<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-zdm-tvr-applicability-01" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.24.0 -->
  <front>
    <title abbrev="Applicability Statement">Applicability of TVR YANG Data Models for Scheduling of Network Resources</title>
    <seriesInfo name="Internet-Draft" value="draft-zdm-tvr-applicability-01"/>
    <author fullname="Li Zhang">
      <organization>Huawei</organization>
      <address>
        <email>zhangli344@huawei.com</email>
      </address>
    </author>
    <author fullname="Jie Dong">
      <organization>Huawei</organization>
      <address>
        <email>jie.dong@huawei.com</email>
      </address>
    </author>
    <author fullname="Mohamed Boucadair">
      <organization>Orange</organization>
      <address>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <date year="2024" month="November" day="05"/>
    <area>Routing</area>
    <workgroup>Time-Variant Routing</workgroup>
    <keyword>schedule</keyword>
    <keyword>YANG module</keyword>
    <keyword>applicability</keyword>
    <abstract>
      <?line 57?>

<t>Time-Variant Routing (TVR) is a routing system that can support the predicted topology changes caused by internal or
external reasons. Typical use cases include mobility networks with moving nodes, resource constraints such as power,
and tidal traffic demand networks.
This document provides examples of how to implement the TVR scheduling capabilities for key use cases. It describes
which part of the TVR data model is used and why, and it outlines operational and security considerations when deploying
TVR-based technologies.</t>
    </abstract>
  </front>
  <middle>
    <?line 66?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Time-Variant Routing (TVR) Working Group addresses a growing need in modern network environments where
predictable variations in topology - such as the restoration, activation, or loss of network elements, are
part of normal operations. This approach is essential in dynamic networks with mobile nodes, where links may
be frequently disrupted and re-established due to mobility or in networks with highly predictable traffic
patterns, where links may be powered down to conserve or reduce energy.</t>
      <t>This document provides examples of implementing TVR scheduling capabilities in identified use cases. It
demonstrates the applicability of the TVR data model, methods for disseminating the TVR schedule, and the
necessary IETF ancillary technologies for network environments, such as time synchronization and policy,
that support TVR capabilities.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="use-case-examples">
      <name>Use Case Examples</name>
      <section anchor="tidal-network-use-case">
        <name>Tidal Network Use Case</name>
        <t>A tidal network is a typical scenario of an Energy Efficient case (<xref section="3" sectionFormat="of" target="I-D.ietf-tvr-use-cases"/>).
The tidal network means that the volume of traffic in the network changes periodically, like the ocean tide.
These changes are mainly affected by human activities. Therefore, this tidal effect is obvious in
human-populated areas, such as campuses and airports.</t>
        <t>In the context of a tidal network, if the network maintains all the devices up to guarantee a maximum
throughput all the time, often, power will be wasted on network resources that are not being used. Energy-saving methods may include the deactivation
of some or all components of network nodes. These activities have the potential to alter network topology and
impact data routing/forwarding in a variety of ways. Interfaces on network nodes can be selectively disabled
or enabled based on traffic patterns, thereby reducing the energy consumption of nodes during periods of low
network traffic. The following sections will describe how to use the TVR YANG model<xref target="I-D.ietf-tvr-schedule-yang"/> in Tidal Network.</t>
      </section>
    </section>
    <section anchor="applicability-of-tvr-yang-model-in-tidal-network">
      <name>Applicability of TVR Yang Model in Tidal Network</name>
      <section anchor="network-model">
        <name>Network Model</name>
        <t>According to the description of <xref section="3.1" sectionFormat="of" target="I-D.ietf-tvr-requirements"/>, the scheduling generation locality
and execution locality may be centralized or distributed.</t>
        <t>When the schedule is generated and executed in a centralized manner and within the same device, the changes are sent to routing applications
in wall-clock time via a management interface, which does not need to be delivered by the YANG model. This can be
implemented using the existing management plane technology. Therefore, this scenario is outside of the scope of this document.</t>
        <t>When the schedule is generated and executed in a distributed manner, there is also no need for delivering the
schedule by the YANG model. Therefore, this scenario is also outside of the scope of this document.</t>
        <t>When a schedule is generated in a centralized manner and executed in a distributed manner, the YANG module
needs to be used to deliver the schedule to the managed device. Depending on the location of the routing
application, the network model can be divided into two types: distributed and centralized.</t>
        <section anchor="centralized-model">
          <name>Centralized Model</name>
          <t>In the centralized model, the network managing device generates and maintains schedules, the routing application
is deployed in the network controller, and the network devices execute the schedules and routing results.
The following figure shows the components of the centralized model.</t>
          <figure anchor="ref-to-fig1">
            <name>Components of Centralized Model</name>
            <artwork><![CDATA[
 +-----------------------------------------------------------------+
 |                        Managing Device                          |
 +-----------------------------------------------------------------+
            |                                           |
        Data Model                                  Data Model
            |                                           |
 +---------\|/----------+                     +--------\|/--------+
 |  Network Controller  |---Routing Results-->|  Network Devices  |
 +----------------------+                     +-------------------+
]]></artwork>
          </figure>
        </section>
        <section anchor="distributed-model">
          <name>Distributed Model</name>
          <t>In the distributed model, the managing device generates and maintains schedules, the routing application
is deployed in the network devices which also executes schedules and route calculation.</t>
          <figure anchor="ref-to-fig2">
            <name>Components of Distributed Model</name>
            <artwork><![CDATA[
 +-------------------------------------------------+
 |                  Managing Device                |
 +-------------------------------------------------+
                          |
                      Data Model
                          |
 +-----------------------\|/-----------------------+
 |         Managed Device (Network Devices)        |
 +-------------------------------------------------+
]]></artwork>
          </figure>
        </section>
      </section>
      <section anchor="interaction-between-devices">
        <name>Interaction Between Devices</name>
        <section anchor="centralized-model-1">
          <name>Centralized Model</name>
          <t>A centralized model involves the interaction between the managing device and network controller, the managing
device and network devices, and the controller and network devices.</t>
          <t>The managing device needs to deliver node-specific schedules to network devices by TVR Schedule Node YANG
module <xref section="5.2" sectionFormat="of" target="I-D.ietf-tvr-schedule-yang"/>, and the network devices need to report their own status
data to the management device.</t>
          <t>The managing device needs to deliver schedules of the network topology to the network controller by the TVR Network
Topology YANG module<xref section="5.3" sectionFormat="of" target="I-D.ietf-tvr-schedule-yang"/>, so that the routing application in the controller
can consider the impact of topology changes on routes when calculating routes.</t>
          <t>The network controller should deliver the route calculation result to the network devices. The format of the routing
results depends on the protocols deployed(The typical protocols include BGP , PCEP, etc.). The routing result for a period of time in the future could be sent to
the network devices in wall-clock time or be packed and sent at some special points.</t>
        </section>
        <section anchor="distributed-model-1">
          <name>Distributed Model</name>
          <t>The distributed model only involves the interaction between managing devices and network devices.</t>
          <t>The managing device must deliver node-specific schedules to network devices by TVR Schedule Node YANG Module and
deliver network topology schedules to all the network devices by TVR Network Topology Yang module for route
calculation. The network devices must report their status data to the managing device.
Editors note: In future versions of this document, we will provide a more detailed procedure for both the distributed
and centralized approach.</t>
        </section>
      </section>
      <section anchor="encoding-of-the-yang-model">
        <name>Encoding of the YANG Model</name>
        <t>The TVR data model <xref target="I-D.ietf-tvr-schedule-yang"/> can manage network resources and topologies with scheduled
attributes. There are modules defined in the TVR data model, these are:</t>
        <ul spacing="normal">
          <li>
            <t>The “ietf-tvr-schedule” module contains the schedule YANG definitions. This module uses groupings from <xref target="I-D.ietf-netmod-schedule-yang"/> data model;</t>
          </li>
          <li>
            <t>The “ietf-tvr-topology” module defines a network topology with a time-variant availability schedule;</t>
          </li>
          <li>
            <t>The “ietf-tvr-node” module is to be used to manage the scheduled attributes of a single node.</t>
          </li>
        </ul>
        <t>To create a schedule, the following TVR data model objects and subsequent branches are used:</t>
        <ul spacing="normal">
          <li>
            <t>‘node-schedule’</t>
          </li>
          <li>
            <t>‘interface-schedule’</t>
          </li>
          <li>
            <t>‘attribute-schedule’</t>
          </li>
        </ul>
        <t>A TVR scenario example is provided below, where a wireless link is shut down for 12 hours, from 19:00 to 7am the next day.
The schedule is identified using a unique identifier that is conveyed in ‘schedule-id’, and the recurring schedule can be applied for multiple days using Coordinated
Universal Time (UTC).
A more detailed example of the json code is provided in this documents Appendix.</t>
        <artwork><![CDATA[
{
   "ietf-tvr-node:node-schedule":[
      {
         "node-id":1234567890,
         "node-power-schedule":{
            "power-default":true,
         },
         "interface-schedule":[
            {
               "name":"Wlan0",
               "default-available":false,
               "attribute-schedule":{
                  "schedules":[
                     {
                        "schedule-id":111111,
                        "recurrence-first":{
                           "utc-start-time":"2025-12-01T19:00:00Z",
                           "duration":43200
                        },
                        "utc-until":"2026-12-01T00:00:00Z",
                        "frequency":"ietf-schedule:daily",
                        "interval":1,
                        "attr-value":{
                           "available":true
                        }
                     }
                  ]
               }
            }
         ]
      }
   ]
}
]]></artwork>
        <t>The methods for disseminating and propagating the generated schedule are discussed in the following subsections.</t>
      </section>
      <section anchor="management-protocols-for-tvr">
        <name>Management Protocols for TVR</name>
        <t>The TVR data model is designed to be accessed via YANG-based management protocols such as NETCONF <xref target="RFC6241"/> and RESTCONF
<xref target="RFC8040"/>. This section discusses the applicability of these protocols for configuring time-variant network resources
using the TVR YANG data models.</t>
        <t>NETCONF provides a robust mechanism for managing complex network configurations, particularly when transactional integrity
and operational consistency are required. Its ability to execute atomic transactions ensures that schedules involving
multiple resources are applied fully, preventing partial updates that could lead to configuration inconsistencies. This
feature is important for time-sensitive scheduling in TVR environments. Additionally, NETCONF supports the validation of
configurations prior to commitment, allowing operators to verify the correctness of schedules before they are applied.
It also includes rollback capabilities, such as restoring a previous configuration during scheduling errors.</t>
        <t>In contrast, RESTCONF offers a simpler, stateless method for interacting with network devices, making it suitable for use
cases requiring lightweight, rapid configuration. RESTCONF utilizes a RESTful interface over HTTP, providing a streamlined
approach to network configuration and management. Therefore, RESTCONF may be advantageous in scenarios where quick adjustments
to schedules are needed or where integration with web-based or cloud-native systems is a priority.</t>
        <t>Depending on the type of node in the TVR network, NETCONF would be the preferred protocol for large-scale, critical scheduling
operations requiring validation and rollback mechanisms. For smaller-scale or isolated scheduling tasks, RESTCONF provides an
efficient and straightforward option without the need for the transactional features offered by NETCONF. The choice of protocol
to use with the TVR YANG model should be driven by the specific requirements of the network environment and the complexity of
the scheduling tasks involved.</t>
        <t>The security aspects of both NETCONF and RESTCONF, including their strengths and weaknesses, are discussed further in
<xref target="security-considerations"/> of this document.</t>
      </section>
    </section>
    <section anchor="time-synchronization">
      <name>Time Synchronization</name>
      <t>According to <xref section="3.1.3" sectionFormat="of" target="I-D.ietf-tvr-requirements"/>, no matter whether the schedules are executed in a centralized
or distributed mode, a mechanism is required to keep the time synchronization between different devices.</t>
      <t>Different time-variant scenarios may require different granularities of time synchronization. For example, the
period of traffic and topology changes in tidal networks is usually a day or week. Therefore, a second-level time
synchronization is enough.</t>
      <t>Existing clock synchronization protocols can be classified into hardware-based protocols and software-based protocols.
Hardware-based protocols often rely on dedicated hardware to ensure clock synchronization, such as Global Positioning
System (GPS) and Precision Time Protocol (PTP). Software-based protocols, on the other hand, synchronize
clocks through software packages running on systems, such as Network Time Protocol (NTP) <xref target="RFC5905"/> and Simple Network
Time Protocol (SNTP) <xref target="RFC4330"/>.</t>
      <t>Hardware-based protocols typically have higher precision and stability, but also have higher cost due to the dedicated
Hardware. Software-based protocols are simple and applicable to common hardware devices, but have lower precision (For
example, the NTP can realize the synchronization at tens of milliseconds level).
The software-based protocols are appropriate for most of the TVR use cases.</t>
      <section anchor="ntp">
        <name>NTP</name>
        <t>NTP is fundamental for ensuring that TVR mechanisms, which depend on highly accurate timing, function as intended across
an entire network. Misalignment in time could lead to serious routing issues, including inefficiency in path forwarding,
instability in routing tables, and traffic outages.</t>
        <t>NTP will be used to ensure:</t>
        <ul spacing="normal">
          <li>
            <t>Coordination of Planned Network Events;</t>
          </li>
          <li>
            <t>Verification of TVR Data Model Time Stamps</t>
          </li>
          <li>
            <t>Accurate Scheduling of Paths;</t>
          </li>
          <li>
            <t>Fault Tolerance.</t>
          </li>
        </ul>
        <t>NTP uses a hierarchical structure of time sources. Each level of this hierarchy is termed a stratum. Generally, an NTP
server synchronized to an authoritative clock runs at stratum 1. Such NTP server functions as the primary time server
to provide clock synchronization for other devices on the network. Stratum 2 servers obtain time from stratum 1 servers,
stratum 3 servers obtain time from stratum 2 servers, and so on.</t>
        <t>In TVR use cases, the managing device functions as a level-1 NTP server and synchronized to an authoritative clock
source. The network controller and network devices behave as clients to obtain accurate time from the managing device.
<xref target="ref-to-fig3"/> shows an NTP deployment scenario for obtaining clock from a GPS clock source.</t>
        <figure anchor="ref-to-fig3">
          <name>Deployment Case of NTP in Tidal Networks</name>
          <artwork><![CDATA[
                           +--------------------+
                           |  GPS Clock Source  |
                           +--------------------+
                                     |
               +--------------------\|/------------------+
Stratum 1      |             Managing Device             |
               +-----------------------------------------+
                     |                             |
                     |                             |
                     |                             |
          +---------\|/----------+       +--------\|/--------+
Stratum 2 |  Network Controller  |       |  Network Devices  |
          +----------------------+       +-------------------+

]]></artwork>
        </figure>
      </section>
      <section anchor="sntp">
        <name>SNTP</name>
        <t>SNTP is a subset of the NTP used to synchronize computer clocks in the Internet. It simplifies the complex NTP
synchronization function and is suitable for networks with limited resources and loose precision requirements.
Compared with NTP, SNTP has lower clock precision, but the synchronization precision still can be guarded under
seconds. Therefore, SNTP also meets the time synchronization requirements of tidal networks and can be used as
an alternative clock synchronization protocol.</t>
      </section>
    </section>
    <section anchor="schedule-database">
      <name>Schedule Database</name>
      <t>The schedule database is used to store and maintain schedules, the database may be deployed on a managing device
and managed devices based on requirements.</t>
      <t>The schedule source of the schedule database may be diversified, for example, configuration from an administrator
or YANG model from the management interface. The schedule entries of different databases may be different, but the
content of the same schedule entry in the schedule databases of different devices in the same domain must be
consistent. There are at least two ways to make the content of the same schedule entry in different schedule databases
consistent:</t>
      <ul spacing="normal">
        <li>
          <t>All the schedule entries are generated at a specific device;</t>
        </li>
        <li>
          <t>Schedule entries are generated at different devices, but there is a synchronization mechanism to synchronize the
schedule databases among devices.</t>
        </li>
      </ul>
      <t>Option 1 is simplest and easy to implement. In a time-variant domain, the managing device may receive scheduling
requests and generate all schedule entries. Then the schedule entries are delivered to the necessary network devices
in the domain through the TVR YANG model.</t>
      <t>Option 2 relies on advertisement mechanisms (such as routing techniques) to advertise the scheduling data generated
by itself to other devices. This could be achieved using extensions to existing routing schemes and techniques.</t>
      <t>These options will be discussed with the TVR Working Group, and agreed approaches will be documented in future versions
of this Internet Draft.</t>
      <section anchor="data-structure">
        <name>Data Structure</name>
        <t><xref target="I-D.ietf-tvr-schedule-yang"/> defines a TVR Node and TVR Topology YANG modules. The Node YANG module
includes node power schedule and interface schedule. The Topology YANG module includes nodes schedule and links schedule.</t>
        <t>Based on the preceding four schedule types, the schedule database should contain four types of schedule entries in
different formats:</t>
        <ul spacing="normal">
          <li>
            <t>Node power schedule entry;</t>
          </li>
          <li>
            <t>Interface schedule entry;</t>
          </li>
          <li>
            <t>Node schedule entry;</t>
          </li>
          <li>
            <t>Links schedule entry;</t>
          </li>
        </ul>
        <t>The detailed format and fields of different types of schedule entries could reference to the definitions of the corresponding
YANG modules.</t>
        <t>Editors note: Code examples will be provided here in future versions of this document.</t>
      </section>
      <section anchor="schedule-operations">
        <name>Schedule Operations</name>
        <t>This section provides general requirements for using the TVR schedule.</t>
        <t>The schedule database should support the add, update, and delete operations.</t>
        <t>When adding or updating a schedule entry, the execution node needs to check whether resource conflicts exist between the
current schedule and existing schedules. If a conflict exists, the operation should be failed.</t>
        <t>Schedules are updated and deleted based on schedule IDs. Therefore, schedule IDs must be unique in a time-variant domain.
This can be handled, e.g., by a dedicated allocation agent within the time-variant domain.</t>
        <t>Editors note: Future versions of this document will expand on the schedule operations requirements and best practices.</t>
      </section>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>Several operational considerations exist when using TVR techniques and data models in a network. This section provides
some high-level observations and more detailed sub-sections for specific consideration related to schedule dissemination,
execution, and recovery in case of failure to apply a schedule or partial change.</t>
      <ul spacing="normal">
        <li>
          <t>Coordinated Network Events: TVR often coordinates routing changes anticipating events like predictable low-traffic
periods or link downtimes (e.g., scheduled maintenance or traffic demand).</t>
        </li>
        <li>
          <t>Accurate Scheduling of Paths: TVR schedule capable routers and network nodes will dynamically adjust forwarding paths
based on planned changes in link availability or network conditions.</t>
        </li>
        <li>
          <t>Time-Stamped Data Models: TVR will require the use time-stamped data models (e.g., schedules for link changes or
availability windows) to make interface management decisions. This ensures that all TVR nodes interpret the timing of
events consistently and implement time-based policies correctly.</t>
        </li>
      </ul>
      <t>Therefore, network time accuracy and time-stamped data models are critical to ensure that coordinated network events
and scheduled path decisions across the network are based on a consistent time reference. Without accurate time sync,
nodes could apply different schedules, causing routing inconsistencies, path flapping, or packet loss.</t>
      <section anchor="schedule-execution-consideration">
        <name>Schedule Execution Consideration</name>
        <t>Schedules execution means that a component (e.g., device) undertakes an action (e.g., allocates and deallocates resources)
at specified time points. In a tidal network, the schedule execution indicates powering on/off specific network components
(such as interfaces or entire network devices) directly or by commands.</t>
        <t>The schedule executor should understand the consequences of the schedule execution. The power on/off of network components
usually affects the network topology, the addition and deletion of the topology need to be considered separately.</t>
        <t>A link coming up or a node joining a topology should not have any functional change until the change is proven to be fully
operational. The routing paths may be pre-computed but should not be installed before all of the topology changes are
confirmed to be operational. The benefits of this pre-computation appear to be very small. The network may choose to
not do any pre-installation or pre-computation in reaction to topological additions at a small cost of some operational
efficiency.</t>
        <t>Topological deletions are an entirely different matter. If a link or node is to be removed from the topology, then the
network should act before the anticipated change to route traffic around the expected topological change. Specifically,
at some point before the planned topology change, the routing paths should be pre-computed and installed before the
topology change takes place. The required time to perform such planned action will vary depending on the exact network
and configuration. When using an IGP or other distributed routing protocols, the affected links may be set to a high
metric to direct traffic to alternate paths. This type of change does require some time to propagate through the
network, so the metric change should be initiated far enough in advance that the network converges before the actual
topological change.</t>
        <t>Editor's Note: multi-manager scenarios need to be considered.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The integration of time-variant mechanisms in network operations presents distinct security challenges that require thorough
analysis to safeguard the network’s integrity, availability, and confidentiality. Networks that rely on time-sensitive data
for routing and forwarding decisions are particularly susceptible to attacks that exploit timing dependencies.</t>
      <t>The "Security Considerations" section of <xref target="I-D.ietf-tvr-requirements"/> outlines various threat vectors and categories specific
to time-variant environments. In this document, a tidal demand use case has been presented, highlighting the need for robust
security measures in the processes of generating, disseminating, and applying schedules to control tidal interfaces.
It is essential to assess security risks and implement mitigation strategies to ensure the security of both the network and
individual nodes throughout the scheduling process.</t>
      <t>Future iterations of this document will provide detailed security techniques and best practices to address these challenges.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="I-D.ietf-tvr-schedule-yang">
          <front>
            <title>YANG Data Model for Scheduled Attributes</title>
            <author fullname="Yingzhen Qu" initials="Y." surname="Qu">
              <organization>Futurewei Technologies</organization>
            </author>
            <author fullname="Acee Lindem" initials="A." surname="Lindem">
              <organization>LabN Consulting, L.L.C.</organization>
            </author>
            <author fullname="Eric Kinzie" initials="E." surname="Kinzie">
              <organization>LabN Consulting, L.L.C.</organization>
            </author>
            <author fullname="Don Fedyk" initials="D." surname="Fedyk">
              <organization>LabN Consulting, L.L.C.</organization>
            </author>
            <author fullname="Marc Blanchet" initials="M." surname="Blanchet">
              <organization>Viagenie</organization>
            </author>
            <date day="20" month="October" year="2024"/>
            <abstract>
              <t>   The YANG model in this document includes three modules, and can be
   used to manage network resources and topologies with scheduled
   attributes, such as predictable link loss and link connectivity as a
   function of time.  The intent is to have this information be utilized
   by Time-Variant Routing systems.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tvr-schedule-yang-03"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.ietf-tvr-use-cases">
          <front>
            <title>TVR (Time-Variant Routing) Use Cases</title>
            <author fullname="Edward J. Birrane" initials="E. J." surname="Birrane">
              <organization>JHU/APL</organization>
            </author>
            <author fullname="Nicolas Kuhn" initials="N." surname="Kuhn">
              <organization>Thales Alenia Space</organization>
            </author>
            <author fullname="Yingzhen Qu" initials="Y." surname="Qu">
              <organization>Futurewei Technologies</organization>
            </author>
            <author fullname="Rick Taylor" initials="R." surname="Taylor">
              <organization>Ori Industries</organization>
            </author>
            <author fullname="Li Zhang" initials="L." surname="Zhang">
              <organization>Huawei</organization>
            </author>
            <date day="29" month="February" year="2024"/>
            <abstract>
              <t>   This document introduces use cases where Time-Variant Routing (TVR)
   computations (i.e. routing computations taking into considerations
   time-based or scheduled changes to a network) could improve routing
   protocol convergence and/or network performance.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tvr-use-cases-09"/>
        </reference>
        <reference anchor="I-D.ietf-tvr-requirements">
          <front>
            <title>TVR (Time-Variant Routing) Requirements</title>
            <author fullname="Daniel King" initials="D." surname="King">
              <organization>Lancaster University</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Brian Sipos" initials="B." surname="Sipos">
              <organization>JHU/APL</organization>
            </author>
            <author fullname="Li Zhang" initials="L." surname="Zhang">
              <organization>Huawei</organization>
            </author>
            <date day="13" month="September" year="2024"/>
            <abstract>
              <t>   Time-Variant Routing (TVR) refers to calculating a path or subpath
   through a network where the time of message transmission (or receipt)
   is part of the overall route computation.  This means that, all
   things being equal, a TVR computation might produce different results
   depending on the time that the computation is performed without other
   detectable changes to the network topology or other cost functions
   associated with the route

   This document introduces requirements where TVR computations could
   improve message exchange in a network.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tvr-requirements-04"/>
        </reference>
        <reference anchor="I-D.ietf-netmod-schedule-yang">
          <front>
            <title>A Common YANG Data Model for Scheduling</title>
            <author fullname="Qiufang Ma" initials="Q." surname="Ma">
              <organization>Huawei</organization>
            </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Daniel King" initials="D." surname="King">
              <organization>Lancaster University</organization>
            </author>
            <date day="10" month="October" year="2024"/>
            <abstract>
              <t>   This document defines a common schedule YANG module which is designed
   to be applicable for scheduling purposes such as event, policy,
   services, or resources based on date and time.  For the sake of
   better modularity, the module includes a set of recurrence related
   groupings with varying granularity levels (i.e., from basic to
   advanced).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-netmod-schedule-yang-03"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC5905">
          <front>
            <title>Network Time Protocol Version 4: Protocol and Algorithms Specification</title>
            <author fullname="D. Mills" initials="D." surname="Mills"/>
            <author fullname="J. Martin" initials="J." role="editor" surname="Martin"/>
            <author fullname="J. Burbank" initials="J." surname="Burbank"/>
            <author fullname="W. Kasch" initials="W." surname="Kasch"/>
            <date month="June" year="2010"/>
            <abstract>
              <t>The Network Time Protocol (NTP) is widely used to synchronize computer clocks in the Internet. This document describes NTP version 4 (NTPv4), which is backwards compatible with NTP version 3 (NTPv3), described in RFC 1305, as well as previous versions of the protocol. NTPv4 includes a modified protocol header to accommodate the Internet Protocol version 6 address family. NTPv4 includes fundamental improvements in the mitigation and discipline algorithms that extend the potential accuracy to the tens of microseconds with modern workstations and fast LANs. It includes a dynamic server discovery scheme, so that in many cases, specific server configuration is not required. It corrects certain errors in the NTPv3 design and implementation and includes an optional extension mechanism. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5905"/>
          <seriesInfo name="DOI" value="10.17487/RFC5905"/>
        </reference>
        <reference anchor="RFC4330">
          <front>
            <title>Simple Network Time Protocol (SNTP) Version 4 for IPv4, IPv6 and OSI</title>
            <author fullname="D. Mills" initials="D." surname="Mills"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This memorandum describes the Simple Network Time Protocol Version 4 (SNTPv4), which is a subset of the Network Time Protocol (NTP) used to synchronize computer clocks in the Internet. SNTPv4 can be used when the ultimate performance of a full NTP implementation based on RFC 1305 is neither needed nor justified. When operating with current and previous NTP and SNTP versions, SNTPv4 requires no changes to the specifications or known implementations, but rather clarifies certain design features that allow operation in a simple, stateless remote-procedure call (RPC) mode with accuracy and reliability expectations similar to the UDP/TIME protocol described in RFC 868.</t>
              <t>This memorandum obsoletes RFC 1769, which describes SNTP Version 3 (SNTPv3), and RFC 2030, which describes SNTPv4. Its purpose is to correct certain inconsistencies in the previous documents and to clarify header formats and protocol operations for NTPv3 (IPv4) and SNTPv4 (IPv4, IPv6, and OSI), which are also used for SNTP. A further purpose is to provide guidance for home and business client implementations for routers and other consumer devices to protect the server population from abuse. A working knowledge of the NTPv3 specification, RFC 1305, is not required for an implementation of SNTP. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4330"/>
          <seriesInfo name="DOI" value="10.17487/RFC4330"/>
        </reference>
      </references>
    </references>
    <?line 488?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
    <section numbered="false" anchor="appendix-a-code-examples">
      <name>Appendix A: Code Examples</name>
      <section numbered="false" anchor="code-examples-for-tidal-network">
        <name>Code Examples for Tidal Network</name>
        <t>Tidal networks usually need to manage the availability of some node or interfaces. <xref target="ex-inf"/> shows the example of a
scheduling node that is powered on from 12 AM, December 1, 2025 to 12 AM, December 1, 2026 in UTC and its interface
named "interface1" is scheduled to be enabled at 7:00 AM and disabled at 1:00 AM, every day, from December 1, 2025 to
December 1, 2026 in UTC.</t>
        <t>The JSON encoding is used only for illustration purposes.</t>
        <figure anchor="ex-inf">
          <name>An Example of Interface Activation Scheduling</name>
          <artwork align="center"><![CDATA[
{
   "ietf-tvr-node:node-schedule":[
      {
         "node-id":12345678,
         "node-power-schedule":{
            "power-default":false,
            "schedules":[
               {
                  "schedule-id":111111,
                  "period-start":"2025-12-01T00:00:00Z",
                  "period-end":"2026-12-01T00:00:00Z",
                  "attr-value":{
                     "power-state":true
                  }
               }
            ]
         },
         "interface-schedule":[
            {
               "name":"interace1",
               "default-available":false,
               "default-bandwidth":1000000000,
               "attribute-schedule":{
                  "schedules":[
                     {
                        "schedule-id":222222,
                        "recurrence-first":{
                           "utc-start-time":"2025-12-01T07:00:00Z",
                           "duration":64800
                        },
                        "utc-until":"2026-12-01T00:00:00Z",
                        "frequency":"ietf-schedule:daily",
                        "interval":1,
                        "attr-value":{
                           "available":true
                        }
                     }
                  ]
               }
            }
         ]
      }
   ]
}
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact fullname="Daniel King">
        <organization>Lancaster University</organization>
        <address>
          <postal>
            <country>United Kingdom</country>
          </postal>
          <email>d.king@lancaster.ac.uk</email>
        </address>
      </contact>
      <contact fullname="Charalampos (Haris) Rotsos">
        <organization>Lancaster University</organization>
        <address>
          <email>c.rotsos@lancaster.ac.uk</email>
        </address>
      </contact>
      <contact fullname="Peng Liu">
        <organization>China Mobile</organization>
        <address>
          <email>liupengyjy@chinamobile.com</email>
        </address>
      </contact>
      <contact fullname="Tony Li">
        <organization>Juniper Networks</organization>
        <address>
          <email>tony.li@tony.li</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
