Internet DRAFT - draft-yu-traffic-shaping
draft-yu-traffic-shaping
Network Working Group H. Yu
Internet-Draft China Future Internet Engineering Center
Intended status: Informational K. Zhang
Expires: 10 April 2024University of Electronic Science and Technology of China
8 October 2023
Carrying Traffic Shaping Mechanism in IPv6 Extension Header
draft-yu-traffic-shaping-00
Abstract
Starting from the traffic shaping mechanism, one of the core
technologies of network deterministic assurance, we summarize the
characteristics of different traffic scheduling and shaping methods
and propose a solution design for IPv6 to carry these traffic
scheduling and shaping methods, taking into account deterministic and
security factors. At the same time, the network scope of practical
applications is becoming larger and larger, and the demand for
deterministic network services will no longer be restricted to LANs,
but will require deterministic forwarding beyond LAN boundaries,
extending the deterministic assurance capability previously provided
in LANs to WANs through network layer technologies.
About This Document
This note is to be removed before publishing as an RFC.
The latest revision of this draft can be found at https://z-
Endeavor.github.io/Internet-Draft/draft-ietf-traffic-shaping.html.
Status information for this document may be found at
https://datatracker.ietf.org/doc/draft-ietf-traffic-shaping/.
Source for this draft and an issue tracker can be found at
https://github.com/z-Endeavor/Internet-Draft.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/.
Yu & Zhang Expires 10 April 2024 [Page 1]
Internet-Draft IPv6 Carries Traffic Shaping Mechanism October 2023
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on 10 April 2024.
Copyright Notice
Copyright (c) 2023 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents (https://trustee.ietf.org/
license-info) in effect on the date of publication of this document.
Please review these documents carefully, as they describe your rights
and restrictions with respect to this document. Code Components
extracted from this document must include Revised BSD License text as
described in Section 4.e of the Trust Legal Provisions and are
provided without warranty as described in the Revised BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Conventions and Definitions . . . . . . . . . . . . . . . . . 4
3. Abbreviations in This Document . . . . . . . . . . . . . . . 4
4. Network Communication System . . . . . . . . . . . . . . . . 4
4.1. General Model of Network Transmission . . . . . . . . . . 4
4.2. Network Node Description . . . . . . . . . . . . . . . . 5
4.3. Network Communication Process . . . . . . . . . . . . . . 5
5. Definition of Carrying Traffic Shaping Mechanism . . . . . . 5
6. Specification in Hop-by-Hop Options . . . . . . . . . . . . . 7
6.1. Format in Hop-by-Hop Option . . . . . . . . . . . . . . . 7
6.2. Hop-by-Hop processing definition . . . . . . . . . . . . 8
7. Security Considerations . . . . . . . . . . . . . . . . . . . 8
7.1. Replay Protection . . . . . . . . . . . . . . . . . . . . 8
7.2. Integrity . . . . . . . . . . . . . . . . . . . . . . . . 9
7.3. Confidentiality . . . . . . . . . . . . . . . . . . . . . 9
8. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 9
9. References . . . . . . . . . . . . . . . . . . . . . . . . . 9
9.1. Normative References . . . . . . . . . . . . . . . . . . 9
9.2. Informative References . . . . . . . . . . . . . . . . . 10
Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . 10
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 10
Yu & Zhang Expires 10 April 2024 [Page 2]
Internet-Draft IPv6 Carries Traffic Shaping Mechanism October 2023
1. Introduction
Time Sensitive Network (TSN) is a network that guarantees the quality
of service for delay-sensitive flows, achieving low latency, low
jitter and zero packet loss. Time-sensitive streams can be divided
into periodic time-sensitive streams (PTS), such as cyclic control
instructions in the plant, synchronization information, and non-
periodic/sporadic time-sensitive streams (STS), such as event alarm
information.
For periodic time-sensitive flows, traffic synchronous scheduling
shaping mechanisms are generally used, requiring precise nanosecond
clock synchronization of network-wide devices. Current mechanisms
studied include Time-Triggered Ethernet (TTE), Time-Aware Shaping
(TAS), Cyclic Queuing and Forwarding (CQF) and Credit-Based Shaping
(CBS).
Scheduling and shaping mechanisms are two quality of service
assurance mechanisms in the switch. Scheduling refers to queue
scheduling, which is generally implemented at the outgoing port of
the switch and consists of three parts: entering the queue, selecting
the sending queue according to the scheduling algorithm, and exiting
the transmission; shaping refers to traffic shaping, which prevents
congestion within the switch or at the next hop by limiting the
forwarding rate of the port.
"IPv6 Hop-by-Hop Options Processing Procedures" [HbH-UPDT] further
specifies the procedures for how IPv6 Hop-by-Hop options are
processed to make their processing even more practical and increase
their use in the Internet. In that context, it makes sense to
consider Hop-by-Hop Options to transport the information that is
relevant to carry traffic shaping mechanism.
Since the asynchronous scheduling and shaping mechanism cannot
guarantee that the worst delay of the packet meets a certain
threshold, it can only guarantee that the average delay of the packet
is comparable to the synchronous method, and the delay jitter is
relatively large, and the delay-sensitive stream is prone to packet
loss in the case of network congestion, the current asynchronous
mechanism is not mature, and in order to better elucidate the nature
of the delay-sensitive network, this document of using the
synchronous mechanism to transmit periodic time-sensitive stream
(PTS) is mainly discussed.
For the traffic shaping mechanism, one of the core technologies of
network deterministic assurance, we summarize the characteristics of
different traffic scheduling and shaping methods and propose a
solution design for IPv6 to carry these traffic scheduling and
Yu & Zhang Expires 10 April 2024 [Page 3]
Internet-Draft IPv6 Carries Traffic Shaping Mechanism October 2023
shaping methods, taking into account deterministic and security
factors. At the same time, the network scope of practical
applications is becoming larger and larger, and the demand for
deterministic network services will no longer be restricted to LANs,
but will require deterministic forwarding beyond LAN boundaries,
extending the deterministic assurance capability previously provided
in LANs to WANs through network layer technologies.
This document gives a description of the design of the IPv6 carrying
traffic shaping mechanism and specifies the technical requirements
and security specifications of the IPv6 carrying traffic shaping
mechanism. This document applies to deterministic data communication
of IPv6 networks that have implemented traffic synchronous scheduling
shaping mechanism.
2. Conventions and Definitions
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in
BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all
capitals, as shown here.
3. Abbreviations in This Document
TSN Time Sensitive Network PTS Periodic Time-sensitive Streams TTE
Time-Triggered Ethernet TAS Time-Aware Shaping CQF Cyclic Queuing and
Forwarding CBS Credit-Based Shaping
4. Network Communication System
Based on the premise of deterministic requirements, this document
only considers the design of synchronization schemes where the
network uses synchronization mechanisms to transmit PTS, while
requiring accurate nanosecond time synchronization of devices within
the entire network communication scenario.
4.1. General Model of Network Transmission
An applicable time-sensitive traffic shaping network communication
model is given in Figure 1 and illustrates the network elements in
it.
Yu & Zhang Expires 10 April 2024 [Page 4]
Internet-Draft IPv6 Carries Traffic Shaping Mechanism October 2023
4.2. Network Node Description
It is expected to be deployed in a variety of IPv6 devices and
situations. Therefore, It is important to specify IPv6 node
requirements will allow traffic shaping mechanisms to work well and
interoperate over IPv6 in a large number of situations and
deployments.
4.3. Network Communication Process
Figure 2 gives the communication flow of the network system.
* Collect the corresponding network topology information, traffic
period, traffic size, end-to-end delay jitter requirement
information and corresponding security requirements from various
deterministic services, complete the centralized user
configuration, and send it down to the network controller through
the network user interface (UNI).
* The network controller receives the network deterministic and
security requirements and calculates the route scheduling control
information for the traffic according to the corresponding
algorithm. If the calculation is successful, the gating list is
automatically synthesized and sent down through the southbound
interface, and then the packet start time is returned to the
sender; if the calculation fails, the orchestrator is told that
the sender flow is not available for scheduling.
* Centralized collaborative scheduling of switches to achieve
traffic scheduling shaping and complete deterministic transmission
by planning routes or dividing time slots, etc.
5. Definition of Carrying Traffic Shaping Mechanism
Carrying traffic shaping mechanism in IPv6 extension header is in the
form of a field on the extended header that specifies the basic
traffic scheduling shaping protocol interface options for resolving
the semantics of the scheduling shaping mechanism in the packet,
allowing the network determinism to be transmitted through the
extended header as well as for the adaptation of the upper layer
protocols and network functions for use. This field information can
be examined and processed by each node of the packet transmission
path.
The requirements for the use of scheduling shaping include the
scheduling shaping technical solution options and the control
information necessary of specific solution. The definition format
consists of four fields, including options, flag bits, fill bit
Yu & Zhang Expires 10 April 2024 [Page 5]
Internet-Draft IPv6 Carries Traffic Shaping Mechanism October 2023
length, and control information. The definition format is shown in
Figure 1. The technical scheme here mainly specifies the synchronous
scheduling and shaping mechanism option, and the asynchronous
scheduling and shaping mechanism information is not transmitted
through this design.
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|Options|F| FBL | |
+-+-+-+-+-+-+-+-+ +
| |
~ Control Information (variable length) ~
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 1: Definition of Carrying Traffic Shaping Mechanism
where
* Options: 4-bits. Indicating the synchronous traffic scheduling
shaping technology scheme used.
* F: 1-bit. Used as a flag bit to record whether the protocol
content has reached its maximum length.
* FBL: 3-bit. The number of bits used to record the padding at the
end of the protocol is 0 to 7 bits to ensure that the total length
of the definition content is an integer multiple of 8 bits.
* Control Information: Variable length. Used to carry the network
control information necessary for the use of a specific scheduling
and shaping mechanism, in a format and content determined by the
specific scheduling and shaping mechanism.
The F identifiers is a flag bit. The value of this field specifies:
* 0 - the length of the protocol content has not exceeded the
maximum value and the information has been read completely.
* 1 - the length of the protocol content exceeds the maximum value
and needs to be read further.
FBL indicates Fill Bit Length which is for compatibility with
subsequent adaptations in the IPv6 extension header. The actual
length of the control information is obtained by parsing the length
of the padding bits to facilitate the reading and processing of the
network control device. The padding method is to set all the padding
bits at the end to 0.
Yu & Zhang Expires 10 April 2024 [Page 6]
Internet-Draft IPv6 Carries Traffic Shaping Mechanism October 2023
The Control Information contains standard control frame format of
each specific scheduling shaping mechanism, which is used to ensure
the integrity of the control information to complete the standard
adaptation to various network devices.
6. Specification in Hop-by-Hop Options
6.1. Format in Hop-by-Hop Option
The definition of carrying traffic shaping mechanism shall conform to
the relevant specifications in [RFC8200] for extended headers. The
content in Section 3 should be placed in a Hop-by-Hop option header
in the extended header to carry information that will not be inserted
or removed and that can be examined or processed by each node in the
packet transmission path until the packet reaches the node identified
in the destination address field of the IPv6 header(or in the case of
multicast, each of a group of nodes).
The definition populates one or more sub-options of the TLV encoding
format into the option field of the hop-by-hop option header, where
the TLV encoding format is shown in Figure 2.
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- - - - - - - - -
| Option Type | Opt Data Len | Option Data
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- - - - - - - - -
Figure 2: TLV Encoding Format
where
* Option Type: 8-bit identifier of the type of option.
* Opt Data Len: 8-bit unsigned integer. Length of the Option Data
field of this option, in octets.
* Option Data: Variable-length field. Option-Type-specific data.
In the definition above, some specific instructions are required:
The Option Type identifiers are internally encoded such that their
highest-order 2 bits specify the action that must be taken if the
processing IPv6 node does not recognize the Option Type. Actions are
selected by the controller in the network, refer to [RFC8200] for
specific action definitions.
Yu & Zhang Expires 10 April 2024 [Page 7]
Internet-Draft IPv6 Carries Traffic Shaping Mechanism October 2023
The third-highest-order bit of the Option Type specifies whether or
not the Option Data of that option can change en route to the
packet’s final destination. The option data is changed during packet
forwarding with traffice shaping information so that this bit needs
to be set to 1.
The low-order 5 bits of the Option Type should not conflict with the
Option Type field already defined by IPv6.
Option Data is used to carry the definition content of Section 3.
In addition, the length of the protocol defined in Section 3 exceeds
the maximum length of an option, the F identifiers should be set to 1
and the protocol will continue to be stored in the next option. The
protocol content in Section 3 is split into at most two options.
6.2. Hop-by-Hop processing definition
HBH Processing draft should define the HBH processing.
7. Security Considerations
Security issues with IPv6 Hop-by-Hop options are well known and have
been documented in several places, including [RFC6398], [RFC6192],
and [RFC9098]. Security Considerations in IPv6 are composed of a
number of different pieces. These are mainly required to provide the
three characteristics of replay protection, integrity and
confidentiality.
7.1. Replay Protection
Replay Protection requires ensuring the uniqueness of each IP packet
to ensure that the information cannot be reused in the event that it
is intercepted and copied.
* It should be ensured that access cannot be regained using the same
packets to prevent attackers from intercepting deciphered
information and then impersonating illegal access.
* A secret key based on algorithm independent exchange should be set
at the host side by the customer and the service provider, and
when each packet is transmitted, a checksum is generated based on
the secret key and the packet, and the checksum is recalculated
and compared at the data receiving side.
* Authentication data should be included in the transmission to
protect the fields that cannot be changed during IP packet
transmission.
Yu & Zhang Expires 10 April 2024 [Page 8]
Internet-Draft IPv6 Carries Traffic Shaping Mechanism October 2023
* The cache data should be cleared and guaranteed to be
unrecoverable.
7.2. Integrity
Integrity of data is to prevent data from being tampered with during
transmission and to ensure that the outgoing and incoming data are
identical.
* Two-way authentication mechanism for shared data information
components should be provided.
* Encrypted transmission channels should be used to prevent data
from being eavesdropped during network transmission.
* Should have the ability to test the integrity of the data and
provide the corresponding recovery control measures.
7.3. Confidentiality
Confidentiality is used to prevent attackers from accessing packet
headers or content, ensuring that information cannot be read during
transmission, even if IP packets are intercepted.
* Encryption policy of terminal data should be established to ensure
the confidentiality of sensitive data output and shared at the
terminal.
* A cryptographic checksum should be generated for each packet, and
the receiver should calculate the checksum before opening the
packet; if the packet is tampered with and the checksum does not
match, the packet is discarded.
8. IANA Considerations
This document has no IANA actions.
9. References
9.1. Normative References
[HbH-UPDT] Hinden, R. M. and G. Fairhurst, "IPv6 Hop-by-Hop Options
Processing Procedures", Work in Progress, Internet-Draft,
draft-hinden-6man-hbh-processing-01, 2 June 2021,
<https://datatracker.ietf.org/doc/html/draft-hinden-6man-
hbh-processing-01>.
Yu & Zhang Expires 10 April 2024 [Page 9]
Internet-Draft IPv6 Carries Traffic Shaping Mechanism October 2023
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997,
<https://www.rfc-editor.org/rfc/rfc2119>.
[RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
May 2017, <https://www.rfc-editor.org/rfc/rfc8174>.
[RFC8200] Deering, S. and R. Hinden, "Internet Protocol, Version 6
(IPv6) Specification", STD 86, RFC 8200,
DOI 10.17487/RFC8200, July 2017,
<https://www.rfc-editor.org/rfc/rfc8200>.
9.2. Informative References
[RFC5409] Martin, L. and M. Schertler, "Using the Boneh-Franklin and
Boneh-Boyen Identity-Based Encryption Algorithms with the
Cryptographic Message Syntax (CMS)", RFC 5409,
DOI 10.17487/RFC5409, January 2009,
<https://www.rfc-editor.org/rfc/rfc5409>.
[RFC6192] Dugal, D., Pignataro, C., and R. Dunn, "Protecting the
Router Control Plane", RFC 6192, DOI 10.17487/RFC6192,
March 2011, <https://www.rfc-editor.org/rfc/rfc6192>.
[RFC6398] Le Faucheur, F., Ed., "IP Router Alert Considerations and
Usage", BCP 168, RFC 6398, DOI 10.17487/RFC6398, October
2011, <https://www.rfc-editor.org/rfc/rfc6398>.
[RFC9098] Gont, F., Hilliard, N., Doering, G., Kumari, W., Huston,
G., and W. Liu, "Operational Implications of IPv6 Packets
with Extension Headers", RFC 9098, DOI 10.17487/RFC9098,
September 2021, <https://www.rfc-editor.org/rfc/rfc9098>.
Acknowledgments
TODO acknowledge.
Authors' Addresses
Haisheng Yu
China Future Internet Engineering Center
Email: hsyu@cfiec.net
Kaicheng Zhang
University of Electronic Science and Technology of China
Yu & Zhang Expires 10 April 2024 [Page 10]
Internet-Draft IPv6 Carries Traffic Shaping Mechanism October 2023
Email: 457642057@qq.com
Yu & Zhang Expires 10 April 2024 [Page 11]