so that the routing application in the controller
can consider the impact of topology changes on routes when calculating routes.</t>
          <t>The network controller should deliver the route calculation results to the network devices. The format of the routing
results depend on the protocols deployed (The typical protocols include BGP, PCEP, etc.). The routing results for a period
in the future could be sent to the network devices in wall-clock time or be packed and sent at some special points.</t>
        </section>
        <section anchor="distributed-scenario">
          <name>Interactions in Distributed Scenario</name>
          <t>In the distributed scenario, the managing device generates and maintains schedules, the routing application
is deployed in the network devices which also executes schedules and route calculation.</t>
          <figure anchor="ref-to-fig2">
            <name>Components of Distributed Scenario</name>
            <artwork><![CDATA[
 +-------------------------------------------------+
 |                  Managing Device                |
 +-------------------------------------------------+
                          |
               Topology YANG Module and
               Node YANG Module(optional)
                          |
 +-----------------------\|/-----------------------+
 |         Managed Devices (Network Devices)        |
 +-------------------------------------------------+
]]></artwork>
          </figure>
          <t>The distributed model only involves the interaction between managing devices and network devices(managed devices).</t>
          <t>The managing device need to deliver network topology schedules to all the network devices by TVR Network Topology Yang
module for route calculation. The managing device may also need to deliver node-specific schedules to network devices by
TVR Schedule Node YANG module, this is optional and only necessary when the node attributes changes are instructed by
the controller. The network devices need to report their own status data to the managing device.</t>
        </section>
      </section>
      <section anchor="encoding-of-the-yang-model">
        <name>Encoding of the YANG Model</name>
        <t>The TVR data model <xref target="I-D.ietf-tvr-schedule-yang"/> can manage network resources and topologies with scheduled
attributes. There are modules defined in the TVR data model, these are:</t>
        <ul spacing="normal">
          <li>
            <t>The “ietf-tvr-schedule” module contains the schedule YANG definitions. This module uses groupings from <xref target="I-D.ietf-netmod-schedule-yang"/> data model;</t>
          </li>
          <li>
            <t>The “ietf-tvr-topology” module defines a network topology with a time-variant availability schedule;</t>
          </li>
          <li>
            <t>The “ietf-tvr-node” module is to be used to manage the scheduled attributes of a single node.</t>
          </li>
        </ul>
        <t>To create a schedule, the following TVR data model objects and subsequent branches are used:</t>
        <ul spacing="normal">
          <li>
            <t>‘node-schedule’</t>
          </li>
          <li>
            <t>‘interface-schedule’</t>
          </li>
          <li>
            <t>‘attribute-schedule’</t>
          </li>
        </ul>
        <t>A TVR scenario example is provided below, where a wireless link is shut down for 12 hours, from 19:00 to 7am the next day.
The schedule is identified using a unique identifier that is conveyed in ‘schedule-id’, and the recurring schedule can be applied for multiple days using Coordinated
Universal Time (UTC).
More detailed examples of the json code is provided in this documents Appendix.</t>
        <artwork><![CDATA[
{
   "ietf-tvr-node:node-schedule":[
      {
         "node-id":1234567890,
         "node-power-schedule":{
            "power-default":true,
         },
         "interface-schedule":[
            {
               "name":"Wlan0",
               "default-available":false,
               "attribute-schedule":{
                  "schedules":[
                     {
                        "schedule-id":111111,
                        "recurrence-first":{
                           "utc-start-time":"2025-12-01T19:00:00Z",
                           "duration":43200
                        },
                        "utc-until":"2026-12-01T00:00:00Z",
                        "frequency":"ietf-schedule:daily",
                        "interval":1,
                        "attr-value":{
                           "available":true
                        }
                     }
                  ]
               }
            }
         ]
      }
   ]
}
]]></artwork>
        <t>The methods for disseminating and propagating the generated schedules are discussed in the following subsections.</t>
      </section>
      <section anchor="management-protocols-for-tvr">
        <name>Management Protocols for TVR</name>
        <t>The TVR data model is designed to be accessed via YANG-based management protocols such as NETCONF <xref target="RFC6241"/>, RESTCONF
<xref target="RFC8040"/> and CORECONF<xref target="I-D.ietf-core-comi-19"/>. This section discusses the applicability of these protocols for
configuring time-variant network resources using the TVR YANG data models.</t>
        <t>NETCONF provides a robust mechanism for managing complex network configurations, particularly when transactional integrity
and operational consistency are required. Its ability to execute atomic transactions ensures that schedules involving
multiple resources are applied fully, preventing partial updates that could lead to configuration inconsistencies. This
feature is important for time-sensitive scheduling in TVR environments. Additionally, NETCONF supports the validation of
configurations prior to commitment, allowing operators to verify the correctness of schedules before they are applied.
It also includes rollback capabilities, such as restoring a previous configuration during scheduling errors.</t>
        <t>In contrast, RESTCONF offers a simpler, stateless method for interacting with network devices, making it suitable for use
cases requiring lightweight, rapid configuration. RESTCONF utilizes a RESTful interface over HTTP, providing a streamlined
approach to network configuration and management. Therefore, RESTCONF may be advantageous in scenarios where quick adjustments
to schedules are needed or where integration with web-based or cloud-native systems is a priority.</t>
        <t>CORECONF provides a lightweight, stateless method for managing small network devices where saving bytes to transport a
message is very important. CORECONF uses CoAP<xref target="RFC7252"/> methods to access structured data defined in YANG which is a complementary to RESTCONF.
Contrary to RESTCONF, CORECONF many design decisions are motivated by the saving of bytes. Therefore, CORECONF is advantageous
in networks with constrained devices and very limited transmission bandwidth, especially in IoT devices that already deployed CoAP.</t>
        <t>Depending on the type of node in the TVR network, NETCONF would be the preferred protocol for large-scale, critical scheduling
operations requiring validation and rollback mechanisms. For smaller-scale or isolated scheduling tasks, RESTCONF provides an
efficient and straightforward option without the need for the transactional features offered by NETCONF. CORECONF is preferred
in resource constrained IoT networks where saving message bytes is a priority. The choice of protocol
to use with the TVR YANG model should be driven by the specific requirements of the network environment and the complexity of
the scheduling tasks involved.</t>
        <t>The security aspects of these management protocols, including their strengths and weaknesses, are discussed further in
<xref target="security-considerations"/> of this document.</t>
      </section>
    </section>
    <section anchor="time-synchronization">
      <name>Time Synchronization</name>
      <t>Time Synchronization is fundamental for ensuring that TVR mechanisms, which depend on highly accurate timing, function as intended across
an entire network. Misalignment in time could lead to serious routing issues, including inefficiency in path forwarding,
instability in routing tables, and traffic outages.</t>
      <t>Time Synchronization mechanisms will be used to ensure:</t>
      <ul spacing="normal">
        <li>
          <t>Coordination of Planned Network Events;</t>
        </li>
        <li>
          <t>Verification of TVR Data Model Time Stamps</t>
        </li>
        <li>
          <t>Accurate Scheduling of Paths;</t>
        </li>
        <li>
          <t>Fault Tolerance.</t>
        </li>
      </ul>
      <t>Different time-variant scenarios may require different granularities of time synchronization. For example, the
period of traffic and topology changes in tidal networks is usually a day or week. Therefore, a second-level time
synchronization is enough. However, for the dynamic reachability scenarios, a fine-granularity time synchronization may
be necessary, as the nodes may moving very fast in some cases (the moving speed of a low earth orbit satellite is more than 7900 m/s)</t>
      <t>Existing clock synchronization protocols can be classified into hardware-based protocols and software-based protocols.</t>
      <t>Hardware-based protocols often rely on dedicated hardware to ensure clock synchronization, such as Satellite Based Timing Service (SBTS)
and Precision Time Protocol (PTP). The SBTS includes but not limited to Global Position System (GPS),
BeiDou Navigation Satellite System(BDS), Global Navigation Satellite System(GLONASS), and Galileo satellite navigation system.
Software-based protocols, on the other hand, synchronize clocks through software packages running on systems, such as Network
Time Protocol (NTP) <xref target="RFC5905"/> and Simple Network Time Protocol (SNTP) <xref target="RFC4330"/>.</t>
      <t>The security aspects of time synchronization mechanisms are discussed further in <xref target="security-considerations"/> of this document.</t>
      <section anchor="hardware-based-time-synchronization-mechanisms">
        <name>Hardware-based Time Synchronization Mechanisms</name>
        <t>Hardware-based protocols typically have higher precision and stability, but also have higher cost due to the dedicated hardware. SBTS and PTP are the typical hardware-based time synchronization mechanisms.</t>
        <t>SBTS provides a precise time synchronization service based on the signals transmitted by the satellites. SBTS can realize the micro-second level time synchronization among the devices installed with SBTS reviver hardware.</t>
        <t>PTP is a network protocol that complies with the IEEE 1588 standard and is used to implement high-precision time synchronization between network nodes. PTP implements time synchronization by transmitting synchronization messages between master and slave devices. Based on the hardware timestamp, the precision of time synchronization is much higher than that of NTP, and can reach the sub-microsecond level or even tens of nanoseconds.  When deploying PTP in TVR networks, the managing devices should be the master and the network devices and controller should be the slaves which get time from the master.</t>
        <t>Both SBTS and PTP can realize micro-second level time synchronization. Depending on the features of TVR network, the SBTS would be the preferred mechanisms for
large-scale, high dynamic and open-air networks, especially networks with unreliable links as it does not require network links to exchange time information.
For the small-scale networks with stable links but have high-precision time synchronization requirements, the PTP is much preferred.</t>
      </section>
      <section anchor="software-based-time-synchronization-protocols">
        <name>Software-based Time Synchronization Protocols</name>
        <t>Software-based protocols are simple and applicable to common hardware devices, but have lower precision (For
example, the NTP can realize the synchronization at tens of milliseconds level).</t>
        <section anchor="ntp">
          <name>NTP</name>
          <t>NTP uses a hierarchical structure of time sources. Each level of this hierarchy is termed a stratum. Generally, an NTP
server synchronized to an authoritative clock runs at stratum 1. Such NTP server functions as the primary time server
to provide clock synchronization for other devices on the network. Stratum 2 servers obtain time from stratum 1 servers,
stratum 3 servers obtain time from stratum 2 servers, and so on.</t>
          <t>In TVR use cases, the managing device functions as a level-1 NTP server and synchronized to an authoritative clock
source. The network controller and network devices behave as clients to obtain accurate time from the managing device.
<xref target="ref-to-fig3"/> shows an NTP deployment scenario for obtaining clock from a GPS clock source.</t>
          <figure anchor="ref-to-fig3">
            <name>Deployment Case of NTP in Tidal Networks</name>
            <artwork><![CDATA[
                           +--------------------+
                           |  GPS Clock Source  |
                           +--------------------+
                                     |
               +--------------------\|/------------------+
Stratum 1      |             Managing Device             |
               +-----------------------------------------+
                     |                             |
                     |                             |
                     |                             |
          +---------\|/----------+       +--------\|/--------+
Stratum 2 |  Network Controller  |       |  Network Devices  |
          +----------------------+       +-------------------+

]]></artwork>
          </figure>
          <t>NTP is preferred in large-scale networks with reliable links and long-term changes, which dose not require a high-precision time synchronization.</t>
        </section>
        <section anchor="sntp">
          <name>SNTP</name>
          <t>SNTP is a subset of the NTP used to synchronize computer clocks in the Internet. It simplifies the complex NTP
synchronization function and has lower clock precision, but the synchronization precision still can be guarded under
seconds. SNTP is also preferred in large-scale networks with reliable links, long-term changes, and loose synchronization precision. In addition, it is more suitable for networks with limited resources than NTP.</t>
        </section>
      </section>
    </section>
    <section anchor="schedule-database">
      <name>Schedule Database</name>
      <t>The schedule database is used to store and maintain schedules, the database may be deployed on a managing device
and managed devices based on requirements.</t>
      <t>The source of the schedule database may be diversified, for example, configuration from an administrator
or YANG model from the management interface. The schedule entries of different databases may be different, but the
content of the same schedule entry in the schedule databases of different devices in the same domain must be
consistent. There are at least two ways to make the content of the same schedule entry in different schedule databases
consistent:</t>
      <ul spacing="normal">
        <li>
          <t>All the schedule entries are generated at a specific device;</t>
        </li>
        <li>
          <t>Schedule entries are generated at different devices, but there is a synchronization mechanism to synchronize the
schedule databases among devices.</t>
        </li>
      </ul>
      <t>Option 1 is simplest and easy to implement. In a time-variant domain, the managing device may receive scheduling
requests and generate all schedule entries. Then the schedule entries are delivered to the necessary network devices
in the domain through the TVR YANG model.</t>
      <t>Option 2 relies on advertisement mechanisms (such as routing techniques) to advertise the scheduling data generated
by itself to other devices. This could be achieved using extensions to existing routing schemes and techniques.</t>
      <t>These options will be discussed with the TVR Working Group, and agreed approaches will be documented in future versions
of this Internet Draft.</t>
      <section anchor="data-structure">
        <name>Data Structure</name>
        <t><xref target="I-D.ietf-tvr-schedule-yang"/> defines a TVR Node and TVR Topology YANG modules. The Node YANG module
includes node power schedules and interface schedules. The Topology YANG module includes node schedules and link schedules.</t>
        <t>Based on the preceding four schedule types, the schedule database should contain four types of schedule entries in
different formats:</t>
        <ul spacing="normal">
          <li>
            <t>Node power schedule entry;</t>
          </li>
          <li>
            <t>Interface schedule entry;</t>
          </li>
          <li>
            <t>Node schedule entry;</t>
          </li>
          <li>
            <t>Link schedule entry;</t>
          </li>
        </ul>
        <t>The detailed format and fields of different types of schedule entries could reference to the definitions of the corresponding
YANG modules.</t>
        <t>Editor’s note: Code examples will be provided here in future versions of this document.</t>
      </section>
      <section anchor="schedule-operations">
        <name>Schedule Operations</name>
        <t>This section provides general requirements for using the TVR schedules.</t>
        <t>The schedule database should support the add, update, and delete operations.</t>
        <t>When adding or updating a schedule entry, the execution node needs to check whether resource conflicts exist between the
current schedule and existing schedules. If a conflict exists, the operation should be failed.</t>
        <t>Schedules are updated and deleted based on schedule IDs. Therefore, schedule IDs must be unique in a time-variant domain.
This can be handled, e.g., by a dedicated allocation agent within the time-variant domain.</t>
        <t>Editor’s note: Future versions of this document will expand on the schedule operations requirements and best practices.</t>
      </section>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>Several operational considerations exist when using TVR techniques and data models in a network. This section provides
some high-level observations and more detailed sub-sections for specific consideration related to schedule dissemination,
execution, and recovery in case of failure to apply a schedule or partial change.</t>
      <ul spacing="normal">
        <li>
          <t>Coordinated Network Events: TVR often coordinates routing changes anticipating events like predictable low-traffic
periods or link downtimes (e.g., scheduled maintenance or traffic demand).</t>
        </li>
        <li>
          <t>Accurate Scheduling of Paths: TVR schedules capable routers and network nodes will dynamically adjust forwarding paths
based on planned changes in link availability or network conditions.</t>
        </li>
        <li>
          <t>Time-Stamped Data Models: TVR will require the use time-stamped data models (e.g., schedules for link changes or
availability windows) to make interface management decisions. This ensures that all TVR nodes interpret the timing of
events consistently and implement time-based policies correctly.</t>
        </li>
      </ul>
      <t>Therefore, network time accuracy and time-stamped data models are critical to ensure that coordinated network events
and scheduled path decisions across the network are based on a consistent time reference. Without accurate time sync,
nodes could apply different schedules, causing routing inconsistencies, path flapping, or packet loss.</t>
      <section anchor="schedule-dissemination">
        <name>Schedule Dissemination</name>
        <t>when distributing schedules, the following problems should be considered:</t>
        <ul spacing="normal">
          <li>
            <t>The managed devices that receives a schedule should have the ability to execute the schedule. It is meaningless to send
a schedule to a managed device that does not have the ability to execute the schedule. If the device does not support schedule
execution, it must ignore it on receipt.</t>
          </li>
          <li>
            <t>Before distributing schedules to a managed device, the managing device need to ensure that the time of the managing
device is synchronized with that of the managed device. If the time is not synchronized, the schedules will be executed at
a wrong timepoint and may causing unexpected network faults.</t>
          </li>
          <li>
            <t>The distributing of a schedule should be earlier than the earliest start time of the schedule, this ensures that the
managed device has enough time to execute this schedule.</t>
          </li>
        </ul>
      </section>
      <section anchor="schedule-execution">
        <name>Schedule Execution</name>
        <t>Schedule execution means that a component (e.g., device) undertakes an action (e.g., allocates and deallocates resources)
at specified time points. The schedule execution of Node Module and Topology Module should be considered separately.</t>
        <section anchor="execution-of-node-schedule">
          <name>Execution of Node Schedule</name>
          <t>Node schedule execution indicates a node to change its node/interfaces availability/power up
and down, and other attributes directly or by commands.</t>
          <t>when executing a node schedule, the schedule executor should undertake an action at specified time points as indicated in the schedule.</t>
        </section>
        <section anchor="execution-of-topology-module-schedule">
          <name>Execution of Topology Module Schedule</name>
          <t>Topology schedule execution means a node take some measures before or upon the scheduled topology changes.</t>
          <t>The schedule executor should understand the consequences of the schedule execution. The addition and deletion of the topology
need to be considered separately.</t>
          <t>A link coming up or a node joining a topology should not have any functional change until the change is proven to be fully
operational. The routing paths may be pre-computed but should not be installed before all the topology changes are
confirmed to be operational. The benefits of this pre-computation appear to be very small. The network may choose to
not do any pre-installation or pre-computation in reaction to topological additions at a small cost of some operational
efficiency.</t>
          <t>Topological deletions are an entirely different matter. If a link or node is to be removed from the topology, then the
network should act before the anticipated change to route traffic around the expected topological change. Specifically,
at some point before the planned topology change, the routing paths should be pre-computed and installed before the
topology change takes place. The required time to perform such planned action will vary depending on the exact network
and configuration. When using an IGP or other distributed routing protocols, the affected links may be set to a high
metric to direct traffic to alternate paths. This type of change does require some time to propagate through the
network, so the metric change should be initiated far enough in advance that the network converges before the actual
topological change.</t>
          <t>In addition to the addition and deleting of topology, a schedule may indicate the attributes change of some links, such as bandwidth and delay.
If an attribute changes better (such as latency decrease and bandwidth increase), then the executer should take actions later
or until the topology change is proven to be fully operational.
If an attribute changes worse (such as latency increase and bandwidth decrease), then the node should react to it before the change take place.</t>
        </section>
      </section>
      <section anchor="schedule-recovery">
        <name>Schedule Recovery</name>
        <t>Schedule recovery means when a node lost its specific schedule data, it should be able to recover these schedule data.
Typical scenarios include data loss due to device restart, disconnection from managing devices and failure to receive new
schedules for a long time. In these scenarios, once the connection between the managed device and the managing device is
established again, the managing device needs to re-distribute all schedules that start time is later than the current moment
to the managed device after time synchronization is finished.</t>
      </section>
      <section anchor="error-handling">
        <name>Error Handling</name>
        <section anchor="consistency-error">
          <name>Consistency Error</name>
          <t>Consistency error means that some time parameters conflict with other time parameters in the same schedule or in other schedules.</t>
          <ul spacing="normal">
            <li>
              <t>If the time parameters of a schedule conflict with each other, for example, the period-start bigger than period-end,
the duration is longer than the product of frequency and interval, or the duration is longer than utc-until, then the schedule
should be discarded and an error should be returned to the managed device.</t>
            </li>
            <li>
              <t>If there is a conflict between schedules, for example, schedule1 indicates that interface B is closed at time A, but
schedule2 indicates that interface B is open at time A, then all conflicting schedules should be discarded and an error
should be returned to the managed device.</t>
            </li>
          </ul>
          <t>Editor's Note: multi-manager scenarios need to be considered.</t>
        </section>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The integration of time-variant mechanisms in network operations presents distinct security challenges that require thorough
analysis to safeguard the network’s integrity, availability, and confidentiality. Networks that rely on time-sensitive data
for routing and forwarding decisions are particularly susceptible to attacks that exploit timing dependencies.</t>
      <t>The "Security Considerations" section of <xref target="I-D.ietf-tvr-requirements"/> outlines various threat vectors and categories specific
to time-variant environments.</t>
      <section anchor="dos-attack">
        <name>Denial-of-Service (DoS) Attack</name>
        <t>In a time-variant network, malicious actors could attack the network by disrupting or manipulating the time synchronization
process. For example, an attacker could intentionally delay or corrupt time signals exchanged within the network, leading
to routing errors and widespread denial-of-service (DoS) attacks.</t>
        <t>This kind of attack could be mitigated by the redundancy time synchronization mechanisms, for example, multiple NTP sources
or multiple time synchronization protocols could be deployed in a TVR network. The network devices could guarantee the
correctness of the time by checking whether the time signals from different sources or protocols.</t>
        <t>In addition, the identification authentication is also an important way to protect the time signals being tampered by
attackers. Some security extensions for time synchronization protocols (such as NTS (Network Time Security)) are
recommended to be applied.</t>
      </section>
      <section anchor="traffic-analysis">
        <name>Traffic Analysis and Path Prediction</name>
        <t>In a time-variant network, if time information is not adequately protected, attackers could conduct traffic analysis to
infer routing decisions, network load, or usage patterns. The schedule ability could enable attackers to launch highly
targeted attacks, such as selectively overloading certain links or intercepting sensitive communications.</t>
        <t>This kind of attack could be mitigated by the encryption of schedules and the authentication of managing devices. For
the networks using NETCONF to deliver schedules, NETCONF over TLS<xref target="RFC7589"/> is recommended to achieve the bidirectional
authentication and encryption of YANG model data. RESTCONF supports TLS originally, so it can be deployed without
additional configurations or modifications.</t>
        <t>In addition, in time variant networks with centralized scenario<xref target="centralized-scenario"/>, the encryption of routing path
information is also necessary to avoid the fake routing information. Considering the most typical protocols used to
deliver the routing path information between controller and network devices are BGP and PCEP, and both are based on TCP.
Therefore, the TLS is recommended to be applied for the conservation.</t>
      </section>
      <section anchor="activity-identification">
        <name>Activity Identification and Privacy</name>
        <t>In certain scenarios, precise time information exchanged within the network could be correlated with specific user or
device behavior, inadvertently revealing private information.</t>
        <t>This risk could also be mitigated by the solutions mentioned in <xref target="activity-identification"/>.</t>
      </section>
      <section anchor="spoofing-and-manipulation-of-time-information">
        <name>Spoofing and Manipulation of Time Information</name>
        <t>In a time-variant network, if an attacker were to inject false or manipulated time data into the network, it could cause
routers and devices to make incorrect decisions, potentially leading to traffic misrouting, network partitions, or
inefficient use of resources.</t>
        <t>This risk could also be mitigated by the solutions mentioned in <xref target="dos-attack"/>.</t>
      </section>
      <section anchor="replay-attacks-on-time-sensitive-data">
        <name>Replay Attacks on Time-Sensitive Data</name>
        <t>Time-variant network data and schedules updates may be susceptible to replay attacks, which could cause network devices
to act on outdated information, leading to inconsistent routing decisions, misaligned schedules, or security gaps. In
particular, attackers could exploit replay attacks to force devices into outdated configurations or interfere with the
synchronization of schedules across the network.</t>
        <t>This kind of attack could be mitigated by encrypting time signals, schedules and routing path data, and adding a unique
number to the encrypted section of a packet. This has been implemented in existing protocols, for example, the NTS
supports unique identifier extension field (EF) containing a random number, the TLS supports Message Authentication Code
generated from sequence number.</t>
      </section>
      <section anchor="compromised-time-sources">
        <name>Compromised Time Sources</name>
        <t>The reliance on external time sources for synchronization purposes presents a potential attack surface for time-variant
networks. If a trusted time source, such as a GPS signal or an NTP server, is compromised, the attacker could feed
erroneous time information to the entire network, disrupting its operation.</t>
        <t>This kind of attack could be mitigated by the solutions mentioned in <xref target="dos-attack"/>.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="I-D.ietf-tvr-schedule-yang">
          <front>
            <title>YANG Data Model for Scheduled Attributes</title>
            <author fullname="Yingzhen Qu" initials="Y." surname="Qu">
              <organization>Futurewei Technologies</organization>
            </author>
            <author fullname="Acee Lindem" initials="A." surname="Lindem">
              <organization>Arrcus, Inc.</organization>
            </author>
            <author fullname="Eric Kinzie" initials="E." surname="Kinzie">
              <organization>LabN Consulting, L.L.C.</organization>
            </author>
            <author fullname="Don Fedyk" initials="D." surname="Fedyk">
              <organization>LabN Consulting, L.L.C.</organization>
            </author>
            <author fullname="Marc Blanchet" initials="M." surname="Blanchet">
              <organization>Viagenie</organization>
            </author>
            <date day="4" month="July" year="2025"/>
            <abstract>
              <t>   The YANG model in this document includes three modules, and can be
   used to manage network resources and topologies with scheduled
   attributes, such as predictable link loss and link connectivity as a
   function of time.  The intent is to have this information be utilized
   by Time-Variant Routing systems.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tvr-schedule-yang-05"/>
        </reference>
        <reference anchor="RFC9657">
          <front>
            <title>Time-Variant Routing (TVR) Use Cases</title>
            <author fullname="E. Birrane, III" initials="E." surname="Birrane, III"/>
            <author fullname="N. Kuhn" initials="N." surname="Kuhn"/>
            <author fullname="Y. Qu" initials="Y." surname="Qu"/>
            <author fullname="R. Taylor" initials="R." surname="Taylor"/>
            <author fullname="L. Zhang" initials="L." surname="Zhang"/>
            <date month="October" year="2024"/>
            <abstract>
              <t>This document introduces use cases where Time-Variant Routing (TVR) computations (i.e., routing computations that take into consideration time-based or scheduled changes to a network) could improve routing protocol convergence and/or network performance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9657"/>
          <seriesInfo name="DOI" value="10.17487/RFC9657"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.ietf-tvr-use-cases">
          <front>
            <title>TVR (Time-Variant Routing) Use Cases</title>
            <author fullname="Edward J. Birrane" initials="E. J." surname="Birrane">
              <organization>JHU/APL</organization>
            </author>
            <author fullname="Nicolas Kuhn" initials="N." surname="Kuhn">
              <organization>Thales Alenia Space</organization>
            </author>
            <author fullname="Yingzhen Qu" initials="Y." surname="Qu">
              <organization>Futurewei Technologies</organization>
            </author>
            <author fullname="Rick Taylor" initials="R." surname="Taylor">
              <organization>Ori Industries</organization>
            </author>
            <author fullname="Li Zhang" initials="L." surname="Zhang">
              <organization>Huawei</organization>
            </author>
            <date day="29" month="February" year="2024"/>
            <abstract>
              <t>   This document introduces use cases where Time-Variant Routing (TVR)
   computations (i.e. routing computations taking into considerations
   time-based or scheduled changes to a network) could improve routing
   protocol convergence and/or network performance.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tvr-use-cases-09"/>
        </reference>
        <reference anchor="I-D.ietf-tvr-requirements">
          <front>
            <title>TVR (Time-Variant Routing) Requirements</title>
            <author fullname="Daniel King" initials="D." surname="King">
              <organization>Lancaster University</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Brian Sipos" initials="B." surname="Sipos">
              <organization>JHU/APL</organization>
            </author>
            <author fullname="Li Zhang" initials="L." surname="Zhang">
              <organization>Huawei</organization>
            </author>
            <date day="3" month="March" year="2025"/>
            <abstract>
              <t>   Time-Variant Routing (TVR) refers to calculating a path or subpath
   through a network where the time of message transmission (or receipt)
   is part of the overall route computation.  This means that, all
   things being equal, a TVR computation might produce different results
   depending on the time that the computation is performed without other
   detectable changes to the network topology or other cost functions
   associated with the route.

   This document introduces requirements where TVR computations could
   improve message exchange in a network.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tvr-requirements-05"/>
        </reference>
        <reference anchor="I-D.ietf-netmod-schedule-yang">
          <front>
            <title>A Common YANG Data Model for Scheduling</title>
            <author fullname="Qiufang Ma" initials="Q." surname="Ma">
              <organization>Huawei</organization>
            </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Daniel King" initials="D." surname="King">
              <organization>Lancaster University</organization>
            </author>
            <date day="4" month="July" year="2025"/>
            <abstract>
              <t>   This document defines common types and groupings that are meant to be
   used for scheduling purposes such as event, policy, services, or
   resources based on date and time.  For the sake of better modularity,
   the YANG module includes a set of recurrence related groupings with
   varying levels of representation (i.e., from basic to advanced) to
   accommodate a variety of requirements.  It also defines groupings for
   validating requested schedules and reporting scheduling status.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-netmod-schedule-yang-08"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="I-D.ietf-core-comi-19">
          <front>
            <title>CoAP Management Interface (CORECONF)</title>
            <author fullname="Michel Veillette" initials="M." surname="Veillette">
              <organization>Trilliant Networks Inc.</organization>
            </author>
            <author fullname="Peter Van der Stok" initials="P." surname="Van der Stok">
              <organization>consultant</organization>
            </author>
            <author fullname="Alexander Pelov" initials="A." surname="Pelov">
              <organization>IMT Atlantique</organization>
            </author>
            <author fullname="Andy Bierman" initials="A." surname="Bierman">
              <organization>YumaWorks</organization>
            </author>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <date day="3" month="November" year="2024"/>
            <abstract>
              <t>   This document describes a network management interface for
   constrained devices and networks, called CoAP Management Interface
   (CORECONF).  The Constrained Application Protocol (CoAP) is used to
   access datastore and data node resources specified in YANG, or SMIv2
   converted to YANG.  CORECONF uses the YANG to CBOR mapping and
   converts YANG identifier strings to numeric identifiers for payload
   size reduction.  CORECONF extends the set of YANG based protocols,
   NETCONF and RESTCONF, with the capability to manage constrained
   devices and networks.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-comi-19"/>
        </reference>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC5905">
          <front>
            <title>Network Time Protocol Version 4: Protocol and Algorithms Specification</title>
            <author fullname="D. Mills" initials="D." surname="Mills"/>
            <author fullname="J. Martin" initials="J." role="editor" surname="Martin"/>
            <author fullname="J. Burbank" initials="J." surname="Burbank"/>
            <author fullname="W. Kasch" initials="W." surname="Kasch"/>
            <date month="June" year="2010"/>
            <abstract>
              <t>The Network Time Protocol (NTP) is widely used to synchronize computer clocks in the Internet. This document describes NTP version 4 (NTPv4), which is backwards compatible with NTP version 3 (NTPv3), described in RFC 1305, as well as previous versions of the protocol. NTPv4 includes a modified protocol header to accommodate the Internet Protocol version 6 address family. NTPv4 includes fundamental improvements in the mitigation and discipline algorithms that extend the potential accuracy to the tens of microseconds with modern workstations and fast LANs. It includes a dynamic server discovery scheme, so that in many cases, specific server configuration is not required. It corrects certain errors in the NTPv3 design and implementation and includes an optional extension mechanism.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5905"/>
          <seriesInfo name="DOI" value="10.17487/RFC5905"/>
        </reference>
        <reference anchor="RFC4330">
          <front>
            <title>Simple Network Time Protocol (SNTP) Version 4 for IPv4, IPv6 and OSI</title>
            <author fullname="D. Mills" initials="D." surname="Mills"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This memorandum describes the Simple Network Time Protocol Version 4 (SNTPv4), which is a subset of the Network Time Protocol (NTP) used to synchronize computer clocks in the Internet. SNTPv4 can be used when the ultimate performance of a full NTP implementation based on RFC 1305 is neither needed nor justified. When operating with current and previous NTP and SNTP versions, SNTPv4 requires no changes to the specifications or known implementations, but rather clarifies certain design features that allow operation in a simple, stateless remote-procedure call (RPC) mode with accuracy and reliability expectations similar to the UDP/TIME protocol described in RFC 868.</t>
              <t>This memorandum obsoletes RFC 1769, which describes SNTP Version 3 (SNTPv3), and RFC 2030, which describes SNTPv4. Its purpose is to correct certain inconsistencies in the previous documents and to clarify header formats and protocol operations for NTPv3 (IPv4) and SNTPv4 (IPv4, IPv6, and OSI), which are also used for SNTP. A further purpose is to provide guidance for home and business client implementations for routers and other consumer devices to protect the server population from abuse. A working knowledge of the NTPv3 specification, RFC 1305, is not required for an implementation of SNTP. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4330"/>
          <seriesInfo name="DOI" value="10.17487/RFC4330"/>
        </reference>
        <reference anchor="RFC7589">
          <front>
            <title>Using the NETCONF Protocol over Transport Layer Security (TLS) with Mutual X.509 Authentication</title>
            <author fullname="M. Badra" initials="M." surname="Badra"/>
            <author fullname="A. Luchuk" initials="A." surname="Luchuk"/>
            <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
            <date month="June" year="2015"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) provides mechanisms to install, manipulate, and delete the configuration of network devices. This document describes how to use the Transport Layer Security (TLS) protocol with mutual X.509 authentication to secure the exchange of NETCONF messages. This revision of RFC 5539 documents the new message framing used by NETCONF 1.1 and it obsoletes RFC 5539.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7589"/>
          <seriesInfo name="DOI" value="10.17487/RFC7589"/>
        </reference>
        <reference anchor="I-D.lj-rtg-sat-routing-consideration">
          <front>
            <title>Routing in Satellite Networks: Challenges &amp; Considerations</title>
            <author fullname="Peng Liu" initials="P." surname="Liu">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Tianji Jiang" initials="T." surname="Jiang">
              <organization>China Mobile</organization>
            </author>
            <date day="2" month="March" year="2025"/>
            <abstract>
              <t>   The SDO 3GPP has done tremendous work to either standardize or study
   various types of wireless services that would depend on the satellite
   constellation network.  While the ISLs, or Inter-Satellite Links,
   along with the routing scheme(s) over them are critical to help
   fullfil the satellite services, the 3GPP considers them out-of-scope.
   This leaves the significant work to be explored in the IETF domain.
   This draft stems from the 3GPP satellite use cases that have been
   studied for many years up to now, across a couple of releases, and
   lands on summarizing the challenges &amp; considerations of the
   satellite-based routing.  Based on some unique &amp; advantageous
   characteristics associated with satellite networks, the draft raises
   briefly the general routing considerations for the integrated Non-
   Terrestrial &amp; Terrestial Networks.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-lj-rtg-sat-routing-consideration-00"/>
        </reference>
      </references>
    </references>
    <?line 648?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TBD</t>
    </section>
    <section numbered="false" anchor="appendix-a-code-examples">
      <name>Appendix A: Code Examples</name>
      <section numbered="false" anchor="code-examples-for-energy-harvesting-wireless-sensor-network">
        <name>Code Examples for “Energy-harvesting Wireless Sensor Network”</name>
        <t>As described in <xref section="2.3" sectionFormat="of" target="RFC9657"/>, in an energy-harvesting wireless sensor network, nodes rely exclusively on
environmental sources for power, such as solar panels. On-board power levels may fluctuate based on various factors.
This example assumes that a node will only power its radio when available power is over some threshold.
In this scenario, the TVR Node Yang Module is not applicable, since the node attributes changes are caused by the environment,
not by the instructions from managing device. The TVR Topology Yang Module may be necessary to convey the schedule of topology
changes to all the nodes.</t>
        <t>Considering a topology with three nodes, the connectivity of this three-node networks changes over time and repeats daily.
The detailed change information is shown in <xref target="ex-inf1"/>. The link between node1 and node2 is powered on at 8:00 and powered off at 11:00.
The link between node2 and node3 is powered on at 11:00 and powered off at 16:00.</t>
        <figure anchor="ex-inf1">
          <name>An example of topology connectivity of Energy-harvesting Wireless Sensor Network</name>
          <artwork align="center"><![CDATA[
      +----------+        +----------+        +----------+
8:00  |  Node 1  |--------|  Node 2  |        |  Node 3  |
      +----------+        +----------+        +----------+

      +----------+        +----------+        +----------+
11:00 |  Node 1  |        |  Node 2  |--------|  Node 3  |
      +----------+        +----------+        +----------+

      +----------+        +----------+        +----------+
16:00 |  Node 1  |        |  Node 2  |        |  Node 3  |
      +----------+        +----------+        +----------+
]]></artwork>
        </figure>
        <t>The corresponding json example is shown in <xref target="ex-inf2"/>.</t>
        <figure anchor="ex-inf2">
          <name>Json code of topology schedule for Energy-harvesting Wireless Sensor Network</name>
          <artwork align="center"><![CDATA[
{
    "ietf-tvr-topology:topology-schedule": {
        "nodes": [
            {
                "node-id": "192.168.0.1",
                "available": {
                    "default-node-available": true,
                    "schedules": []
                }
            },
            {
                "node-id": "192.168.0.2",
                "available": {
                    "default-node-available": true,
                    "schedules": []
                }
            },
            {
                "node-id": "192.168.0.3",
                "available": {
                    "default-node-available": true,
                    "schedules": []
                }
            }
        ],
        "links": [
            {
                "source-node": "192.168.0.1",
                "source-link-id": "link1",
                "available": {
                    "schedules": [
                        {
                            "schedule-id": 1,
                            "recurrence-first": {
                                "start-time-utc": "2026-01-01T08:00:00Z",
                                "duration": 10800
                            },
                            "utc-until": "2027-01-01T00:00:00Z",
                            "frequency": "ietf-schedule:daily",
                            "attr-value": {
                                "link-available": true
                            }
                        }
                    ],
                    "default-link-available": false
                }
            },
            {
                "source-node": "192.168.0.2",
                "source-link-id": "link1",
                "available": {
                    "schedules": [
                        {
                            "schedule-id": 2,
                            "recurrence-first": {
                                "start-time-utc": "2026-01-01T08:00:00Z",
                                "duration": 10800
                            },
                            "utc-until": "2027-01-01T00:00:00Z",
                            "frequency": "ietf-schedule:daily",
                            "attr-value": {
                                "link-available": true
                            }
                        }
                    ],
                    "default-link-available": false
                }
            },
            {
                "source-node": "192.168.0.2",
                "source-link-id": "link2",
                "available": {
                    "schedules": [
                        {
                            "schedule-id": 3,
                            "recurrence-first": {
                                "start-time-utc": "2026-01-01T11:00:00Z",
                                "duration": 18000
                            },
                            "utc-until": "2027-01-01T00:00:00Z",
                            "frequency": "ietf-schedule:daily",
                            "attr-value": {
                                "link-available": true
                            }
                        }
                    ],
                    "default-link-available": false
                }
            },
            {
                "source-node": "192.168.0.3",
                "source-link-id": "link1",
                "available": {
                    "schedules": [
                        {
                            "schedule-id": 4,
                            "recurrence-first": {
                                "start-time-utc": "2026-01-01T11:00:00Z",
                                "duration": 18000
                            },
                            "utc-until": "2027-01-01T00:00:00Z",
                            "frequency": "ietf-schedule:daily",
                            "attr-value": {
                                "link-available": true
                            }
                        }
                    ],
                    "default-link-available": false
                }
            }
        ]
    }
}
]]></artwork>
        </figure>
      </section>
      <section numbered="false" anchor="code-examples-for-cellular-network">
        <name>Code Examples for "Cellular Network"</name>
        <t>As described in <xref section="3.3" sectionFormat="of" target="RFC9657"/>, the "Cellular Network" is a network where the nodes operating over cellular
connections that charge both peak and off-peak data rates. In this case, individual nodes may be allocated a fixed set of
"peak" minutes such that exceeding that amount of time results in expensive overage charges. As a result, links are just
available at specific "peak" minutes.
In this scenario, both the TVR node YANG module and TVR topology YANG module are applicable to manage the state of node
interfaces and deliver the predicted topology changes to each node.</t>
        <t>Considering a topology with three nodes, the connectivity variation of it is shown in <xref target="ex-inf1"/>. Taking the node1 as an
example, the corresponding node YANG module json code for node1 is shown in <xref target="ex-inf3"/></t>
        <figure anchor="ex-inf3">
          <name>TVR node YANG module json code of node1</name>
          <artwork align="center"><![CDATA[
{
    "ietf-tvr-node:node-schedule": {
        "node-id": "192.168.0.1",
        "node-power-schedule": {
            "power-default": true,
            "schedules": []
        },
        "interface-schedule": {
            "interfaces": [
                "name": "interface1",
                "default-available": false,
                "schedules": [
                    "schedule-id": 100,
                    "recurrence-first": {
                        "start-time-utc": "2026-01-01T08:00:00Z",
                        "duration": 10800
                    },
                    "utc-until": "2027-01-01T00:00:00Z",
                    "frequency": "ietf-schedule:daily",
                    "attr-value": {
                        "available": true
                    }
                ]
            ]
        }
    }
}
]]></artwork>
        </figure>
        <t>The corresponding topology yang module json code is the same as <xref target="ex-inf2"/></t>
      </section>
      <section numbered="false" anchor="code-examples-for-tidal-network">
        <name>Code Examples for “Tidal Network”</name>
        <t>As described in <xref section="3.4" sectionFormat="of" target="RFC9657"/>, the "Tidal Network" is a network where traffic volume undergoes significant
fluctuations at different times. In the context of a tidal network scenario, energy-saving methods may include the deactivation
of some or all components of network nodes as planned.
In this scenario, both the TVR node YANG module and TVR topology YANG module are applicable to manage the state of node
(interfaces) and deliver the predicted topology changes to each node. <xref target="ex-inf4"/> shows a tidal network topology with 4
nodes.</t>
        <figure anchor="ex-inf4">
          <name>An example topology of Tidal Network</name>
          <artwork align="center"><![CDATA[
    +----+                  +----+               +----+                    +----+
    | N1 |--------L1--------| N2 |               | N1 |---------L1---------| N2 |
    +----+                  +----+               +----+                    +----+
       |  \                /  |                     |                        |
       |    \            /    |                     |                        |
       |      \        /      |                     |                        |
       |        L6    L5      |                     |                        |
      L2          \/         L3                    L2                       L3
       |         /  \         |                     |                        |
       |       /      \       |                     |                        |
       |     /          \     |                     |                        |
       |   /              \   |                     |                        |
    +----+                  +----+               +----+                     +----+
    | N3 |--------L4--------| N4 |               | N3 |---------L4----------| N4 |
    +----+                  +----+               +----+                     +----+
Topology1 (8:00-23:00 everyday)     Topology 2(23:00-23:59 and 00:00-08:00 everyday)
]]></artwork>
        </figure>
        <t>Taking the node N1 as an example, assuming the node-ids of N1, N2, N3, N4 are 192.168.0.1, 192.168.0.2, 192.168.0.3,
and 192.168.0.4. The corresponding node YANG module json code for it is shown in <xref target="ex-inf5"/></t>
        <figure anchor="ex-inf5">
          <name>TVR node YANG module json code of node N1</name>
          <artwork align="center"><![CDATA[
{
    "ietf-tvr-node:node-schedule": {
        "node-id": "192.168.0.1",
        "node-power-schedule": {
            "power-default": true,
            "schedules": []
        },
        "interface-schedule": {
            "interfaces": [
                "name": "interface2",
                "default-available": false,
                "schedules": [
                    "schedule-id": 100,
                    "recurrence-first": {
                        "start-time-utc": "2026-01-01T08:00:00Z",
                        "duration": 54000
                    },
                    "utc-until": "2027-01-01T00:00:00Z",
                    "frequency": "ietf-schedule:daily",
                    "attr-value": {
                        "available": true
                    }
                ]
            ]
        }
    }
}
]]></artwork>
        </figure>
        <t>The corresponding topology YANG module json code is shown in <xref target="ex-inf6"/></t>
        <figure anchor="ex-inf6">
          <name>Json code of topology schedule for Tidal Network</name>
          <artwork align="center"><![CDATA[
{
    "ietf-tvr-topology:topology-schedule": {
        "nodes": [
            {
                "node-id": "192.168.0.1",
                "available": {
                    "default-node-available": true,
                    "schedules": []
                }
            },
            {
                "node-id": "192.168.0.2",
                "available": {
                    "default-node-available": true,
                    "schedules": []
                }
            },
            {
                "node-id": "192.168.0.3",
                "available": {
                    "default-node-available": true,
                    "schedules": []
                }
            },
            {
                "node-id": "192.168.0.4",
                "available": {
                    "default-node-available": true,
                    "schedules": []
                }
            }
        ],
        "links": [
            {
                "source-node": "192.168.0.1",
                "source-link-id": "link2",
                "available": {
                    "schedules": [
                        {
                            "schedule-id": 100,
                            "recurrence-first": {
                                "start-time-utc": "2026-01-01T08:00:00Z",
                                "duration": 54000
                            },
                            "utc-until": "2027-01-01T00:00:00Z",
                            "frequency": "ietf-schedule:daily",
                            "attr-value": {
                                "link-available": true
                            }
                        }
                    ],
                    "default-link-available": false
                }
            },
            {
                "source-node": "192.168.0.2",
                "source-link-id": "link2",
                "available": {
                    "schedules": [
                        {
                            "schedule-id": 200,
                            "recurrence-first": {
                                "start-time-utc": "2026-01-01T08:00:00Z",
                                "duration": 54000
                            },
                            "utc-until": "2027-01-01T00:00:00Z",
                            "frequency": "ietf-schedule:daily",
                            "attr-value": {
                                "link-available": true
                            }
                        }
                    ],
                    "default-link-available": false
                }
            },
            {
                "source-node": "192.168.0.3",
                "source-link-id": "link2",
                "available": {
                    "schedules": [
                        {
                            "schedule-id": 300,
                            "recurrence-first": {
                                "start-time-utc": "2026-01-01T08:00:00Z",
                                "duration": 54000
                            },
                            "utc-until": "2027-01-01T00:00:00Z",
                            "frequency": "ietf-schedule:daily",
                            "attr-value": {
                                "link-available": true
                            }
                        }
                    ],
                    "default-link-available": false
                }
            },
            {
                "source-node": "192.168.0.4",
                "source-link-id": "link2",
                "available": {
                    "schedules": [
                        {
                            "schedule-id": 400,
                            "recurrence-first": {
                                "start-time-utc": "2026-01-01T08:00:00Z",
                                "duration": 54000
                            },
                            "utc-until": "2027-01-01T00:00:00Z",
                            "frequency": "ietf-schedule:daily",
                            "attr-value": {
                                "link-available": true
                            }
                        }
                    ],
                    "default-link-available": false
                }
            }
        ]
    }
}
]]></artwork>
        </figure>
      </section>
      <section numbered="false" anchor="code-examples-for-mobile-satellites">
        <name>Code Examples for “Mobile Satellites”</name>
        <t>As described in <xref section="4.3" sectionFormat="of" target="RFC9657"/>, the "Mobile Satellites" generally refers to the Low Earth Orbit(LEO) network,
which includes hundreds to thousands of spacecrafts that can communicate both with their orbital neighbors as well as
down to any ground station that they happen to be passing over. The connection between the spacecrafts and the ground
station depend on the flight trajectories of the spacecrafts, so the link changes between them is predictable.</t>
        <t><xref section="4.3" sectionFormat="of" target="RFC9657"/> introduces a scenario with 3 spacecrafts and 1 ground station. The changes of topology are
shown in <xref target="ex-inf7"/>. The ground station connects to spacecraft N3 at time t1, connects to N2 at time t2, and connects
to N1 at time t3. The duration of the connection depends on the satellite altitude and the elevation angle.
According to <xref section="2.1" sectionFormat="of" target="I-D.lj-rtg-sat-routing-consideration"/>, for the spacecrafts at the 500km
altitude, and the connection between the spacecraft and ground station can keep for 7 minutes.</t>
        <figure anchor="ex-inf7">
          <name>An example topology for Mobile Satellites</name>
          <artwork align="center"><![CDATA[
    +------+          +------+
t1  |  N2  |----------|  N3  |
    +------+          +---+--+
                          |
                         /|\
                        \___/
                         / \
                       Ground
                       Station
------------------------------------------------------------------
    +------+          +------+          +------+
t2  |  N1  |----------|  N2  |----------|  N3  |
    +------+          +---+--+          +------+
                          |
                         /|\
                        \___/
                         / \
                       Ground
                       Station
------------------------------------------------------------------
                      +------+          +------+          +------+
t3                    |  N1  |----------|  N2  |----------|  N3  |
                      +---+--+          +------+          +------+
                          |
                         /|\
                        \___/
                         / \
                       Ground
                       Station
------------------------------------------------------------------
]]></artwork>
        </figure>
        <t>In this scenario, the TVR topology YANG module is applicable to deliver the predicted topology changes to each node.
However, the TVR node YANG module is not applicable, this depends on whether the link changes are controlled by satellites
themselves or by the managing device. Here, we provide the json codes for TVR topology YANG module and node
 YANG module as a reference.</t>
        <t>Taking the spacecraft N1 as an example, assuming the time t1 is 10:00:00 1 July 2025 and the node-ids of N1, N2, N3, and
ground station is 192.168.0.1, 192.168.0.2, 192.168.0.3, and 192.168.0.4.,
then the corresponding node YANG module json code for it is shown in <xref target="ex-inf8"/>.</t>
        <figure anchor="ex-inf8">
          <name>TVR node YANG module json code of spacecraft N1</name>
          <artwork align="center"><![CDATA[
{
    "ietf-tvr-node:node-schedule": {
        "node-id": "192.168.0.1",
        "node-power-schedule": {
            "power-default": true,
            "schedules": []
        },
        "interface-schedule": {
            "interfaces": [
                "name": "satellite2ground-interface",
                "default-available": false,
                "schedules": [
                    "schedule-id": 100,
                    "period-start": "2025-07-01T10:00:00Z",
                    "duration": 420,
                    "attr-value": {
                        "available": true
                    }
                ]
            ]
        }
    }
}
]]></artwork>
        </figure>
        <t>Assuming that time t1 is 10:00:00 1 July 2025, time t2 is 10:10:00 1 July 2025, and time t3 is 10:20:00 1 July 2025,
then the corresponding topology YANG module json code is shown in <xref target="ex-inf9"/>.</t>
        <figure anchor="ex-inf9">
          <name>Json code of topology schedule for Mobile Satellites</name>
          <artwork align="center"><![CDATA[
{
    "ietf-tvr-topology:topology-schedule": {
        "nodes": [
            {
                "node-id": "192.168.0.1",
                "available": {
                    "default-node-available": true,
                    "schedules": []
                }
            },
            {
                "node-id": "192.168.0.2",
                "available": {
                    "default-node-available": true,
                    "schedules": []
                }
            },
            {
                "node-id": "192.168.0.3",
                "available": {
                    "default-node-available": true,
                    "schedules": []
                }
            },
            {
                "node-id": "192.168.0.4",
                "available": {
                    "default-node-available": true,
                    "schedules": []
                }
            }
        ],
        "links": [
            {
                "source-node": "192.168.0.3",
                "source-link-id": "gs-link",
                "available": {
                    "schedules": [
                        {
                            "schedule-id": 100,
                            "period-start": "2025-07-01T10:00:00Z",
                            "duration": 420,
                            "attr-value": {
                                "available": true
                            }
                        }
                    ],
                    "default-link-available": false
                }
            },
            {
                "source-node": "192.168.0.2",
                "source-link-id": "gs-link",
                "available": {
                    "schedules": [
                        {
                            "schedule-id": 200,
                            "period-start": "2025-07-01T10:10:00Z",
                            "duration": 420,
                            "attr-value": {
                                "available": true
                            }
                        }
                    ],
                    "default-link-available": false
                }
            },
            {
                "source-node": "192.168.0.1",
                "source-link-id": "gs-link",
                "available": {
                    "schedules": [
                        {
                            "schedule-id": 300,
                            "period-start": "2025-07-01T10:20:00Z",
                            "duration": 420,
                            "attr-value": {
                                "available": true
                            }
                        }
                    ],
                    "default-link-available": false
                }
            }
        ]
    }
}
]]></artwork>
        </figure>
      </section>
      <section numbered="false" anchor="code-examples-for-predictable-moving-vessels">
        <name>Code examples for “Predictable Moving Vessels”</name>
        <t>As described in <xref section="4.4" sectionFormat="of" target="RFC9657"/>, the "Predictable Moving Vessels" involves the movement of vessels with
predictable trajectories, such as ferries or planes. These endpoints often rely on a combination of satellite and
terrestrial systems for Internet connectivity. Consider a scenario where a vessel uses satellites to access the Internet,
including a ship and three satellites. As the satellite and the vessel move, the vessel establishes connections with the
satellites N1, N2, and N3 at t1, t2, and t3 respectively. It is assumed that each connection lasts for 1 minutes.
The changes of topology are shown in <xref target="ex-inf10"/>.</t>
        <figure anchor="ex-inf10">
          <name>An example topology for Predictable Moving Vessels</name>
          <artwork align="center"><![CDATA[
    +------+          +------+
t1  |  N2  |----------|  N1  |
    +------+          +---+--+
                          |
                         /|\
                        \___/
                         / \
                       Vessel
------------------------------------------------------------------
    +------+          +------+          +------+
t2  |  N3  |----------|  N2  |----------|  N1  |
    +------+          +---+--+          +------+
                          |
                         /|\
                        \___/
                         / \
                       Vessel
------------------------------------------------------------------
                      +------+          +------+          +------+
t3                    |  N3  |----------|  N2  |----------|  N1  |
                      +---+--+          +------+          +------+
                          |
                         /|\
                        \___/
                         / \
                       Vessel
------------------------------------------------------------------
]]></artwork>
        </figure>
        <t>This scenario is quite similar to the "Mobile Satellites" example, so the TVR node YANG module json code and topology YANG
json code of this scenario can refer to the json code of the "Mobile Satellites" example.</t>
      </section>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact fullname="Daniel King">
        <organization>Lancaster University</organization>
        <address>
          <postal>
            <country>United Kingdom</country>
          </postal>
          <email>d.king@lancaster.ac.uk</email>
        </address>
      </contact>
      <contact fullname="Charalampos (Haris) Rotsos">
        <organization>Lancaster University</organization>
        <address>
          <email>c.rotsos@lancaster.ac.uk</email>
        </address>
      </contact>
      <contact fullname="Peng Liu">
        <organization>China Mobile</organization>
        <address>
          <email>liupengyjy@chinamobile.com</email>
        </address>
      </contact>
      <contact fullname="Tony Li">
        <organization>Juniper Networks</organization>
        <address>
          <email>tony.li@tony.li</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
