<?xml version='1.0' encoding='utf-8'?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" version="3" category="std" consensus="true" docName="draft-ietf-detnet-ip-over-mpls-09" indexInclude="true" ipr="trust200902" number="9056" prepTime="2021-10-04T12:07:37" scripts="Common,Latin" sortRefs="true" submissionType="IETF" symRefs="true" tocDepth="3" tocInclude="true" xml:lang="en">
  <link href="https://datatracker.ietf.org/doc/draft-ietf-detnet-ip-over-mpls-09" rel="prev"/>
  <link href="https://dx.doi.org/10.17487/rfc9056" rel="alternate"/>
  <link href="urn:issn:2070-1721" rel="alternate"/>
  <front>
    <title abbrev="DetNet Data Plane: IP over MPLS">Deterministic Networking (DetNet) Data Plane: IP over MPLS</title>
    <seriesInfo name="RFC" value="9056" stream="IETF"/>
    <author role="editor" fullname="Balázs Varga" initials="B." surname="Varga">
      <organization showOnFrontPage="true">Ericsson</organization>
      <address>
        <postal>
          <street>Magyar Tudosok krt. 11.</street>
          <city>Budapest</city>
          <country>Hungary</country>
          <code>1117</code>
        </postal>
        <email>balazs.a.varga@ericsson.com</email>
      </address>
    </author>
    <author fullname="Lou Berger" initials="L." surname="Berger">
      <organization showOnFrontPage="true">LabN Consulting, L.L.C.</organization>
      <address>
        <email>lberger@labn.net</email>
      </address>
    </author>
    <author fullname="Don Fedyk" initials="D." surname="Fedyk">
      <organization showOnFrontPage="true">LabN Consulting, L.L.C.</organization>
      <address>
        <email>dfedyk@labn.net</email>
      </address>
    </author>
    <author fullname="Stewart Bryant" initials="S." surname="Bryant">
      <organization showOnFrontPage="true">Futurewei Technologies</organization>
      <address>
        <email>sb@stewartbryant.com</email>
      </address>
    </author>
    <author fullname="Jouni Korhonen" initials="J." surname="Korhonen">
      <address>
        <email>jouni.nospam@gmail.com</email>
      </address>
    </author>
    <date month="10" year="2021"/>
    <workgroup>DetNet</workgroup>
    <keyword>sub-network</keyword>
    <abstract pn="section-abstract">
      <t indent="0" pn="section-abstract-1">
     This document specifies the Deterministic Networking data plane
     when encapsulating IP over an MPLS packet-switched network.
      </t>
    </abstract>
    <boilerplate>
      <section anchor="status-of-memo" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.1">
        <name slugifiedName="name-status-of-this-memo">Status of This Memo</name>
        <t indent="0" pn="section-boilerplate.1-1">
            This is an Internet Standards Track document.
        </t>
        <t indent="0" pn="section-boilerplate.1-2">
            This document is a product of the Internet Engineering Task Force
            (IETF).  It represents the consensus of the IETF community.  It has
            received public review and has been approved for publication by
            the Internet Engineering Steering Group (IESG).  Further
            information on Internet Standards is available in Section 2 of 
            RFC 7841.
        </t>
        <t indent="0" pn="section-boilerplate.1-3">
            Information about the current status of this document, any
            errata, and how to provide feedback on it may be obtained at
            <eref target="https://www.rfc-editor.org/info/rfc9056" brackets="none"/>.
        </t>
      </section>
      <section anchor="copyright" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.2">
        <name slugifiedName="name-copyright-notice">Copyright Notice</name>
        <t indent="0" pn="section-boilerplate.2-1">
            Copyright (c) 2021 IETF Trust and the persons identified as the
            document authors. All rights reserved.
        </t>
        <t indent="0" pn="section-boilerplate.2-2">
            This document is subject to BCP 78 and the IETF Trust's Legal
            Provisions Relating to IETF Documents
            (<eref target="https://trustee.ietf.org/license-info" brackets="none"/>) in effect on the date of
            publication of this document. Please review these documents
            carefully, as they describe your rights and restrictions with
            respect to this document. Code Components extracted from this
            document must include Simplified BSD License text as described in
            Section 4.e of the Trust Legal Provisions and are provided without
            warranty as described in the Simplified BSD License.
        </t>
      </section>
    </boilerplate>
    <toc>
      <section anchor="toc" numbered="false" removeInRFC="false" toc="exclude" pn="section-toc.1">
        <name slugifiedName="name-table-of-contents">Table of Contents</name>
        <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1">
          <li pn="section-toc.1-1.1">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.1"><xref derivedContent="1" format="counter" sectionFormat="of" target="section-1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-introduction">Introduction</xref></t>
          </li>
          <li pn="section-toc.1-1.2">
            <t indent="0" pn="section-toc.1-1.2.1"><xref derivedContent="2" format="counter" sectionFormat="of" target="section-2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-terminology">Terminology</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.2.2">
              <li pn="section-toc.1-1.2.2.1">
                <t indent="0" keepWithNext="true" pn="section-toc.1-1.2.2.1.1"><xref derivedContent="2.1" format="counter" sectionFormat="of" target="section-2.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-terms-used-in-this-document">Terms Used in This Document</xref></t>
              </li>
              <li pn="section-toc.1-1.2.2.2">
                <t indent="0" keepWithNext="true" pn="section-toc.1-1.2.2.2.1"><xref derivedContent="2.2" format="counter" sectionFormat="of" target="section-2.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-abbreviations">Abbreviations</xref></t>
              </li>
              <li pn="section-toc.1-1.2.2.3">
                <t indent="0" pn="section-toc.1-1.2.2.3.1"><xref derivedContent="2.3" format="counter" sectionFormat="of" target="section-2.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-requirements-language">Requirements Language</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.3">
            <t indent="0" pn="section-toc.1-1.3.1"><xref derivedContent="3" format="counter" sectionFormat="of" target="section-3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-detnet-ip-data-plane-overvi">DetNet IP Data Plane Overview</xref></t>
          </li>
          <li pn="section-toc.1-1.4">
            <t indent="0" pn="section-toc.1-1.4.1"><xref derivedContent="4" format="counter" sectionFormat="of" target="section-4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-detnet-ip-over-detnet-mpls">DetNet IP over DetNet MPLS</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.4.2">
              <li pn="section-toc.1-1.4.2.1">
                <t indent="0" pn="section-toc.1-1.4.2.1.1"><xref derivedContent="4.1" format="counter" sectionFormat="of" target="section-4.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-detnet-ip-over-detnet-mpls-">DetNet IP over DetNet MPLS Data Plane Scenarios</xref></t>
              </li>
              <li pn="section-toc.1-1.4.2.2">
                <t indent="0" pn="section-toc.1-1.4.2.2.1"><xref derivedContent="4.2" format="counter" sectionFormat="of" target="section-4.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-detnet-ip-over-detnet-mpls-e">DetNet IP over DetNet MPLS Encapsulation</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.5">
            <t indent="0" pn="section-toc.1-1.5.1"><xref derivedContent="5" format="counter" sectionFormat="of" target="section-5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-detnet-ip-over-detnet-mpls-p">DetNet IP over DetNet MPLS Procedures</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.5.2">
              <li pn="section-toc.1-1.5.2.1">
                <t indent="0" pn="section-toc.1-1.5.2.1.1"><xref derivedContent="5.1" format="counter" sectionFormat="of" target="section-5.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-detnet-ip-over-detnet-mpls-f">DetNet IP over DetNet MPLS Flow Identification and Aggregation
        Procedures</xref></t>
              </li>
              <li pn="section-toc.1-1.5.2.2">
                <t indent="0" pn="section-toc.1-1.5.2.2.1"><xref derivedContent="5.2" format="counter" sectionFormat="of" target="section-5.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-detnet-ip-over-detnet-mpls-t">DetNet IP over DetNet MPLS Traffic Treatment Procedures</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.6">
            <t indent="0" pn="section-toc.1-1.6.1"><xref derivedContent="6" format="counter" sectionFormat="of" target="section-6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-management-and-control-info">Management and Control Information Summary</xref></t>
          </li>
          <li pn="section-toc.1-1.7">
            <t indent="0" pn="section-toc.1-1.7.1"><xref derivedContent="7" format="counter" sectionFormat="of" target="section-7"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-security-considerations">Security Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.8">
            <t indent="0" pn="section-toc.1-1.8.1"><xref derivedContent="8" format="counter" sectionFormat="of" target="section-8"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-iana-considerations">IANA Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.9">
            <t indent="0" pn="section-toc.1-1.9.1"><xref derivedContent="9" format="counter" sectionFormat="of" target="section-9"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-references">References</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.9.2">
              <li pn="section-toc.1-1.9.2.1">
                <t indent="0" pn="section-toc.1-1.9.2.1.1"><xref derivedContent="9.1" format="counter" sectionFormat="of" target="section-9.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-normative-references">Normative References</xref></t>
              </li>
              <li pn="section-toc.1-1.9.2.2">
                <t indent="0" pn="section-toc.1-1.9.2.2.1"><xref derivedContent="9.2" format="counter" sectionFormat="of" target="section-9.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-informative-references">Informative References</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.10">
            <t indent="0" pn="section-toc.1-1.10.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.a"/><xref derivedContent="" format="title" sectionFormat="of" target="name-acknowledgements">Acknowledgements</xref></t>
          </li>
          <li pn="section-toc.1-1.11">
            <t indent="0" pn="section-toc.1-1.11.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.b"/><xref derivedContent="" format="title" sectionFormat="of" target="name-contributors">Contributors</xref></t>
          </li>
          <li pn="section-toc.1-1.12">
            <t indent="0" pn="section-toc.1-1.12.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.c"/><xref derivedContent="" format="title" sectionFormat="of" target="name-authors-addresses">Authors' Addresses</xref></t>
          </li>
        </ul>
      </section>
    </toc>
  </front>
  <middle>
    <section anchor="sec_intro" numbered="true" toc="include" removeInRFC="false" pn="section-1">
      <name slugifiedName="name-introduction">Introduction</name>
      <t indent="0" pn="section-1-1">
        Deterministic Networking (DetNet) is a service that can be offered by a
	network to DetNet flows.
        DetNet provides a capability for the delivery of data flows with
        extremely low packet loss rates and bounded end-to-end delivery
        latency.
	General background and concepts of DetNet can be found in the DetNet
	architecture <xref target="RFC8655" format="default" sectionFormat="of" derivedContent="RFC8655"/>.
      </t>
      <t indent="0" pn="section-1-2">
                This document specifies use of the IP DetNet encapsulation over an
                MPLS network. It maps the IP data plane encapsulation described in <xref target="RFC8939" format="default" sectionFormat="of" derivedContent="RFC8939"/> to the DetNet MPLS data plane defined in <xref target="RFC8964" format="default" sectionFormat="of" derivedContent="RFC8964"/>.
      </t>
    </section>
    <section numbered="true" toc="include" removeInRFC="false" pn="section-2">
      <name slugifiedName="name-terminology">Terminology</name>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-2.1">
        <name slugifiedName="name-terms-used-in-this-document">Terms Used in This Document</name>
        <t indent="0" pn="section-2.1-1">
          This document uses the terminology and concepts established in the
          DetNet architecture <xref target="RFC8655" format="default" sectionFormat="of" derivedContent="RFC8655"/> and in
          <xref target="RFC8938" format="default" sectionFormat="of" derivedContent="RFC8938"/>. The reader is assumed to
          be familiar with these documents and their terminology.
        </t>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-2.2">
        <name slugifiedName="name-abbreviations">Abbreviations</name>
        <t indent="0" pn="section-2.2-1">
          This document uses the abbreviations defined in the DetNet
          architecture <xref target="RFC8655" format="default" sectionFormat="of" derivedContent="RFC8655"/> and in <xref target="RFC8938" format="default" sectionFormat="of" derivedContent="RFC8938"/>.  This document uses the
          following abbreviations:
        </t>
        <dl newline="false" spacing="normal" indent="14" pn="section-2.2-2">
          <dt pn="section-2.2-2.1">CE</dt>
          <dd pn="section-2.2-2.2">Customer Edge (equipment)</dd>
          <dt pn="section-2.2-2.3">d-CW</dt>
          <dd pn="section-2.2-2.4">DetNet Control Word</dd>
          <dt pn="section-2.2-2.5">DetNet</dt>
          <dd pn="section-2.2-2.6">Deterministic Networking</dd>
          <dt pn="section-2.2-2.7">DF</dt>
          <dd pn="section-2.2-2.8">DetNet Flow</dd>
          <dt pn="section-2.2-2.9">DN</dt>
          <dd pn="section-2.2-2.10">DetNet</dd>
          <dt pn="section-2.2-2.11">L2</dt>
          <dd pn="section-2.2-2.12">Layer 2</dd>
          <dt pn="section-2.2-2.13">LSP</dt>
          <dd pn="section-2.2-2.14">Label-Switched Path</dd>
          <dt pn="section-2.2-2.15">MPLS</dt>
          <dd pn="section-2.2-2.16">Multiprotocol Label Switching</dd>
          <dt pn="section-2.2-2.17">PEF</dt>
          <dd pn="section-2.2-2.18">Packet Elimination Function</dd>
          <dt pn="section-2.2-2.19">PRF</dt>
          <dd pn="section-2.2-2.20">Packet Replication Function</dd>
          <dt pn="section-2.2-2.21">PREOF</dt>
          <dd pn="section-2.2-2.22">Packet Replication, Elimination, and Ordering Functions</dd>
          <dt pn="section-2.2-2.23">POF</dt>
          <dd pn="section-2.2-2.24">Packet Ordering Function</dd>
          <dt pn="section-2.2-2.25">PW</dt>
          <dd pn="section-2.2-2.26">Pseudowire</dd>
          <dt pn="section-2.2-2.27">S-Label</dt>
          <dd pn="section-2.2-2.28">DetNet "service" Label</dd>
          <dt pn="section-2.2-2.29">S-PE</dt>
          <dd pn="section-2.2-2.30">Switching Provider Edge</dd>
          <dt pn="section-2.2-2.31">T-PE</dt>
          <dd pn="section-2.2-2.32">Terminating Provider Edge</dd>
          <dt pn="section-2.2-2.33">TE</dt>
          <dd pn="section-2.2-2.34">Traffic Engineering</dd>
          <dt pn="section-2.2-2.35">TSN</dt>
          <dd pn="section-2.2-2.36">Time-Sensitive Networking; TSN is a Task Group of the IEEE			
            802.1 Working Group</dd>
        </dl>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-2.3">
        <name slugifiedName="name-requirements-language">Requirements Language</name>
        <t indent="0" pn="section-2.3-1">
        The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>",
        "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>",
        "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
        "<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document
        are to be interpreted as described in BCP 14 <xref target="RFC2119" format="default" sectionFormat="of" derivedContent="RFC2119"/> <xref target="RFC8174" format="default" sectionFormat="of" derivedContent="RFC8174"/> when, and
        only when, they appear in all capitals, as shown here.
        </t>
      </section>
    </section>
    <section anchor="sec_dt_dp" numbered="true" toc="include" removeInRFC="false" pn="section-3">
      <name slugifiedName="name-detnet-ip-data-plane-overvi">DetNet IP Data Plane Overview</name>
      <t indent="0" pn="section-3-1">
        <xref target="fig_ip_detnet" format="default" sectionFormat="of" derivedContent="Figure 1"/> illustrates an IP
        DetNet with an MPLS-based DetNet network as a sub-network between the
        relay nodes.  An IP flow is mapped to one or more PWs and MPLS (TE)
        LSPs.  The end systems still originate IP-encapsulated traffic,
        identified as DetNet flows.  The relay nodes follow procedures defined
        in <xref target="ip-over-mpls" format="default" sectionFormat="of" derivedContent="Section 4"/> to map each DetNet
        flow to MPLS LSPs. While not shown, relay nodes can provide service
        sub-layer functions such as PREOF using DetNet over MPLS, and this is
        indicated by the solid line for the MPLS-facing portion of the Service
        component. Note that the Transit node is MPLS (TE) LSP aware and
        performs switching based on MPLS labels; it need not have any
        specific knowledge of the DetNet service or the corresponding DetNet
        flow identification. See <xref target="ip-over-mpls" format="default" sectionFormat="of" derivedContent="Section 4"/> for details on the mapping of IP flows to MPLS, and
        <xref target="RFC8964" format="default" sectionFormat="of" derivedContent="RFC8964"/> for general support of
        DetNet services using MPLS.
      </t>
      <figure anchor="fig_ip_detnet" align="left" suppress-title="false" pn="figure-1">
        <name slugifiedName="name-architecture-detnet-ip-over">Architecture: DetNet IP over DetNet MPLS Network</name>
        <artwork name="" type="" align="left" alt="" pn="section-3-2.1">
 DetNet IP       Relay         Transit         Relay      DetNet IP
 End System      Node           Node           Node       End System

+----------+                                             +----------+
|   Appl.  |&lt;------------- End to End Service ----------&gt;|  Appl.   |
+----------+   .....-----+                 +-----.....   +----------+
| Service  |&lt;--: Service |--DetNet flow ---| Service :--&gt;| Service  |
|          |   :         |&lt;-DN MPLS flow -&gt;|         :   |          |
+----------+   +---------+  +----------+   +---------+   +----------+
|Forwarding|   |Fwd| |Fwd|  |Forwarding|   |Fwd| |Fwd|   |Forwarding|
+-------.--+   +-.-+ +-.-+  +----.---.-+   +-.-+ +-.-+   +---.------+
        :  Link  :    /  ,-----.  \   : Link :    /  ,-----.  \
        +........+    +-[  Sub  ]-+   +......+    +-[  Sub  ]-+
                        [Network]                   [Network]
                         `-----'                     `-----'

                     |&lt;---- DetNet MPLS ----&gt;|
         |&lt;--------------------- DetNet IP ------------------&gt;|
                         </artwork>
      </figure>
    </section>
    <section anchor="ip-over-mpls" numbered="true" toc="include" removeInRFC="false" pn="section-4">
      <name slugifiedName="name-detnet-ip-over-detnet-mpls">DetNet IP over DetNet MPLS</name>
      <t indent="0" pn="section-4-1">
        This section defines how IP-encapsulated flows are carried over a
        DetNet MPLS data plane as defined in <xref target="RFC8964" format="default" sectionFormat="of" derivedContent="RFC8964"/>.  Since both non-DetNet and DetNet IP packets are
        identical on the wire, this section is applicable to any node that
        supports IP over DetNet MPLS, and this section refers to both cases as
        DetNet IP over DetNet MPLS.
      </t>
      <section anchor="sec_ip_mpls_dt_dp_scen" numbered="true" toc="include" removeInRFC="false" pn="section-4.1">
        <name slugifiedName="name-detnet-ip-over-detnet-mpls-">DetNet IP over DetNet MPLS Data Plane Scenarios</name>
        <t indent="0" pn="section-4.1-1">
          An example use of DetNet IP over DetNet MPLS is presented here.
        </t>
        <t indent="0" pn="section-4.1-2">

          <xref target="fig_ip_detnet" format="default" sectionFormat="of" derivedContent="Figure 1"/> illustrates IP
          DetNet-enabled End Systems (hosts) connected to DetNet-enabled IP
          networks (DN IP), operating over a DetNet-aware MPLS network.  In this
          figure, we have a case where the relay nodes act as T-PEs and sit at
          the boundary of the MPLS domain since the non-MPLS domain is DetNet
          aware.  This case is very similar to the DetNet MPLS Network (Figure
          2 in <xref target="RFC8964" format="default" sectionFormat="of" derivedContent="RFC8964"/>).  However, in Figure
          2 of <xref target="RFC8964" format="default" sectionFormat="of" derivedContent="RFC8964"/>, the T-PEs are
          located at the end system and MPLS spans the whole DetNet service.

          The primary difference in this document is that the relay nodes are
          at the edges of the MPLS domain and therefore function as T-PEs, and
          that MPLS service sub-layer functions are not provided over the
          DetNet IP network.  The transit node functions shown above are
          identical to those described in <xref target="RFC8964" format="default" sectionFormat="of" derivedContent="RFC8964"/>.
        </t>
        <t indent="0" pn="section-4.1-3">
          <xref target="fig_ip_pw_detnet" format="default" sectionFormat="of" derivedContent="Figure 2"/> illustrates how
          relay nodes can provide service protection over an MPLS domain.  In
          this case, CE1 and CE2 are IP DetNet end systems that are
          interconnected via an MPLS domain such as that described in <xref target="RFC8964" format="default" sectionFormat="of" derivedContent="RFC8964"/>. Note that R1 and R3 sit at the
          edges of an MPLS domain and therefore are similar to T-PEs, while R2
          sits in the middle of the domain and is therefore similar to an
          S-PE.
        </t>
        <figure anchor="fig_ip_pw_detnet" align="left" suppress-title="false" pn="figure-2">
          <name slugifiedName="name-service-protection-over-det">Service Protection over DetNet MPLS Network for DetNet IP</name>
          <artwork name="" type="" align="left" alt="" pn="section-4.1-4.1">
      DetNet                                         DetNet
IP    Service         Transit          Transit       Service  IP
DetNet               |&lt;-Tnl-&gt;|        |&lt;-Tnl-&gt;|               DetNet
End     |            V   1   V        V   2   V            |  End
System  |   +--------+       +--------+       +--------+   |  System
+---+   |   |   R1   |=======|   R2   |=======|   R3   |   |   +---+
|   |-------|._X_....|..DF1..|.__ ___.|..DF3..|...._X_.|-------|   |
|CE1|   |   |    \   |       |   X    |       |   /    |   |   |CE2|
|   |   |   |     \_.|..DF2..|._/ \__.|..DF4..|._/     |   |   |   |
+---+       |        |=======|        |=======|        |       +---+
    ^       +--------+       +--------+       +--------+       ^
    |        Relay Node       Relay Node       Relay Node      |
    |          (T-PE)           (S-PE)          (T-PE)         |
    |                                                          |
    |&lt;-DN IP-&gt; &lt;-------- DetNet MPLS ---------------&gt; &lt;-DN IP-&gt;|
    |                                                          |
    |&lt;-------------- End to End DetNet Service ---------------&gt;|

   -------------------------- Data Flow -------------------------&gt;

    X   = Service protection (PRF, PREOF, PEF/POF)
    DFx = DetNet member flow x over a TE LSP
</artwork>
        </figure>
        <t indent="0" pn="section-4.1-5">
          <xref target="fig_ip_detnet" format="default" sectionFormat="of" derivedContent="Figure 1"/> illustrates
          DetNet-enabled end systems connected to DetNet-enabled (DN) MPLS
          networks.  A similar situation occurs when end systems are not DetNet
          aware.  In this case, edge nodes sit at the boundary of the MPLS
          domain since it is also a DetNet domain boundary.  The edge nodes
          provide DetNet service proxies for the end applications by
          initiating and terminating DetNet service for the application's IP
          flows.  While the node types differ, there is essentially no
          difference in data plane processing between relays and edges.  There
          are likely to be differences in Controller Plane operation,
          particularly when distributed control plane protocols are used.
        </t>
        <t indent="0" pn="section-4.1-6">
          It is still possible to provide DetNet service protection for
          non-DetNet-aware end systems. This case is basically the
          same as <xref target="fig_ip_pw_detnet" format="default" sectionFormat="of" derivedContent="Figure 2"/>, with the exception
          that CE1 and CE2 are non-DetNet-aware end systems and R1 and R3
          become edge nodes.
        </t>
      </section>
      <section anchor="iom-overview" numbered="true" toc="include" removeInRFC="false" pn="section-4.2">
        <name slugifiedName="name-detnet-ip-over-detnet-mpls-e">DetNet IP over DetNet MPLS Encapsulation</name>
        <t indent="0" pn="section-4.2-1">
        The basic encapsulation approach is to treat a DetNet IP flow as an
        App-flow from the DetNet MPLS perspective. The corresponding example
        DetNet Sub-network format is shown in <xref target="fig_dn_ip_mpls_sn_ex" format="default" sectionFormat="of" derivedContent="Figure 3"/>.
        </t>
        <figure anchor="fig_dn_ip_mpls_sn_ex" align="left" suppress-title="false" pn="figure-3">
          <name slugifiedName="name-example-detnet-ip-over-mpls">Example DetNet IP over MPLS Sub-network Formats</name>
          <artwork align="center" name="" type="" alt="" pn="section-4.2-2.1">

           /-&gt;     +------+  +------+  +------+            ^ ^
           |       |  X   |  |  X   |  |  X   |&lt;- App-flow : :
           |       +------+  +------+  +------+            : :
App-flow &lt;-+       |NProto|  |NProto|  |NProto|            : :(1)
 for MPLS  |       +------+  +------+  +------+            : :
           |       |  IP  |  |  IP  |  |  IP  |            : v
           \-&gt; +---+======+--+======+--+======+-----+      :
DetNet-MPLS        | d-CW |  | d-CW |  | d-CW |            :
                   +------+  +------+  +------+            :(2)
                   |Labels|  |Labels|  |Labels|            v
               +---+======+--+======+--+======+-----+
Link/Sub-network   |  L2  |  | TSN  |  | UDP  |
                   +------+  +------+  +------+
                                       |  IP  |
                                       +------+
                                       |  L2  |
                                       +------+
    (1) DetNet IP Flow (or simply IP flow)
    (2) DetNet MPLS Flow
</artwork>
        </figure>
        <t indent="0" pn="section-4.2-3">
        In <xref target="fig_dn_ip_mpls_sn_ex" format="default" sectionFormat="of" derivedContent="Figure 3"/>, "App-flow"
        indicates the payload carried by the DetNet IP data plane.  "IP" and
        "NProto" indicate the fields described in Sections <xref target="RFC8939" sectionFormat="bare" section="5.1.1" format="default" derivedLink="https://rfc-editor.org/rfc/rfc8939#section-5.1.1" derivedContent="RFC8939"/> (IP Header Information) and <xref target="RFC8939" sectionFormat="bare" section="5.1.2" format="default" derivedLink="https://rfc-editor.org/rfc/rfc8939#section-5.1.2" derivedContent="RFC8939"/> (Other
        Protocol Header Information) of <xref target="RFC8939" format="default" sectionFormat="of" derivedContent="RFC8939"/>, respectively.
        
                "App-flow for MPLS" indicates that an individual DetNet IP
                flow is the payload from the perspective of the DetNet MPLS
                data plane defined in <xref target="RFC8964" format="default" sectionFormat="of" derivedContent="RFC8964"/>.
        </t>
        <t indent="0" pn="section-4.2-4">
	    Per <xref target="RFC8964" sectionFormat="of" section="5.1" format="default" derivedLink="https://rfc-editor.org/rfc/rfc8964#section-5.1" derivedContent="RFC8964"/>, the DetNet MPLS data plane uses a single
	    S-Label to support a single App-flow.  DetNet IP Flow
	    Identification Procedures in <xref target="RFC8939" sectionFormat="of" section="5.1" format="default" derivedLink="https://rfc-editor.org/rfc/rfc8939#section-5.1" derivedContent="RFC8939"/> states that a
	    single DetNet flow is identified based on IP- and next-level
	    protocol header information. <xref target="RFC8939" sectionFormat="of" section="4.4" format="default" derivedLink="https://rfc-editor.org/rfc/rfc8939#section-4.4" derivedContent="RFC8939"/> (DetNet Flow
	    Aggregation) defines the ways in which aggregation is supported
	    through the use of prefixes, wildcards, lists, and port ranges.
	    Collectively, this results in the fairly straightforward
	    procedures defined in the next section.
        </t>
        <t indent="0" pn="section-4.2-5">
        As shown in <xref target="fig_ip_pw_detnet" format="default" sectionFormat="of" derivedContent="Figure 2"/>, DetNet relay nodes
        are responsible for the mapping of a DetNet flow, at the service
        sub-layer, from the IP to MPLS DetNet data planes and back
        again. Their related DetNet IP over DetNet MPLS data plane
        operation is comprised of two sets of procedures: the mapping of
        flow identifiers and ensuring proper traffic treatment.
        </t>
        <t indent="0" pn="section-4.2-6">
      Mapping of IP to DetNet MPLS is similar for DetNet IP flows and IP flows.
      The six-tuple of IP is mapped to the S-Label in both cases.
      The various fields may be mapped or ignored when going from IP to MPLS.
        </t>
      </section>
    </section>
    <section anchor="iom-proc" numbered="true" toc="include" removeInRFC="false" pn="section-5">
      <name slugifiedName="name-detnet-ip-over-detnet-mpls-p">DetNet IP over DetNet MPLS Procedures</name>
      <t indent="0" pn="section-5-1">
        The main differences of mapping IP to DetNet MPLS (compared to plain MPLS) are
		that (1) there is a mandatory flow identification to make the forwarding 
		decision (i.e., forwarding is not based on FEC), (2) the d-CW (DetNet 
		Control Word) is mandatory for the MPLS encapsulation, and 


(3) during forwarding over the DetNet MPLS network, treatment specific to
DetNet flows is needed.
      </t>
      <section anchor="iom-ids" numbered="true" toc="include" removeInRFC="false" pn="section-5.1">
        <name slugifiedName="name-detnet-ip-over-detnet-mpls-f">DetNet IP over DetNet MPLS Flow Identification and Aggregation
        Procedures</name>
        <t indent="0" pn="section-5.1-1">
          A DetNet relay node (ingress T-PE) that sends a DetNet IP flow over
          a DetNet MPLS network <bcp14>MUST</bcp14> map a DetNet IP flow, as
          identified in <xref target="RFC8939" format="default" sectionFormat="of" derivedContent="RFC8939"/>, into a
          single MPLS DetNet flow and <bcp14>MUST</bcp14> process it in
          accordance to the procedures defined in <xref target="RFC8964" format="default" sectionFormat="of" derivedContent="RFC8964"/>.  PRF <bcp14>MAY</bcp14> be supported at the MPLS
          level for DetNet IP flows sent over a DetNet MPLS network.
          Aggregation <bcp14>MAY</bcp14> be supported as defined in <xref sectionFormat="of" section="4.4" target="RFC8964" format="default" derivedLink="https://rfc-editor.org/rfc/rfc8964#section-4.4" derivedContent="RFC8964"/>. Aggregation considerations in <xref target="RFC8939" format="default" sectionFormat="of" derivedContent="RFC8939"/> <bcp14>MAY</bcp14> be used to
          identify an individual DetNet IP flow. The provisioning of the
          mapping of DetNet IP flows to DetNet MPLS flows <bcp14>MUST</bcp14>
          be supported via configuration, e.g., via the Controller Plane.
        </t>
        <t indent="0" pn="section-5.1-2">
          A DetNet relay node (egress T-PE) <bcp14>MAY</bcp14> be provisioned
          to handle packets received via the DetNet MPLS data plane as DetNet
          IP flows.  A single incoming DetNet MPLS flow <bcp14>MAY</bcp14> be
          treated as a single DetNet IP flow, without examination of IP
          headers. Alternatively, packets received via the DetNet MPLS data
          plane <bcp14>MAY</bcp14> follow the normal DetNet IP flow
          identification procedures defined in <xref target="RFC8939" sectionFormat="of" section="5.1" format="default" derivedLink="https://rfc-editor.org/rfc/rfc8939#section-5.1" derivedContent="RFC8939"/>.
        </t>
        <t indent="0" pn="section-5.1-3">
          An implementation <bcp14>MUST</bcp14> support the provisioning for
          handling any packet flows received via the DetNet MPLS data plane as
          DetNet IP flows via configuration.  Note that such configuration
          <bcp14>MAY</bcp14> include support from PREOF on the incoming DetNet
          MPLS flow.
        </t>
        <aside pn="section-5.1-4">
          <t indent="0" pn="section-5.1-4.1">
          Note: Using Layer 4 (L4) transport protocols (e.g., for multipath) are
          out of scope of this document both for a single flow and aggregate
          flows.
</t>
        </aside>
      </section>
      <section anchor="iom-svc" numbered="true" toc="include" removeInRFC="false" pn="section-5.2">
        <name slugifiedName="name-detnet-ip-over-detnet-mpls-t">DetNet IP over DetNet MPLS Traffic Treatment Procedures</name>
        <t indent="0" pn="section-5.2-1">
          The traffic treatment required for a particular DetNet IP flow is
          provisioned via configuration or the Controller Plane. When a DetNet
          IP flow is sent over DetNet MPLS, a DetNet relay node
          <bcp14>MUST</bcp14> ensure that the provisioned DetNet IP traffic
          treatment is provided at the forwarding sub-layer as described in
          <xref target="RFC8964" sectionFormat="of" section="5.2" format="default" derivedLink="https://rfc-editor.org/rfc/rfc8964#section-5.2" derivedContent="RFC8964"/>. Note that PRF 
          <bcp14>MAY</bcp14> be utilized when sending IP over MPLS.
        </t>
        <t indent="0" pn="section-5.2-2">
          Traffic treatment for DetNet IP flows received over the DetNet MPLS
          data plane <bcp14>MUST</bcp14> follow <xref target="RFC8939" sectionFormat="of" section="5.3" format="default" derivedLink="https://rfc-editor.org/rfc/rfc8939#section-5.3" derivedContent="RFC8939"/> (DetNet IP
          Traffic Treatment Procedures).
        </t>
      </section>
    </section>
    <section anchor="mc_summary" numbered="true" toc="include" removeInRFC="false" pn="section-6">
      <name slugifiedName="name-management-and-control-info">Management and Control Information Summary</name>
      <t indent="0" pn="section-6-1">
        The following summarizes the set of information that is needed to
        support DetNet IP over DetNet MPLS at the MPLS ingress node:
      </t>
      <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-6-2">
        <li pn="section-6-2.1">


 Each MPLS App-Flow is selected from the incoming IP traffic using the IP flow
 identification information defined in <xref target="RFC8939" format="default" sectionFormat="of" derivedContent="RFC8939"/>.  This information is summarized in Section <xref target="RFC8939" sectionFormat="bare" section="5.1" format="default" derivedLink="https://rfc-editor.org/rfc/rfc8939#section-5.1" derivedContent="RFC8939"/> of that document and
 includes all wildcards, port ranges, and the ability to ignore specific IP
 fields.






</li>
        <li pn="section-6-2.2">
            The DetNet MPLS service that is to be used to send the matching IP
            traffic.  This matching information is provided in <xref target="RFC8964" sectionFormat="of" section="5.1" format="default" derivedLink="https://rfc-editor.org/rfc/rfc8964#section-5.1" derivedContent="RFC8964"/> and includes both service and traffic delivery
            information.
          </li>
      </ul>
      <t indent="0" pn="section-6-3">
        The following summarizes the set of information that is needed to
        support DetNet IP over DetNet MPLS at the MPLS egress node:
      </t>
      <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-6-4">
        <li pn="section-6-4.1">

	  The S-Label value that identifies the encapsulated App-flow traffic.

          </li>
        <li pn="section-6-4.2">
            For each S-Label, how the received traffic is to be handled. The
            traffic may be processed as any other DetNet IP traffic as defined
            in this document or in <xref target="RFC8939" format="default" sectionFormat="of" derivedContent="RFC8939"/>,
            or the traffic may be directly treated as an MPLS App-flow for
            additional processing according to <xref target="RFC8964" format="default" sectionFormat="of" derivedContent="RFC8964"/>.
          </li>
      </ul>
      <t indent="0" pn="section-6-5">
        It is the responsibility of the DetNet Controller Plane to
        properly provision both flow identification information and
        the flow-specific resources needed to provide the traffic
        treatment to meet each flow's service requirements.
        This applies for aggregated and individual flows.
      </t>
    </section>
    <section numbered="true" toc="include" removeInRFC="false" pn="section-7">
      <name slugifiedName="name-security-considerations">Security Considerations</name>
      <t indent="0" pn="section-7-1">
       General security
       considerations for DetNet are described in detail in <xref target="RFC9055" format="default" sectionFormat="of" derivedContent="RFC9055"/>.
       DetNet MPLS and DetNet IP security considerations equally apply to this document and
       are described in <xref target="RFC8964" format="default" sectionFormat="of" derivedContent="RFC8964"/>
       and <xref target="RFC8939" format="default" sectionFormat="of" derivedContent="RFC8939"/>.
      </t>
      <t indent="0" pn="section-7-2">
       Security aspects that are unique to DetNet are those whose aim is to
       protect the support of specific quality-of-service aspects of DetNet, which are
       primarily to deliver data flows with extremely low packet loss rates
       and bounded end-to-end delivery latency.
      </t>
      <t indent="0" pn="section-7-3">
        The primary considerations for the data plane are to maintain
        integrity of data and delivery of the associated DetNet service
        traversing the DetNet network.  Application flows can be protected
        through whatever means is provided by the underlying technology. For
        example, encryption may be used, such as that provided by IPsec <xref target="RFC4301" format="default" sectionFormat="of" derivedContent="RFC4301"/> for IP flows and/or by an
        underlying sub-net using MACsec <xref target="IEEE802.1AE-2018" format="default" sectionFormat="of" derivedContent="IEEE802.1AE-2018"/> for IP-over-Ethernet (Layer 2) flows.
      </t>
      <t indent="0" pn="section-7-4">
        From a data plane perspective, this document does not add or modify any
        header information.
      </t>
      <t indent="0" pn="section-7-5">
        At the management and control level, DetNet flows are identified on a
        per-flow basis, which may provide Controller Plane attackers with
        additional information about the data flows (when compared to
        Controller Planes that do not include per-flow identification).  This
        is an inherent property of DetNet, which has security implications that
        should be considered when determining if DetNet is a suitable
        technology for any given use case.
      </t>
      <t indent="0" pn="section-7-6">
        To provide uninterrupted availability of the DetNet service,
        provisions can be made against DoS attacks and delay attacks. To
        protect against DoS attacks, excess traffic due to malicious or
        malfunctioning devices can be prevented or mitigated, for example,
        through the use of existing mechanisms such as policing and shaping
        applied at the input of a DetNet domain. To prevent DetNet packets
        from being delayed by an entity external to a DetNet domain, DetNet
        technology definitions can allow for the mitigation of
        man-in-the-middle attacks (for example, through use of authentication
        and authorization of devices within the DetNet domain).
      </t>
    </section>
    <section anchor="iana" numbered="true" toc="include" removeInRFC="false" pn="section-8">
      <name slugifiedName="name-iana-considerations">IANA Considerations</name>
      <t indent="0" pn="section-8-1">
          This document has no IANA actions.
      </t>
    </section>
  </middle>
  <back>
    <references pn="section-9">
      <name slugifiedName="name-references">References</name>
      <references pn="section-9.1">
        <name slugifiedName="name-normative-references">Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" quoteTitle="true" derivedAnchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author initials="S." surname="Bradner" fullname="S. Bradner">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="1997" month="March"/>
            <abstract>
              <t indent="0">In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" quoteTitle="true" derivedAnchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author initials="B." surname="Leiba" fullname="B. Leiba">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2017" month="May"/>
            <abstract>
              <t indent="0">RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8655" target="https://www.rfc-editor.org/info/rfc8655" quoteTitle="true" derivedAnchor="RFC8655">
          <front>
            <title>Deterministic Networking Architecture</title>
            <author initials="N." surname="Finn" fullname="N. Finn">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="P." surname="Thubert" fullname="P. Thubert">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="B." surname="Varga" fullname="B. Varga">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Farkas" fullname="J. Farkas">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2019" month="October"/>
            <abstract>
              <t indent="0">This document provides the overall architecture for Deterministic Networking (DetNet), which provides a capability to carry specified unicast or multicast data flows for real-time applications with extremely low data loss rates and bounded latency within a network domain.  Techniques used include 1) reserving data-plane resources for individual (or aggregated) DetNet flows in some or all of the intermediate nodes along the path of the flow, 2) providing explicit routes for DetNet flows that do not immediately change with the network topology, and 3) distributing data from DetNet flow packets over time and/or space to ensure delivery of each packet's data in spite of the loss of a path.  DetNet operates at the IP layer and delivers service over lower-layer technologies such as MPLS and Time- Sensitive Networking (TSN) as defined by IEEE 802.1.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8655"/>
          <seriesInfo name="DOI" value="10.17487/RFC8655"/>
        </reference>
        <reference anchor="RFC8938" target="https://www.rfc-editor.org/info/rfc8938" quoteTitle="true" derivedAnchor="RFC8938">
          <front>
            <title>Deterministic Networking (DetNet) Data Plane Framework</title>
            <author initials="B." surname="Varga" fullname="B. Varga" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Farkas" fullname="J. Farkas">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="L." surname="Berger" fullname="L. Berger">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A." surname="Malis" fullname="A. Malis">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Bryant" fullname="S. Bryant">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2020" month="November"/>
            <abstract>
              <t indent="0">This document provides an overall framework for the Deterministic Networking (DetNet) data plane.  It covers concepts and considerations that are generally common to any DetNet data plane specification. It describes related Controller Plane considerations as well.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8938"/>
          <seriesInfo name="DOI" value="10.17487/RFC8938"/>
        </reference>
        <reference anchor="RFC8939" target="https://www.rfc-editor.org/info/rfc8939" quoteTitle="true" derivedAnchor="RFC8939">
          <front>
            <title>Deterministic Networking (DetNet) Data Plane: IP</title>
            <author initials="B." surname="Varga" fullname="B. Varga" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Farkas" fullname="J. Farkas">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="L." surname="Berger" fullname="L. Berger">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="D." surname="Fedyk" fullname="D. Fedyk">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Bryant" fullname="S. Bryant">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2020" month="November"/>
            <abstract>
              <t indent="0">This document specifies the Deterministic Networking (DetNet) data plane operation for IP hosts and routers that provide DetNet service to IP-encapsulated data. No DetNet-specific encapsulation is defined to support IP flows; instead, the existing IP-layer and higher-layer protocol header information is used to support flow identification and DetNet service delivery.  This document builds on the DetNet architecture (RFC 8655) and data plane framework (RFC 8938).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8939"/>
          <seriesInfo name="DOI" value="10.17487/RFC8939"/>
        </reference>
        <reference anchor="RFC8964" target="https://www.rfc-editor.org/info/rfc8964" quoteTitle="true" derivedAnchor="RFC8964">
          <front>
            <title>Deterministic Networking (DetNet) Data Plane: MPLS</title>
            <author initials="B." surname="Varga" fullname="B. Varga" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Farkas" fullname="J. Farkas">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="L." surname="Berger" fullname="L. Berger">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A." surname="Malis" fullname="A. Malis">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Bryant" fullname="S. Bryant">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Korhonen" fullname="J. Korhonen">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2021" month="January"/>
            <abstract>
              <t indent="0">This document specifies the Deterministic Networking (DetNet) data plane when operating over an MPLS Packet Switched Network.  It leverages existing pseudowire (PW) encapsulations and MPLS Traffic Engineering (MPLS-TE) encapsulations and mechanisms.  This document builds on the DetNet architecture and data plane framework.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8964"/>
          <seriesInfo name="DOI" value="10.17487/RFC8964"/>
        </reference>
        <reference anchor="RFC9055" target="https://www.rfc-editor.org/info/rfc9055" quoteTitle="true" derivedAnchor="RFC9055">
          <front>
            <title>Deterministic Networking (DetNet) Security Considerations</title>
            <author initials="E." surname="Grossman" fullname="E. Grossman" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="T." surname="Mizrahi" fullname="T. Mizrahi">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A." surname="Hacker" fullname="A. Hacker">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2021" month="June"/>
            <abstract>
              <t indent="0">A DetNet (deterministic network) provides specific performance guarantees to its data flows, such as extremely low data loss rates and bounded latency (including bounded latency variation, i.e., "jitter"). As a result, securing a DetNet requires that in addition to the best practice security measures taken for any mission-critical network, additional security measures may be needed to secure the intended operation of these novel service properties.</t>
              <t indent="0">This document addresses DetNet-specific security considerations from the perspectives of both the DetNet system-level designer and component designer. System considerations include a taxonomy of relevant threats and attacks, and associations of threats versus use cases and service properties. Component-level considerations include ingress filtering and packet arrival-time violation detection.</t>
              <t indent="0">This document also addresses security considerations specific to the IP and MPLS data plane technologies, thereby complementing the Security Considerations sections of those documents.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9055"/>
          <seriesInfo name="DOI" value="10.17487/RFC9055"/>
        </reference>
      </references>
      <references pn="section-9.2">
        <name slugifiedName="name-informative-references">Informative References</name>
        <reference anchor="IEEE802.1AE-2018" target="https://ieeexplore.ieee.org/document/8585421" quoteTitle="true" derivedAnchor="IEEE802.1AE-2018">
          <front>
            <title>IEEE Standard for Local and metropolitan area networks-Media Access Control (MAC) Security</title>
            <author>
              <organization showOnFrontPage="true">IEEE</organization>
            </author>
            <date month="December" year="2018"/>
          </front>
          <seriesInfo name="DOI" value="10.1109/IEEESTD.2018.8585421"/>
          <refcontent>IEEE 802.1AE-2018</refcontent>
        </reference>
        <reference anchor="RFC4301" target="https://www.rfc-editor.org/info/rfc4301" quoteTitle="true" derivedAnchor="RFC4301">
          <front>
            <title>Security Architecture for the Internet Protocol</title>
            <author initials="S." surname="Kent" fullname="S. Kent">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="K." surname="Seo" fullname="K. Seo">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2005" month="December"/>
            <abstract>
              <t indent="0">This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer.  This document obsoletes RFC 2401 (November 1998).  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4301"/>
          <seriesInfo name="DOI" value="10.17487/RFC4301"/>
        </reference>
      </references>
    </references>
    <section anchor="acks" numbered="false" toc="include" removeInRFC="false" pn="section-appendix.a">
      <name slugifiedName="name-acknowledgements">Acknowledgements</name>
      <t indent="0" pn="section-appendix.a-1">
 The authors wish to thank <contact fullname="Pat Thaler"/>, <contact fullname="Norman Finn"/>, <contact fullname="Loa Andersson"/>, <contact fullname="David Black"/>, <contact fullname="Rodney Cummings"/>, <contact fullname="Ethan Grossman"/>, <contact fullname="Tal Mizrahi"/>, <contact fullname="David Mozes"/>, <contact fullname="Craig Gunther"/>, <contact fullname="George Swallow"/>, <contact fullname="Yuanlong Jiang"/>, and
 <contact fullname="Carlos J. Bernardos"/> for their various contributions to
 this work.

      </t>
    </section>
    <section anchor="contrib" numbered="false" toc="include" removeInRFC="false" pn="section-appendix.b">
      <name slugifiedName="name-contributors">Contributors</name>
      <t indent="0" pn="section-appendix.b-1">
        RFC 7322 limits the number of authors listed on the front page to a
        maximum of 5. The editor wishes to thank and acknowledge the following
        authors for contributing text to this document.
      </t>
      <author fullname="János Farkas" initials="J." surname="Farkas">
        <organization showOnFrontPage="true">Ericsson</organization>
        <address>
          <email>janos.farkas@ericsson.com</email>
        </address>
      </author>
      <author fullname="Andrew G. Malis" initials="A. G." surname="Malis">
        <organization showOnFrontPage="true">Malis Consulting</organization>
        <address>
          <email>agmalis@gmail.com</email>
        </address>
      </author>
      <t indent="0" pn="section-appendix.b-2">
        <contact fullname="János Farkas"/> contributed substantially to the content of this
        document.
      </t>
    </section>
    <section anchor="authors-addresses" numbered="false" removeInRFC="false" toc="include" pn="section-appendix.c">
      <name slugifiedName="name-authors-addresses">Authors' Addresses</name>
      <author role="editor" fullname="Balázs Varga" initials="B." surname="Varga">
        <organization showOnFrontPage="true">Ericsson</organization>
        <address>
          <postal>
            <street>Magyar Tudosok krt. 11.</street>
            <city>Budapest</city>
            <country>Hungary</country>
            <code>1117</code>
          </postal>
          <email>balazs.a.varga@ericsson.com</email>
        </address>
      </author>
      <author fullname="Lou Berger" initials="L." surname="Berger">
        <organization showOnFrontPage="true">LabN Consulting, L.L.C.</organization>
        <address>
          <email>lberger@labn.net</email>
        </address>
      </author>
      <author fullname="Don Fedyk" initials="D." surname="Fedyk">
        <organization showOnFrontPage="true">LabN Consulting, L.L.C.</organization>
        <address>
          <email>dfedyk@labn.net</email>
        </address>
      </author>
      <author fullname="Stewart Bryant" initials="S." surname="Bryant">
        <organization showOnFrontPage="true">Futurewei Technologies</organization>
        <address>
          <email>sb@stewartbryant.com</email>
        </address>
      </author>
      <author fullname="Jouni Korhonen" initials="J." surname="Korhonen">
        <address>
          <email>jouni.nospam@gmail.com</email>
        </address>
      </author>
    </section>
  </back>
</rfc>
