Internet DRAFT - draft-iotops-km-iiot-frwk

draft-iotops-km-iiot-frwk







Independent Submission                                      K. Makhijani
Internet-Draft                                                   L. Dong
Intended status: Informational                                 Futurewei
Expires: 28 April 2022                                   25 October 2021


              Framework For Integrated Industrial Networks
                      draft-iotops-km-iiot-frwk-00

Abstract

   Industry control networks host a diverse set of non-internet
   protocols supporting Industrial-IoT and legacy device connections.
   The integration between traditional information technology (IT) and
   operational technology (OT) so far has centered around collection of
   real-time data from devices in OT environment for consumption within
   the enterprise IT networks.  However, improvements in process control
   and automation require a far better interworking between the OT and
   IT applications.  This document provides a reference framework for
   integrated industry networks (IIN).  It highlights interfaces and
   their characteristics required for interconnecting components of OT
   and IT that maybe moved to the cloud or edges.  It suggests the use
   of IIN to bridge the differences between OT and IETF technologies.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at https://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on 28 April 2022.

Copyright Notice

   Copyright (c) 2021 IETF Trust and the persons identified as the
   document authors.  All rights reserved.






Makhijani & Dong          Expires 28 April 2022                 [Page 1]

Internet-Draft               iiot-framework                 October 2021


   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents (https://trustee.ietf.org/
   license-info) in effect on the date of publication of this document.
   Please review these documents carefully, as they describe your rights
   and restrictions with respect to this document.  Code Components
   extracted from this document must include Simplified BSD License text
   as described in Section 4.e of the Trust Legal Provisions and are
   provided without warranty as described in the Simplified BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
   2.  Terminology . . . . . . . . . . . . . . . . . . . . . . . . .   4
     2.1.  Acronyms  . . . . . . . . . . . . . . . . . . . . . . . .   5
   3.  High Level Considerations . . . . . . . . . . . . . . . . . .   5
     3.1.  Integrated Industrial Network Stack . . . . . . . . . . .   5
     3.2.  Deployment Considerations . . . . . . . . . . . . . . . .   7
       3.2.1.  Limited Domain Network Inspired Framework . . . . . .   8
     3.3.  Alignment with stakeholders . . . . . . . . . . . . . . .   9
   4.  IIoT New Requirements . . . . . . . . . . . . . . . . . . . .  10
     4.1.  Device to Cloud Mechanisms  . . . . . . . . . . . . . . .  11
     4.2.  Preserving Performance and Deterministic Behavior . . . .  11
     4.3.  Preserving Safety and Task outcomes . . . . . . . . . . .  11
     4.4.  Interoperability with IP-world machines . . . . . . . . .  11
     4.5.  Digital Twin  . . . . . . . . . . . . . . . . . . . . . .  11
   5.  IIN Framework . . . . . . . . . . . . . . . . . . . . . . . .  12
     5.1.  Distributed Architecture  . . . . . . . . . . . . . . . .  12
     5.2.  Interfaces  . . . . . . . . . . . . . . . . . . . . . . .  12
     5.3.  IIN Device Functions  . . . . . . . . . . . . . . . . . .  14
       5.3.1.  Device Specific functions . . . . . . . . . . . . . .  14
       5.3.2.  Transmission (Transport) Mechanisms . . . . . . . . .  14
       5.3.3.  Routing considerations to provide safety &
               security  . . . . . . . . . . . . . . . . . . . . . .  14
       5.3.4.  Traffic Profiles for different type of data . . . . .  15
   6.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .  15
   7.  Security Considerations . . . . . . . . . . . . . . . . . . .  15
   8.  Acknowledgements  . . . . . . . . . . . . . . . . . . . . . .  15
   9.  Informative References  . . . . . . . . . . . . . . . . . . .  15
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  16

1.  Introduction

   There is very little cross-over between the network technologies used
   in the OT and IT environment.  The OT networks are responsible for
   automation and process control on premises such as factory floors,
   manufacturing plants, power grids, oil & gas industry, etc.  In
   contrast, IT networks traditionally facilitated business applications
   based on data received from OT applications.  With increased



Makhijani & Dong          Expires 28 April 2022                 [Page 2]

Internet-Draft               iiot-framework                 October 2021


   automation, and growing demand for remote operations, it is imminent
   that the two technology domains need to interwork seamlessly and
   reliably.

   Due to lack of coordination between industrial networks and IETF
   technologies, their evolution priorities have been different and as a
   result, current IETF technologies and protocols are not well adapted
   in industrial networks.  Industrial systems and applications are
   becoming increasingly complex and proprietary as emerging use cases
   require a higher integration of OT-IT functions.

   The OT networks are often tied to a set of non-internet protocols
   such as Modbus, Profibus, CANbus, Profinet, etc [SURV].  There are
   more than 100 different protocols each with it's own packet format
   and are used in the industry.  On the other side inventory
   management, analytics, monitoring, supply chain and simulation
   software are part of IT and use IP based technologies.

      Note: use IETF technology (instead of IP-based) as a more
      inclusive term.

   No two industry sectors are same and present different requirements
   and challenges on the networks.  These differences are even more
   enhanced in industry automation and operations.  The processes,
   control operations, environmental conditions, frequency and type data
   collection vary across each sector.  Yet, there is a need for common,
   interoperable, off-the-shelf mechanisms and protocols so that
   applications can be deployed in relatively shorter time.

      Note: maybe later describe examples from different sectors. e.g.
      petrochemical or mining plant vs manufacturing and transportation.
      or simply refer to IIC case studies.

   This document provides a framework called 'Integrated Industrial
   Networks' (or IIN for short) and a discussion on integration of
   process control, monitoring and operations with IT.  It proposes (a)
   an idea about integrated industrial network stack that would support
   functions and capabilities from both OT and IT systems, (b) a
   structured deployment considerations, (c) alignment and coordination
   across stakeholders from other consortia and SDOs.











Makhijani & Dong          Expires 28 April 2022                 [Page 3]

Internet-Draft               iiot-framework                 October 2021


2.  Terminology

   Industrial Control Networks:
      The industrial control networks are interconnection of equipments
      used for the operation, control or monitoring of machines in the
      industry environment.  It involves different level of
      communications - between field bus devices, digital controllers
      and software applications

   Industry Automation:
      Mechanisms that enable machine to machine communication by use of
      technologies that enable automatic control and operation of
      industrial devices and processes leading to minimizing human
      intervention.

   Control Loop:
      Todo

   Feedback Control Loop:
      Todo

   Programmable logic controllers (PLC):
      Industrial computers/servers for the control of manufacturing
      processes such as assembly lines.

   Supervisory Control and Data Acquisition (SCADA):
      Software System to control industrial processes and collect and
      manage data.

   Distributed Control Systems (DCS):
      Systems of sensors and controllers that are distributed throughout
      a plant.

   Manufacturing Execution System (MES):
      Systems that connect production equipment across the factory
      floor, or multiple plants or sites.

   Fieldbus Devices:
      Operational Technology field devices include valves, transmitters,
      switches and actuators etc.

   Integrated Industrial Network (IIN):
      The term introduced in this document to represent a converged view
      of OT and IT networks.







Makhijani & Dong          Expires 28 April 2022                 [Page 4]

Internet-Draft               iiot-framework                 October 2021


2.1.  Acronyms

   *  HMI: Human Machine Interface

   *  MES: Manufacturing Execution System

   *  IIN: Integrated Industrial Network

   *  IIC: Industrial Internet Consortium

3.  High Level Considerations

   In this framework a greater focus is on capturing functional and
   operational requirements for the emerging use cases.  The top three
   considerations are - first, to identify the components required to
   fulfill the needs for both IT and OT applications.  Second,
   Integrated Industrial Network (IIN) Framework needs to meet and adapt
   to evolving deployment strategies that include cloud and edge
   technologies.  Finally, mechanisms to coordinate with stakeholders
   (domain experts) should also be identified when discussing such a
   framework.

3.1.  Integrated Industrial Network Stack

   Industrial Networks are a combination of technologies that provide
   capability for the delivery of process control data to/from (and
   across) the machines and sensors to different controllers and other
   application specific servers.  Thus, in IIN stack, one end often be
   an OT device and other end an IT function.

   In OT Systems traditionally,

   *  Operations or tasks are Well-defined: the emphasis is on having
      specific set of tasks performed with definitive outcomes and
      behavior.

   *  Safety is paramount: protecting and preventing the state of the
      system from potential harm or disruption.  The requirements in
      networks translate to multiple attributes such as each signals to
      shut off a valve are received in predictable (or real-time) and
      are never lost.

   In addition, there is also an emergence of new use cases and
   scenarios in OT:







Makhijani & Dong          Expires 28 April 2022                 [Page 5]

Internet-Draft               iiot-framework                 October 2021


   *  Multiple applications: Number of use cases are increasing from
      traditional deployments.  A plant may need different industry
      protocols for different use cases.  For example, BACNet for
      building automation, ModBus devices for valve or pressure control,
      ProfiBus IP for surveillance.

   *  Virtualization: The role of software PLCs is growing.  When met
      with specific time-specific constraints, virtual PLCs can operate
      on actuators and sensors as well as physical PLCs.  In addition
      they can be extended to support rich set of new functions
      controlling different type of end devices from a single PLCs.  Not
      to mention systems such as SCADA, MES, HMI and ICS are also being
      virtualized and can be deployed and operated in distributed
      fashion.

   *  Analytics: New kinds of sensors are being deployed to monitor the
      health of the equipment and environmental conditions.  The data
      collected from sensors helps in predictive maintenance, changing
      production schedules etc.

   *  Simulation models: TBD.

   *  PLC and OT Cloudification: Due to virtualization of components, it
      is now possible to place them anywhere in edge or cloud depending
      on the application design.

   Some of the reasons why leveraging IETF technologies would be
   beneficial:

   *  Scalability: IETF solutions are designed for scale and perform
      well when dealing with large-scale network connectivity and
      reachability.

   *  Monitoring: Available solutions for health, operations and
      management of the network devices.

   *  Security: Comprehensive set of security solutions (at least in IT
      applications).

      Note: we can add more details on routing, device and service
      discovery or even transport.

      See Section 4 for details.








Makhijani & Dong          Expires 28 April 2022                 [Page 6]

Internet-Draft               iiot-framework                 October 2021


3.2.  Deployment Considerations

   A conceptual industry adopted reference model for network
   segmentation is known by Purdue model or ISA-95 [ISA95].  It shows
   hierarchical levels through which ordered connectivity between the
   components (or entities) in Industry Control Systems (ICS) is
   established.  These levels range from 0 at the lowest level for the
   physical devices to applications at level 5.  Those levels also
   include other control and management equipments (potentially treated
   as in-network functions and capabilities).

     |      +-------------------------------+  Enterprise
     | L5   |    Enterprise applications    |  Security
     +--    +-------------------------------+  Zone
     |      +-------------------------------+
     | L4   | Gateways, servers (ops, mgmt) |  IDMZ
     +--    +-------------------------------+
     |      +-------------------------------+
     | L3   |    Supervisory controls       |  Industry
     |      +-------------------------------+  Security
     | L1   |  Device control               |  Zone
     |      +-------------------------------+
     | L0   |Sensors, Actuators, Robots, etc| (cells or zones)
     +--    +-------------------------------+

           Figure 1: ISA 95 or Purdue model of Automation Pyramid

   The scope and functions in each zone in [ISA95] are summarized below:

   *  Enterprise Security Zone:  The IT applications reside in
         enterprise networks and perform tasks necessary for business
         operations such as inventory control, supply-chain logistics,
         schedule and capacity planning.  They need to collect data from
         the OT systems in order to make those decisions.

   *  Industrial Demilitarized Zone:  The OT and IT networks were
         designed to prevent direct communication between them.  The
         IDMZ serves as an information sharing layer between the IT and
         OT (L4 and L3) systems.  This indicates that additional
         security rules, inspection and protection of device identity
         and access is necessary when transiting from L3 to L4.

   *  Manufacturing Zone:  Consists of Levels 0 through 3 site wide
         production system.

         -  Site operations (L3): Supports side-wide view of the
            production system.  Also provide data to L4.




Makhijani & Dong          Expires 28 April 2022                 [Page 7]

Internet-Draft               iiot-framework                 October 2021


         -  Area supervisory control (L2): Performs operation and
            control over a zone or smaller area in a production floor.
            Each area has specific set of tasks or operations to
            perform.

         -  Basic control (L1): For the actual control of the equipment.
            L1 components send commands to L0 equipments to perform
            tasks (e.g. start motor, alter pressure level, or reduce
            motor speed).

         -  Process(L0): Level for the process equipments performing
            actual operations are performed.  This include equipment and
            devices such as motors, pressure valves, temperature, speed,
            etc sensors, etc.

3.2.1.  Limited Domain Network Inspired Framework

   Effectively, industrial networks are under a single administrative
   control or a limited group of administrators.  They are expected to
   extend across different geographies and over a range of distances.

   RFC 8799 [LDN] introduces a formal structure and taxonomy to describe
   large-scale private networks called limited domains.  LDNs use public
   Internet for connectivity across multiple sites and adhere to
   Internet protocols.  However, with in a site, it is acceptable to use
   proprietary protocols.  Thus, an LDN comprises of Internal, External
   and Boundary protocols.

   Industrial networks also extend to multiple sites.  The enterprise
   services will reside in the cloud or edges, while factory floors or
   plants are at remote locations.  Structurally, ISA architecture
   (Figure 1) can be expressed as IETF's Limited Domain Networks [LDN]
   framework.  Thus, L4 and L5 levels in enterprise zone are one site,
   connected via global Internet to L3-L0 levels at factory floors or
   plants.  Using LDN model, we get break down the framework
   requirements systematically:

   *  Inside Network Requirements (manufacturing zone)  Inside networks
         support OT specific protocols and maybe combination of IP and
         non-IP solutions.  This may utilize encapsulations in IP,
         compression of headers in IP or new native-short header
         approaches.

   *  Outside Network Requirements (global or public Internet)  External
         public networks will interconnect different sites using IETF
         technologies of the Internet.  These may utilize pure IPv6,
         NAT, VPNS or similar technologies.




Makhijani & Dong          Expires 28 April 2022                 [Page 8]

Internet-Draft               iiot-framework                 October 2021


   *  Boundary Network Requirements - for translations between inside to
      outside protocols.

      Note: LDN is a methodology that helps in defining deployment
      boundaries (how, what, where) between the use specific protocols
      in a network-zone. it is specifically interesting here because of
      2 reasons - as virtualized components move from one site to other
      security, safety and data-privacy perimeter changes.  We need to
      make sure proper security profiles get applied.  Secondly, it
      especially aligns well with the border protocols mapping to the
      IDMZ definition in Purdue model.  There is one problem though -
      instinctively, we see edge services located in boundary protocols
      (or in IDMZ) not as a separate site.  So RFC8799 needs to say more
      than translations about the border protocols.

3.3.  Alignment with stakeholders

   The paradigms of networking in OT are quite different than IP based
   best-effort networking protocols.  Yet, IETF protocols are
   extensively used in OT applications.  Often, it is not possible to
   get contributors directly from the OT sectors, then it would make
   more sense to coordinate with well-established consortia where OT
   scenarios and requirements are is discussed may be utilized.  Two
   well established foundations are IIC [IIC] and OPC-UA [OPC].  For
   example, a [IIC_TALK] provided overview of IIC activities.

   Industrial IoT Consortium (IIC) provides use cases, scenarios, and
   best-practice frameworks to solve specific problems and solution pain
   points.  It is a rich resources of case studies and demonstrations of
   different test beds.  The IIC itself is not involved in standards
   development, but may help in formalizing requirements, further
   insights into solutions developed in IETF, and potentially help
   adoption of those solutions.

   Open Platform Communications-Unified Architecture (OPC-UA) provides
   interoperability across different hardware platforms using a standard
   data model.  It standardizes various information models,
   corresponding client-server architecture and defines necessary access
   mechanisms to those information models.  The OPC-UA is an abstraction
   layer to provide common interface to different data look-up and event
   notifications.  A number of information models are provided by OPC-UA
   can be found here [OPC_INFO].  Foe example, OPC has a specification
   on PLCs.  It abstracts PLC specific protocols (such as Modbus,
   Profibus, etc.) into a standardized interface allowing HMI/SCADA
   systems to interface with a middleware that converts generic-OPC
   read/write requests into device-specific requests and vice-versa.

      Note: OPC-UA information model similar to YANG?



Makhijani & Dong          Expires 28 April 2022                 [Page 9]

Internet-Draft               iiot-framework                 October 2021


   IETF solutions will focus on leveraging or extending IETF
   technologies for IT and OT integration which is at the infrastructure
   or communication layer.  Thus, providing protocols that could
   potentially benefit higher-level OPC-UA work.

   Both IIC and OPC could provide guidance to the lower level work.

   *  For Discussion: assuming there is an IIN framework - how does it
      fit in the OPC-UA architecture and facilitate adoption of existing
      information models.

4.  IIoT New Requirements

   Traditionally, OT and IT experts have focussed on different concerns.
   On a production floor or with OT, the focus is generally on no-
   congestion, lossless reliable transmission, and real-time or
   deterministic communication.  Quality of manufactured goods, and
   efficiency of processes is also an important concern for OT experts.

   With Industry 4.0 initiatives (such as smart factory and smart
   manufacturing), these concerns are beginning to overlap, i.e. OT
   networks are also required to be concerned with scalability,
   security, operations and maintenance from remote locations.

   The fundamental requirement for industrial networks is to support
   legacy devices (even when the network infrastructure is upgraded)
   while enabling emerging applications.

   *  Requirements from legacy device support:

      1.  Support for protocol formats and their core capabilities.

      2.  Support for traffic profiles for different types of services

      3.  Support for security and separation as designed in OT systems.

   *  Requirements from Emerging Trends:

      1.  Support device to cloud communication (remote operations)

      2.  Virtualization (virtual PLCs, digital twins)

      3.  High-volume data emission (analytics and surveillance)

      4.  Explicit location awareness (to determine edge networks,
          latency sensitive controls, safety operations).





Makhijani & Dong          Expires 28 April 2022                [Page 10]

Internet-Draft               iiot-framework                 October 2021


      5.  Enhanced Industry data and device security (movement of
          sensitive data and remote control)

4.1.  Device to Cloud Mechanisms

   Perimeter of device control is expanding from factory floors to the
   cloud.  It is anticipated that Industrial IoT controls when extended
   to the cloud or edge compute platforms will offer better integration
   with sophisticated business logic application architectures.

   With adoption of virtualization several of supervisory or management
   equipment could transition to IT infrastructure.  It may or may not
   remain on-premises.  All scenarios are possible - moving L1,L2, L3 to
   separate IT network on the same floor, to the edge or to the cloud.
   Now extending the communication to the edge and cloud nodes increases
   the distance requiring adoption of layer 3 network designs.

4.2.  Preserving Performance and Deterministic Behavior

   Shorter addresses are inherent to industry control systems to provide
   implicit determinism.  For this purpose, the industrial networks use
   fieldbus interface with the controllers.

4.3.  Preserving Safety and Task outcomes

4.4.  Interoperability with IP-world machines

   To develop further on different type of address format support.  From
   smaller address of legacy devices to IT based applications with IP
   address.

   (OT-Address)--->(Industry Control)--->(IP-Address)
   (control dev)       ( network )       (application)

   Preferably allow OT devices to understand IP-addresses for the
   servers they connect to.

4.5.  Digital Twin

      Note: Should we include this.  A digital twin is a virtual 3D
      representation of the real world.  It can show physical objects,
      processes, relationships, and behaviors - and it can represent
      them as they are now, as they were in the past or will be in the
      years ahead.  Some discussions have already begun, for example
      [I-D.draft-zhou-nmrg-digitaltwin-network-concepts].






Makhijani & Dong          Expires 28 April 2022                [Page 11]

Internet-Draft               iiot-framework                 October 2021


5.  IIN Framework

   Above mentioned emerging trends such as virtualization of PLCs or
   moving MES or HMI into the cloud will have a significant impact on
   the framework.  It moves functions from manufacturing zone to the
   cloud which not only influences how latency, safety and resiliency
   can be assured but also moves the security zones.

5.1.  Distributed Architecture

                 site-A
     +--(L0-L4)----+                      (L4-L5) *L1,L2,L3*
     | +-----------|-+                     +-------------+
     | |Manufacturing|------<Detnet>-------|Enterprise   |
   __| |Zones      |-|---------------------|Zone         |
   | | |(IINS proto) |<BP>            <BP> | (IETF proto)|
   | +-|-----------+ |                     |             |
   |   +-|-+- site B-+   (L1) *L3-L4*      +-------------+
   |_TSN____|   |<BP>     +--------------+         |
                +-------- | Edge Services|---------+
   |                      +--------------+                |
   +---------------Limited Domain Network ----------------+
                  of an industry vertical

    Figure 2: Integrated Framework with new placements for ISA 95 levels

   In Figure 2, LDN taxonomy of internal, external and boundary
   protocols is used.  The round brackets represent current Purdue model
   levels.  Note that both Manufacturing and Enterprise zones are
   'inside protocols' in LDN terminology but can (or may) run different
   protocol stacks.  Each zone may deploy either custom of standard
   protocols.  They interact using outside protocols i.e., public
   Internet technologies.  The translation from inside to outside
   protocol happens through boundary protocols (shown as <BP> in the
   figure).

   *  IINS (Integrated Industrial Network Stack) Protocols:  A set of
         inside protocols that are used in traditional manufacturing
         zones.  These are expected to support and extend existing
         industry protocols or may even be new extensions.  Note that as
         a level component moves to cloud, those IINS will have to be
         supported in the cloud as well.

5.2.  Interfaces







Makhijani & Dong          Expires 28 April 2022                [Page 12]

Internet-Draft               iiot-framework                 October 2021


        Site A          Site B             Site C
     <--------->     <---------->        <--------->
       +-----+          +-----+            +----------+
       | L0  |---L0_L1--| L1  |----L1_L2---|L2--L2_X--L5|
       +-----+          +-----+            +----------+
                              Site-Y
    <----------->     <---------------------------->
            Site M
   <------------------------->

                Figure 3: Interfaces dependent on the levels

   Figure 3 above depicts that in IIN framework, boundaries between the
   interfaces should not be crossed.  Moreover, equipment or functions
   from different levels may be placed at different sites, but in this
   framework direct communication from higher levels to devices is not
   permitted.

   *  L0_L1 interface decides the communication channel between the
      process and basic control levels even when there may be a number
      network devices.  These network devices are typically IIoT
      gateways that perform protocol translations (such as Modbus to
      Profibus).

   *  L1_L2 interface serves as communication between supervisory
      control devices and PLCs.

   *  L2_X interface is very likely IP interface for levels beyond L2,
      not sure if need to define an interface. it will be used for IT
      enterprise applications. however, it will still need to
      participate in functional requirements of data security and
      operational safety (meeting latency, resiliency targets).

      Note: later add network device details in between.

   Each interface has at least three attributes associated - whether a
   particular request is authorized, the service level guarantees
   (latency, data rate, frequency, etc), security profile.

   In Figure 3, a level based hierarchical co-location is shown to be
   preserved.

   *  L0 is site A, L1 is site B and above L2 in site C.

   *  L0 is site A, L1 above in Site Y.

   *  L0, L1 in site M and above L2 in site C.




Makhijani & Dong          Expires 28 April 2022                [Page 13]

Internet-Draft               iiot-framework                 October 2021


5.3.  IIN Device Functions

   These functions apply to end nodes as well as network nodes or other
   gateways in the network.

   The topologies in the manufacturing zones do not change very
   frequently and devices are also designed for long-term use with
   minimal time between the failures.  Such design considerations may be
   used to simply network operations and configurations.

   Assuming this is a layer 3 network architecture, there should be an
   assignment and association between the network address and end
   devices' physical addresses.  Note that legacy devices are either on
   serial bus or their information is carried over Ethernet media.

   Further motivation and analysis for adapting to OT/IT asymmetric
   address formats is covered in
   [I-D.draft-km-industrial-internet-requirements].

   Additionally, adapting these devices to network layer requires
   support for the following mechanisms:

5.3.1.  Device Specific functions

   *  discovery and on-boarding

   *  Device identification and authentication

   *  Device addresses and their assignment and management

5.3.2.  Transmission (Transport) Mechanisms

   Currently, L0 and L1 devices do not use any transport protocol.  The
   data is embedded after control header.  With a network layer
   solution, TCP maybe too heavy for field-bus devices.  Some other
   means of assuring device delivery will be needed.

5.3.3.  Routing considerations to provide safety & security

   Routing protocols will be necessary as the scale of the devices grow
   at the same time it should be kept simple.  Possibly, Interior
   Gateway Protocol (IGP) will be deployed.  Here it may be useful to
   provide guidelines on IGP features that provide distribution of
   routes (for different devices), path information.







Makhijani & Dong          Expires 28 April 2022                [Page 14]

Internet-Draft               iiot-framework                 October 2021


5.3.4.  Traffic Profiles for different type of data

   Differentiating traffic and assigning priorities is required so that
   important data is not dropped.  This is in addition to use of Detnet
   for time-sensitive services.

   Different type of data can include - process data (high priority),
   monitoring data (low priority), fault, alarms, signals data (high),
   health-check sensors data (medium), etc.

      Todo: Also discuss Detnet [DETNET] here.

6.  IANA Considerations

   This document requires no actions from IANA.

7.  Security Considerations

   This document introduces no new security issues.

8.  Acknowledgements

9.  Informative References

   [DETNET]   Finn, N., Thubert, P., Varga, B., and J. Farkas,
              "Deterministic Networking Architecture", RFC 8655,
              DOI 10.17487/RFC8655, October 2019,
              <https://www.rfc-editor.org/info/rfc8655>.

   [I-D.draft-km-industrial-internet-requirements]
              Makhijani, K. and L. Dong, "Requirements and Scenarios for
              Industry Internet Addressing", Work in Progress, Internet-
              Draft, draft-km-industrial-internet-requirements-00, 10
              June 2021, <https://www.ietf.org/archive/id/draft-km-
              industrial-internet-requirements-00.txt>.

   [I-D.draft-zhou-nmrg-digitaltwin-network-concepts]
              Zhou, C., Yang, H., Duan, X., Lopez, D., Pastor, A., Wu,
              Q., Boucadair, M., and C. Jacquenet, "Digital Twin
              Network: Concepts and Reference Architecture", Work in
              Progress, Internet-Draft, draft-zhou-nmrg-digitaltwin-
              network-concepts-05, 25 October 2021,
              <https://www.ietf.org/archive/id/draft-zhou-nmrg-
              digitaltwin-network-concepts-05.txt>.

   [IIC]      "Industry IoT Consortium", n.d.,
              <https://www.iiconsortium.org>.




Makhijani & Dong          Expires 28 April 2022                [Page 15]

Internet-Draft               iiot-framework                 October 2021


   [IIC_TALK] William Diab, W., "Overview of IIC – Building the IIoT
              Ecosystem", 12 October 2021, <https://github.com/iot-
              dir/Meetings/blob/main/20211012/slides/
              Diab_IIC_Overview_for_IETF_1021_rev2.pdf>.

   [ISA95]    "ANSI/ISA-95.00.01-2010 (IEC 62264-1 Mod) Enterprise-
              Control System Integration - Part 1: Models and
              Terminology", n.d., <https://www.isa.org/standards-and-
              publications/isa-standards/isa-standards-committees/
              isa95>.

   [LDN]      Carpenter, B. and B. Liu, "Limited Domains and Internet
              Protocols", RFC 8799, DOI 10.17487/RFC8799, July 2020,
              <https://www.rfc-editor.org/info/rfc8799>.

   [OPC]      "Open Platform Communications", n.d.,
              <https://opcfoundation.org>.

   [OPC_INFO] "OPC-UA Information Model Specifications", n.d.,
              <https://opcfoundation.org/developer-tools/specifications-
              opc-ua-information-models>.

   [SURV]     Galloway, B. and G. Hancke, "Introduction to Industrial
              Control Networks", IEEE Communications Surveys &
              Tutorials Vol. 15, pp. 860-880,
              DOI 10.1109/surv.2012.071812.00124, 2013,
              <https://doi.org/10.1109/surv.2012.071812.00124>.

Authors' Addresses

   Kiran Makhijani
   Futurewei
   Santa Clara, CA 95050,
   United States of America

   Email: kiran.ietf@gmail.com


   Lijun Dong
   Futurewei
   Santa Clara, CA 95050,
   United States of America

   Email: lijun.dong@futurewei.com







Makhijani & Dong          Expires 28 April 2022                [Page 16]