<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-zdm-tvr-applicability-04" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.2 -->
  <front>
    <title abbrev="Applicability Statement">Applicability of TVR YANG Data Models</title>
    <seriesInfo name="Internet-Draft" value="draft-zdm-tvr-applicability-04"/>
    <author fullname="Li Zhang">
      <organization>Huawei</organization>
      <address>
        <email>zhangli344@huawei.com</email>
      </address>
    </author>
    <author fullname="Jie Dong">
      <organization>Huawei</organization>
      <address>
        <email>jie.dong@huawei.com</email>
      </address>
    </author>
    <author fullname="Mohamed Boucadair">
      <organization>Orange</organization>
      <address>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <date year="2025" month="October" day="16"/>
    <area>Routing</area>
    <workgroup>Time-Variant Routing</workgroup>
    <keyword>schedule</keyword>
    <keyword>YANG module</keyword>
    <keyword>applicability</keyword>
    <abstract>
      <?line 56?>

<t>Time-Variant Routing (TVR) is a routing system that can support the predicted topology changes caused by internal or
external reasons. Typical use cases include resource preservation networks, operating efficiency networks and dynamic
reachability networks.
This document provides examples of how to implement the TVR scheduling capabilities for key use cases. It describes
which part of the TVR data model is used and why, and it outlines operational and security considerations when deploying
TVR-based technologies.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Time-Variant Routing Working Group mailing list (tvr@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tvr/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/zhangli-abcd/TVR-Applicability-2"/>.</t>
    </note>
  </front>
  <middle>
    <?line 65?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Time-Variant Routing (TVR) Working Group addresses a growing need in modern network environments where
predictable variations in topology - such as the restoration, activation, or loss of network elements, are
part of normal operations. This approach is essential in dynamic networks with mobile nodes, where links may
be frequently disrupted and re-established due to mobility or in networks with highly predictable traffic
patterns, where links may be powered down to conserve or reduce energy.</t>
      <t>This document provides examples of implementing TVR scheduling capabilities in identified use cases. It
demonstrates the applicability of the TVR data model, methods for disseminating the TVR schedules, and the
necessary IETF ancillary technologies for network environments, such as time synchronization and policy,
that support TVR capabilities.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<!--
# Use Case Examples

## Tidal Network Use Case

A tidal network is a typical scenario of an Energy Efficient case ({{Section 3 of I-D.ietf-tvr-use-cases}}).
The tidal network means that the volume of traffic in the network changes periodically, like the ocean tide.
These changes are mainly affected by human activities. Therefore, this tidal effect is obvious in
human-populated areas, such as campuses and airports.

In the context of a tidal network, if the network maintains all the devices up to guarantee a maximum
throughput all the time, often, power will be wasted on network resources that are not being used. Energy-saving methods may include the deactivation
of some or all components of network nodes. These activities have the potential to alter network topology and
impact data routing/forwarding in a variety of ways. Interfaces on network nodes can be selectively disabled
or enabled based on traffic patterns, thereby reducing the energy consumption of nodes during periods of low
network traffic.

## Dynamic Reachability Use Case

Dynamic Reachability referred to the scenarios where a node is placed on a mobile platform, the mobility of the
platform may cause changes to the topology of the network over time{{Section 4 of I-D.ietf-tvr-use-cases}}. As the
relative mobility between and among nodes in the network and the impacts of the environment on the signal
propagation can be predicted, the associated loss and establishment of adjacencies can also be planned for.

The typical detailed use cases of Dynamic Reachability include but not limited to satellite network, predictable moving
vessels and vehicles.

-->

</section>
    <section anchor="applicability-of-tvr-yang-model">
      <name>Applicability of TVR Yang Model</name>
      <t>The TVR data model <xref target="I-D.ietf-tvr-schedule-yang"/> defines the TVR node YANG module and TVR topology YANG module. This
clause discusses the applicability of these two modules separately.</t>
      <section anchor="applicability-node-yang">
        <name>Applicability of TVR Node YANG Module</name>
        <t>As specified in <xref section="5.2" sectionFormat="of" target="I-D.ietf-tvr-schedule-yang"/>, module ietf-tvr-node.yang is a device model and designed to manage a
single node with scheduled attributes. It is not necessary in all TVR use cases.</t>
        <t>The applicability of TVR node YANG module depends on whether changes in the attributes of network devices are caused by
the environment or centrally controlled.</t>
        <ul spacing="normal">
          <li>
            <t>When the changes are caused by the environment changes (such as movement, sunlight changes, and weather changes) or
the devices themselves decisions, the network device does not need to get the managed information through the YANG module. For example,
when two nodes's distance is too far to establish a connection, then the link is down. Another case is that when the weather is
not good and leading to the link degradation, then the nodes decide to disconnect the link.</t>
          </li>
          <li>
            <t>When the changes are caused by the centralized control (such as a controller, or an orchestrator), the devices themselves
does not know when to adjust the attributes. In this case, the scheduled attributes changes should be delivered to the
network devices through TVR node YANG module.</t>
          </li>
        </ul>
      </section>
      <section anchor="applicability-topology-yang">
        <name>Applicability of TVR Topology YANG Module</name>
        <t>As specified in <xref section="5.3" sectionFormat="of" target="I-D.ietf-tvr-schedule-yang"/>, module ietf-tvr-topology.yang describes a network topology
with a time-variant availability schedule. This YANG module is also not applicable for all TVR use cases.</t>
        <t>According to the description of <xref section="3.1" sectionFormat="of" target="I-D.ietf-tvr-requirements"/>, the scheduling generation locality
and execution locality may be centralized or distributed.</t>
        <ul spacing="normal">
          <li>
            <t>When the schedules are generated and executed in distributed manner, which means that each node generates and executes its specific
schedules. In this scenario, the topology YANG module is not necessary, the devices can collect topology schedules by other means.
This scenario is outside of the scope of this document.</t>
          </li>
          <li>
            <t>When the schedules are generated and executed in centralized manner and within the same device, the topology YANG module is also not applicable.
Therefore, this scenario is also outside of the scope of this document.</t>
          </li>
          <li>
            <t>When the schedules are generated and executed in centralized manner but on different devices. For example, the schedule is
generated by the managing device, and executed by the network controller. In this scenario the scheduled topology changes
need to be sent to the execution device through the topology YANG module. This scenario is called "Centralized Scenario".</t>
          </li>
          <li>
            <t>When the schedules are generated in a centralized manner and executed in a distributed manner, the YANG module
needs to be used to deliver the scheduled topology changes to the managed device. This scenario is called "Distributed Scenario".</t>
          </li>
        </ul>
        <section anchor="centralized-scenario">
          <name>Interactions in Centralized Scenario</name>
          <t>In the centralized scenario, the network managing device generates and maintains schedules, the routing application
is deployed in the network controller, and the network devices execute the schedules and routing results.
The following figure shows the components of the centralized scenario.</t>
          <figure anchor="ref-to-fig1">
            <name>Components of Centralized Scenario</name>
            <artwork><![CDATA[
 +-----------------------------------------------------------------+
 |                        Managing Device                          |
 +-----------------------------------------------------------------+
            |                                           |
Topology YANG Module                        Node YANG Module(optional)
            |                                           |
 +---------\|/----------+                     +--------\|/--------+
 |  Network Controller  |---Routing Results-->|  Network Devices  |
 +----------------------+                     +-------------------+
]]></artwork>
          </figure>
          <t>A centralized scenario involves the interaction between the managing device and network controller, the managing
device and network devices, and the controller and network devices.</t>
          <t>The managing device may need to deliver node-specific schedules to network devices by TVR Schedule Node YANG
module <xref section="5.2" sectionFormat="of" target="I-D.ietf-tvr-schedule-yang"/>. This is optional and only necessary when the node attribute changes
are instructed by the controller. In the meanwhile, the network devices need to report their own status data to the managing device.</t>
          <t>The managing device needs to deliver the schedules of network topology to the network controller by the TVR Network
Topology YANG module <xref section="5.3" sectionFormat="of" target="I-D.ietf-tvr-schedule-yang"/>, so that the routing application in the controller
can consider the impact of topology changes on routes when calculating routes.</t>
          <t>The network controller should deliver the route calculation results to the network devices. The format of the routing
results depend on the protocols deployed (The typical protocols include BGP, PCEP, etc.). The routing results for a period
in the future could be sent to the network devices in wall-clock time or be packed and sent at some special points.</t>
        </section>
        <section anchor="distributed-scenario">
          <name>Interactions in Distributed Scenario</name>
          <t>In the distributed scenario, the managing device generates and maintains schedules, the routing application
is deployed in the network devices which also executes schedules and route calculation.</t>
          <figure anchor="ref-to-fig2">
            <name>Components of Distributed Scenario</name>
            <artwork><![CDATA[
 +-------------------------------------------------+
 |                  Managing Device                |
 +-------------------------------------------------+
                          |
               Topology YANG Module and
               Node YANG Module(optional)
                          |
 +-----------------------\|/-----------------------+
 |         Managed Devices (Network Devices)        |
 +-------------------------------------------------+
]]></artwork>
          </figure>
          <t>The distributed model only involves the interaction between managing devices and network devices(managed devices).</t>
          <t>The managing device need to deliver network topology schedules to all the network devices by TVR Network Topology Yang
module for route calculation. The managing device may also need to deliver node-specific schedules to network devices by
TVR Schedule Node YANG module, this is optional and only necessary when the node attributes changes are instructed by
the controller. The network devices need to report their own status data to the managing device.</t>
        </section>
      </section>
      <section anchor="encoding-of-the-yang-model">
        <name>Encoding of the YANG Model</name>
        <t>The TVR data model <xref target="I-D.ietf-tvr-schedule-yang"/> can manage network resources and topologies with scheduled
attributes. There are modules defined in the TVR data model, these are:</t>
        <ul spacing="normal">
          <li>
            <t>The “ietf-tvr-schedule” module contains the schedule YANG definitions. This module uses groupings from <xref target="I-D.ietf-netmod-schedule-yang"/> data model;</t>
          </li>
          <li>
            <t>The “ietf-tvr-topology” module defines a network topology with a time-variant availability schedule;</t>
          </li>
          <li>
            <t>The “ietf-tvr-node” module is to be used to manage the scheduled attributes of a single node.</t>
          </li>
        </ul>
        <t>To create a schedule, the following TVR data model objects and subsequent branches are used:</t>
        <ul spacing="normal">
          <li>
            <t>‘node-schedule’</t>
          </li>
          <li>
            <t>‘interface-schedule’</t>
          </li>
          <li>
            <t>‘attribute-schedule’</t>
          </li>
        </ul>
        <t>A TVR scenario example is provided below, where a wireless link is shut down for 12 hours, from 19:00 to 7am the next day.
The schedule is identified using a unique identifier that is conveyed in ‘schedule-id’, and the recurring schedule can be applied for multiple days using Coordinated
Universal Time (UTC).
More detailed examples of the json code is provided in this documents Appendix.</t>
        <artwork><![CDATA[
{
   "ietf-tvr-node:node-schedule":[
      {
         "node-id":1234567890,
         "node-power-schedule":{
            "power-default":true,
         },
         "interface-schedule":[
            {
               "name":"Wlan0",
               "default-available":false,
               "attribute-schedule":{
                  "schedules":[
                     {
                        "schedule-id":111111,
                        "recurrence-first":{
                           "utc-start-time":"2025-12-01T19:00:00Z",
                           "duration":43200
                        },
                        "utc-until":"2026-12-01T00:00:00Z",
                        "frequency":"ietf-schedule:daily",
                        "interval":1,
                        "attr-value":{
                           "available":true
                        }
                     }
                  ]
               }
            }
         ]
      }
   ]
}
]]></artwork>
        <t>The methods for disseminating and propagating the generated schedules are discussed in the following subsections.</t>
      </section>
      <section anchor="management-protocols-for-tvr">
        <name>Management Protocols for TVR</name>
        <t>The TVR data model is designed to be accessed via YANG-based management protocols such as NETCONF <xref target="RFC6241"/>, RESTCONF
<xref target="RFC8040"/> and CORECONF<xref target="I-D.ietf-core-comi-19"/>. This section discusses the applicability of these protocols for
configuring time-variant network resources using the TVR YANG data models.</t>
        <t>NETCONF provides a robust mechanism for managing complex network configurations, particularly when transactional integrity
and operational consistency are required. Its ability to execute atomic transactions ensures that schedules involving
multiple resources are applied fully, preventing partial updates that could lead to configuration inconsistencies. This
feature is important for time-sensitive scheduling in TVR environments. Additionally, NETCONF supports the validation of
configurations prior to commitment, allowing operators to verify the correctness of schedules before they are applied.
It also includes rollback capabilities, such as restoring a previous configuration during scheduling errors.</t>
        <t>In contrast, RESTCONF offers a simpler, stateless method for interacting with network devices, making it suitable for use
cases requiring lightweight, rapid configuration. RESTCONF utilizes a RESTful interface over HTTP, providing a streamlined
approach to network configuration and management. Therefore, RESTCONF may be advantageous in scenarios where quick adjustments
to schedules are needed or where integration with web-based or cloud-native systems is a priority.</t>
        <t>CORECONF provides a lightweight, stateless method for managing small network devices where saving bytes to transport a
message is very important. CORECONF uses CoAP<xref target="RFC7252"/> methods to access structured data defined in YANG which is a complementary to RESTCONF.
Contrary to RESTCONF, CORECONF many design decisions are motivated by the saving of bytes. Therefore, CORECONF is advantageous
in networks with constrained devices and very limited transmission bandwidth, especially in IoT devices that already deployed CoAP.</t>
        <t>Depending on the type of node in the TVR network, NETCONF would be the preferred protocol for large-scale, critical scheduling
operations requiring validation and rollback mechanisms. For smaller-scale or isolated scheduling tasks, RESTCONF provides an
efficient and straightforward option without the need for the transactional features offered by NETCONF. CORECONF is preferred
in resource constrained IoT networks where saving message bytes is a priority. The choice of protocol
to use with the TVR YANG model should be driven by the specific requirements of the network environment and the complexity of
the scheduling tasks involved.</t>
        <t>The security aspects of these management protocols, including their strengths and weaknesses, are discussed further in
<xref target="security-considerations"/> of this document.</t>
      </section>
    </section>
    <section anchor="time-synchronization">
      <name>Time Synchronization</name>
      <t>Time Synchronization is fundamental for ensuring that TVR mechanisms, which depend on highly accurate timing, function as intended across
an entire network. Misalignment in time could lead to serious routing issues, including inefficiency in path forwarding,
instability in routing tables, and traffic outages.</t>
      <t>Time Synchronization mechanisms will be used to ensure:</t>
      <ul spacing="normal">
        <li>
          <t>Coordination of Planned Network Events;</t>
        </li>
        <li>
          <t>Verification of TVR Data Model Time Stamps</t>
        </li>
        <li>
          <t>Accurate Scheduling of Paths;</t>
        </li>
        <li>
          <t>Fault Tolerance.</t>
        </li>
      </ul>
      <t>Different time-variant scenarios may require different granularities of time synchronization. For example, the
period of traffic and topology changes in tidal networks is usually a day or week. Therefore, a second-level time
synchronization is enough. However, for the dynamic reachability scenarios, a fine-granularity time synchronization may
be necessary, as the nodes may moving very fast in some cases (the moving speed of a low earth orbit satellite is more than 7900 m/s)</t>
      <t>Existing clock synchronization protocols can be classified into hardware-based protocols and software-based protocols.</t>
      <t>Hardware-based protocols often rely on dedicated hardware to ensure clock synchronization, such as Satellite Based Timing Service (SBTS)
and Precision Time Protocol (PTP). The SBTS includes but not limited to Global Position System (GPS),
BeiDou Navigation Satellite System(BDS), Global Navigation Satellite System(GLONASS), and Galileo satellite navigation system.
Software-based protocols, on the other hand, synchronize clocks through software packages running on systems, such as Network
Time Protocol (NTP) <xref target="RFC5905"/> and Simple Network Time Protocol (SNTP) <xref target="RFC4330"/>.</t>
      <t>The security aspects of time synchronization mechanisms are discussed further in <xref target="security-considerations"/> of this document.</t>
      <section anchor="hardware-based-time-synchronization-mechanisms">
        <name>Hardware-based Time Synchronization Mechanisms</name>
        <t>Hardware-based protocols typically have higher precision and stability, but also have higher cost due to the dedicated hardware. SBTS and PTP are the typical hardware-based time synchronization mechanisms.</t>
        <t>SBTS provides a precise time synchronization service based on the signals transmitted by the satellites. SBTS can realize the micro-second level time synchronization among the devices installed with SBTS reviver hardware.</t>
        <t>PTP is a network protocol that complies with the IEEE 1588 standard and is used to implement high-precision time synchronization between network nodes. PTP implements time synchronization by transmitting synchronization messages between master and slave devices. Based on the hardware timestamp, the precision of time synchronization is much higher than that of NTP, and can reach the sub-microsecond level or even tens of nanoseconds.  When deploying PTP in TVR networks, the managing devices should be the master and the network devices and controller should be the slaves which get time from the master.</t>
        <t>Both SBTS and PTP can realize micro-second level time synchronization. Depending on the features of TVR network, the SBTS would be the preferred mechanisms for
large-scale, high dynamic and open-air networks, especially networks with unreliable links as it does not require network links to exchange time information.
For the small-scale networks with stable links but have high-precision time synchronization requirements, the PTP is much preferred.</t>
      </section>
      <section anchor="software-based-time-synchronization-protocols">
        <name>Software-based Time Synchronization Protocols</name>
        <t>Software-based protocols are simple and applicable to common hardware devices, but have lower precision (For
example, the NTP can realize the synchronization at tens of milliseconds level).</t>
        <section anchor="ntp">
          <name>NTP</name>
          <t>NTP uses a hierarchical structure of time sources. Each level of this hierarchy is termed a stratum. Generally, an NTP
server synchronized to an authoritative clock runs at stratum 1. Such NTP server functions as the primary time server
to provide clock synchronization for other devices on the network. Stratum 2 servers obtain time from stratum 1 servers,
stratum 3 servers obtain time from stratum 2 servers, and so on.</t>
          <t>In TVR use cases, the managing device functions as a level-1 NTP server and synchronized to an authoritative clock
source. The network controller and network devices behave as clients to obtain accurate time from the managing device.
<xref target="ref-to-fig3"/> shows an NTP deployment scenario for obtaining clock from a GPS clock source.</t>
          <figure anchor="ref-to-fig3">
            <name>Deployment Case of NTP in Tidal Networks</name>
            <artwork><![CDATA[
                           +--------------------+
                           |  GPS Clock Source  |
                           +--------------------+
                                     |
               +--------------------\|/------------------+
Stratum 1      |             Managing Device             |
               +-----------------------------------------+
                     |                             |
                     |                             |
                     |                             |
          +---------\|/----------+       +--------\|/--------+
Stratum 2 |  Network Controller  |       |  Network Devices  |
          +----------------------+       +-------------------+

]]></artwork>
          </figure>
          <t>NTP is preferred in large-scale networks with reliable links and long-term changes, which dose not require a high-precision time synchronization.</t>
        </section>
        <section anchor="sntp">
          <name>SNTP</name>
          <t>SNTP is a subset of the NTP used to synchronize computer clocks in the Internet. It simplifies the complex NTP
synchronization function and has lower clock precision, but the synchronization precision still can be guarded under
seconds. SNTP is also preferred in large-scale networks with reliable links, long-term changes, and loose synchronization precision. In addition, it is more suitable for networks with limited resources than NTP.</t>
        </section>
      </section>
    </section>
    <section anchor="schedule-database">
      <name>Schedule Database</name>
      <t>The schedule database is used to store and maintain schedules, the database may be deployed on a managing device
and managed devices based on requirements.</t>
      <t>The source of the schedule database may be diversified, for example, configuration from an administrator
or YANG model from the management interface. The schedule entries of different databases may be different, but the
content of the same schedule entry in the schedule databases of different devices in the same domain must be
consistent. There are at least two ways to make the content of the same schedule entry in different schedule databases
consistent:</t>
      <ul spacing="normal">
        <li>
          <t>All the schedule entries are generated at a specific device;</t>
        </li>
        <li>
          <t>Schedule entries are generated at different devices, but there is a synchronization mechanism to synchronize the
schedule databases among devices.</t>
        </li>
      </ul>
      <t>Option 1 is simplest and easy to implement. In a time-variant domain, the managing device may receive scheduling
requests and generate all schedule entries. Then the schedule entries are delivered to the necessary network devices
in the domain through the TVR YANG model.</t>
      <t>Option 2 relies on advertisement mechanisms (such as routing techniques) to advertise the scheduling data generated
by itself to other devices. This could be achieved using extensions to existing routing schemes and techniques.</t>
      <t>These options will be discussed with the TVR Working Group, and agreed approaches will be documented in future versions
of this Internet Draft.</t>
      <section anchor="data-structure">
        <name>Data Structure</name>
        <t><xref target="I-D.ietf-tvr-schedule-yang"/> defines a TVR Node and TVR Topology YANG modules. The Node YANG module
includes node power schedules and interface schedules. The Topology YANG module includes node schedules and link schedules.</t>
        <t>Based on the preceding four schedule types, the schedule database should contain four types of schedule entries in
different formats:</t>
        <ul spacing="normal">
          <li>
            <t>Node power schedule entry;</t>
          </li>
          <li>
            <t>Interface schedule entry;</t>
          </li>
          <li>
            <t>Node schedule entry;</t>
          </li>
          <li>
            <t>Link schedule entry;</t>
          </li>
        </ul>
        <t>The detailed format and fields of different types of schedule entries could reference to the definitions of the corresponding
YANG modules.</t>
      </section>
      <section anchor="schedule-operations">
        <name>Schedule Operations</name>
        <t>This section provides general requirements for using the TVR schedules.</t>
        <t>The schedule database should support the add, update, and delete operations.</t>
        <t>When adding or updating a schedule entry, the execution node needs to check whether resource conflicts exist between the
current schedule and existing schedules. If a conflict exists, the operation should be failed.</t>
        <t>Schedules are updated and deleted based on schedule IDs. Therefore, schedule IDs must be unique in a time-variant domain.
This can be handled, e.g., by a dedicated allocation agent within the time-variant domain.</t>
      </section>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>Several operational considerations exist when using TVR techniques and data models in a network. This section provides
some high-level observations and more detailed sub-sections for specific consideration related to schedule dissemination,
execution, and recovery in case of failure to apply a schedule or partial change.</t>
      <ul spacing="normal">
        <li>
          <t>Coordinated Network Events: TVR often coordinates routing changes anticipating events like predictable low-traffic
periods or link downtimes (e.g., scheduled maintenance or traffic demand).</t>
        </li>
        <li>
          <t>Accurate Scheduling of Paths: TVR schedules capable routers and network nodes will dynamically adjust forwarding paths
based on planned changes in link availability or network conditions.</t>
        </li>
        <li>
          <t>Time-Stamped Data Models: TVR will require the use time-stamped data models (e.g., schedules for link changes or
availability windows) to make interface management decisions. This ensures that all TVR nodes interpret the timing of
events consistently and implement time-based policies correctly.</t>
        </li>
      </ul>
      <t>Therefore, network time accuracy and time-stamped data models are critical to ensure that coordinated network events
and scheduled path decisions across the network are based on a consistent time reference. Without accurate time sync,
nodes could apply different schedules, causing routing inconsistencies, path flapping, or packet loss.</t>
      <t>Since the all the schedules are generated by the managing devices, it is necessary to make sure that the managing
device and managed devices within a schedule domian <xref section="2.1.1" sectionFormat="of" target="I-D.ietf-tvr-requirements"/> are synchronized
with the same time source. It ensures they have the same notion of when that is.</t>
      <section anchor="schedule-dissemination">
        <name>Schedule Dissemination</name>
        <t>when distributing schedules, the following problems should be considered:</t>
        <ul spacing="normal">
          <li>
            <t>The managed devices that receives a schedule should have the ability to execute the schedule. If the device does not support schedule
execution, it must ignore it on receipt.</t>
          </li>
          <li>
            <t>The distributing of a schedule should be earlier than the earliest start time of the schedule, this ensures that the
managed device has enough time to execute this schedule.</t>
          </li>
        </ul>
      </section>
      <section anchor="schedule-execution">
        <name>Schedule Execution</name>
        <t>Schedule execution means that a component (e.g., device) undertakes an action (e.g., allocates and deallocates resources)
at specified time points. The schedule execution of Node Module and Topology Module should be considered separately.</t>
        <section anchor="execution-of-node-schedule">
          <name>Execution of Node Schedule</name>
          <t>Node schedule execution indicates a node to change its node/interfaces availability/power up
and down, and other attributes directly or by commands.</t>
          <t>when executing a node schedule, the schedule executor should undertake an action at specified time points as indicated in the schedule.</t>
        </section>
        <section anchor="execution-of-topology-module-schedule">
          <name>Execution of Topology Module Schedule</name>
          <t>Topology schedule execution means a node take some measures before or upon the scheduled topology changes.</t>
          <t>The schedule executor should understand the consequences of the schedule execution. The addition and deletion of the topology
need to be considered separately.</t>
          <t>A link coming up or a node joining a topology should not have any functional change until the change is proven to be fully
operational. The routing paths may be pre-computed but should not be installed before all the topology changes are
confirmed to be operational. The benefits of this pre-computation appear to be very small. The network may choose to
not do any pre-installation or pre-computation in reaction to topological additions at a small cost of some operational
efficiency.</t>
          <t>Topological deletions are an entirely different matter. If a link or node is to be removed from the topology, then the
network should act before the anticipated change to route traffic around the expected topological change. Specifically,
at some point before the planned topology change, the routing paths should be pre-computed and installed before the
topology change takes place. The required time to perform such planned action will vary depending on the exact network
and configuration. When using an IGP or other distributed routing protocols, the affected links may be set to a high
metric to direct traffic to alternate paths. This type of change does require some time to propagate through the
network, so the metric change should be initiated far enough in advance that the network converges before the actual
topological change.</t>
          <t>In addition to the addition and deleting of topology, a schedule may indicate the attributes change of some links, such as bandwidth and delay.
If an attribute changes better (such as latency decrease and bandwidth increase), then the executer should take actions later
or until the topology change is proven to be fully operational.
If an attribute changes worse (such as latency increase and bandwidth decrease), then the node should react to it before the change take place.</t>
        </section>
      </section>
      <section anchor="schedule-recovery">
        <name>Schedule Recovery</name>
        <t>Schedule recovery means when a node lost its specific schedule data, it should be able to recover these schedule data.
Typical scenarios include data loss due to device restart, disconnection from managing devices and failure to receive new
schedules for a long time. In these scenarios, once the connection between the managed device and the managing device is
established again, the managing device needs to re-distribute all schedules that start time is later than the current moment
to the managed device after time synchronization is finished.</t>
      </section>
      <section anchor="error-handling">
        <name>Error Handling</name>
        <section anchor="consistency-error">
          <name>Consistency Error</name>
          <t>Consistency error means that some time parameters conflict with other time parameters in the same schedule or in other schedules.</t>
          <ul spacing="normal">
            <li>
              <t>If the time parameters of a schedule conflict with each other, for example, the period-start bigger than period-end,
the duration is longer than the product of frequency and interval, or the duration is longer than utc-until, then the schedule
should be discarded and an error should be returned to the managed device.</t>
            </li>
            <li>
              <t>If there is a conflict between schedules with different schedule IDs, for example, schedule1 indicates that interface B is closed at time A, but
schedule2 indicates that interface B is open at time A, then all conflicting schedules should be discarded and an error
should be returned to the managed device. If two schedules have the same schedule ID, then it is considered as a update of the former schedule.</t>
            </li>
          </ul>
          <t>Editor's Note: multi-manager scenarios need to be considered.</t>
        </section>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The integration of time-variant mechanisms in network operations presents distinct security challenges that require thorough
analysis to safeguard the network’s integrity, availability, and confidentiality. Networks that rely on time-sensitive data
for routing and forwarding decisions are particularly susceptible to attacks that exploit timing dependencies.</t>
      <t>The "Security Considerations" section of <xref target="I-D.ietf-tvr-requirements"/> outlines various threat vectors and categories specific
to time-variant environments.</t>
      <section anchor="dos-attack">
        <name>Denial-of-Service (DoS) Attack</name>
        <t>In a time-variant network, malicious actors could attack the network by disrupting or manipulating the time synchronization
process. For example, an attacker could intentionally delay or corrupt time signals exchanged within the network, leading
to routing errors and widespread denial-of-service (DoS) attacks.</t>
        <t>This kind of attack could be mitigated by the redundancy time synchronization mechanisms, for example, multiple NTP sources
or multiple time synchronization protocols could be deployed in a TVR network. The network devices could guarantee the
correctness of the time by checking whether the time signals from different sources or protocols.</t>
        <t>In addition, the identification authentication is also an important way to protect the time signals being tampered by
attackers. Some security extensions for time synchronization protocols (such as NTS (Network Time Security)) are
recommended to be applied.</t>
      </section>
      <section anchor="traffic-analysis">
        <name>Traffic Analysis and Path Prediction</name>
        <t>In a time-variant network, if time information is not adequately protected, attackers could conduct traffic analysis to
infer routing decisions, network load, or usage patterns. The schedule ability could enable attackers to launch highly
targeted attacks, such as selectively overloading certain links or intercepting sensitive communications.</t>
        <t>This kind of attack could be mitigated by the encryption of schedules and the authentication of managing devices. For
the networks using NETCONF to deliver schedules, NETCONF over TLS<xref target="RFC7589"/> is recommended to achieve the bidirectional
authentication and encryption of YANG model data. RESTCONF supports TLS originally, so it can be deployed without
additional configurations or modifications.</t>
        <t>In addition, in time variant networks with centralized scenario<xref target="centralized-scenario"/>, the encryption of routing path
information is also necessary to avoid the fake routing information. Considering the most typical protocols used to
deliver the routing path information between controller and network devices are BGP and PCEP, and both are based on TCP.
Therefore, the TLS is recommended to be applied for the conservation.</t>
      </section>
      <section anchor="activity-identification">
        <name>Activity Identification and Privacy</name>
        <t>In certain scenarios, precise time information exchanged within the network could be correlated with specific user or
device behavior, inadvertently revealing private information.</t>
        <t>This risk could also be mitigated by the solutions mentioned in <xref target="activity-identification"/>.</t>
      </section>
      <section anchor="spoofing-and-manipulation-of-time-information">
        <name>Spoofing and Manipulation of Time Information</name>
        <t>In a time-variant network, if an attacker were to inject false or manipulated time data into the network, it could cause
routers and devices to make incorrect decisions, potentially leading to traffic misrouting, network partitions, or
inefficient use of resources.</t>
        <t>This risk could also be mitigated by the solutions mentioned in <xref target="dos-attack"/>.</t>
      </section>
      <section anchor="replay-attacks-on-time-sensitive-data">
        <name>Replay Attacks on Time-Sensitive Data</name>
        <t>Time-variant network data and schedules updates may be susceptible to replay attacks, which could cause network devices
to act on outdated information, leading to inconsistent routing decisions, misaligned schedules, or security gaps. In
particular, attackers could exploit replay attacks to force devices into outdated configurations or interfere with the
synchronization of schedules across the network.</t>
        <t>This kind of attack could be mitigated by encrypting time signals, schedules and routing path data, and adding a unique
number to the encrypted section of a packet. This has been implemented in existing protocols, for example, the NTS
supports unique identifier extension field (EF) containing a random number, the TLS supports Message Authentication Code
generated from sequence number.</t>
      </section>
      <section anchor="compromised-time-sources">
        <name>Compromised Time Sources</name>
        <t>The reliance on external time sources for synchronization purposes presents a potential attack surface for time-variant
networks. If a trusted time source, such as a GPS signal or an NTP server, is compromised, the attacker could feed
erroneous time information to the entire network, disrupting its operation.</t>
        <t>This kind of attack could be mitigated by the solutions mentioned in <xref target="dos-attack"/>.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="I-D.ietf-tvr-schedule-yang">
          <front>
            <title>YANG Data Model for Scheduled Attributes</title>
            <author fullname="Yingzhen Qu" initials="Y." surname="Qu">
              <organization>Futurewei Technologies</organization>
            </author>
            <author fullname="Acee Lindem" initials="A." surname="Lindem">
              <organization>Arrcus, Inc.</organization>
            </author>
            <author fullname="Eric Kinzie" initials="E." surname="Kinzie">
              <organization>LabN Consulting, L.L.C.</organization>
            </author>
            <author fullname="Don Fedyk" initials="D." surname="Fedyk">
              <organization>LabN Consulting, L.L.C.</organization>
            </author>
            <author fullname="Marc Blanchet" initials="M." surname="Blanchet">
              <organization>Viagenie</organization>
            </author>
            <date day="4" month="July" year="2025"/>
            <abstract>
              <t>   The YANG model in this document includes three modules, and can be
   used to manage network resources and topologies with scheduled
   attributes, such as predictable link loss and link connectivity as a
   function of time.  The intent is to have this information be utilized
   by Time-Variant Routing systems.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tvr-schedule-yang-05"/>
        </reference>
        <reference anchor="RFC9657">
          <front>
            <title>Time-Variant Routing (TVR) Use Cases</title>
            <author fullname="E. Birrane, III" initials="E." surname="Birrane, III"/>
            <author fullname="N. Kuhn" initials="N." surname="Kuhn"/>
            <author fullname="Y. Qu" initials="Y." surname="Qu"/>
            <author fullname="R. Taylor" initials="R." surname="Taylor"/>
            <author fullname="L. Zhang" initials="L." surname="Zhang"/>
            <date month="October" year="2024"/>
            <abstract>
              <t>This document introduces use cases where Time-Variant Routing (TVR) computations (i.e., routing computations that take into consideration time-based or scheduled changes to a network) could improve routing protocol convergence and/or network performance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9657"/>
          <seriesInfo name="DOI" value="10.17487/RFC9657"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.ietf-tvr-use-cases">
          <front>
            <title>TVR (Time-Variant Routing) Use Cases</title>
            <author fullname="Edward J. Birrane" initials="E. J." surname="Birrane">
              <organization>JHU/APL</organization>
            </author>
            <author fullname="Nicolas Kuhn" initials="N." surname="Kuhn">
              <organization>Thales Alenia Space</organization>
            </author>
            <author fullname="Yingzhen Qu" initials="Y." surname="Qu">
              <organization>Futurewei Technologies</organization>
            </author>
            <author fullname="Rick Taylor" initials="R." surname="Taylor">
              <organization>Ori Industries</organization>
            </author>
            <author fullname="Li Zhang" initials="L." surname="Zhang">
              <organization>Huawei</organization>
            </author>
            <date day="29" month="February" year="2024"/>
            <abstract>
              <t>   This document introduces use cases where Time-Variant Routing (TVR)
   computations (i.e. routing computations taking into considerations
   time-based or scheduled changes to a network) could improve routing
   protocol convergence and/or network performance.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tvr-use-cases-09"/>
        </reference>
        <reference anchor="I-D.ietf-tvr-requirements">
          <front>
            <title>TVR (Time-Variant Routing) Requirements</title>
            <author fullname="Daniel King" initials="D." surname="King">
              <organization>Lancaster University</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Brian Sipos" initials="B." surname="Sipos">
              <organization>JHU/APL</organization>
            </author>
            <author fullname="Li Zhang" initials="L." surname="Zhang">
              <organization>Huawei</organization>
            </author>
            <date day="10" month="October" year="2025"/>
            <abstract>
              <t>   Time-Variant Routing (TVR) refers to calculating a path or subpath
   through a network where the time of message transmission (or receipt)
   is part of the overall route computation.  This means that, all
   things being equal, a TVR computation might produce different results
   depending on the time that the computation is performed without other
   detectable changes to the network topology or other cost functions
   associated with the route.

   This document introduces requirements where TVR computations could
   improve message exchange in a network.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tvr-requirements-07"/>
        </reference>
        <reference anchor="I-D.ietf-netmod-schedule-yang">
          <front>
            <title>A Common YANG Data Model for Scheduling</title>
            <author fullname="Qiufang Ma" initials="Q." surname="Ma">
              <organization>Huawei</organization>
            </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Daniel King" initials="D." surname="King">
              <organization>Lancaster University</organization>
            </author>
            <date day="7" month="August" year="2025"/>
            <abstract>
              <t>   This document defines common types and groupings that are meant to be
   used for scheduling purposes such as event, policy, services, or
   resources based on date and time.  For the sake of better modularity,
   the YANG module includes a set of recurrence-related groupings with
   varying levels of representation (i.e., from basic to advanced) to
   accommodate a variety of requirements.  It also defines groupings for
   validating requested schedules and reporting scheduling status.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-netmod-schedule-yang-10"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="I-D.ietf-core-comi-19">
          <front>
            <title>CoAP Management Interface (CORECONF)</title>
            <author fullname="Michel Veillette" initials="M." surname="Veillette">
              <organization>Trilliant Networks Inc.</organization>
            </author>
            <author fullname="Peter Van der Stok" initials="P." surname="Van der Stok">
              <organization>consultant</organization>
            </author>
            <author fullname="Alexander Pelov" initials="A." surname="Pelov">
              <organization>IMT Atlantique</organization>
            </author>
            <author fullname="Andy Bierman" initials="A." surname="Bierman">
              <organization>YumaWorks</organization>
            </author>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <date day="3" month="November" year="2024"/>
            <abstract>
              <t>   This document describes a network management interface for
   constrained devices and networks, called CoAP Management Interface
   (CORECONF).  The Constrained Application Protocol (CoAP) is used to
   access datastore and data node resources specified in YANG, or SMIv2
   converted to YANG.  CORECONF uses the YANG to CBOR mapping and
   converts YANG identifier strings to numeric identifiers for payload
   size reduction.  CORECONF extends the set of YANG based protocols,
   NETCONF and RESTCONF, with the capability to manage constrained
   devices and networks.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-comi-19"/>
        </reference>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC5905">
          <front>
            <title>Network Time Protocol Version 4: Protocol and Algorithms Specification</title>
            <author fullname="D. Mills" initials="D." surname="Mills"/>
            <author fullname="J. Martin" initials="J." role="editor" surname="Martin"/>
            <author fullname="J. Burbank" initials="J." surname="Burbank"/>
            <author fullname="W. Kasch" initials="W." surname="Kasch"/>
            <date month="June" year="2010"/>
            <abstract>
              <t>The Network Time Protocol (NTP) is widely used to synchronize computer clocks in the Internet. This document describes NTP version 4 (NTPv4), which is backwards compatible with NTP version 3 (NTPv3), described in RFC 1305, as well as previous versions of the protocol. NTPv4 includes a modified protocol header to accommodate the Internet Protocol version 6 address family. NTPv4 includes fundamental improvements in the mitigation and discipline algorithms that extend the potential accuracy to the tens of microseconds with modern workstations and fast LANs. It includes a dynamic server discovery scheme, so that in many cases, specific server configuration is not required. It corrects certain errors in the NTPv3 design and implementation and includes an optional extension mechanism.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5905"/>
          <seriesInfo name="DOI" value="10.17487/RFC5905"/>
        </reference>
        <reference anchor="RFC4330">
          <front>
            <title>Simple Network Time Protocol (SNTP) Version 4 for IPv4, IPv6 and OSI</title>
            <author fullname="D. Mills" initials="D." surname="Mills"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This memorandum describes the Simple Network Time Protocol Version 4 (SNTPv4), which is a subset of the Network Time Protocol (NTP) used to synchronize computer clocks in the Internet. SNTPv4 can be used when the ultimate performance of a full NTP implementation based on RFC 1305 is neither needed nor justified. When operating with current and previous NTP and SNTP versions, SNTPv4 requires no changes to the specifications or known implementations, but rather clarifies certain design features that allow operation in a simple, stateless remote-procedure call (RPC) mode with accuracy and reliability expectations similar to the UDP/TIME protocol described in RFC 868.</t>
              <t>This memorandum obsoletes RFC 1769, which describes SNTP Version 3 (SNTPv3), and RFC 2030, which describes SNTPv4. Its purpose is to correct certain inconsistencies in the previous documents and to clarify header formats and protocol operations for NTPv3 (IPv4) and SNTPv4 (IPv4, IPv6, and OSI), which are also used for SNTP. A further purpose is to provide guidance for home and business client implementations for routers and other consumer devices to protect the server population from abuse. A working knowledge of the NTPv3 specification, RFC 1305, is not required for an implementation of SNTP. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4330"/>
          <seriesInfo name="DOI" value="10.17487/RFC4330"/>
        </reference>
        <reference anchor="RFC7589">
          <front>
            <title>Using the NETCONF Protocol over Transport Layer Security (TLS) with Mutual X.509 Authentication</title>
            <author fullname="M. Badra" initials="M." surname="Badra"/>
            <author fullname="A. Luchuk" initials="A." surname="Luchuk"/>
            <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
            <date month="June" year="2015"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) provides mechanisms to install, manipulate, and delete the configuration of network devices. This document describes how to use the Transport Layer Security (TLS) protocol with mutual X.509 authentication to secure the exchange of NETCONF messages. This revision of RFC 5539 documents the new message framing used by NETCONF 1.1 and it obsoletes RFC 5539.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7589"/>
          <seriesInfo name="DOI" value="10.17487/RFC7589"/>
        </reference>
        <reference anchor="I-D.lj-rtg-sat-routing-consideration">
          <front>
            <title>Routing in Satellite Networks: Challenges &amp; Considerations</title>
            <author fullname="Peng Liu" initials="P." surname="Liu">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Tianji Jiang" initials="T." surname="Jiang">
              <organization>China Mobile</organization>
            </author>
            <date day="2" month="March" year="2025"/>
            <abstract>
              <t>   The SDO 3GPP has done tremendous work to either standardize or study
   various types of wireless services that would depend on the satellite
   constellation network.  While the ISLs, or Inter-Satellite Links,
   along with the routing scheme(s) over them are critical to help
   fullfil the satellite services, the 3GPP considers them out-of-scope.
   This leaves the significant work to be explored in the IETF domain.
   This draft stems from the 3GPP satellite use cases that have been
   studied for many years up to now, across a couple of releases, and
   lands on summarizing the challenges &amp; considerations of the
   satellite-based routing.  Based on some unique &amp; advantageous
   characteristics associated with satellite networks, the draft raises
   briefly the general routing considerations for the integrated Non-
   Terrestrial &amp; Terrestial Networks.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-lj-rtg-sat-routing-consideration-00"/>
        </reference>
      </references>
    </references>
    <?line 645?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TBD</t>
    </section>
    <section numbered="false" anchor="appendix-a-code-examples">
      <name>Appendix A: Code Examples</name>
      <section numbered="false" anchor="code-examples-for-energy-harvesting-wireless-sensor-network">
        <name>Code Examples for “Energy-harvesting Wireless Sensor Network”</name>
        <t>As described in <xref section="2.3" sectionFormat="of" target="RFC9657"/>, in an energy-harvesting wireless sensor network, nodes rely exclusively on
environmental sources for power, such as solar panels. On-board power levels may fluctuate based on various factors.
This example assumes that a node will only power its radio when available power is over some threshold.
In this scenario, the TVR Node Yang Module is not applicable, since the node attributes changes are caused by the environment,
not by the instructions from managing device. The TVR Topology Yang Module may be necessary to convey the schedule of topology
changes to all the nodes.</t>
        <t>Considering a topology with three nodes, the connectivity of this three-node networks changes over time and repeats daily.
The detailed change information is shown in <xref target="ex-inf1"/>. The link between node1 and node2 is powered on at 8:00 and powered off at 11:00.
The link between node2 and node3 is powered on at 11:00 and powered off at 16:00.</t>
        <figure anchor="ex-inf1">
          <name>An example of topology connectivity of Energy-harvesting Wireless Sensor Network</name>
          <artwork align="center"><![CDATA[
      +----------+        +----------+        +----------+
8:00  |  Node 1  |--------|  Node 2  |        |  Node 3  |
      +----------+        +----------+        +----------+

      +----------+        +----------+        +----------+
11:00 |  Node 1  |        |  Node 2  |--------|  Node 3  |
      +----------+        +----------+        +----------+

      +----------+        +----------+        +----------+
16:00 |  Node 1  |        |  Node 2  |        |  Node 3  |
      +----------+        +----------+        +----------+
]]></artwork>
        </figure>
        <t>The corresponding json example is shown in <xref target="ex-inf2"/>.</t>
        <figure anchor="ex-inf2">
          <name>Json code of topology schedule for Energy-harvesting Wireless Sensor Network</name>
          <artwork align="center"><![CDATA[
{
    "ietf-tvr-topology:topology-schedule": {
        "nodes": [
            {
                "node-id": "192.168.0.1",
                "available": {
                    "default-node-available": true,
                    "schedules": []
                }
            },
            {
                "node-id": "192.168.0.2",
                "available": {
                    "default-node-available": true,
                    "schedules": []
                }
            },
            {
                "node-id": "192.168.0.3",
                "available": {
                    "default-node-available": true,
                    "schedules": []
                }
            }
        ],
        "links": [
            {
                "source-node": "192.168.0.1",
                "source-link-id": "link1",
                "available": {
                    "schedules": [
                        {
                            "schedule-id": 1,
                            "recurrence-first": {
                                "start-time-utc": "2026-01-01T08:00:00Z",
                                "duration": 10800
                            },
                            "utc-until": "2027-01-01T00:00:00Z",
                            "frequency": "ietf-schedule:daily",
                            "attr-value": {
                                "link-available": true
                            }
                        }
                    ],
                    "default-link-available": false
                }
            },
            {
                "source-node": "192.168.0.2",
                "source-link-id": "link1",
                "available": {
                    "schedules": [
                        {
                            "schedule-id": 2,
                            "recurrence-first": {
                                "start-time-utc": "2026-01-01T08:00:00Z",
                                "duration": 10800
                            },
                            "utc-until": "2027-01-01T00:00:00Z",
                            "frequency": "ietf-schedule:daily",
                            "attr-value": {
                                "link-available": true
                            }
                        }
                    ],
                    "default-link-available": false
                }
            },
            {
                "source-node": "192.168.0.2",
                "source-link-id": "link2",
                "available": {
                    "schedules": [
                        {
                            "schedule-id": 3,
                            "recurrence-first": {
                                "start-time-utc": "2026-01-01T11:00:00Z",
                                "duration": 18000
                            },
                            "utc-until": "2027-01-01T00:00:00Z",
                            "frequency": "ietf-schedule:daily",
                            "attr-value": {
                                "link-available": true
                            }
                        }
                    ],
                    "default-link-available": false
                }
            },
            {
                "source-node": "192.168.0.3",
                "source-link-id": "link1",
                "available": {
                    "schedules": [
                        {
                            "schedule-id": 4,
                            "recurrence-first": {
                                "start-time-utc": "2026-01-01T11:00:00Z",
                                "duration": 18000
                            },
                            "utc-until": "2027-01-01T00:00:00Z",
                            "frequency": "ietf-schedule:daily",
                            "attr-value": {
                                "link-available": true
                            }
                        }
                    ],
                    "default-link-available": false
                }
            }
        ]
    }
}
]]></artwork>
        </figure>
      </section>
      <section numbered="false" anchor="code-examples-for-cellular-network">
        <name>Code Examples for "Cellular Network"</name>
        <t>As described in <xref section="3.3" sectionFormat="of" target="RFC9657"/>, the "Cellular Network" is a network where the nodes operating over cellular
connections that charge both peak and off-peak data rates. In this case, individual nodes may be allocated a fixed set of
"peak" minutes such that exceeding that amount of time results in expensive overage charges. As a result, links are just
available at specific "peak" minutes.
In this scenario, both the TVR node YANG module and TVR topology YANG module are applicable to manage the state of node
interfaces and deliver the predicted topology changes to each node.</t>
        <t>Considering a topology with three nodes, the connectivity variation of it is shown in <xref target="ex-inf1"/>. Taking the node1 as an
example, the corresponding node YANG module json code for node1 is shown in <xref target="ex-inf3"/></t>
        <figure anchor="ex-inf3">
          <name>TVR node YANG module json code of node1</name>
          <artwork align="center"><![CDATA[
{
    "ietf-tvr-node:node-schedule": {
        "node-id": "192.168.0.1",
        "node-power-schedule": {
            "power-default": true,
            "schedules": []
        },
        "interface-schedule": {
            "interfaces": [
                "name": "interface1",
                "default-available": false,
                "schedules": [
                    "schedule-id": 100,
                    "recurrence-first": {
                        "start-time-utc": "2026-01-01T08:00:00Z",
                        "duration": 10800
                    },
                    "utc-until": "2027-01-01T00:00:00Z",
                    "frequency": "ietf-schedule:daily",
                    "attr-value": {
                        "available": true
                    }
                ]
            ]
        }
    }
}
]]></artwork>
        </figure>
        <t>The corresponding topology yang module json code is the same as <xref target="ex-inf2"/></t>
      </section>
      <section numbered="false" anchor="code-examples-for-tidal-network">
        <name>Code Examples for “Tidal Network”</name>
        <t>As described in <xref section="3.4" sectionFormat="of" target="RFC9657"/>, the "Tidal Network" is a network where traffic volume undergoes significant
fluctuations at different times. In the context of a tidal network scenario, energy-saving methods may include the deactivation
of some or all components of network nodes as planned.
In this scenario, both the TVR node YANG module and TVR topology YANG module are applicable to manage the state of node
(interfaces) and deliver the predicted topology changes to each node. <xref target="ex-inf4"/> shows a tidal network topology with 4
nodes.</t>
        <figure anchor="ex-inf4">
          <name>An example topology of Tidal Network</name>
          <artwork align="center"><![CDATA[
    +----+                  +----+               +----+                    +----+
    | N1 |--------L1--------| N2 |               | N1 |---------L1---------| N2 |
    +----+                  +----+               +----+                    +----+
       |  \                /  |                     |                        |
       |    \            /    |                     |                        |
       |      \        /      |                     |                        |
       |        L6    L5      |                     |                        |
      L2          \/         L3                    L2                       L3
       |         /  \         |                     |                        |
       |       /      \       |                     |                        |
       |     /          \     |                     |                        |
       |   /              \   |                     |                        |
    +----+                  +----+               +----+                     +----+
    | N3 |--------L4--------| N4 |               | N3 |---------L4----------| N4 |
    +----+                  +----+               +----+                     +----+
Topology1 (8:00-23:00 everyday)     Topology 2(23:00-23:59 and 00:00-08:00 everyday)
]]></artwork>
        </figure>
        <t>Taking the node N1 as an example, assuming the node-ids of N1, N2, N3, N4 are 192.168.0.1, 192.168.0.2, 192.168.0.3,
and 192.168.0.4. The corresponding node YANG module json code for it is shown in <xref target="ex-inf5"/></t>
        <figure anchor="ex-inf5">
          <name>TVR node YANG module json code of node N1</name>
          <artwork align="center"><![CDATA[
{
    "ietf-tvr-node:node-schedule": {
        "node-id": "192.168.0.1",
        "node-power-schedule": {
            "power-default": true,
            "schedules": []
        },
        "interface-schedule": {
            "interfaces": [
                "name": "interface2",
                "default-available": false,
                "schedules": [
                    "schedule-id": 100,
                    "recurrence-first": {
                        "start-time-utc": "2026-01-01T08:00:00Z",
                        "duration": 54000
                    },
                    "utc-until": "2027-01-01T00:00:00Z",
                    "frequency": "ietf-schedule:daily",
                    "attr-value": {
                        "available": true
                    }
                ]
            ]
        }
    }
}
]]></artwork>
        </figure>
        <t>The corresponding topology YANG module json code is shown in <xref target="ex-inf6"/></t>
        <figure anchor="ex-inf6">
          <name>Json code of topology schedule for Tidal Network</name>
          <artwork align="center"><![CDATA[
{
    "ietf-tvr-topology:topology-schedule": {
        "nodes": [
            {
                "node-id": "192.168.0.1",
                "available": {
                    "default-node-available": true,
                    "schedules": []
                }
            },
            {
                "node-id": "192.168.0.2",
                "available": {
                    "default-node-available": true,
                    "schedules": []
                }
            },
            {
                "node-id": "192.168.0.3",
                "available": {
                    "default-node-available": true,
                    "schedules": []
                }
            },
            {
                "node-id": "192.168.0.4",
                "available": {
                    "default-node-available": true,
                    "schedules": []
                }
            }
        ],
        "links": [
            {
                "source-node": "192.168.0.1",
                "source-link-id": "link2",
                "available": {
                    "schedules": [
                        {
                            "schedule-id": 100,
                            "recurrence-first": {
                                "start-time-utc": "2026-01-01T08:00:00Z",
                                "duration": 54000
                            },
                            "utc-until": "2027-01-01T00:00:00Z",
                            "frequency": "ietf-schedule:daily",
                            "attr-value": {
                                "link-available": true
                            }
                        }
                    ],
                    "default-link-available": false
                }
            },
            {
                "source-node": "192.168.0.2",
                "source-link-id": "link2",
                "available": {
                    "schedules": [
                        {
                            "schedule-id": 200,
                            "recurrence-first": {
                                "start-time-utc": "2026-01-01T08:00:00Z",
                                "duration": 54000
                            },
                            "utc-until": "2027-01-01T00:00:00Z",
                            "frequency": "ietf-schedule:daily",
                            "attr-value": {
                                "link-available": true
                            }
                        }
                    ],
                    "default-link-available": false
                }
            },
            {
                "source-node": "192.168.0.3",
                "source-link-id": "link2",
                "available": {
                    "schedules": [
                        {
                            "schedule-id": 300,
                            "recurrence-first": {
                                "start-time-utc": "2026-01-01T08:00:00Z",
                                "duration": 54000
                            },
                            "utc-until": "2027-01-01T00:00:00Z",
                            "frequency": "ietf-schedule:daily",
                            "attr-value": {
                                "link-available": true
                            }
                        }
                    ],
                    "default-link-available": false
                }
            },
            {
                "source-node": "192.168.0.4",
                "source-link-id": "link2",
                "available": {
                    "schedules": [
                        {
                            "schedule-id": 400,
                            "recurrence-first": {
                                "start-time-utc": "2026-01-01T08:00:00Z",
                                "duration": 54000
                            },
                            "utc-until": "2027-01-01T00:00:00Z",
                            "frequency": "ietf-schedule:daily",
                            "attr-value": {
                                "link-available": true
                            }
                        }
                    ],
                    "default-link-available": false
                }
            }
        ]
    }
}
]]></artwork>
        </figure>
      </section>
      <section numbered="false" anchor="code-examples-for-mobile-satellites">
        <name>Code Examples for “Mobile Satellites”</name>
        <t>As described in <xref section="4.3" sectionFormat="of" target="RFC9657"/>, the "Mobile Satellites" generally refers to the Low Earth Orbit(LEO) network,
which includes hundreds to thousands of spacecrafts that can communicate both with their orbital neighbors as well as
down to any ground station that they happen to be passing over. The connection between the spacecrafts and the ground
station depend on the flight trajectories of the spacecrafts, so the link changes between them is predictable.</t>
        <t><xref section="4.3" sectionFormat="of" target="RFC9657"/> introduces a scenario with 3 spacecrafts and 1 ground station. The changes of topology are
shown in <xref target="ex-inf7"/>. The ground station connects to spacecraft N3 at time t1, connects to N2 at time t2, and connects
to N1 at time t3. The duration of the connection depends on the satellite altitude and the elevation angle.
According to <xref section="2.1" sectionFormat="of" target="I-D.lj-rtg-sat-routing-consideration"/>, for the spacecrafts at the 500km
altitude, and the connection between the spacecraft and ground station can keep for 7 minutes.</t>
        <figure anchor="ex-inf7">
          <name>An example topology for Mobile Satellites</name>
          <artwork align="center"><![CDATA[
    +------+          +------+
t1  |  N2  |----------|  N3  |
    +------+          +---+--+
                          |
                         /|\
                        \___/
                         / \
                       Ground
                       Station
------------------------------------------------------------------
    +------+          +------+          +------+
t2  |  N1  |----------|  N2  |----------|  N3  |
    +------+          +---+--+          +------+
                          |
                         /|\
                        \___/
                         / \
                       Ground
                       Station
------------------------------------------------------------------
                      +------+          +------+          +------+
t3                    |  N1  |----------|  N2  |----------|  N3  |
                      +---+--+          +------+          +------+
                          |
                         /|\
                        \___/
                         / \
                       Ground
                       Station
------------------------------------------------------------------
]]></artwork>
        </figure>
        <t>In this scenario, the TVR topology YANG module is applicable to deliver the predicted topology changes to each node.
However, the TVR node YANG module is not applicable, this depends on whether the link changes are controlled by satellites
themselves or by the managing device. Here, we provide the json codes for TVR topology YANG module and node
 YANG module as a reference.</t>
        <t>Taking the spacecraft N1 as an example, assuming the time t1 is 10:00:00 1 July 2025 and the node-ids of N1, N2, N3, and
ground station is 192.168.0.1, 192.168.0.2, 192.168.0.3, and 192.168.0.4.,
then the corresponding node YANG module json code for it is shown in <xref target="ex-inf8"/>.</t>
        <figure anchor="ex-inf8">
          <name>TVR node YANG module json code of spacecraft N1</name>
          <artwork align="center"><![CDATA[
{
    "ietf-tvr-node:node-schedule": {
        "node-id": "192.168.0.1",
        "node-power-schedule": {
            "power-default": true,
            "schedules": []
        },
        "interface-schedule": {
            "interfaces": [
                "name": "satellite2ground-interface",
                "default-available": false,
                "schedules": [
                    "schedule-id": 100,
                    "period-start": "2025-07-01T10:00:00Z",
                    "duration": 420,
                    "attr-value": {
                        "available": true
                    }
                ]
            ]
        }
    }
}
]]></artwork>
        </figure>
        <t>Assuming that time t1 is 10:00:00 1 July 2025, time t2 is 10:10:00 1 July 2025, and time t3 is 10:20:00 1 July 2025,
then the corresponding topology YANG module json code is shown in <xref target="ex-inf9"/>.</t>
        <figure anchor="ex-inf9">
          <name>Json code of topology schedule for Mobile Satellites</name>
          <artwork align="center"><![CDATA[
{
    "ietf-tvr-topology:topology-schedule": {
        "nodes": [
            {
                "node-id": "192.168.0.1",
                "available": {
                    "default-node-available": true,
                    "schedules": []
                }
            },
            {
                "node-id": "192.168.0.2",
                "available": {
                    "default-node-available": true,
                    "schedules": []
                }
            },
            {
                "node-id": "192.168.0.3",
                "available": {
                    "default-node-available": true,
                    "schedules": []
                }
            },
            {
                "node-id": "192.168.0.4",
                "available": {
                    "default-node-available": true,
                    "schedules": []
                }
            }
        ],
        "links": [
            {
                "source-node": "192.168.0.3",
                "source-link-id": "gs-link",
                "available": {
                    "schedules": [
                        {
                            "schedule-id": 100,
                            "period-start": "2025-07-01T10:00:00Z",
                            "duration": 420,
                            "attr-value": {
                                "available": true
                            }
                        }
                    ],
                    "default-link-available": false
                }
            },
            {
                "source-node": "192.168.0.2",
                "source-link-id": "gs-link",
                "available": {
                    "schedules": [
                        {
                            "schedule-id": 200,
                            "period-start": "2025-07-01T10:10:00Z",
                            "duration": 420,
                            "attr-value": {
                                "available": true
                            }
                        }
                    ],
                    "default-link-available": false
                }
            },
            {
                "source-node": "192.168.0.1",
                "source-link-id": "gs-link",
                "available": {
                    "schedules": [
                        {
                            "schedule-id": 300,
                            "period-start": "2025-07-01T10:20:00Z",
                            "duration": 420,
                            "attr-value": {
                                "available": true
                            }
                        }
                    ],
                    "default-link-available": false
                }
            }
        ]
    }
}
]]></artwork>
        </figure>
      </section>
      <section numbered="false" anchor="code-examples-for-predictable-moving-vessels">
        <name>Code examples for “Predictable Moving Vessels”</name>
        <t>As described in <xref section="4.4" sectionFormat="of" target="RFC9657"/>, the "Predictable Moving Vessels" involves the movement of vessels with
predictable trajectories, such as ferries or planes. These endpoints often rely on a combination of satellite and
terrestrial systems for Internet connectivity. Consider a scenario where a vessel uses satellites to access the Internet,
including a ship and three satellites. As the satellite and the vessel move, the vessel establishes connections with the
satellites N1, N2, and N3 at t1, t2, and t3 respectively. It is assumed that each connection lasts for 1 minutes.
The changes of topology are shown in <xref target="ex-inf10"/>.</t>
        <figure anchor="ex-inf10">
          <name>An example topology for Predictable Moving Vessels</name>
          <artwork align="center"><![CDATA[
    +------+          +------+
t1  |  N2  |----------|  N1  |
    +------+          +---+--+
                          |
                         /|\
                        \___/
                         / \
                       Vessel
------------------------------------------------------------------
    +------+          +------+          +------+
t2  |  N3  |----------|  N2  |----------|  N1  |
    +------+          +---+--+          +------+
                          |
                         /|\
                        \___/
                         / \
                       Vessel
------------------------------------------------------------------
                      +------+          +------+          +------+
t3                    |  N3  |----------|  N2  |----------|  N1  |
                      +---+--+          +------+          +------+
                          |
                         /|\
                        \___/
                         / \
                       Vessel
------------------------------------------------------------------
]]></artwork>
        </figure>
        <t>This scenario is quite similar to the "Mobile Satellites" example, so the TVR node YANG module json code and topology YANG
json code of this scenario can refer to the json code of the "Mobile Satellites" example.</t>
      </section>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact fullname="Daniel King">
        <organization>Lancaster University</organization>
        <address>
          <postal>
            <country>United Kingdom</country>
          </postal>
          <email>d.king@lancaster.ac.uk</email>
        </address>
      </contact>
      <contact fullname="Charalampos (Haris) Rotsos">
        <organization>Lancaster University</organization>
        <address>
          <email>c.rotsos@lancaster.ac.uk</email>
        </address>
      </contact>
      <contact fullname="Peng Liu">
        <organization>China Mobile</organization>
        <address>
          <email>liupengyjy@chinamobile.com</email>
        </address>
      </contact>
      <contact fullname="Tony Li">
        <organization>Juniper Networks</organization>
        <address>
          <email>tony.li@tony.li</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
