<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.15 (Ruby 3.2.3) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-km-detnet-for-ocn-04" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="ocn-in-detnets">Using Deterministic Networks for Industrial Operations and Control</title>

    <author initials="K." surname="Makhijani" fullname="Kiran Makhijani">
      <organization>Independent</organization>
      <address>
        <email>kiran.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="R." surname="Li" fullname="Richard Li">
      <organization>SouthEast University</organization>
      <address>
        <email>richard.li.internet@gmail.com</email>
      </address>
    </author>
    <author initials="C." surname="Westphal" fullname="Cedric Westphal">
      <organization>Futurewei</organization>
      <address>
        <email>cedric.westphal@futurewei.com</email>
      </address>
    </author>
    <author initials="L." surname="Contreras" fullname="Luis M. Contreras">
      <organization>Telefonica</organization>
      <address>
        <email>luismiguel.contrerasmurillo@telefonica.com</email>
      </address>
    </author>
    <author initials="T." surname="Faisal" fullname="Tooba Faisal">
      <organization>King's College London</organization>
      <address>
        <email>tooba.hashmi@gmail.com</email>
      </address>
    </author>

    <date year="2024" month="July" day="06"/>

    <area>Internet</area>
    <workgroup>Detnet Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 55?>

<t>This document describes an application programming interface with a
deterministic network domain. These APIs are used to select (or map) services in
the Deterministic Network architecture.</t>



    </abstract>



  </front>

  <middle>


<?line 60?>

<section anchor="intro"><name>Introduction</name>

<t>Process automation systems involve operating equipment (such as actuating
and/or sensing field devices). The communication between the 'process
controllers' and field devices exhibit a well-defined set of behaviors and has
specific characteristics: delivering a control-command to a machine must be
executed within the time frame specified by a controller or an application to
provide reliable and secure operation. A low or zero tolerance to latency and
packet losses (among other things) is implied.</t>

<t>The endpoints ('process controllers' and field devices) embody
machine-to-machine communications to facilitate remote and local process
automation. Applications using deterministic networks are not aware of the
details of such networks and, therefore, require an interface with DetNets for
operations and control of field-devices. In this document such interfaces are
referred to as Operation and Control Network (OCN) interfaces for convenience.
OCN interfaces are used by applications to describe requirements for for
guaranteed delay-aware packet delivery, reliability, and packet loss mitigation.</t>

<t>Since Deterministic Networks provide extension to Time Sensitive Networks (TSN)
for large-scale domains, it is reasonable to utilize the
definitions developed by TSN for Industrial Automation (IA) traffic profile
<xref target="TSN_IA_PROFILE"/>. The IA endpoints will use this profile to access
appropriate service and treatment in a DetNet domain.</t>

<t>This document provides a background discussion on the endpoints and
connectivity in Industrial automation systems  (<xref target="background"/>),
IA traffic type APIs to be used at IP layer (<xref target="ttypes"/>). These APIs are
implementation and encapsulation agnostic. Applications may choose, either
in-band metadata method or P4 base datapath programmability. As an example,
IPv6 extension header based approach is covered in <xref target="ocn-eh"/>.</t>

</section>
<section anchor="terminology"><name>Terminology</name>

<t><list style="symbols">
  <t>    <dl>
      <dt>Operational Technology (OT):</dt>
      <dd>
        <t>Programmable systems or devices that interact
with the physical environment (or manage devices that interact with the physical
environment). These systems/devices detect or cause a direct change through the
monitoring and/or control of devices, processes, and events. Examples include
industrial control systems, building management systems, fire control systems,
and physical access control mechanisms. Source: <xref target="NIST-OT"/></t>
      </dd>
    </dl>
  </t>
  <t>    <dl>
      <dt>Industrial controller or process controller:</dt>
      <dd>
        <t>Is a logic control function used in process automation and control systems.
A process controller maintains the operational requirement of a process and
performs functions similar to programmable logic controllers (PLCs) but it can
be either a hardware or software component. The term process controller is used
through out to avoid confusion with 'network controllers' used in network
infrastructures.</t>
      </dd>
    </dl>
  </t>
  <t>    <dl>
      <dt>Industrial Automation:</dt>
      <dd>
        <t>Mechanisms that enable machine-to-machine communication by use of
technologies that enable automatic control and operation of industrial devices
and processes leading to minimizing human intervention.</t>
      </dd>
    </dl>
  </t>
  <t>    <dl>
      <dt>Control Loop:</dt>
      <dd>
        <t>Control loops are part of process control systems in which
desired process response is provided as input to the 'process controller', which
performs the corresponding action (using actuators) and reads the output values.
Since no error correction is performed, these are called open control loops.</t>
      </dd>
    </dl>
  </t>
  <t>    <dl>
      <dt>Feedback Control Loop:</dt>
      <dd>
        <t>A feedback loop is part of a system in which some portion (or all) of
the system's output is used as input for future operations.</t>
      </dd>
    </dl>
  </t>
  <t>    <dl>
      <dt>Industrial Control Networks:</dt>
      <dd>
        <t>Industrial control networks are the
interconnection of equipment used for the operation, control, or monitoring of
machines in the industrial environment. It involves a different level of
communication - between fieldbus devices, digital controllers, and software
applications.</t>
      </dd>
    </dl>
  </t>
  <t>    <dl>
      <dt>Human Machine Interface (HMI):</dt>
      <dd>
        <t>An interface between the operator and the machine.
The communication interface relays I/O data back and forth between an operator's
terminal and HMI software to control and monitor equipment.</t>
      </dd>
    </dl>
  </t>
</list></t>

<section anchor="acronyms"><name>Acronyms</name>

<t><list style="symbols">
  <t>HMI: Human Machine Interface</t>
  <t>OCN: Operations and Control Networks</t>
  <t>PLC: Programmable Logic Control</t>
  <t>OT: Operational Technology</t>
  <t>OC: Operation and Control</t>
  <t>OCN: Operation and Control Networks</t>
</list></t>

</section>
</section>
<section anchor="background"><name>Background on Industrial Control Systems</name>

<t>An industrial control network interconnects devices used to operate, control and
monitor physical equipment in industrial environments. <xref target="icn-arch"/> below shows
such systems' reference model and functional components. Closest to the
physical equipment are field devices (actuators and sensors) that connect to
the Programmable Logic Controllers (PLCs) or other types of controllers (Note:
in this memo term 'process controller' will be used to differentiate
from other meanings of controller) using serial bus technologies (and now
Ethernet).  Above those 'process controllers' are Human Machine Interface (HMI)
connecting different PLCs and performing several controller functions along
with exchanging data with the applications.</t>

<t>A factory floor is divided into cell sites. The PLCs or other types of
controllers are physically located close to the equipment in the cell sites.
Monitoring, status, and sensing data are collected on the site
and then transmitted over secure channels to the data applications for
aggregation and further processing. These applications can be hosted
in remote cloud infrastructure but are often hosted within a
limited domain environment, controlled by a single operator, like
on-premise, at the edge, or in a private cloud. Both options gain
from infrastructure that scales out and has elastic computing and storage
resources so they will be referred to as cloud in the following sections.</t>

<figure title="Functions in Industrial Control Networks" anchor="icn-arch"><sourcecode type="drawing"><![CDATA[
        +-+-+-+-+-+-+
     ^  | Data Apps |....            External business-logic
     :  +-+-+-+-+-+-+   :                Network
     :        |         :
     v  +-+-+-+-+-+-+  +-+-+-+-+--+
        | vendor A  |  |vendor B  |  Interconnection of
        | controller|  |controller|  controllers
     ^  +-+-+-+-+-+-+  +-+-+-+-+-+   (system integrators)
     :       |         |
     :   +-+-+-+-+  +-+-++-+
     :   | Net X |  | Net Y|
     v   | PLCs  |  | PLCs |--+    device-controllers
     ^   +-+-+-+-+  +-+-+--+  |
     :      |        |        |
     :   +-+-+    +-+-+    +-+-+
     v   |   |    |   |    |   |   Field devices
         +-+-+    +-+-+    +-+-+
]]></sourcecode></figure>

<t>Data applications can integrate softwarized process control
functions to improve automation and make programmatic real-time decisions. The
equipment control and collection of data generated by the sensors should be
possible over small or large-scale deterministic networks as illustrated in
<xref target="new-arch"/>.</t>

<figure title="Converged Cloud based Industrial Control Networks" anchor="new-arch"><sourcecode type="drawing"><![CDATA[
               +-+-+-+-+-+-+-+-+
               |     Data Apps |      Integrated Apps with
               | c1 | c2  | c3 |      Remote process control
               +-+-+-+-+-+-+-+-+
                \   ,-----.   /
                 +-[  Det- ]-+
                   [Network]
                    `-----'
               +-+-+-|  |-+-+-+-+
               |        |       |
             +-+-+    +-+-+   +-+-+
             |   |    |   |   |   |   Field devices
             +-+-+    +-+-+   +-+-+
]]></sourcecode></figure>

<t>One particular motivation is to provide the behavior of a field bus between the
cloud and the actuators/sensors. i.e., with the same assurance of reliability
and latency, albeit over wide area networks (WAN). Many industrial control
applications, such as factory automation <xref target="FACTORY"/>, PLC virtualization
<xref target="VIRT-PLC"/>, power grid operations <xref target="PTP-GRID"/>, etc.,  are now expected to
operate in the cloud by leveraging virtualization and shared infrastructure
wherever possible.</t>

<section anchor="connected-process-controllers-sensors-and-actuators"><name>Connected Process-Controllers, Sensors and Actuators</name>


<t>Control systems comprise 'process controllers', Sensors and Actuators. The data
traffic essentially carries instructions that cause machines or equipment
to move and do things within or at a specific time. The connectivity exists in
the following manner:</t>

<t><list style="symbols">
  <t>A 'process controller' interfaces with the sensors and actuators. It knows an
application's performance parameters which are expressed in terms of network
specific requests or resources such as tolerance to packet loss, latency limits,
jitter variance, bandwidth, and specification for safety.  The 'process controller' knows
all the packet delivery constraints.</t>
  <t>An actuator receives specific commands from the 'process controllers'. The
Deterministic network between them should support control of actuating
devices remotely from the 'process controller' while meeting all the
requirements (or key performance indicators - KPIs) necessary for successful
command execution. The actuator participates in a closed control loop as needed.</t>
  <t>A sensor emits periodic sensor data. It may intermittently provide
asynchronous readings upon request from the 'process controller'. Sensors may report
urgent messages regarding malfunctioning in certain equipment, cell sites, or
zones.</t>
</list></t>

<t>In many control systems, there is at least one 'process controller' (or server) entity on
one end and two other entities - the sensors and actuators on the other end.
The communication with sensors and actuators is through a 'process controller' application;
as such data applications do not directly interact with the field devices.
Neither actuators nor sensors perform decision-making tasks. This
responsibility belongs to the 'process controller'.</t>

</section>
<section anchor="generalized-communication-model"><name>Generalized Communication Model</name>

<t>To describe networked process control behavior, a conceptual communication model
is used so that the data applications do not concern with the details of the
networks realizing operations and control. We refer to this model as an operation
and control network (OCN) model, with the following components:</t>

<t><list style="symbols">
  <t>Logical reference points: identify an endpoint's role or function as
sensor-point, actuation-point, or operation &amp; control point (oc-point for
short). Note: the term 'oc-point' is used to avoid confusion with the network
controllers and the term 'fd-point' is used when both types of field devices are
referred to.</t>
  <t>Interface specification: in terms of associated traffic patterns between the
endpoints as described below in <xref target="ocn-pattern"/>. The interface may be any
type of network (Ethernet, IP, wireless, etc. The model assumes that the
network is capable of providing network services and resources necessary of the
application specific operations and control.</t>
</list></t>

<t>Depending on the design of the usecase, the 'process controller' functionality
(oc-point) may reside as a software module in the data application or as a
separate module. When deployed as a separate module, another connectivity
the interface between the data application and oc-point will be needed and is out
of the scope of this document.</t>

<t>The applications will use a communication interface between oc-point and
sensor-point to receive sensory data and similarly interface between oc-point
to actuation point to execute a single or a sequence of control instructions.</t>

<t>This abstraction provides an additional layer of  protection in the sense that
the traffic patterns between the reference points are well defined so any
exceptions can be easily caught.</t>

</section>
<section anchor="ocn-pattern"><name>Traffic Patterns</name>

<t>For either local or wide areas, the process automation activities over the
network can generate a variety of traffic patterns between the oc-point and
field devices such as:</t>

<section anchor="c-loop"><name>Control Loops</name>

<t>The equipment being operated upon is sensitive to when a command request
actually executes. An actuator, upon receiving a command (say a function code) will
immediately perform the corresponding action.
</t>

<t>For several such applications, the knowledge of a successful operation is equally
critical to advance to the next steps; therefore, getting the response back in
a specified time is required, leading to a knowledge of timing. These types of
bounded-time request and response mechanisms are called control loops.</t>

<t>Unlike general-purpose applications, commands cannot be batched; the
parameters of the command that will follow depends on the result of the previous one.
Each request in the control loop takes up a minimal payload size (function code,
value, device or bus address) and will often fit in a single short packet.</t>

<t>In Detnet-enabled network, it can be imagined as a small series of packets with
the same flow identifier, but with different latency constraints.</t>

<t>It is required to support control loops where each request presents its own
latency constraints to the network and where commands are small sized packets.</t>

</section>
<section anchor="ocn-intervals"><name>Periodicity</name>

<t>Sensors emit data at regular intervals; i.e., there may be more tolerance to
variations in jitter between the measurement intervals. Usually, 'process
controllers' or applications listening to sensor data are programmed to
tolerate and record intermittent losses or delay variations upto certain number
of times. Therefore, time criticality is not always high.</t>

<t>Notably, industrial software now increasingly rely on sensor data collection to
monitor the state and behavior of the entire shop floor.  Thus, the number of
sensors are growing and the combined traffic volume generated by sensors is
expected to be very high. In fact will contribute to a large percentage of ocn traffic.
Moreover, the periodicity of each sensor will also vary based
on the equipment.</t>

<t>It is required that network capacity is planned appropriately for the periodic
traffic generated from the different sensors. The periodic interval should also
be preserved in the network because any variations could provide false
indications that the equipment is misbehaving.</t>

</section>
<section anchor="ordering"><name>Ordering</name>

<t>In real-time process control communications, processing of out-of-order related
messages will lead to costly operations failures.  For example, messages
such as request and reply, or a sequence of commands to different endpoints may
be related in the application work flow, therefore, both time constraints and order must be preserved.</t>

<t>The network should be capable of supporting sporadic on-demand short-term flows.
This does not imply instantaneous resource provisioning, instead it would be
more efficient if the provisioned resources could be shared for such
asynchronous traffic patterns.</t>

<t>Another consideration with ordering is that both actuators and sensors are
low-resource devices.  They can not buffer multiple packets and execute them in
order while maintaining the latency bounds of each command execution.  This
means the network must pace packets that may arrive early.</t>

</section>
<section anchor="urgency"><name>Urgency</name>

<t>Besides latency constrained and periodic messages, sensors also report failures
as fault notifications, such as pressure valve failure, abnormally high
humidity, etc. These messages must be delivered immediately and with the utmost urgency.</t>

</section>
<section anchor="co-existence-with-non-deterministic-flows"><name>Co-existence with non-deterministic flows</name>

<t>A DetNet-enabled network could support traffic other than
deterministic flows. Thus a graceful co-existence of any type of flows
can be expected. Notably, the characteristics of the deterministic
flows can influence or impact on the non-deterministic flows, as well
as the decisions taken by the control loops.</t>

</section>
</section>
<section anchor="communication-patterns"><name>Communication Patterns</name>

<t>Control systems follow a specific communication discipline. The field devices
(sensors and actuators) are always controlled, i.e., interact with the system
through 'process controllers' in the following manner:-</t>

<t><list style="symbols">
  <t>Sensor to 'process controller': data emitted at periodic intervals providing
status/health of the environment or equipment. The  traffic volume for this
communication is determined by the payload size of each  sensor data and the
interval. These are a kind of synchronous Detnet flows but with much higher time intervals; still the inter-packet gap should be minimal.</t>
  <t>Process controller to/from actuator: the commands/instructions to write or read.
Actuators generally do not initiate a command unless requested by the
'process controller'. Actuators will often execute a command, read the corresponding
result, and send that in response to the original write command.  The traffic
profile will be balanced in both directions due to requests/ response behavior. These are like asynchronous flows but without the observation interval constraint.</t>
</list></t>

</section>
<section anchor="industrial-control-application-interfaces-to-detnets"><name>Industrial Control Application Interfaces to DetNets</name>

<t>Current industrial automation solutions utilize a split approach.
Industrial-controllers are placed close to the equipment to achieve
operational accuracy, whereas actual process instructions are received
through other means possibly involving human interface. Similarly,
sensor data is first acquired on-site then transmitted in bulk to the
enterprise cloud or remote site for further processing. Such
approaches lead to increase in IT infrastructure costs on the shop
floors.</t>

<t>This document assumes that the
deterministic networks are deployed between enterprise sites and shop
floors. They have resources available to provide latency guarantees,
reliability, and link capacity over known physical distances. Thus,
they have the capabilities to deliver process control and operation
instructions remotely from an application to field devices over larger
distances or the Wide Area Networks (WAN) thereby reducing the need
for IT infrastructure on shop floors.</t>

<t>Moreover, it may even be the case in which non-deterministic domains are
traversed by industrial automation applications. In such situations,
mechanisms will be in place to provide guarantees in terms of the
Service Level Objectives (SLOs) defined for the deterministic flows.
Means for that could the use of IETF Network Slice services
<xref target="RFC9543"/>, and/or the selection of paths characterized by precision
metrics <xref target="PCE-PAM"/> and <xref target="RFC9544"/>.</t>

<t>The OCN APIs are defined to  leverage such capabilities from diverse variety of
networks in a uniform manner. These APIS are discussed next.</t>

</section>
</section>
<section anchor="ttypes"><name>Operation &amp; Control Traffic Types</name>

<section anchor="overview"><name>Overview</name>

<t><xref target="fig:detnet-ind"/>, shows application interface to DetNet domain. Note that the
interface or APIs are needed for DetNet-unaware endpoints. The PC-App and FD-GW
below do not carry DetNet encapsulations, instead they interact using OCN APIs with
traffic type information with the DetNet  edges to be mapped to DetNet flows.</t>

<t>TODO: Synchronization aspects, sync clock details for time-triggered operations.</t>

<figure title="A Realistic DetNet Based Industrial Application Network" anchor="fig:detnet-ind"><artwork><![CDATA[
DetNet
End System
   _
 / PC\     +-----+      +-----------+            DetNet
| App |<-->|MGMT |<====>|DETNET-CTRL|          End System
/-----\    +-----+      +---+-------+          +------+
| NIC |                /   |       \           |FD-GW |
+--+--+ De|tNet       /    |        \          +----+-+
   |    UN|I   +----+    +----+       +----+ DetNet |
   |      v    |    |    |    |-+     | PE |  UNI(U)|
   +-----------U PE +----+ P  | |     |    U--------+
               |    |    |    | |-----|    |
               +----+    +--+-+ |     +----+
                            +---+
             |<------DetNet ----------->|

    PC APP: Process Controller Application
    FD-GW:  Field device gateway
    NSP entity: Network service provider controller
                e,g, DetNet Controller
]]></artwork></figure>

</section>
<section anchor="ttypes-equ"><name>OCN Traffic Type Equivalence</name>

<t>The table below is equivalent to TSN IA traffic profile; however, these
are defined as traffic-type code, and the parameters that applications would
use it to interface with the DetNet.</t>

<texttable>
      <ttcol align='left'>Traffic Type</ttcol>
      <ttcol align='left'>TT-Code</ttcol>
      <ttcol align='left'>Param</ttcol>
      <ttcol align='left'>Param</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>Isochronous</c>
      <c>ISOC_TT</c>
      <c>0x08</c>
      <c>DL_TIME<br /> DL_UNIT</c>
      <c>Deadline limit between Src and Dst <br />Optional clock src info</c>
      <c>Cyclic-<br />Synchronous</c>
      <c>CSYNC_TT</c>
      <c>0x07</c>
      <c>DL_TIME <br />DL_UNIT</c>
      <c>-same-</c>
      <c>Cyclic-<br />Asynchronous</c>
      <c>CASYN_TT</c>
      <c>0x06</c>
      <c>DL_TIME <br />DL_UNIT</c>
      <c>-same- <br /> No clock source needed</c>
      <c>Network Control</c>
      <c>NWCTL_TT</c>
      <c>0x05</c>
      <c>-as above-</c>
      <c>&#160;</c>
      <c>Alarms and Event</c>
      <c>ALEV_TT</c>
      <c>0x04</c>
      <c>DL_TIME <br /> RETRANS</c>
      <c>Retransmission flag</c>
      <c>Conf. Diag</c>
      <c>CFDG_TT</c>
      <c>0x03</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>Best Effort<br /> High</c>
      <c>BEHI_TT</c>
      <c>0x02</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>Best Effort<br /> Low</c>
      <c>BELO_TT</c>
      <c>0x01</c>
      <c>&#160;</c>
      <c>&#160;</c>
</texttable>

<t>In the following sections, a brief definition and corresponding metadata is explained which is similar to the description in <xref target="TSN_IA_PROFILE"/>.</t>

<t>In some cases, endpoints may require details of the synchronization clock which maybe managed separately but the DetNet would need to know the source for synchronization.</t>

<section anchor="isochronous-traffic-type"><name>Isochronous traffic-type</name>

<t>These are the most time-sensitive cyclic traffic. This type of traffic has specific latency requirements. This type of traffic is normally used in control loop tasks. The applications specifies:</t>

<t><list style="symbols">
  <t>cycle times in the range of upto tens of milliseconds. Maybe even microseconds.</t>
  <t>Synchronized common clock source identifier: optional.</t>
  <t>Network must be engineered to offer zero-congestion</t>
</list></t>

<t>API format:</t>

<figure><artwork><![CDATA[
   +-- tt_code = ISOC_TT
   +-- dl_time = value
   +-- dl_tmunite = ms |us
   +-- app-flow-ref
   +-- clock-src : ip address
]]></artwork></figure>

</section>
<section anchor="cyclic-synchronous-traffic-type"><name>Cyclic-synchronous traffic-type</name>
<t>This type of traffic is also transmitted cyclically with latency requirements.
These can be specified as a flow (or stream in TSN)</t>

<t><list style="symbols">
  <t>Cycle times in the range of hundreds of microseconds to hundreds of milliseconds.</t>
  <t>Synchronized common clock source identifier: optional.</t>
  <t>Network must be engineered to offer zero-congestion</t>
</list></t>

<t>API format</t>

<figure><artwork><![CDATA[
     +-- tt_code = CSYNC_TT
     +-- dl_time = value
     +-- dl_tmunit = ms |us
     +-- app-flow-ref
     +-- clock-src : ip address
]]></artwork></figure>

</section>
<section anchor="cyclic-asynchronous-traffic-type"><name>Cyclic-Asynchronous traffic-type</name>

<t>This type of traffic is transmitted acyclically and bounded by the application clock.
These can be specified as a flow (or stream in TSN)</t>

<t><list style="symbols">
  <t>Cycle times are in the range of milliseconds to seconds.</t>
  <t>tolerates congestion loss to specified limit (number of packets lost per unit of time).</t>
</list></t>

<t>API format</t>

<figure><artwork><![CDATA[
     +-- tt_code = CSYNC_TT
     +-- dl_time = value
     +-- dl_tmunit = ms |sec
     +-- app-flow-ref
]]></artwork></figure>

</section>
<section anchor="alarms-and-events-traffic-type"><name>Alarms and Events traffic type</name>

<t>This type of traffic is acyclic. This traffic expects bounded latency and should follow bandwidth constraints.</t>

<t><list style="symbols">
  <t>Bounded latencies are in the range of milliseconds to hundreds of milliseconds.</t>
  <t>Allocated bandwidth limits.</t>
  <t>Support for retransmission in response to packet loss is expected.</t>
</list></t>

<t>Networks should be engineered to handle bursts of frames, up to a provisioned number of frames.</t>

<t>API format</t>

<figure><artwork><![CDATA[
     +-- tt_code = ALEV_TT
     +-- dl_time = value
     +-- dl_tmunit = ms |sec
     +-- restrans = yes |no
]]></artwork></figure>

</section>
<section anchor="configuration-and-diagnostics-traffic-type"><name>Configuration and diagnostics traffic type</name>

<t>Traffic profile is same as above.</t>

<t>API format</t>

<figure><artwork><![CDATA[
     +-- tt_code = CFDI_TT
     +-- dl_time = value
     +-- dl_tmunit = sec
     +-- restrans = yes |no
]]></artwork></figure>

<t>It is expected that application controller endpoint will periodically transmit diagnostics packets and field device configurations.</t>

</section>
<section anchor="network-control"><name>Network Control</name>

<t>Network control traffic will be generated by application controller and is comprised of services required to maintain network operation such as time synchronization, loop prevention, and topology detection.</t>

<t>API format:</t>

<figure><artwork><![CDATA[
     +-- tt_code = NWCTL_TT
     +-- dl_time = value
     +-- dl_tmunit = sec
     +-- restrans = yes |no
]]></artwork></figure>

<t>It is expected that the controller endpoint can transmit network control packets.</t>

</section>
</section>
</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>None</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>Application flows can be protected at the network layer as described in the
<xref target="RFC9055"/> Section 10. In case applications provide additional data (metadata)
to the network layer, the integrity of metadata has to be protected from  the
application endpoint to the DetNet edges using existing layer 3 admission control and encryption mechanisms.</t>

</section>
<section anchor="acknowledgements"><name>Acknowledgements</name>

<t>The contribution of L.M. Contreras to this work has been partially funded by
the European Commission Horizon Europe SNS JU PREDICT-6G (GA 101095890) and
DESIRE6G (GA 101096466) projects.</t>

</section>


  </middle>

  <back>


    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC9544">
  <front>
    <title>Precision Availability Metrics (PAMs) for Services Governed by Service Level Objectives (SLOs)</title>
    <author fullname="G. Mirsky" initials="G." surname="Mirsky"/>
    <author fullname="J. Halpern" initials="J." surname="Halpern"/>
    <author fullname="X. Min" initials="X." surname="Min"/>
    <author fullname="A. Clemm" initials="A." surname="Clemm"/>
    <author fullname="J. Strassner" initials="J." surname="Strassner"/>
    <author fullname="J. François" initials="J." surname="François"/>
    <date month="March" year="2024"/>
    <abstract>
      <t>This document defines a set of metrics for networking services with
performance requirements expressed as Service Level Objectives
(SLOs). These metrics, referred to as "Precision Availability Metrics
(PAMs)", are useful for defining and monitoring SLOs. For example,
PAMs can be used by providers and/or customers of an RFC 9543 Network
Slice Service to assess whether the service is provided in compliance
with its defined SLOs.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9544"/>
  <seriesInfo name="DOI" value="10.17487/RFC9544"/>
</reference>

<reference anchor="RFC9055">
  <front>
    <title>Deterministic Networking (DetNet) Security Considerations</title>
    <author fullname="E. Grossman" initials="E." role="editor" surname="Grossman"/>
    <author fullname="T. Mizrahi" initials="T." surname="Mizrahi"/>
    <author fullname="A. Hacker" initials="A." surname="Hacker"/>
    <date month="June" year="2021"/>
    <abstract>
      <t>A DetNet (deterministic network) provides specific performance guarantees to its data flows, such as extremely low data loss rates and bounded latency (including bounded latency variation, i.e., "jitter"). As a result, securing a DetNet requires that in addition to the best practice security measures taken for any mission-critical network, additional security measures may be needed to secure the intended operation of these novel service properties.</t>
      <t>This document addresses DetNet-specific security considerations from the perspectives of both the DetNet system-level designer and component designer. System considerations include a taxonomy of relevant threats and attacks, and associations of threats versus use cases and service properties. Component-level considerations include ingress filtering and packet arrival-time violation detection.</t>
      <t>This document also addresses security considerations specific to the IP and MPLS data plane technologies, thereby complementing the Security Considerations sections of those documents.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9055"/>
  <seriesInfo name="DOI" value="10.17487/RFC9055"/>
</reference>




    </references>

    <references title='Informative References' anchor="sec-informative-references">




<reference anchor="FACTORY">
   <front>
      <title>OCN Use Cases for Industry control Networks</title>
      <author fullname="Cedric Westphal" initials="C." surname="Westphal">
         <organization>Futurewei, USA</organization>
      </author>
      <author fullname="Kiran Makhijani" initials="K." surname="Makhijani">
         <organization>Futurewei, USA</organization>
      </author>
      <author fullname="Kapal Dev" initials="K." surname="Dev">
         <organization>Munster Technological University</organization>
      </author>
      <author fullname="Luca Foschini" initials="L." surname="Foschini">
         <organization>University of Bologna</organization>
      </author>
      <date day="7" month="July" year="2022"/>
      <abstract>
	 <t>   This document present industrial networking use cases for Operations
   and Control Networks (OCN).  It is a companion document to the OCN
   reference model and the OCN problem statement and requirements
   document.  This document compiles a list of potential use cases where
   new industrial networking protocols could be beneficial.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-wmdf-ocn-use-cases-00"/>
   
</reference>


<reference anchor="VIRT-PLC">
   <front>
      <title>Virtualization of PLC in Industrial Networks - Problem Statement</title>
      <author fullname="Kiran Makhijani" initials="K." surname="Makhijani">
         <organization>Futurewei</organization>
      </author>
      <author fullname="Lijun Dong" initials="L." surname="Dong">
         <organization>Futurewei</organization>
      </author>
      <date day="5" month="March" year="2022"/>
      <abstract>
	 <t>   Conventional Programmable Logic Controllers (PLCs) impose several
   challenges on factory floors as their numbers and size on the factory
   floors/plants continues to grow.  Virtualized PLCs can help overcome
   many of those concerns.  They can improve the automation in Industry
   control networks by simplifying communication between higher-level
   applications and low-level factory floor machine operations.  Virtual
   PLCs provide an opportunity to integrate a diverse set of non-
   internet protocols supporting Industrial-IoT and IP connections to
   improve coordination between applications and field devices.  Besides
   automation, virtual PLCs also enhance programmability in industry
   process control systems by abstracting control functions from I/O
   modules.  However, to achieve desired outcome and benefits, both
   operational and application networks should evolve.

   This document introduces virtual PLC concept, describes the details
   and benefits of virtualized PLCs, then focuses on the problem
   statement and requirements.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-km-iotops-iiot-frwk-02"/>
   
</reference>


<reference anchor="PCE-PAM">
   <front>
      <title>Path Computation Based on Precision Availability Metrics</title>
      <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
         <organization>Telefonica</organization>
      </author>
      <author fullname="Fernando Agraz" initials="F." surname="Agraz">
         <organization>Universitat Politecnica de Catalunya</organization>
      </author>
      <author fullname="Salvatore Spadaro" initials="S." surname="Spadaro">
         <organization>Universitat Politecnica de Catalunya</organization>
      </author>
      <date day="13" month="February" year="2024"/>
      <abstract>
	 <t>   The Path Computation Element (PCE) is able of determining paths
   according to constraints expressed in the form of metrics.  The value
   of the metric can be signaled as a bound or maximum, meaning that
   path metric must be less than or equal such value.  While this can be
   sufficient for certain services, some others can require the
   utilization of Precision Availability Metrics (PAM).  This document
   defines a new object, namely the PRECISION METRIC object, to be used
   for path calculation or selection for networking services with
   performance requirements expressed as Service Level Objectives (SLO)
   using PAM.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-contreras-pce-pam-02"/>
   
</reference>

<reference anchor="PTP-GRID">
  <front>
    <title>IEC/IEEE International Standard - Communication networks and systems for power utility automation – Part 9-3: Precision time protocol profile for power utility automation</title>
    <author>
      <organization/>
    </author>
    <date month="August" year="2016"/>
  </front>
  <seriesInfo name="DOI" value="10.1109/ieeestd.2016.7479438"/>
  <seriesInfo name="ISBN" value="[&quot;9781504420174&quot;]"/>
<refcontent>IEEE</refcontent></reference>

<reference anchor="NIST-OT">
  <front>
    <title>Risk management framework for information systems and organizations:: a system life cycle approach for security and privacy</title>
    <author>
      <organization/>
    </author>
    <date month="December" year="2018"/>
  </front>
  <seriesInfo name="DOI" value="10.6028/nist.sp.800-37r2"/>
<refcontent>National Institute of Standards and Technology</refcontent></reference>


<reference anchor="TSN_IA_PROFILE" target="https://1.ieee802.org/tsn/iec-ieee-60802/">
  <front>
    <title>IEC/IEEE 60802 TSN Profile for Industrial Automation</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>


<reference anchor="RFC9543">
  <front>
    <title>A Framework for Network Slices in Networks Built from IETF Technologies</title>
    <author fullname="A. Farrel" initials="A." role="editor" surname="Farrel"/>
    <author fullname="J. Drake" initials="J." role="editor" surname="Drake"/>
    <author fullname="R. Rokui" initials="R." surname="Rokui"/>
    <author fullname="S. Homma" initials="S." surname="Homma"/>
    <author fullname="K. Makhijani" initials="K." surname="Makhijani"/>
    <author fullname="L. Contreras" initials="L." surname="Contreras"/>
    <author fullname="J. Tantsura" initials="J." surname="Tantsura"/>
    <date month="March" year="2024"/>
    <abstract>
      <t>This document describes network slicing in the context of networks built from IETF technologies. It defines the term "IETF Network Slice" to describe this type of network slice and establishes the general principles of network slicing in the IETF context.</t>
      <t>The document discusses the general framework for requesting and operating IETF Network Slices, the characteristics of an IETF Network Slice, the necessary system components and interfaces, and the mapping of abstract requests to more specific technologies. The document also discusses related considerations with monitoring and security.</t>
      <t>This document also provides definitions of related terms to enable consistent usage in other IETF documents that describe or use aspects of IETF Network Slices.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9543"/>
  <seriesInfo name="DOI" value="10.17487/RFC9543"/>
</reference>




    </references>


<?line 608?>

<section anchor="ocn-eh"><name>Appendix: Potential OCN-EH Extension Header Approach</name>

<t>An interface from application to network using IPv6 operation and control
Extension header (EH) option is proposed as means for app-flow to express
network resources with a fine granularity. Other options as YANG based
provisioning do not scale, nor are easy to change dnamically. Since
applications generating app-flows use IP, an IPv6 EH option provide are a more
natural fit than other encapsulations and is specifically suitable for DetNet
unaware end systems.</t>

<t>OCN-EH solution is an in-band interface to the DetNets from OT
applications with a programmable and dynamic process automation capabilities.
Once the network is engineered for DetNet services, it can map
the incoming traffic with OCN-EH with in its(DetNet Domain) capabilities.</t>

<section anchor="ocno"><name>Operation and Control Network Option (OCNO)</name>

<t>The OCN Option (OCNO) is a hop-by-hop option that can
   be included in IPv6 for OCN traffic control specification.</t>

<figure title="Explicit Traffic Control HBH Options" anchor="ocn-detnet"><sourcecode type="drawing"><![CDATA[
    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
                                   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
                                   |  Option Type  |  Opt Data Len |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   | OCN Code                    |   OCN-TC-Flowlet nonce         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   | OCN Param | len |       value                                |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   | OCN Param | len |       value                                |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   | OCN Param | len |       value                                |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></sourcecode></figure>

<dl newline="true">
  <dt>Option Type:</dt>
  <dd>
    <t>8-bit identifier of the type of option.  The option identifier
   for the OCN Option (0x??) to be allocated by the IANA. First two bits
  will be 00 (skip over this option and continue processing the header.)</t>
  </dd>
  <dt>Option Length:</dt>
  <dd>
    <t>8-bit unsigned integer. Multiple of 8-octets.</t>
  </dd>
  <dt>OCN Code:</dt>
  <dd>
    <t>16-bit Traffic type code</t>
  </dd>
  <dt>Flowlet nonce:</dt>
  <dd>
    <t>16-bit. Identifies that a packet is associated with a group of
packets and shares fate. For example, an application can set the
same nonce for a set of actuators and sensors. When set to 0,
flow-id is set to the same value in related flows. When flow-id is
also 0, no relationship exists.</t>
  </dd>
  <dt>OCN Parameters:</dt>
  <dd>
    <t>described as parameter code, length and value</t>
  </dd>
</dl>

<t>The workflow of traffic with EH option happens in the following steps:</t>

<t><list style="numbers" type="1">
  <t>An end system (industrial controller)  uses the format described in
  <xref target="ocno"/> to provide traffic type and constraints.  It fills option type, len fields along with OCN parameters if needed.</t>
  <t>Platform logic related deterministic processing is not part of the
  network latency in EH; Packet is tranmitted on interface connected to
  DetNet relay node.</t>
  <t>DetNet relay node processes parameters, and source/destination addresses
  associate an app-flow to DetNet flow. It may or may not remove EH
  see <xref target="encap_pre"/>, and inserts its own DetNet encapsulation (technology specific).</t>
  <t>In case of known exceptions or errors, the relay node could reply to application with traffic type ALEV_TT.</t>
  <t>DetNet delivers the packet with guarantees of traffic type
requested to the endsystem gateway connecting to field devices.</t>
  <t>Field device gateway performs protocol translation and deliver packet to
the field device.</t>
  <t>Observable errors, such as late delivery or inconsistent OCN header may
  be sent to the application from the gateway.</t>
  <t>Similarly, gateways insert new OCN headers for messages originating from
field devices, such as alarms or other sensor data.</t>
</list></t>

</section>
<section anchor="encap_pre"><name>OCNO EH Processing</name>

<t><list style="symbols">
  <t>OCNO EH  can be extended for conveying errors from DetNet to the industrial controller application. For example, when a service violation
happened in the DetNet, relay node will set an error flag in OCNO EH.</t>
  <t>Field devices are considered resource-constrained and are not expected to insert or process extension headers.</t>
</list></t>

<t>Two different approaches of hop-by-hop options processing are feasible.</t>

<t><list style="numbers" type="1">
  <t>EH is inserted by the application. The relay node performs mapping to DetNet flow.</t>
  <t>if the DetNet data plane is IPv6 end to end, then EH can be carried and processed on each hop to the last relay node, which
acts as a gateway for the fld device and performs EH processing.</t>
</list></t>

<t>Currently only the first option is assumed.</t>

</section>
</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

