<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-zdm-tvr-applicability-05" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="Applicability Statement">Applicability of TVR YANG Data Models</title>
    <seriesInfo name="Internet-Draft" value="draft-zdm-tvr-applicability-05"/>
    <author fullname="Li Zhang">
      <organization>Huawei</organization>
      <address>
        <email>zhangli344@huawei.com</email>
      </address>
    </author>
    <author fullname="Jie Dong">
      <organization>Huawei</organization>
      <address>
        <email>jie.dong@huawei.com</email>
      </address>
    </author>
    <author fullname="Mohamed Boucadair">
      <organization>Orange</organization>
      <address>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <date year="2026" month="February" day="09"/>
    <area>Routing</area>
    <workgroup>Time-Variant Routing</workgroup>
    <keyword>schedule</keyword>
    <keyword>YANG module</keyword>
    <keyword>applicability</keyword>
    <abstract>
      <?line 56?>

<t>Time-Variant Routing (TVR) is a routing system that can accommodate predicted topology changes caused by internal or
external factors. Typical use cases include resource preservation networks, operating efficiency networks and dynamic
reachability networks.
This document provides examples of how to implement the TVR scheduling capabilities for key use cases. It describes
which part of the TVR data model is used and why, and it outlines operational and security considerations when deploying
TVR-based technologies.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Time-Variant Routing Working Group mailing list (tvr@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tvr/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/zhangli-abcd/TVR-Applicability-2"/>.</t>
    </note>
  </front>
  <middle>
    <?line 65?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Time-Variant Routing (TVR) Working Group addresses a need in network environments where
predictable variations in topology - such as the restoration, activation, or loss of network elements, are
part of normal operations. This approach is essential in dynamic networks with mobile nodes, where links may
be frequently disrupted and re-established due to mobility. It is also essential in networks with highly predictable traffic
patterns, where links may be powered down to conserve or reduce energy.</t>
      <t>This document provides examples of implementing TVR scheduling capabilities in identified use cases. It
demonstrates the applicability of the TVR data model, methods for disseminating the TVR schedules, and the
necessary IETF ancillary technologies for network environments, such as time synchronization and policy,
that support TVR capabilities. The examples assume YANG instance data encoding per <xref target="RFC7951"/> for JSON and the TVR schedule YANG modules.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document uses the following terms:</t>
      <dl>
        <dt>Managing Device:</dt>
        <dd>
          <t>A centralized entity responsible for generating
and maintaining TVR schedules.  The managing device distributes
schedules to network controllers and/or managed devices using the
TVR YANG modules.  In some deployments, the managing device may
also serve as the network controller.</t>
        </dd>
        <dt>Network Controller:</dt>
        <dd>
          <t>An entity that receives topology schedules
from the managing device and performs route computation based on
time-variant network conditions.  The controller then distributes
routing results to managed devices.</t>
        </dd>
      </dl>
      <ul spacing="normal">
        <li>
          <t>Managed Device: A network device (e.g., router, switch) that
receives schedules and/or routing instructions, and executes them
according to the specified time windows.  Managed devices may
receive schedules directly from the managing device or routing
results from the network controller.</t>
        </li>
      </ul>
    </section>
    <section anchor="applicability-of-the-tvr-yang-model">
      <name>Applicability of the TVR YANG Model</name>
      <t>The TVR data model <xref target="I-D.ietf-tvr-schedule-yang"/> defines the TVR node YANG module and TVR topology YANG module. This
clause discusses the applicability of these two modules separately.</t>
      <section anchor="applicability-node-yang">
        <name>Applicability of TVR Node YANG Module</name>
        <t>As specified in <xref section="5.2" sectionFormat="of" target="I-D.ietf-tvr-schedule-yang"/>, module ietf-tvr-node.yang is a device model and designed to manage a
single node with scheduled attributes. It is not necessary in all TVR use cases.</t>
        <t>The applicability of TVR node YANG module depends on whether changes in the attributes of network devices are caused by
the environment or centrally controlled.</t>
        <ul spacing="normal">
          <li>
            <t>When the changes are caused by the environment changes (such as movement, sunlight changes, and weather changes) or
by decisions made by the devices themselves, the network device does not need to get the managed information through the YANG module. For example,
when the distance between two nodes' is too far to establish a connection, then the link is down. Another case is that when the weather is
not good and leading to the link degradation, then the nodes decide to disconnect the link.</t>
          </li>
          <li>
            <t>When the changes are caused by the centralized control (such as a controller, or an orchestrator), the devices themselves
do not know when to adjust the attributes. In this case, the scheduled attributes changes should be delivered to the
network devices through TVR node YANG module.</t>
          </li>
        </ul>
      </section>
      <section anchor="applicability-topology-yang">
        <name>Applicability of TVR Topology YANG Module</name>
        <t>As specified in <xref section="5.3" sectionFormat="of" target="I-D.ietf-tvr-schedule-yang"/>, module ietf-tvr-topology.yang describes a network topology
with a time-variant availability schedule. This YANG module is also not applicable for all TVR use cases.</t>
        <t>According to the description of <xref section="3.1" sectionFormat="of" target="I-D.ietf-tvr-requirements"/>, the scheduling generation locality
and execution locality may be centralized or distributed.</t>
        <ul spacing="normal">
          <li>
            <t>When the schedules are generated and executed in distributed manner, which means that each node generates and executes its specific
schedules. In this scenario, the topology YANG module is not necessary, the devices can collect topology schedules by other means.
This scenario is outside of the scope of this document.</t>
          </li>
          <li>
            <t>When the schedules are generated and executed in centralized manner and within the same device, the topology YANG module is also not applicable.
Therefore, this scenario is also outside of the scope of this document.</t>
          </li>
          <li>
            <t>When the schedules are generated and executed in centralized manner but on different devices. For example, the schedule is
generated by the managing device, and executed by the network controller. In this scenario the scheduled topology changes
need to be sent to the execution device through the topology YANG module. This scenario is called "Centralized Scenario".</t>
          </li>
          <li>
            <t>When the schedules are generated in a centralized manner and executed in a distributed manner, the YANG module
needs to be used to deliver the scheduled topology changes to the managed device. This scenario is called "Distributed Scenario".</t>
          </li>
        </ul>
        <t>To summarize the key differences between these scenarios:</t>
        <ul spacing="normal">
          <li>
            <t>Centralized Scenario: Schedules are generated by the managing
device, stored in the network controller, and executed by network
devices.  Route computation runs in the controller, and routing
results are pushed to the network devices.</t>
          </li>
          <li>
            <t>Distributed Scenario: Schedules are generated by the managing
device, stored in and executed by the network devices.  Route
computation runs in the network devices themselves.</t>
          </li>
        </ul>
        <section anchor="centralized-scenario">
          <name>Interactions in Centralized Scenario</name>
          <t>In the centralized scenario, the network managing device generates and maintains schedules, the routing application
is deployed in the network controller, and the network devices execute the schedules and routing results.
The following figure shows the components of the centralized scenario.</t>
          <figure anchor="ref-to-fig1">
            <name>Components of Centralized Scenario</name>
            <artwork><![CDATA[
 +-----------------------------------------------------------------+
 |                        Managing Device                          |
 +-----------------------------------------------------------------+
            |                                           |
Topology YANG Module                        Node YANG Module(optional)
            |                                           |
 +---------\|/----------+                     +--------\|/--------+
 |  Network Controller  |---Routing Results-->|  Network Devices  |
 +----------------------+                     +-------------------+
]]></artwork>
          </figure>
          <t>A centralized scenario involves the interaction between the managing device and network controller, the managing
device and network devices, and the controller and network devices.</t>
          <t>The managing device may need to deliver node-specific schedules to network devices by TVR Schedule Node YANG
module <xref section="5.2" sectionFormat="of" target="I-D.ietf-tvr-schedule-yang"/>. This is optional and only necessary when the node attribute changes
are instructed by the controller. Meanwhile, the network devices need to report their own status data to the managing device.</t>
          <t>The managing device needs to deliver the schedules of network topology to the network controller by the TVR Network
Topology YANG module <xref section="5.3" sectionFormat="of" target="I-D.ietf-tvr-schedule-yang"/>, so that the routing application in the controller
can consider the impact of topology changes on routes when calculating routes.</t>
          <t>The network controller should deliver the route calculation results to the network devices. The format of the routing
results depend on the protocols deployed (BGP, PCEP, etc.). Routing results <bcp14>MAY</bcp14> be delivered ahead and activated using an explicit time reference (e.g., absolute UTC), or via pre-staging plus an activation trigger.</t>
        </section>
        <section anchor="distributed-scenario">
          <name>Interactions in Distributed Scenario</name>
          <t>In the distributed scenario, the managing device generates and maintains schedules, the routing application
is deployed in the network devices which also executes schedules and route calculation.</t>
          <figure anchor="ref-to-fig2">
            <name>Components of Distributed Scenario</name>
            <artwork><![CDATA[
 +-------------------------------------------------+
 |                  Managing Device                |
 +-------------------------------------------------+
                          |
               Topology YANG Module and
               Node YANG Module(optional)
                          |
 +-----------------------\|/-----------------------+
 |         Managed Devices (Network Devices)        |
 +-------------------------------------------------+
]]></artwork>
          </figure>
          <t>The distributed model only involves the interaction between managing devices and network devices(managed devices).</t>
          <t>The managing device need to deliver network topology schedules to all the network devices by TVR Network Topology YANG
module for route calculation. The managing device may also need to deliver node-specific schedules to network devices by
TVR Schedule Node YANG module, this is optional and only necessary when the node attributes changes are instructed by
the controller. The network devices need to report their own status data to the managing device.</t>
        </section>
      </section>
      <section anchor="encoding-of-the-yang-model">
        <name>Encoding of the YANG Model</name>
        <t>The TVR data model <xref target="I-D.ietf-tvr-schedule-yang"/> can manage network resources and topologies with scheduled
attributes. There are modules defined in the TVR data model, these are:</t>
        <ul spacing="normal">
          <li>
            <t>The "ietf-tvr-schedule" module contains the schedule YANG definitions. This module uses groupings from <xref target="I-D.ietf-netmod-schedule-yang"/> data model;</t>
          </li>
          <li>
            <t>The "ietf-tvr-topology" module defines a network topology with a time-variant availability schedule;</t>
          </li>
          <li>
            <t>The "ietf-tvr-node" module is to be used to manage the scheduled attributes of a single node.</t>
          </li>
        </ul>
        <t>To create a schedule, the following TVR data model objects and subsequent branches are used:</t>
        <ul spacing="normal">
          <li>
            <t>'node-schedule'</t>
          </li>
          <li>
            <t>'interface-schedule'</t>
          </li>
          <li>
            <t>'attribute-schedule'</t>
          </li>
        </ul>
        <t>When using these YANG modules with NETCONF or RESTCONF, implementations <bcp14>SHOULD</bcp14> target the intended configuration datastore
for schedule provisioning and <bcp14>MAY</bcp14> read from the operational datastore
to retrieve execution status and applied schedules.  Clients can use
NMDA (Network Management Datastore Architecture, <xref target="RFC8342"/>)
operations to distinguish between intended configuration and actual
operational state.  For example, the managing device writes schedules
to the intended or running datastore, and network devices report
execution status via the operational datastore.</t>
        <t>A TVR scenario example is provided below, where a wireless link is shut down for 12 hours, from 19:00 to 7am the next day.
The schedule is identified using a unique identifier that is conveyed in 'schedule-id', and the recurring schedule can be applied for multiple days using Coordinated
Universal Time (UTC).
More detailed examples of the JSON example is provided in this documents Appendix.</t>
        <artwork><![CDATA[
{
   "ietf-tvr-node:node-schedule":[
      {
         "node-id":1234567890,
         "node-power-schedule":{
            "power-default":true,
         },
         "interface-schedule":[
            {
               "name":"Wlan0",
               "default-available":false,
               "attribute-schedule":{
                  "schedules":[
                     {
                        "schedule-id":111111,
                        "recurrence-first":{
                           "start-time-utc":"2025-12-01T19:00:00Z",
                           "duration":43200
                        },
                        "utc-until":"2026-12-01T00:00:00Z",
                        "frequency":"ietf-schedule:daily",
                        "interval":1,
                        "attr-value":{
                           "available":true
                        }
                     }
                  ]
               }
            }
         ]
      }
   ]
}
]]></artwork>
        <t>The methods for disseminating and propagating the generated schedules are discussed in the following subsections.</t>
      </section>
      <section anchor="management-protocols-for-tvr">
        <name>Management Protocols for TVR</name>
        <t>The TVR data model is designed to be accessed via YANG-based management protocols such as NETCONF <xref target="RFC6241"/>, RESTCONF
<xref target="RFC8040"/> and CORECONF<xref target="I-D.ietf-core-comi-19"/>. This section discusses the applicability of these protocols for
configuring time-variant network resources using the TVR YANG data models.</t>
        <t>NETCONF provides a robust mechanism for managing complex network configurations, particularly when transactional integrity
and operational consistency are required. Its ability to execute atomic transactions ensures that schedules involving
multiple resources are applied fully, preventing partial updates that could lead to configuration inconsistencies. This
feature is important for time-sensitive scheduling in TVR environments. Additionally, NETCONF supports the validation of
configurations prior to commitment, allowing operators to verify the correctness of schedules before they are applied.
It also includes rollback capabilities, such as restoring a previous configuration during scheduling errors.</t>
        <t>In contrast, RESTCONF offers a simpler, stateless method for interacting with network devices, making it suitable for use
cases requiring lightweight, rapid configuration. RESTCONF utilizes a RESTful interface over HTTP, providing a streamlined
approach to network configuration and management. Therefore, RESTCONF may be advantageous in scenarios where quick adjustments
to schedules are needed or where integration with web-based or cloud-native systems is a priority.</t>
        <t>CORECONF provides a lightweight, stateless method for managing small network devices where saving bytes to transport a
message is very important. CORECONF uses CoAP<xref target="RFC7252"/> methods to access structured data defined in YANG which is a complementary to RESTCONF.
Unlike RESTCONF, many CORECONF design decisions are motivated by minimizing the message size. Therefore, CORECONF is advantageous
in networks with constrained devices and very limited transmission bandwidth, especially in IoT devices that already deployed CoAP.</t>
        <t>Depending on the type of node in the TVR network, NETCONF would be the preferred protocol for large-scale, critical scheduling
operations requiring validation and rollback mechanisms. For smaller-scale or isolated scheduling tasks, RESTCONF provides an
efficient and straightforward option without the need for the transactional features offered by NETCONF. CORECONF is preferred
in resource constrained IoT networks where saving message bytes is a priority. The choice of protocol
to use with the TVR YANG model should be driven by the specific requirements of the network environment and the complexity of
the scheduling tasks involved.</t>
        <t>The security aspects of these management protocols, including their strengths and weaknesses, are discussed further in
<xref target="security-considerations"/> of this document.</t>
      </section>
    </section>
    <section anchor="time-synchronization">
      <name>Time Synchronization</name>
      <t>Time Synchronization is fundamental for ensuring that TVR mechanisms, which depend on highly accurate timing, function as intended across
an entire network. Misalignment in time could lead to serious routing issues, including inefficiency in path forwarding,
instability in routing tables, and traffic outages.</t>
      <t>Time Synchronization mechanisms will be used to ensure:</t>
      <ul spacing="normal">
        <li>
          <t>Coordination of Planned Network Events;</t>
        </li>
        <li>
          <t>Verification of TVR Data Model Time Stamps</t>
        </li>
        <li>
          <t>Accurate Scheduling of Paths;</t>
        </li>
        <li>
          <t>Fault Tolerance.</t>
        </li>
      </ul>
      <t>Different time-variant scenarios may require different granularities of time synchronization. For example, the
period of traffic and topology changes in tidal networks is usually a day or week. Therefore, a second-level time
synchronization is enough. However, for the dynamic reachability scenarios, a fine-granularity time synchronization may
be necessary, as the nodes may moving very fast in some cases (the moving speed of a low earth orbit satellite is more than 7900 m/s)</t>
      <t>Operators <bcp14>SHOULD</bcp14> derive a maximum acceptable time-error bound based on the schedule granularity, execution jitter tolerance, and
activation window requirements.  For instance, if a schedule has a 1-second activation window and the system can tolerate up to 100ms of
execution jitter, the time synchronization error <bcp14>MUST</bcp14> be kept well below 900ms.  The chosen time synchronization protocol and
configuration <bcp14>MUST</bcp14> be capable of meeting this derived bound under all expected network conditions.</t>
      <t>Existing clock synchronization protocols can be classified into hardware-based protocols and software-based protocols.</t>
      <t>Hardware-based protocols often rely on dedicated hardware to ensure clock synchronization, such as Satellite Based Timing Service (SBTS)
and Precision Time Protocol (PTP). The SBTS includes but not limited to Global Position System (GPS),
BeiDou Navigation Satellite System(BDS), Global Navigation Satellite System(GLONASS), and Galileo satellite navigation system.
Software-based protocols, on the other hand, synchronize clocks through software packages running on systems, such as Network
Time Protocol (NTP) <xref target="RFC5905"/> and Simple Network Time Protocol (SNTP) <xref target="RFC4330"/>.</t>
      <t>The security aspects of time synchronization mechanisms are discussed further in <xref target="security-considerations"/> of this document.</t>
      <section anchor="hardware-based-time-synchronization-mechanisms">
        <name>Hardware-based Time Synchronization Mechanisms</name>
        <t>Hardware-based protocols typically have higher precision and stability, but also have higher cost due to the dedicated hardware. SBTS and PTP are the typical hardware-based time synchronization mechanisms.</t>
        <t>SBTS provides a precise time synchronization service based on the signals transmitted by the satellites. SBTS can realize the micro-second level time synchronization among the devices installed with SBTS reviver hardware.</t>
        <t>PTP is a network protocol that complies with the IEEE 1588 standard and is used to implement high-precision time synchronization between network nodes. PTP implements time synchronization by transmitting synchronization messages between master and slave devices. Based on the hardware timestamp, the precision of time synchronization is much higher than that of NTP, and can reach the sub-microsecond level or even tens of nanoseconds.  When deploying PTP in TVR networks, the managing devices should be the master and the network devices and controller should be the slaves which get time from the master.</t>
        <t>Both SBTS and PTP can realize micro-second level time synchronization. Depending on the features of TVR network, the SBTS would be the preferred mechanisms for
large-scale, high dynamic and open-air networks, especially networks with unreliable links as it does not require network links to exchange time information.
For the small-scale networks with stable links but have high-precision time synchronization requirements, the PTP is much preferred.</t>
      </section>
      <section anchor="software-based-time-synchronization-protocols">
        <name>Software-based Time Synchronization Protocols</name>
        <t>Software-based protocols are simple and applicable to common hardware devices, but have lower precision (For
example, the NTP can realize the synchronization at tens of milliseconds level).</t>
        <section anchor="ntp">
          <name>NTP</name>
          <t>NTP uses a hierarchical structure of time sources. Each level of this hierarchy is termed a stratum. Generally, an NTP
server synchronized to an authoritative clock runs at stratum 1. Such NTP server functions as the primary time server
to provide clock synchronization for other devices on the network. Stratum 2 servers obtain time from stratum 1 servers,
stratum 3 servers obtain time from stratum 2 servers, and so on.</t>
          <t>In TVR use cases, the managing device functions as a level-1 NTP server and synchronized to an authoritative clock
source. The network controller and network devices behave as clients to obtain accurate time from the managing device.
<xref target="ref-to-fig3"/> shows an NTP deployment scenario for obtaining clock from a GPS clock source.</t>
          <figure anchor="ref-to-fig3">
            <name>Deployment Case of NTP in Tidal Networks</name>
            <artwork><![CDATA[
                           +--------------------+
                           |  GPS Clock Source  |
                           +--------------------+
                                     |
               +--------------------\|/------------------+
Stratum 1      |             Managing Device             |
               +-----------------------------------------+
                     |                             |
                     |                             |
                     |                             |
          +---------\|/----------+       +--------\|/--------+
Stratum 2 |  Network Controller  |       |  Network Devices  |
          +----------------------+       +-------------------+

]]></artwork>
          </figure>
          <t>NTP is preferred in large-scale networks with reliable links and long-term changes, which does not require a high-precision time synchronization.</t>
        </section>
        <section anchor="sntp">
          <name>SNTP</name>
          <t>SNTP is a subset of the NTP used to synchronize computer clocks in the Internet. It simplifies the complex NTP
synchronization function and has lower clock precision, but the synchronization precision still can be kept within
seconds. SNTP is also preferred in large-scale networks with reliable links, long-term changes, and loose synchronization precision. In addition, it is more suitable for networks with limited resources than NTP.</t>
        </section>
      </section>
    </section>
    <section anchor="schedule-database">
      <name>Schedule Database</name>
      <t>The schedule database is used to store and maintain schedules, the database may be deployed on a managing device
and managed devices based on requirements.</t>
      <t>The source of the schedule database may be created from multiple sources, for example, configuration from an administrator
or YANG model from the management interface. The schedule entries of different databases may be different, but the
content of the same schedule entry in the schedule databases of different devices in the same domain must be
consistent. There are at least two ways to make the content of the same schedule entry in different schedule databases
consistent:</t>
      <ul spacing="normal">
        <li>
          <t>All the schedule entries are generated at a specific device;</t>
        </li>
        <li>
          <t>Schedule entries are generated at different devices, but there is a synchronization mechanism to synchronize the
schedule databases among devices.</t>
        </li>
      </ul>
      <t>Option 1 is simplest and easy to implement. In a time-variant domain, the managing device may receive scheduling
requests and generate all schedule entries. Then the schedule entries are delivered to the necessary network devices
in the domain through the TVR YANG model.</t>
      <t>Option 2 relies on advertisement mechanisms (such as routing techniques) to advertise the scheduling data generated
by itself to other devices. This could be achieved using extensions to existing routing schemes and techniques.</t>
      <t>Detailed schedule distribution mechanisms beyond YANG-based configuration are outside of this document.</t>
      <section anchor="data-structure">
        <name>Data Structure</name>
        <t><xref target="I-D.ietf-tvr-schedule-yang"/> defines a TVR Node and TVR Topology YANG modules. The Node YANG module
includes node power schedules and interface schedules. The Topology YANG module includes node schedules and link schedules.</t>
        <t>Based on the preceding four schedule types, the schedule database should contain four types of schedule entries in
different formats:</t>
        <ul spacing="normal">
          <li>
            <t>Node power schedule entry;</t>
          </li>
          <li>
            <t>Interface schedule entry;</t>
          </li>
          <li>
            <t>Node schedule entry;</t>
          </li>
          <li>
            <t>Link schedule entry;</t>
          </li>
        </ul>
        <t>The detailed format and fields of different types of schedule entries could reference to the definitions of the corresponding
YANG modules.</t>
      </section>
      <section anchor="schedule-operations">
        <name>Schedule Operations</name>
        <t>This section provides general requirements for using the TVR schedules.</t>
        <t>The schedule database should support the add, update, and delete operations.</t>
        <t>When adding or updating a schedule entry, the execution node needs to check whether resource conflicts exist between the
current schedule and existing schedules. If a conflict exists, the operation should be failed.</t>
        <t>Schedules are updated and deleted based on schedule IDs. Therefore, schedule IDs must be unique in a time-variant domain.
This can be handled, e.g., by a dedicated allocation agent within the time-variant domain.</t>
      </section>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>Several operational considerations exist when using TVR techniques and data models in a network. This section provides
some high-level observations and more detailed sub-sections for specific consideration related to schedule dissemination,
execution, and recovery in case of failure to apply a schedule or partial change.</t>
      <ul spacing="normal">
        <li>
          <t>Coordinated Network Events: TVR often coordinates routing changes anticipating events like predictable low-traffic
periods or link downtimes (e.g., scheduled maintenance or traffic demand).</t>
        </li>
        <li>
          <t>Accurate Scheduling of Paths: TVR schedules capable routers and network nodes will dynamically adjust forwarding paths
based on planned changes in link availability or network conditions.</t>
        </li>
        <li>
          <t>Time-Stamped Data Models: TVR will require the use time-stamped data models (e.g., schedules for link changes or
availability windows) to make interface management decisions. This ensures that all TVR nodes interpret the timing of
events consistently and implement time-based policies correctly.</t>
        </li>
      </ul>
      <t>Therefore, network time accuracy and time-stamped data models are critical to ensure that coordinated network events
and scheduled path decisions across the network are based on a consistent time reference. Without accurate time sync,
nodes could apply different schedules, causing routing inconsistencies, path flapping, or packet loss.</t>
      <t>Since the all the schedules are generated by the managing devices, it is necessary to make sure that the managing
device and managed devices within a schedule domain (<xref section="2.1.1" sectionFormat="of" target="I-D.ietf-tvr-requirements"/>) are synchronized
with the same time source. It ensures they have the same notion of when that is.</t>
      <section anchor="schedule-dissemination">
        <name>Schedule Dissemination</name>
        <t>When distributing schedules, the following problems should be considered:</t>
        <ul spacing="normal">
          <li>
            <t>The managed devices that receives a schedule should have the ability to execute the schedule. If the device does not support schedule
execution, it <bcp14>SHOULD</bcp14> reject the update with an appropriate error, or ignore it if the management interface does not support error reporting.</t>
          </li>
          <li>
            <t>The distributing of a schedule <bcp14>SHOULD</bcp14> be delivered at least x (operator-defined) time before the earliest start time of the schedule, this ensures that the
managed device has enough time to execute this schedule.</t>
          </li>
        </ul>
      </section>
      <section anchor="schedule-execution">
        <name>Schedule Execution</name>
        <t>Schedule execution means that a component (e.g., device) undertakes an action (e.g., allocates and deallocates resources)
at specified time points. The schedule execution of Node Module and Topology Module should be considered separately.</t>
        <section anchor="execution-of-node-schedule">
          <name>Execution of Node Schedule</name>
          <t>Node schedule execution indicates a node to change its node/interfaces availability/power up
and down, and other attributes directly or by commands.</t>
          <t>when executing a node schedule, the schedule executor should undertake an action at specified time points as indicated in the schedule.</t>
        </section>
        <section anchor="execution-of-topology-module-schedule">
          <name>Execution of Topology Module Schedule</name>
          <t>Topology schedule execution means a node take some measures before or upon the scheduled topology changes.</t>
          <t>The schedule executor should understand the consequences of the schedule execution. The addition and deletion of the topology
need to be considered separately.</t>
          <t>A link coming up or a node joining a topology should not have any functional change until the change is proven to be fully
operational. The routing paths may be pre-computed but should not be installed before all the topology changes are
confirmed to be operational. Pre-computation <bcp14>MAY</bcp14> be used, operators should weigh compute cost versus reduced activation latency. The network may choose to
not do any pre-installation or pre-computation in reaction to topological additions at a small cost of some operational
efficiency.</t>
          <t>Topological deletions are an entirely different matter. If a link or node is to be removed from the topology, then the
network should act before the anticipated change to route traffic around the expected topological change. Specifically,
at some point before the planned topology change, the routing paths should be pre-computed and installed before the
topology change takes place. The required time to perform such planned action will vary depending on the exact network
and configuration. When using an IGP or other distributed routing protocols, the affected links may be set to a high
metric to direct traffic to alternate paths. This type of change does require some time to propagate through the
network, so the metric change should be initiated far enough in advance that the network converges before the actual
topological change.</t>
          <t>In addition to the addition and deletion of topology, a schedule may indicate the attributes change of some links, such as bandwidth and delay.
If an attribute changes better (such as latency decrease and bandwidth increase), then the executor should take actions later
or until the topology change is proven to be fully operational.
If an attribute changes worse (such as latency increase and bandwidth decrease), then the node should react to it before the change take place.</t>
        </section>
      </section>
      <section anchor="schedule-recovery">
        <name>Schedule Recovery</name>
        <t>Schedule recovery means when a node lost its specific schedule data, it should be able to recover these schedule data.
Typical scenarios include data loss due to device restart, disconnection from managing devices and failure to receive new
schedules for a long time. In these scenarios, once the connection between the managed device and the managing device is
established again, the managing device needs to re-distribute all schedules that start time is later than the current moment
to the managed device after time synchronization is finished.</t>
      </section>
      <section anchor="error-handling">
        <name>Error Handling</name>
        <section anchor="consistency-error">
          <name>Consistency Error</name>
          <t>Consistency error means that some time parameters conflict with other time parameters in the same schedule or in other schedules.</t>
          <ul spacing="normal">
            <li>
              <t>If the time parameters of a schedule conflict with each other, for example, the period-start later than period-end,
the duration is longer than the product of frequency and interval, or the duration is longer than utc-until, then the schedule
should be discarded and an error should be returned to the schedule originator (e.g., the managing device or management client).</t>
            </li>
            <li>
              <t>If there is a conflict between schedules with different schedule IDs, for example, schedule1 indicates that interface B is closed at time A, but
schedule2 indicates that interface B is open at time A, then only the conflicting update should be rejected (retaining the last-known-good schedule).
An error should be returned to the schedule originator, and the conflict <bcp14>MUST</bcp14> be
logged for audit purposes.
If two schedules have the same schedule ID, then it is considered as an update of the former schedule. Updates with the same schedule ID <bcp14>SHALL</bcp14> completely replace the previous schedule (full replacement, not merge).
Implementations <bcp14>SHOULD</bcp14> support versioning or etag-based mechanisms to detect concurrent updates.
Partial updates to a schedule are NOT permitted; clients <bcp14>MUST</bcp14> send the complete schedule definition.</t>
            </li>
          </ul>
        </section>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The integration of time-variant mechanisms in network operations presents distinct security challenges that require thorough
analysis to safeguard the network’s integrity, availability, and confidentiality. Networks that rely on time-sensitive data
for routing and forwarding decisions are particularly susceptible to attacks that exploit timing dependencies.</t>
      <t>The "Security Considerations" section of <xref target="I-D.ietf-tvr-requirements"/> outlines various threat vectors and categories specific
to time-variant environments.</t>
      <section anchor="dos-attack">
        <name>Denial-of-Service (DoS) Attack</name>
        <t>In a time-variant network, malicious actors could attack the network by disrupting or manipulating the time synchronization
process. For example, an attacker could intentionally delay or corrupt time signals exchanged within the network, leading
to routing errors and widespread denial-of-service (DoS) attacks.</t>
        <t>This kind of attack could be mitigated by the redundant time synchronization mechanisms, for example, multiple NTP sources
or multiple time synchronization protocols could be deployed in a TVR network. The network devices could guarantee the
correctness of the time by checking whether the time signals from different sources or protocols.</t>
        <t>In addition, peer authentication is also an important way to protect the time signals being tampered by
attackers. Some security extensions for time synchronization protocols (such as NTS (Network Time Security)) are
recommended to be applied.</t>
      </section>
      <section anchor="traffic-analysis">
        <name>Traffic Analysis and Path Prediction</name>
        <t>In a time-variant network, if time information is not adequately protected, attackers could conduct traffic analysis to
infer routing decisions, network load, or usage patterns. The schedule ability could enable attackers to launch highly
targeted attacks, such as selectively overloading certain links or intercepting sensitive communications.</t>
        <t>This kind of attack could be mitigated by the encryption of schedules and the authentication of managing devices. For
the networks using NETCONF to deliver schedules, NETCONF over TLS<xref target="RFC7589"/> is recommended to achieve the bidirectional
authentication and encryption of YANG model data. RESTCONF supports TLS originally, so it can be deployed without
additional configurations or modifications.</t>
        <t>In addition, in time variant networks with centralized scenario<xref target="centralized-scenario"/>, the encryption of routing path
information is also necessary to avoid the fake routing information. Considering the most typical protocols used to
deliver the routing path information between controller and network devices are BGP and PCEP, and both are based on TCP.
Therefore, the TLS is <bcp14>RECOMMENDED</bcp14> to provide confidentiality and integrity protection.</t>
      </section>
      <section anchor="activity-identification">
        <name>Activity Identification and Privacy</name>
        <t>In certain scenarios, precise time information exchanged within the network could be correlated with specific user or
device behavior, inadvertently revealing private information.</t>
        <t>This risk could also be mitigated by the solutions mentioned in <xref target="traffic-analysis"/>.</t>
      </section>
      <section anchor="spoofing-and-manipulation-of-time-information">
        <name>Spoofing and Manipulation of Time Information</name>
        <t>In a time-variant network, if an attacker were to inject false or manipulated time data into the network, it could cause
routers and devices to make incorrect decisions, potentially leading to traffic misrouting, network partitions, or
inefficient use of resources.</t>
        <t>This risk could also be mitigated by the solutions mentioned in <xref target="dos-attack"/>.</t>
      </section>
      <section anchor="replay-attacks-on-time-sensitive-data">
        <name>Replay Attacks on Time-Sensitive Data</name>
        <t>Time-variant network data and schedules updates may be susceptible to replay attacks, which could cause network devices
to act on outdated information, leading to inconsistent routing decisions, misaligned schedules, or security gaps. In
particular, attackers could exploit replay attacks to force devices into outdated configurations or interfere with the
synchronization of schedules across the network.</t>
        <t>This kind of attack could be mitigated by encrypting time signals, schedules and routing path data, and adding a unique
number to the encrypted section of a packet. This has been implemented in existing protocols, for example, the NTS
supports unique identifier extension field (EF) containing a random number, the TLS supports Message Authentication Code
generated from sequence number.</t>
      </section>
      <section anchor="compromised-time-sources">
        <name>Compromised Time Sources</name>
        <t>The reliance on external time sources for synchronization purposes presents a potential attack surface for time-variant
networks. If a trusted time source, such as a GPS signal or an NTP server, is compromised, the attacker could feed
erroneous time information to the entire network, disrupting its operation.</t>
        <t>This kind of attack could be mitigated by the solutions mentioned in <xref target="dos-attack"/>.</t>
      </section>
      <section anchor="schedule-tampering-and-malicious-schedule-injection">
        <name>Schedule Tampering and Malicious Schedule Injection</name>
        <t>Unauthorized modification or injection of malicious TVR schedules
poses significant operational and security risks.  An attacker who
successfully tampers with schedules could cause traffic blackholing
(by scheduling link or node shutdowns at critical times), trigger
costly network-wide reroutes, degrade service-level agreement (SLA)
performance, or enable targeted interception of sensitive traffic
flows.  Such attacks undermine the predictability and reliability
that TVR aims to provide.</t>
        <t>Mitigating schedule tampering requires a defense-in-depth approach:</t>
        <ul spacing="normal">
          <li>
            <t>Authentication and Authorization: All schedule updates <bcp14>MUST</bcp14> be
authenticated to verify the identity of the originator.  Role
based access control (RBAC) or attribute-based access control
(ABAC) <bcp14>SHOULD</bcp14> be enforced to ensure that only authorized entities
can modify schedules.</t>
          </li>
          <li>
            <t>Integrity Protection: Schedules <bcp14>MUST</bcp14> be protected against
tampering in transit and at rest using cryptographic integrity
mechanisms (e.g., digital signatures, HMAC).  NETCONF over TLS
<xref target="RFC7589"/>, RESTCONF over TLS, and similar secure transport
protocols provide such protection.</t>
          </li>
          <li>
            <t>Audit Logging: All schedule creation, modification, and deletion
operations <bcp14>SHOULD</bcp14> be logged with timestamps, originator identity,
and a description of the change.  These logs are essential for
forensic analysis and detecting anomalous behavior.</t>
          </li>
          <li>
            <t>Rate Limiting and Anomaly Detection: Implementations <bcp14>SHOULD</bcp14>
enforce rate limits on schedule update operations and deploy
anomaly detection mechanisms to identify suspicious patterns
(e.g., rapid schedule churn, schedules from unexpected sources).</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="I-D.ietf-tvr-schedule-yang">
          <front>
            <title>YANG Data Model for Scheduled Attributes</title>
            <author fullname="Yingzhen Qu" initials="Y." surname="Qu">
              <organization>Futurewei Technologies</organization>
            </author>
            <author fullname="Acee Lindem" initials="A." surname="Lindem">
              <organization>Arrcus, Inc.</organization>
            </author>
            <author fullname="Eric Kinzie" initials="E." surname="Kinzie">
              <organization>LabN Consulting, L.L.C.</organization>
            </author>
            <author fullname="Don Fedyk" initials="D." surname="Fedyk">
              <organization>LabN Consulting, L.L.C.</organization>
            </author>
            <author fullname="Marc Blanchet" initials="M." surname="Blanchet">
              <organization>Viagenie</organization>
            </author>
            <date day="19" month="January" year="2026"/>
            <abstract>
              <t>   The YANG model in this document includes three modules, and can be
   used to manage network resources and topologies with scheduled
   attributes, such as predictable link loss and link connectivity as a
   function of time.  The intent is to have this information be utilized
   by Time-Variant Routing systems.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tvr-schedule-yang-07"/>
        </reference>
        <reference anchor="RFC9657">
          <front>
            <title>Time-Variant Routing (TVR) Use Cases</title>
            <author fullname="E. Birrane, III" initials="E." surname="Birrane, III"/>
            <author fullname="N. Kuhn" initials="N." surname="Kuhn"/>
            <author fullname="Y. Qu" initials="Y." surname="Qu"/>
            <author fullname="R. Taylor" initials="R." surname="Taylor"/>
            <author fullname="L. Zhang" initials="L." surname="Zhang"/>
            <date month="October" year="2024"/>
            <abstract>
              <t>This document introduces use cases where Time-Variant Routing (TVR) computations (i.e., routing computations that take into consideration time-based or scheduled changes to a network) could improve routing protocol convergence and/or network performance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9657"/>
          <seriesInfo name="DOI" value="10.17487/RFC9657"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC7951">
          <front>
            <title>JSON Encoding of Data Modeled with YANG</title>
            <author fullname="L. Lhotka" initials="L." surname="Lhotka"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>This document defines encoding rules for representing configuration data, state data, parameters of Remote Procedure Call (RPC) operations or actions, and notifications defined using YANG as JavaScript Object Notation (JSON) text.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7951"/>
          <seriesInfo name="DOI" value="10.17487/RFC7951"/>
        </reference>
        <reference anchor="I-D.ietf-tvr-requirements">
          <front>
            <title>TVR (Time-Variant Routing) Requirements</title>
            <author fullname="Daniel King" initials="D." surname="King">
              <organization>Lancaster University</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Brian Sipos" initials="B." surname="Sipos">
              <organization>JHU/APL</organization>
            </author>
            <author fullname="Li Zhang" initials="L." surname="Zhang">
              <organization>Huawei</organization>
            </author>
            <date day="10" month="October" year="2025"/>
            <abstract>
              <t>   Time-Variant Routing (TVR) refers to calculating a path or subpath
   through a network where the time of message transmission (or receipt)
   is part of the overall route computation.  This means that, all
   things being equal, a TVR computation might produce different results
   depending on the time that the computation is performed without other
   detectable changes to the network topology or other cost functions
   associated with the route.

   This document introduces requirements where TVR computations could
   improve message exchange in a network.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tvr-requirements-07"/>
        </reference>
        <reference anchor="I-D.ietf-netmod-schedule-yang">
          <front>
            <title>A Common YANG Data Model for Scheduling</title>
            <author fullname="Qiufang Ma" initials="Q." surname="Ma">
              <organization>Huawei</organization>
            </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Daniel King" initials="D." surname="King">
              <organization>Lancaster University</organization>
            </author>
            <date day="7" month="August" year="2025"/>
            <abstract>
              <t>   This document defines common types and groupings that are meant to be
   used for scheduling purposes such as event, policy, services, or
   resources based on date and time.  For the sake of better modularity,
   the YANG module includes a set of recurrence-related groupings with
   varying levels of representation (i.e., from basic to advanced) to
   accommodate a variety of requirements.  It also defines groupings for
   validating requested schedules and reporting scheduling status.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-netmod-schedule-yang-10"/>
        </reference>
        <reference anchor="RFC8342">
          <front>
            <title>Network Management Datastore Architecture (NMDA)</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
            <author fullname="P. Shafer" initials="P." surname="Shafer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="R. Wilton" initials="R." surname="Wilton"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>Datastores are a fundamental concept binding the data models written in the YANG data modeling language to network management protocols such as the Network Configuration Protocol (NETCONF) and RESTCONF. This document defines an architectural framework for datastores based on the experience gained with the initial simpler model, addressing requirements that were not well supported in the initial model. This document updates RFC 7950.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8342"/>
          <seriesInfo name="DOI" value="10.17487/RFC8342"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="I-D.ietf-core-comi-19">
          <front>
            <title>CoAP Management Interface (CORECONF)</title>
            <author fullname="Michel Veillette" initials="M." surname="Veillette">
              <organization>Trilliant Networks Inc.</organization>
            </author>
            <author fullname="Peter Van der Stok" initials="P." surname="Van der Stok">
              <organization>consultant</organization>
            </author>
            <author fullname="Alexander Pelov" initials="A." surname="Pelov">
              <organization>IMT Atlantique</organization>
            </author>
            <author fullname="Andy Bierman" initials="A." surname="Bierman">
              <organization>YumaWorks</organization>
            </author>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <date day="3" month="November" year="2024"/>
            <abstract>
              <t>   This document describes a network management interface for
   constrained devices and networks, called CoAP Management Interface
   (CORECONF).  The Constrained Application Protocol (CoAP) is used to
   access datastore and data node resources specified in YANG, or SMIv2
   converted to YANG.  CORECONF uses the YANG to CBOR mapping and
   converts YANG identifier strings to numeric identifiers for payload
   size reduction.  CORECONF extends the set of YANG based protocols,
   NETCONF and RESTCONF, with the capability to manage constrained
   devices and networks.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-comi-19"/>
        </reference>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC5905">
          <front>
            <title>Network Time Protocol Version 4: Protocol and Algorithms Specification</title>
            <author fullname="D. Mills" initials="D." surname="Mills"/>
            <author fullname="J. Martin" initials="J." role="editor" surname="Martin"/>
            <author fullname="J. Burbank" initials="J." surname="Burbank"/>
            <author fullname="W. Kasch" initials="W." surname="Kasch"/>
            <date month="June" year="2010"/>
            <abstract>
              <t>The Network Time Protocol (NTP) is widely used to synchronize computer clocks in the Internet. This document describes NTP version 4 (NTPv4), which is backwards compatible with NTP version 3 (NTPv3), described in RFC 1305, as well as previous versions of the protocol. NTPv4 includes a modified protocol header to accommodate the Internet Protocol version 6 address family. NTPv4 includes fundamental improvements in the mitigation and discipline algorithms that extend the potential accuracy to the tens of microseconds with modern workstations and fast LANs. It includes a dynamic server discovery scheme, so that in many cases, specific server configuration is not required. It corrects certain errors in the NTPv3 design and implementation and includes an optional extension mechanism.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5905"/>
          <seriesInfo name="DOI" value="10.17487/RFC5905"/>
        </reference>
        <reference anchor="RFC4330">
          <front>
            <title>Simple Network Time Protocol (SNTP) Version 4 for IPv4, IPv6 and OSI</title>
            <author fullname="D. Mills" initials="D." surname="Mills"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This memorandum describes the Simple Network Time Protocol Version 4 (SNTPv4), which is a subset of the Network Time Protocol (NTP) used to synchronize computer clocks in the Internet. SNTPv4 can be used when the ultimate performance of a full NTP implementation based on RFC 1305 is neither needed nor justified. When operating with current and previous NTP and SNTP versions, SNTPv4 requires no changes to the specifications or known implementations, but rather clarifies certain design features that allow operation in a simple, stateless remote-procedure call (RPC) mode with accuracy and reliability expectations similar to the UDP/TIME protocol described in RFC 868.</t>
              <t>This memorandum obsoletes RFC 1769, which describes SNTP Version 3 (SNTPv3), and RFC 2030, which describes SNTPv4. Its purpose is to correct certain inconsistencies in the previous documents and to clarify header formats and protocol operations for NTPv3 (IPv4) and SNTPv4 (IPv4, IPv6, and OSI), which are also used for SNTP. A further purpose is to provide guidance for home and business client implementations for routers and other consumer devices to protect the server population from abuse. A working knowledge of the NTPv3 specification, RFC 1305, is not required for an implementation of SNTP. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4330"/>
          <seriesInfo name="DOI" value="10.17487/RFC4330"/>
        </reference>
        <reference anchor="RFC7589">
          <front>
            <title>Using the NETCONF Protocol over Transport Layer Security (TLS) with Mutual X.509 Authentication</title>
            <author fullname="M. Badra" initials="M." surname="Badra"/>
            <author fullname="A. Luchuk" initials="A." surname="Luchuk"/>
            <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
            <date month="June" year="2015"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) provides mechanisms to install, manipulate, and delete the configuration of network devices. This document describes how to use the Transport Layer Security (TLS) protocol with mutual X.509 authentication to secure the exchange of NETCONF messages. This revision of RFC 5539 documents the new message framing used by NETCONF 1.1 and it obsoletes RFC 5539.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7589"/>
          <seriesInfo name="DOI" value="10.17487/RFC7589"/>
        </reference>
        <reference anchor="I-D.lj-rtg-sat-routing-consideration">
          <front>
            <title>Routing in Satellite Networks: Challenges &amp; Considerations</title>
            <author fullname="Peng Liu" initials="P." surname="Liu">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Tianji Jiang" initials="T." surname="Jiang">
              <organization>China Mobile</organization>
            </author>
            <date day="2" month="March" year="2025"/>
            <abstract>
              <t>   The SDO 3GPP has done tremendous work to either standardize or study
   various types of wireless services that would depend on the satellite
   constellation network.  While the ISLs, or Inter-Satellite Links,
   along with the routing scheme(s) over them are critical to help
   fullfil the satellite services, the 3GPP considers them out-of-scope.
   This leaves the significant work to be explored in the IETF domain.
   This draft stems from the 3GPP satellite use cases that have been
   studied for many years up to now, across a couple of releases, and
   lands on summarizing the challenges &amp; considerations of the
   satellite-based routing.  Based on some unique &amp; advantageous
   characteristics associated with satellite networks, the draft raises
   briefly the general routing considerations for the integrated Non-
   Terrestrial &amp; Terrestial Networks.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-lj-rtg-sat-routing-consideration-00"/>
        </reference>
      </references>
    </references>
    <?line 696?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TBD</t>
    </section>
    <section numbered="false" anchor="appendix-a-code-examples">
      <name>Appendix A: Code Examples</name>
      <t>All examples in this appendix are intended as <xref target="RFC7951"/> JSON instance data, following the YANG instance data encoding rules for JSON.  The duration field values are expressed in seconds unless otherwise noted.</t>
      <section numbered="false" anchor="code-examples-for-energy-harvesting-wireless-sensor-network">
        <name>Code Examples for "Energy-harvesting Wireless Sensor Network"</name>
        <t>As described in <xref section="2.3" sectionFormat="of" target="RFC9657"/>, in an energy-harvesting wireless sensor network, nodes rely exclusively on
environmental sources for power, such as solar panels. On-board power levels may fluctuate based on various factors.
This example assumes that a node will only power its radio when available power is over some threshold.
In this scenario, the TVR Node YANG Module is not applicable, since the node attributes changes are caused by the environment,
not by the instructions from managing device. The TVR Topology YANG Module may be necessary to convey the schedule of topology
changes to all the nodes.</t>
        <t>Considering a topology with three nodes, the connectivity of this three-node networks changes over time and repeats daily.
The detailed change information is shown in <xref target="ex-inf1"/>. The link between node1 and node2 is powered on at 8:00 and powered off at 11:00.
The link between node2 and node3 is powered on at 11:00 and powered off at 16:00.</t>
        <figure anchor="ex-inf1">
          <name>An example of topology connectivity of Energy-harvesting Wireless Sensor Network</name>
          <artwork align="center"><![CDATA[
      +----------+        +----------+        +----------+
8:00  |  Node 1  |--------|  Node 2  |        |  Node 3  |
      +----------+        +----------+        +----------+

      +----------+        +----------+        +----------+
11:00 |  Node 1  |        |  Node 2  |--------|  Node 3  |
      +----------+        +----------+        +----------+

      +----------+        +----------+        +----------+
16:00 |  Node 1  |        |  Node 2  |        |  Node 3  |
      +----------+        +----------+        +----------+
]]></artwork>
        </figure>
        <t>The corresponding JSON example is shown in <xref target="ex-inf2"/>.</t>
        <figure anchor="ex-inf2">
          <name>JSON example of topology schedule for Energy-harvesting Wireless Sensor Network</name>
          <artwork align="center"><![CDATA[
{
    "ietf-tvr-topology:topology-schedule": {
        "nodes": [
            {
                "node-id": "192.168.0.1",
                "available": {
                    "default-node-available": true,
                    "schedules": []
                }
            },
            {
                "node-id": "192.168.0.2",
                "available": {
                    "default-node-available": true,
                    "schedules": []
                }
            },
            {
                "node-id": "192.168.0.3",
                "available": {
                    "default-node-available": true,
                    "schedules": []
                }
            }
        ],
        "links": [
            {
                "source-node": "192.168.0.1",
                "source-link-id": "link1",
                "available": {
                    "schedules": [
                        {
                            "schedule-id": 1,
                            "recurrence-first": {
                                "start-time-utc": "2026-01-01T08:00:00Z",
                                "duration": 10800
                            },
                            "utc-until": "2027-01-01T00:00:00Z",
                            "frequency": "ietf-schedule:daily",
                            "attr-value": {
                                "link-available": true
                            }
                        }
                    ],
                    "default-link-available": false
                }
            },
            {
                "source-node": "192.168.0.2",
                "source-link-id": "link1",
                "available": {
                    "schedules": [
                        {
                            "schedule-id": 2,
                            "recurrence-first": {
                                "start-time-utc": "2026-01-01T08:00:00Z",
                                "duration": 10800
                            },
                            "utc-until": "2027-01-01T00:00:00Z",
                            "frequency": "ietf-schedule:daily",
                            "attr-value": {
                                "link-available": true
                            }
                        }
                    ],
                    "default-link-available": false
                }
            },
            {
                "source-node": "192.168.0.2",
                "source-link-id": "link2",
                "available": {
                    "schedules": [
                        {
                            "schedule-id": 3,
                            "recurrence-first": {
                                "start-time-utc": "2026-01-01T11:00:00Z",
                                "duration": 18000
                            },
                            "utc-until": "2027-01-01T00:00:00Z",
                            "frequency": "ietf-schedule:daily",
                            "attr-value": {
                                "link-available": true
                            }
                        }
                    ],
                    "default-link-available": false
                }
            },
            {
                "source-node": "192.168.0.3",
                "source-link-id": "link1",
                "available": {
                    "schedules": [
                        {
                            "schedule-id": 4,
                            "recurrence-first": {
                                "start-time-utc": "2026-01-01T11:00:00Z",
                                "duration": 18000
                            },
                            "utc-until": "2027-01-01T00:00:00Z",
                            "frequency": "ietf-schedule:daily",
                            "attr-value": {
                                "link-available": true
                            }
                        }
                    ],
                    "default-link-available": false
                }
            }
        ]
    }
}
]]></artwork>
        </figure>
      </section>
      <section numbered="false" anchor="code-examples-for-cellular-network">
        <name>Code Examples for "Cellular Network"</name>
        <t>As described in <xref section="3.3" sectionFormat="of" target="RFC9657"/>, the "Cellular Network" is a network where the nodes operating over cellular
connections that charge both peak and off-peak data rates. In this case, individual nodes may be allocated a fixed set of
"peak" minutes such that exceeding that amount of time results in expensive overage charges. As a result, links are just
available at specific "peak" minutes.
In this scenario, both the TVR node YANG module and TVR topology YANG module are applicable to manage the state of node
interfaces and deliver the predicted topology changes to each node.</t>
        <t>Considering a topology with three nodes, the connectivity variation of it is shown in <xref target="ex-inf1"/>. Taking the node1 as an
example, the corresponding node YANG module JSON example for node1 is shown in <xref target="ex-inf3"/></t>
        <figure anchor="ex-inf3">
          <name>TVR node YANG module JSON example of node1</name>
          <artwork align="center"><![CDATA[
 {
     "ietf-tvr-node:node-schedule": {
         "node-id": "192.168.0.1",
         "node-power-schedule": {
             "power-default": true,
             "schedules": []
         },
         "interface-schedule": {
             "interface": [
                 {
                     "name": "interface1",
                     "default-available": false,
                     "schedules": [
                         {
                             "schedule-id": 100,
                             "recurrence-first": {
                                 "start-time-utc": "2026-01-01T08:00:00Z",
                                 "duration": 10800
                             },
                             "utc-until": "2027-01-01T00:00:00Z",
                             "frequency": "ietf-schedule:daily",
                             "attr-value": {
                                 "available": true
                             }
                         }
                     ]
                 }
             ]
         }
     }
 }
]]></artwork>
        </figure>
        <t>The corresponding topology yang module JSON example is the same as <xref target="ex-inf2"/></t>
      </section>
      <section numbered="false" anchor="code-examples-for-tidal-network">
        <name>Code Examples for "Tidal Network"</name>
        <t>As described in <xref section="3.4" sectionFormat="of" target="RFC9657"/>, the "Tidal Network" is a network where traffic volume undergoes significant
fluctuations at different times. In the context of a tidal network scenario, energy-saving methods may include the deactivation
of some or all components of network nodes as planned.
In this scenario, both the TVR node YANG module and TVR topology YANG module are applicable to manage the state of node
(interfaces) and deliver the predicted topology changes to each node. <xref target="ex-inf4"/> shows a tidal network topology with 4
nodes.</t>
        <figure anchor="ex-inf4">
          <name>An example topology of Tidal Network</name>
          <artwork align="center"><![CDATA[
    +----+                  +----+               +----+                    +----+
    | N1 |--------L1--------| N2 |               | N1 |---------L1---------| N2 |
    +----+                  +----+               +----+                    +----+
       |  \                /  |                     |                        |
       |    \            /    |                     |                        |
       |      \        /      |                     |                        |
       |        L6    L5      |                     |                        |
      L2          \/         L3                    L2                       L3
       |         /  \         |                     |                        |
       |       /      \       |                     |                        |
       |     /          \     |                     |                        |
       |   /              \   |                     |                        |
    +----+                  +----+               +----+                     +----+
    | N3 |--------L4--------| N4 |               | N3 |---------L4----------| N4 |
    +----+                  +----+               +----+                     +----+
Topology1 (8:00-23:00 everyday)     Topology 2(23:00-23:59 and 00:00-08:00 everyday)
]]></artwork>
        </figure>
        <t>Taking the node N1 as an example, assuming the node-ids of N1, N2, N3, N4 are 192.168.0.1, 192.168.0.2, 192.168.0.3,
and 192.168.0.4. The corresponding node YANG module JSON example for it is shown in <xref target="ex-inf5"/></t>
        <figure anchor="ex-inf5">
          <name>TVR node YANG module JSON example of node N1</name>
          <artwork align="center"><![CDATA[
 {
     "ietf-tvr-node:node-schedule": {
         "node-id": "192.168.0.1",
         "node-power-schedule": {
             "power-default": true,
             "schedules": []
         },
         "interface-schedule": {
             "interface": [
                 {
                     "name": "interface2",
                     "default-available": false,
                     "schedules": [
                         {
                             "schedule-id": 100,
                             "recurrence-first": {
                                 "start-time-utc": "2026-01-01T08:00:00Z",
                                 "duration": 54000
                             },
                             "utc-until": "2027-01-01T00:00:00Z",
                             "frequency": "ietf-schedule:daily",
                             "attr-value": {
                                 "available": true
                             }
                         }
                     ]
                 }
             ]
         }
     }
 }
]]></artwork>
        </figure>
        <t>The corresponding topology YANG module JSON example is shown in <xref target="ex-inf6"/></t>
        <figure anchor="ex-inf6">
          <name>JSON example of topology schedule for Tidal Network</name>
          <artwork align="center"><![CDATA[
{
    "ietf-tvr-topology:topology-schedule": {
        "nodes": [
            {
                "node-id": "192.168.0.1",
                "available": {
                    "default-node-available": true,
                    "schedules": []
                }
            },
            {
                "node-id": "192.168.0.2",
                "available": {
                    "default-node-available": true,
                    "schedules": []
                }
            },
            {
                "node-id": "192.168.0.3",
                "available": {
                    "default-node-available": true,
                    "schedules": []
                }
            },
            {
                "node-id": "192.168.0.4",
                "available": {
                    "default-node-available": true,
                    "schedules": []
                }
            }
        ],
        "links": [
            {
                "source-node": "192.168.0.1",
                "source-link-id": "link2",
                "available": {
                    "schedules": [
                        {
                            "schedule-id": 100,
                            "recurrence-first": {
                                "start-time-utc": "2026-01-01T08:00:00Z",
                                "duration": 54000
                            },
                            "utc-until": "2027-01-01T00:00:00Z",
                            "frequency": "ietf-schedule:daily",
                            "attr-value": {
                                "link-available": true
                            }
                        }
                    ],
                    "default-link-available": false
                }
            },
            {
                "source-node": "192.168.0.2",
                "source-link-id": "link2",
                "available": {
                    "schedules": [
                        {
                            "schedule-id": 200,
                            "recurrence-first": {
                                "start-time-utc": "2026-01-01T08:00:00Z",
                                "duration": 54000
                            },
                            "utc-until": "2027-01-01T00:00:00Z",
                            "frequency": "ietf-schedule:daily",
                            "attr-value": {
                                "link-available": true
                            }
                        }
                    ],
                    "default-link-available": false
                }
            },
            {
                "source-node": "192.168.0.3",
                "source-link-id": "link2",
                "available": {
                    "schedules": [
                        {
                            "schedule-id": 300,
                            "recurrence-first": {
                                "start-time-utc": "2026-01-01T08:00:00Z",
                                "duration": 54000
                            },
                            "utc-until": "2027-01-01T00:00:00Z",
                            "frequency": "ietf-schedule:daily",
                            "attr-value": {
                                "link-available": true
                            }
                        }
                    ],
                    "default-link-available": false
                }
            },
            {
                "source-node": "192.168.0.4",
                "source-link-id": "link2",
                "available": {
                    "schedules": [
                        {
                            "schedule-id": 400,
                            "recurrence-first": {
                                "start-time-utc": "2026-01-01T08:00:00Z",
                                "duration": 54000
                            },
                            "utc-until": "2027-01-01T00:00:00Z",
                            "frequency": "ietf-schedule:daily",
                            "attr-value": {
                                "link-available": true
                            }
                        }
                    ],
                    "default-link-available": false
                }
            }
        ]
    }
}
]]></artwork>
        </figure>
      </section>
      <section numbered="false" anchor="code-examples-for-mobile-satellites">
        <name>Code Examples for "Mobile Satellites"</name>
        <t>As described in <xref section="4.3" sectionFormat="of" target="RFC9657"/>, the "Mobile Satellites" generally refers to the Low Earth Orbit(LEO) network,
which includes hundreds to thousands of spacecrafts that can communicate both with their orbital neighbors as well as
down to any ground station that they happen to be passing over. The connection between the spacecrafts and the ground
station depend on the flight trajectories of the spacecrafts, so the link changes between them is predictable.</t>
        <t><xref section="4.3" sectionFormat="of" target="RFC9657"/> introduces a scenario with 3 spacecrafts and 1 ground station. The changes of topology are
shown in <xref target="ex-inf7"/>. The ground station connects to spacecraft N3 at time t1, connects to N2 at time t2, and connects
to N1 at time t3. The duration of the connection depends on the satellite altitude and the elevation angle.
According to <xref section="2.1" sectionFormat="of" target="I-D.lj-rtg-sat-routing-consideration"/>, for the spacecrafts at the 500km
altitude, and the connection between the spacecraft and ground station can keep for 7 minutes.</t>
        <figure anchor="ex-inf7">
          <name>An example topology for Mobile Satellites</name>
          <artwork align="center"><![CDATA[
    +------+          +------+
t1  |  N2  |----------|  N3  |
    +------+          +---+--+
                          |
                         /|\
                        \___/
                         / \
                       Ground
                       Station
------------------------------------------------------------------
    +------+          +------+          +------+
t2  |  N1  |----------|  N2  |----------|  N3  |
    +------+          +---+--+          +------+
                          |
                         /|\
                        \___/
                         / \
                       Ground
                       Station
------------------------------------------------------------------
                      +------+          +------+          +------+
t3                    |  N1  |----------|  N2  |----------|  N3  |
                      +---+--+          +------+          +------+
                          |
                         /|\
                        \___/
                         / \
                       Ground
                       Station
------------------------------------------------------------------
]]></artwork>
        </figure>
        <t>In this scenario, the TVR topology YANG module is applicable to deliver the predicted topology changes to each node.
However, the TVR node YANG module is not applicable, this depends on whether the link changes are controlled by satellites
themselves or by the managing device. Here, we provide the JSON examples for TVR topology YANG module and node
 YANG module as a reference.</t>
        <t>Taking the spacecraft N1 as an example, assuming the time t1 is 10:00:00 1 July 2025 and the node-ids of N1, N2, N3, and
ground station is 192.168.0.1, 192.168.0.2, 192.168.0.3, and 192.168.0.4.,
then the corresponding node YANG module JSON example for it is shown in <xref target="ex-inf8"/>.</t>
        <figure anchor="ex-inf8">
          <name>TVR node YANG module JSON example of spacecraft N1</name>
          <artwork align="center"><![CDATA[
{
    "ietf-tvr-node:node-schedule": {
        "node-id": "192.168.0.1",
        "node-power-schedule": {
            "power-default": true,
            "schedules": []
        },
        "interface-schedule": {
            "interfaces": [
                {
                    "name": "satellite2ground-interface",
                    "default-available": false,
                    "schedules": [
                        {
                            "schedule-id": 100,
                            "period-start": "2025-07-01T10:00:00Z",
                            "duration": 420,
                            "attr-value": {
                                "available": true
                            }
                        }
                    ]
                }
            ]
        }
    }
}
]]></artwork>
        </figure>
        <t>Assuming that time t1 is 10:00:00 1 July 2025, time t2 is 10:10:00 1 July 2025, and time t3 is 10:20:00 1 July 2025,
then the corresponding topology YANG module JSON example is shown in <xref target="ex-inf9"/>.</t>
        <figure anchor="ex-inf9">
          <name>JSON example of topology schedule for Mobile Satellites</name>
          <artwork align="center"><![CDATA[
{
    "ietf-tvr-topology:topology-schedule": {
        "nodes": [
            {
                "node-id": "192.168.0.1",
                "available": {
                    "default-node-available": true,
                    "schedules": []
                }
            },
            {
                "node-id": "192.168.0.2",
                "available": {
                    "default-node-available": true,
                    "schedules": []
                }
            },
            {
                "node-id": "192.168.0.3",
                "available": {
                    "default-node-available": true,
                    "schedules": []
                }
            },
            {
                "node-id": "192.168.0.4",
                "available": {
                    "default-node-available": true,
                    "schedules": []
                }
            }
        ],
        "links": [
            {
                "source-node": "192.168.0.3",
                "source-link-id": "gs-link",
                "available": {
                    "schedules": [
                        {
                            "schedule-id": 100,
                            "period-start": "2025-07-01T10:00:00Z",
                            "duration": 420,
                            "attr-value": {
                                "available": true
                            }
                        }
                    ],
                    "default-link-available": false
                }
            },
            {
                "source-node": "192.168.0.2",
                "source-link-id": "gs-link",
                "available": {
                    "schedules": [
                        {
                            "schedule-id": 200,
                            "period-start": "2025-07-01T10:10:00Z",
                            "duration": 420,
                            "attr-value": {
                                "available": true
                            }
                        }
                    ],
                    "default-link-available": false
                }
            },
            {
                "source-node": "192.168.0.1",
                "source-link-id": "gs-link",
                "available": {
                    "schedules": [
                        {
                            "schedule-id": 300,
                            "period-start": "2025-07-01T10:20:00Z",
                            "duration": 420,
                            "attr-value": {
                                "available": true
                            }
                        }
                    ],
                    "default-link-available": false
                }
            }
        ]
    }
}
]]></artwork>
        </figure>
      </section>
      <section numbered="false" anchor="code-examples-for-predictable-moving-vessels">
        <name>Code examples for "Predictable Moving Vessels"</name>
        <t>As described in <xref section="4.4" sectionFormat="of" target="RFC9657"/>, the "Predictable Moving Vessels" involves the movement of vessels with
predictable trajectories, such as ferries or planes. These endpoints often rely on a combination of satellite and
terrestrial systems for Internet connectivity. Consider a scenario where a vessel uses satellites to access the Internet,
including a ship and three satellites. As the satellite and the vessel move, the vessel establishes connections with the
satellites N1, N2, and N3 at t1, t2, and t3 respectively. It is assumed that each connection lasts for 1 minutes.
The changes of topology are shown in <xref target="ex-inf10"/>.</t>
        <figure anchor="ex-inf10">
          <name>An example topology for Predictable Moving Vessels</name>
          <artwork align="center"><![CDATA[
    +------+          +------+
t1  |  N2  |----------|  N1  |
    +------+          +---+--+
                          |
                         /|\
                        \___/
                         / \
                       Vessel
------------------------------------------------------------------
    +------+          +------+          +------+
t2  |  N3  |----------|  N2  |----------|  N1  |
    +------+          +---+--+          +------+
                          |
                         /|\
                        \___/
                         / \
                       Vessel
------------------------------------------------------------------
                      +------+          +------+          +------+
t3                    |  N3  |----------|  N2  |----------|  N1  |
                      +---+--+          +------+          +------+
                          |
                         /|\
                        \___/
                         / \
                       Vessel
------------------------------------------------------------------
]]></artwork>
        </figure>
        <t>This scenario is similar to the "Mobile Satellites" example, so the TVR node YANG module JSON example and topology YANG
JSON example of this scenario can refer to the JSON example of the "Mobile Satellites" example.</t>
      </section>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact fullname="Daniel King">
        <organization>Lancaster University</organization>
        <address>
          <postal>
            <country>United Kingdom</country>
          </postal>
          <email>d.king@lancaster.ac.uk</email>
        </address>
      </contact>
      <contact fullname="Charalampos (Haris) Rotsos">
        <organization>Lancaster University</organization>
        <address>
          <email>c.rotsos@lancaster.ac.uk</email>
        </address>
      </contact>
      <contact fullname="Peng Liu">
        <organization>China Mobile</organization>
        <address>
          <email>liupengyjy@chinamobile.com</email>
        </address>
      </contact>
      <contact fullname="Tony Li">
        <organization>Juniper Networks</organization>
        <address>
          <email>tony.li@tony.li</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
